Sample records for access card cac

  1. 32 CFR 156.6 - Common access card (CAC) investigation and adjudication.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 2014-07-01 false Common access card (CAC) investigation and adjudication...PROGRAM (PSP) § 156.6 Common access card (CAC) investigation and adjudication...for Issuing Personal Identity Verification Cards under HSPD-12.” For those...

  2. Card Access Know-How.

    ERIC Educational Resources Information Center

    College Planning & Management, 2000

    2000-01-01

    Provides tips for expanding a school's card access system and making it more productive for all concerned. Tips include the use of electronic locks for better security; the need for state-of-the-art card reader system to save money in the long run; selecting vendors to one that manufactures, installs, and supports the card system; and having…

  3. ID Card Access Request Form Department: ____________________________________________________________

    E-print Network

    ID Card Access Request Form Department: _____________________ This Card Access Request activates your card for access to the building after hours, at any card reader door a access code recently, please fill out the form below. Please allow up to 48 hours for your card

  4. Intelligent card access keys

    SciTech Connect

    Tennefoss, M.R.

    1987-07-01

    A newly developed access control technology allows information about users to be stored on key-like EEPROM devices. The keys store encrypted information about the user and his or her authorized access activity. Specially developed key readers scan, decrypt, and process the key data, and make the decision whether entry should be granted or denied. The key readers can function as complete, stand-alone facility management systems, incorporating access control, security monitoring, and remote control. In this configuration, the key readers provide anti-passback protection and other special features without requiring any data lines between readers. The key readers also feature sophisticated algorithmic processing for performing complex operations such as two-man control or cross zoned security annunciation. Key readers can also be interconnected with an MCM-1000 Multiples Monitoring System to form a distributed processing local area network. In such a configuration, changes in key reader status can be uploaded to the MCM-1000, and programming changes and operator commands can be downloaded to the key readers.

  5. Corporate Card Access Quick Reference Corporate Card Access Online Enrollment to register

    E-print Network

    Harms, Kyle E.

    Corporate Card Access Quick Reference 1 Corporate Card Access Online Enrollment to register: Log on to Corporate Card Access at www.bankofamerica.com/corporatecardaccess Step Action Result 1 Enter your account information in appropriate boxes: · First, Last Name · Name as it appears on card · Expiration Date · Billing

  6. PROCUREMENT CARD US BANK ACCESS ONLINE

    E-print Network

    de Lijser, Peter

    PROCUREMENT CARD US BANK ACCESS ONLINE SYSTEM USER GUIDE Contracts and Procurement Procurement Card Registering your US Bank Visa Pcard on Access Online ............................. 6 Login to the Access................................................... 22 #12;3 Web Browser Security Settings Before you can us the US Bank Access online system, you must

  7. PROCUREMENT CARD US BANK ACCESS ONLINE

    E-print Network

    de Lijser, Peter

    PROCUREMENT CARD US BANK ACCESS ONLINE DELEGATE USER GUIDE Contracts and Procurement Procurement................................................... 21 #12;3 Web Browser Security Settings Before you can us the US Bank Access online system, you must Login to the Access Online system ............................................................ 6

  8. Charge Card Administration Accessing the Travel Card Cardholder Training in the

    E-print Network

    Zobin, Nahum

    Charge Card Administration Accessing the Travel Card Cardholder Training in the Learning Management System (LMS) Purpose: This procedure instructs the user how to access the Travel Card Cardholder Training: Commonwealth of Virginia Department of Accounts - Charge Card Administration January 2009 #12;Charge Card

  9. UNBC LIBRARY CARD AND BORROWER ACCESS APPLICATION FORM

    E-print Network

    Northern British Columbia, University of

    UNBC LIBRARY CARD AND BORROWER ACCESS APPLICATION FORM For Faculty Authorized Users UNBC FACULTY: 20020_________________ Please issue a Faculty Authorized Library card to the following person so that s. Please issue a library card to the following person so that s/he may borrow Library materials and access

  10. Fall/Winter, 2013/14 ACCESS CARD INFO

    E-print Network

    Martin, Jeff

    Fall/Winter, 2013/14 ACCESS CARD INFO 1. All students registered in at least one Theatre course, you must present your student ID card to Patty in Room 3T03; she will program it with Theatre building access. No charge but note: replacement cost for lost Student ID cards is $25.00. ii) For existing

  11. CARDS (COMPUTER ACCESS TO RESEARCH ON DIETARY SUPPLEMENTS)

    EPA Science Inventory

    CARDS stands for Computer Access to Research on Dietary Supplements. It is a database of federally funded research projects pertaining to dietary supplements. Currently, CARDS contains projects funded by the Institutes and Centers (ICs) of the National Institutes of Health (NIH) ...

  12. Personalized Access to Semantic Web Agents Using Smart Cards

    Microsoft Academic Search

    Riza Cenk Erdur; Geylani Kardas

    2005-01-01

    \\u000a In this paper, we mainly focus on the integration of smart card based access to semantic web enabled multi-agent systems.\\u000a Besides classical benefits such as smart card based authentication and authorization, integration of such a feature will make\\u000a it possible for semantic web agents to take the personal knowledge stored as instances of a specific personal ontology in\\u000a the smart

  13. 1. All persons in the NFC facilities will have an access card. Your access card is your permission to use NFC facilities and is necessary for gaining entrance. Your

    E-print Network

    Weiblen, George D

    -supporting facility, therefore each individual must run his/her own lab access card through the card reader. AccessNFC rules 10/2011 1. All persons in the NFC facilities will have an access card. Your access card is your permission to use NFC facilities and is necessary for gaining entrance. Your access card

  14. PAID LOT ACCESS CARD APPLICATION Office Use Only: Recorded on S: drive

    E-print Network

    Suzuki, Masatsugu

    PAID LOT ACCESS CARD APPLICATION Office Use Only: Recorded on S: drive Name New Renewal Payroll for annual, semester, and summer passes (prices include tax). If you do not already possess an access card, a refundable $20 deposit must also be paid. Access cards will allow 24 hour a day access. Checks should be made

  15. Policy Name: Card Access to Buildings and Labs

    E-print Network

    of University Safety Approval Authority: Senior Management Committee Date of Original Policy: Fall 1991 Last the incidents of theft and damage to property through effective security methods. To this end, some academic after normal working hours, with the use of an access card. Designated areas of Residence on campus

  16. Two worlds, one smart card # An integrated solution for physical access and logical security

    E-print Network

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers fitted with a contact smart card reader), with access to over a 1000 di#erent applications. Keywords: PKITwo worlds, one smart card # An integrated solution for physical access and logical security using

  17. Two worlds, one smart card An integrated solution for physical access and logical security

    E-print Network

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers fitted with a contact smart card reader), with access to over a 1000 different applications. KeywordsTwo worlds, one smart card An integrated solution for physical access and logical security using

  18. 77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-10

    ...Department of the Army Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access Electronic Transportation...has determined that the Transportation Workers Identification Card (TWIC) PKI certificate cannot be used to authenticate...

  19. Updated as of May 27, 2011 Instructions to new LSI lab workers regarding LSI Key and Key card Access

    E-print Network

    Strynadka, Natalie

    regarding LSI Key and Key card Access In order to obtain a key and key card to an LSI space, following is required. 1. A request for a key and key card that before a key card and keys are authorized, the new highlighted in attachment

  20. Age verification cards fail to fully prevent minors from accessing tobacco products

    Microsoft Academic Search

    Hideyuki Kanda; Yoneatsu Osaki; Takashi Ohida; Yoshitaka Kaneita; Takeshi Munezawa

    2010-01-01

    BackgroundProper age verification can prevent minors from accessing tobacco products. For this reason, electronic locking devices based on a proof-of age system utilising cards were installed in almost every tobacco vending machine across Japan and Germany to restrict sales to minors.ObjectiveWe aimed to clarify the associations between amount smoked by high school students and the usage of age verification cards

  1. Challenges of CAC in Heterogeneous Wireless Cognitive Networks

    NASA Astrophysics Data System (ADS)

    Wang, Jiazheng; Fu, Xiuhua

    Call admission control (CAC) is known as an effective functionality in ensuring the QoS of wireless networks. The vision of next generation wireless networks has led to the development of new call admission control (CAC) algorithms specifically designed for heterogeneous wireless Cognitive networks. However, there will be a number of challenges created by dynamic spectrum access and scheduling techniques associated with the cognitive systems. In this paper for the first time, we recommend that the CAC policies should be distinguished between primary users and secondary users. The classification of different methods of cac policies in cognitive networks contexts is proposed. Although there have been some researches within the umbrella of Joint CAC and cross-layer optimization for wireless networks, the advent of the cognitive networks adds some additional problems. We present the conceptual models for joint CAC and cross-layer optimization respectively. Also, the benefit of Cognition can only be realized fully if application requirements and traffic flow contexts are determined or inferred in order to know what modes of operation and spectrum bands to use at each point in time. The process model of Cognition involved per-flow-based CAC is presented. Because there may be a number of parameters on different levels affecting a CAC decision and the conditions for accepting or rejecting a call must be computed quickly and frequently, simplicity and practicability are particularly important for designing a feasible CAC algorithm. In a word, a more thorough understanding of CAC in heterogeneous wireless cognitive networks may help one to design better CAC algorithms.

  2. Credit-Card Bill Seeks to Protect Students but Could Limit Their Access to Credit

    ERIC Educational Resources Information Center

    Field, Kelly

    2009-01-01

    Congress passed legislation last week that would shield students and other consumers from sudden spikes in interest rates and fees, but that could make it harder for young people to access credit to pay for college. The legislation would extend broad new consumer protections to all credit-card holders, offering special protections to college…

  3. Policy Name: Card Access to Buildings and Labs Originating/Responsible Department: Department of University Safety

    E-print Network

    Carleton University

    of University Safety Approval Authority: Senior Management Committee Date of Original Policy: Fall 1991 Last the incidents of theft and damage to property through effective security methods. To this end, some academic after normal working hours, with the use of an access card. Designated areas of Residence on campus

  4. Along with the debit account function, students use their BuckID card for secure access to buildings (including residence halls), to swipe

    E-print Network

    are processed through SallieMae, and Ohio State cannot enter or access your credit card information. Parents of payment, report a lost or stolen card, check their transaction history and available balance, and set up and guardians also can pay by credit card. To pay tuition and fees with a credit card: Go to the Finances

  5. Conversion of Exterior Doors to Electronic Card Access In 2007, a series of security initiatives were adopted, one of which included the

    E-print Network

    card up to the reader and if you are authorized, the strike on the door will unlock and you can open the reader and your MSU ID card. If you have been authorized to access that door when it is locked locked (the light on the reader is red), you should be able to present your card to reader

  6. Effects of high-frequency electromagnetic fields emitted from card readers of access control systems on electronic pocket dosimeters

    Microsoft Academic Search

    Shizuhiko Deji; Kunihide Nishizawa

    2005-01-01

    High-frequency electromagnetic fields in the 120kHz band emitted from card readers for access control systems caused abnormally high doses on electronic pocket dosimeters (EPDs). All EPDs recovered their normal performance by resetting after the exposure ceased. The electric and magnetic immunity levels of the EPDs were estimated by using the distances needed to prevent electromagnetic interference.

  7. RESEARCH ARTICLE Open Access The CARD8 p.C10X mutation associates with a

    E-print Network

    Paris-Sud XI, Université de

    , anti-glucan antibody response depends on the NLRP3 inflammasome. Here, we explored the effect of mutated CARD8, a component of the inflammasome, on anti-glycans antibody response in human. Methods but not ACCA levels are under the influence of CARD8 genotype. Alteration of CARD8, a component of inflammasome

  8. PROCUREMENT CARD CHECKLIST 1. INITIAL SET UP

    E-print Network

    PROCUREMENT CARD CHECKLIST 1. INITIAL SET UP Card Custodian fills out RBAR for Banner access to FAAINVT (PCard Module). Card Custodian/ Card users review PCard Survival Guide (user guide) at: http://www.pdx.edu/financial-services/formpolicies Card Custodian/ Card Users take Pcard test at https://secure.ous.edu/cont-div/procurement/ Card

  9. A House of Cards.

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2000-01-01

    Reviews how technologically enhanced ID cards are helping colleges and universities keep their students and staff safe. The benefits of a one-card system for identification, building access, and financial transactions are highlighted as are the liberal use of security phones and security cameras. (GR)

  10. Follow Up: Credit Card Caution

    ERIC Educational Resources Information Center

    Cahill, Timothy P.

    2007-01-01

    In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students a lesson they will…

  11. QoS routing and CAC QoS routing and

    E-print Network

    QoS routing and CAC Pag. 1 QoS routing and CAC (Connection Admission Control) QoS Issues Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ QoS routing and CAC to accept or not a new incoming call ­ QoS routing selects a set (possibly one) of tentative paths ­ CAC

  12. Acoustic modeling for sea-mine CAD\\/CAC development

    Microsoft Academic Search

    J. Kent Harbaugh; Daniel D. Sternlicht; Angela Putney; Mark D. Tinkle; Eugene M. Lavely

    2005-01-01

    Computer aided detection\\/classification (CAD\\/ CAC) algorithms have been developed to help mine warfare operators correctly identify targets within vast quantities of synthetic aperture sonar\\/side look sonar (SAS\\/SLS) imagery. Typically, large, and thus expensive, sets of target and clutter exemplars are required for the evaluation and training of these algorithms. To expedite the assessment and preliminary training of CAD\\/CAC algorithms for

  13. Smart card for smart campus: KFUPM case study

    Microsoft Academic Search

    T. Halawani; M. Mohandes

    2003-01-01

    Smart card is the latest addition in the world of information technology. The vision of the smart card program is to provide access to services that is secure, fast, friendly, easy to use, flexible, personal, and is accessible by the users from any place at any time. A smart card is of the size of a conventional credit card with

  14. POSTGRADUATE MONTEREY, CALIFORNIA

    E-print Network

    is unlimited CAC on a MAC: Setting up a DOD Common Access Card Reader on the Macintosh OS X Operating System Common Access Card Reader on the Macintosh OS X Operating System 6. AUTHOR(S) 5. FUNDING NUMBERS 7, utilizes the ActivCard USB Common Access Card (CAC) readers. The CAC readers in conjunction with the user

  15. Smart Cards

    Microsoft Academic Search

    Joseph Didier

    2004-01-01

    This paper presents an overview of the history, commercialization, technology, standards, and current and future applications of smart cards. Section 1 is an overview of smart cards, including their current global use in identification, verification and authorization applications through their ability to support transaction processing, information management and multiple applications on a single card. This section also includes a summary of

  16. CREDIT CARD FRAUD

    Microsoft Academic Search

    Lacramioara BALAN; Mihai POPESCU

    2011-01-01

    Credit card fraud is the misuse of a credit card to make purchases without authorization or counterfeiting a credit card. Credit cards are the most often used electronic payment instrument. Types of credit card fraud are: online credit card fraud, advance payments, stolen card numbers, shave and paste, de-emboss\\/re-emboss etc. If current growth rates continue, credit cards and debit cards

  17. Gaining Access.

    ERIC Educational Resources Information Center

    Wand, Sean; Thermos, Adam C.

    1998-01-01

    Explains the issues to consider before a college decides to purchase a card-access system. The benefits of automation, questions involving implementation, the criteria for technology selection, what typical card technology involves, privacy concerns, and the placement of card readers are discussed. (GR)

  18. Purchasing Card Reference Guide Apply for PCard

    E-print Network

    Prodiæ, Aleksandar

    Purchasing Card Reference Guide Apply for PCard 1. Access PCard Request Form http form to: St George Campus (Attn: Campus Card Coordinator) 215 Huron Street, Room 327 (Fax: 416-978-5483) UTM (Attn: UTM Campus Card Coordinator) Business Services, N. Bldg., (Fax: 905-828-5221) UTSC (Attn

  19. Anonymous credit cards

    Microsoft Academic Search

    Steven H. Low; Sanjoy Paul; Nicholas F. Maxemchuk

    1994-01-01

    This paper describes a communications networking technique for funds transfer which combines the privacy of cash transactions with the security, record-keeping and charging mechanisms of credit cards. The scheme uses a communications network and cryptographic protocols to separate information. The company that extends credit to the individual and collects the bill does not have access to the specific purchases, and

  20. Card Colm

    NSDL National Science Digital Library

    2013-06-27

    The Card Colm bimonthly column is sponsored by the Mathematical Association of America (MAA) and it explores mathematical card principles and effects for fun. It's an inspired idea ignited by the musings and mediations of Martin Gardner, a man who loved such things. The column is penned by Colm Mulcahy who, when not enjoying card tricks, can be found teaching at Spelman College. The posts have titles like "Never Forget a Face (Double-Dealing with a Difference)" and "Predictability Outranks Luck." Each post contains fun diagrams, witty asides, and links to other references. People with an interest in probability, card games and mathematics in general will find much to enjoy here.

  1. QoS routing and CAC QoS routing and

    E-print Network

    QoS routing and CAC Pag. 1 QoS routing and CAC (Connection Admission Control) Andrea Bianco Telecommunication Network Group QoS Issues in Telecommunication Networks - 1Andrea Bianco ­ TNG group - Politecnico://www.telematica.polito.it/ QoS routing and CAC · Preventive traffic control technique (in principle it can become reactive

  2. Your Kudu Card It's more than a piece of plastic!

    E-print Network

    Wagner, Stephan

    Your Kudu Card It's more than a piece of plastic! IT'S AN ACCESS CARD As long as you are a registered student at the University your card will open turnstiles to the campus, most of the libraries and to PC labs. Your card will not open all doors, turnstiles or booms, only those that you have permission

  3. A Mathemagical Card Trick 1 Card Trick

    E-print Network

    Do, Norman

    Norman Do A Mathemagical Card Trick 1 Card Trick Here I have a normal deck of 52 playing cards cards and remove them from the deck. Now, being careful not to show me, pass those five cards to my, the 5 and then the 10 -- but leave the identity of the remaining card known only to you and herself

  4. What can I purchase with the card? You can use the card to pay for eligible healthcare

    E-print Network

    Oklahoma, University of

    What can I purchase with the card? You can use the card to pay for eligible healthcare expenses is similar to a debit card since it electronically accesses your healthcare account when it's used to pay for eligible expenses. Benefits of using the card · Immediate payment of your expenses from your healthcare

  5. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  6. Breastfeeding Report Card 2014

    MedlinePLUS

    ... this page: About CDC.gov . Breastfeeding Share Compartir Breastfeeding Report Card 2014 Background There are many ways ... Report Card, 2014 - [PDF - 1.25 MB] Previous Breastfeeding Report Cards Breastfeeding Report Card 2013 [1.12 ...

  7. Key Management and Mutual Authentication for Multiple Field Records Smart Cards

    Microsoft Academic Search

    Kiarash Narimani; Gordon B. Agnew

    2006-01-01

    Smart cards provide a convenient way of carrying a limited amount of personal information. This may include medical information, bank account and password information, etc. To protect this information from unauthorized access, data can be encrypted when stored on the card. To ensure privacy, we require an authentication process to ensure legitimate access to the information. Smart cards and card

  8. Raman scattering from the CaC6 superconductor

    NASA Astrophysics Data System (ADS)

    Mialitsin, A.; Kim, J.; Kremer, R.; Blumberg, G.

    2008-03-01

    Phys. Rev. B Phys. Rev. Lett. Phys. Lett. A Phys. Rev. 2MgB2 -1cm-1,-1cm-1/T,2gE2g 1gA1g 2DS2?S^E 2?L^E 2DA2Â 02?0 6CaC6 A polarized Raman scattering study has been performed on bulk 1st stage intercalated graphite CaC6 crystals at sub-Tc temperatures. We identify all three Raman active Eg bands expected for the Rm6 space group of CaC6 at 440, 1120 and 1508,-1 and find them to be in agreement with zone center modes predicted by first principles calculations of phonon dispersion.^1 In addition the equivalents of the graphite D and G bands are observed at respective frequencies. Inherent to the disorder induced double resonant scattering process^2 the D band shifts from 1308,-1 to 1332,-1 upon the change of the excitation laser wavelength from 647,m to 476 ,m. Assuming linear dependence of the D band peak position as a function of excitation energy this translates to the frequency shift of 35,-1/,V. By comparing the integrated intensity of the G band at 1582,-1 in 6 to the one in kish graphite the relative fraction of higher stage domains to the 1st stage intercalation is estimated to be less then 0.2%. Finally upon the superconducting phase transition we observe a 2? peak with the frequency of 24,-1 at 5,K. With temperature increase this peak persists shortly up to the SC phase transition at 11.6,and shows temperature dependence consistent with the strong coupling regime. ^1M. Calandra and F. Mauri, PRL 95, 237002 (2005). ^2C. Thomson and S. Reich, PRL 85, 5214 (2000).

  9. Pressure-induced superconductivity in CaC2

    PubMed Central

    Li, Yan-Ling; Luo, Wei; Zeng, Zhi; Lin, Hai-Qing; Mao, Ho-kwang; Ahuja, Rajeev

    2013-01-01

    Carbon can exist as isolated dumbbell, 1D chain, 2D plane, and 3D network in carbon solids or carbon-based compounds, which attributes to its rich chemical binding way, including sp-, sp2-, and sp3-hybridized bonds. sp2-hybridizing carbon always captures special attention due to its unique physical and chemical property. Here, using an evolutionary algorithm in conjunction with ab initio method, we found that, under compression, dumbbell carbon in CaC2 can be polymerized first into 1D chain and then into ribbon and further into 2D graphite sheet at higher pressure. The C2/m structure transforms into an orthorhombic Cmcm phase at 0.5 GPa, followed by another orthorhombic Immm phase, which is stabilized in a wide pressure range of 15.2–105.8 GPa and then forced into MgB2-type phase with wide range stability up to at least 1 TPa. Strong electron–phonon coupling ? in compressed CaC2 is found, in particular for Immm phase, which has the highest ? value (0.562–0.564) among them, leading to its high superconducting critical temperature Tc (7.9?9.8 K), which is comparable with the 11.5 K value of CaC6. Our results show that calcium not only can stabilize carbon sp2 hybridization at a larger range of pressure but also can contribute in superconducting behavior, which would further ignite experimental and theoretical interest in alkaline–earth metal carbides to uncover their peculiar physical properties under extreme conditions. PMID:23690580

  10. CardWeb

    NSDL National Science Digital Library

    Ram Research Group's CardWeb Inc. strives to provide comparative information on a variety of US payment cards for consumers and competitive card industry information for executives. On-site tools for consumers include monthly surveys of credit card deals (CardTrak), a national database of bank credit card issuers (CardLocator), and a guide to payment card types and terms (CardLearn), among others. Executives in the payment industry may benefit from a daily news service of business payment card happenings (CardFlash), financial data on the card industry and its players (CardData), and links to current payment card-advertising campaigns (CardWatch) for comparison and analysis.

  11. The Ohio State University Purchasing Card, Travel Card and Group/Extended Travel Card

    E-print Network

    The Ohio State University Purchasing Card, Travel Card and Group/Extended Travel Card Acceptance department's records for each card. Card Type: Purchasing Card Travel Card Group/Extended Travel Card Last 4 Digits: Card Manager / Card Holder Name: Employee ID Number: As a large public institution, The Ohio

  12. Hint Cards

    NSDL National Science Digital Library

    2013-01-01

    In this 2-minute video math coach Audra McPhillips describes and models a strategy for promoting independence in problem solving. She explains how she decides what hints to provide and how hint cards allow her to ask probing questions and provide more effective support to students. The resource includes reflection questions for teachers and a transcript of the video (doc).

  13. Travel Visa Card Quick Guide for Card Administrators

    E-print Network

    Firestone, Jeremy

    WORKSTM Travel Visa Card Quick Guide for Card Administrators Procurement Services University for Card Administrators Contents Getting Started ­ Cardholder Review Pages ..................................... 6 Card Administrator Actions: 1. Sign

  14. Purchase Card Policy Purchase Card Policy

    E-print Network

    Doran, Simon J.

    Purchase Card Policy Purchase Card Policy Originator name: Robin Hunt Department: Finance This policy governs the use of the University's Purchase Card. 1.1 Purpose The purpose of this policy the Purchase Card, how to apply for one and procedures covering its use. 1.2 Scope This policy refers

  15. New technologies in credit card authentication

    Microsoft Academic Search

    Pieter de Bruyne

    1990-01-01

    A description is presented of a card for accessing information indirectly using only a bar code. An intelligent card reader is required to retrieve information regarding the cardholder. Magnetic stripe memories are sufficiently large to hold name, number, and about 50 b of reference information for signature verification. Signature verification using dynamic features has been realized with a higher accuracy

  16. The Library UBC LIBRARY CARD APPLICATION FORM

    E-print Network

    Michelson, David G.

    The Library UBC LIBRARY CARD APPLICATION FORM For Faculty Authorized Users UBC FACULTY MEMBER to the following person so that s/he may borrow Library materials and access services in my name for my UBC September 15th , 2014 Faculty member's statement: I understand that this is a separate library card from my

  17. Smart Cards: A Specific Application in the Hospital

    Microsoft Academic Search

    ?nan Güler; R. Murat Zengin; Mustafa Sönmez

    1998-01-01

    Computers have the ability to process and access tremendous amounts of information in our daily lives. But, now, individuals have this ability by carrying a smart card in their own wallets. These cards provide us the versatility, power, and security of computers. This study begins with a short description of smart cards and their advantages. Then, an electronic circuit that

  18. Cooperation Among Competitors: The Economics of Credit Card Associations

    Microsoft Academic Search

    Jean-Charles Rochet; Jean Tirole

    1999-01-01

    The paper analyzes two controversial features of the credit card industry. The first is the cooperative determination of the interchange fee by member banks in credit card associations (Visa and MasterCard). The interchange fee is the ``access charge'' paid by the merchants' banks, the acquirers, to cardholders' banks, the issuers. The second practice is the prohibition for merchants accepting a

  19. Impact of high coronary artery calcification score (CACS) on survival in patients on chronic hemodialysis

    Microsoft Academic Search

    Mitsuteru Matsuoka; Kunitoshi Iseki; Masahiro Tamashiro; Naoko Fujimoto; Nobuyoshi Higa; Takashi Touma; Shuichi Takishita

    2004-01-01

    Background Electron-beam computed tomography (EBCT) is a noninvasive measure of coronary artery calcification and, therefore, could be a marker of developing cardiovascular disease. Whether the coronary artery calcification score (CACS) is a prognostic marker in chronic dialysis patients is not known. Methods In the present study, the mortality rate was observed in relation to the baseline CACS. EBCT was performed

  20. HyperCard--The Poor Librarian's Online Card Catalog.

    ERIC Educational Resources Information Center

    Renjilian, Jerry

    1993-01-01

    Describes the use of HyperCard software as an economical alternative to an online catalog to provide access to works of literary criticism at New Canaan High School (Connecticut). Topics discussed include the search screen display; the use of a scanner to input actual book indexes; and a dictionary of authors. (LRW)

  1. Universitt Erl credit card

    E-print Network

    Fiebig, Peter

    sm of charge to FA ted into the card d: ending machine with card reader o enter building stitutionsUniversität Erl Inform 1. What i The FAUca credit card 2. What c The follow Card fo Electro private Electro Card fo Identifi station third p to FAU 3 Do I ne Only if you introductio may

  2. From Card Catalog to Website

    USGS Multimedia Gallery

    Organization and inventorying of the collection is an ongoing project. The Denver Library is converting card catalog records and inventory documents into a web accessible database in which inventories may be searched by keyword or browsed by scientist. The new website went live for USGS and public u...

  3. Campus Card Tricks.

    ERIC Educational Resources Information Center

    Fickes, Michael

    1999-01-01

    Examines the development of an innovative student identification card system that includes off-campus banking and credit card functions. Finding solutions to bank objections, credit card company rule problems, and software difficulties are discussed. (GR)

  4. Design of a New Kind of Contactless IC Card Reader Middleware

    Microsoft Academic Search

    Ning Zhang; Zhaohui Gao; Hui Chen; Tiejun He

    2008-01-01

    Based on the demand analysis of network operation of rail transit AFC system, a new kind of contactless IC card reader middleware is designed in order to make different non-contact IC card reader equipment compatible with each other, unify the fare calculation and achieve uniform ticket process. The contactless IC card reader middleware includes initialization module, security access module, ticket-card

  5. Cross Layer QoS Support Architecture with Integrated CAC and Scheduling Algorithms for WiMAX BWA Networks

    E-print Network

    Chowdhury, Prasun; Sanyal, Salil K

    2012-01-01

    In this paper, a new technique for cross layer design, based on present Eb/N0 (bit energy per noise density) ratio of the connections and target values of the Quality of Service (QoS) information parameters from MAC layer, is proposed to dynamically select the Modulation and Coding Scheme (MCS) at the PHY layer for WiMAX Broadband Wireless Access (BWA) networks. The QoS information parameter includes New Connection Blocking Probability (NCBP), Hand off Connection Dropping Probability (HCDP) and Connection Outage Probability (COP). In addition, a Signal to Interference plus Noise Ratio (SINR) based Call Admission Control (CAC) algorithm and Queue based Scheduling algorithm are integrated for the cross layer design. An analytical model using the Continuous Time Markov Chain (CTMC) is developed for performance evaluation of the algorithms under various MCS. The effect of Eb/No is observed for QoS information parameters in order to determine its optimum range. Simulation results show that the integrated CAC and p...

