Sample records for program smart cards

  1. Mobile Language Study

    DTIC Science & Technology

    2003-08-18

    Language Study 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5d. TASK NUMBER 6. AUTHOR(S) Professor Mads Dam, Pablo Giambiagi 5e...Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39-18 SPC 01-4025 Mobile Language Study Final...smart card applications. Smart cards can be programmed using general-purpose languages ; but because of their limited resources, smart card programs

  2. 48 CFR 532.7002 - Solicitation requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    .... Identify the card brand(s) under the GSA SmartPay program that may be used to make payments under the... the card brand(s) under the GSA SmartPay program that may be used to make payments under the contract...

  3. 48 CFR 313.301 - Government-wide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., Appendix B, “Improving the Management of Government Charge Card Programs;” GSA's SmartPay Program guidance; and HHS Purchase Card program standards. (2) The OPDIVs, through their designated Agency/Organization... training requirements to ensure effective implementation of the HHS purchase card program. (3) OPDIVs shall...

  4. Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.

  5. Design and implementation of a smart card based healthcare information system.

    PubMed

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.

  6. Playing the Smart Card.

    ERIC Educational Resources Information Center

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…

  7. Imaging standards for smart cards

    NASA Astrophysics Data System (ADS)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-02-01

    "Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  8. Imaging standards for smart cards

    NASA Astrophysics Data System (ADS)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-01-01

    'Smart cards' are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper reviews imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper concludes with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  9. Prevention of Information Leakage by Photo-Coupling in Smart Card

    NASA Astrophysics Data System (ADS)

    Shen, Sung-Shiou; Chiu, Jung-Hui

    Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.

  10. Smart cards: a specific application in the hospital.

    PubMed

    Güler, I; Zengin, R M; Sönmez, M

    1998-12-01

    Computers have the ability to process and access tremendous amounts of information in our daily lives. But, now, individuals have this ability by carrying a smart card in their own wallets. These cards provide us the versatility, power, and security of computers. This study begins with a short description of smart cards and their advantages. Then, an electronic circuit that is designed for healthcare application in hospitals is introduced. This circuit functions as a smart card holder identifier, access controller for hospital doors and also can be used as a smart card reader/writer. Design steps of this electronic circuit, operation principles, serial communication with P.C., and the software are examined. Finally a complete access control network for hospital doors that functions with smart cards is discussed.

  11. Smart Cards and remote entrusting

    NASA Astrophysics Data System (ADS)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  12. A microprocessor card software server to support the Quebec health microprocessor card project.

    PubMed

    Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P

    1995-01-01

    The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.

  13. Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC)

    NASA Astrophysics Data System (ADS)

    Ratnadewi; Pramono Adhie, Roy; Hutama, Yonatan; Saleh Ahmar, A.; Setiawan, M. I.

    2018-01-01

    Cryptography is a method used to create secure communication by manipulating sent messages during the communication occurred so only intended party that can know the content of that messages. Some of the most commonly used cryptography methods to protect sent messages, especially in the form of text, are DES and 3DES cryptography method. This research will explain the DES and 3DES cryptography method and its use for stored data security in smart cards that working in the NFC-based communication system. Several things that will be explained in this research is the ways of working of DES and 3DES cryptography method in doing the protection process of a data and software engineering through the creation of application using C++ programming language to realize and test the performance of DES and 3DES cryptography method in encrypted data writing process to smart cards and decrypted data reading process from smart cards. The execution time of the entering and the reading process data using a smart card DES cryptography method is faster than using 3DES cryptography.

  14. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    NASA Astrophysics Data System (ADS)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  15. Implementing a High-Assurance Smart-Card OS

    NASA Astrophysics Data System (ADS)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  16. Optical smart card using semipassive communication.

    PubMed

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  17. Optical smart card using semipassive communication

    NASA Astrophysics Data System (ADS)

    Glaser, I.; Green, Shlomo; Dimkov, Ilan

    2006-03-01

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  18. Investigating the Activities of Children toward a Smart Storytelling Toy

    ERIC Educational Resources Information Center

    Kara, Nuri; Aydin, Cansu Cigdem; Cagiltay, Kursat

    2013-01-01

    This paper introduces StoryTech, a smart storytelling toy that features a virtual space, which includes computer-based graphics and characters, and a real space, which includes plush toys, background cards, and a communication interface. When children put real objects on the receiver panel, the computer program shows related backgrounds and…

  19. Smart cards--the key to trustworthy health information systems.

    PubMed Central

    Neame, R.

    1997-01-01

    Some 20 years after they were first developed, "smart cards" are set to play a crucial part in healthcare systems. Last year about a billion were supplied, mainly for use in the financial sector, but their special features make them of particular strategic importance for the health sector, where they offer a ready made solution to some key problems of security and confidentiality. This article outlines what smart cards are and why they are so important in managing health information. I discuss some of the unique features of smart cards that are of special importance in the development of secure and trustworthy health information systems. Smart cards would enable individuals' identities to be authenticated and communications to be secured and would provide the mechanisms for implementing strong security, differential access to data, and definitive audit trails. Patient cards can also with complete security carry personal details, data on current health problems and medications, emergency care data, and pointers to where medical records for the patient can be found. Provider cards can in addition carry authorisations and information on computer set up. PMID:9055719

  20. Authentication techniques for smart cards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thoroughmore » understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.« less

  1. Emerging Technology for School Security

    ERIC Educational Resources Information Center

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  2. An mHealth Framework to Improve Birth Outcomes in Benue State, Nigeria: A Study Protocol.

    PubMed

    Ezeanolue, Echezona Edozie; Gbadamosi, Semiu Olatunde; Olawepo, John Olajide; Iwelunmor, Juliet; Sarpong, Daniel; Eze, Chuka; Ogidi, Amaka; Patel, Dina; Onoka, Chima

    2017-05-26

    The unprecedented coverage of mobile technology across the globe has led to an increase in the use of mobile health apps and related strategies to make health information available at the point of care. These strategies have the potential to improve birth outcomes, but are limited by the availability of Internet services, especially in resource-limited settings such as Nigeria. Our primary objective is to determine the feasibility of developing an integrated mobile health platform that is able to collect data from community-based programs, embed collected data into a smart card, and read the smart card using a mobile phone-based app without the need for Internet access. Our secondary objectives are to determine (1) the acceptability of the smart card among pregnant women and (2) the usability of the smart card by pregnant women and health facilities in rural Nigeria. We will leverage existing technology to develop a platform that integrates a database, smart card technology, and a mobile phone-based app to read the smart cards. We will recruit 300 pregnant women with one of the three conditions-HIV, hepatitis B virus infection, and sickle cell trait or disease-and four health facilities in their community. We will use Glasgow's Reach, Effectiveness, Adoption, Implementation, and Maintenance framework as a guide to assess the implementation, acceptability, and usability of the mHealth platform. We have recruited four health facilities and 300 pregnant women with at least one of the eligible conditions. Over the course of 3 months, we will complete the development of the mobile health platform and each participant will be offered a smart card; staff in each health facility will receive training on the use of the mobile health platform. Findings from this study could offer a new approach to making health data from pregnant women available at the point of delivery without the need for an Internet connection. This would allow clinicians to implement evidence-based interventions in real time to improve health outcomes. ClinicalTrials.gov NCT03027258; https://clinicaltrials.gov/ct2/show/NCT03027258 (Archived by WebCite at http://www.webcitation.org/6owR2D0kE). ©Echezona Edozie Ezeanolue, Semiu Olatunde Gbadamosi, John Olajide Olawepo, Juliet Iwelunmor, Daniel Sarpong, Chuka Eze, Amaka Ogidi, Dina Patel, Chima Onoka. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 26.05.2017.

  3. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  4. 48 CFR 1401.603-3 - Appointment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the bureau/office procedures within the constraints of DOI Integrated Charge Card Program Policy Manual located at http://www.doi.gov/pam/chargecard. Additional guidance is available in the GSA Smart...

  5. 48 CFR 1401.603-3 - Appointment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the bureau/office procedures within the constraints of DOI Integrated Charge Card Program Policy Manual located at http://www.doi.gov/pam/chargecard. Additional guidance is available in the GSA Smart...

  6. Ridership impacts of South Florida's EASY smart card.

    DOT National Transportation Integrated Search

    2013-07-01

    Smart card-based Automated Fare Collection Systems (AFCS) are being increasingly deployed in transit systems across the US. Miami-Dade Transit (MDT) has recently deployed such a system branded as the EASY Card. The South Florida Regional Transportati...

  7. Patient health record on a smart card.

    PubMed

    Naszlady, A; Naszlady, J

    1998-02-01

    A validated health questionnaire has been used for the documentation of a patient's history (826 items) and of the findings from physical examination (591 items) in our clinical ward for 25 years. This computerized patient record has been completed in EUCLIDES code (CEN TC/251) for laboratory tests and an ATC and EAN code listing for the names of the drugs permanently required by the patient. In addition, emergency data were also included on an EEPROM chipcard with a 24 kb capacity. The program is written in FOX-PRO language. A group of 5000 chronically ill in-patients received these cards which contain their health data. For security reasons the contents of the smart card is only accessible by a doctor's PIN coded key card. The personalization of each card was carried out in our health center and the depersonalized alphanumeric data were collected for further statistical evaluation. This information served as a basis for a real need assessment of health care and for the calculation of its cost. Code-combined with an optical card, a completely paperless electronic patient record system has been developed containing all three information carriers in medicine: Texts, Curves and Pictures.

  8. Stream processing health card application.

    PubMed

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  9. Biometrics and smart cards combine to offer high security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. Thesemore » Cards will function only when they are being used by the authorized individuals to whom they are issued.« less

  10. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  11. Adoption of smart cards in the medical sector: the Canadian experience.

    PubMed

    Auber, B A; Hamel, G

    2001-10-01

    This research evaluates the factors influencing the adoption of smart cards in the medical sector (a smart card has a micro-processor containing information about the patient: identification, emergency data (allergies, blood type, etc.), vaccination, drugs used, and the general medical record). This research was conducted after a pilot study designed to evaluate the use of such smart cards. Two hundred and ninety-nine professionals, along with 7248 clients, used the smart card for a year. The targeted population included mostly elderly people, infants, and pregnant women (the most intensive users of health care services). Following this pilot study, two surveys were conducted, together with numerous interviews, to assess the factors influencing adoption of the technology. A general picture emerged. indicating that although the new card is well-perceived by individuals, tangible benefits must be available to motivate professionals and clients to adopt the technology. Results show that the fundamental dimension that needs to be assessed before massive diffusion is the relative advantage to the professional. The system must provide a direct benefit to its user. The relative advantage of the system for the professional is directly linked to the obligation for the client to use the card. The system is beneficial for the professional only if the information on the card is complete. Technical adequacy is a necessary but not sufficient condition for adoption.

  12. Using smart card technology to prevent sales of alcohol to underage persons

    DOT National Transportation Integrated Search

    2001-07-01

    This report documents the results of a demonstration and evaluation project to examine the effectiveness of smart card technology (i.e., magnetic stripe on the driver's license and a card reader system) as a means of providing alcohol retailers with ...

  13. Managing medical and insurance information through a smart-card-based information system.

    PubMed

    Lambrinoudakis, C; Gritzalis, S

    2000-08-01

    The continuously increased mobility of patients and doctors, in conjunction with the existence of medical groups consisting of private doctors, general practitioners, hospitals, medical centers, and insurance companies, pose significant difficulties on the management of patients' medical data. Inevitably this affects the quality of the health care services provided. The evolving smart card technology can be utilized for the implementation of a secure portable electronic medical record, carried by the patient herself/himself. In addition to the medical data, insurance information can be stored in the smart card thus facilitating the creation of an "intelligent system" supporting the efficient management of patient's data. In this paper we present the main architectural and functional characteristics of such a system. We also highlight how the security features offered by smart cards can be exploited in order to ensure confidentiality and integrity of the medical data stored in the patient cards.

  14. Smart Icon Cards

    ERIC Educational Resources Information Center

    Dunbar, Laura

    2015-01-01

    Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."

  15. Using smart card technology to monitor the eating habits of children in a school cafeteria: 1. Developing and validating the methodology.

    PubMed

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The aim of the study was to test the feasibility of using smart card technology to track the eating behaviours of nearly a thousand children in a school cafeteria. Within a large boys' school a smart card based system was developed that was capable of providing a full electronic audit of all the individual transactions that occurred within the cafeteria. This dataset was interfaced to an electronic version of the McCance and Widdowson composition of foods dataset. The accuracy of the smart card generated data and the influence of portion size and wastage were determined empirically during two 5-day trials. The smart card system created succeeded in generating precise data on the food choices made by hundreds of children over an indefinite time period. The data was expanded to include a full nutrient analysis of all the foods chosen. The accuracy of this information was only constrained by the limitations facing all food composition research, e.g. variations in recipes, portion sizes, cooking practices, etc. Although technically possible to introduce wastage correction factors into the software, thereby providing information upon foods consumed, this was not seen as universally practical. The study demonstrated the power of smart card technology for monitoring food/nutrient choice over limitless time in environments such as school cafeterias. The strengths, limitations and applications of such technology are discussed.

  16. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  17. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    NASA Astrophysics Data System (ADS)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  18. 29 CFR 4.123 - Administrative limitations, variances, tolerances, and exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... servicing of cards (including credit cards, debit cards, purchase cards, smart cards, and similar card... military personnel in buying and selling homes (which shall not include actual moving or storage of...

  19. Health smart cards: differing perceptions of emergency department patients and staff.

    PubMed

    Mohd Rosli, Reizal; Taylor, David McD; Knott, Jonathan C; Das, Atandrila; Dent, Andrew W

    2009-02-01

    An analytical, cross-sectional survey of 270 emergency department patients and 92 staff undertaken in three tertiary referral hospital emergency departments was completed to compare the perceptions of patients and staff regarding the use of health smart cards containing patient medical records. The study recorded data on a range of health smart card issues including awareness, privacy, confidentiality, security, advantages and disadvantages, and willingness to use. A significantly higher proportion of staff had heard of the card. The perceived disadvantages reported by patients and staff were, overall, significantly different, with the staff reporting more disadvantages. A significantly higher proportion of patients believed that they should choose what information is on the card and who should have access to the information. Patients were more conservative regarding what information should be included, but staff were more conservative regarding who should have access to the information. Significantly fewer staff believed that patients could reliably handle the cards. Overall, however, the cards were considered acceptable and useful, and their introduction would be supported.

  20. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  1. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  2. Health innovation for patient safety improvement.