  6. CAMPUS SECURITY CARD REQUISITION

    E-print Network

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER card is for my own use. ·It remains the property of SFU. ·It will not be passed on to another person. ·It will be returned to this office ONLY, when no longer of use to myself. ·Lost or Found cards must

  7. Smart card reader

    Microsoft Academic Search

    C. H. Lim; Y. H. Dan; K. T. Lau; K. Y. Choo

    1993-01-01

    A PC-based smart card reader designed and fabricated for cards that conform to the ISO 7816 standard is described. The reader, which is linked to the PC standard parallel port, consists of three modules: the hardware that serves as the physical interface between the smart card and the PC, the software driver interface between the card and the PC, and

  8. Galaxy Trading Cards

    NSDL National Science Digital Library

    1999-01-01

    This collection of nine cards focuses on the three types of galaxies: spiral, elliptical, and irregular. Each card displays a color image of a galaxy on one side and describes the galaxy's type, its location within a constellation, and interesting facts on the other side. The Hubble Space Telescope card includes interesting facts, as well as suggestions for using the cards.

  9. The 19th Century Trade Card

    NSDL National Science Digital Library

    During the 19th century, the ever-popular trade card was a way for American businesses to effectively promote their goods and services. Some examples include a colorful business card depicting freshly caught mackerel in a net (appropriately enough for "Deep Sea Mackerel") and the Charter Oak Lawn Mower, which feature two Victorian women enjoying a leisurely mowing session in a pastoral setting. This online collection was created by Harvard Business School's Baker Library, which happens to have over 8000 of these cards. The online archive contains around 1000 cards which date from the 1870s to the 1890s. Visitors can search this archive via Harvard's Visual Information Access (VIA) union catalog which will allow them to focus in on subjects of particular interest. Finally, visitors can also avail themselves of the site's digital exhibition entitled "A New and Wonderful Invention: The Nineteenth-Century American Trade Card".

  10. Galaxy Trading Cards

    NSDL National Science Digital Library

    This collection of nine trading cards focuses on the three types of galaxies: spiral, elliptical, and irregular. Each card displays a color image of a galaxy on one side and describes the galaxy's type, its location within a constellation, and interesting facts on the other side. The Hubble Space Telescope card includes interesting facts, as well as suggestions for using the cards, such as educational games. The trading cards are available for download in PDF format.

  11. Residence Hall Students Wiscard is your official UW-Madison identification card and you obtain it at the Wiscard Office. It provides access to libraries,

    E-print Network

    Sheridan, Jennifer

    it at the Wiscard Office. It provides access to libraries, recreation facilities, access to your Residence Hall Credit Union checking account Notify the Library System Location: Union South Room 149 1308 W. Dayton St

  12. Smart cards: a specific application in the hospital.

    PubMed

    Güler, I; Zengin, R M; Sönmez, M

    1998-12-01

    Computers have the ability to process and access tremendous amounts of information in our daily lives. But, now, individuals have this ability by carrying a smart card in their own wallets. These cards provide us the versatility, power, and security of computers. This study begins with a short description of smart cards and their advantages. Then, an electronic circuit that is designed for healthcare application in hospitals is introduced. This circuit functions as a smart card holder identifier, access controller for hospital doors and also can be used as a smart card reader/writer. Design steps of this electronic circuit, operation principles, serial communication with P.C., and the software are examined. Finally a complete access control network for hospital doors that functions with smart cards is discussed. PMID:9871875

  13. MCNP6 Fission Multiplicity with FMULT Card

    Microsoft Academic Search

    Trevor Wilcox; Michael Lorne Fensin; John S. Hendricks; Michael R. James; Gregg W. McKinney

    2012-01-01

    With the merger of MCNPX and MCNP5 into MCNP6, MCNP6 now provides all the capabilities of both codes allowing the user to access all the fission multiplicity data sets. Detailed in this paper is: (1) the new FMULT card capabilities for accessing these different data sets; (2) benchmark calculations, as compared to experiment, detailing the results of selecting these separate

  14. Accessibility

    Cancer.gov

    The National Institutes of Health, NIH is making every effort to ensure that the information available on our website is accessible to all. If you use special adaptive equipment to access the Web and encounter problems when using our site, please let

  15. PROCUREMENT CARD PROGRAM POLICY MANUAL

    E-print Network

    de Lijser, Peter

    PROCUREMENT CARD PROGRAM POLICY MANUAL Contracts and Procurement Procurement Card Program July 2013.0 Eligibility.......................................................................... 2 3.0 Procurement Card Program Card Types ........................... 2 4.0 Program Information

  16. Procurement Card (P-Card) User Responsibilities Accounts Payable & Travel

    E-print Network

    Yamamoto, Keith

    Procurement Card (P-Card) User Responsibilities Accounts Payable & Travel Version 4 02/04/14 Page 1 of 1 If you have received approval from your department for a Procurement Card (P-Card), you must use the card responsibly. Know Your Funding Sources · In addition to avoiding violations of P-Card policy

  17. UC SANTA BARBARA POLICY AND PROCEDURE Physical Access Control

    E-print Network

    Bigelow, Stephen

    department and unit heads must establish and maintain controls for the issuance, possession, and storage Center Access Card unit, with one exception. The Police Department may produce access control cards to a lawful order. a. If the access control device is an access card or other electronic device

  18. Hazard Alert Cards

    MedlinePLUS

    ... are here Home » Publications » Materials for Workers Hazard Alert Cards Hazard Alerts are short, image-driven materials that deliver simple, ... by clicking on links below. To order Hazard Alert pocket cards: Email csinyai@cpwr.com or call ...

  19. SAINT CARD APPLICATION NAME ___________________________________________

    E-print Network

    SAINT CARD APPLICATION NAME ___________________________________________ SID __________________ Please establish a Saint Card Account for me. I have read the information as stated on the reverse side://saintcard.siena.edu. _________________________________ ____________ Signature Date Saint Card Office Sarazen Student Union 515 Loudon Road Loudonville, NY 12211 518

  20. Houses of Cards.

    ERIC Educational Resources Information Center

    Cohen, Andrew

    2000-01-01

    Explores how plastic identification cards are key to building security in athletic facilities. Card and identification system technology are addressed as are their benefits and complications. Final comments address security issues that still need consideration even if a card system is used. (GR)

  1. The Trade Card Place

    NSDL National Science Digital Library

    Author and collector Ben Crane maintains The Trade Card Place for "all who are interested in Victorian Trade Cards used to advertise American goods and services during the late 1800s." Although the site is geared toward collectors, hosting dealer, collector, and organization directories for the potential Victorian Trade Card buyer, advertising students may also be interested, as Crane includes articles on trade card history and, in his Victorian Scrapbook archive, has posted thumbnail images of cards on subjects ranging from beverages and clothing to toys and tobacco.

  2. How to Use the new Cisco AnyConnect VPN Client to access the NIH Network. Please ensure the following before using your PIV card

    E-print Network

    Wlodawer, Alexander

    How to Use the new Cisco AnyConnect VPN Client to access the NIH Network. Please ensure with Web browser) This assumes that the necessary PIV Reader software and VPN client have been installed. 3. Launch the Cisco AnyConnect VPN Client. Connecting the VPN client #12;4. If the Connect To box

  3. BUSINESS CARD ORDER FORM $35.00 for 250 Cards

    E-print Network

    Linhardt, Robert J.

    BUSINESS CARD ORDER FORM $35.00 for 250 Cards Instructions: Please indicate how you would like your business card printed in the following format: (EXAMPLES) Your Name Current Degree Candidate Master to receive business cards before Fall Career Fair September 28, 2012 to receive business cards before Fall

  4. Montana State University Purchasing Card Individual Card Application

    E-print Network

    Dyer, Bill

    Montana State University Purchasing Card Individual Card Application Please print clearly _________________________________ _____________ Signature Date AGREEMENT I acknowledge that I have read and understand the Purchasing Card Manual cards. I understand that my use of the University's credit card for personal purposes or by loaning my

  5. Learning to slide a magnetic card through a card reader

    Microsoft Academic Search

    Vladimir Sukhoy; Veselin Georgiev; Todd Wegter; Ramy Sweidan; Alexander Stoytchev

    2012-01-01

    This paper describes a set of experiments in which an upper-torso humanoid robot learned to slide a card through a card reader. The small size and the flexibility of the card presented a number of manipulation challenges for the robot. First, because most of the card is occluded by the card reader and the robot's hand during the sliding process,

  6. Reasoning about Card Tears and Transactions in Java Card

    E-print Network

    Hubbers, Engelbert

    the smartcard from the reader, Java Card provides a notion of transaction to ensure that updates of multiple ­ namely when the card is removed from the reader ­ Java Card offers a transaction mechanism similarReasoning about Card Tears and Transactions in Java Card Engelbert Hubbers and Erik Poll SoS Group

  7. PayFlex Card PayFlex Card

    E-print Network

    your card active Quick tip: If you receive a Request for Documentation letter or you see an alert or an eligible health care product, you simply use your card. If you swipe your card, select "credit." If you document. Can I use the card for online purchases? Yes! You can use your PayFlex Card to buy eligible items

  8. Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings

    Microsoft Academic Search

    Lejla Batina; Jaap-Henk Hoepman; Bart Jacobs; Wojciech Mostowski; Pim Vullers

    2010-01-01

    \\u000a This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation\\u000a on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which\\u000a are stored on the card). These certificates are verified on the reader-side via a bilinear pairing.\\u000a \\u000a \\u000a Java Card smart cards offer only very limited access to the

  9. Analise de Mecanismos de CAC para Redes ATM Michel Ferreira Abdalla

    E-print Network

    Abdalla, Michel Ferreira

    An´alise de Mecanismos de CAC para Redes ATM Michel Ferreira Abdalla Department of Computer Science~ao em redes ATM. Uma classifica¸c~ao destes mecanismos baseada no princ´ipio impl´icito neles utilizado encontrar em redes ATM, estes mecanismos apre- sentam resultados bastante superestimados para a capaci- dade

  10. Breaking with Precedent: Community-Based Development of a CAC Program.

    ERIC Educational Resources Information Center

    Gruba, Paul; Tapper, Joanna

    The Communication across the Curriculum (CAC) program at the University of Melbourne (Australia) was set up in a top-down manner, which was partly driven by outside pressures. Although informed by writing-across-the-curriculum theory and practice, the program reflects the university's original concern about the teaching of communication skills by…

  11. Application of CACS approach for distributed logistic Sami AL-MAQTARI1

    E-print Network

    Paris-Sud XI, Université de

    Application of CACS approach for distributed logistic systems Sami AL-MAQTARI1 , Habib ABDULRAB1 of particular logistic problem. 12 1. INTRODUCTION Simultaneous rapid grow of logistics market in different of logistics information and management systems for coordinated planning and control. Distributed

  12. Formation of Nanofoam carbon and re-emergence of Superconductivity in compressed CaC6

    PubMed Central

    Li, Yan-Ling; Luo, Wei; Chen, Xiao-Jia; Zeng, Zhi; Lin, Hai-Qing; Ahuja, Rajeev

    2013-01-01

    Pressure can tune material's electronic properties and control its quantum state, making some systems present disconnected superconducting region as observed in iron chalcogenides and heavy fermion CeCu2Si2. For CaC6 superconductor (Tc of 11.5?K), applying pressure first Tc increases and then suppresses and the superconductivity of this compound is eventually disappeared at about 18?GPa. Here, we report a theoretical finding of the re-emergence of superconductivity in heavily compressed CaC6. The predicted phase III (space group Pmmn) with formation of carbon nanofoam is found to be stable at wide pressure range with a Tc up to 14.7?K at 78?GPa. Diamond-like carbon structure is adhered to the phase IV (Cmcm) for compressed CaC6 after 126?GPa, which has bad metallic behavior, indicating again departure from superconductivity. Re-emerged superconductivity in compressed CaC6 paves a new way to design new-type superconductor by inserting metal into nanoporous host lattice. PMID:24276612

  13. Formation of Nanofoam carbon and re-emergence of Superconductivity in compressed CaC6

    NASA Astrophysics Data System (ADS)

    Li, Yan-Ling; Luo, Wei; Chen, Xiao-Jia; Zeng, Zhi; Lin, Hai-Qing; Ahuja, Rajeev

    2013-11-01

    Pressure can tune material's electronic properties and control its quantum state, making some systems present disconnected superconducting region as observed in iron chalcogenides and heavy fermion CeCu2Si2. For CaC6 superconductor (Tc of 11.5 K), applying pressure first Tc increases and then suppresses and the superconductivity of this compound is eventually disappeared at about 18 GPa. Here, we report a theoretical finding of the re-emergence of superconductivity in heavily compressed CaC6. The predicted phase III (space group Pmmn) with formation of carbon nanofoam is found to be stable at wide pressure range with a Tc up to 14.7 K at 78 GPa. Diamond-like carbon structure is adhered to the phase IV (Cmcm) for compressed CaC6 after 126 GPa, which has bad metallic behavior, indicating again departure from superconductivity. Re-emerged superconductivity in compressed CaC6 paves a new way to design new-type superconductor by inserting metal into nanoporous host lattice.

  14. to the Arts is now on your TigerCard!

    E-print Network

    Passport to the Arts is now on your TigerCard! Now you can access and redeem your Passport with a University Ticketing representative when purchasing your tickets. * The Passport to the Arts Program enables

  15. Preventing Credit Card Fraud

    Microsoft Academic Search

    Roseanne Bonney

    1 In effect this card gave the user a 55-day interest-free loan of $1,000. The card could be used to obtain goods and services from participating merchants and\\/or cash advances from the issuing bank. Unfortunately it could also be used to defraud these agencies. In the period immediately following their introduction public acceptance of credit cards was less than enthusiastic,

  16. A Credit Card System

    Microsoft Academic Search

    Lawrence Chung; Brian A. Nixon; Eric Yu; John Mylopoulos

    \\u000a In this chapter, credit card systems are studied. We consider an information system for a bank’s credit card operation. A\\u000a body of information on cardholders and merchants is maintained. In this highly competitive market, it is important to provide\\u000a fast response time and accuracy for sales authorizations. To reduce losses due to fraud, lost and stolen cards must be invalidated

  17. 2010 Resource Cards on California Schools

    ERIC Educational Resources Information Center

    EdSource, 2010

    2010-01-01

    With an index, and separate sections that cover related topics, this booklet provides fingertip access to the latest information about California's public education system. The 2010 Resource Cards also include a robust section on community colleges. This booklet contains the following sections: (1) School Finance/Related Laws, which includes…

  18. Web Reimbursement Corporate Card Payments and Credits

    E-print Network

    Web Reimbursement Corporate Card Payments and Credits 7/19/2012 For Harvard Business Use Only Page to the Web Reimbursement responsibility Helpful Hints You can find detailed information about Harvard.travel.harvard.edu/cgi-bin/travel/policies_procedures.php. Navigation/Topics To access the Oracle Main Menu go to http://vpf-web.harvard.edu/applications/, then click

  19. The University of Arizona Purchasing Card Individual Credit Card Application

    E-print Network

    Ziurys, Lucy M.

    Rev. 02/14 The University of Arizona Purchasing Card Individual Credit Card Application New "Restriction/Non-Allowable Purchases" are prohibited. If the card is lost or stolen, the cardholder Individual PCard Application Employee Information Cardholder Name: _________________________________ Net

  20. Identification of Gene Expression Changes from Colitis to CRC in the Mouse CAC Model

    PubMed Central

    Li, Xin; Gao, Yuyan; Yang, Ming; Zhao, Qi; Wang, Guangyu; Yang, Yan mei; Yang, Yue; Liu, Hui; Zhang, Yanqiao

    2014-01-01

    A connection between colorectal carcinogenesis and inflammation is well known, but the underlying molecular mechanisms have not been elucidated. Chemically induced colitis-associated cancer (CAC) is an outstanding mouse model for studying the link between inflammation and cancer. Additionally, the CAC model is used for examining novel diagnostic, prognostic, and predictive markers for use in clinical practice. Here, a CAC model was established in less than 100 days using azoxymethane (AOM) with dextran sulfate sodium salt (DSS) in BALB/c mice. We examined the mRNA expression profiles of three groups: control untreated mice (K), DSS-induced chronic colitis mice (D), and AOM/DSS-induced CAC (AD) mice. We identified 6301 differentially expressed genes (DEGs) among the three groups, including 93 persistently upregulated genes and 139 persistently downregulated genes. Gene Ontology (GO) and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway analyses revealed that the most persistent DEGs were significantly enriched in metabolic or inflammatory components in the tumor microenvironment. Furthermore, several associated DEGs were identified as potential DEGs by protein-protein interaction (PPI) network analysis. We selected 14 key genes from the DEGs and potential DEGs for further quantitative real-time PCR (qPCR) verification. Six persistently upregulated, 3 persistently downregulated DEGs, and the other 3 genes showed results consistent with the microarray data. We demonstrated the regulation of 12 key genes specifically involved in Wnt signaling, cytokine and cytokine receptor interactions, homeostasis, and tumor-associated metabolism during colitis-associated CRC. Our results suggest that a close relationship between metabolic and inflammatory mediators of the tumor microenvironment is present in CAC. PMID:24743346

  1. Design and Implementation of Encrypted Card Reader

    Microsoft Academic Search

    Kyi Kyi Khaing

    2009-01-01

    The memory cards are widely used in several applications. This paper is intended to design and construct of the encrypted card reader. The basic building block in this design is the card reader, amplifier, multiplexer, and PC parallel port. This card can be used in license, passport, credit card, ID card, bank card, health care, travel and entertainment cards and

  2. Planet Quest Observing Cards

    NSDL National Science Digital Library

    The PlanetQuest Observing Cards are designed to give telescope operators and other interpreters a new way of explaining the night sky. Relating common observing objects to our search for exoplanets makes these spectacular sights more understandable. These cards are a great resource for use at observing night events, providing new stories to tell about commonly viewed celestial objects.

  3. Monumental Court Cards

    ERIC Educational Resources Information Center

    Long, Caroline

    2010-01-01

    Card playing is a popular pastime in many cultures, including games like bridge, gin rummy, and 52-pickup. In this article, the author describes an art project inspired by the unique designs on the face cards and the intricate art of the overall design. (Contains 1 online resource.)

  4. Historical Bird Migration Card

    USGS Multimedia Gallery

    Image scan of a historical bird migration card (1904). This is just an example of the more than 6 million handwritten cards stored in government files, in the North American Bird Phenology Progam, with more than a century of information about bird migration, a veritable treasure trove for climate-ch...

  5. Bird Migration Card - 1939

    USGS Multimedia Gallery

    Image scan of a historical bird migration card. This is just an example of the more than 6 million handwritten cards stored in government files, in the North American Bird Phenology Progam, with more than a century of information about bird migration, a veritable treasure trove for climate-change re...

  6. Bird Migration Card - 1937

    USGS Multimedia Gallery

    Image scan of a historical bird migration card. This is just an example of the more than 6 million handwritten cards stored in government files, in the North American Bird Phenology Progam, with more than a century of information about bird migration, a veritable treasure trove for climate-change re...

  7. Bird Migration Card - 1933

    USGS Multimedia Gallery

    Image scan of a historical bird migration card. This is just an example of the more than 6 million handwritten cards stored in government files, in the North American Bird Phenology Progam, with more than a century of information about bird migration, a veritable treasure trove for climate-change re...

  8. Bird Migration Card - 1922

    USGS Multimedia Gallery

    Image scan of a historical bird migration card. This is just an example of the more than 6 million handwritten cards stored in government files, in the North American Bird Phenology Progam, with more than a century of information about bird migration, a veritable treasure trove for climate-change re...

  9. Bird Migration Card - 1921

    USGS Multimedia Gallery

    Image scan of a historical bird migration card. This is just an example of the more than 6 million handwritten cards stored in government files, in the North American Bird Phenology Progam, with more than a century of information about bird migration, a veritable treasure trove for climate-change re...

  10. Protecting against Credit Card Forgery with Existing Magnetic Card Readers

    E-print Network

    Kuzmanovic, Aleksandar

    Protecting against Credit Card Forgery with Existing Magnetic Card Readers Yinzhi Cao, Xiang Pan, and Yan Chen Northwestern University Technical Report March 2013 Abstract--Existing magnetic cards adopt plain text to store confidential information, thus being vulnerable to an untrusted credit card reader

  11. COMMERCIAL FUEL CARDS RULES & RESPONSIBILITIES: Vehicle Specific Cards

    E-print Network

    Yang, Zong-Liang

    COMMERCIAL FUEL CARDS ­ RULES & RESPONSIBILITIES: Vehicle Specific Cards A card issued rented by that department. Restrictions · Commercial fuel cards can only be used for fuel and vehicle Services (number of transactions/day, dollars/month, fuel only, etc.) Departmental Responsibilities

  12. An original Social Security card A replacement Social Security card

    E-print Network

    . PROTECT YOUR SOCIAL SECURITY NUMBER AND CARD Protect your SSN card and number from loss and identity theft, identity, and U.S. citizenship or current lawful, work-authorized immigration status. If you are not a U;REPLACEMENT CARD: To apply for a replacement card, you must prove your identity (See IDENTITY, Page 3). If you

  13. Corrosion of aluminium metal in OPC- and CAC-based cement matrices

    SciTech Connect

    Kinoshita, Hajime, E-mail: h.kinoshita@sheffield.ac.uk [Department of Materials Science and Engineering, The University of Sheffield, Mappin Street, Sheffield, S1 3JD (United Kingdom)] [Department of Materials Science and Engineering, The University of Sheffield, Mappin Street, Sheffield, S1 3JD (United Kingdom); Swift, Paul; Utton, Claire [Department of Materials Science and Engineering, The University of Sheffield, Mappin Street, Sheffield, S1 3JD (United Kingdom)] [Department of Materials Science and Engineering, The University of Sheffield, Mappin Street, Sheffield, S1 3JD (United Kingdom); Carro-Mateo, Beatriz [The Public University of Navarra, C/Esquíroz, 30 trasera, Pamplona 31007 (Spain)] [The Public University of Navarra, C/Esquíroz, 30 trasera, Pamplona 31007 (Spain); Marchand, Geraldine [The National Institute of Applied Sciences (INSA) Lyon, 20 Avenue Albert Einstein 69621 Villeurbanne Cedex (France)] [The National Institute of Applied Sciences (INSA) Lyon, 20 Avenue Albert Einstein 69621 Villeurbanne Cedex (France); Collier, Nick [National Nuclear Laboratory, Chadwick House, Birchwood Park, Warrington, WA3 6AE (United Kingdom)] [National Nuclear Laboratory, Chadwick House, Birchwood Park, Warrington, WA3 6AE (United Kingdom); Milestone, Neil [Industrial Research Ltd., 69 Gracefield Road, Lower Hutt, 5040 (New Zealand)] [Industrial Research Ltd., 69 Gracefield Road, Lower Hutt, 5040 (New Zealand)

    2013-08-15

    Corrosion of aluminium metal in ordinary Portland cement (OPC) based pastes produces hydrogen gas and expansive reaction products causing problems for the encapsulation of aluminium containing nuclear wastes. Although corrosion of aluminium in cements has been long known, the extent of aluminium corrosion in the cement matrices and effects of such reaction on the cement phases are not well established. The present study investigates the corrosion reaction of aluminium in OPC, OPC-blast furnace slag (BFS) and calcium aluminate cement (CAC) based systems. The total amount of aluminium able to corrode in an OPC and 4:1 BFS:OPC system was determined, and the correlation between the amount of calcium hydroxide in the system and the reaction of aluminium obtained. It was also shown that a CAC-based system could offer a potential matrix to incorporate aluminium metal with a further reduction of pH by introduction of phosphate, producing a calcium phosphate cement.

  14. Kinetic Study on Desulfurization of Hot Metal Using CaO and CaC2

    NASA Astrophysics Data System (ADS)

    Lindström, David; Sichen, Du

    2015-02-01

    The kinetics and reaction mechanisms of hot metal desulfurization using CaO and CaC2 were studied in a well-controlled atmosphere with a lab scale high temperature furnace. The growths of CaS around CaO and CaC2 were measured and compared at 1773 K (1500 °C). The parabolic rate constant was evaluated to be 5 × 10-7 (cm s-1) on CaO particles, and 2.4 × 10-7 (cm s-1) on CaC2. The bigger parabolic constant of CaO resulted in more efficient desulfurization. Agglomerates and big CaO particles led to 2CaO·SiO2 formation which hindered further utilization of CaO for desulfurization. The 2CaO·SiO2 formation was favoured by a high oxygen potential. Since the desulfurization reaction of CaO not only produced CaS but also oxygen, the local oxygen concentration around big CaO particles was higher than around small particles.

  15. Secure smart card reader design

    Microsoft Academic Search

    Rafael Martínez-Peláez; Francisco Rico-Novella; Cristina Satizábal

    2008-01-01

    A problem with transaction system which requires an open network to carry out operations using a smart card is that the user does not know which information signs with his smart card. In addition, users do not have any proof about the smart card reader authenticity. Architecture of a trustworthy smart card reader to guarantee the correct operations of the

  16. Report Cards and Nursing Homes

    ERIC Educational Resources Information Center

    Castle, Nicholas G.; Lowe, Timothy J.

    2005-01-01

    Purpose: We first describe which states have produced nursing home report cards; second, we compare what information is provided in these report cards; third, we identify data sources used to produce the report cards; and, finally, we examine seven factors previously shown to be associated with the usefulness of report-card information and provide…

  17. NURE rabbit and card reader

    Microsoft Academic Search

    Bourret

    1977-01-01

    The NURE Rabbit and IBM Card Reader is a LSI-11 based microcomputer system. The purpose of the rabbit and card reader is to read the drilled code (ID) on the polyethylene rabbit, read the punched data on the traveler card, and then store the code (ID) and the card data together as a record in a file on a floppy

  18. A gigabit ethernet link source card.

    SciTech Connect

    Blair, R. E.; Dawson, J. W.; Drake, G.; Haberichter, W. N.; Schlereth, J. L.

    2002-09-18

    A Link Source Card (LSC) has been developed which employs Gigabit Ethernet as the physical medium. The LSC is implemented as a mezzanine card compliant with the S-Link specifications, and is intended for use in development of the Region of Interest Building (ROIB) in the Level 2 Trigger of ATLAS. The LSC will be used to bring Region of Internet Fragments from Level 1 Trigger elements to the ROIB, and to transfer compiled Region of Interest Records to Supervisor Processors. The card uses the LSI 8101/8104 Media Access Controller (MAC) [1] and the Agilent HDMP-1636 Transceiver. An Altera 10K50A FPGA [2] is configured to provide several state machines which perform all the tasks on the card, such as formulating the Ethernet header, read/write registers in the MAC, etc. An on-card static RAM provides storage for 512K S-Link words, and a FIFO provides 4K buffering of input S-Link words. The LSC has been tested in a setup where it transfers data to a NIC in the PCI bus of a PC.

  19. Dynamic Virtual Credit Card Numbers

    NASA Astrophysics Data System (ADS)

    Molloy, Ian; Li, Jiangtao; Li, Ninghui

    Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.

  20. Comparing Fractions War Card Game

    NSDL National Science Digital Library

    2012-10-22

    In this math activity, learners practice comparing fractions. Learners use special cards (included in PDF) to play a card game similar to "War." Players each flip over a card and compare them to see who has the greater fraction. The person with the greater fraction collects that card pair. The object of the game is to collect the most card pairs by the end of the game.

  1. Credit Card Quiz.

    ERIC Educational Resources Information Center

    Marks, Jeff

    2000-01-01

    Describes an activity in which students design credit cards and discover for themselves the mathematical realities of buying on credit. Employs multiple-intelligence theory to increase the chance that all students will be reached. (YDS)

  2. Pentagon Credit Card Audit

    NSDL National Science Digital Library

    Koplow, Travis.

    2001-01-01

    The Code Red worm and base closings are not the only things the Pentagon has to worry about lately. The General Accounting Office (GAO) has agreed to perform a department-wide audit, including an investigation of abuse of the Pentagon's 1.8 million credit cards. At the request of Senator Charles Grassley (R-Iowa), the GAO began its investigation by looking into potential purchase card abuse on two San Diego Naval bases. They found "a weak overall internal control environment, flawed or nonexistent policies and procedures, and a lack of adherence to valid policies and procedures." The Pentagon has defended its purchase card program, claiming misuse of the cards is significantly below the commercial benchmark and that the savings on paperwork cover the cost of any fraud. Nonetheless, in its initial investigations, the GAO found little control over the $68 million dollars of purchases made last year at the two San Diego bases.

  3. Credit Card Analysis

    NSDL National Science Digital Library

    Stuart Boersma

    In this example, students are asked to obtain a credit card disclosure statement, identify the various interest rates and payment rules, and keep track of a revolving monthly balance under several payment scenarios. While modeling several months to a year of credit card statements is easily accomplished with pencil, paper, and a basic calculator, this example is also well-suited for analysis with a spreadsheet.

  4. Math Vocabulary Cards

    NSDL National Science Digital Library

    Clarity Innovations

    2014-01-01

    These math vocabulary cards are available as both an iOS app and as a web app. Each card features three sections: a math term, a representative example or model, and a concise definition. The user can choose which of the three they want to be visible and which they would like students to identify. The teacher can choose which vocabulary terms the students will view based on grade, math topic, and even specific word selection from the given list.

  5. Wirelessly Pickpocketing a Mifare Classic Card Flavio D. Garcia Peter van Rossum Roel Verdult Ronny Wichers Schreur

    E-print Network

    Garcia, Flavio D.

    by an adversary having only wireless access to just a card (and not to a legitimate reader). The most seriousWirelessly Pickpocketing a Mifare Classic Card Flavio D. Garcia Peter van Rossum Roel Verdult Ronny. The most serious of them retrieves a secret key in under a second. In order to clone a card, previously

  6. Médicarte software developed for the Quebec microprocessor health card project.

    PubMed

    Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P

    1995-01-01

    The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the software was developed for each of the four groups of health care providers involved. In addition we designed an application to interface with existing pharmaceutical software. For practical reasons and to make it possible to differentiate between the different access profiles, the information stored on the card is divided in several blocks: Identification, Emergency, History (personal and family), Screening Tests, Vaccinations, Drug Profile, General follow-up, and some Specific follow-ups (Pregnancy, Ophthalmology, Kidney failure, Cardiology, Pediatrics, Diabetes, Pneumology, Specific parameters). Over 14,000 diagnoses and symptoms are classified with four levels of precision, the codification being based on the ICPC (International Classification for Primary Care). The software contains different applications to assist the clinician in decision making. A "Drug Advisor" helps the prescriber by detecting possible interactions between drugs, giving indications (doses) and contraindications, cautions, potential side-effects and therapeutic alternatives. There is also a prevention module providing recommendations for vaccination and periodic examinations based on the patient's age and sex. The pharmaceutical, vaccination, and screening tests data banks are updated every six months. These sections of the software are accessible to access card holders at any times, even without a patient card, and constitute in themselves an interesting clinical tool. We developed a software server (SCAM) allowing the different applications to access the data in a memory card regardless of the type of memory card used. Using a single high level command language, this server provides a standardized utilization of memory cards from various manufacturers. It ensures the compatibility of the applications using the card as a storage medium. (abstract truncated) PMID:8591532

  7. Enhancing SESAMEV4 with Smart Cards

    Microsoft Academic Search

    Mark Looi; Paul Ashley; Loo Tang Seet; Richard Au; Gary Gaskell; Mark Vandenwauver

    1998-01-01

    \\u000a SESAMEV4 is a security architecture that supports role based access control with single sign-on facilities for heterogenous\\u000a distributed network environments. Several vulnerabilities are identified in SESAMEV4’s user authentication process. This paper\\u000a proposes four options for enhancing this user authentication process by integrating smart cards into SESAMEV4. The proposals\\u000a are shown to successfully increase the level of security of SESAMEV4 and

  8. Weyl Card Diagrams

    E-print Network

    Gregory C. Jones; John E. Wang

    2005-06-02

    To capture important physical properties of a spacetime we construct a new diagram, the card diagram, which accurately draws generalized Weyl spacetimes in arbitrary dimensions by encoding their global spacetime structure, singularities, horizons, and some aspects of causal structure including null infinity. Card diagrams draw only non-trivial directions providing a clearer picture of the geometric features of spacetimes as compared to Penrose diagrams, and can change continuously as a function of the geometric parameters. One of our main results is to describe how Weyl rods are traversable horizons and the entirety of the spacetime can be mapped out. We review Weyl techniques and as examples we systematically discuss properties of a variety of solutions including Kerr-Newman black holes, black rings, expanding bubbles, and recent spacelike-brane solutions. Families of solutions will share qualitatively similar cards. In addition we show how card diagrams not only capture information about a geometry but also its analytic continuations by providing a geometric picture of analytic continuation. Weyl techniques are generalized to higher dimensional charged solutions and applied to generate perturbations of bubble and S-brane solutions by Israel-Khan rods. This paper is a condensed and simplified presentation of the card diagrams in hep-th/0409070.

  9. 20. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., PELLON LAND WORKS, HALIFAX, ENGLAND, SN #M2983 14 (EST. DATE 1940'S+), OPPOSITE END - Bamberg Cotton Mill, Main Street, Bamberg, Bamberg County, SC

  10. 19. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., PELLON LAND WORKS, HALIFAX, ENGLAND, SN #M2983 14 (EST. DATE 1940'S+). - Bamberg Cotton Mill, Main Street, Bamberg, Bamberg County, SC

  11. cAC10-vcMMAE, an anti-CD30-monomethyl auristatin E conjugate with potent and selective antitumor activity

    Microsoft Academic Search

    Joseph A. Francisco; Charles G. Cerveny; Damon L. Meyer; Bruce J. Mixan; Kerry Klussman; Dana F. Chace; Starr X. Rejniak; Kristine A. Gordon; Ron DeBlanc; Brian E. Toki; Che-Leung Law; Svetlana O. Doronina; Clay B. Siegall; Peter D. Senter; Alan F. Wahl

    2003-01-01

    The chimeric monoclonal antibody cAC10, directed against CD30, induces growth arrest of CD30 cell lines in vitro and has pronounced antitumor activity in severe combined immunodeficiency (SCID) mouse xenograft models of Hodgkin dis- ease. We have significantly enhanced these activities by conjugating to cAC10 the cytotoxic agent monomethyl aurista- tin E (MMAE) to create the antibody-drug conjugate cAC10-vcMMAE. MMAE, a

  12. Time card entry system

    SciTech Connect

    Montierth, B.S.

    1996-05-01

    The Time Card Entry System was developed to interface with the DOE Headquarters Electronic Time and Attendance (ETA) system. It features pop-up window pick lists for Work Breakdown Structure Numbers and Hour Codes and has extensive processing that ensures that time and attendance reported by the employee fulfills US Government/OMB requirements before Timekeepers process the data at the end of the two week payroll cycle using ETA. Tours of Duty (e.g. ten hour day, four day week with Friday through Sunday off), established in the ETA system, are imported into the Time Card Entry System by the Timekeepers. An individual`s Tour of Duty establishes the basis for validation of time of day and number of hours worked per day. At the end of the two week cycle, data is exported by the Timekeepers from the Time Card Entry System into ETA data files.

  13. Master Card Visa American Express Discover Card # Expires

    E-print Network

    Ferrara, Katherine W.

    AWARD GIFT Master Card Visa American Express Discover Card # Expires Name on Card Authorized/We wish to remain anonymous Make Checks Payable to: UC Regents Please write "UC Davis Dream Award 433 Mrak Hall, One Shields Ave., University of California, Davis, CA 95616 DREAM AWARD THANK samcc

  14. PayFlex Card PayFlex Card

    E-print Network

    Johnson, Peter D.

    an alert on your account, we need more information on a card purchase. You should respond promptly to keep to the beginning of the plan year. Replace lost or stolen cards Quick tip: Contact Customer Service as soon card, select "credit." If you have enough funds, the amount will automatically deduct from your account

  15. Targeted deletion of Kif18a protects from colitis-associated colorectal (CAC) tumors in mice through impairing Akt phosphorylation

    SciTech Connect

    Zhu, Houbao [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China)] [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China); Xu, Wangyang [Department of Clinical Laboratories, Ninth People’s Hospital, SJTUSM, Shanghai 200011 (China)] [Department of Clinical Laboratories, Ninth People’s Hospital, SJTUSM, Shanghai 200011 (China); Zhang, Hongxin [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China)] [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China); Liu, Jianbing [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China) [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China); Shanghai Research Center for Model Organisms, Shanghai 201203 (China); Xu, Haimin [Department of Pathology, Rui-Jin Hospital, SJTUSM, Shanghai 200025 (China)] [Department of Pathology, Rui-Jin Hospital, SJTUSM, Shanghai 200025 (China); Lu, Shunyuan; Dang, Suying [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China)] [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China); Kuang, Ying [Shanghai Research Center for Model Organisms, Shanghai 201203 (China)] [Shanghai Research Center for Model Organisms, Shanghai 201203 (China); Jin, Xiaolong [Department of Pathology, Rui-Jin Hospital, SJTUSM, Shanghai 200025 (China)] [Department of Pathology, Rui-Jin Hospital, SJTUSM, Shanghai 200025 (China); Wang, Zhugang, E-mail: zhugangw@shsmu.edu.cn [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China) [State Key Laboratory of Medical Genomics, Research Center for Experimental Medicine, Rui-Jin Hospital and Department of Medical Genetics, E-Institutes of Shanghai Universities, Shanghai Jiao Tong University School of Medicine (SJTUSM), Shanghai 200025 (China); Shanghai Research Center for Model Organisms, Shanghai 201203 (China)

    2013-08-16

    Highlights: •Kif18A is up-regulated in CAC of mouse model. •Kif18a{sup ?/?} mice are protected from CAC. •Tumor cells from Kif18a{sup ?/?} mice undergo more apoptosis. •Kif18A deficiency induces poor Atk phosphorylation. -- Abstract: Kinesins are a superfamily of molecular motors involved in cell division or intracellular transport. They are becoming important targets for chemotherapeutic intervention of cancer due to their crucial role in mitosis. Here, we demonstrate that the kinesin-8 Kif18a is overexpressed in murine CAC and is a crucial promoter during early CAC carcinogenesis. Kif18a-deficient mice are evidently protected from AOM–DSS-induced colon carcinogenesis. Kif18A is responsible for proliferation of colonic tumor cells, while Kif18a ablation in mice promotes cell apoptosis. Mechanistically, Kif18a is responsible for induction of Akt phosphorylation, which is known to be associated with cell survival regulation. In conclusion, Kif18a is critical for colorectal carcinogenesis in the setting of inflammation by mechanisms of increased PI3K-AKT signaling. Inhibition of Kif18A activity may be useful in the prevention or chemotherapeutic intervention of CAC.

  16. The Crib Card Examination System.

    ERIC Educational Resources Information Center

    Trigwell, Keith

    1987-01-01

    Preliminary findings concerning crib card examinations, in which students bring their own notes for use during testing, show that while crib card test results were similar to those from traditional examinations, students' anxiety was reduced, and testing time was saved, claims that the cards may enhance learning were not substantiated. (MSE)

  17. Interactive Multitask Credit Card Technology

    Microsoft Academic Search

    Marc Rippen; Harry Braunstein; Craig Nelson; Carl Schuck; P. Guillaud; P. Blott

    2007-01-01

    The convergence of several technologies has allowed the electronics industry to introduce the next generation of interactive multi-tasking financial transaction cards, with embedded power and processing capabilities. The credit card started as a magnetized data plate carrying the owners name, the account number, and the store(s) where it could be used. Several generations of credit cards have come and gone

  18. PURCHASING CARD (PCARD) FINANCIAL POLICY

    E-print Network

    PURCHASING CARD (PCARD) FINANCIAL POLICY Updated November 25, 2013 Issued by: Procurement Services Approved by: Director of Finance Purpose The St. Francis Xavier University Purchasing Card (PCard) program goods and services. Policy It is University Policy to use Purchasing Cards to facilitate the purchase

  19. Philco High Speed Card Reader

    Microsoft Academic Search

    N. Emslie

    1961-01-01

    This paper describes the mechanical and electrical design and operating characteristics of a high speed tabulating card reader. This unit, a prime input device to the Philco 2000 Computer System, handles, and reads and checks cards at a peak rate of 38 full size tabulating cards per second. Design problem solutions in the picking and stacking area which make novel

  20. Credit card fraud detection system

    Microsoft Academic Search

    V. Filippov; L. Mukhanov; B. Shchukin

    2008-01-01

    The use of credit cards is prevalent in modern day society. But it is obvious that the number of credit card fraud cases is constantly increasing in spite of the chip cards worldwide integration and existing protection systems. This is why the problem of fraud detection is very important now. In this paper the general description of the developed fraud

  1. Store Security. Credit Card Fraud.

    ERIC Educational Resources Information Center

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  2. Credit Cards: Facts and Theories

    Microsoft Academic Search

    Carol C. Bertaut; Michael Haliassos

    2006-01-01

    We use data from several waves of the Survey of Consumer Finances to document credit and debit card ownership and use across US demographic groups. We then present recent theoretical and empirical contributions to the study of credit and debit card behavior. Utilization rates of credit lines and portfolios of card holders present several puzzles. Credit line increases initiated by

  3. Card Sorts to Acquire Requirements

    Microsoft Academic Search

    Neil A. M. Maiden

    2009-01-01

    This paper deals with a requirement acquisition techniques card sorts. One reason is that requirements projects are often constrained by software solutions such as components, off-the-shelf packages, and application features. More and more projects need to acquire requirements to select between available solutions. This is where card sorts come in. During a card sort, one or more stakeholders work with

  4. Mutual interdependence of MSI1 (CAC3) and YAK1 in Saccharomyces cerevisiae.

    PubMed

    Pratt, Zachary L; Drehman, Bethany J; Miller, Mary E; Johnston, Stephen D

    2007-04-20

    The MSI1 (CAC3) gene of Saccharomyces cerevisiae has been implicated in diverse cellular functions, including suppression of the RAS/cAMP/protein kinase A signaling pathway, chromatin assembly and transcriptional co-repression. Seeking to identify the molecular mechanisms by which Msi1p carries out these distinct activities, a novel genetic interaction was uncovered with YAK1, which encodes a kinase that antagonizes the RAS/cAMP pathway. MSI1 was capable of efficiently suppressing the heat shock sensitivity caused by deletion of yak1. Surprisingly, the YAK1 gene is required for Msi1p to associate with Cac1p in the yeast two-hybrid system. A new activity of Msi1p was identified: the ability to activate transcription of a reporter gene when tethered near the promoter, but only in the absence of fermentable carbon sources. This transcriptional activation function was diminished substantially by the loss of YAK1. Furthermore, MSI1 influences YAK1 function; over-expression of YAK1 decreased the growth rate, but only in the presence of a functional MSI1 gene. Finally, it is shown that YAK1 antagonizes nuclear accumulation of Msi1p in non-fermenting cells. Taken together, these data demonstrate a novel interaction between Msi1p and Yak1p in which each protein influences the activity of the other. PMID:17321547

  5. Study of currently available commercial and apartment building energy conservation audits: Commercial and Apartment Conservation Service (CACS) program

    SciTech Connect

    Kamp, G.; Patel, K.; Carlisle, N.

    1983-09-01

    The results of a study conducted to identify and analyze currently available commercial and apartment building energy conservation audits is summarized. The results of this study were used to develop the energy conservation audit requirements that will be incorporated in the Commercial and Apartment Conservation Service (CACS) Program. The CACS Program is designed to make low or no cost utility conducted energy conservation audits available for small commercial and apartment buildings. In total 50 state energy agencies, 52 utilities, and 201 private sector (non-utility) organizations were contacted for information. The status of utility and private sector audit services for these building types is summarized and recommendations for CACS program audits are presented.

  6. A Ration Card

    E-print Network

    Ben [writer of accompanying material; Lizzie [writer of accompanying material

    2012-03-05

    TRANSCRIPTION; MESSAGE: Waterloo; Oct. 31st/ 1918; Dear Willy; How do you like this for a ration card, we have had fine weather all the time, hope you are better. Lizzie [and] Ben; SENT TO: J. W. Caraluther/"The grange"/Gawthorpe green/Kirkheaton/Huddersfield...

  7. Weyl card diagrams

    SciTech Connect

    Jones, Gregory [Department of Physics, Harvard University, Cambridge, Massachusetts 02138 (United States); Wang, John E. [Department of Physics, Harvard University, Cambridge, Massachusetts 02138 (United States); Department of Physics, National Taiwan University, Taipei 106, Taiwan (China); National Center for Theoretical Sciences, Taiwan, National Taiwan University, Taipei 10617, Taiwan (China)

    2005-06-15

    To capture important physical properties of a spacetime we construct a new diagram, the card diagram, which accurately draws generalized Weyl spacetimes in arbitrary dimensions by encoding their global spacetime structure, singularities, horizons, and some aspects of causal structure including null infinity. Card diagrams draw only nontrivial directions providing a clearer picture of the geometric features of spacetimes as compared to Penrose diagrams, and can change continuously as a function of the geometric parameters. One of our main results is to describe how Weyl rods are traversable horizons and the entirety of the spacetime can be mapped out. We review Weyl techniques and as examples we systematically discuss properties of a variety of solutions including Kerr-Newman black holes, black rings, expanding bubbles, and recent spacelike-brane solutions. Families of solutions will share qualitatively similar cards. In addition we show how card diagrams not only capture information about a geometry but also its analytic continuations by providing a geometric picture of analytic continuation. Weyl techniques are generalized to higher dimensional charged solutions and applied to generate perturbations of bubble and S-brane solutions by Israel-Khan rods.

  8. The Eggen Card Project

    NASA Astrophysics Data System (ADS)

    Silvis, G.

    2014-06-01

    (Abstract only) Olin Eggen, noted astronomer (1919-1998), left to us all his raw observation records recorded on 3x5 cards. This project is to make all this data available as an online resource. History and progress of the project will be presented. Project details available at: https://sites.google.com/site/eggencards/home.

  9. Greeting Card Boxes

    NSDL National Science Digital Library

    Pat Murphy

    2001-01-01

    In this activity, learners make cool boxes out of old (or new) greeting cards or postcards. Before making the recycled boxes, learners can practice making boxes from grid paper while learning about area and volume. The lesson guide contains detailed tips for leaders including background information about the math concepts related to this activity.

  10. Design and implementation of a smart card based healthcare information system.

    PubMed

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns. PMID:16356586

  11. Business Card Microgrant Here are the guidelines to applying for business cards

    E-print Network

    Business Card Microgrant Here are the guidelines to applying for business cards: You may apply to order 1 set of business cards (500 cards) per degree. The business cards come in only one standard the order is placed, the cards will arrive in approximately 7 ­ 10 days. For Galveston students, the cards

  12. CDC28 phosphorylates Cac1p and regulates the association of chromatin assembly factor I with chromatin.

    PubMed

    Jeffery, Daniel C B; Kakusho, Naoko; You, Zhiying; Gharib, Marlene; Wyse, Brandon; Drury, Erin; Weinreich, Michael; Thibault, Pierre; Verreault, Alain; Masai, Hisao; Yankulov, Krassimir

    2015-01-01

    Chromatin Assembly Factor I (CAF-I) plays a key role in the replication-coupled assembly of nucleosomes. It is expected that its function is linked to the regulation of the cell cycle, but little detail is available. Current models suggest that CAF-I is recruited to replication forks and to chromatin via an interaction between its Cac1p subunit and the replication sliding clamp, PCNA, and that this interaction is stimulated by the kinase CDC7. Here we show that another kinase, CDC28, phosphorylates Cac1p on serines 94 and 515 in early S phase and regulates its association with chromatin, but not its association with PCNA. Mutations in the Cac1p-phosphorylation sites of CDC28 but not of CDC7 substantially reduce the in vivo phosphorylation of Cac1p. However, mutations in the putative CDC7 target sites on Cac1p reduce its stability. The association of CAF-I with chromatin is impaired in a cdc28-1 mutant and to a lesser extent in a cdc7-1 mutant. In addition, mutations in the Cac1p-phosphorylation sites by both CDC28 and CDC7 reduce gene silencing at the telomeres. We propose that this phosphorylation represents a regulatory step in the recruitment of CAF-I to chromatin in early S phase that is distinct from the association of CAF-I with PCNA. Hence, we implicate CDC28 in the regulation of chromatin reassembly during DNA replication. These findings provide novel mechanistic insights on the links between cell-cycle regulation, DNA replication and chromatin reassembly. PMID:25602519

  13. Smart card multiple function badge

    SciTech Connect

    Nelson, R.A.

    1993-06-01

    Smart cards are credit card-sized computers with integrated data storage, an operating system to manage the data, and built-in security features that protect the data. They are used to distribute information to remote sites, providing the same or greater reliability, data integrity, and information security than a network system. However, smart cards may provide greater functionality at a lower cost than network systems. The US Department of Energy Hanford Site is developing the smart card to be used as a multiple function identification badge that will service various data management requirements on the Site. This paper discusses smart card technology and the proposed Hanford Site applications.

  14. Credit Card Solicitation Policies in Higher Education: Does "Protecting" Our Students Make a Difference?

    ERIC Educational Resources Information Center

    Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd S.

    2001-01-01

    Reports on a study that investigated the effect of a university's solicitation policy on students' acquisition and usage of credit cards. Attempts by universities to limit access to and use of credit cards appear to be ineffective. Suggests alternative policies be constructed around teaching students sound money management skills. (Author/JDM)

  15. Access Nets: Modeling Access to Physical Robert Frohardt, Bor-Yuh Evan Chang, and Sriram Sankaranarayanan

    E-print Network

    Chang, Bor-Yuh Evan

    using, for example, radio- frequency identification (RFID) cards, enable great flexibility in specifying technologies such as radio-frequency identification (RFID) cards. The use of computerized access control in these systems is on the rise, as they enable highly flexible policies. Computerized access control policies

  16. Procurement Card Policy Last Revised: May 13, 2013

    E-print Network

    Palmeri, Thomas

    Procurement Card Policy Last Revised: May 13, 2013 - 1 - Procurement Card Policy Tableof .................................................................................................................... 4 CARDHOLDER AND CARD MANAGER RESPONSIBILITIES .............................................................................................................. 4 AUTHORIZED CARD USE

  17. FERMI Race Card Game (formerly the GLAST Race Card Game)

    NSDL National Science Digital Library

    2009-01-01

    This card game is based on the Fermi mission. Players compete to be the first to build the Fermi satellite and use it to observe five astronomical targets. Eighty-six custom-designed cards contain information on the various Fermi components, science and education teams, and astronomical objects. In Stage I, the players build their satellite by collecting component and "experience points" cards, and in Stage II they collect astronomical target cards. There are also offensive cards used to slow an opponent's progress and defensive cards to counter the "attacks." The game teaches players about the components of a satellite, the roles of individuals working on a satellite mission (including educators), and the obstacles that can occur in their construction.

  18. Isotropic and anisotropic description of superconducting state in CaC6 compound

    NASA Astrophysics Data System (ADS)

    Szcz??niak, R.; Drzazga, E. A.; Szcz??niak, D.

    2015-02-01

    The thermodynamic parameters of the superconducting state in CaC6 have been determined in the framework of the isotropic and anisotropic Eliashberg formalism. The obtained results determine the anisotropy effect on the values of the thermodynamic functions. In particular, it has been found that the anisotropy of the electron-phonon coupling constant and the Coulomb pseudopotential significantly affects the order parameter and the wave function renormalization factor, which determines the electron effective mass. These results mean that anisotropy should be also visible in the total normalized density of states. In the case of the thermodynamic critical field, anisotropy lowers its value in the low-temperature area. On the other hand, it does not affect the specific heat jump at the critical temperature.

  19. Global Warming Wheel Card

    NSDL National Science Digital Library

    US Environmental Protection Agency (EPA)

    In this activity, students construct a Global Warming Wheel Card, a hand-held tool that they can use to estimate their household's emissions of carbon dioxide and learn how they can reduce them. One side of the wheel illustrates how much carbon dioxide a household contributes to the atmosphere per year through activities such as driving a car, using energy in the home, and disposing of waste. The other side shows how changes in behavior can reduce personal emissions.

  20. Solar System Trading Cards

    NSDL National Science Digital Library

    Alex Storr

    2007-12-12

    The students will collect solar system trading cards by playing an interactive card game. They will identify the sun, planets, comets, and asteroids by answering questions about them. By playing the game, students will gain knowledge about the solar system and they will view pictures taken by the Hubble Space Telescope and other NASA missions. Students will view an image accompanied by a question with three responses. By using the computer mouse, they will chose an answer. When the response is correct, additional information about the image is provided. If an incorrect answer is chosen, students are provided with additional information before they chose a new response. A glossary of terms can be found. At the end of the game, students are assessed with a list of correctly identified solar system objects. This site includes an overview, teacher lesson plans, links to the National Science Education Standards, science background for the teacher, downloadable cards, and links to other sites. The lesson plan includes the goal/purpose, desired outcomes, prerequisites, new vocabulary, general misconceptions, preparation time, execution time, needed materials, engagement activities, step-by-step instructions, evaluation/assessment, and follow-up activities. Suggestions are given for one computer classrooms, those without computers, and home schoolers.

  1. REDUCTION OF SPATIAL SAMPLING REQUIREMENT IN SOUND-BASED SYNTHESIS Cac Nguyen, Robert L. Morrison, Jr., and Minh N. Do

    E-print Network

    Do, Minh N.

    the problem of synthesizing the sound field at arbitrary locations and times from the recordings of an array] developed an efficient scheme for sound-field synthesis by decomposing recording signals into timeREDUCTION OF SPATIAL SAMPLING REQUIREMENT IN SOUND-BASED SYNTHESIS Cac Nguyen, Robert L. Morrison

  2. A theoretical study on the structural and physical properties of the ground-state CaC

    NASA Astrophysics Data System (ADS)

    Qian, Yan; Wu, Haiping; Kan, Erjun; Lu, Ruifeng; Tan, Weishi; Deng, Kaiming

    2015-02-01

    Because of no experimental report on the half-metallic CaC theoretically found by Gao et al. in 2007, it is necessary to explore the nature of this fact, and the reason is revealed via density-functional theory study in this work. By a particle swarm structural search firstly, several CaC allotropes are found, including the half-metallic one with F-43m space group. Among the found compounds, six allotropes have the negative formation energies with Ccma, P4/mmm, Immm, Cm (8), Pmm2, and Cmmm space groups while the half-metallic one has positive formation energy of 2.67 eV. Furthermore, through the study on the dynamical properties of these six thermally stable CaC allotropes, only the one with P4/mmm symmetry exhibits dynamical stability. Based on the above fact, CaC with P4/mmm symmetry, instead of the F-43m one, perhaps can be experimentally synthesized due to both the thermodynamic and dynamically stabilities.

  3. Administrative Copy Card Request/ Request to Increase Administrative Copy Card Value

    E-print Network

    Xie,Jiang (Linda)

    Administrative Copy Card Request/ Request to Increase Administrative Copy Card Value Please read terms and conditions for use of administrative copy cards: Request for NEW Administrative copy card . . . . . . . . . . . . . . . . . . . Amount

  4. Ankle-Brachial Index (ABI), Abdominal Aortic Calcification (AAC), and Coronary Artery Calcification (CAC): the Jackson Heart Study

    PubMed Central

    Tullos, Bobby W.; Sung, Jung Hye; Lee, Jae Eun; Criqui, Michael H.; Mitchell, Marc E.; Taylor, Herman A.