    PubMed

    Sellappans, Renukha; Chua, Siew Siang; Tajuddin, Nur Amani Ahmad; Mei Lai, Pauline Siew

    2013-01-01

    Medication error has been identified as a major factor affecting patient safety. Many innovative efforts such as Computerised Physician Order Entry (CPOE), a Pharmacy Information System, automated dispensing machines and Point of Administration Systems have been carried out with the aim of improving medication safety. However, areas remain that require urgent attention. One main area will be the lack of continuity of care due to the breakdown of communication between multiple healthcare providers. Solutions may include consideration of "health smart cards" that carry vital patient medical information in the form of a "credit card" or use of the Malaysian identification card. However, costs and technical aspects associated with the implementation of this health smart card will be a significant barrier. Security and confidentiality, on the other hand, are expected to be of primary concern to patients. Challenges associated with the implementation of a health smart card might include physician buy-in for use in his or her everyday practice. Training and technical support should also be available to ensure the smooth implementation of this system. Despite these challenges, implementation of a health smart card moves us closer to seamless care in our country, thereby increasing the productivity and quality of healthcare.

  3. ORANGES evaluation discussion group process

    DOT National Transportation Integrated Search

    2003-03-24

    This report describes and documents the process and methodology to be used to conduct a series of before and after discussion groups with smart card holders and participating agency employees as part of the ORANGES multiple purpose smart card Field O...

  4. Ridership impacts of South Florida's EASY smart card : [summary].

    DOT National Transportation Integrated Search

    2013-07-01

    Transit agencies across the U.S. increasingly are replacing electronic fare reading systems with Advanced Fare Collection (AFC) or smart card systems. In 2009, Miami-Dade Transit (MDT) was the first Florida transit agency to deploy AFC, branded...

  5. Telematics and smart cards in integrated health information system.

    PubMed

    Sicurello, F; Nicolosi, A

    1997-01-01

    Telematics and information technology are the base on which it will be possible to build an integrated health information system to support population and improve their quality of life. This system should be based on record linkage of all data based on the interactions of the patients with the health structures, such as general practitioners, specialists, health institutes and hospitals, pharmacies, etc. The record linkage can provide the connection and integration of various records, thanks to the use of telematic technology (either urban or geographical local networks, such as the Internet) and electronic data cards. Particular emphasis should be placed on the introduction of smart cards, such as portable health cards, which will contain a standardized data set and will be sufficient to access different databases found in various health services. The inter-operability of the social-health records (including multimedia types) and the smart cards (which are one of the most important prerequisites for the homogenization and wide diffusion of these cards at an European level) should be strongly taken into consideration. In this framework a project is going to be developed aiming towards the integration of various data bases distributed territorially, from the reading of the software and the updating of the smart cards to the complete management of the patients' evaluation records, to the quality of the services offered and to the health planning. The applications developed will support epidemiological investigation software and data analysis. The inter-connection of all the databases of the various structures involved will take place through a coordination center, the most important system of which we will call "record linkage" or "integrated database". Smart cards will be distributed to a sample group of possible users and the necessary smart card management tools will be installed in all the structures involved. All the final users (the patients) in the whole network of services involved will be monitored for the duration of the project. The system users will also include general practitioners, social workers, physicians, health operators, pharmacists, laboratory workers and administrative personnel of the municipality and of the health structures concerned.

  6. Location Based Application Availability

    NASA Astrophysics Data System (ADS)

    Naeem Akram, Raja; Markantonakis, Konstantinos; Mayes, Keith

    Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a single device. This paper builds onto the NFC initiative and avoids the smart card ownership issues that hinder the adoption of such devices. The proposal integrates the Global Positioning System with the NFC in mobile phones to provide a ubiquitously and flexible service access model.

  7. [New electronic data carriers in Bosnia-Herzegovina].

    PubMed

    Masić, I; Pandza, H; Knezević, Z; Toromanović, S

    1999-01-01

    Bosnia and Herzegovina has been developing new Health Care System based on Electronic Registration Card. Developing countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transfer, searching and protection of data using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Both technologies offer the advantages and disadvantages. Three types of electronic card are currently in use: Hybrid Card, Smart Card and Laser Card. Hybrid Card offers characteristics of both Smart Card and Laser Card. The differences among these cards, such as a capacity, total price, price per byte, security system are discussed here. The dilemma is, which card should be used as a data carrier. The Electronic Family Registration Card is a question of strategic interest for B&H, but also a big investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.

  8. Can a patient smart card improve decision making in a clinical setting?.

    PubMed

    Bérubé, J; Papillon, M J; Lavoie, G; Durant, P; Fortin, J P

    1995-01-01

    In the health field, clinical information is the raw material for the clinician delivering health services. Therefore, the clinical information available to the physician is often incomplete or even non¿existent upon consultation. Furthermore, the reconstruction of the medical history, which is the most important source of data for the clinician to establish a diagnosis and initiate a treatment, suffers from many constraints. The smart card, like the one used in Quebec's project, could ease the physician's decision-making by allowing fast access to accurate and pertinent data. The smart card is a major asset in the present health system.

  9. MARC ES: a computer program for estimating medical information storage requirements.

    PubMed

    Konoske, P J; Dobbins, R W; Gauker, E D

    1998-01-01

    During combat, documentation of medical treatment information is critical for maintaining continuity of patient care. However, knowledge of prior status and treatment of patients is limited to the information noted on a paper field medical card. The Multi-technology Automated Reader Card (MARC), a smart card, has been identified as a potential storage mechanism for casualty medical information. Focusing on data capture and storage technology, this effort developed a Windows program, MARC ES, to estimate storage requirements for the MARC. The program calculates storage requirements for a variety of scenarios using medical documentation requirements, casualty rates, and casualty flows and provides the user with a tool to estimate the space required to store medical data at each echelon of care for selected operational theaters. The program can also be used to identify the point at which data must be uploaded from the MARC if size constraints are imposed. Furthermore, this model can be readily extended to other systems that store or transmit medical information.

  10. Real Electronic Commerce: Smart Cards on the Superhighway.

    ERIC Educational Resources Information Center

    Birch, David

    1997-01-01

    Technologies of payment rather than technologies of connection are the real trigger for the expansion of electronic commerce on the Internet. This article discusses "smart cards," highlighting Mondex, the electronic purse developed in the United Kingdom. Predicts that cash will be replaced by "e-cash," which is cheaper to make,…

  11. Determining the feasibility of objective adherence measurement with blister packaging smart technology.

    PubMed

    van Onzenoort, Hein A; Neef, Cees; Verberk, Willem W; van Iperen, H Peter; de Leeuw, Peter W; van der Kuy, Paul-Hugo M

    2012-05-15

    The results of a feasibility study of blister-pack smart technology for monitoring medication adherence are reported. Research in the area of objective therapy compliance measurement has led to the development of microprocessor-driven systems that record the time a unit dose is removed from blister packaging. One device under development is the Smart Blister-a label imprinted with event-detection circuitry that can be affixed to standard commercial blister cards. In the first trial of the device in actual clinical practice, 115 community-dwelling Dutch patients receiving valsartan maintenance therapy (160 mg once daily) were given 14-day blister packages equipped with the Smart Blister. On the return of empty blister cards to the 20 participating community pharmacies, the stored information was scanned and downloaded for data analysis and patient counseling purposes. A total of 245 Smart Blister-equipped packages were used by valsartan recipients during the eight-month study. The device was largely effective in recording patient and blister-card identification data and other desired information. However, in 17% of cases, the Smart Blister system registered multiple tablet-removal events at the same time, presumably indicating unintentional breakage of nearby conductive circuits and the need for design refinements. The Smart Blister-equipped medication cards were generally well received by patients and pharmacies. An evaluation of the functionality and robustness of the Smart Blister in a real-world clinical practice situation yielded some promising results, but the findings also indicated a need for design refinements and additional performance testing of the device.

  12. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less

  13. A Cashless Society? The Plastic Revolution. Resources in Technology.

    ERIC Educational Resources Information Center

    Ritz, John M.

    1993-01-01

    Relates the history of credit cards, their evolution to current forms, and innovations (debit cards, token cards, smart cards). Considers their sociocultural impact. Provides a design brief, including objectives, resources, evaluation criteria, outcomes, and a quiz. (SK)

  14. Overview

    Science.gov Websites

    maintaining both types of cards. Common Access Card (CAC) "Smart" ID card for active-duty military personnel, Selected Reserve, DoD civilian employees, and eligible contractor personnel. CAC Types & and military retirees to access service benefits and privileges. ID Card Types & Eligibility

  15. Comparison of the Effects of SMART Board Technology and Flash Card Instruction on Sight Word Recognition and Observational Learning

    ERIC Educational Resources Information Center

    Mechling, Linda C.; Gast, David L.; Thompson, Kimberly L.

    2009-01-01

    This study compared the effectiveness of SMART Board, interactive whiteboard technology and traditional flash cards in teaching reading in a small-group instructional arrangement. Three students with moderate intellectual disabilities were taught to read grocery store aisle marker words under each condition. Observational learning (students…

  16. Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials

    NASA Astrophysics Data System (ADS)

    Park, Jun-Cheol

    User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.

  17. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  18. 48 CFR 22.1003-4 - Administrative limitations, variations, tolerances, and exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., purchase cards, smart cards, and similar card services). (iii) Hotel/motel services for conferences... appraisers to assist Federal employees or military personnel in buying and selling homes (which shall not...

  19. Smart Cards for Transit : Multi-Use Remotely Interrogated Stored-Data Cards for Fare and Toll Payment

    DOT National Transportation Integrated Search

    1995-04-01

    This project developed relevant information on existing and future, stored readable/writable data card technology for fare and toll payments. The project supports the FTA objective of developing a plan for a common standard card-based fare payment sy...

  20. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    PubMed

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  1. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    PubMed Central

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-01-01

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331

  2. Signal processing for smart cards

    NASA Astrophysics Data System (ADS)

    Quisquater, Jean-Jacques; Samyde, David

    2003-06-01

    In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight the same results can be obtained with only one smart card, but this idea is not completely true because the statistical properties of the signal are not the same. As the two smart cards are submitted to the same external noise during the measurement, it is more easy to reduce the influence of perturbations. This paper shows the importance of accurate countermeasures against differential analysis.

  3. Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits

    NASA Astrophysics Data System (ADS)

    Bußmeyer, Daniel; Gröbert, Felix; Schwenk, Jörg; Wegener, Christoph

    Due to recent attacks on online banking systems and consequent soaring losses through fraud, different methods have been developed to ensure a secure connection between a bank and its customers. One method is the inclusion of smart card readers into these schemes, which come along with different benefits, e.g., convenience and costs, and endangerments, especially on the security side.

  4. JPEG2000 vs. full frame wavelet packet compression for smart card medical records.

    PubMed

    Leehan, Joaquín Azpirox; Lerallut, Jean-Francois

    2006-01-01

    This paper describes a comparison among different compression methods to be used in the context of electronic health records in the newer version of "smart cards". The JPEG2000 standard is compared to a full-frame wavelet packet compression method at high (33:1 and 50:1) compression rates. Results show that the full-frame method outperforms the JPEG2K standard qualitatively and quantitatively.

  5. Mapping and navigational control for a “smart” wheelchair.

    PubMed

    Schultz, Dana L; Shea, Kathleen M; Barrett, Steven F

    2012-01-01

    A “smart” wheelchair is in development to provide mobility to those unable to control a traditional wheelchair. A “smart” wheelchair is an autonomous machine with the ability to navigate a mapped environment while avoiding obstacles. The flexibility and complex design of “smart” wheelchairs have made those currently available expensive. Ongoing research at the University of Wyoming has been aimed at designing a cheaper, alternative control system that could be interfaced with a typical powered wheelchair. The goal of this project is to determine methods for mapping and navigational control for the wheelchair. The control system acquires data from eighteen sensors and uses the data to navigate around a pre-programmed map which is stored on a micro SD card. The control system also provides a user interface in the form of a touchscreen LCD. The designed system will be an easy-to-use and cost effective alternative to current “smart” wheelchair technology.

  6. An end-to-end secure patient information access card system.

    PubMed

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  7. A study of smart card for radiation exposure history of patient.

    PubMed

    Rehani, Madan M; Kushi, Joseph F

    2013-04-01

    The purpose of this article is to undertake a study on developing a prototype of a smart card that, when swiped in a system with access to the radiation exposure monitoring server, will locate the patient's radiation exposure history from that institution or set of associated institutions to which it has database access. Like the ATM or credit card, the card acts as a secure unique "token" rather than having cash, credit, or dose data on the card. The system provides the requested radiation history report, which then can be printed or sent by e-mail to the patient. The prototype system is capable of extending outreach to wherever the radiation exposure monitoring server extends, at county, state, or national levels. It is anticipated that the prototype shall pave the way for quick availability of patient exposure history for use in clinical practice for strengthening radiation protection of patients.

  8. SAE for the prediction of road traffic status from taxicab operating data and bus smart card data

    NASA Astrophysics Data System (ADS)

    Zhengfeng, Huang; Pengjun, Zheng; Wenjun, Xu; Gang, Ren

    Road traffic status is significant for trip decision and traffic management, and thus should be predicted accurately. A contribution is that we consider multi-modal data for traffic status prediction than only using single source data. With the substantial data from Ningbo Passenger Transport Management Sector (NPTMS), we wished to determine whether it was possible to develop Stacked Autoencoders (SAEs) for accurately predicting road traffic status from taxicab operating data and bus smart card data. We show that SAE performed better than linear regression model and Back Propagation (BP) neural network for determining the relationship between road traffic status and those factors. In a 26-month data experiment using SAE, we show that it is possible to develop highly accurate predictions (91% test accuracy) of road traffic status from daily taxicab operating data and bus smart card data.

  9. A Smart City Application: A Fully Controlled Street Lighting Isle Based on Raspberry-Pi Card, a ZigBee Sensor Network and WiMAX

    PubMed Central

    Leccese, Fabio; Cagnetti, Marco; Trinca, Daniele

    2014-01-01

    A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field. PMID:25529206

  10. A smart city application: a fully controlled street lighting isle based on Raspberry-Pi card, a ZigBee sensor network and WiMAX.

    PubMed

    Leccese, Fabio; Cagnetti, Marco; Trinca, Daniele

    2014-12-18

    A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field.

  11. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  12. Web Card - Clean Cities Plug-In Electric Vehicle Handbook for Public Charging Station Hosts

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    A 2" x 3-1/4" web card which has a quick response code for accessing the PEV Handbook for Public Charging Station Hosts via a smart phone. The cards are intended to be handed out instead of the handbook.

  13. The SMile Card: a computerised data card for multiple sclerosis patients. SMile Card Scientific Board.

    PubMed

    Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A

    2000-04-01

    The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.

  14. DOD Business Systems Modernization: Planned Investment in Navy Program to Create Cashless Shipboard Environment Needs to Be Justified and Better Managed

    DTIC Science & Technology

    2008-09-01

    Abbreviations ATM automated teller machine BEA business enterprise architecture DOD...Limitations Automated Teller Machines (ATMs)-At-Sea 1988 Localized, shipboard ATMs that received and accounted for a portion of sailors’ and...use smart card technology for electronic retail ransactions and (2) economically justified on the basis of reliable analyses of stimated costs and

  15. A smart-card-enabled privacy preserving E-prescription system.

    PubMed

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.