    2013-01-01

    Introduction To examine the associations of peripheral atherosclerosis, assessed by the ABI at baseline with the extent of AAC and with CAC measured by MDCT at follow-up examination in the Jackson Heart Study cohort. Methods Four categories of ABI: <0.90, 0.90–0.99, 1.00–1.39; >1.40. Presence of CAC/AAC was defined as scoring above the 75th percentile among participants with non-zero CT calcium scores. We conducted multivariable log-binomial models for this analysis examining the relationship between ABI and the presence of CAC or AAC using normal ABI (1.0 ? ABI ? 1.39) as the reference group. We estimated prevalence ratios adjusted for age, smoking, HTN, DM, BMI, LDL, HDL, CRP, systolic and diastolic blood pressure, and use of lipid-lowering medication. Results There were 2,398 patients in this analysis (women: 65%, average age 55 years). AAC scores were not significantly different between sex. CAC scores were significantly higher in males than females regardless of ABI groups. The prevalence of significant AAC was 1.7 times higher for ABI < 0.90 (PR=1.70; 95% CI=1.26–2.28; p=0.0004) and 1.57 times higher for ABI 0.90–0.99 (PR=1.57; 95% CI=1.20–2.03; p=0.0008) than the normal ABI; AAC prevalence did not differ between subjects with ABI > 1.40 compared to those with normal ABI. The prevalence of the significant CAC was higher for ABI <0.90 (PR=1.55; 95% CI=1.12–2.14; p-value=0.0081) and ABI 0.90–0.99 (PR=1.60; 95% CI=1.05–2.46; p=0.0402) compared to normal ABI; CAC prevalence did not differ between subjects with ABI > 1.40 compared to those with normal ABI Conclusion Lower ABI was significantly associated with the extent of AAC and CAC in this cohort. ABI can provide clinicians with an inexpensive additional tool to assess vascular health and cardiovascular risk without exposing the patient to ionizing radiation. PMID:23111408

  5. A Mechanism for Anonymous Credit Card Systems

    NASA Astrophysics Data System (ADS)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  6. MCWHERTER LIBRARY COPY CARD DISPENSER INSTRUCTIONS

    E-print Network

    Dasgupta, Dipankar

    accepts cash. Once you have added money to your U of M ID card, swipe it at the card reader attached a copy card, swipe it at the card reader attached to the copy machine to make copies. This machine DOESMCWHERTER LIBRARY COPY CARD DISPENSER INSTRUCTIONS How do I make copies? You need either your

  7. Jefferson Lab's Trim Card II

    SciTech Connect

    Trent Allison; Sarin Philip; C. Higgins; Edward Martin; William Merz

    2005-05-01

    Jefferson Lab's Continuous Electron Beam Accelerator Facility (CEBAF) uses Trim Card I power supplies to drive approximately 1900 correction magnets. These trim cards have had a long and illustrious service record. However, some of the employed technology is now obsolete, making it difficult to maintain the system and retain adequate spares. The Trim Card II is being developed to act as a transparent replacement for its aging predecessor. A modular approach has been taken in its development to facilitate the substitution of sections for future improvements and maintenance. The resulting design has been divided into a motherboard and 7 daughter cards which has also allowed for parallel development. The Trim Card II utilizes modern technologies such as a Field Programmable Gate Array (FPGA) and a microprocessor to embed trim card controls and diagnostics. These reprogrammable devices also provide the versatility to incorporate future requirements.

  8. Baseball Cards, 1887-1914

    NSDL National Science Digital Library

    The US Library of Congress American Memory site has once again expanded its unmatched digital historical collection with a new feature. Given the recent renewed interest in "America's game," the release of this feature is well-timed. Baseball Cards, 1887-1914 showcases the LOC's wonderful collection of early baseball cards, collected by cigarette card collector Benjamin K. Edwards and donated to the Library by poet Carl Sandburg in 1954. Users can search the 2,100 digitized and thumb nailed cards by keyword or browse by player, team, league, city, or card set. The early legends, such as Ty Cobb, Connie Mack, and Cy Young are, of course, here, but so also are the cards of players from lesser known teams such as the Brooklyn Bridegrooms, Cleveland Spiders, and Boston Beaneaters. Additional resources include a brief bibliography and information on ordering reproductions.

  9. Smart Cards in Hostile Environments

    Microsoft Academic Search

    Howard Gobioff; Sean Smith; J. D. Tygar

    1996-01-01

    One often hears the claim that smart cards are the solution to a number of security problems, including those arising in point-of-sale systems. This paper argues that many proposed smart card systems still lack effective security for point-of-sale applications. We consider the point-of-sale terminal as a potentially hostile environment to the smart card. Moreover, we discuss several types of modifications

  10. FPGA based Smart Card reader

    Microsoft Academic Search

    Bipin Chandra Mandi; P. Venkateswaran; R. Nandi

    2011-01-01

    This paper describes about the Implementation and Simulation of a Smart Card Reader design with a XC2VP4-6FG256 device in FPGA Xilinx kit. The Comparison among CPLD, Virtex and Altera is explained based on area and time requirement. Different from most of the software-based Smart Card reader computer systems, this XC2VP4-6FG256 based Smart Card reader implementation is a hardware solution. There

  11. Cooperation Among Competitors: Some Economics Of Payment Card Associations

    Microsoft Academic Search

    Jean-Charles Rochet; Jean Tirole

    2002-01-01

    We analyze platforms in two-sided markets with network externalities, using the specific context of a payment card association. We study the cooperative determination of the interchange fee by member banks. The interchange fee is the ``access charge'' paid by the merchants' banks (the acquirers) to cardholders' banks (the issuers). We develop a framework in which banks and merchants may have

  12. Quick Reference Card CITI New User Registration for RCR Training

    E-print Network

    Ginzel, Matthew

    Quick Reference Card CITI New User Registration for RCR Training (RCR) training. Read on to access RCR courses. Move on to question 2 on the CITI screen for Responsible Conduct of Research (RCR) training. Human Subjects Research Courses DO NOT count toward the RCR

  13. CARD No. 53 Consideration of Underground Sources of Drinking Water

    E-print Network

    CARD No. 53 Consideration of Underground Sources of Drinking Water 53.A.1 BACKGROUND The Compliance resulting from exposure to radioactive contaminants in underground sources of drinking water (USDWs of drinking water in the accessible environment that are expected to be affected by the disposal system over

  14. HyperCLIPS: A HyperCard interface to CLIPS

    NASA Technical Reports Server (NTRS)

    Pickering, Brad; Hill, Randall W., Jr.

    1990-01-01

    HyperCLIPS combines the intuitive, interactive user interface of the Apple Macintosh(TM) with the powerful symbolic computation of an expert system interpreter. HyperCard(TM) is an excellent environment for quickly developing the front end of an application with buttons, dialogs, and pictures, while the CLIPS interpreter provides a powerful inference engine for complex problem solving and analysis. By integrating HyperCard and CLIPS the advantages and uses of both packages are made available for a wide range of uses: rapid prototyping of knowledge-based expert systems, interactive simulations of physical systems, and intelligent control of hypertext processes, to name a few. Interfacing HyperCard and CLIPS is natural. HyperCard was designed to be extended through the use of external commands (XCMDs), and CLIPS was designed to be embedded through the use of the I/O router facilities and callable interface routines. With the exception of some technical difficulties which will be discussed later, HyperCLIPS implements this interface in a straight forward manner, using the facilities provided. An XCMD called 'ClipsX' was added to HyperCard to give access to the CLIPS routines: clear, load, reset, and run. And an I/O router was added to CLIPS to handle the communication of data between CLIPS and HyperCard.

  15. Mixing in Math Card Games

    NSDL National Science Digital Library

    2011-05-19

    This site features nine Mixing-in-Math fast-paced card games that bring together arithmetic, strategies, and logical thinking. They are designed to provide practice for children at a variety of grade levels. Suggested grade levels are indicated for each game. Children can use regular playing cards or Mixing in Math card decks. The Mixing in Math cards were designed especially for children just learning to count, compare, and add numbers. There is a link with ordering instructions. Instructions can be downloaded as pdfs. This resource is also available in Spanish.

  16. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  17. PROCEDURE: Department Card Responsible Department: DragonCard Office

    E-print Network

    , environmental, or other risks (e.g., radioactive materials, explosives, live animals, etc.) ALCOHOLIC BEVERAGES or deliver the application in person to the DragonCard office. Approved applicants will be issued. A monthly statement will be issued from the DragonCard office to support the reconciliation. Original

  18. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 false Identification cards. 249.3 Section 249.3 Indians...Provisions § 249.3 Identification cards. (a) The Commissioner of Indian...issuance of an appropriate identification card to any Indian entitled thereto as...

  19. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 false Identification cards. 249.3 Section 249.3 Indians...Provisions § 249.3 Identification cards. (a) The Commissioner of Indian...issuance of an appropriate identification card to any Indian entitled thereto as...

  20. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 2011-04-01 true Identification cards. 249.3 Section 249.3 Indians...Provisions § 249.3 Identification cards. (a) The Commissioner of Indian...issuance of an appropriate identification card to any Indian entitled thereto as...

  1. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false Identification cards. 249.3 Section 249.3 Indians...Provisions § 249.3 Identification cards. (a) The Commissioner of Indian...issuance of an appropriate identification card to any Indian entitled thereto as...

  2. 25 CFR 249.3 - Identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 false Identification cards. 249.3 Section 249.3 Indians...Provisions § 249.3 Identification cards. (a) The Commissioner of Indian...issuance of an appropriate identification card to any Indian entitled thereto as...

  3. MU TRAVEL CARD CARDHOLDER ENROLLMENT / CHANGE FORM

    E-print Network

    Hardy, Christopher R.

    MU TRAVEL CARD CARDHOLDER ENROLLMENT / CHANGE FORM Action: Initial Enrollment Change to Existing Account Fill in ALL blanks down to double line and return to Card Systems Administrator Individual's Information to Appear on Card Last Name: ____________________________ First Name: ___________________ (Please

  4. Smart card security for field area networks

    Microsoft Academic Search

    Peter Palensky

    2003-01-01

    The paper deals with control networks for smart card security. A new 16-bit smart cards with relatively much memory and cards that are programmed in JavaZ micro edition are encouraging signs that field area networks was proposed.

  5. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  6. PREL Pacific Region Language Cards.

    ERIC Educational Resources Information Center

    Pacific Region Educational Lab., Honolulu, HI.

    This collection of 10 cue cards presents English translations of common English words and expressions into 10 Pacific Region languages: Palauan, Samoan, Chamorro, Hawaiian, Carolinian, Chuukese, Pohnpeian, Marshallese, Yapese, and Kosraean. The cards translate the following: hello, good morning, good afternoon, good night, thank you, you're…

  7. Authentication techniques for smart cards

    SciTech Connect

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  8. Smart Cards and remote entrusting

    NASA Astrophysics Data System (ADS)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  9. Applying a Metrics Report Card

    ERIC Educational Resources Information Center

    Klubeck, Martin; Langthorne, Michael

    2008-01-01

    In this article, the authors suggest that providing a report card enables an IT department to check its progress and overall performance; communicate the department's effectiveness to university leadership, IT membership, and customers; and make any necessary adjustments. A report card will not show how efficiently the IT department functions, but…

  10. RFID and business card information

    Microsoft Academic Search

    Tommi Kallonen; Juho Vartiainen; Jouni Ikonen

    2009-01-01

    Business cards are a popular way to exchange contact information. They are practical if the information is needed right away but after some time the cards get lost or at least finding right person's information is difficult. Saving all this information in digital form would make things more practical. Our goal was to implement a system that would enable usage

  11. Corporate Card Program Cardmember Application

    E-print Network

    Haykin, Simon

    Billing *Application cannot be processed without this required information. DINERS CLUB® CORPORATE CARD immediately at the customer service number shown on my billing statement if my Card is lost or stolen. I AUTHORIZE THE BANK TO OBTAIN INFORMATION ABOUT ME FROM MY EMPLOYER, THIRD PARTIES, INCLUDING CREDIT

  12. Specifications SCT Hardwired Interlock Card

    E-print Network

    California at Santa Cruz, University of

    Specifications SCT Hardwired Interlock Card Basic characteristics: Size: 6U by 220 mm, single width Power input: 50~70mA at 5V Signal input: 13 interlock signals (RS422) Signal output: 13 interlock signals (TTL) Function description: Hardwired interlock card provides signal conversion between RS422

  13. IC-Card Reader Antenna and IC-Card technology's analysis by wireless communications

    Microsoft Academic Search

    Donghun Yoon

    2009-01-01

    This paper describes wireless communications study for IC-Card Reader Antenna and IC-Card technology. IC-Card is plastic card with embedded micro circuit. It is embedded induction coil and condenser. IC-Card is a passive device and the most successful RFID technology. Japan's IC-Card(Felica: Contactless IC-Card) was began to develop by Sony in 1988 and has been produced successfully from 1996. In this

  14. The Ins and Outs of Access Control.

    ERIC Educational Resources Information Center

    Longworth, David

    1999-01-01

    Presents basic considerations when school districts plan to acquire an access-control system for their education facilities. Topics cover cards and readers, controllers, software, automation, card technology, expandability, price, specification of needs beyond the canned specifications already supplied, and proper usage training to cardholders.…

  15. Quantum magnetoresistance in the Ca-intercalated graphite superconductor CaC6

    NASA Astrophysics Data System (ADS)

    Mu, Gang; Ji, Qiucheng; Li, Wei; Xu, Xuguang; Hu, Tao; Jiang, Da; Wang, Zhi; Gao, Bo; Xie, Xiaoming; Jiang, Mianheng

    2014-12-01

    The search for exotic materials with a linear Dirac-like dispersion in the electronic structure is one of the most challenging tasks of the condensed matter community and materials science. Revealing the nature of the interplay between such a Dirac-like and superconducting states is a crucial issue for the study of fundamental physics. Here we report the experimental observations of a large linear magnetoresistance (MR) in the Ca-intercalated graphite superconductor CaC6. A large nonsaturating MR with a magnitude as high as 244% is observed at low temperature under a magnetic field of 9 T. The magnetic field (B ) dependence of MR shows a linear behavior above 3 T at low temperature, which deviates from the classical B2 behavior, pointing to the existence of an intrinsic linear Dirac-like state. The presence of such a low-energy Dirac-like dispersion in energy band structure is confirmed qualitatively by performing first-principles calculations. These findings may pave an avenue for potential applications in magnetoelectronic sensors and for further studying the interplay between the linear Dirac-like and superconducting states in exotic materials.

  16. Superconducting graphene sheets in CaC6 enabled by phonon-mediated interband interactions.

    PubMed

    Yang, S-L; Sobota, J A; Howard, C A; Pickard, C J; Hashimoto, M; Lu, D H; Mo, S-K; Kirchmann, P S; Shen, Z-X

    2014-01-01

    There is a great deal of fundamental and practical interest in the possibility of inducing superconductivity in a monolayer of graphene. But while bulk graphite can be made to superconduct when certain metal atoms are intercalated between its graphene sheets, the same has not been achieved in a single layer. Moreover, there is a considerable debate about the precise mechanism of superconductivity in intercalated graphite. Here we report angle-resolved photoelectron spectroscopy measurements of the superconducting graphite intercalation compound CaC6 that distinctly resolve both its intercalant-derived interlayer band and its graphene-derived ?* band. Our results indicate the opening of a superconducting gap in the ?* band and reveal a substantial contribution to the total electron-phonon-coupling strength from the ?*-interlayer interband interaction. Combined with theoretical predictions, these results provide a complete account for the superconducting mechanism in graphite intercalation compounds and lend support to the idea of realizing superconducting graphene by creating an adatom superlattice. PMID:24651261

  17. Superconducting graphene sheets in CaC6 enabled by phonon-mediated interband interactions

    PubMed Central

    Yang, S.-L.; Sobota, J. A.; Howard, C. A.; Pickard, C. J.; Hashimoto, M.; Lu, D. H.; Mo, S.-K.; Kirchmann, P. S.; Shen, Z.-X.

    2014-01-01

    There is a great deal of fundamental and practical interest in the possibility of inducing superconductivity in a monolayer of graphene. But while bulk graphite can be made to superconduct when certain metal atoms are intercalated between its graphene sheets, the same has not been achieved in a single layer. Moreover, there is a considerable debate about the precise mechanism of superconductivity in intercalated graphite. Here we report angle-resolved photoelectron spectroscopy measurements of the superconducting graphite intercalation compound CaC6 that distinctly resolve both its intercalant-derived interlayer band and its graphene-derived ?* band. Our results indicate the opening of a superconducting gap in the ?* band and reveal a substantial contribution to the total electron–phonon-coupling strength from the ?*-interlayer interband interaction. Combined with theoretical predictions, these results provide a complete account for the superconducting mechanism in graphite intercalation compounds and lend support to the idea of realizing superconducting graphene by creating an adatom superlattice. PMID:24651261

  18. Punch Card Programmable Microfluidics

    E-print Network

    Korir, George

    2014-01-01

    Small volume fluid handling in single and multiphase microfluidics provides a promising strategy for efficient bio-chemical assays, low-cost point-of-care diagnostics and new approaches to scientific discoveries. However multiple barriers exist towards low-cost field deployment of programmable microfluidics. Incorporating multiple pumps, mixers and discrete valve based control of nanoliter fluids and droplets in an integrated, programmable manner without additional required external components has remained elusive. Combining the idea of punch card programming with arbitrary fluid control, here we describe a self-contained, hand-crank powered, multiplex and robust programmable microfluidic platform. A paper tape encodes information as a series of punched holes. A mechanical reader/actuator reads these paper tapes and correspondingly executes a series of operations onto a microfluidic chip coupled to the platform in a plug-and-play fashion. Enabled by the complexity of codes that can be represented by a series ...

  19. Victorian Trade Cards

    NSDL National Science Digital Library

    How can one know the history of the Victorian era? Through its architecture, its writings, its political leaders? Yes, yes, and yes. And a fourth "yes" to the world of trade cards. These quotidian items were used to promote everything from bromides to bicycles and the University of Iowa has this wonderful collection for those curious about such matters. First-time visitors might do well to start by looking over the ads for Clark's Cotton, which includes maudlin and interesting illustrations of boys playing with a kite, colorful birds and bicycle races. It's worth noting that visitors can also search all of the items here by keyword or creator. Visitors can also make their own themed collection for future reference and students of 19th century American culture will find much to enjoy here. The site is rounded out by a site of links to other relevant digital collections, including some from the Library of Congress.

  20. FRONTLINE: The Card Game

    NSDL National Science Digital Library

    Credit card companies have been the subject of renewed interest by the general public and regulatory agencies in the federal government, and this program by Frontline investigates "the future of the massive consumer loan industry and its impact on a fragile national economy." The program is hosted by correspondent Lowell Bergman, and represents a joint endeavor with The New York Times. As with most Frontline programs, visitors can watch the full program online, though before doing so, they may wish to take a look at the informative "Seven Things You Need to Know" section. Here they can breeze through helpful reminders, including "Cardholders Have New Protections" and "Free Traps Are Still Out There". The site has a number of extras, including additional interviews, a podcast with Bergman, and a discussion board for viewers to chime in with their appraisal of the program.

  1. SDSU General Catalog 2014-2015 23 Tuition and fees must be paid prior to accessing the WebPortal

    E-print Network

    Gallo, Linda C.

    -of-state tuition with MasterCard, Discover Card, or American Express card. CASHNetTMSmartPay is accessed directly.......................................... $7,867.00 Physical Therapy Doctoral Students * 0 units ­ 6.0 unitsSDSU General Catalog 2014-2015 23 Tuition and fees must be paid prior to accessing the Web

  2. Punch card programmable microfluidics.

    PubMed

    Korir, George; Prakash, Manu

    2015-01-01

    Small volume fluid handling in single and multiphase microfluidics provides a promising strategy for efficient bio-chemical assays, low-cost point-of-care diagnostics and new approaches to scientific discoveries. However multiple barriers exist towards low-cost field deployment of programmable microfluidics. Incorporating multiple pumps, mixers and discrete valve based control of nanoliter fluids and droplets in an integrated, programmable manner without additional required external components has remained elusive. Combining the idea of punch card programming with arbitrary fluid control, here we describe a self-contained, hand-crank powered, multiplex and robust programmable microfluidic platform. A paper tape encodes information as a series of punched holes. A mechanical reader/actuator reads these paper tapes and correspondingly executes operations onto a microfluidic chip coupled to the platform in a plug-and-play fashion. Enabled by the complexity of codes that can be represented by a series of holes in punched paper tapes, we demonstrate independent control of 15 on-chip pumps with enhanced mixing, normally-closed valves and a novel on-demand impact-based droplet generator. We demonstrate robustness of operation by encoding a string of characters representing the word "PUNCHCARD MICROFLUIDICS" using the droplet generator. Multiplexing is demonstrated by implementing an example colorimetric water quality assays for pH, ammonia, nitrite and nitrate content in different water samples. With its portable and robust design, low cost and ease-of-use, we envision punch card programmable microfluidics will bring complex control of microfluidic chips into field-based applications in low-resource settings and in the hands of children around the world. PMID:25738834

  3. Punch Card Programmable Microfluidics

    PubMed Central

    Korir, George; Prakash, Manu

    2015-01-01

    Small volume fluid handling in single and multiphase microfluidics provides a promising strategy for efficient bio-chemical assays, low-cost point-of-care diagnostics and new approaches to scientific discoveries. However multiple barriers exist towards low-cost field deployment of programmable microfluidics. Incorporating multiple pumps, mixers and discrete valve based control of nanoliter fluids and droplets in an integrated, programmable manner without additional required external components has remained elusive. Combining the idea of punch card programming with arbitrary fluid control, here we describe a self-contained, hand-crank powered, multiplex and robust programmable microfluidic platform. A paper tape encodes information as a series of punched holes. A mechanical reader/actuator reads these paper tapes and correspondingly executes operations onto a microfluidic chip coupled to the platform in a plug-and-play fashion. Enabled by the complexity of codes that can be represented by a series of holes in punched paper tapes, we demonstrate independent control of 15 on-chip pumps with enhanced mixing, normally-closed valves and a novel on-demand impact-based droplet generator. We demonstrate robustness of operation by encoding a string of characters representing the word “PUNCHCARD MICROFLUIDICS” using the droplet generator. Multiplexing is demonstrated by implementing an example colorimetric water quality assays for pH, ammonia, nitrite and nitrate content in different water samples. With its portable and robust design, low cost and ease-of-use, we envision punch card programmable microfluidics will bring complex control of microfluidic chips into field-based applications in low-resource settings and in the hands of children around the world. PMID:25738834

  4. Passive microfluidic array card and reader

    Microsoft Academic Search

    Lawrence Christopher Dugan; Matthew A. Coleman

    2011-01-01

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a

  5. Final Project: Mathematics behind Card Tricks

    E-print Network

    Stein, William

    Final Project: Mathematics behind Card Tricks by Jonathon Mitchell and Huy Hoang-Nguyen March 09 the underlying mathematics of certain card tricks. Many card tricks employ a slight of hand technique or some other method to deceive a participant by sneaking certain cards into certain parts of a deck, hiding

  6. Purchasing Card (PCard) Program and User Guide

    E-print Network

    Purchasing Card (PCard) Program and User Guide Updated November 25, 2013 St. Francis Xavier University Visa® Purchasing Card #12;Purchasing Card (PCard) Program Guide November 25, 2013 Page 1 of 18 ........................................................................................17 #12;Purchasing Card (PCard) Program Guide November 25, 2013 Page 2 of 18 Purpose of Program

  7. Interface card specification (Version 0.99)

    E-print Network

    Interface card specification (Version 0.99) Interface card (version 0.99) has passed the test beam run. This note describes the basic aspects of the current version of the card, The data format has LSC card, working at 20 bits, 40MHz mode, data rate 640Mbit/s. 3. Dual channel readout redundancy. 4

  8. Procurement Card Program COLORADO SCHOOL OF MINES

    E-print Network

    ://inside.mines.edu/Research_policies) Procurement Card Handbook (http://inside.mines.edu/Procurement-Card-Information) #12;Transaction Documentation Official (Supervisor/Department Head) must sign off on your credit card statement. This will be checked the Unavailable Documentation Form http://inside.mines.edu/Procurement-Card-Information #12;Reallocations

  9. Credit Cards. Bulletin No. 721. (Revised.)

    ERIC Educational Resources Information Center

    Fox, Linda Kirk

    This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

  10. Version 2.0 Procurement Card Program Policies & Procedures 1 Procurement Card Program

    E-print Network

    Ponce, V. Miguel

    Version 2.0 Procurement Card Program Policies & Procedures 1 Procurement Card Program Policy and Procedure Manual Version 2.0 August 2013 #12;Version 2.0 Procurement Card Program Policies & Procedures 2 Procurement Card Program Policy and Procedure Manual I. Procurement Card (PCard) Program Overview A

  11. Procurement Card (P-Card) Quick Reference Guide Accounts Payable & Travel Page 1 of 6

    E-print Network

    Yamamoto, Keith

    Procurement Card (P-Card) Quick Reference Guide Accounts Payable & Travel Version 3 12/17/2013 Page 1 of 6 The Procurement Card (P-Card) simplifies the purchasing of most goods and services under $5,000. The topics below provide basic guidelines and helpful information about the card. · Cardholder

  12. UAF INDIVIDUAL TRAVEL CARD ACCOUNT FORM Please review the Individual Travel Card Guide

    E-print Network

    Ickert-Bond, Steffi

    UAF INDIVIDUAL TRAVEL CARD ACCOUNT FORM Please review the Individual Travel Card Guide http://www.uaf.edu/procurement/staff-faculty/info/card-info/travel-card-information/INDV-Guide.pdf New Individual Travel Cardholder Change Existing Individual Travel Card (enter information in the fields

  13. Terms and Conditions for Union Commons Gift Cards 1. Where can I use my card?

    E-print Network

    Terms and Conditions for Union Commons Gift Cards 1. Where can I use my card? Your gift card can be purchased at any PMU Restaurant, both those at the Union and others on campus. 2. How long is my card redeemable? Two years from the date of last issue. This date will not be printed on your card. 3. Can I

  14. Digital design of a Cryptographic card (LAM) embedded Smart Card Reader

    Microsoft Academic Search

    Panagiotis Margaronis; Lambrinoudakis Kostantinos; Gritzalis Stefanos

    2007-01-01

    This paper presents the design and implementation of a cryptographic card embedded smart card reader. The cryptographic card introduces a digital integrated encryption\\/decryption circuitry called LAM which is based on Peripheral Component Interconnect (PCI) Architecture for the use on a Personal Computer (PC) communication card. The implementation of the above hardware PC cryptography card has been designed using a Field

  15. Photocatalytic degradation of an azo dye Sunset Yellow under UV-A light using TiO2/CAC composite catalysts

    NASA Astrophysics Data System (ADS)

    Rajamanickam, D.; Shanthi, M.

    2014-07-01

    The photocatalytic activity and the promoting effect of titania (TiO2) by commercial activated carbon (CAC) for removing the pollutant in wastewater were investigated. The TiO2/CAC composite photocatalysts with various ratios of CAC to TiO2 were prepared by sol-gel method. The catalyst was characterized by X-ray diffraction (XRD), high resolution scanning electron microscope (HR-SEM), energy dispersive spectra (EDS), diffuse reflectance spectra (DRS), photoluminescence spectra (PL), X-ray photoelectron spectroscopy (XPS) and Brunauer-Emmett-Teller (BET) surface area measurement methods. The photocatalytic activity of TiO2/CAC was investigated for the degradation of Sunset Yellow (SY) in aqueous solution using UV-A light. The TiO2/CAC is found to be more efficient than prepared TiO2 and TiO2-P25 at pH 7 for the mineralization of SY. The synergism between TiO2 and CAC may increase the catalytic activity. The effects of operational parameters such as the amount of photocatalyst, dye concentration and initial pH on photo mineralization of SY have been analyzed. The mineralization of SY has been confirmed by COD measurements. The catalyst is found to be reusable.

  16. Wallet CardMy Asthma Carry This Card To Help

    E-print Network

    Bandettini, Peter A.

    Wallet CardMy Asthma Carry This Card To Help Control Your Asthma www.nhlbi.nih.gov s Your asthma and how to take them s How to use your inhaler and a peak flow meter, if you have one s Your asthma triggers and how to avoid them s Warning signs of an asthma attack and what you should do if your symptoms

  17. Software license management with smart cards

    Microsoft Academic Search

    Tuomas Aura; Dieter Gollmann

    1999-01-01

    This paper describes public-key protocols for binding software licenses to tamper-resistant smart cards, for transferring licenses between cards, and for purchasing them on-line. The protocols support software distribu- tion both through retail stores and over the Internet. The user can transfer licenses from several cards onto a sin- gle card to avoid juggling between several cards in the reader. The

  18. Personal telephone services using IC-cards

    Microsoft Academic Search

    Naoki Matsuo; Katsunori Shimohara; Hiroyuki Matsui; Yukio Tokunaga

    1989-01-01

    An IC-card is a memory card that can be substituted for existing magnetic-striped cards. It is suggested that the IC-card, which can store various information for telephone calls, will become a useful device in multifunction telephone sets because of its portability, security, and large memory capacity. The information that should be stored on an IC-card is discussed, and the practicality

  19. Credit card fraud under Chinese criminal law

    Microsoft Academic Search

    Mingxiang Liu

    2011-01-01

    Credit card fraud is a new type of fraud amended into the Criminal Law of China in 1997. The “credit card” under credit card fraud is interpreted as a very board concept, which includes debit card and\\u000a virtually all electronic payment cards used in ordinary payment, credit loan, transfer and settlement of account, cash deposit\\u000a and withdrawal. Therefore, it is

  20. Access Nets: Modeling Access to Physical Spaces

    NASA Astrophysics Data System (ADS)

    Frohardt, Robert; Chang, Bor-Yuh Evan; Sankaranarayanan, Sriram

    Electronic, software-managed mechanisms using, for example, radio-frequency identification (RFID) cards, enable great flexibility in specifying access control policies to physical spaces. For example, access rights may vary based on time of day or could differ in normal versus emergency situations. With such fine-grained control, understanding and reasoning about what a policy permits becomes surprisingly difficult requiring knowledge of permission levels, spatial layout, and time. In this paper, we present a formal modeling framework, called AccessNets, suitable for describing a combination of access permissions, physical spaces, and temporal constraints. Furthermore, we provide evidence that model checking techniques are effective in reasoning about physical access control policies. We describe our results from a tool that uses reachability analysis to validate security policies.

  1. Procurement Card (P-Card) Overview Accounts Payable & Travel 02/03/14 Page 1 of 1

    E-print Network

    Yamamoto, Keith

    Procurement Card (P-Card) Overview Accounts Payable & Travel 02/03/14 Page 1 of 1 UCSF's Procurement Card (P-Card) is a Visa® card for employees (staff and faculty members) who have buying responsibilities. The card simplifies purchasing of low-cost goods and services. The P-Card is a Visa purchasing

  2. Livermore time-sharing system. Part I. Octopus. Chapter 5. Card reader\\/card punch. [Description of card reader and formats

    Microsoft Academic Search

    1970-01-01

    The Control Data 405 card reader, modified by the Control Data 3649 card read controller, is the primary mechanism for transferring information from a deck of punched cards into the CDC 6600 and CDC 7600 computers of the LLL Octopus system. The card reader operates at a maximum rate of 1200 cards per minute. A description of the card reader

  3. Match-on-Card for Secure and Scalable Biometric Authentication

    Microsoft Academic Search

    Christer Bergman

    The majority of biometric systems in use today operate in a database environment. Whether it is a large-scale database such\\u000a as US-VISIT or a small bank of biometrics stored on a server for logical access in an office, the solutions are based on insecure\\u000a networks that are vulnerable to cyberattacks. Match-on-Card technology eliminates the need for the database by both

  4. Passive microfluidic array card and reader

    DOEpatents

    Dugan, Lawrence Christopher (Modesto, CA); Coleman, Matthew A. (Oakland, CA)

    2011-08-09

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.

  5. 11C-AC-5216: A Novel PET Ligand for Peripheral Benzodiazepine Receptors in the Primate Brain

    Microsoft Academic Search

    Ming-Rong Zhang; Katsushi Kumata; Jun Maeda; Kazuhiko Yanamoto; Akiko Hatori; Maki Okada; Makoto Higuchi; Shigeru Obayashi; Tetsuya Suhara; Kazutoshi Suzuki

    Developing a PET ligand for imaging of the peripheral benzodiaz- epine receptor (PBR; Translocator Protein (18 kDa) TSPO) is of great importance for studying its role in glial cells in the injured brain and in neurodegenerative disorders, such as Alzheimer's disease. The aim of this study was to synthesize and evaluate N-benzyl-N-ethyl-2-(7-11C-methyl-8-oxo-2-phenyl-7,8-dihydro- 9H-purin-9-yl)acetamide (11C-AC-5216) as a PET ligand for imaging

  6. Using the Sound Card as a Timer

    NASA Astrophysics Data System (ADS)

    Aguiar, C. E.; Pereira, M. M.

    2011-01-01

    Experiments in mechanics often involve measuring time intervals much smaller than one second, a task that is hard to perform with handheld stopwatches. This is one of the reasons why photogate timers are so popular in school labs. There is an interesting alternative to stopwatches and photogates, easily available if one has access to a personal computer with sound-recording capability. The idea is simple: a computer sound card can record audio frequencies up to several kilohertz, which means it has a time resolution of a fraction of a millisecond, comparable to that of photogate timers. Many experiments in mechanics can be timed by the sound they produce, and in these situations a direct audio recording may provide accurate measurements of the time intervals of interest. This idea has already been explored in a few cases,1-5 and here we apply it to an experiment that our students found very enjoyable: measuring the speed of soccer balls they kicked.

  7. SDSU General Catalog 2013-2014 23 Tuition and fees must be paid prior to accessing the WebPortal to

    E-print Network

    Gallo, Linda C.

    -of-state tuition with MasterCard, Discover Card, or American Express card. CASHNetTMSmartPay is accessed directly .......................................... $7,817.00 Physical Therapy Doctoral Students * 0 units ­ 6.0 unitsSDSU General Catalog 2013-2014 23 Tuition and fees must be paid prior to accessing the Web

  8. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 false Surrender of identification cards. 112.45 Section 112.45 Customs Duties...CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be...

  9. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 false Surrender of identification cards. 112.45 Section 112.45 Customs Duties...CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be...

  10. 16 CFR 700.7 - Use of warranty registration cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... false Use of warranty registration cards. 700.7 Section 700.7 Commercial...700.7 Use of warranty registration cards. (a) Under section 104(b...warranty registration” or similar card. By “warranty registration card”...

  11. 16 CFR 701.4 - Owner registration cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 2011-01-01 false Owner registration cards. 701.4 Section 701.4 Commercial Practices...AND CONDITIONS § 701.4 Owner registration cards. When a warrantor employs any card such as an owner's registration card, a...

  12. 16 CFR 700.7 - Use of warranty registration cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... false Use of warranty registration cards. 700.7 Section 700.7 Commercial...700.7 Use of warranty registration cards. (a) Under section 104(b...warranty registration” or similar card. By “warranty registration card”...

  13. 16 CFR 701.4 - Owner registration cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 2010-01-01 false Owner registration cards. 701.4 Section 701.4 Commercial Practices...AND CONDITIONS § 701.4 Owner registration cards. When a warrantor employs any card such as an owner's registration card, a...

  14. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 false Form of identification card. 112.43 Section 112.43 Customs Duties...CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be...

  15. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 false Form of identification card. 112.43 Section 112.43 Customs Duties...CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be...

  16. 16 CFR 701.4 - Owner registration cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 2013-01-01 false Owner registration cards. 701.4 Section 701.4 Commercial Practices...AND CONDITIONS § 701.4 Owner registration cards. When a warrantor employs any card such as an owner's registration card, a...

  17. 16 CFR 700.7 - Use of warranty registration cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... false Use of warranty registration cards. 700.7 Section 700.7 Commercial...700.7 Use of warranty registration cards. (a) Under section 104(b...warranty registration” or similar card. By “warranty registration card”...

  18. 16 CFR 701.4 - Owner registration cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 2014-01-01 false Owner registration cards. 701.4 Section 701.4 Commercial Practices...AND CONDITIONS § 701.4 Owner registration cards. When a warrantor employs any card such as an owner's registration card, a...

  19. 16 CFR 700.7 - Use of warranty registration cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... false Use of warranty registration cards. 700.7 Section 700.7 Commercial...700.7 Use of warranty registration cards. (a) Under section 104(b...warranty registration” or similar card. By “warranty registration card”...

  20. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 false Form of identification card. 112.43 Section 112.43 Customs Duties...CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be...

  1. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 false Surrender of identification cards. 112.45 Section 112.45 Customs Duties...CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be...

  2. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false Form of identification card. 112.43 Section 112.43 Customs Duties...CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be...

  3. 16 CFR 701.4 - Owner registration cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 2012-01-01 false Owner registration cards. 701.4 Section 701.4 Commercial Practices...AND CONDITIONS § 701.4 Owner registration cards. When a warrantor employs any card such as an owner's registration card, a...

  4. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 false Surrender of identification cards. 112.45 Section 112.45 Customs Duties...CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be...

  5. 19 CFR 112.45 - Surrender of identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false Surrender of identification cards. 112.45 Section 112.45 Customs Duties...CARTMEN, AND LIGHTERMEN Identification Cards § 112.45 Surrender of identification cards. The identification card shall be...

  6. Training Guide PeopleSoft Procurement Card 9.0

    E-print Network

    Training Guide PeopleSoft Procurement Card 9.0 Contents Using the Procurement Card Module...................................................... 1 KU Reconcile Procurement Card transactions ........................................................................ 2 KU department approval of p-card transactions

  7. 19 CFR 112.43 - Form of identification card.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 false Form of identification card. 112.43 Section 112.43 Customs Duties...CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.43 Form of identification card. The identification card shall be...

  8. 16 CFR 700.7 - Use of warranty registration cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... false Use of warranty registration cards. 700.7 Section 700.7 Commercial...700.7 Use of warranty registration cards. (a) Under section 104(b...warranty registration” or similar card. By “warranty registration card”...

  9. 76 FR 76628 - Disclosure of Certain Credit Card Complaint Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-08

    ...Disclosure of Certain Credit Card Complaint Data AGENCY: Bureau of Consumer Financial Protection...proactive disclosure of credit card complaint data. The CFPB receives credit card complaints...initial disclosure of credit card complaint data. It also identifies additional ways...

  10. Dome It Challenge Scenario Cards

    NSDL National Science Digital Library

    2014-09-18

    Student teams find solutions to hypothetical challenge scenarios that require them to sustainably manage both resources and wastes. They begin by creating a card representing themselves and the resources (inputs) they need and wastes (outputs) they produce. Then they incorporate additional cards for food and energy components and associated necessary resources and waste products. They draw connections between outputs that provide inputs for other needs, and explore the problem of using linear solutions in resource-limited environments. Then students incorporate cards based on biorecycling technologies, such as algae photobioreactors and anaerobic digesters in order to make circular connections. Finally, the student teams present their complete biorecycling engineering solutions to their scenarios—in poster format—by connecting outputs to inputs, and showing the cycles of how wastes become resources.

  11. ACCESSIBILITY ACCESSIBLE PARKING

    E-print Network

    Gera, Ralucca

    O ACCESSIBILITY ELEVATOR ACCESSIBLE PARKING ACCESSIBLE ENTRY CURB CUT PARKING GARAGE PARKING GARAGE........................ 45 Communications Museum ........................... 22 Computer Science.................................................... 80 Development................................................ 12 Dining Services

  12. Card Lab: A Population Genetics Simulation Exercise.

    ERIC Educational Resources Information Center

    Easton, Christopher M.

    1997-01-01

    Explains the use of a card lab to demonstrate how a population bottleneck impacts genetic diversity and the survival of a population. Uses a standard deck of playing cards to show how age structure can magnify bottleneck effects. (DDR)

  13. An Anonymous Credit Card System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  14. Amplifier-Discriminator-Multiplexor card

    SciTech Connect

    Graupman, D.

    1986-02-01

    The Amplifier-Discriminator-Multiplexor (ADM) card described was designed for the External Muon Identifier at the 15 ft Bubble Chamber. The general scheme of the data readout of the External Muon Identifier is based on the use of a master clock. The ADM card serves to amplify the signals from the proportional tubes, discriminate them, latch the signals in parallel into a shift register. The data are then shifted out serially to the Time Digitizing System, using the master clock. The shift registers are loaded, and the latches are reset every sixteen cycles of the master clock. (LEW)

  15. Book Catalogs versus Card Catalogs *

    PubMed Central

    Pizer, Irwin H.

    1965-01-01

    The development of the library catalog in book form and its abandonment in favor of the card catalog are briefly traced. The advantages and disadvantages of both types of catalogs are enumerated, and several solutions which tried to combine the best features of both are discussed. The present trend back to the book catalog, made possible by recent advances in computer technology, is analyzed, advantages and disadvantages are compared, current examples are illustrated, and finally the computerized catalog is weighed against both the book and card catalog as to main features and practicality. PMID:14271116

  16. System Description: cardTAP : The First Theorem Prover on a Smart Card

    E-print Network

    Slater, Andrew

    System Description: cardTAP : The First Theorem Prover on a Smart Card Rajeev Gor´e1 , Joachim present the first implementation of a theorem prover run- ning on a smart card. The prover is written cards, the prover is restricted to propositional classical logic. It can be easily extended to full

  17. Library Card Application How did you hear about our resident patron card? _______________________________

    E-print Network

    Tullos, Desiree

    Library Card Application How did you hear about our resident patron card for the use of this card and payment of fines and fees charged to it Give immediate notice to the library of loss of card or change of address Applicant Signature _________________________ Date

  18. UD Credit Card Information Noncompliance with University or Departmental Policy may result in UD Credit Card

    E-print Network

    Firestone, Jeremy

    UD Credit Card Information Noncompliance with University or Departmental Policy may result in UD Credit Card cancelation or credit limit reduction. 1. Review the credit card tutorials at: http forgotten your username, contact Procurement Services at 302-831-2161. 3. UD Credit Card Activation When

  19. System Description: cardTAP : The First Theorem Prover on a Smart Card

    E-print Network

    Goré, Rajeev

    System Description: cardTAP : The First Theorem Prover on a Smart Card on a smart card. The prover is written in Java and implements a dual tableau calculus. Due to the limited resources available on current smart cards, the prover is restricted to propositional

  20. Laparoscopic treatment of celiac axis compression syndrome (CACS) and hiatal hernia: Case report with bleeding complications and review?

    PubMed Central

    di Libero, Lorenzo; Varricchio, Antonio; Tartaglia, Ernesto; Iazzetta, Igino; Tartaglia, Alberto; Bernardo, Antonella; Bernardo, Rosanna; Triscino, Giovangiuseppe; Conte, Domenico Lo

    2013-01-01

    INTRODUCTION Median arcuate ligament (MAL) malposition is a rare cause of celiac axis compression syndrome (CACS) or Dunbar syndrome. PRESENTATION OF CASE A 26-year-old female presented with severe postprandial epigastric pain, weight loss, heartburn and regurgitation unresponsive to medical therapy. CT angiography and duplex ultrasound demonstrated the MAL crossing anterior to the celiac artery (CA). Reconstructions demonstrated CA compression, while the superior mesenteric artery (SMA) was normal. The MAL was laparoscopically divided, releasing the celiac axis. A concomitant Nissen fundoplication was performed. At 3-months follow-up, the CT-scan demonstrated no evidence of CACS with complete symptom resolution. DISCUSSION Dunbar's syndrome can be treated with endovascular surgery, laparoscopic MAL division or vascular surgery.Six anatomical and morphologic variations of aortic and esophageal hiatus are described. The result of the analysis of these anatomical data leads to the conclusion that hiatus hernia, Dunbar's syndrome and GERD have a common etiopathogenesis and physiopathology. CONCLUSION Laparoscopic treatment is useful and feasible in centers with experience in majorlaparoscopic surgery with reduced invasiveness, better cosmetic effect and shorter postoperative course. PMID:23973901

  1. A Flexible Invocation Framework for Java Card

    Microsoft Academic Search

    Michael Montgomery; Ksheerabdhi Krishna

    2001-01-01

    The Java Card Specification specifies a framework suitable for most tasks that interface with ISO-7816 protocols. However,\\u000a this framework limits Java Card applets to only handling tasks that are supported by this protocol. Tasks such as physical\\u000a security using the standard Wiegand protocol, cards which test ISO-7816 card readers by pushing the limits of the protocol,\\u000a and applications that depend

  2. An energy-aware active smart card

    Microsoft Academic Search

    Russell Tessier; David Jasinski; Atul Maheshwari; Aiyappan Natarajan; Weifeng Xu; Wayne P. Burleson

    2005-01-01

    Abstract, Despite recent advances in smart card technology, most modern smart cards continue to rely on card readers for power and clock-ing, creating a potential security gap. In this paper we present an energy-aware smart card architecture that operates using an embedded battery and crystal. This low-power VLSI system is continually active and provides enhanced security through peri-odic internal update

  3. Sjögren's syndrome--a house of cards.

    PubMed

    Isenberg, D

    1995-07-01

    Sjögren's syndrome is an autoimmune rheumatic disease that is the result of the interplay between a number of environmental and genetic factors. In this short review an analogy is suggested with a game of cards in which each card is marked with a particular feature. A particular set of cards when dealt together could constitute Sjögren's syndrome if the hand includes cards marked for female sex, HLA DRS, anti Ro antibodies, anti La antibodies, exposure to retroviruses etc. PMID:7493453

  4. Card-cyclic-to-random shuffling with Johan Jonasson

    E-print Network

    Jonasson, Johan

    Card-cyclic-to-random shuffling with relabeling Johan Jonasson March 11, 2014 Abstract The card-cyclic-to-random shuffle is the card shuffle where the n cards are labeled 1, . . . , n according to their starting positions. Then the cards are mixed by first picking card 1 from the deck and reinserting it at a uniformly

  5. Cryptography and the French Banking Cards: Past, Present, Future

    E-print Network

    Stern, Jacques

    to offer a credit card service, under the form of a mere plastic card. The device was later enhanced versions of the "yes card" fraud. Such cards return a yes answer when a PIN code is submitted and display a card number and RSA signature captured form a legitimate card. To counter the fraud, it is necessary

  6. Cryptography and the French Banking Cards: Past, Present, Future

    E-print Network

    Stern, Jacques

    to o#er a credit card service, under the form of a mere plastic card. The device was later enhanced by more subtle versions of the ``yes card'' fraud. Such cards return a yes answer when a PIN code is submitted and display a card number and RSA signature captured form a legitimate card. To counter the fraud

  7. Cost-reducing multipurpose microfilm card

    NASA Technical Reports Server (NTRS)

    Smith, A. V.

    1970-01-01

    Microfilm-aperture card is printed in the same format on both sides which enables the use of one card for mounting films that are ''right reading'' on both the base side and the emulsion side. This reduces the number of microfilm-card formats.

  8. 31 CFR 8.24 - Enrollment cards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...2011-07-01 2011-07-01 false Enrollment cards. 8.24 Section 8.24 Money and Finance...Enrollment Procedures § 8.24 Enrollment cards. The Director shall issue an enrollment card to each practitioner who is enrolled to...

  9. 31 CFR 8.24 - Enrollment cards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...2010-07-01 2010-07-01 false Enrollment cards. 8.24 Section 8.24 Money and Finance...Enrollment Procedures § 8.24 Enrollment cards. The Director shall issue an enrollment card to each practitioner who is enrolled to...

  10. UNIVERSITY OF NORTHERN BRITISH COLUMBIA PROCUREMENT CARD

    E-print Network

    Northern British Columbia, University of

    UNIVERSITY OF NORTHERN BRITISH COLUMBIA PROCUREMENT CARD APPLICATION FORM From on this card? YES_____ NO_____ Will food and entertainment expenses be allowed? YES_____ NO_____ A University Procurement card is requested for the following staff/faculty member. Maximum Limits per Transactions

  11. CHICAGO ONE CARD MOVING EXPENSE REPORTING FORM

    E-print Network

    He, Chuan

    CHICAGO ONE CARD MOVING EXPENSE REPORTING FORM SECTION A - DISTANCE TEST (Complete this section #: ________________________ Purpose: To record moving expenses that were charged to a Chicago One Card. Use this form to record moving attach an itemized list) SUBTOTAL--TAXABLE EXPENSES (Item 3, 4, 5) TOTAL CHARGED TO CHICAGO ONE CARD

  12. UMBC D-CARD DEPARTMENT APPLICATION

    E-print Network

    Adali, Tulay

    UMBC D-CARD DEPARTMENT APPLICATION I, _____________________________(Printed/Typed Name), hereby request a UMBC D-CARD. As a cardholder, I agree to comply with the following terms and conditions related to the use of the card: 1. I understand that I am being delegated the authority to purchase goods

  13. Express Card Department Administrator Authorization Form

    E-print Network

    Tsien, Roger Y.

    Express Card Department Administrator Authorization Form Proposed Department Administrator: NAME required signatures, and either fax the completed form to Express Card Program Administrator X44621 or mail a commitment to the Express Card program and approves participation We are ready to design/follow a process

  14. A Card Trick Gabriela R. Sanchis

    E-print Network

    Sanchis, Gabriela

    A Card Trick Gabriela R. Sanchis Department of Mathematical Sciences Elizabethtown College Elizabethtown, PA 17022 July 3, 2003 1 Introduction Suppose we have a deck of 21 cards that have been arranged in an array of seven rows and three columns. We ask a friend to choose a card and to tell you only which

  15. 31 CFR 8.24 - Enrollment cards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...2012-07-01 2012-07-01 false Enrollment cards. 8.24 Section 8.24 Money and Finance...Enrollment Procedures § 8.24 Enrollment cards. The Director shall issue an enrollment card to each practitioner who is enrolled to...

  16. NISTIR 7284 Personal Identity Verification Card

    E-print Network

    NISTIR 7284 Personal Identity Verification Card Management Report Jim Dray David Corcoran #12;Personal Identity Verification Card Management Report NISTIR 7284 Jim Dray David Corcoran C O M P U T E R William A. Jeffrey, Director #12;Personal Identity Verification Card Management Report REPORTS ON COMPUTER

  17. 31 CFR 8.24 - Enrollment cards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...2013-07-01 2013-07-01 false Enrollment cards. 8.24 Section 8.24 Money and Finance...Enrollment Procedures § 8.24 Enrollment cards. The Director shall issue an enrollment card to each practitioner who is enrolled to...

  18. Implementation of Smart Card Reader using CPLD

    Microsoft Academic Search

    Jayashri Patil

    2009-01-01

    This paper describes the implementation of a Smart Card Reader design with a XC9572 CPLD. Different from most of the software-based smart card reader computer systems, this XC9572 CPLD implementation is a hardware solution. There is no software development needed in this design. This paper explains the low-level protocol of the Smart Card Reader and its implementation.

  19. Cards in the Classroom: Mathematics and Methods.

    ERIC Educational Resources Information Center

    Baker, Robert N.

    This report researches the use of a standard deck of playing cards in entry-level college mathematics classrooms. The study looks at published research on the use of cards, and reviews pedagogic concerns directly related to the implementation of playing cards in the classroom--including the appropriateness of manipulatives, the link to cooperative…

  20. Credit card fraud: awareness and prevention

    Microsoft Academic Search

    Katherine J. Barker; Jackie DAmato; Paul Sheridon

    2008-01-01

    Purpose – To make readers aware of the pervasiveness of credit card fraud and how it affects credit card companies, merchants and consumers. Design\\/methodology\\/approach – A range of recent publications in journals and information from internet web sites provide corroboration and details of how fraudsters are using credit cards to steal billions of dollars each year. Numerous schemes and techniques

  1. Analysis on credit card fraud detection methods

    Microsoft Academic Search

    S. Benson Edwin Raj; A. Annie Portia

    2011-01-01

    Due to the rise and rapid growth of E-Commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In real life, fraudulent

  2. Credit card fraud in Trinidad and Tobago

    Microsoft Academic Search

    Dave Arthur Williams

    2007-01-01

    Purpose – The purpose of this paper is to discuss credit card fraud in Trinidad and Tobago. Design\\/methodology\\/approach – The paper describes credit card typologies in Trinidad and Tobago and the existing law governing such fraud. It outlines the success and inadequacies of the enforcement machinery and issues involving credit card fraud detection and prevention. Findings – The law regarding

  3. Card Game for "Andere Lander, Andere Sitten."

    ERIC Educational Resources Information Center

    American Council on the Teaching of Foreign Languages, New York, NY.

    A card game designed to accompany "Andere Lander, Andere Sitten," a self-instructional unit for second-year high school students of German, is presented. The object of the game is to go through, in the proper order, a day of eating meals while traveling in Germany. There are cards for each event. The rules of the game are presented, and the cards,…

  4. Engineering software development with HyperCard

    NASA Technical Reports Server (NTRS)

    Darko, Robert J.

    1990-01-01

    The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.

  5. Creating Greeting Cards: A Business Brings Pleasure.

    ERIC Educational Resources Information Center

    Ohio State Univ., Columbus. Center for Vocational and Technical Education.

    The learning experiences in the teacher's guide provide second, third, and fourth grade students at the primary level with the opportunity to participate in the creation and production of greeting cards. Students explore different kinds of cards and become involved in the production process of a simulated greeting card company. They learn about…

  6. Comparing Candidate Hospital Report Cards

    SciTech Connect

    Burr, T.L.; Rivenburgh, R.D.; Scovel, J.C.; White, J.M.

    1997-12-31

    We present graphical and analytical methods that focus on multivariate outlier detection applied to the hospital report cards data. No two methods agree which hospitals are unusually good or bad, so we also present ways to compare the agreement between two methods. We identify factors that have a significant impact on the scoring.

  7. CARD No. 27 Peer Review

    E-print Network

    CARD No. 27 Peer Review 27.A.1 BACKGROUND The Compliance Criteria require DOE to conduct peer Certification Application (CCA) (61 FR 5228). EPA imposed specific requirements for the conduct of peer review. These requirements are intended to ensure that EPA can be satisfied that the peer review processes at WIPP

  8. ICAR: Identity Card Automatic Reader

    Microsoft Academic Search

    Josep Lladós; Felipe Lumbreras; Vicente Chapaprieta; Joan Queralt

    2001-01-01

    This paper describes the ICAR system, an application for automatic reading of identity cards and passports. The system acquires the image of the document by a flatbed scanner and recognizes the type of the document among a set of predefined models using color information. Textual fields are located in the image by a connected component analysis and identified in terms

  9. Bus-Programmable Slave Card

    NASA Technical Reports Server (NTRS)

    Hall, William A.

    1990-01-01

    Slave microprocessors in multimicroprocessor computing system contains modified circuit cards programmed via bus connecting master processor with slave microprocessors. Enables interactive, microprocessor-based, single-loop control. Confers ability to load and run program from master/slave bus, without need for microprocessor development station. Tristate buffers latch all data and information on status. Slave central processing unit never connected directly to bus.

  10. ATLAS Tile Calorimeter Interface Card

    E-print Network

    -1- ATLAS Tile Calorimeter Interface Card K. Anderson, A. Gupta, J. Pilcher, H. Sanders, F. Tang, R. Teuscher, H. Wu The University of Chicago ABSTRACT This paper describes the ATLAS Tile Calorimeter. OVERVIEW The ATLAS Tile Calorimeter (Tilecal) [1] [Figure 1] front end electronics consists of 4 parts, 3in

  11. Review of Sound Card Photogates

    ERIC Educational Resources Information Center

    Gingl, Zoltan; Mingesz, Robert; Makra, Peter; Mellar, Janos

    2011-01-01

    Photogates are probably the most commonly used electronic instruments to aid experiments in the field of mechanics. Although they are offered by many manufacturers, they can be too expensive to be widely used in all classrooms, in multiple experiments or even at home experimentation. Today all computers have a sound card--an interface for analogue…

  12. Rule It Out: Sorting Math Cards

    NSDL National Science Digital Library

    TERC

    2010-01-01

    In this activity, learners will identify what a group of math fact cards has in common. Covering the subjects of arithmetic, logic and number patterns, each group spreads out their cards, problem side up. Groups pick a Leader. The Leader secretly decides on a category that fits some—but not all—the cards. Then the Leader starts a column with two cards that fit the category, and then starts another column with two cards that don’t. Available as a web page and downloadable pdf.

  13. Regional medical information network using optical memory cards and integrated services for digital network.

    PubMed

    Ogushi, Y; Misawa, T; Hayashi, Y; Ohta, Y; Suzuki, S; Horie, M; Sakashita, Y

    1995-01-01

    Since 1986, we have been developing a regional health and welfare system using optical memory cards. We have expanded the system and performed model experiments and evaluations this time. There are approximately 3000 card-holders and 23 card-reader terminals in use. They cover 50 percent of the medical facilities in the city of Isehara. Two medical clinics within neighboring cities have joined our project. Standard Deviation Index (SDI) has been introduced to standardize the numeric results of examinations. The terminals are connected with Integrated Services for Digital Network (ISDN) allowing remote access to the optical memory cards. This enhanced connectivity has allowed greater cooperation in delivering quality medical services. PMID:8591493

  14. Information Access and Privacy Protection Office

    E-print Network

    deYoung, Brad

    for securing personal information: once you send an email, you've lost control of it. o an emailed message can. In terms of privacy risks like unauthorized access, credit card numbers and social insurance numbersInformation Access and Privacy Protection Office I A P P Guidelines for Using Personal Information

  15. Subject Access in the Small Library.

    ERIC Educational Resources Information Center

    Turock, Betty J.; Shelton, Hildred C.