  16. Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

    NASA Astrophysics Data System (ADS)

    Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra

    The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.

  17. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  18. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  19. Design issues for semi-passive optical communication devices

    NASA Astrophysics Data System (ADS)

    Glaser, I.

    2007-09-01

    Optical smart cards are devices containing a retro-reflector, light modulator, and some computing and data storage capabilities to affect semi-passive communication. They do not produce light; instead they modulate and send back light received from a stationary unit. These devices can replace contact-based smart cards as well as RF based ones for applications ranging from identification to transmitting and validating data. Since their transmission is essentially focused on the receiving unit, they are harder to eavesdrop than RF devices, yet need no physical contact or alignment. In this paper we explore optical design issues of these devices and estimate their optical behavior. Specifically, we analyze how these compact devices can be optimized for selected application profiles. Some of the key parameters addressed are effective light efficiency (how much modulated signal can be received by the stationary unit given the amount of light it transmits), range of tilt angles (angle between device surface normal to the line connecting the optical smart card with the stationary unit) through which the device would be effective, and power requirements of the semi-passive unit. In addition, issues concerning compact packaging of this device are discussed. Finally, results of the analysis are employed to produce a comparison of achievable capabilities of these optical smart cards, as opposed to alternative devices, and discuss potential applications were they can be best utilized.

  20. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  1. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  2. Demonstration of holographic smart card system using the optical memory technology

    NASA Astrophysics Data System (ADS)

    Kim, JungHoi; Choi, JaeKwang; An, JunWon; Kim, Nam; Lee, KwonYeon; Jeon, SeckHee

    2003-05-01

    In this paper, we demonstrate the holographic smart card system using digital holographic memory technique that uses reference beam encrypted by the random phase mask to prevent unauthorized users from accessing the stored digital page. The input data that include document data, a picture of face, and a fingerprint for identification is encoded digitally and then coupled with the reference beam modulated by a random phase mask. Therefore, this proposed system can execute recording in the order of MB~GB and readout all personal information from just one card without any additional database system. Also, recorded digital holograms can't be reconstructed without a phase key and can't be copied by using computers, scanners, or photography.

  3. Network security system for health and medical information using smart IC card

    NASA Astrophysics Data System (ADS)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  4. Evaluation strategy : Puget Sound regional fare card : FY01 earmark evaluation

    DOT National Transportation Integrated Search

    2003-06-24

    King County Metro Transit is the lead agency responsible for implementing the Central Puget Sound Regional Fare Coordination Project (RFC Project). The project features a smart card technology that will support and link the fare collection systems of...

  5. [Electronic medical records in Bosnia-Herzegovina. The electronic card--the medical record of the future in Boznia-Herzegovina].

    PubMed

    Masić, I; Pandza, H; Ridanović, Z; Dover, M

    1997-01-01

    The biggest problem in organisation of the effective and rational health care of good quality in Bosnia quality and Herzegovina is a functional and updated Health Information System. In this system, important role play Health Statistic System in which documentation and evidence are very important segment. Developed countries proceeded from the manual and semiautomatic method of medical data processing and system management to the new methods of entering, storage, transfer, searching and protection of data using electronic equipment. Recently, the competition between manufacturers of the Smart Card and Laser Card is reality. Also scientific and professional debate exists about the standard card for storage of medical information in Health Care System. First option is supported by West European countries that developing Smart Card called Eurocard and second by USA and Far East countries. Because the Health Care System and other segments of Society of Bosnia and Herzegovina innovate intensively similar systems, the authors of this article intend to open discussion, and to show advantages and failures of each technological medium.

  6. [Application of patient card technology to health care].

    PubMed

    Sayag, E; Danon, Y L

    1995-03-15

    The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.

  7. A more secure anonymous user authentication scheme for the integrated EPR information system.

    PubMed

    Wen, Fengtong

    2014-05-01

    Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.

  8. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  9. DIABCARD a smart card for patients with chronic diseases.

    PubMed

    Engelbrecht, R; Hildebrand, C

    1997-01-01

    Within the European Union-sponsored project DIABCARD, the core of a chip-card-based medical information system for patients with chronic diseases, exemplified on diabetes mellitus, has been developed. The long-term goal of the project is to improve the medical record and the quality of care for patients with chronic diseases. The basic idea is to have a portable electronic medical record on a smart card. This will improve the communication between the different healthcare personnel and between different institutions and, at the same time, promote shared care. The DIABCARD chip-card-based medical information system will offer controlled access to the necessary and up-to-date patient record to everyone involved in the patient's treatment, and it will help reduce the constantly rising healthcare expenditure. The system first was implemented in a small version. The system architecture contains hardware, software, and orgware. It considers especially the memory of the chip card, the processor, the data structure, security functions, the operating system on the chip card, the interface between the chip card and the application, and various application areas. The DIABCARD dataset was defined via an information model, which describes the different communication processes, via acknowledged diabetes datasets and medical scenarios. It includes, among others, emergency data, data for quality assurance, and data for blood glucose self-monitoring. The first prototype has been developed, and a pilot was run for 3 months.

  10. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  11. New and Improved: Security Goes High-Tech.

    ERIC Educational Resources Information Center

    Gamble, Cheryl

    2002-01-01

    Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…

  12. Progress on Component Evaluation for Nuclear Explosion Monitoring

    DTIC Science & Technology

    2008-09-01

    one data logger, Geotech Smart24. For the infrasound sensors tested, the test results allow us to conclude that both sensors had sufficiently quiet...a lower frequency than expected. Sandia was also asked to evaluate the Geotech Smart24 data logger for qualification as a replacement to the Geotech ...results of using 26-bit quantization. Characterization Geotech Smart24 Data-Logger with Active Fortezza Crypto Card Data Signing Over the spring

  13. New secure communication-layer standard for medical image management (ISCL)

    NASA Astrophysics Data System (ADS)

    Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1999-07-01

    This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.

  14. Evaluation of the Geotech SMART24BH 20Vpp/5Vpp data acquisition system with active fortezza crypto card data signing and authentication.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rembold, Randy Kai; Hart, Darren M.

    Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIAmore » crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.« less

  15. On the security of two remote user authentication schemes for telecare medical information systems.

    PubMed

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  16. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  17. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    PubMed

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.

  18. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.

  19. An Indian eye to personalized medicine.

    PubMed

    Jauhari, Shaurya; Rizvi, S A M

    2015-04-01

    Acknowledging the successful sequencing of the human genome and the valuable insights it has rendered, genetic drafting of non-human organisms can further enhance the understanding of modern biology. The price of sequencing technology has plummeted with time, and there is a noticeable enhancement in its implementation and recurrent usage. Sequenced genome information can be contained in a microarray chip, and then processed by a computer system for inferring analytics and predictions. Specifically, smart cards have been significantly applicable to assimilate and retrieve complex data, with ease and implicit mobility. Herein, we propose "The G-Card", a development with respect to the prevalent smart card, and an extension to the Electronic Health Record (EHR), that will hold the genome sequence of an individual, so that the medical practitioner can better investigate irregularities in a patient's health and hence recommend a precise prognosis. Copyright © 2014 Elsevier Ltd. All rights reserved.

  20. Students using mobile phones in the classroom: Can the phones increase content learning

    NASA Astrophysics Data System (ADS)

    Rinehart, David Lee

    A study was conducted at a high-performing school in Southern California to explore the effects on learning content from students using their own smart phones in and out of the classroom. The study used a Switching Replications design format which allowed two independent analyses of posttest scores between a group using e-flash cards on smart phones and a group using paper flash cards. Quantitative data was collected via two tailed, t-tests and qualitative data was collected through observations and interviews. Results suggest that knowledge level learning may be increased with mobile phone use, but no effect on comprehension level learning was found. Students found the phones to be convenient in accessing flash cards anytime and anywhere. Enthusiasm for using the phones in class while initially high waned over the 1 month study duration. Students perceived the phones to not be a significant source of distraction outside of class.

  1. Newer Technologies for School Security. ERIC Digest Number 145.

    ERIC Educational Resources Information Center

    Schneider, Tod

    This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…

  2. Facilitating and securing offline e-medicine service through image steganography.

    PubMed

    Kamal, A H M; Islam, M Mahfuzul

    2014-06-01

    E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation.

  3. An RFID Based Smart Feeder for Hummingbirds.

    PubMed

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  4. An RFID Based Smart Feeder for Hummingbirds

    PubMed Central

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F.; Tang, Wei

    2015-01-01

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future. PMID:26694402

  5. Retention of data in heat-damaged SIM cards and potential recovery methods.

    PubMed

    Jones, B J; Kenyon, A J

    2008-05-02

    Examination of various SIM cards and smart card devices indicates that data may be retained in SIM card memory structures even after heating to temperatures up to 450 degrees C, which the National Institute of Standards and Technology (NIST) has determined to be approximately the maximum average sustained temperature at desk height in a house fire. However, in many cases, and certainly for temperatures greater than 450 degrees C, the SIM card chip has suffered structural or mechanical damage that renders simple probing or rewiring ineffective. Nevertheless, this has not necessarily affected the data, which is stored as charge in floating gates, and alternative methods for directly accessing the stored charge may be applicable.

  6. Tecnologias mas nuevas para la seguridad escolar (Newer Technologies for School Security). ERIC Digest.

    ERIC Educational Resources Information Center

    Schneider, Tod

    This digest in Spanish describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that…

  7. Making Our Students Smart about Money

    ERIC Educational Resources Information Center

    Godfrey, Neale S.

    2006-01-01

    According to Senator Daniel Akaka, sponsor of the 2004 Credit Card Minimum Payment Warning Act, 45% of college students are in credit card debt, with an average debt of US$ 3,000. Moreover, 150,000 young adults between the ages of 18-24 declared bankruptcy last year. In this article, the author describes how financial literacy can educate young…

  8. The Learning Credit Card: A Tool for Managing Personal Development

    ERIC Educational Resources Information Center

    Rushby, Nick; Twining, John; Twining, Nick; Devitt, Thomas

    2008-01-01

    This is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of smart card technology to support learning and the management of learning. The study had two strands--the state of the art of the technology and its potential for supporting,…

  9. Towards a SIM-Less Existence: The Evolution of Smart Learning Networks

    ERIC Educational Resources Information Center

    Al-Khouri, Ali M.

    2015-01-01

    This article proposes that the widespread availability of wireless networks creates a case in which there is no real need for SIM cards. Recent technological developments offer the capability to outperform SIM cards and provide more innovative dimensions to current systems of mobility. In this context of changing realities in the domain of…

  10. Safe pill-dispensing.

    PubMed

    Testa, Massimiliano; Pollard, John

    2007-01-01

    Each patient is supplied with a smart-card containing a Radio Frequency IDentification (RFID) chip storing a unique identification code. The patient places the Smart-card on a pill-dispenser unit containing an RFID reader. The RFID chip is read and the code sent to a Base-station via a wireless Bluetooth link. A database containing both patient details and treatment information is queried at the Base-station using the RFID as the search key. The patient's treatment data (i.e., drug names, quantities, time, etc.) are retrieved and sent back to the pill-dispenser unit via Bluetooth. Appropriate quantities of the required medications are automatically dispensed, unless the patient has already taken his/her daily dose. Safe, confidential communication and operation is ensured.

  11. Protecting Digital Evidence Integrity by Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Saleem, Shahzad; Popov, Oliver

    RFC 3227 provides general guidelines for digital evidence collection and archiving, while the International Organization on Computer Evidence offers guidelines for best practice in the digital forensic examination. In the light of these guidelines we will analyze integrity protection mechanism provided by EnCase and FTK which is mainly based on Message Digest Codes (MDCs). MDCs for integrity protection are not tamper proof, hence they can be forged. With the proposed model for protecting digital evidence integrity by using smart cards (PIDESC) that establishes a secure platform for digitally signing the MDC (in general for a whole range of cryptographic services) in combination with Public Key Cryptography (PKC), one can show that this weakness might be overcome.

  12. Charge It Right. FDIC Money Smart Financial Education Curriculum = Uso Correcto de su Tarjeta de Credito. FDIC Money Smart Plan de Education para Capacitacion en Finanzas.

    ERIC Educational Resources Information Center

    Federal Deposit Insurance Corp., Washington, DC.

    This module on managing a credit card is one of ten in the Money Smart curriculum, and includes an instructor guide and a take-home guide. It was developed to help adults outside the financial mainstream enhance their money skills and create positive banking relationships. It is designed to enable participants to describe the costs and benefits of…

  13. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  14. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  15. Using smart card technology to monitor the eating habits of children in a school cafeteria: 3. The nutritional significance of beverage and dessert choices.

    PubMed

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The consumption patterns of beverages and desserts features highly in the current debate surrounding children's nutrition. The aim of this study was to continuously monitor the choice of beverages and desserts made by nearly 1000 children in a school cafeteria. A newly developed smart card system was used to monitor the food choices of diners (7-16-year-old boys) in a school cafeteria over 89 days. A wide variety of beverages and desserts were on offer daily. Despite coming from an affluent, well-educated demographic group, the boys' choices of beverages and desserts mirrored those of children in general. Buns and cookies were over 10 times more popular than fresh fruits and yogurts. Sugary soft-drinks were over 20 times more popular than fresh fruit drinks and milk combined. Appropriate choices could, over a month, reduce intake of added sugar by over 800 g and fat by over 200 g. The smart card system was very effective at monitoring total product choices for nearly 1000 diners. In agreement with a recent national school meal survey, where choice is extensive, children show a preference for products high in fat and/or sugar. The consequences of these preferences are discussed.

  16. Predicting traffic volumes and estimating the effects of shocks in massive transportation systems.

    PubMed

    Silva, Ricardo; Kang, Soong Moon; Airoldi, Edoardo M

    2015-05-05

    Public transportation systems are an essential component of major cities. The widespread use of smart cards for automated fare collection in these systems offers a unique opportunity to understand passenger behavior at a massive scale. In this study, we use network-wide data obtained from smart cards in the London transport system to predict future traffic volumes, and to estimate the effects of disruptions due to unplanned closures of stations or lines. Disruptions, or shocks, force passengers to make different decisions concerning which stations to enter or exit. We describe how these changes in passenger behavior lead to possible overcrowding and model how stations will be affected by given disruptions. This information can then be used to mitigate the effects of these shocks because transport authorities may prepare in advance alternative solutions such as additional buses near the most affected stations. We describe statistical methods that leverage the large amount of smart-card data collected under the natural state of the system, where no shocks take place, as variables that are indicative of behavior under disruptions. We find that features extracted from the natural regime data can be successfully exploited to describe different disruption regimes, and that our framework can be used as a general tool for any similar complex transportation system.