    This pilot study on the subject access problems of patrons of small to medium size libraries was designed to measure the extent to which users' vocabularies matched the search vocabulary of bibliographic records in the card catalog, and to enhance subject access by develooping a microcomputer system which integrated Library of Congress Subject…

  16. Abstract--In this paper a Call Admission Control (CAC) scheme for Voice over Internet Protocol (VoIP) over a Wireless

    E-print Network

    (VoIP) over a Wireless Local Area Network (WLAN) is proposed. The CAC scheme is based on the Endpoint were made under various network configurations. Index Terms--Voice over IP (VoIP), Wireless Local Area encountered in VoIP limits the number of VoIP calls to a very low number. Experiments in [1] show that an 802

  17. CARD: Canadian Archaeological Radiocarbon Database

    NSDL National Science Digital Library

    Hosted by the Canadian Archaeological Association and maintained by Dr. Richard Morlan of the Canadian Museum of Civilization (see the April 21, 1998 Scout Report for Social Sciences), the Canadian Archaeological Radiocarbon Database (CARD) is a new online "compilation of radiocarbon measurements that indicate the ages of archaeological and vertebrate palaeontological sites in Canada." Users may conduct cross-field searches of the database by Borden block, Borden number, site name, province, laboratory number, material dated, cultural affiliation, or range of dates. Database queries yield full data on radiocarbon (carbon-14) measurements, including provenience, taxon information, and comments. In addition, the site explains the basic principles of radiocarbon dating, the technical issues affecting the technique, and how the database was compiled. The entire CARD site is also available in French.

  18. Mitosis and Meiosis Card Sort

    NSDL National Science Digital Library

    Ingrid Waldron

    This minds-on activity is designed to help students review the processes of mitosis and meiosis and to ensure that students understand how chromosomes move during mitosis vs. meiosis. Students arrange the cards from a shuffled deck of the stages of mitosis and meiosis in the sequence of steps that occur during cell division by mitosis and another sequence of steps that occur during cell division by meiosis.

  19. Card counting in continuous time

    Microsoft Academic Search

    Patrik Andersson

    2012-01-01

    We consider the problem of finding an optimal betting strategy for a\\u000ahouse-banked casino card game that is played for several coups before\\u000areshuffling. The sampling without replacement makes it possible to take\\u000aadvantage of the changes in the expected value as the deck is depleted, making\\u000alarge bets when the game is advantageous. Using such a strategy, which is

  20. A cost-effective add-on-value card-assisted firewall over Taiwan's NHI VPN framework.

    PubMed

    Huang, Jyh-Win; Hou, Ting-Wei

    2007-06-01

    Besides the overall budget for building the infrastructure of a healthcare-service-based virtual private network (VPN) in Taiwan, two issues were considered critical for its acceptance by the country's 17,000 plus medical institutions. One was who was to pay for the network (ADSL or modem) connection fee; the other was who was to pay for the firewall/anti-virus software. This paper addresses the second issue by proposing an efficient freeware firewall, named card-assisted firewall (CAF), for NHI VPN edge-hosts, which is also an add-on-value application of the National Healthcare IC card that every insurant and medical professional has. The innovative concept is that any NHI VPN site (edge-host) can establish diversified secure-authenticated connections with other sites only by an authentication mechanism, which requires a NHI Java card state machine and the Access Control List of the host. It is different from two-factor authentication cards in four ways: (1) a PIN code is not a must; (2) it requires authentication with the remote IC card Data Centre; (3) the NHI cards are already available, no modification is needed, and there is no further cost for the deployment of the cards; (4) although the cards are in the reader, the communication cannot start unless the cards are in the corresponding states; i.e. the states allow communication. An implementation, on a Microsoft Windows XP platform, demonstrated the system's feasibility over an emulation of the NHI VPN framework. It maintained a high line speed, the driver took up 39 KB of disk space, installation was simple, not requiring any extra hardware or software, and the average packet processing time of the CAF driver measured was 0.3084 ms. The average overhead in comparing the Access Control List predefined routing in card, in an FTP testing experiment, was 5.7 micros (receiving) and 8 micros (sending). PMID:17541860

  1. TCES. Time Card Entry System

    SciTech Connect

    Montierth, B. [Lockheed Martin Idaho Technologies, Idaho Falls, ID (United States)

    1996-05-01

    The Time Card Entry System was developed for the Department of Enegy, Idaho Operations Office (DOE-ID) to interface with the DOE headquarters (DOE-HQ) Electronic Time and Attendance (ETA) system for payroll. It features pop-up window pick lists for Work Breakdown Structure numbers and Hour Codes and has extensive processing that ensures that time and attendance reported by the employee fulfills U.S. Government/OMB requirements before Timekeepers process the data at the end of the two week payroll cycle using ETA. A tour of duty profile (e.g., ten hour day, four day week with Sunday, friday and Saturday off), previously established in the ETA system, is imported into the Time Card Entry System by the timekeepers. An individual`s profile establishes the basis for validation of time of day and number of hours worked per day. At the end of the two cycle, data is exported by the timekeepers from the Time Card Entry System into ETA files.

  2. Web Accessibility Accessibility

    E-print Network

    Oklahoma, University of

    Web Accessibility #12;Accessibility Webaim This is a pre-y prolific site that vary based on the type of web content. StaFc, content managed and dynamic web sites can benefit from our accessibility review service. Rich media

  3. FRAP CARD PROGRAM FISCAL YEAR 14/15 Policies & Procedures

    E-print Network

    Qian, Ning

    FRAP CARD PROGRAM ­ FISCAL YEAR 14/15 Policies & Procedures The FRAP Card The FRAP Card is a university purchasing card exclusively for use in the Arts & Sciences Faculty Research Allocation Program (FRAP). The card can be used for most FRAP purchases, including, but not limited to, air and ground

  4. On the design of an embedded biometric smart card reader

    Microsoft Academic Search

    Dong-Sun Kim; Seung-Yerl Lee; Byung-Soo Kim; Sung-Chul Lee; Duck-Hin Chung

    2008-01-01

    In this paper, a highly reliable embedded biometric smart card system with cryptography engine is proposed. We explain the system architecture of portable embedded biometric smart card reader to strengthen security for various consumer applications such as mobile cash card. Proposed biometric smart card system is embedded with 75 MHz 32-bit RISC, 6 channel smart card controller and advanced encryption

  5. Securing credit card transactions with one-time payment scheme

    Microsoft Academic Search

    Yingjiu Li; Xinwen Zhang

    2005-01-01

    Traditional credit card payment is not secure against credit card frauds because an attacker can easily know a semi- secret credit card number that is repetitively used. Recently one-time transaction number has been proposed by some researchers and credit card companies to enhance the security in credit card payment. Following this idea, we present a practical security enhancement scheme for

  6. 3/29/2011Accounting Services Procurement Card Program

    E-print Network

    Services 2 MasterCard credit card Issued by JPMorganChase PaymentNet #12;Topics of Discussion 3: http://www.northwestern.edu/auditing/how/fraud.html #12;Card Restrictions 3/29/2011Accounting Services;Refusal of Card 3/29/2011Accounting Services 16 Check card limits & available credit Contact Procurement

  7. Contactless Payment Systems: Credit Cards and NFC Phones

    E-print Network

    Gutmann, Peter

    to Consumers" #12;Banks Credit Cards (ctd) Entry barriers to credit card fraud are very low, and thereContactless Payment Systems: Credit Cards and NFC Phones Peter Gutmann University of Auckland as a standard credit-card payment mechanism running over RFID/NFC transport · US: Magstripe card data dump

  8. The smart card: don't leave home without it

    Microsoft Academic Search

    Dirk Husemann

    1999-01-01

    The author introduces smart cards, discussing both their background and where they're headed in the future. The term smart card generally refers to a plastic card the size of an ordinary credit card with a chip that holds a microprocessor and a data-storage unit. Developers hope smart cards will combine conventional identification documents with an electronic purse and a bank

  9. Automatic information retrieval of Chinese business card

    NASA Astrophysics Data System (ADS)

    Shi, GuangShun; Pan, Wumo; Jin, Jianming

    2003-01-01

    Document image understanding techniques have been widely used in many application domains. Various kinds of documents have been researched and different methods are developed for information retrieval purpose. In this paper we present a practical method to extract information items from Chinese business card. Before retrieval information in business card, the image of business card had been segmented into little text regions and each text region had been recognized. Because the typeset of business card is variable, and both English and Chinese characters are used, so there are errors in segmentation and recognition result. We focus on building a robust model that can tolerate errors and extract syntax pattern of each text lines in business card, which using both layout information and logical information. By this model, many errors will be identified and adjusted. Finally, correct property will be assigned to each text region in business card, and recognition errors will be corrected.

  10. Personal medical information system using laser card

    Microsoft Academic Search

    Seong H. Cho; Keun H. Kim; Hyung-Sik Choi; Hyun W. Park

    1996-01-01

    The well-known hospital information system (HIS) and the picture archiving and communication system (PACS) are typical applications of multimedia to medical area. This paper proposes a personal medical information save-and-carry system using a laser card. This laser card is very useful, especially in emergency situations, because the medical information in the laser card can be read at anytime and anywhere

  11. Optical smart card using semipassive communication

    NASA Astrophysics Data System (ADS)

    Glaser, I.; Green, Shlomo; Dimkov, Ilan

    2006-03-01

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  12. Star Deck, Constellations cards and games

    NSDL National Science Digital Library

    Introduces students to constellations. Each card is one constellation and each is color coded by season. They fit on 4x6 index cards for handling/play. A guide to the constellations is included which discusses the origin, myths, and astronomical points of interest in each. There are numerous ways to use them in a class. Example: 52 constellations visible in N. Hemisphere, 52 cards with 4 suites (seasons), 3 facecards for each season (zodiac). Game suggestions are included at the site.

  13. A Report on the Loading of MARC Format Bibliographic Records into HyperCard.

    ERIC Educational Resources Information Center

    Rosenberg, Jason B.; Borgman, Christine L.

    1991-01-01

    Outlines a process for downloading MARC format bibliographic data into a form readable for an Apple Macintosh computer running HyperCard software. Loading procedures for two data sources--an OCLC format tape and records from UCLA's ORION public access catalog--are discussed, and the use of a minicomputer system is considered. (eight references)…

  14. The Social Meanings of the C-Card Scheme: The Importance of Friends and Peers

    ERIC Educational Resources Information Center

    Cheetham, Mandy

    2014-01-01

    This paper draws on findings from an analysis of interviews with young people aged 14-18 years, to explore the peer influences in young people's informal social networks which can affect their access to sexual health services. The research focuses on the social meanings of a C-Card condom distribution scheme in North East England. Such…

  15. CARD No. 51/52 Consideration of Protected Individual/Exposure Pathways

    E-print Network

    CARD No. 51/52 Consideration of Protected Individual/Exposure Pathways 51.A.1 BACKGROUND that separates the WIPP repository area from the accessible environment. That is, they restrict to very low making use of that water. Sections 194.51 and 194.52 provide 51-1 #12;specific directives for how those

  16. System of nano-silver inkjet printed memory cards and PC card reader and programmer

    Microsoft Academic Search

    Henrik Andersson; Alexandru Rusu; Anatoliy Manuilskiy; Stefan Haller; Suat Ayöz; Hans-Erik Nilsson

    2011-01-01

    This work describes the development of inkjet printed, low-cost memory cards, and complementary pair of memory card reader and card reader\\/programmer for PCs. This constitutes a complete system that can be used for various applications. The memory cards are manufactured by inkjet printing nano-silver ink on photo paper substrate. The printed memory structures have an initial high resistance that can

  17. [On standardization of optical memory cards].

    PubMed

    Tofukuji, I

    2000-10-01

    An optical card optimizes recording of medical data since it has a large memory capacity, data cannot be interpolated by the addition method, and data are protected from disruption by magnetic force or static electricity. Now that international standards have been established for the card, reader/writer control, and data management, a highly-compatible optical card system for medical use can be fabricated. The optical card is expected to play an important role in the social system as a promising medium for recording or exchanging individual health data, which is anticipated to grow in the near future. PMID:11215103

  18. CardS4: Modal Theorem Proving on Java Rajeev Prabhakar Gor e + and Phuong Th e Nguy en #

    E-print Network

    Goré, Rajeev

    ­ ROM) on the card itself. A card reader/writer is required to provide power to the card, to provideCardS4: Modal Theorem Proving on Java Smartcards Rajeev Prabhakar Gorâ?? e + and Phuong Thâ?? e Nguy that runs on a Java smart card with only 512 KBytes of RAM and 32KBytes of EEPROM. Since proof search in S4

  19. Campus Courtesy Card Order Form Campus Courtesy cards are available to private individuals only. BYU Departments must contact Treasury Services,

    E-print Network

    Martinez, Tony R.

    , etc. For more information on Signature Card locations, visit http@byu.edu OR print and mail to: BYU Signature Card Office 2310 WSC Provo, UT 84602 · Contact Information: Name: Phone of Cards X $0.50 + Total Amount) · Payment Options: Check Credit Card Check must be received before card

  20. Providing Mobile LAN Access Capability for Bluetooth Devices

    Microsoft Academic Search

    Shih-yen Chiu; Hsung-pin Chang; Ruei-chuan Chang

    2002-01-01

    In this paper, we design and implement a Bluetooth system with mobile LAN access capability. First, by adding a virtual network interface card (NIC) driver between IP and Bluetooth protocol stack, Bluetooth users can use their Bluetooth devices to access the LAN resources via the Bluetooth access points. Besides, to accommodate with the mobility characteristics in Bluetooth network, we also

  1. Instructions for printing fact cards.docx Instructions for printing UW Fact Cards

    E-print Network

    Van Volkenburgh, Elizabeth

    Instructions for printing fact cards.docx Instructions for printing UW Fact Cards 1. Obtain Avery of this page. 3. From the browser top menu choose "File" then select "Print." 4. Select printer of choice (the cards are intended to be printed in color) 5. As necessary, modify your printer "Properties" to allow

  2. Realization of high speed mass storage Data Record Card with CF Card and SDRAM

    Microsoft Academic Search

    Qiao Liyan; Xu Hongwei

    2010-01-01

    This paper presents a design that realizes a dual-channel Data Record Card which achieves 33 MB\\/s data transfer rate and 4 GB capacity per channel with CF Card and SDRAM. According to the characteristics of data transfer with CF Card, an advanced data transfer method is provided, which reduces the requirements of memory resources in FPGA without influencing the data

  3. The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand

    ERIC Educational Resources Information Center

    Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David

    2010-01-01

    The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year 1 New…

  4. Electronic Access Control Getting Started A member of the Access Control Unit will meet with you and provide a

    E-print Network

    Liu, Taosheng

    Electronic Access Control ­ Getting Started Evaluation A member of the Access Control Unit, an outside contractor may be used to some extent. All access control equipment (card readers, controllers. During the installation phase, an authorized building contact must be appointed. Each unit should

  5. 46 CFR 154.1814 - Cargo information cards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...2010-10-01 false Cargo information cards. 154.1814 Section 154.1814 ...Operations § 154.1814 Cargo information cards. (a) No person may operate a vessel unless a cargo information card for each cargo being transported...

  6. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...false Northern Marianas identification card. 235.9 Section 235.9 Aliens...9 Northern Marianas identification card. During the two-year period that...issued Northern Marianas Identification Cards to aliens who acquired United...

  7. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...false Northern Marianas identification card. 1235.9 Section 1235.9 Aliens...9 Northern Marianas identification card. During the two-year period that...issued Northern Marianas Identification Cards to aliens who acquired United...

  8. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...false Northern Marianas identification card. 1235.9 Section 1235.9 Aliens...9 Northern Marianas identification card. During the two-year period that...issued Northern Marianas Identification Cards to aliens who acquired United...

  9. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...false Northern Marianas identification card. 235.9 Section 235.9 Aliens...9 Northern Marianas identification card. During the two-year period that...issued Northern Marianas Identification Cards to aliens who acquired United...

  10. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 2010-04-01 false Identification cards required. 112.41 Section 112.41 Customs...CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards required. A port director may...

  11. 78 FR 17183 - Information Collection: Grey Towers Visitor Comment Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-20

    ...Collection: Grey Towers Visitor Comment Card AGENCY: Forest Service, USDA. ACTION...0222, ``Grey Towers Visitor Comment Card'' with 0596-0226, ``Forest Service...INFORMATION: Title: Grey Towers Visitor Comment Card. OMB Number: 0596-0222....

  12. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 2011-04-01 false Identification cards required. 112.41 Section 112.41 Customs...CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards required. A port director may...

  13. 8 CFR 1212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... false Border crossing identification cards. 1212.6 Section 1212.6 Aliens...1212.6 Border crossing identification cards. (a) Application for Form DSP-150, B-1/B-2 Visa and Border Crossing Card, issued by the Department of...

  14. 19 CFR 112.42 - Application for identification card.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 false Application for identification card. 112.42 Section 112.42 Customs Duties...CARTMEN, AND LIGHTERMEN Identification Cards § 112.42 Application for identification card. An application for an...

  15. 19 CFR 112.42 - Application for identification card.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 false Application for identification card. 112.42 Section 112.42 Customs Duties...CARTMEN, AND LIGHTERMEN Identification Cards § 112.42 Application for identification card. An application for an...

  16. 46 CFR 154.1814 - Cargo information cards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...2011-10-01 false Cargo information cards. 154.1814 Section 154.1814 ...Operations § 154.1814 Cargo information cards. (a) No person may operate a vessel unless a cargo information card for each cargo being transported...

  17. A Card Trick and the Mathematics behind It

    ERIC Educational Resources Information Center

    Sanchis, Gabriela R.

    2006-01-01

    We describe a card trick in which the magician is able to identify correctly a card chosen randomly from an array of cards by a member of the audience. We then explore the mathematics behind the trick.

  18. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 2013-04-01 false Identification cards required. 112.41 Section 112.41 Customs...CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards required. A port director may...

  19. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...false Northern Marianas identification card. 1235.9 Section 1235.9 Aliens...9 Northern Marianas identification card. During the two-year period that...issued Northern Marianas Identification Cards to aliens who acquired United...

  20. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 2014-04-01 false Identification cards required. 112.41 Section 112.41 Customs...CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards required. A port director may...

  1. 8 CFR 1212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... false Border crossing identification cards. 1212.6 Section 1212.6 Aliens...1212.6 Border crossing identification cards. (a) Application for Form DSP-150, B-1/B-2 Visa and Border Crossing Card, issued by the Department of...

  2. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... false Border crossing identification cards. 212.6 Section 212.6 Aliens...212.6 Border crossing identification cards. (a) Application for Form DSP-150, B-1/B-2 Visa and Border Crossing Card, issued by the Department of...

  3. 19 CFR 112.41 - Identification cards required.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 2012-04-01 false Identification cards required. 112.41 Section 112.41 Customs...CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.41 Identification cards required. A port director may...

  4. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...false Northern Marianas identification card. 235.9 Section 235.9 Aliens...9 Northern Marianas identification card. During the two-year period that...issued Northern Marianas Identification Cards to aliens who acquired United...

  5. 8 CFR 1212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... false Border crossing identification cards. 1212.6 Section 1212.6 Aliens...1212.6 Border crossing identification cards. (a) Application for Form DSP-150, B-1/B-2 Visa and Border Crossing Card, issued by the Department of...

  6. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...false Northern Marianas identification card. 235.9 Section 235.9 Aliens...9 Northern Marianas identification card. During the two-year period that...issued Northern Marianas Identification Cards to aliens who acquired United...

  7. 19 CFR 112.42 - Application for identification card.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 false Application for identification card. 112.42 Section 112.42 Customs Duties...CARTMEN, AND LIGHTERMEN Identification Cards § 112.42 Application for identification card. An application for an...

  8. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... false Border crossing identification cards. 212.6 Section 212.6 Aliens...212.6 Border crossing identification cards. (a) Application for Form DSP-150, B-1/B-2 Visa and Border Crossing Card, issued by the Department of...

  9. 8 CFR 235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...false Northern Marianas identification card. 235.9 Section 235.9 Aliens...9 Northern Marianas identification card. During the two-year period that...issued Northern Marianas Identification Cards to aliens who acquired United...

  10. 8 CFR 1212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... false Border crossing identification cards. 1212.6 Section 1212.6 Aliens...1212.6 Border crossing identification cards. (a) Application for Form DSP-150, B-1/B-2 Visa and Border Crossing Card, issued by the Department of...

  11. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...false Northern Marianas identification card. 1235.9 Section 1235.9 Aliens...9 Northern Marianas identification card. During the two-year period that...issued Northern Marianas Identification Cards to aliens who acquired United...

  12. 19 CFR 112.42 - Application for identification card.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false Application for identification card. 112.42 Section 112.42 Customs Duties...CARTMEN, AND LIGHTERMEN Identification Cards § 112.42 Application for identification card. An application for an...

  13. 8 CFR 1235.9 - Northern Marianas identification card.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...false Northern Marianas identification card. 1235.9 Section 1235.9 Aliens...9 Northern Marianas identification card. During the two-year period that...issued Northern Marianas Identification Cards to aliens who acquired United...

  14. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... false Border crossing identification cards. 212.6 Section 212.6 Aliens...212.6 Border crossing identification cards. (a) Application for Form DSP-150, B-1/B-2 Visa and Border Crossing Card, issued by the Department of...

  15. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...Governmentwide commercial purchase card. (c) HUD's procedures concerning...government-wide commercial purchase card are contained in its Handbook on the Government-wide Commercial Credit Card Program. [60 FR 46155,...

  16. 48 CFR 13.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...using the Governmentwide commercial purchase card shall establish procedures for use and control of the card that comply with the Treasury Financial...terms and conditions of the current GSA credit card contract. Agency procedures should...

  17. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...Governmentwide commercial purchase card. (c) HUD's procedures concerning...government-wide commercial purchase card are contained in its Handbook on the Government-wide Commercial Credit Card Program. [60 FR 46155,...

  18. 48 CFR 13.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...using the Governmentwide commercial purchase card shall establish procedures for use and control of the card that comply with the Treasury Financial...terms and conditions of the current GSA credit card contract. Agency procedures should...

  19. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...2013-10-01 2013-10-01 false Tabulating machine cards. 908.7117 Section 908.7117...Special Items 908.7117 Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  20. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...2011-10-01 2011-10-01 false Tabulating machine cards. 908.7117 Section 908.7117...Special Items 908.7117 Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  1. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...2010-10-01 2010-10-01 false Tabulating machine cards. 908.7117 Section 908.7117...Special Items 908.7117 Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  2. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...2014-10-01 2014-10-01 false Tabulating machine cards. 908.7117 Section 908.7117...Special Items 908.7117 Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  3. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...2012-10-01 2012-10-01 false Tabulating machine cards. 908.7117 Section 908.7117...Special Items 908.7117 Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  4. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 2012-07-01 false Tabulating machine cards. 101-26.509 Section 101-26...Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance...

  5. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...restrictions apply to credit card purchases that apply...appropriate office purchase card administrator, who will...Appropriations Law. This document must be consulted when...Office/Agency Purchase/Credit Card Program procedures. A...

  6. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...restrictions apply to credit card purchases that apply...appropriate office purchase card administrator, who will...Appropriations Law. This document must be consulted when...Office/Agency Purchase/Credit Card Program procedures. A...

  7. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...restrictions apply to credit card purchases that apply...appropriate office purchase card administrator, who will...Appropriations Law. This document must be consulted when...Office/Agency Purchase/Credit Card Program procedures. A...

  8. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...restrictions apply to credit card purchases that apply...appropriate office purchase card administrator, who will...Appropriations Law. This document must be consulted when...Office/Agency Purchase/Credit Card Program procedures. A...

  9. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...restrictions apply to credit card purchases that apply...appropriate office purchase card administrator, who will...Appropriations Law. This document must be consulted when...Office/Agency Purchase/Credit Card Program procedures. A...

  10. One card that does it all! A 49er ID card allows access to

    E-print Network

    Chen, Keh-Hsun

    Services, Parking and Transportation Services, Atkins Library, REPROS copy center, copiers and pay- for." · Via one of four VTS machines, located on the first and second floors of Atkins Library, Barnard and weekend dining · Favorite Flavors: Many popular, national brands · Diet Preferences: Vegetarian, vegan

  11. The Nation's Report Card: Science

    NSDL National Science Digital Library

    2001-01-01

    In late 2001, this report was released from the National Center for Education Statistics (NCES). The Nation's Report Card: Science 2000, gives the results of a survey by the National Assessment of Educational Progress (NAEP) showing, "on average, what students know and can do" in science. NAEP reports that fourth-graders' and eighth-graders' scores were largely unchanged since 1996, but that twelfth-graders' scores declined three points. The site offers links to various data: national results, state results, subgroup results, and much more.

  12. Flexible Peripheral Component Interconnect Input/Output Card

    NASA Technical Reports Server (NTRS)

    Bigelow, Kirk K.; Jerry, Albert L.; Baricio, Alisha G.; Cummings, Jon K.

    2010-01-01

    The Flexible Peripheral Component Interconnect (PCI) Input/Output (I/O) Card is an innovative circuit board that provides functionality to interface between a variety of devices. It supports user-defined interrupts for interface synchronization, tracks system faults and failures, and includes checksum and parity evaluation of interface data. The card supports up to 16 channels of high-speed, half-duplex, low-voltage digital signaling (LVDS) serial data, and can interface combinations of serial and parallel devices. Placement of a processor within the field programmable gate array (FPGA) controls an embedded application with links to host memory over its PCI bus. The FPGA also provides protocol stacking and quick digital signal processor (DSP) functions to improve host performance. Hardware timers, counters, state machines, and other glue logic support interface communications. The Flexible PCI I/O Card provides an interface for a variety of dissimilar computer systems, featuring direct memory access functionality. The card has the following attributes: 8/16/32-bit, 33-MHz PCI r2.2 compliance, Configurable for universal 3.3V/5V interface slots, PCI interface based on PLX Technology's PCI9056 ASIC, General-use 512K 16 SDRAM memory, General-use 1M 16 Flash memory, FPGA with 3K to 56K logical cells with embedded 27K to 198K bits RAM, I/O interface: 32-channel LVDS differential transceivers configured in eight, 4-bit banks; signaling rates to 200 MHz per channel, Common SCSI-3, 68-pin interface connector.

  13. The IBM 2560 multi-function card machine

    Microsoft Academic Search

    Chester E. Spurrier

    1966-01-01

    The IBM 2560 Multi-Function Card Machine (MFCM) provides the System\\/360 Model 20 with a unique and versatile input\\/output capability. It combines the facilities of a card reader, card punch, collator, interpreter, and card document printer, all under control of the Model 20 processor. (See Fig. 1.) Two card hoppers, an optical read station that reads both primary and secondary cards,

  14. Student Organizations Credit Card Policy There are a limited number of credit cards available for club use. These cards may be

    E-print Network

    Hartman, Chris

    Student Organizations Credit Card Policy There are a limited number of credit cards available club members on the Account Signers form may check out a credit card. The student organizations credit with the student organizations credit card with the permission of the fiscal technician. Written justification

  15. Improved reader for magnetically-encoded ID cards

    NASA Technical Reports Server (NTRS)

    Wu, T. T.

    1979-01-01

    Hybrid demodulator in electronic card reader for magnetically encoded identification cards, accommodates variations in insertion speeds, yet is simpler and less expensive than equivalent all-digital circuits.

  16. UNIVERSITY OF MARYLAND, BALTIMORE Corporate Purchasing Card

    E-print Network

    Weber, David J.

    Catalog UNIVERSITY OF MARYLAND, BALTIMORE q Corporate Purchasing Card Program User's Guide 1 Revised as of 6/04/2013 #12;UNIVERSITY OF MARYLAND, BALTIMORE CORPORATE PURCHASING CARD (CPC) USER'S GUIDE. HELPFUL HINTS Page 14 11.1 Frequently Asked Questions 3 Revised as of 6/04/2013 #12;UNIVERSITY OF MARYLAND

  17. Designing More Effective Accountability Report Cards

    ERIC Educational Resources Information Center

    Sabbah, Faris M.