  17. Predicting traffic volumes and estimating the effects of shocks in massive transportation systems

    PubMed Central

    Silva, Ricardo; Kang, Soong Moon; Airoldi, Edoardo M.

    2015-01-01

    Public transportation systems are an essential component of major cities. The widespread use of smart cards for automated fare collection in these systems offers a unique opportunity to understand passenger behavior at a massive scale. In this study, we use network-wide data obtained from smart cards in the London transport system to predict future traffic volumes, and to estimate the effects of disruptions due to unplanned closures of stations or lines. Disruptions, or shocks, force passengers to make different decisions concerning which stations to enter or exit. We describe how these changes in passenger behavior lead to possible overcrowding and model how stations will be affected by given disruptions. This information can then be used to mitigate the effects of these shocks because transport authorities may prepare in advance alternative solutions such as additional buses near the most affected stations. We describe statistical methods that leverage the large amount of smart-card data collected under the natural state of the system, where no shocks take place, as variables that are indicative of behavior under disruptions. We find that features extracted from the natural regime data can be successfully exploited to describe different disruption regimes, and that our framework can be used as a general tool for any similar complex transportation system. PMID:25902504

  18. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    PubMed Central

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  19. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  20. A Smart Card-Based Electronic School Absenteeism System for Influenza-Like Illness Surveillance in Hong Kong: Design, Implementation, and Feasibility Assessment.

    PubMed

    Ip, Dennis Km; Lau, Eric Hy; So, Hau Chi; Xiao, Jingyi; Lam, Chi Kin; Fang, Vicky J; Tam, Yat Hung; Leung, Gabriel M; Cowling, Benjamin J

    2017-10-06

    School-aged children have the highest incidence of respiratory virus infections each year, and transmission of respiratory viruses such as influenza virus can be a major concern in school settings. School absenteeism data have been employed as a component of influenza surveillance systems in some locations. Data timeliness and system acceptance remain as key determinants affecting the usefulness of a prospective surveillance system. The aim of this study was to assess the feasibility of implementing an electronic school absenteeism surveillance system using smart card-based technology for influenza-like illness (ILI) surveillance among a representative network of local primary and secondary schools in Hong Kong. We designed and implemented a surveillance system according to the Protocol for a Standardized information infrastructure for Pandemic and Emerging infectious disease Response (PROSPER). We employed an existing smart card-based education and school administration platform for data capture, customized the user interface, and used additional back end systems built for other downstream surveillance steps. We invited local schools to participate and collected absenteeism data by the implemented system. We compared temporal trend of the absenteeism data with data from existing community sentinel and laboratory surveillance data. We designed and implemented an ILI surveillance system utilizing smart card-based attendance tracking approach for data capture. We implemented the surveillance system in a total of 107 schools (including 66 primary schools and 41 secondary schools), covering a total of 75,052 children. The system successfully captured information on absences for 2 consecutive academic years (2012-2013 and 2013-2014). The absenteeism data we collected from the system reflected ILI activity in the community, with an upsurge in disease activity detected up to 1 to 2 weeks preceding other existing surveillance systems. We designed and implemented a novel smart card technology-based school absenteeism surveillance system. Our study demonstrated the feasibility of building a large-scale surveillance system riding on a routinely adopted data collection approach and the use of simple system enhancement to minimize workload implication and enhance system acceptability. Data from this system have potential value in supplementing existing sentinel influenza surveillance for situational awareness of influenza activity in the community. ©Dennis KM Ip, Eric HY Lau, Hau Chi So, Jingyi Xiao, Chi Kin Lam, Vicky J Fang, Yat Hung Tam, Gabriel M Leung, Benjamin J Cowling. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 06.10.2017.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Colbert, C.; Moles, D.R.

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Securitymore » Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.« less

  2. Facilitating and securing offline e-medicine service through image steganography

    PubMed Central

    Islam, M. Mahfuzul

    2014-01-01

    E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation. PMID:26609382

  3. [Smart card systems in health care (protection, key-functions, divided data bases, applications)].

    PubMed

    Simon, P

    1999-04-25

    Barely more than 15 years have passed since electronic memory cards appeared, their popularity has grown rapidly (first of all as a cash-saving device and later for other purposes, as well). This is due also to the growing interest towards development of the intelligence of information systems for the follow-up of patients' health condition and medical care in countries with a highly developed health and insurance system (need for the creation of data bases divided for individuals) and also to their commitment towards a better control of the quality and costs of health care. We can come to the conclusion that the aim of research, development and the creation of systems in health informatics is to prevent illness and to give a direct informatic support to medical and nursing activity carried out in the patients' interests. The smart card and the surrounding application systems are certainly the appropriate means for the achievement of these aims.

  4. The Security Email Based on Smart Card

    NASA Astrophysics Data System (ADS)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  5. Family Registration Card as electronic medical carrier in Bosnia and Herzegovina.

    PubMed

    Novo, Ahmed; Masic, Izet; Toromanovic, Selim; Loncarevic, Nedim; Junuzovic, Dzelaludin; Dizdarevic, Jadranka

    2004-01-01

    Medical documentation is a very important part of the medical documentalistics and is occupies a large part of daily work of medical staff working in Primary Health Care. Paper documentation is going to be replaced by electronic cards in Bosnia and Herzegovina and a new Health Care System is under development, based on an Electronic Family Registration Card. Developed countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transferring, searching and protecting data, using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Three types of electronic card are currently in use: a Hybrid Card, a Smart Card and a Laser Card. The dilemma is which card should be used as a data carrier. The Electronic Family Registration Cared is a question of strategic interest for B&H, but also a great investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.

  6. Smart patient, smart community: improving client participation in family planning consultations through a community education and mass-media program in Indonesia.

    PubMed

    Kim, Young Mi; Bazant, Eva; Storey, J Douglas

    In health care consultations, patients often receive insufficient information from providers and communicate little with providers about their needs or concerns. This study evaluated a combined community education and mass media intervention to improve clients' participation in family planning consultations. A household survey was conducted with 1,200 women in three sub-districts (two intervention and one control) of West Java province in Indonesia. A comparison of post-campaign findings among family planning clients suggests that the intervention as a whole had a positive effect on client participation, specifically the number of clients who prepared questions to ask the service provider prior to a family planning visit in the past year. Multivariate analyses showed that the "Smart Card" intervention and elements of the "Sahabat" (Friend) mass media campaign were positively associated with clients' preparation of questions and question asking behavior during family planning consultations, indicating that a combined community education and mass-media approach can improve client communication with providers and improve the quality of family planning counseling.

  7. Registration system of cloud campus by using android smart tablet.

    PubMed

    Kamada, Shin; Ichimura, Takumi; Shigeyasu, Tetsuya; Takemoto, Yasuhiko

    2014-01-01

    Near Field Communication (NFC) standard covers communication protocols and data exchange formats. NFC technology is one of radio-frequency identification (RFID) standards. In Japan, Felica card is a popular way to identify the unique ID. We developed the attendance management system (AMS) as the Android application which works in the smart tablet with NFC. Generally, the AMS in the university is fixed to the wall and each student touches or slides his/her own card to the dedicated equipment. Because a teacher can use his/her own smart tablet and/or smartphone, the attendance records are viewed anytime and anywhere. Moreover, we developed the collecting system between PC and some tablets by using Android beam. Any personal data are encrypted and the file can be transferred over the NFC Bluetooth Handover between PC Linux and smart tablet. By the mining of the collected records, early discovery for chronic non-attenders are extracted in educational affairs section. In this paper, a registration system on the cloud campus system by using the personal smartphone with NFC is developed. The system enables to introduce the university courses that are open to the general public.

  8. Front end design of smartphone-based mobile health

    NASA Astrophysics Data System (ADS)

    Zhang, Changfan; He, Lingsong; Gao, Zhiqiang; Ling, Cong; Du, Jianhao

    2015-02-01

    Mobile health has been a new trend all over the world with the rapid development of intelligent terminals and mobile internet. It can help patients monitor health in-house and is convenient for doctors to diagnose remotely. Smart-phone-based mobile health has big advantages in cost and data sharing. Front end design of it mainly focuses on two points: one is implementation of medical sensors aimed at measuring kinds of medical signal; another is acquisition of medical signal from sensors to smart phone. In this paper, the above two aspects were both discussed. First, medical sensor implementation was proposed to refer to mature measurement solutions with ECG (electrocardiograph) sensor design taken for example. And integrated chip using can simplify design. Then second, typical data acquisition architecture of smart phones, namely Bluetooth and MIC (microphone)-based architecture, were compared. Bluetooth architecture should be equipped with an acquisition card; MIC design uses sound card of smart phone instead. Smartphone-based virtual instrument app design corresponding to above acquisition architecture was discussed. In experiments, Bluetooth and MIC architecture were used to acquire blood pressure and ECG data respectively. The results showed that Bluetooth design can guarantee high accuracy during the acquisition and transmission process, and MIC design is competitive because of low cost and convenience.

  9. Smartcards. Smart move.

    PubMed

    Mathieson, Steve

    2005-09-08

    European nations outside the UK use smartcards to speed up reimbursements. France has had a card since 1998 and this may soon include health data. The UK is at present only issuing smartcards for healthcare staff's use.

  10. Analysis of OPACITY and PLAID Protocols for Contactless Smart Cards

    DTIC Science & Technology

    2012-09-01

    9 3. Access Control ........................................................................ 9 E . THREATS AND...Synchronization .............................. 23 c. Simple Integration and Interoperability ..................... 24 E . MODES OF OPERATION...Interoperability ..................... 47 E . MODES OF OPERATIONS ................................................................ 47 F. SUGGESTED KEY

  11. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  12. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  13. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    PubMed

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  14. Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373

  15. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  16. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  17. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.

  18. Pocket EZPIN device for healthcare IC cards to enhance the security and convenience of senior citizens.

    PubMed

    Lai, Jiun-Tze; Hou, Ting-Wei

    2008-04-01

    An application that adopts smart cards often requires users to enter a PIN (Personal Identification Number) code. In Taiwan's healthcare system, a PIN is used to protect a card holder's private data. However, should one forget one's PIN, the procedure to set up a new PIN is inconvenient. There is a higher probability that senior citizens may forget their PINs. We propose a device which stores the PIN of the cardholder's Healthcare IC card. When the healthcare IC card reader requires the cardholder to enter his/her PIN, the cardholder pushes a button of the device to remotely sends the cardholder's encrypted PIN, for example by Infra Red. The device is designed to be low cost and easy to carry, and, hence, affordable to be a gift to senior citizens. Moreover, if the cardholder should forget to take the device with him/her, the card still works as normal. The device would be helpful in ensuring the public's privacy and convenience in Taiwan's healthcare system.

  19. Miniaturised wireless smart tag for optical chemical analysis applications.

    PubMed

    Steinberg, Matthew D; Kassal, Petar; Tkalčec, Biserka; Murković Steinberg, Ivana

    2014-01-01

    A novel miniaturised photometer has been developed as an ultra-portable and mobile analytical chemical instrument. The low-cost photometer presents a paradigm shift in mobile chemical sensor instrumentation because it is built around a contactless smart card format. The photometer tag is based on the radio-frequency identification (RFID) smart card system, which provides short-range wireless data and power transfer between the photometer and a proximal reader, and which allows the reader to also energise the photometer by near field electromagnetic induction. RFID is set to become a key enabling technology of the Internet-of-Things (IoT), hence devices such as the photometer described here will enable numerous mobile, wearable and vanguard chemical sensing applications in the emerging connected world. In the work presented here, we demonstrate the characterisation of a low-power RFID wireless sensor tag with an LED/photodiode-based photometric input. The performance of the wireless photometer has been tested through two different model analytical applications. The first is photometry in solution, where colour intensity as a function of dye concentration was measured. The second is an ion-selective optode system in which potassium ion concentrations were determined by using previously well characterised bulk optode membranes. The analytical performance of the wireless photometer smart tag is clearly demonstrated by these optical absorption-based analytical experiments, with excellent data agreement to a reference laboratory instrument. © 2013 Elsevier B.V. All rights reserved.

  20. Smart Passport : Ventura County Transportation Commission's demonstration project

    DOT National Transportation Integrated Search

    1998-09-01

    In January 1996 the Ventura County Transportation Commission (VCTC) began the implementation of an advanced bus pass (fare card media), or Smartcard, called the "Passport," on all Ventura County transit systems which incorporated a number of emerging...

  1. Biometrics encryption combining palmprint with two-layer error correction codes

    NASA Astrophysics Data System (ADS)

    Li, Hengjian; Qiu, Jian; Dong, Jiwen; Feng, Guang

    2017-07-01

    To bridge the gap between the fuzziness of biometrics and the exactitude of cryptography, based on combining palmprint with two-layer error correction codes, a novel biometrics encryption method is proposed. Firstly, the randomly generated original keys are encoded by convolutional and cyclic two-layer coding. The first layer uses a convolution code to correct burst errors. The second layer uses cyclic code to correct random errors. Then, the palmprint features are extracted from the palmprint images. Next, they are fused together by XORing operation. The information is stored in a smart card. Finally, the original keys extraction process is the information in the smart card XOR the user's palmprint features and then decoded with convolutional and cyclic two-layer code. The experimental results and security analysis show that it can recover the original keys completely. The proposed method is more secure than a single password factor, and has higher accuracy than a single biometric factor.

  2. Vehicle Fault Diagnose Based on Smart Sensor

    NASA Astrophysics Data System (ADS)

    Zhining, Li; Peng, Wang; Jianmin, Mei; Jianwei, Li; Fei, Teng

    In the vehicle's traditional fault diagnose system, we usually use a computer system with a A/D card and with many sensors connected to it. The disadvantage of this system is that these sensor can hardly be shared with control system and other systems, there are too many connect lines and the electro magnetic compatibility(EMC) will be affected. In this paper, smart speed sensor, smart acoustic press sensor, smart oil press sensor, smart acceleration sensor and smart order tracking sensor were designed to solve this problem. With the CAN BUS these smart sensors, fault diagnose computer and other computer could be connected together to establish a network system which can monitor and control the vehicle's diesel and other system without any duplicate sensor. The hard and soft ware of the smart sensor system was introduced, the oil press, vibration and acoustic signal are resampled by constant angle increment to eliminate the influence of the rotate speed. After the resample, the signal in every working cycle could be averaged in angle domain and do other analysis like order spectrum.

  3. The effect of using the health smart card vs. CPOE reminder system on the prescribing practices of non-obstetric physicians during outpatient visits for pregnant women in Taiwan.