    2011-01-01

    The purpose of this study was to identify and design standards and procedures for creating easily interpreted accountability reports cards, consistent with the requirements spelled out in the No Child Left Behind Act of 2001 (NCLB). The use of public report cards was first raised during the debate that took place immediately prior to the passage…

  18. High speed synchronizer card utilizing VLSI technology

    NASA Technical Reports Server (NTRS)

    Speciale, Nicholas; Wunderlich, Kristin

    1988-01-01

    A generic synchronizer card capable of providing standard NASA communication block telemetry frame synchronization and quality control was fabricated using VLSI technology. Four VLSI chip sets are utilized to shrink all the required functions into a single synchronizer card. The application of VLSI technology to telemetry systems resulted in an increase in performance and a decrease in cost and size.

  19. A photoconductive sensor for card readers

    Microsoft Academic Search

    F. V. Shallcross; W. S. Pike; P. K. Weimer; G. M. Fryszman

    1970-01-01

    An experimental thin-film CdS:CdSe photoconductordiode array having 80 × 12 elements has been fabricated by vacuum deposition on a single 4 × 8 inch substrate. Element spacing is the same as the hole positions in a standard computer punched card. Possible applications include static and dynamic card readers.

  20. Cognitive Credit Cards: Acquiring Learning Strategies.

    ERIC Educational Resources Information Center

    Edmunds, Alan L.

    1999-01-01

    Describes the Cognitive Credit Card, an individualized approach to helping students with learning disabilities select and apply appropriate learning strategies. The CCC is a credit card-sized laminated set of cognitive or metacognitive cues for a specific topic. Feedback from students, teachers, and parents has been highly positive. (DB)

  1. College Student Performance and Credit Card Usage.

    ERIC Educational Resources Information Center

    Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd Starr

    2001-01-01

    Examines the relationship between credit card usage, employment, and academic performance among a group of college students with credit cards. Results reveal that the students differed significantly in the level of anxiety felt from carrying debt, perceived need to work, and perceived impact of employment on academic performance. (Contains 57…

  2. Corporate Card Application Instructions Employee Information

    E-print Network

    Almor, Amit

    NumberSocial Security Number (required) ­ Employee SSN 4. Date of BirthDate of BirthDate of BirthCorporate Card Application Instructions Employee Information 1. b NameNameNameName (required) ­ Fill in name as cardholder wants it to appear on card. 2. b Employee IDEmployee IDEmployee IDEmployee

  3. The Ornery American: Orson Scott Card

    ERIC Educational Resources Information Center

    Oatman, Eric

    2008-01-01

    This article profiles Orson Scott Card, the winner of this year's Margaret A. Edwards Award for his outstanding contributions to teen literature, specifically for Ender's Game and Ender's Shadow (1999, both Tor), a companion tale. Card, the magician behind both of these best sellers, is one of the nation's most prolific--and contentious--authors.…

  4. Fuzzy Darwinian Detection of Credit Card Fraud

    Microsoft Academic Search

    Peter J. Bentley; Jungwon Kim; Gil-Ho Jung; Jong-Uk Choi

    Credit evaluation is one of the most important and difficult tasks for credit card companies, mortgage companies, banks and other financial institutes. Incorrect credit judgement causes huge financial losses. This work describes the use of an evolutionary-fuzzy system capable of classifying suspicious and non-suspicious credit card transactions. The paper starts with the details of the system used in this work.

  5. Analysis of Credit Card Fraud Detection Methods

    Microsoft Academic Search

    V. Dheepa; R. Dhanapal

    2009-01-01

    Along with the great increase in credit card transactions, credit card fraud has become increasingly rampant in recent years. In Modern day the fraud is one of the major causes of great financial losses, not only for merchants, individual clients are also affected. Three methods to detect fraud are presented. Firstly, clustering model is used to classify the legal and

  6. Telecommunications GETS Calling Card/WPS

    E-print Network

    Telecommunications GETS Calling Card/WPS GETS - A Calling Card that allows you to make calls on a land-line phone during an emergency situation when the phone lines are congested. WPS - Wireless://telecom.tamu.edu for assistance. Item # Service Add, Move, Change, or Disconnect Cellular Number for WPS User Name On a Stipend

  7. Re-Designing Business Card Advertisements.

    ERIC Educational Resources Information Center

    Schaub, Laura

    2001-01-01

    Discusses ways to turn information from a business card into an advertisement to be placed in a student publication. Addresses visual interest, typography, and other design issues. Includes several sample advertisements and a classroom activity involving redesigning a business card into an advertisement. (RS)

  8. DNA smart card for financial transactions

    Microsoft Academic Search

    Sofia Gleni; Panagiotis Petratos

    2004-01-01

    In this paper, a secure environment for electronic commerce is introduced. The environment is formed via a synthesis of biometrics consumer authentication with a security token. Such a token is a smart card containing cryptographic keys and a cryptographic microprocessor for data encryption. The keys are used to further authenticate the possessor of the card as the actual owner and

  9. The Bad Guys: Landscape Pest ID Cards

    NSDL National Science Digital Library

    0000-00-00

    Thirty common landscape pests are presented on summary cards containing identification, host range, life cycle, related species, and other information. Information is sound. Emphasis on biological control and tolerance of pests causing only cosmetic damage is good. Physical cards with the same information on them as this electronic version can be purchased.

  10. Establishing a Successful Smart Card Program.

    ERIC Educational Resources Information Center

    Wiens, Janet

    2001-01-01

    Discusses how to run a successful smart card program through a comprehensive approach that includes a detailed plan for the present and future, high level support from school administration, and extensive user input. Florida State University is used to illustrate a successfully implemented smart card program. (GR)

  11. An Excel-lent Card Trick

    ERIC Educational Resources Information Center

    Zullo, Holly S.

    2011-01-01

    Card tricks based on mathematical principles can be a great way to get students interested in exploring some important mathematical ideas. In this article, the author discusses a simple spreadsheet implementation that shows students why the card trick works and allows them to explore several variations. As an added bonus, students are introduced…

  12. Smart-card traffic system keeps Singapore

    E-print Network

    Hunt, Julian

    Smart-card traffic system keeps Singapore in the fast lane Sir -- Recognizing the high economic tariffs from a smart card installed in a slot near the vehicle's windscreen. Infringement is registered. For expressways and approach routes leading to the city, a tiered pricing scheme operates during the peak period

  13. In Brief: Arctic Report Card

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2009-11-01

    The 2009 annual update of the Arctic Report Card, issued on 22 October, indicates that “warming of the Arctic continues to be widespread, and in some cases dramatic. Linkages between air, land, sea, and biology are evident.” The report, a collaborative effort of 71 national and international scientists initiated in 2006 by the Climate Program Office of the U.S. National Oceanic and Atmospheric Administration (NOAA), highlights several concerns, including a change in large-scale wind patterns affected by the loss of summer sea ice; the replacement of multiyear sea ice by first-year sea ice; warmer and fresher water in the upper ocean linked to new ice-free areas; and the effects of the loss of sea ice on Arctic plant, animal, and fish species. “Climate change is happening faster in the Arctic than any other place on Earth-and with wide-ranging consequences,” said NOAA administrator Jane Lubchenco. “This year“s Arctic Report Card underscores the urgency of reducing greenhouse gas pollution and adapting to climate changes already under way.”

  14. ACECARD. Acquire CoOmmodities Easily Card

    SciTech Connect

    Soler, E.E. [Lockheed Martin Energy Systems, Oak Ridge, TN (United States)

    1996-09-01

    Acquire Commodities Easily Card (AceCard) provides an automated end-user method to distribute company credit card charges to internal charge numbers. AceCard will allow cardholders to record card purchases in an on-line order log, enter multiple account distributions per order that can be posted to the General Ledger, track orders, and receipt information, and provide a variety of cardholder and administrative reports. Please note: Customers must contact Ed Soler (423)-576-6151, Lockheed Martin Energy Systems, for help with the installation of the package. The fee for this installation help will be coordinated by the customer and Lockheed Martin and is in addition to cost of the package from ESTSC. Customers should contact Sandy Presley (423)-576-4708 for user help.

  15. CARD games in apoptosis and immunity

    PubMed Central

    Bouchier-Hayes, Lisa; Martin, Seamus J.

    2002-01-01

    A bewildering array of proteins containing the caspase recruitment domain (CARD) have now been identified. Previously, CARD–CARD interactions have been shown to be involved in the assembly of protein complexes that promote caspase processing and activation in the context of apoptosis. However, as the family of CARD-containing proteins has grown, it has become apparent that the majority of these proteins do not recruit caspases or promote caspase activation. Instead, many participate in NF-?B signalling pathways associated with innate or adaptive immune responses. Here, we suggest a simplified classification of the CARD proteins based upon their domain structures and discuss the divergent roles of these proteins in the context of host defence. PMID:12101092

  16. Investigation of innate immunity genes CARD4, CARD8 and CARD15 as germline susceptibility factors for colorectal cancer

    PubMed Central

    2009-01-01

    Background Variation in genes involved in the innate immune response may play a role in the predisposition to colorectal cancer (CRC). Several polymorphisms of the CARD15 gene (caspase activating recruitment domain, member 15) have been reported to be associated with an increased susceptibility to Crohn disease. Since the CARD15 gene product and other CARD proteins function in innate immunity, we investigated the impact of germline variation at the CARD4, CARD8 and CARD15 loci on the risk for sporadic CRC, using a large patient sample from Northern Germany. Methods A total of 1044 patients who had been operated with sporadic colorectal carcinoma (median age at diagnosis: 59 years) were recruited and compared to 724 sex-matched, population-based control individuals (median age: 68 years). Genetic investigation was carried out following both a coding SNP and haplotype tagging approach. Subgroup analyses for N = 143 patients with early manifestation of CRC (?50 age at diagnosis) were performed for all CARD loci and subgroup analyses for diverse age strata were carried out for CARD15 mutations R702W, G908R and L1007fs. In addition, all SNPs were tested for association with disease presentation and family history of CRC. Results No significant differences were observed between the patient and control allelic or haplotypic spectra of the three genes under study for the total cohort (N = 1044 patients). None of the analysed SNPs was significantly associated with either tumour location or yielded significant association in the familial or non-familial CRC patient subgroups. However, in a patient subgroup (?45 age at diagnosis) with early disease manifestation the mutant allele of CARD15 R702W was found to be significantly associated with disease susceptibility (9.7% in cases vs 4.6% in controls; Pallelic = 0.008, Pgenotypic = 0.0008, ORallelic = 2.22 (1.21-4.05) ORressessive = 21.9 (1.96-245.4). Conclusion Variation in the innate immunity genes CARD4, CARD8 and CARD15 is unlikely to play a major role in the susceptibility to CRC in the German population. But, we report a significant disease contribution of CARD15 for CRC patients with very early disease manifestation, mainly driven by variant R702W. PMID:19843337

  17. The Arctic Report Card: Communicating the State of the Rapidly Changing Arctic to a Diverse Audience via the Worldwide Web

    NASA Astrophysics Data System (ADS)

    Jeffries, M. O.; Richter-Menge, J.; Overland, J. E.; Soreide, N. N.

    2013-12-01

    Rapid change is occurring throughout the Arctic environmental system. The goal of the Arctic Report Card is to communicate the nature of the many changes to a diverse audience via the Worldwide Web. First published in 2006, the Arctic Report Card is a peer-reviewed publication containing clear, reliable and concise scientific information on the current state of the Arctic environment relative to observational records. Available only online, it is intended to be an authoritative source for scientists, teachers, students, decision-makers, policy-makers and the general public interested in the Arctic environment and science. The Arctic Report Card is organized into five sections: Atmosphere; Sea Ice & Ocean; Marine Ecosystem; Terrestrial Ecosystem; Terrestrial Cryosphere. Arctic Report Card 2012, the sixth annual update, comprised 20 essays on physical and biological topics prepared by an international team of 141 scientists from 15 different countries. For those who want a quick summary, the Arctic Report Card home page provides highlights of key events and findings, and a short video that is also available on YouTube. The release of the Report Card each autumn is preceded by a NOAA press release followed by a press conference, when the Web site is made public. The release of Arctic Report Card 2012 at an AGU Fall Meeting press conference on 5 December 2012 was subsequently reported by leading media organizations. The NOAA Arctic Web site, of which the Report Card is a part, is consistently at the top of Google search results for the keyword 'arctic', and the Arctic Report Card Web site tops search results for keyword "arctic report" - pragmatic indications of a Web site's importance and popularity. As another indication of the Web site's impact, in December 2012, the month when the 2012 update was released, the Arctic Report Card Web site was accessed by 19,851 unique sites in 105 countries, and 4765 Web site URLs referred to the Arctic Report Card. The 2012 Arctic Report Card YouTube video has been viewed 36,074 times by viewers in 152 countries and has been embedded in over two dozen Web sites. We are confident that the Arctic Report Card is succeeding in communicating the state of the rapidly changing Arctic to many people, but we need to learn more about its broader impact. Consequently, we are considering a study of how diverse an audience is being reached, and the extent to which, outside of the scientific community, the content of the Arctic Report Card is understood, is perceived as a credible, unbiased and non-threatening resource, and is overcoming prior beliefs.

  18. 79 FR 49076 - Notification of a New System of Records Notice for the EPA Personnel Access and Security System...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2014-08-19

    ...other verification and demographic...Personnel Access and Security System...regular access as required...temporary identification. Categories...social security number...fingerprints, biometric template...identification verification (PIV) card...requires authorized user login...Information Security......

  19. CARD proteins as therapeutic targets in cancer.

    PubMed

    Damiano, Jason S; Reed, John C

    2004-05-01

    Proteins containing a caspase-associated recruitment domain (CARD) have been established as key regulators of cell death and, more recently, cytokine production. During the last several years, the number of proteins identified within this family has grown immensely and many aspects of their function point to their potential utility as novel drug targets in the treatment of cancer. Several CARD family proteins are critical components of the conserved cell death machinery which, when dysregulated, promotes oncogenesis and contributes prominently to tumor resistance to chemotherapy. The pro-apoptotic protein Apaf1, which is inactivated in some cancers, is a CARD protein that is indispensable for mitochondria-induced apoptosis. Other anti-apoptotic CARD proteins, such as TUCAN/CARDINAL/CARD8, have been shown to protect tumors from cell death stimuli and to be over-expressed in certain forms of cancer. Therapeutics that activate or inhibit CARD proteins may therefore be potentially utilized as novel chemo-sensitizing agents when used in conjunction with conventional chemotherapy. Other CARD proteins influence cellular processes through the regulation of NF-kappaB or caspase-1, which governs the levels of interleukin-1beta (IL-1beta). In addition to its pro-inflammatory properties, this cytokine also contributes to neoplastic progression by promoting angiogenesis, proliferation, and the metastasis of many tumors. Many of the IL-1beta-regulating CARD proteins also contain a nucleotide binding/oligomerization domain known as a NACHT and may therefore be amenable to targeting by small molecule compounds. This review examines the role of CARD proteins in cytoprotection and cytokine processing in the context of neoplasia and presents strategies for using this information in devising potential novel anticancer agents. PMID:15134219

  20. Computer-Access-Code Matrices

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr.

    1990-01-01

    Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.

  1. 'Smart card' speeds triage, boosts safety.

    PubMed

    2008-10-01

    An internally developed 'smart card' and a kiosk equipped with an electronic reader have helped Wellington (FL) Regional Medical Center speed up its triage process considerably. The new technology is extremely popular with the staff, as well as with the patients. Here are some of its benefits: Patients who have the card don't need to provide a detailed history every time they visit the ED. Nurses don't have to type in the patient's medical information. It automatically "populates" their computer screen. Security is maintained, because the information is stored in a database, and not on the card. PMID:18956587

  2. White Light Holograms For Credit Cards

    NASA Astrophysics Data System (ADS)

    Schell, K. J.

    1985-06-01

    The last years show an increasing application of white light holograms as security features for credit cards. The holograms raise the level of security and they prevent more or less fraud and counterfeit. Two different methods of application such as embossing on cards or incorporation in cards are described. The principal differences between the two methods i.e.; long production-runs versus short production-runs will be elaborated. Our own development of a step-and-repeat camera to produce white light holograms will be elucidated.

  3. Waddesdon Manor: The Rothschild Trade Card Collection

    NSDL National Science Digital Library

    Baron Ferdinand de Rothschild was a man of exquisite taste, and his penchant for eighteenth century life and society manifested itself in several Continental shopping sprees. In 1891 the Baron acquired a significant collection of printed paper ephemera related to various trades. These volumes contain over 700 trade cards, or early shop advertisements, and in 2004 Waddesdon Manor and the University of Warwick teamed up to create a research project that would digitize these trade cards. The trade cards database allows users to search by types of object, trades, or types of products.

  4. Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings

    E-print Network

    Batina, Lejla

    , elliptic curve cryptography, smart card, bilinear pairing, attributes, blinding, protocols, Java Card. 1 card. This paper distinguishes itself through its use of elliptic curve cryptography (ECC). It does so on an elliptic curve (which are stored on the card). These certificates are verified on the reader-side via

  5. Write your ClipperTM card serial number here.

    E-print Network

    Doudna, Jennifer A.

    must be validated for each trip by tagging the card on the card reader as you board the bus. · Your reader just inside the door. Wait until you hear one "beep." The smart chip in the card will verify that you have an active pass. If the card reader beeps three times instead of one, your pass has been

  6. Campus Card and Mail Services University of Maryland, Baltimore County

    E-print Network

    Adali, Tulay

    Campus Card and Mail Services University of Maryland, Baltimore County 1000 Hilltop Circle D-Cardholders and D-Card Supervisors FROM: Campus Card Office RE: New Procedure to Request Funds for Your D-Card DATE: July 12, 2012 Effective immediately for FY13, the procedure for adding funds to your

  7. Gator 1 Card Staff and Faculty Authorization Form

    E-print Network

    Pilyugin, Sergei S.

    Gator 1 Card Staff and Faculty Authorization Form This form must be completed for new and replacement Gator 1 UF ID Cards E & G Departments Payment Information: The first card issued to new full&G departments only. Replacement cards are not paid for through the E&G account. E&G payment does not include OPS

  8. A SIMPLE CARD GUESSING GAME REVISITED Arnold Knopfmacher

    E-print Network

    Prodinger, Helmut

    A SIMPLE CARD GUESSING GAME REVISITED Arnold Knopfmacher://www.wits.ac.za/helmut/index.htm Submitted: January 4, 2000; Accepted: March 3, 2000. Abstract. A deck of cards consisting of m red and n black cards is given.* * A guess is made as to the colour of the top card, after which

  9. Domain-Specific Pseudonymous Signatures for the German Identity Card

    E-print Network

    for the new German identity card [8] secure the communication between the card and the reader resp establishment protocol (PACE) to derive a secure channel between the card and the local reader, with the userDomain-Specific Pseudonymous Signatures for the German Identity Card Jens Bender1 ¨Ozg¨ur Dagdelen2

  10. Augmenting Internet-based Card Not Present Transactions with Trusted

    E-print Network

    Dent, Alexander W.

    spent using credit cards. However, this particular form of commerce, typically referred to as Card by the Association for Payment Clearing Services (APACS) on card fraud [3] showed that Internet-based CNP transactions accounted for 36% of all card fraud perpetrated in 2006 in the UK (up from 27% the previ- ous year

  11. Augmenting Internet-based Card Not Present Transactions with Trusted

    E-print Network

    Dent, Alexander W.

    using credit cards. However, this particular form of commerce, typically referred to as Card Not Present by the Association for Payment Clearing Services (APACS) on card fraud [2] showed that Internet-based CNP transactions and their as- sociated chargebacks2 accounted for nearly 27% of all card fraud perpetrated in 2005

  12. Expert Knowledge Elicitations in a Procurement Card Context

    E-print Network

    Lin, Xiaodong

    · MOVING FORWARD · CONCLUSION 2 #12;INTRODUCTION · Why P-card has higher fraud risk than employee credit card? ­ P-card owners have a higher number of transactions on a normal basis, while employee credit-approval is required, while normally employee credit card transactions need to be approved by the manager before AMEX

  13. Tendency and responses to credit card fraud in Taiwan

    Microsoft Academic Search

    Ma Yu-Feng

    2005-01-01

    Analyses the factors in Taiwanese credit card fraud, and gives case studies in order to classify the main types of fraud; these include fraudulent use of other people’s cards, credit card applications with forged documents, use of credit cards for illicit financing, looking for authorisation loopholes to conduct scams, and frauds committed by the staff at financial institutions. Outlines the

  14. Neural data mining for credit card fraud detection

    Microsoft Academic Search

    Tao Guo; Gui-Yang Li

    2008-01-01

    Due to a rapid advancement in the electronic commerce technology, use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment, credit card frauds are becoming increasingly rampant in recent years. In this paper, we model the sequence of operations in credit card transaction processing using a confidence-based neural network. Receiver operating characteristic (ROC)

  15. Skill Cards for Open-Ended Gameboards, Set A.

    ERIC Educational Resources Information Center

    International Reading Association, Newport Beach, CA. California Reading Association.

    These skill cards and answer cards were designed for open ended game boards but may be used with any open ended game to reinforce reading skills. There are twelve sets in the packet. Each set contains twenty skill cards and one answer card. The topics for the sets are: long vowel substitution, short vowel substitution, consonant digraph…

  16. Measuring Up 2004: The National Report Card on Higher Education

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2004

    2004-01-01

    This report card, third in a series of biennial report cards on higher education, consists of a national report card and 50 state report cards. Measuring Up 2004 evaluates state performance in six categories, and for the first time, compares each state's current results with its own performance a decade ago. Contents include: (1) Foreword (James…

  17. On Digital Money and Card Technologies Edwin M. Knorr \\Lambda

    E-print Network

    Knorr, Edwin M.

    On Digital Money and Card Technologies Edwin M. Knorr \\Lambda Department of Computer Science fields: digital money and card technologies (especially smart cards), for possible PhD research topics. We believe that digital money and card technologies will revolutionize life in the 21st century

  18. The financial performance of retailers owning credit card banks

    Microsoft Academic Search

    Doowoo Nam; Benton E. Gup; Jongbae Kim

    2007-01-01

    Some retailers and other firms expecting to improve their operating performance have established Credit Card Banks (CCBs) as a revenue management tool to handle their proprietary credit card receivables, as well as those from Visa and MasterCard. The expected improvement in performance has to come primarily from increasing sales revenue with the retailers' own private-label credit cards, from interest income

  19. Purchasing Card Program Guide Purchasing and Payment Services

    E-print Network

    Mohanty, Saraju P.

    Reconciler 6 JP Morgan Chase Customer Service 7 SmartData Online System 7 Purchasing Card Controls 7 Credit Security of the Purchasing Card 9 Employee Separations/Termination/Leave of Absence 9 Lost or Stolen CardsPurchasing Card Program Guide Purchasing and Payment Services Revised November 5, 2010 #12;2 TABLE

  20. Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures

    E-print Network

    Paris-Sud XI, Université de

    Java Card Operand Stack: Fault Attacks, Combined Attacks and Countermeasures Guillaume Barbu1. Until 2009, Java Cards have been mainly threatened by Log- ical Attacks based on ill-formed applications. The publication of the Java Card 3.0 Connected Edition specifications and their mandatory on-card byte code

  1. Verification of Cryptographic Protocols Implemented in Java Card

    E-print Network

    Paris-Sud XI, Université de

    Verification of Cryptographic Protocols Implemented in Java Card ¢¡¤£ Renaud Marlet Daniel Le M is Java Card applets: In this case, applications on a card represent principals involved in authentication, for expressing requirements regarding the implementation of a protocol in Java Card. We have also developed

  2. Educating students: an ethics responsibility of credit card companies

    Microsoft Academic Search

    M. Jill Austin; Melodie R. Phillips

    2001-01-01

    The practice of marketing credit cards on college campuses is becoming increasingly controversial. Critics have charged that credit card companies use unethical practices to encourage students to become overloaded with debt. In response, many colleges now ban credit card solicitors from campus. Perhaps the best way credit card companies can improve their image is to provide specific educational opportunities to

  3. Thermal transfer structures coupling electronics card(s) to coolant-cooled structure(s)

    DOEpatents

    David, Milnes P; Graybill, David P; Iyengar, Madhusudan K; Kamath, Vinod; Kochuparambil, Bejoy J; Parida, Pritish R; Schmidt, Roger R

    2014-12-16

    Cooling apparatuses and coolant-cooled electronic systems are provided which include thermal transfer structures configured to engage with a spring force one or more electronics cards with docking of the electronics card(s) within a respective socket(s) of the electronic system. A thermal transfer structure of the cooling apparatus includes a thermal spreader having a first thermal conduction surface, and a thermally conductive spring assembly coupled to the conduction surface of the thermal spreader and positioned and configured to reside between and physically couple a first surface of an electronics card to the first surface of the thermal spreader with docking of the electronics card within a socket of the electronic system. The thermal transfer structure is, in one embodiment, metallurgically bonded to a coolant-cooled structure and facilitates transfer of heat from the electronics card to coolant flowing through the coolant-cooled structure.

  4. Solution Structure of the RAIDD CARD and Model for CARD\\/CARD Interaction in Caspase2 and Caspase9 Recruitment

    Microsoft Academic Search

    James J Chou; Hiroshi Matsuo; Hanjun Duan; Gerhard Wagner

    1998-01-01

    Apoptosis requires recruitment of caspases by receptor-associated adaptors through homophilic interactions between the CARDs (ca spase r ecruitment d omains) of adaptor proteins and prodomains of caspases. We have solved the CARD structure of the RAIDD adaptor protein that recruits ICH-1\\/caspase-2. It consists of six tightly packed helices arranged in a topology homologous to the Fas death domain. The surface

  5. Proxy Library Card The Proxy Library Card allows PSU students, faculty and staff to appoint another individual to

    E-print Network

    Caughman, John

    Proxy Library Card The Proxy Library Card allows PSU students, faculty and staff to appoint another individual to check out books on their behalf. To set up a proxy card, bring this form and your ID to the Circulation Desk. The card will be issued jointly in both names. The PSU library account owner agrees to pay

  6. Nest Record Card Scheme 1 Welcome to the Nest Record Card Scheme, NERCS for short. The project aims to

    E-print Network

    de Villiers, Marienne

    Nest Record Card Scheme 1 Welcome to the Nest Record Card Scheme, NERCS for short. The project aims completely replaces the old. The cards from the old scheme are curated within the ADU and will continue to be a valuable source of information. As and when resources permit, subsets of that col- lection of cards

  7. Approving Time Cards As an approver, it is your responsibility to approve your employee's time cards at the

    E-print Network

    Hutcheon, James M.

    1 Approving Time Cards As an approver, it is your responsibility to approve your employee's time cards at the end of each pay period. After you approve your employee's time cards, they are sent directly to payroll. Moreover, your employees are responsible for approving their own time cards prior

  8. Modelling audit security for smart-card payment schemes

    E-print Network

    Jurjens, Jan

    Electronic Purse Specifications (CEPS) Smart-card based payment system: more fraud protection than credit>> IntIssuerIntCard > > Card Init(dt,lda,m) Credit(s2) > CardLog dt,lda,m,nt,bal,s2(cep,ic,lda,m,nt,s3) \\LLog(dt,cep,m,nt,bal) LIEnc(K ,r),ml) 8 #12;Card Statechart Init Credit(s2)\\CLog

  9. Behavior-Based Credit Card Fraud Detecting Model

    Microsoft Academic Search

    Yongbin Zhang; Fucheng You; Huaqun Liu

    2009-01-01

    Credit card frauds,which always cause great loss for credit card holder, is also a big problem for financial banks. A credit card fraud detecting model is established based on the behavior patterns of the credit card holder.Different with traditional models which were based on demographic and economic information,this model detects credit card fraud with historical behavior patterns of the credit

  10. Counterfeit Credit Cards —How to Protect Hotel Guests

    Microsoft Academic Search

    J. S. Perry Hobson; Marilyn Ko

    1995-01-01

    Credit-card losses from criminal activity in 1992 amounted to approximately US$1.3 billion. Over 60 percent of that loss was through the use of counterfeit credit cards and about 70 percent of the information used in credit-card fraud was illegally obtained by criminals from hotel employees. Manufacturing fake credit cards with real account numbers, as opposed to stealing cards, is the

  11. Your Insurance (Insurance card MUST be presented

    E-print Network

    Finley Jr., Russell L.