    PubMed

    Long, An-Jim; Chang, Polun

    2012-09-01

    There is an evidence that pregnant women have been prescribed a significant number of improper medications that could lead to potential damage for a developing fetus due to discontinuity of care. The safety of pregnant women raises public concern and there is a need to identify ways to prevent potential adverse events to the pregnant woman. This study used a health smart card with a clinical reminder system to keep continuous records of general outpatient visits of pregnant women to protect them from potential adverse events caused by improper prescription. The health smart card, issued to all 23 million citizens in Taiwan, was used to work with a Computerized Physician Order Entry (CPOE) implemented at a 700-bed teaching medical center in Taipei to provide the outpatient information of pregnant women. FDA pregnancy risk classification was used to categorize the risk of pregnant women. The log file, combined with the physicians' and patients' profiles, were statistically examined using the Mantel-Haenszel technique to evaluate the impact of system in changing physician's prescription behavior. A total of 441 patients ranged in age from 15 to 50 years with 1114 prescriptions involved in FDA pregnancy risk classification C, D, and X during the study period. 144 reminders (13.1%) were accepted by physicians for further assessment and 100 (69.4%) of them were modified. Non-obstetric physicians in non-emergency setting were more intended to accept reminders (27.8%, 4.9 folds than obstetricians). Reminders triggered on patients in second trimester (15.5%) were accepted by all physicians more than third trimester (OR 1.52, p<0.05). A health smart card armed with CPOE reminder system and well-defined criteria had the potential to decrease harmful medication prescribed to pregnant patients. The results show better conformance for non-obstetric physicians (26%) and when physicians accepted the alerts they are more likely to went back and review their orders (69%). In sum, reminder criteria of FDA pregnancy risk classification C for obstetricians and reminder based on different trimesters is suggested to be refined to improve system acceptability and to decrease improper prescription. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  4. Easy robot programming for beginners and kids using augmented reality environments

    NASA Astrophysics Data System (ADS)

    Sakamoto, Kunio; Nishiguchi, Masahiro

    2010-11-01

    The authors have developed the mobile robot which can be programmed by command and instruction cards. All you have to do is to arrange cards on a table and to shot the programming stage by a camera. Our card programming system recognizes instruction cards and translates icon commands into the motor driver program. This card programming environment also provides low-level structure programming.

  5. Looking to the Future.

    ERIC Educational Resources Information Center

    College Planning & Management, 1997

    1997-01-01

    Ten possible trends on college campuses are examined. They include distance learning; rehabilitation of existing buildings; use of construction management firms; salaries for facilities directors; virtual universities; off-site garages; outside residence hall contractors; classrooms in residential buildings; and smart cards for entry and…

  6. Digital Signature Management.

    ERIC Educational Resources Information Center

    Hassler, Vesna; Biely, Helmut

    1999-01-01

    Describes the Digital Signature Project that was developed in Austria to establish an infrastructure for applying smart card-based digital signatures in banking and electronic-commerce applications. Discusses the need to conform to international standards, an international certification infrastructure, and security features for a public directory…

  7. Ventura County fare integration : a case study : promoting seamless regional fare coordination

    DOT National Transportation Integrated Search

    2001-09-01

    This report details the approach taken in one specific region to plan, operate, and maintain a multi-agency, transit fare collection payment system demonstration utilizing smart card technology as well as other ITS (intelligent transportation systems...

  8. Geometry creation for MCNP by Sabrina and XSM

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Van Riper, K.A.

    The Monte Carlo N-Particle transport code MCNP is based on a surface description of 3-dimensional geometry. Cells are defined in terms of boolean operations on signed quadratic surfaces. MCNP geometry is entered as a card image file containing coefficients of the surface equations and a list of surfaces and operators describing cells. Several programs are available to assist in creation of the geometry specification, among them Sabrina and the new ``Smart Editor`` code XSM. We briefly describe geometry creation in Sabrina and then discuss XSM in detail. XSM is under development; our discussion is based on the state of XSMmore » as of January 1, 1994.« less

  9. "Smart pebble" designs for sediment transport monitoring

    NASA Astrophysics Data System (ADS)

    Valyrakis, Manousos; Alexakis, Athanasios; Pavlovskis, Edgars

    2015-04-01

    Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions.

  10. Consumers' Interest In Provider Ratings Grows, And Improved Report Cards And Other Steps Could Accelerate Their Use.

    PubMed

    Findlay, Steven D

    2016-04-01

    Encouraging patients and consumers to use data and other information in choosing health care providers is an important way to enhance patient engagement and improve the quality of care. The growing use of technology, including smart phones and near-ubiquitous Internet access, provides consumers with easy access to websites that collect and report assessments and ratings of providers, primarily physicians and hospitals. In addition to new technology, recent laws and changes in society and the delivery of care are laying the foundation for greater use by consumers of provider performance report cards. Such use could be accelerated if the shortcomings of current report card efforts were addressed. Recommendations include making online report cards easier to use and more understandable, engaging, substantive, and relevant to consumers' health and medical concerns and choices. Project HOPE—The People-to-People Health Foundation, Inc.

  11. Optimised to Fail: Card Readers for Online Banking

    NASA Astrophysics Data System (ADS)

    Drimer, Saar; Murdoch, Steven J.; Anderson, Ross

    The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.

  12. Onboard spectral imager data processor

    NASA Astrophysics Data System (ADS)

    Otten, Leonard J.; Meigs, Andrew D.; Franklin, Abraham J.; Sears, Robert D.; Robison, Mark W.; Rafert, J. Bruce; Fronterhouse, Donald C.; Grotbeck, Ronald L.

    1999-10-01

    Previous papers have described the concept behind the MightySat II.1 program, the satellite's Fourier Transform imaging spectrometer's optical design, the design for the spectral imaging payload, and its initial qualification testing. This paper discusses the on board data processing designed to reduce the amount of downloaded data by an order of magnitude and provide a demonstration of a smart spaceborne spectral imaging sensor. Two custom components, a spectral imager interface 6U VME card that moves data at over 30 MByte/sec, and four TI C-40 processors mounted to a second 6U VME and daughter card, are used to adapt the sensor to the spacecraft and provide the necessary high speed processing. A system architecture that offers both on board real time image processing and high-speed post data collection analysis of the spectral data has been developed. In addition to the on board processing of the raw data into a usable spectral data volume, one feature extraction technique has been incorporated. This algorithm operates on the basic interferometric data. The algorithm is integrated within the data compression process to search for uploadable feature descriptions.

  13. 48 CFR 301.608 - Training requirements for purchase cardholders, Approving Officials, and Agency/Organization...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... REGULATION SYSTEM Career Development, Contracting Authority, and Responsibilities 301.608 Training... CON 237). • Advanced simplified acquisition procedures or Appropriations law. Purchase card holders...). • Advanced simplified acquisition procedures or Appropriations law. • CON 100 (Shaping Smart Business...

  14. 48 CFR 301.608 - Training requirements for purchase cardholders, Approving Officials, and Agency/Organization...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... REGULATION SYSTEM Career Development, Contracting Authority, and Responsibilities 301.608 Training... CON 237). • Advanced simplified acquisition procedures or Appropriations law. Purchase card holders...). • Advanced simplified acquisition procedures or Appropriations law. • CON 100 (Shaping Smart Business...

  15. Mobile Device Management

    DTIC Science & Technology

    2012-01-01

    password policies (or smart card authentication), disabling compo- nents of the operating system that were deemed unsafe, allowing users to only install...written nearly 100 applications for the iOS and Android platforms with over 1,500,000 downloads on iTunes and Google Play. CPT Braunstein is a

  16. Consolidating Our Country’s Biometric Resources and the Possible Implications

    DTIC Science & Technology

    2008-03-02

    passenger’s quick access through airport security by pre-clearing travelers. The Fly Clear smart cards store the passenger’s personal information...Fly Through Airport Security , undated); “Fly Through Airport Security ,”; available from http://flyclear.com/about/clear _howclearworks.html

  17. "Smart pebble" design for environmental monitoring applications

    NASA Astrophysics Data System (ADS)

    Valyrakis, Manousos; Pavlovskis, Edgars

    2014-05-01

    Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, while focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions. "Smart pebble" allows for a wider range of environmental sensors (e.g. for environmental/pollutant monitoring) to be incorporated so as to extend the range of its application, enabling accurate environmental monitoring which is required to ensure infrastructure resilience and preservation of ecological health.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hart, Darren M.

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA cryptomore » card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.« less

  19. 41 CFR 102-34.320 - What Government-issued charge cards may I use to purchase fuel and motor vehicle related services?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...

  20. 41 CFR 102-34.320 - What Government-issued charge cards may I use to purchase fuel and motor vehicle related services?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay ® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...

  1. 41 CFR 102-34.320 - What Government-issued charge cards may I use to purchase fuel and motor vehicle related services?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...

  2. 41 CFR 102-34.320 - What Government-issued charge cards may I use to purchase fuel and motor vehicle related services?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...

  3. 41 CFR 102-34.320 - What Government-issued charge cards may I use to purchase fuel and motor vehicle related services?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay ® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...

  4. Develop 3G Application with The J2ME SATSA API

    NASA Astrophysics Data System (ADS)

    JunWu, Xu; JunLing, Liang

    This paper describes research in the use of the Security and Trust Services API for J2ME (SATSA) to develop mobile applications. for 3G networks. SATSA defines a set of APIs that allows J2ME applications to communicate with and access functionality, secure storage and cryptographic operations provided by security elements such as smart cards and Wireless Identification Modules (WIM). A Java Card application could also work as an authentication module in a J2ME-based e-bank application. The e-bank application would allow its users to access their bank accounts using their cell phones.

  5. Your Guide to Smart Year-Round Fundraising.

    ERIC Educational Resources Information Center

    Gensheimer, Cynthia Francis

    1994-01-01

    Describes three seasonal fund-raising projects that can be linked with the curriculum and require only a few parent volunteers. The projects are profitable without requiring large amounts of effort. They include selling holiday cards, conducting read-a-thons, and participating in save-the-rainforest group sales. Tips for holding successful fund…

  6. Portable electrocardiogram device using Android smartphone.

    PubMed

    Brucal, S G E; Clamor, G K D; Pasiliao, L A O; Soriano, J P F; Varilla, L P M

    2016-08-01

    Portable electrocardiogram (ECG) capturing device can be interfaced to a smart phone installed with an android-based application (app). This app processes and analyses the data sent by the device to provide an interpretation of the patient/user's heart current condition (e.g.: beats per minute, heart signal waveform, R-R interval). The ECG recorded by the app is stored in the smart phone's Secure Digital (SD) card and cloud storage which can be accessed remotely by a physician to aid in providing medical diagnosis. The project aims to help patients living at a far distance from hospitals and experience difficulty in consulting their physician for regular check-ups, and assist doctors in regularly monitoring their patient's heart condition. The hardware data acquisition device and software application were subjected to trials in a clinic with volunteer-patients to measure the ECG and heart rate, data saving speed on the SD card, success rate of the saved data and uploaded file. Different ECG tests using the project prototype were done for 12 patients/users and yielded a reading difference of 7.61% in an R-R interval reading and 5.35% in heart rate reading as compared with the cardiologist's conventional 12-electrode ECG machine. Using the developed ECG device, it took less than 5 seconds to save ECG reading using SD card and approximately 2 minutes to upload via cloud.

  7. Effect of Technological Changes in Information Transfer on the Delivery of Pharmacy Services.

    ERIC Educational Resources Information Center

    Barker, Kenneth N.; And Others

    1989-01-01

    Personal computer technology has arrived in health care. Specific technological advances are optical disc storage, smart cards, voice recognition, and robotics. This paper discusses computers in medicine, in nursing, in conglomerates, and with patients. Future health care will be delivered in primary care centers, medical supermarkets, specialized…

  8. 49 CFR 395.16 - Electronic on-board recording devices.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... “sufficiently precise,” for purposes of this paragraph means the nearest city, town or village. (3) When the CMV... driving, and where released from work), the name of the nearest city, town, or village, with State... password) that identifies the driver or to provide other information (such as smart cards, biometrics) that...

  9. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  10. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    PubMed

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  11. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  12. Picture This: How to Establish an Effective School ID Card Program

    ERIC Educational Resources Information Center

    Finkelstein, David

    2013-01-01

    Most school districts do not have an ID card policy that everyone knows and follows, yet. many school districts are implementing ID card programs to address concerns about safety, efficiency, and convenience. A well-thought-out ID card program leads to greater security and smoother operations throughout the school and should thus be a priority.…

  13. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication

    NASA Astrophysics Data System (ADS)

    Murdoch, Steven J.; Anderson, Ross

    Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.

  14. Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals

    NASA Astrophysics Data System (ADS)

    Houdeau, Detlef

    The first implementation of biometric documents, called biometric passports, based on a regulation is running, the second implementation since end of CY 2008 is coming to Europe. The focus is on persons staying for business, study or leisure for more than 3 months in Europe and coming from a state outside Europe and not being a member of the Visa-Waiver-Program of the EU. This second wave increases the demand for the security industry for certified security microcontroller chips, secure smart cards, readers and supporting infrastructure on top of the biometric Passport business. It underlines the continuing advance of contactless identification technology in the public sector. The article gives an overview on the application, the technology, the EU regulation, the EU roadmap and the implementations.

  15. Integrity mechanism for eHealth tele-monitoring system in smart home environment.

    PubMed

    Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos

    2009-01-01

    During the past few years, a lot of effort has been invested in research and development of eHealth tele-monitoring systems that will provide many benefits for healthcare delivery from the healthcare provider to the patient's home. However, there is a plethora of security requirements in eHealth tele-monitoring systems. Data integrity of the transferred medical data is one of the most important security requirements that should be satisfied in these systems, since medical information is extremely sensitive information, and even sometimes life threatening information. In this paper, we present a data integrity mechanism for eHealth tele-monitoring system that operates in a smart home environment. Agent technology is applied to achieve data integrity with the use of cryptographic smart cards. Furthermore, the overall security infrastructure and its various components are described.

  16. Accuracy of autotitrating CPAP to estimate the residual Apnea-Hypopnea Index in patients with obstructive sleep apnea on treatment with autotitrating CPAP.

    PubMed

    Desai, Himanshu; Patel, Anil; Patel, Pinal; Grant, Brydon J B; Mador, M Jeffery

    2009-11-01

    Autotitrating continuous positive airway pressure (auto-CPAP) devices now have a smart card (a pocket-sized card with embedded integrated circuits which records data from the CPAP machine such as CPAP usage, CPAP pressure, large leak, etc.) which can estimate the Apnea-Hypopnea Index (AHI) on therapy. The aim of this study was to determine the accuracy of auto-CPAP in estimating the residual AHI in patients with obstructive sleep apnea (OSA) who were treated with auto-CPAP without a CPAP titration study. We studied 99 patients with OSA from April 2005 to May 2007 who underwent a repeat sleep study using auto-CPAP. The estimated AHI from auto-CPAP was compared with the AHI from an overnight polysomnogram (PSG) on auto-CPAP using Bland-Altman plot and likelihood ratio analyses. A PSG AHI cutoff of five events per hour was used to differentiate patients optimally treated with auto-CPAP from those with residual OSA on therapy. Bland and Altman analysis showed good agreement between auto-CPAP AHI and PSG AHI. There was no significant bias when smart card estimates of AHI at home were compared to smart card estimates obtained in the sleep laboratory. An auto-CPAP cutoff for the AHI of six events per hour was shown to be optimal for differentiating patients with and without residual OSA with a sensitivity of 0.92 (95% confidence interval (CI) 0.76 to 0.98) and specificity of 0.90 (95% CI 0.82 to 0.95) with a positive likelihood ratio (LR) of 9.6 (95% CI 5.1 to 21.5) and a negative likelihood ratio of 0.085 (95% CI 0.02 to 0.25). Auto-CPAP AHI of eight events per hour yielded the optimal sensitivity (0.94, 95% CI 0.73 to 0.99) and specificity (0.90, 95% CI 0.82 to 0.95) with a positive LR of 9.6 (95% CI 5.23 to 20.31) and a negative LR of 0.065 (95% CI 0.004 to 0.279) to identify patients with a PSG AHI of > or = 10 events per hour. Auto-CPAP estimate of AHI may be used to estimate residual AHI in patients with OSA of varying severity treated with auto-CPAP.

  17. Slovenian national health insurance card: the next step.

    PubMed

    Kalin, T; Kandus, G; Trcek, D; Zupan, B

    1999-01-01

    The Slovenian national health insurance company started a full-scale deployment of the insurance smart card that is at the present used for insurance data and identification purpose only. There is ample capacity on the cards that were selected, to contain much more data than needed for the purely administrative and charging purposes. There are plans to include some basic medical information, donor information, etc. On the other hand, there are no firm plans to use the security infrastructure and the extensive network, connecting the insurance company with the more than 200 self service terminals positioned at the medical facilities through the country to build an integrated medical information system that would be very beneficial to the patients and the medical community. This paper is proposing some possible future developments and further discusses on the security issues involved with such countrywide medical information system.

  18. Using Technology To Combat Truancy. Number 10 in a Series of CTC Trust Publications.

    ERIC Educational Resources Information Center

    Haigh, Gerald

    The 14 City Technology Colleges (CTCs) opened so far in Great Britain are achieving an average attendance rate of between 90 percent and 97 percent. This high level of attendance has been assisted by the use of electronic registration (role taking) devices, including smart cards, portable computers, and optical readers. This report compares…

  19. Online detection of potential duplicate medications and changes of physician behavior for outpatients visiting multiple hospitals using national health insurance smart cards in Taiwan.

    PubMed

    Hsu, Min-Huei; Yeh, Yu-Ting; Chen, Chien-Yuan; Liu, Chien-Hsiang; Liu, Chien-Tsai

    2011-03-01

    Doctor shopping (or hospital shopping), which means changing doctors (or hospitals) without professional referral for the same or similar illness conditions, is common in Hong Kong, Taiwan and Japan. Due to the lack of infrastructure for sharing health information and medication history among hospitals, doctor-shopping patients are more likely to receive duplicate medications and suffer adverse drug reactions. The Bureau of National Health Insurance (BNHI) adopted smart cards (or NHI-IC cards) as health cards in Taiwan. With their NHI-IC cards, patients can freely access different medical institutions. Because an NHI-IC card carries information about a patient's prescribed medications received from different hospitals nationwide, we used this system to address the problem of duplicate medications for outpatients visiting multiple hospitals. A computerized physician order entry (CPOE) system was enhanced with the capability of accessing NHI-IC cards and providing alerts to physicians when the system detects potential duplicate medications at the time of prescribing. Physician responses to the alerts were also collected to analyze changes in physicians' behavior. Chi-square tests and two-sided z-tests with Bonferroni adjustments for multiple comparisons were used to assess statistical significance of differences in actions taken by physicians over the three months. The enhanced CPOE system for outpatient services was implemented and installed at the Pediatric and Urology Departments of Taipei Medical University Wan-Fang Hospital in March 2007. The "Change Log" that recorded physician behavior was activated during a 3-month study period from April to June 2007. In 67.93% of patient visits, the physicians read patient NHI-IC cards, and in 16.76% of the reads, the NHI-IC card contained at least one prescribed medication that was taken by the patient. Among the prescriptions issued by physicians, on average, there were 2.36% prescriptions containing at least one medication that might be duplicative to the prior prescriptions stored in NHI-IC cards. The rate of potential duplicate medication alerts for the Pediatric Department was higher than that for the Urology Department (2.78% versus 1.67%). However, the rate of revisions to prescriptions was higher in the Urology Department than the Pediatric Department. Overall, the rate of physicians reviewing and revising their prescriptions was 29.25%; the rate of physicians reviewing without revising their prescriptions was 43.62%; the rate of physicians turning off the alert screens right after the screens popped up (overridden) was 27.13%. Thus, physicians accepted alerts to review their prescriptions with patients in most situations (72.87%). Moreover, over the study period, the rate of total revisions made to prescriptions increased and the "overridden" rate decreased. Our approach enhances the capability of CPOE systems using NHI-IC cards as a nationwide infrastructure to provide more complete patient health information and medication history sharing among hospitals in Taiwan. Thus, our system can provide a better prescribing tool to help physicians detect potential duplicate medications for frequent doctor-shopping patients and hence enhance patient safety across hospital boundaries. However, the effectiveness of detecting duplicate medications with our approach is very much dependent on the completeness of NHI-IC cards, which in turn primarily depends on physician use of the cards when prescribing. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  20. The exploration of the exhibition informatization

    NASA Astrophysics Data System (ADS)

    Zhang, Jiankang

    2017-06-01

    The construction and management of exhibition informatization is the main task and choke point during the process of Chinese exhibition industry’s transformation and promotion. There are three key points expected to realize a breakthrough during the construction of Chinese exhibition informatization, and the three aspects respectively are adopting service outsourcing to construct and maintain the database, adopting advanced chest card technology to collect various kinds of information, developing statistics analysis to maintain good cutomer relations. The success of Chinese exhibition informatization mainly calls for mature suppliers who can provide construction and maintenance of database, the proven technology, a sense of data security, advanced chest card technology, the ability of data mining and analysis and the ability to improve the exhibition service basing on the commercial information got from the data analysis. Several data security measures are expected to apply during the process of system developing, including the measures of the terminal data security, the internet data security, the media data security, the storage data security and the application data security. The informatization of this process is based on the chest card designing. At present, there are several types of chest card technology: bar code chest card; two-dimension code card; magnetic stripe chest card; smart-chip chest card. The information got from the exhibition data will help the organizers to make relevant service strategies, quantify the accumulated indexes of the customers, and improve the level of the customer’s satisfaction and loyalty, what’s more, the information can also provide more additional services like the commercial trips, VIP ceremonial reception.

  1. The role of optics in secure credentials

    NASA Astrophysics Data System (ADS)

    Lichtenstein, Terri L.

    2006-02-01

    The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.

  2. LOGSIM user's manual. [Logic Simulation Program for computer aided design of logic circuits

    NASA Technical Reports Server (NTRS)

    Mitchell, C. L.; Taylor, J. F.

    1972-01-01

    The user's manual for the LOGSIM Program is presented. All program options are explained and a detailed definition of the format of each input card is given. LOGSIM Program operations, and the preparation of LOGSIM input data are discused along with data card formats, postprocessor data cards, and output interpretation.

  3. Dual-Input AND Gate From Single-Channel Thin-Film FET

    NASA Technical Reports Server (NTRS)

    Miranda, F. A.; Pinto, N. J.; Perez, R.; Mueller, C. H.

    2008-01-01

    A regio-regular poly(3-hexylthiophene) (RRP3HT) thin-film transistor having a split-gate architecture has been fabricated on a doped silicon/silicon nitride substrate and characterized. RRP3HT is a semiconducting polymer that has a carrier mobility and on/off ratio when used in a field effect transistor (FET) configuration. This commercially available polymer is very soluble in common organic solvents and is easily processed to form uniform thin films. The most important polymer-based device fabricated and studied is the FET, since it forms the building block in logic circuits and switches for active matrix (light-emitting-diode) (LED) displays, smart cards, and radio frequency identification (RFID) cards.

  4. New Medicare-approved prescription drug discount card.

    PubMed

    James, John S

    2004-05-28

    Patients who are on Medicare and have income under 135% of Federal poverty level and are not on Medicaid probably should obtain one of the new Medicare discount cards that became available on June 1, 2004, because all these cards include $600 annual credit for prescription-drug purchases for persons within that income limit. Unfortunately this program is complex, no one yet knows how it will work in practice, and after choosing a card one is locked in and cannot change cards until November 15. The most difficult part of the choice of which card to get may involve how it interacts with other programs, including ADAP, and pharmaceutical company patient assistance programs.

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rembold, Randy Kai; Hart, Darren M.; Harris, James Mark

    Sandia National Laboratories has tested, evaluated and reported on the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication in SAND2008-. One test, Input Terminated Noise, allows us to characterize the self-noise of the Smart24 system. By computing the power spectral density (PSD) of the input terminated noise time series data set and correcting for the instrument response of different seismometers, the resulting spectrum can be compared to the USGS new low noise model (NLNM) of Peterson (1996), and determine the ability of the matched system of seismometer and Smart24 to be quiet enough formore » any general deployment location. Four seismometer models were evaluated: the Streckeisen STS2-Low and High Gain, Guralp CMG3T and Geotech GS13 models. Each has a unique pass-band as defined by the frequency band of the instrument corrected noise spectrum that falls below the new low-noise model.« less

  6. 41 CFR 101-26.502 - U.S. Government National Credit Card.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...

  7. 41 CFR 101-26.502 - U.S. Government National Credit Card.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...

  8. 41 CFR 101-26.502 - U.S. Government National Credit Card.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...

  9. 41 CFR 101-26.502 - U.S. Government National Credit Card.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...

  10. 41 CFR 101-26.502 - U.S. Government National Credit Card.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...

  11. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true Tabulating machine cards... PROGRAM 26.5-GSA Procurement Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance with the provisions of this § 101-26.509...

  12. 78 FR 9651 - Approval and Promulgation of Implementation Plans; Oregon: Heat Smart Program and Enforcement...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... Promulgation of Implementation Plans; Oregon: Heat Smart Program and Enforcement Procedures AGENCY... submission contains revisions to the Heat Smart program and to the enforcement procedures and civil penalties... submission contains additional revisions to the Heat Smart program, along with minor revisions and...

  13. 78 FR 37124 - Approval and Promulgation of Implementation Plans; Oregon: Heat Smart Program and Enforcement...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-20

    ... Promulgation of Implementation Plans; Oregon: Heat Smart Program and Enforcement Procedures AGENCY..., 2012, and November 28, 2012. The submitted revisions relate to Oregon's Heat Smart program, rules for... relate to Oregon's Heat Smart program in Oregon Administrative Rules (OAR) Chapter 340, Division 262 (OAR...

  14. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    PubMed

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  15. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  16. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    PubMed Central

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  17. Comparison of Urban Human Movements Inferring from Multi-Source Spatial-Temporal Data

    NASA Astrophysics Data System (ADS)

    Cao, Rui; Tu, Wei; Cao, Jinzhou; Li, Qingquan

    2016-06-01

    The quantification of human movements is very hard because of the sparsity of traditional data and the labour intensive of the data collecting process. Recently, much spatial-temporal data give us an opportunity to observe human movement. This research investigates the relationship of city-wide human movements inferring from two types of spatial-temporal data at traffic analysis zone (TAZ) level. The first type of human movement is inferred from long-time smart card transaction data recording the boarding actions. The second type of human movement is extracted from citywide time sequenced mobile phone data with 30 minutes interval. Travel volume, travel distance and travel time are used to measure aggregated human movements in the city. To further examine the relationship between the two types of inferred movements, the linear correlation analysis is conducted on the hourly travel volume. The obtained results show that human movements inferred from smart card data and mobile phone data have a correlation of 0.635. However, there are still some non-ignorable differences in some special areas. This research not only reveals the citywide spatial-temporal human dynamic but also benefits the understanding of the reliability of the inference of human movements with big spatial-temporal data.

  18. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    PubMed

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  19. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    PubMed Central

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  20. Security aspects in teleradiology workflow

    NASA Astrophysics Data System (ADS)

    Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter

    2000-05-01

    The medicolegal necessity of privacy, security and confidentiality was the aim of the attempt to develop a secure teleradiology workflow between the telepartners -- radiologist and the referring physician. To avoid the lack of dataprotection and datasecurity we introduced biometric fingerprint scanners in combination with smart cards to identify the teleradiology partners and communicated over an encrypted TCP/IP satellite link between Innsbruck and Reutte. We used an asymmetric kryptography method to guarantee authentification, integrity of the data-packages and confidentiality of the medical data. It was necessary to use a biometric feature to avoid a case of mistaken identity of persons, who wanted access to the system. Only an invariable electronical identification allowed a legal liability to the final report and only a secure dataconnection allowed the exchange of sensible medical data between different partners of Health Care Networks. In our study we selected the user friendly combination of a smart card and a biometric fingerprint technique, called SkymedTM Double Guard Secure Keyboard (Agfa-Gevaert) to confirm identities and log into the imaging workstations and the electronic patient record. We examined the interoperability of the used software with the existing platforms. Only the WIN-XX operating systems could be protected at the time of our study.

  1. 31 CFR 1021.200 - General.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Programs § 1021.200 General. Casinos and card clubs are subject to the program requirements set forth and cross referenced in this subpart. Casinos and card clubs should also refer to subpart B of part 1010 of this chapter for program...

  2. 31 CFR 1021.200 - General.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Programs § 1021.200 General. Casinos and card clubs are subject to the program requirements set forth and cross referenced in this subpart. Casinos and card clubs should also refer to subpart B of part 1010 of this chapter for program...

  3. 31 CFR 1021.200 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Programs § 1021.200 General. Casinos and card clubs are subject to the program requirements set forth and cross referenced in this subpart. Casinos and card clubs should also refer to subpart B of part 1010 of this chapter for program...

  4. 31 CFR 1021.200 - General.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Programs § 1021.200 General. Casinos and card clubs are subject to the program requirements set forth and cross referenced in this subpart. Casinos and card clubs should also refer to subpart B of part 1010 of this chapter for program...

  5. Application of an artificial neural network to pump card diagnosis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashenayi, K.; Lea, J.F.; Kemp, F.