    Your Insurance (Insurance card MUST be presented BEFORE services.00 DMC Care Insurance Plan WSU SOM Sponsored Group NONE DMC Care Insurance Plan NOT WSU SOM Sponsored Group $17.00 ALL OTHER HEALTH INSURANCE PLANS

  12. Petersburg Public Library Card Catalog Collection Index

    NSDL National Science Digital Library

    The Library of Virginia (LVA) (last discussed in the June 18, 1999 Scout Report) has added a digitized card index to newspapers held by the Library (predominantly from Petersburg), covering the years 1797 to 1877. One of the most complete local newspaper indexes in Virginia, the index is comprised of 43,810 typed 3 x 5 cards which cover local events, including the period of reconstruction following the Civil War, in great detail. The subjects of the articles indexed on the cards are listed alphabetically on one long page. Each entry card contains the following information: Main index entry: the subject of the newspaper article indexed; Subheading: additional information about the article; and Reference line: date, city, name of newspaper, page, and column number. A listing of newspapers covered by the index and their respective date ranges and microfilm numbers at the LVA is also available.

  13. College Student Credit Card Usage and Debt.

    ERIC Educational Resources Information Center

    Rybka, Kathryn M.

    2001-01-01

    Provides an overview of the concerns related to credit card usage by college students. Offers information student affairs professionals can use to help college students make responsible choices. (Contains 26 references.) (GCP)

  14. Drop/Add Card SIS Call Number

    E-print Network

    Veiga, Pedro Manuel Barbosa

    Drop/Add Card SIS Call Number (5 digits) Course Prefix (2-4 letters) Course Number (4 digits):_________________________________________________________________________ SIS Call Number (5 digits) Course Prefix (2-4 letters) Course Number (4 digits) Section Number (3

  15. 75 FR 55392 - Employment Network Report Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ...Report Card, which contains customer satisfaction feedback, with the current...the TTW program, including customer satisfaction with ENs. Since the publication...will be conducting annual customer satisfaction surveys regarding the...

  16. JP Morgan Chase Company # 60016 CORPORATE CARD

    E-print Network

    Wong, Pak Kin

    disclosure of Social Security Numbers. HoweverJP Morgan Chase Company # 60016 CORPORATE CARD APPLICATION JP Morgan Chase P.O. Box 57510 Salt Lake:____________________________ D.O.B. (Month/Year) ________________ Social Security

  17. David Copperfield's Orient Express Card Trick.

    ERIC Educational Resources Information Center

    Kolpas, Sidney J.

    1992-01-01

    Presents the mathematical proof, based on elementary number theory, for a card trick seen by students on television. Provides sources for other mathematical magic tricks that serve as motivational devices. (MDH)

  18. 75 FR 10414 - Researcher Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ...NATIONAL ARCHIVES AND RECORDS ADMINISTRATION 36 CFR Part...Identification Card AGENCY: National Archives and Records Administration (NARA...public use computers at the National Archives Building in Washington, DC, to...

  19. Dynamic Poaching in Credit Card Lending (preliminary) ?

    E-print Network

    Lukasz A. Drozd; Ricardo Serrano-padial; V. V. Chari; Harald Cole; Dirk Krueger; Urban Jermann; Pricila Maziero; Lones Smith; Amir Yaron

    2012-01-01

    The paper develops a positive theory of dynamic competition between credit card lenders, featuring balance transfers and default. Based on our theory and our quantitative results, we argue that the observed outcomes in the US credit card market are consistent with reduced effectiveness of personal bankruptcy protection, and inefficiently elevated costs of unsecured credit for intertemporal smoothing purposes. The model also delivers balance transfers as an equilibrium phenomenon. JEL: D1,D8,G2

  20. A smart card to create electronic signatures

    Microsoft Academic Search

    J. K. Omura

    1989-01-01

    The purpose of smart cards is to create personal electronic signatures. The author presents the design of a smart card chip of less than 25-mm2 area which consists of a CPU, 4 kBytes of ROM, 128 Bytes of RAM, 8 kBytes of EPROM, electrically programmable ROM, and a 512-bytes modulo math processor cell for creating electronic signatures. Such a smart

  1. Developmentally situated design (DSD): making theoretical knowledge accessible to designers of children's technology

    Microsoft Academic Search

    Tilde Bekker; Alissa Nicole Antle

    2011-01-01

    There is a wealth of theoretical knowledge about the developmental abilities and skills of children. However, this knowledge is not readily accessible to designers of interactive products. In this paper, we present the requirements, design and evaluation of developmentally situated design (DSD) cards. DSD cards are a design tool that makes age specific information about children's developing cognitive, physical, social,

  2. Australian Student Credit Card Guide Summary: You should take a good look at the many things that come with your credit card. A

    E-print Network

    Du, Jie

    on either card. Many credit and debit card companies offer fraud protection and stolen fund recoveryAustralian Student Credit Card Guide Summary: You should take a good look at the many things that come with your credit card. A good card can allow you to do many things. The cost of a card can still

  3. Card Number: Expiry: Name on Card: GST Exemption #

    E-print Network

    Northern British Columbia, University of

    Access Dietary needs/allergies Please indicate any special dietary needs or known food allergies (if known - separate with commas): Province: Postal Code: Email: Number of Attendees: Known Food Allergies: Setup begins after 8:30 am Fair starts 10:00 am - 3:00 pm · Parking Passes (to be picked up

  4. What Policymakers Can Learn from School Report Cards: Analysis of Tennessee's Report Cards on Schools.

    ERIC Educational Resources Information Center

    Bobbett, Gordon C.; And Others

    The relationships among factors reported on report cards developed for local school districts in Tennessee were studied, offering information about how the selected factors relate to student outcomes. Each year Tennessee's State Board of Education produces a report card on each school district using data provided by the district and the State…

  5. Credit Cards and Debit Cards in the United States and Japan

    Microsoft Academic Search

    Ronald-J Mann

    2002-01-01

    This article examines differences in credit-card and debit-card usage between the United States and Japan. Although I do not doubt that social and psychological factors have some significance, I contend that four institutional factors also have useful explanatory power: the freedom of banks to enter the industry; the size of retailers; the level of telecommunications costs; and the size of

  6. Installation instructions for PIV Card and VPN software and drivers for USB PIV Card reader hardware.

    E-print Network

    Wlodawer, Alexander

    Installation instructions for PIV Card and VPN software and drivers for USB PIV Card reader hardware. This document will detail installing the software necessary to use the 2- factor VPN client to your C: drive on your computer and open the VPN2Factor folder. Step 3- This will require Administrator

  7. Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

    E-print Network

    Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

  8. Design of 13.56MHz RF card reader based on MF RC500

    Microsoft Academic Search

    Liu Mingquan; Jiang Bo; He Peichong

    2011-01-01

    In order to improve security and speediness of access control system, a RF reader design solution of frequency 13.56MHz based on microcontroller chip P89C58X2RN and radio frequency chip MF RC500 is proposed in this paper. The operating characteristics of frequency chip RC500 and RF card MIFARE1 are analyzed, and the hardware circuit of IC reader, RF antenna and the software

  9. CARD14 Expression in Dermal Endothelial Cells in Psoriasis

    PubMed Central

    Harden, Jamie L.; Lewis, Steven M.; Pierson, Katherine C.; Suárez-Fariñas, Mayte; Lentini, Tim; Ortenzio, Francesca S.; Zaba, Lisa C.; Goldbach-Mansky, Raphaela; Bowcock, Anne M.; Lowes, Michelle A.

    2014-01-01

    Mutations in the caspase recruitment domain, family member 14 (CARD14) gene have recently been described in psoriasis patients, and explain the psoriasis susceptibility locus 2 (PSORS2). CARD14 is a scaffolding protein that regulates NF-?B activation, and psoriasis-associated CARD14 mutations lead to enhanced NF-?B signaling. CARD14 is expressed mainly in epidermal keratinocytes, but also in unidentified dermal cells. In this manuscript, the identity of the dermal cell types expressing CARD14, as well the potential functional consequence of overactive CARD14 in these dermal cell types, was determined. Using two-color immunofluorescence, dermal CARD14 did not co-localize with T-cells, dendritic cells, or macrophages. However, dermal CARD14 did highly co-localize with CD31+ endothelial cells (ECs). CARD14 was also expressed non-dermal endothelial cells, such as aortic endothelial cells, which may indicate a role of CARD14+ECs in the systemic inflammation and cardiovascular comorbidities associated with psoriasis. Additionally, phosphorylated NF-?B was found in psoriatic CARD14+ CD31+ ECs, demonstrating this pathway is active in dermal ECs in psoriasis. Transfection of dermal ECs with psoriasis-associated CARD14 mutations resulted in increased expression of several chemokines, including CXCL10, IL-8, and CCL2. These results provide preliminary evidence that CARD14 expression in ECs may contribute to psoriasis through increased expression of chemokines and facilitating recruitment of immune cells into skin. PMID:25369198

  10. 12 CFR Rules for Card Issuers That... - by-Transaction Basis

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Special Rules Applicable to Credit Card Accounts and Open-End Credit...provisions of Subpart B apply if credit cards are issued and the card issuer...seller to honor the creditor's credit card. 1. Section...

  11. 12 CFR 391.23 - Duties of card issuers regarding changes of address.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...issuer of a debit or credit card (card issuer...consumer's debit or credit card account and...or replacement card or a cell phone...A new revolving credit account is used...known patterns of fraud. For...

  12. Policy Title: Purchasing Card HARVARD UNIVERSITY FINANCIAL POLICY Responsible Office: UFS

    E-print Network

    POLICY POLICY STATEMENT Harvard Purchasing Cards (PCards) are University-liability credit cards issued card use, internal and external fraud, inappropriate general-ledger-coding allocation, nonPolicy Title: Purchasing Card HARVARD UNIVERSITY FINANCIAL POLICY Responsible Office: UFS Effective

  13. Neural fraud detection in credit card operations.

    PubMed

    Dorronsoro, J R; Ginel, F; Sgnchez, C; Cruz, C S

    1997-01-01

    This paper presents an online system for fraud detection of credit card operations based on a neural classifier. Since it is installed in a transactional hub for operation distribution, and not on a card-issuing institution, it acts solely on the information of the operation to be rated and of its immediate previous history, and not on historic databases of past cardholder activities. Among the main characteristics of credit card traffic are the great imbalance between proper and fraudulent operations, and a great degree of mixing between both. To ensure proper model construction, a nonlinear version of Fisher's discriminant analysis, which adequately separates a good proportion of fraudulent operations away from other closer to normal traffic, has been used. The system is fully operational and currently handles more than 12 million operations per year with very satisfactory results. PMID:18255686

  14. Western Silent Films Lobby Card Collection

    NSDL National Science Digital Library

    For decades, movie theaters were able to draw people in for a closer look at their current offerings via the use of large posters and lobby cards. For those who are intrigued by such advertising devices, Yale University's Beinecke Rare Book & Manuscript Library has digitized this fine collection of lobby cards designed to promote silent and western films in the first several decades of the 20th century. Visitors can view all 106 items here, and, all told, they promote a grand total of 68 different films. It's easy enough to perform a keyword search across all of the images, or visitors can see all of the images at one time. To get started, take a look at the rather dramatic image for "The Mollycoddle" and the tense scene depicted on the card for "The Bandit Buster". Visitors can zoom in on each image, and it's fun to scan through the details.

  15. NYPL Digital Library: Cigarette Cards: ABCs

    NSDL National Science Digital Library

    Back when smoking was a bit more socially acceptable, it was fairly easy to find elaborate cigarette or tobacco cards attached to premium tobacco products that depicted film stars, the sporting life, plants, animals, monuments, and military-related ephemera. For the most part, these cards featured illustrations on one side with related information and text on the other. This rather amazing digital collection from the New York Public Library features thousands of these cards, culled from over six decades. Visitors can start their journey through the collection by reading the brief introductory history and then by browsing through the various series. Using the source guide, visitors can take a look at series that include "children with rosy cheeks", "caricatures of famous cricketers", and "fortune telling".

  16. Deep Dermatophytosis and Inherited CARD9 Deficiency

    PubMed Central

    Vincent, Quentin B.; Liu, Luyan; Cypowyj, Sophie; Prando, Carolina; Migaud, Mélanie; Taibi, Lynda; Ammar-Khodja, Aomar; Stambouli, Omar Boudghene; Guellil, Boumediene; Jacobs, Frederique; Goffard, Jean-Christophe; Schepers, Kinda; del Marmol, Véronique; Boussofara, Lobna; Denguezli, Mohamed; Larif, Molka; Bachelez, Hervé; Michel, Laurence; Lefranc, Gérard; Hay, Rod; Jouvion, Gregory; Chretien, Fabrice; Fraitag, Sylvie; Bougnoux, Marie-Elisabeth; Boudia, Merad

    2014-01-01

    BACKGROUND Deep dermatophytosis is a severe and sometimes life-threatening fungal infection caused by dermatophytes. It is characterized by extensive dermal and subcutaneous tissue invasion and by frequent dissemination to the lymph nodes and, occasionally, the central nervous system. The condition is different from common superficial dermatophyte infection and has been reported in patients with no known immunodeficiency. Patients are mostly from North African, consanguineous, multiplex families, which strongly suggests a mendelian genetic cause. METHODS We studied the clinical features of deep dermatophytosis in 17 patients with no known immunodeficiency from eight unrelated Tunisian, Algerian, and Moroccan families. Because CARD9 (caspase recruitment domain–containing protein 9) deficiency has been reported in an Iranian family with invasive fungal infections, we also sequenced CARD9 in the patients. RESULTS Four patients died, at 28, 29, 37, and 39 years of age, with clinically active deep dermatophytosis. No other severe infections, fungal or otherwise, were reported in the surviving patients, who ranged in age from 37 to 75 years. The 15 Algerian and Tunisian patients, from seven unrelated families, had a homozygous Q289X CARD9 allele, due to a founder effect. The 2 Moroccan siblings were homozygous for the R101C CARD9 allele. Both alleles are rare deleterious variants. The familial segregation of these alleles was consistent with autosomal recessive inheritance and complete clinical penetrance. CONCLUSIONS All the patients with deep dermatophytosis had autosomal recessive CARD9 deficiency. Deep dermatophytosis appears to be an important clinical manifestation of CARD9 deficiency. (Funded by Agence Nationale pour la Recherche and others.) PMID:24131138

  17. Library Access Policy The University welcomes users to its libraries from within the University, from other

    E-print Network

    Levi, Ran

    access/borrowing scheme d. School pupils and teachers outwith organised visits e. Visitors on Open Days into the University Library without a valid University ID Card. The user will be made aware of this fact. The AccessLibrary Access Policy The University welcomes users to its libraries from within the University

  18. 76 FR 2930 - Market Test of Experimental Product: “Gift Cards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-18

    ...POSTAL SERVICE Market Test of Experimental Product: ``Gift Cards'' AGENCY: Postal Service \\TM\\. ACTION: Notice...c)(1) that it will begin a market test of its ``Gift Cards'' experimental product on or around May 1, 2011. The...

  19. Wiring harnesses documented by punched-card technique

    NASA Technical Reports Server (NTRS)

    Hicks, W. W.; Kloezeman, W. G.

    1970-01-01

    Cards representing a connector are punched, sorted, and then used to printout wiring documentation for that connector. When wiring changes are made, new cards are punched and the wiring documentation is reprinted to reflect the latest configuration.

  20. Astronaut's tool for withdrawing/replacing computer cards

    NASA Technical Reports Server (NTRS)

    West, R. L.

    1969-01-01

    Symmetrical tool allows astronauts to withdraw and replace Apollo Telescope Mount control computer cards. It is easily manipulated by a gloved hand, provides positive locking of a withdrawn card, and has a visible locking device.

  1. 1. Post card view of the bridge, c. 1910. Post ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    1. Post card view of the bridge, c. 1910. Post card courtesy Carol Poh Miller. Photocopy by Berni Rich, Score Photographers Cleveland, OH - B & O Railroad Bridge Number 464, Spanning Old Ship Canal & Cuyahoga River, Cleveland, Cuyahoga County, OH

  2. 22 CFR 50.9 - Card of identity.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...Determination of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department...offices or designated nationality examiners may issue a card of identity for travel to the United States to...

  3. 22 CFR 50.9 - Card of identity.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...Determination of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department...offices or designated nationality examiners may issue a card of identity for travel to the United States to...

  4. 22 CFR 50.9 - Card of identity.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...Determination of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department...offices or designated nationality examiners may issue a card of identity for travel to the United States to...

  5. 22 CFR 50.9 - Card of identity.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...Determination of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department...offices or designated nationality examiners may issue a card of identity for travel to the United States to...

  6. 22 CFR 50.9 - Card of identity.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...Determination of United States Nationality of a Person Abroad § 50.9 Card of identity. When authorized by the Department...offices or designated nationality examiners may issue a card of identity for travel to the United States to...

  7. 76 FR 76475 - Employment Network (EN) Report Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-07

    ...Docket No. SSA-2011-0096] Employment Network (EN) Report Card AGENCY: Social Security...Revised Ticket to Work Consumer Employment Network Report Card...recipients, advocates, employment networks (ENs), other professionals, and...

  8. North American Endangered Amphibians Card Game

    NSDL National Science Digital Library

    2012-12-20

    In this activity, learners can play two card games related to endangered species, specifically North American amphibians. In version one, "Guess My Amphibian," a learner secretly selects a card and players take turns asking yes-or-no questions to identify the mystery amphibian. In version two, "Guess My Rule," a learner selects a secret rule about amphibians and players try to identify the rule. For an extra challenge, use string circles to form a Venn Diagram that players can use to sort the amphibians and play a more challenging version of "Guess My Rule."

  9. High density electrical card connector system

    SciTech Connect

    Haggard, J.E.; Trotter, G.R.

    2000-02-29

    An electrical circuit board card connection system is disclosed which comprises a wedge-operated locking mechanism disposed along an edge portion of the printed circuit board. An extrusion along the edge of the circuit board mates with an extrusion fixed to the card cage having a plurality of electrical connectors. The connection system allows the connectors to be held away from the circuit board during insertion/extraction and provides a constant mating force once the circuit board is positioned and the wedge inserted. The disclosed connection system is a simple solution to the need for a greater number of electrical signal connections.

  10. S-CP Cards and Independence

    NSDL National Science Digital Library

    This is a task from the Illustrative Mathematics website that is one part of a complete illustration of the standard to which it is aligned. Each task has at least one solution and some commentary that addresses important asects of the task and its potential use. Here are the first few lines of the commentary for this task: One card is selected at random from the following set of 6 cards, each of which has a number and a black or white symbol: $\\{\\bf 2\\triangle, 4\\square, ...

  11. Implementation of the ANA report card.

    PubMed

    Moore, K; Lynn, M R; McMillen, B J; Evans, S

    1999-06-01

    A major challenge in healthcare today is measuring the quality of care. To explore nursing's contribution to patients in acute care settings, the American Nurses Association commissioned the development of the "Nursing Report Card." This study explored whether these report card indicators capture quality care. The convenience sample comprised 1,500 patients and 300 nurses from 16 units at an academic medical center. Using regression analysis, the most consistent predictor of outcome indicators was the percentage of RNs of the total staff. PMID:10377925

  12. Free-space optics for high-speed reconfigurable card-to-card optical interconnects

    NASA Astrophysics Data System (ADS)

    Wang, Ke; Nirmalathas, Ampalavanpillai; Lim, Christina; Skafidas, Efstratios; Alameh, Kamal

    2013-09-01

    High-speed card-to-card optical interconnects are highly demanded in high-performance computing and data centers. Compared with other solutions, free-space optical interconnects have the capability of providing both reconfigurability and flexibility. In this paper we propose and experimentally demonstrate a free-space based reconfigurable optical interconnect architecture and it is capable of connecting cards located both inside the same rack as well as in different racks. Results show that 3×10 Gb/s data transmission is achieved with a worst-case receiver sensitivity better than -9.38 dBm.

  13. NTU Student Card terms and conditions Nottingham Trent University, Burton Street, Nottingham, NG1 4BU

    E-print Network

    Evans, Paul

    is not a cheque guarantee card or credit/debit card. 2. The Student Card can be used for purchases at NTU from 1 not see or store the details of the credit/debit card used to make the payment. 5. The Student Card canNTU Student Card terms and conditions Nottingham Trent University, Burton Street, Nottingham, NG1 4

  14. CRICOS Provider Code 00301J (WA) 02637B (NSW) Application for Student ID card External students

    E-print Network

    check box) Medicare card Bank card (credit/debit or EFTPOS) Birth certificate/extract Marriage these requirements. Information about your new Curtin ID card Your Curtin ID card has a number of functions. First Examinations. Your first student card is free. If your card is lost a replacement fee will be incurred. Stolen

  15. 12 CFR Appendix E to Part 226 - Rules For Card Issuers That Bill on a Transaction-By-Transaction Basis

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...provisions of Subpart B apply if credit cards are issued and (1) the card...provisions of Subpart B apply if credit cards are issued and the card issuer...seller to honor the creditor's credit card. 1. Section...

  16. Transition to smart card technology : how transit operators can encourage the take-up of smart card technology

    E-print Network

    Hong, Yi, S.M. Massachusetts Institute of Technology

    2006-01-01

    This thesis explores and evaluates the essential strategies needed for transit agencies to switch from traditional fare collection systems to smart cards. More transit agencies today are investing in smart card technology ...

  17. A Program Logic for Handling JAVA CARD's Transaction Mechanism

    E-print Network

    Mostowski, Wojciech

    of the reader/terminal). Since we want to have support for the full JAVA CARD language in the KeY system we haveA Program Logic for Handling JAVA CARD's Transaction Mechanism Bernhard Beckert1 and Wojciech@cs.chalmers.se Abstract. In this paper we extend a program logic for verifying JAVA CARD applications by introducing

  18. Crib Card Use During Tests: Helpful or a Crutch?

    ERIC Educational Resources Information Center

    Funk, Steven C.; Dickson, K. Laurie

    2011-01-01

    The authors experimentally investigated the effect of crib cards on exam performance and student learning. Fifty-one students expected to use their prepared crib cards during an exam. However, they first completed an unexpected pretest without their crib card. Students performed significantly worse on the pretest than on identical questions when…

  19. 31 CFR 8.25 - Renewal of enrollment card.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...2010-07-01 false Renewal of enrollment card. 8.25 Section 8.25 Money and...Procedures § 8.25 Renewal of enrollment card. (a) Period of renewal. An enrolled...apply for renewal of his or her enrollment card during a 12-month period prior to...

  20. 24 CFR 3282.255 - Completion of information card.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 false Completion of information card. 3282.255 Section 3282.255 ...3282.255 Completion of information card. (a) Whenever a distributor or dealer...distributor or dealer shall fill out the card with information provided by the...

  1. Meeting Mathematics Standards with a Deck of Playing Cards

    ERIC Educational Resources Information Center

    McAllister, Deborah A.; McDonald, Shirley A.; Bothman, Susan M.

    2010-01-01

    The activities contained in this document have been presented at several conference sessions. Participants engaged in hands-on activities for Grades 3 through 8 that utilized a deck of playing cards to meet mathematics content and process standards. Activities included variations of card games, but with a mathematical twist, and other card-based…

  2. 24 CFR 3282.255 - Completion of information card.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 false Completion of information card. 3282.255 Section 3282.255 ...3282.255 Completion of information card. (a) Whenever a distributor or dealer...distributor or dealer shall fill out the card with information provided by the...

  3. 24 CFR 3282.255 - Completion of information card.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false Completion of information card. 3282.255 Section 3282.255 ...3282.255 Completion of information card. (a) Whenever a distributor or...distributor or retailer shall fill out the card with information provided by the...

  4. CARD No. 14 Content of Compliance Certification Application

    E-print Network

    CARD No. 14 Content of Compliance Certification Application 14.A.1 BACKGROUND The compliance that DOE must discuss in the CCA. This CARD addresses all elements of Section 194.14, with detailed climatological and meteorological conditions. In addition to the above, this CARD introduces requirements

  5. 8. Photograph of post card, 'Cicotte Street Bridge, Logansport, Ind.' ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    8. Photograph of post card, 'Cicotte Street Bridge, Logansport, Ind.' Logansport News Agency, Logansport, Ind., Curteich-Chicago 'C.T. American Art' post card {Reg. U.S. Pat. Off.}, postmarked October 17, 1949. Card in the Cass County photograph file at the Indiana State Library, Indianapolis. - Cicott Street Bridge, Spanning Wabash River at State Road 25, Logansport, Cass County, IN

  6. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-print Network

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your the items as they apply to that person. 2. Show an address where you can receive the card 10 to 14 days from

  7. 25 CFR 11.422 - Unauthorized use of credit cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2011-04-01 true Unauthorized use of credit cards. 11.422 Section 11.422 Indians...11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining...

  8. 25 CFR 11.422 - Unauthorized use of credit cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422 Indians...11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining...

  9. CARDHOLDER AGREEMENT AND USER'S GUIDE PURCHASING CARD PROGRAM

    E-print Network

    Bogaerts, Steven

    CARDHOLDER AGREEMENT AND USER'S GUIDE PURCHASING CARD PROGRAM Wittenberg University Use of the Wittenberg University Purchasing Card is intended for small-dollar, best judgment purchases. By participating of the University's Purchasing Card Program. These responsibilities include but are not limited to the following: 1

  10. Toward Automatic Generation of Provably Correct Java Card Applets

    E-print Network

    Coglio, Alessandro

    Toward Automatic Generation of Provably Correct Java Card Applets Alessandro Coglio Kestrel generator of Java Card applets from higher-level spec(ification)s written in a domain-specific language of Specware, re-expresses the translated spec in terms of Java Card concepts via a series of refinement steps

  11. 25 CFR 11.422 - Unauthorized use of credit cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422 Indians...11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining...

  12. Identification Card Policy and Procedures Commencement Date: 27 September, 1995

    E-print Network

    Identification Card Policy and Procedures Commencement Date: 27 September, 1995 Category: Students enrolled students shall be issued with an image Identification Card containing their name, student number and services. 7. PROCEDURES GUIDELINES 7.1 Uses The uses of the identification card may include

  13. Using card sorts for understanding website information architectures: technological,

    E-print Network

    Cairns, Paul

    Using card sorts for understanding website information architectures: technological, methodological Science, University of York {Helen.Petrie, cpower, pcairns, caglaos}@cs.york.ac.uk Abstract. The card sort technique has many uses in HCI research and practice. Card sorts have traditionally been conducted

  14. 24 CFR 3282.255 - Completion of information card.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 false Completion of information card. 3282.255 Section 3282.255 ...3282.255 Completion of information card. (a) Whenever a distributor or dealer...distributor or dealer shall fill out the card with information provided by the...

  15. Card-Shuffling Analysis with Markov Chains Harald Hammarstrom

    E-print Network

    Weber, Richard

    Card-Shuffling Analysis with Markov Chains Harald Hammarstr¨om January 14, 2005 1 Introduction In this essay we shall discuss mathematical models of card-shuffling. The basic question to answer is "how many times do you need to shuffle a deck of cards for it to become sufficiently randomized?". This obviously

  16. Towards a Privacy-preserving National Identity Card

    E-print Network

    Paris-Sud XI, Université de

    Towards a Privacy-preserving National Identity Card Yves Deswarte1,2 , S´ebastien Gambs1,2 1 CNRS, we propose to replace the national identity card, currently used in many countries, by a personal the risks of forgery at the same time. The user identifies himself to the card via biometrics thus

  17. January 2013 State Agency Greenhouse Gas Reduction Report Card

    E-print Network

    1 January 2013 State Agency Greenhouse Gas Reduction Report Card Background Under Section 12892 this information in the form of a `Report Card' and post it on the Cal/EPA website. The report, though posted requires that the Report Card include the following: A list of those measures that have been adopted

  18. Submit Reset Rules for OCNG Departmental Card Usage

    E-print Network

    Submit Reset Rules for OCNG Departmental Card Usage: 1. Sales tax can not be charged. 2. Bring back the original receipt and card within 24 hours. 3. Do not charge meals/lodging when in travel status. 4. Do. Provide an account number that the item(s) should be charged to. 7. Departmental card number may

  19. Proposal for Digitizer-to-SLINK Interface Card

    E-print Network

    Proposal for Digitizer-to-SLINK Interface Card J. Pilcher (for Haifeng Wu) 10-Sept-1999 #12;10-Sept/GLINK interface built into board s No mezzanine card s Much more compact s 640 Mb/s capability (standard) s 346 Mb, 3ns gate delay) #12;10-Sept-99 Organization q Dual structure of interface card for redundancy s All

  20. THE CARD GAME SET BENJAMIN LENT DAVIS AND DIANE MACLAGAN

    E-print Network

    Maclagan, Diane

    THE CARD GAME SET BENJAMIN LENT DAVIS AND DIANE MACLAGAN set1 is an extremely addictive, fast-paced card game found in toy stores nationwide. Although children often beat adults, the game has a rich in German Shepherds and began representing genetic data on the dogs by drawing symbols on cards