    1994-12-01

    Beam pumping is the most frequently used artificial-lift technique for oil production. Downhole pump cards are used to evaluate performance of the pumping unit. Pump cards can be generated from surface dynamometer cards using a 1D wave equation with viscous damping, as suggested by Gibbs and Neely. Pump cards contain significant information describing the behavior of the pump. However, interpretation of these cards is tedious and time-consuming; hence, an automated system capable of interpreting these cards could speed interpretation and warn of pump failures. This work presents the results of a DOS-based computer program capable of correctly classifying pump cards.more » The program uses a hybrid artificial neural network (ANN) to identify significant features of the pump card. The hybrid ANN uses classical and sinusoidal perceptrons. The network is trained using an error-back-propagation technique. The program correctly identified pump problems for more than 180 different training and test pump cards. The ANN takes a total of 80 data points as input. Sixty data points are collected from the pump card perimeter, and the remaining 20 data points represent the slope at selected points on the pump card perimeter. Pump problem conditions are grouped into 11 distinct classes. The network is capable of identifying one or more of these problem conditions for each pump card. Eight examples are presented and discussed.« less

  6. An easy-to-use word processing program for creating concept cards in psychology courses: a method for teachers.

    PubMed

    Abramson, Charles I; Robinson, Ellen Gray; Rice, Jessica; Burley, Jami; Bergman, Staci; Delougherty, Patricia; Reudy, Katherine

    2002-06-01

    We describe a template to create concept cards in psychology courses using a word processing program. Students create their own individualized cards, which have the look and feel of flashcards and retain the same self-testing and monitoring features. Students report the template is easy to use, that the cards help them focus their study behavior and employ critical thinking skills in learning class material. We offer several suggestions on how to use the cards.

  7. 2016 SmartWay Affiliate Challenge Recognition Webinar

    EPA Pesticide Factsheets

    This EPA presentation gives an overview of the SmartWay program and showcases the SmartWay Affiliate awardees raising awareness of the benefits of the SmartWay program and sustainable freight transportation.

  8. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  9. Department of the Navy Acquisition and Capabilities Guidebook

    DTIC Science & Technology

    2012-05-01

    Cost Estimates/Service Cost Position..................................... 5-1 5.1.2 Cost Analysis Requirements Description ( CARD ) 5-2 5.1.3...Description ( CARD ). 7. Satisfactory review of program health. 8. Concurrence with draft TDS, TES, and SEP. 9. Approval of full funding...Description ( CARD ) SECNAV M-5000.2 May 2012 5-3 Enclosure (1) A sound cost estimate is based on a well-defined program. The CARD is used

  10. Light-weight cyptography for resource constrained environments

    NASA Astrophysics Data System (ADS)

    Baier, Patrick; Szu, Harold

    2006-04-01

    We give a survey of "light-weight" encryption algorithms designed to maximise security within tight resource constraints (limited memory, power consumption, processor speed, chip area, etc.) The target applications of such algorithms are RFIDs, smart cards, mobile phones, etc., which may store, process and transmit sensitive data, but at the same time do not always support conventional strong algorithms. A survey of existing algorithms is given and new proposal is introduced.

  11. Using smart card technology to monitor the eating habits of children in a school cafeteria: 2. The nutrient contents of all meals chosen by a group of 8- to 11-year-old boys over 78 days.

    PubMed

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The aim of the study was to test the abilities of the newly created smart card system to track the nutrient contents of foods chosen over several months by individual diners in a school cafeteria. From the food choice and composition of food data sets, an Access database was created encompassing 30 diners (aged 8-11 years), 78 days and eight nutrients. Data were available for a total of 1909 meals. Based upon population mean values the cohort were clearly choosing meals containing higher than the recommended maximum amounts for sugar and lower than the recommended minimum amounts of fibre, iron and vitamin A. Protein and vitamin C contents of meals chosen were well above minimum requirements. Over the 1909 meals, nutrient requirements were met 41% of the time. The system created was very effective at continually monitoring food choices of individual diners over limitless time. The data generated raised questions on the common practice of presenting nutrient intakes as population mean values calculated over a few days. The impact of heavily fortified foods on such studies in general is discussed.

  12. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  13. 31 CFR 1028.200 - General.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS Programs § 1028.200 General. Operators of credit card systems are subject to the program requirements set forth and cross referenced in this subpart. Operators of credit card systems should also refer to Subpart B of Part 1010 of...

  14. 31 CFR 1028.200 - General.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS Programs § 1028.200 General. Operators of credit card systems are subject to the program requirements set forth and cross referenced in this subpart. Operators of credit card systems should also refer to Subpart B of Part 1010 of...

  15. 31 CFR 1028.200 - General.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS Programs § 1028.200 General. Operators of credit card systems are subject to the program requirements set forth and cross referenced in this subpart. Operators of credit card systems should also refer to Subpart B of Part 1010 of...

  16. 31 CFR 1028.200 - General.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS Programs § 1028.200 General. Operators of credit card systems are subject to the program requirements set forth and cross referenced in this subpart. Operators of credit card systems should also refer to Subpart B of Part 1010 of...

  17. A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor

    NASA Astrophysics Data System (ADS)

    Swee Wen, Khoo; Mahinderjit Singh, Manmeet

    2016-11-01

    Location based service is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. NFC location based service is using one of the modes of NFC such as peer-to-peer, reader/writer, and card emulation to obtain the information of the object and then get the location of the object. In this paper, the proposed solution is I- NFC-enabled Pervasive Social Networking apps for florists. It combines the NFC location based service with Online Social Network (OSN). In addition, a smart advisor in the system to provide output in making their own decision while purchasing products.The development of the system demonstrates that a designed commerce site is provided which enable a communication between NFC-enabled smartphone, NFC-enabled application and OSN. GPS functionalities also implemented to provide map and location of business services. Smart advisor also designed to provide information for users who do not have ideas what to purchase.

  18. A System for Anesthesia Drug Administration Using Barcode Technology: The Codonics Safe Label System and Smart Anesthesia Manager.

    PubMed

    Jelacic, Srdjan; Bowdle, Andrew; Nair, Bala G; Kusulos, Dolly; Bower, Lynnette; Togashi, Kei

    2015-08-01

    Many anesthetic drug errors result from vial or syringe swaps. Scanning the barcodes on vials before drug preparation, creating syringe labels that include barcodes, and scanning the syringe label barcodes before drug administration may help to prevent errors. In contrast, making syringe labels by hand that comply with the recommendations of regulatory agencies and standards-setting bodies is tedious and time consuming. A computerized system that uses vial barcodes and generates barcoded syringe labels could address both safety issues and labeling recommendations. We measured compliance of syringe labels in multiple operating rooms (ORs) with the recommendations of regulatory agencies and standards-setting bodies before and after the introduction of the Codonics Safe Label System (SLS). The Codonics SLS was then combined with Smart Anesthesia Manager software to create an anesthesia barcode drug administration system, which allowed us to measure the rate of scanning syringe label barcodes at the time of drug administration in 2 cardiothoracic ORs before and after introducing a coffee card incentive. Twelve attending cardiothoracic anesthesiologists and the OR satellite pharmacy participated. The use of the Codonics SLS drug labeling system resulted in >75% compliant syringe labels (95% confidence interval, 75%-98%). All syringe labels made using the Codonics SLS system were compliant. The average rate of scanning barcodes on syringe labels using Smart Anesthesia Manager was 25% (730 of 2976) over 13 weeks but increased to 58% (956 of 1645) over 8 weeks after introduction of a simple (coffee card) incentive (P < 0.001). An anesthesia barcode drug administration system resulted in a moderate rate of scanning syringe label barcodes at the time of drug administration. Further, adaptation of the system will be required to achieve a higher utilization rate.

  19. Usage of Credit Cards Received through College Student-Marketing Programs

    ERIC Educational Resources Information Center

    Barron, John M.; Staten, Michael E.

    2004-01-01

    This article provides benchmark measures of college student credit card usage by utilizing a pooled sample of over 300,000 recently opened credit card accounts. The analysis compares behavior over 12 months of account history for three groups of accounts: those opened by young adults through college student marketing programs; those opened through…

  20. A Smart Card-Based Electronic School Absenteeism System for Influenza-Like Illness Surveillance in Hong Kong: Design, Implementation, and Feasibility Assessment

    PubMed Central

    Lau, Eric HY; So, Hau Chi; Xiao, Jingyi; Lam, Chi Kin; Fang, Vicky J; Tam, Yat Hung; Leung, Gabriel M; Cowling, Benjamin J

    2017-01-01

    Background School-aged children have the highest incidence of respiratory virus infections each year, and transmission of respiratory viruses such as influenza virus can be a major concern in school settings. School absenteeism data have been employed as a component of influenza surveillance systems in some locations. Data timeliness and system acceptance remain as key determinants affecting the usefulness of a prospective surveillance system. Objective The aim of this study was to assess the feasibility of implementing an electronic school absenteeism surveillance system using smart card–based technology for influenza-like illness (ILI) surveillance among a representative network of local primary and secondary schools in Hong Kong. Methods We designed and implemented a surveillance system according to the Protocol for a Standardized information infrastructure for Pandemic and Emerging infectious disease Response (PROSPER). We employed an existing smart card–based education and school administration platform for data capture, customized the user interface, and used additional back end systems built for other downstream surveillance steps. We invited local schools to participate and collected absenteeism data by the implemented system. We compared temporal trend of the absenteeism data with data from existing community sentinel and laboratory surveillance data. Results We designed and implemented an ILI surveillance system utilizing smart card–based attendance tracking approach for data capture. We implemented the surveillance system in a total of 107 schools (including 66 primary schools and 41 secondary schools), covering a total of 75,052 children. The system successfully captured information on absences for 2 consecutive academic years (2012-2013 and 2013-2014). The absenteeism data we collected from the system reflected ILI activity in the community, with an upsurge in disease activity detected up to 1 to 2 weeks preceding other existing surveillance systems. Conclusions We designed and implemented a novel smart card technology–based school absenteeism surveillance system. Our study demonstrated the feasibility of building a large-scale surveillance system riding on a routinely adopted data collection approach and the use of simple system enhancement to minimize workload implication and enhance system acceptability. Data from this system have potential value in supplementing existing sentinel influenza surveillance for situational awareness of influenza activity in the community. PMID:28986338

  1. Time Delay Measurements of Key Generation Process on Smart Cards

    DTIC Science & Technology

    2015-03-01

    random number generator is available (Chatterjee & Gupta, 2009). The ECC algorithm will grow in usage as information becomes more and more secure. Figure...Worldwide Mobile Enterprise Security Software 2012–2016 Forecast and Analysis), mobile identity and access management is expected to grow by 27.6 percent...iPad, tablets) as well as 80000 BlackBerry phones. The mobility plan itself will be deployed in three phases over 2014, with the first phase

  2. Army Sustainment. Volume 42, Issue 3. May-June 2010

    DTIC Science & Technology

    2010-06-01

    created smart cards, refined the content and layout of routine briefs, and developed a workable battle rhythm for the rotation. Many...of classroom MDMP exercise is their only MDMP experience. (Photo by MAJ Christopher LeCron) MAY–jUNE 2010 17 headquarters’ G/S–4 and LNO, ensuring...CTSSB proceed ing. After organizing the survey data, 10 Centra class- rooms were created in ALMS. These classrooms were designated as the sites for each

  3. A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors

    DTIC Science & Technology

    2012-01-01

    and mobile phones, lottery ticket vending machines , and various electronic payment systems. The main reason for their use in such applications is that...military applications such as secure communication links. However, the proliferation of Automated Teller Machines (ATMs) in the ’80s introduced them to...commercial applications. Today many popular consumer devices have cryptographic processors in them, for example, smart- cards for pay-TV access machines

  4. Secure Biometric E-Voting Scheme

    NASA Astrophysics Data System (ADS)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  5. Automated visual inspection system based on HAVNET architecture

    NASA Astrophysics Data System (ADS)

    Burkett, K.; Ozbayoglu, Murat A.; Dagli, Cihan H.

    1994-10-01

    In this study, the HAusdorff-Voronoi NETwork (HAVNET) developed at the UMR Smart Engineering Systems Lab is tested in the recognition of mounted circuit components commonly used in printed circuit board assembly systems. The automated visual inspection system used consists of a CCD camera, a neural network based image processing software and a data acquisition card connected to a PC. The experiments are run in the Smart Engineering Systems Lab in the Engineering Management Dept. of the University of Missouri-Rolla. The performance analysis shows that the vision system is capable of recognizing different components under uncontrolled lighting conditions without being effected by rotation or scale differences. The results obtained are promising and the system can be used in real manufacturing environments. Currently the system is being customized for a specific manufacturing application.

  6. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... other methods of purchasing. However, the same legal restrictions apply to credit card purchases that.../Agency Purchase/Credit Card Program procedures. A number of the more common restrictions which... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR...

  7. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... other methods of purchasing. However, the same legal restrictions apply to credit card purchases that.../Agency Purchase/Credit Card Program procedures. A number of the more common restrictions which... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR...

  8. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... other methods of purchasing. However, the same legal restrictions apply to credit card purchases that.../Agency Purchase/Credit Card Program procedures. A number of the more common restrictions which... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR...

  9. User’s Guide for COMBIMAN Programs (COMputerized BIomechanical MAN-Model). Version 4.

    DTIC Science & Technology

    1981-01-01

    103 2.2.23 STATE SWITCH Function (PFK29) 105 2.2.24 RESTART PROGRAM Function (PFK30) 110 2.2.25 END PROGRAM Function (PFK31) il 2.3 EXECUTING THE JOB...108 40 Transformation Equation Developed for Positioning Stomach Link (Set State Switch 72 ON) 109 41 JOB CONTROL CARDS to Execute CBM04. 114 42...154 50b Program CBMAM Survey Member Dimension Definition Cards. 154 51 Example of Survey, or Type 1, Member. 155 52 Job Control Cards to Execute CBMAM

  10. 78 FR 1916 - 30-Day Notice of Proposed Information Collection: Smart Traveler Enrollment Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-09

    ... DEPARTMENT OF STATE [Public Notice 8147] 30-Day Notice of Proposed Information Collection: Smart Traveler Enrollment Program ACTION: Notice of request for public comment and submission to OMB of proposed....gov . SUPPLEMENTARY INFORMATION: Title of Information Collection: Smart Traveler Enrollment Program...

  11. 77 FR 71169 - Smart Grid Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-29

    ... cybersecurity coordination and the NIST Smart Grid Program Plan. The agenda may change to accommodate Committee... receive presentations on cybersecurity coordination and the NIST Smart Grid Program Plan. The agenda may...

  12. Machine learning techniques to predict sensitive patterns to fault attack in the Java Card application

    NASA Astrophysics Data System (ADS)

    Chahrazed, Yahiaoui; Jean-Louis, Lanet; Mohamed, Mezghiche; Karim, Tamine

    2018-01-01

    Fault attack represents one of the serious threats against Java Card security. It consists of physical perturbation of chip components to introduce faults in the code execution. A fault may be induced using a laser beam to impact opcodes and operands of instructions. This could lead to a mutation of the application code in such a way that it becomes hostile. Any successful attack may reveal a secret information stored in the card or grant an undesired authorisation. We propose a methodology to recognise, during the development step, the sensitive patterns to the fault attack in the Java Card applications. It is based on the concepts from text categorisation and machine learning. In fact, in this method, we represented the patterns using opcodes n-grams as features, and we evaluated different machine learning classifiers. The results show that the classifiers performed poorly when classifying dangerous sensitive patterns, due to the imbalance of our data-set. The number of dangerous sensitive patterns is much lower than the number of not dangerous patterns. We used resampling techniques to balance the class distribution in our data-set. The experimental results indicated that the resampling techniques improved the accuracy of the classifiers. In addition, our proposed method reduces the execution time of sensitive patterns classification in comparison to the SmartCM tool. This tool is used in our study to evaluate the effect of faults on Java Card applications.

  13. 77 FR 65244 - 60-Day Notice of Proposed Information Collection: Smart Traveler Enrollment Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-25

    ... DEPARTMENT OF STATE [Public Notice 8072] 60-Day Notice of Proposed Information Collection: Smart Traveler Enrollment Program ACTION: Notice of request for public comments. SUMMARY: The Department of State...: Title of Information Collection: Smart Traveler Enrollment Program (STEP) OMB Control Number: 1405-0152...

  14. User's guide to program FLEXSTAB. [aerodynamics

    NASA Technical Reports Server (NTRS)

    Cavin, R. K., III; Colunga, D.

    1975-01-01

    A manual is presented for correctly submitting program runs in aerodynamics on the UNIVAC 1108 computer system. All major program modules are included. Control cards are documented for the user's convenience, and card parameters are included in order to provide some idea as to reasonable time estimates for the program modules.

  15. A Bridge to a Smart Start: A Case Study of Northampton Community College's Summer Bridge Program

    ERIC Educational Resources Information Center

    Sparrow, Michael J.

    2017-01-01

    This study sought to understand how and why Northampton Community College's Summer Bridge program--The Smart Start program--is highly successful at helping "at-risk" students transition to college-level work. For ten years, the Smart Start program has helped more than 150 incoming students acclimate to college, persist, and graduate…

  16. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...

  17. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...

  18. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...

  19. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...

  20. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...

  1. Performance Assessment Method for a Forged Fingerprint Detection Algorithm

    NASA Astrophysics Data System (ADS)

    Shin, Yong Nyuo; Jun, In-Kyung; Kim, Hyun; Shin, Woochang

    The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. With the recognition that this threat factor may disrupt the large-scale civil service operations approaching implementation, such as electronic ID cards and e-Government systems, many agencies and vendors around the world continue to develop forged fingerprint detection technology, but no objective performance assessment method has, to date, been reported. Therefore, in this paper, we propose a methodology designed to evaluate the objective performance of the forged fingerprint detection technology that is currently attracting a great deal of attention.

  2. The Aircraft Morphing Program

    NASA Technical Reports Server (NTRS)

    Wlezien, R. W.; Horner, G. C.; McGowan, A. R.; Padula, S. L.; Scott, M. A.; Silcox, R. J.; Simpson, J. O.

    1998-01-01

    In the last decade smart technologies have become enablers that cut across traditional boundaries in materials science and engineering. Here we define smart to mean embedded actuation, sensing, and control logic in a tightly coupled feedback loop. While multiple successes have been achieved in the laboratory, we have yet to see the general applicability of smart devices to real aircraft systems. The NASA Aircraft Morphing program is an attempt to couple research across a wide range of disciplines to integrate smart technologies into high payoff aircraft applications. The program bridges research in seven individual disciplines and combines the effort into activities in three primary program thrusts. System studies are used to assess the highest- payoff program objectives, and specific research activities are defined to address the technologies required for development of smart aircraft systems. In this paper we address the overall program goals and programmatic structure, and discuss the challenges associated with bringing the technologies to fruition.

  3. Teaching Basic Cooking Skills: Evaluation of the North Carolina Extension "Cook Smart, Eat Smart" Program

    ERIC Educational Resources Information Center

    Dunn, Carolyn; Jayaratne, K. S. U.; Baughman, Kristen; Levine, Katrina

    2014-01-01

    Cook Smart, Eat Smart (CSES) is a 12-hour cooking school that teaches participants to prepare nutritious, delicious food using simple, healthy preparation techniques, basic ingredients, and minimal equipment. The purpose of this evaluation was to examine the impact of CSES on food preparation and meal consumption behavior. Program outcomes include…

  4. Smart Columbus : Systems Engineering Management Plan (SEMP) for Smart Columbus Demonstration Program

    DOT National Transportation Integrated Search

    2018-01-16

    The Smart City Demonstration Program is intended to improve access through expanded mobility options in major job centers, enhance visitor experience by better connecting visitors to transportation options, stimulate regional economic prosperity and ...

  5. On Developing HyperCard Stacks for the Study of Chinese Characters: KanjiCard.

    ERIC Educational Resources Information Center

    Nakajima, Kazuko

    1988-01-01

    Describes "KanjiCard," an interactive self-tutorial program for beginning students of Japanese to learn Kanji, Chinese characters used in the Japanese language. The Macintosh-developed approach uses "HyperCard" technology, computer-assisted animation, and voice digitizing to achieve enhanced graphic presentation. (Author/CB)

  6. New developments in flexible cholesteric liquid crystal displays

    NASA Astrophysics Data System (ADS)

    Schneider, Tod; Davis, Donald J.; Franklin, Sean; Venkataraman, Nithya; McDaniel, Diaz; Nicholson, Forrest; Montbach, Erica; Khan, Asad; Doane, J. William

    2007-02-01

    Flexible Cholesteric liquid crystal displays have been rapidly maturing into a strong contender in the flexible display market. Encapsulation of the Cholesteric liquid crystal permits the use of flexible plastic substrates and roll-to-roll production. Recent advances include ultra-thin displays, laser-cut segmented displays of variable geometry, and smart card applications. Exciting technologies such as simultaneous laser-edge sealing and singulation enable high volume production, excellent quality control and non-traditional display geometries and formats.

  7. Ring aggregation pattern of metro passenger trips: A study using smart card data

    NASA Astrophysics Data System (ADS)

    Wang, Ziyang; Hu, Yuxin; Zhu, Peng; Qin, Yong; Jia, Limin

    2018-02-01

    With the widespread implementation of smart cards and with more travel details being recorded, travel patterns can be studied more precisely and deeply. Although considerable attention has been paid to travel patterns, the relationship between travel patterns and the functional structure of a city is yet to be well understood. In this research, we study this relationship by analysing metro passenger trip data (in Beijing and Shenzhen in China and London in the United Kingdom), and we present two unprecedented findings. First, through averaging, a linear relationship is found to exist between individual travel distance and the distance between the origin and the city centre. The underlying mechanism is a travel pattern we call "ring aggregation", i.e., the daily movement of city passengers is aggregated into a ring (with approximately equal distances to the city centre). Then, for commuting trips, the daily travel pattern can be regarded as switching between the outer residential ring and the inner work ring. Second, this linear relationship and the ring aggregation pattern seem to be exclusive characteristics of metro systems (and may also fit other moderate- and long-distance transportation modes) but do not apply to short-distance transportation modes, such as bicycles and taxis. This finding implies that the ring aggregation pattern is a product of the relationship between travel patterns and the city functional structure at a large scope.

  8. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  9. Evaluation of the feasibility of security technologies in teleradiology as biometric fingerprint scanners for data exchange over a satellite WAN

    NASA Astrophysics Data System (ADS)

    Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter

    2000-05-01

    We evaluated the feasibility of fingerprint-scanners in combination with smart cards for personal identification and transmission of encrypted TCP/IP-data-packages via satellite between the university-hospital of Innsbruck and the rural hospital of Reutte. The aim of our study was the proof of the userfriendliness of the SkymedTM technology for security purpose in teleradiology. We examined the time of the personal identification process, the time for the necessary training and the personal satisfaction. The images were sent from the local PACS in Reutte via a Data-Encryption-and-Transmission- Box via satellite from Reutte to Innsbruck. We used an asymmetric bandwidth of 512 kbit/s from Reutte to Innsbruck and 128 kbit/s in the opposite direction. Window NT 4.0- operating PCs were used for the electronical patient record, the medical inquiry of the referring physician and the final report of the radiologist. The images were reported on an UNIX-PACS viewing station. After identification through fingerprint-scanners in combination with the smart card the radiologist was able to open the electronic patient record (EPR) from Reutte and sign with his digital signature his confirmed final report before it was send back to Reutte. The used security technology enables encrypted communication over a WAN, which fulfill data-protection.

  10. Being "SMART" About Adolescent Conduct Problems Prevention: Executing a SMART Pilot Study in a Juvenile Diversion Agency.

    PubMed

    August, Gerald J; Piehler, Timothy F; Bloomquist, Michael L

    2016-01-01

    The development of adaptive treatment strategies (ATS) represents the next step in innovating conduct problems prevention programs within a juvenile diversion context. Toward this goal, we present the theoretical rationale, associated methods, and anticipated challenges for a feasibility pilot study in preparation for implementing a full-scale SMART (i.e., sequential, multiple assignment, randomized trial) for conduct problems prevention. The role of a SMART design in constructing ATS is presented. The SMART feasibility pilot study includes a sample of 100 youth (13-17 years of age) identified by law enforcement as early stage offenders and referred for precourt juvenile diversion programming. Prior data on the sample population detail a high level of ethnic diversity and approximately equal representations of both genders. Within the SMART, youth and their families are first randomly assigned to one of two different brief-type evidence-based prevention programs, featuring parent-focused behavioral management or youth-focused strengths-building components. Youth who do not respond sufficiently to brief first-stage programming will be randomly assigned a second time to either an extended parent- or youth-focused second-stage programming. Measures of proximal intervention response and measures of potential candidate tailoring variables for developing ATS within this sample are detailed. Results of the described pilot study will include information regarding feasibility and acceptability of the SMART design. This information will be used to refine a subsequent full-scale SMART. The use of a SMART to develop ATS for prevention will increase the efficiency and effectiveness of prevention programing for youth with developing conduct problems.

  11. Evaluation of a new solid media specimen transport card for high risk HPV detection and cervical cancer prevention.

    PubMed

    Maurer, Kathryn; Luo, Hongxue; Shen, Zhiyong; Wang, Guixiang; Du, Hui; Wang, Chun; Liu, Xiaobo; Wang, Xiamen; Qu, Xinfeng; Wu, Ruifang; Belinson, Jerome

    2016-03-01

    Solid media transport can be used to design adaptable cervical cancer screening programs but currently is limited by one card with published data. To develop and evaluate a solid media transport card for use in high-risk human papillomavirus detection (HR-HPV). The Preventative Oncology International (POI) card was constructed using PK 226 paper(®) treated with cell-lysing solution and indicating dye. Vaginal samples were applied to the POI card and the indicating FTA (iFTA) elute card. A cervical sample was placed in liquid media. All specimens were tested for HR-HPV. Color change was assessed at sample application and at card processing. Stability of the POI card and iFTA elute card was tested at humidity. 319 women were enrolled. Twelve women had at least one insufficient sample with no difference between media (p=0.36). Compared to liquid samples, there was good agreement for HR-HPV detection with kappa of 0.81 (95% CI 0.74-0.88) and 0.71 (95% CI 0.62-0.79) for the POI and iFTA elute card respectively. Sensitivity for ≥CIN2 was 100% (CI 100-100%), 95.1% (CI 92.7-97.6%), and 93.5% (CI 90.7-96.3%) for the HR-HPV test from the liquid media, POI card, and iFTA elute card respectively. There was no color change of the POI card noted in humidity but the iFTA elute card changed color at 90% humidity. The POI card is suitable for DNA transport and HR-HPV testing. This card has the potential to make cervical cancer screening programs more affordable worldwide. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. The Effects of Smart Start on Young Children with Disabilities & Their Families. Final Report.

    ERIC Educational Resources Information Center

    Porter, Patricia; Munn, Duncan; Buysse, Virginia; Tyndall, Sabrina

    Smart Start, North Carolina's early childhood initiative, seeks to improve early childhood programs and ensure that all North Carolina children enter school healthy and ready to learn. This study evaluated outcomes related to Smart Start program inclusion of young children with disabilities: (1) access to inclusive programming; (2) quality of…

  13. CareerSmarts. 4-H Mentoring Program. Agent's Handbook. Mentor's Handbook. Protege's Handbook.

    ERIC Educational Resources Information Center

    Locklear, Eddie L.

    The North Carolina 4-H CareerSmarts Program is designed to unite the public and private sectors to provide career education for young people. This packet contains three handbooks (for agents, proteges, and mentors) that explain the program and outline practical ways to conduct it. CareerSmarts consists of three phases. Phase one is conducted…

  14. 12 CFR 226.53 - Allocation of payments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End Credit... payment for a credit card account under an open-end (not home-secured) consumer credit plan, the card... program. When a balance on a credit card account under an open-end (not home-secured) consumer credit plan...

  15. 31 CFR 1021.610 - Due diligence programs for correspondent accounts for foreign financial institutions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... TREASURY RULES FOR CASINOS AND CARD CLUBS Special Standards of Diligence; Prohibitions; and Special Measures for Casinos and Card Clubs § 1021.610 Due diligence programs for correspondent accounts for...

  16. 31 CFR 1021.610 - Due diligence programs for correspondent accounts for foreign financial institutions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... TREASURY RULES FOR CASINOS AND CARD CLUBS Special Standards of Diligence; Prohibitions; and Special Measures for Casinos and Card Clubs § 1021.610 Due diligence programs for correspondent accounts for...

  17. 31 CFR 1021.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... CARD CLUBS Special Standards of Diligence; Prohibitions; and Special Measures for Casinos and Card Clubs § 1021.620 Due diligence programs for private banking accounts. (a) Refer to § 1010.620 of this...

  18. 31 CFR 1021.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... CARD CLUBS Special Standards of Diligence; Prohibitions; and Special Measures for Casinos and Card Clubs § 1021.620 Due diligence programs for private banking accounts. (a) Refer to § 1010.620 of this...

  19. 31 CFR 1021.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... CARD CLUBS Special Standards of Diligence; Prohibitions; and Special Measures for Casinos and Card Clubs § 1021.620 Due diligence programs for private banking accounts. (a) Refer to § 1010.620 of this...

  20. 31 CFR 1021.610 - Due diligence programs for correspondent accounts for foreign financial institutions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... TREASURY RULES FOR CASINOS AND CARD CLUBS Special Standards of Diligence; Prohibitions; and Special Measures for Casinos and Card Clubs § 1021.610 Due diligence programs for correspondent accounts for...

  1. 31 CFR 1021.610 - Due diligence programs for correspondent accounts for foreign financial institutions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... TREASURY RULES FOR CASINOS AND CARD CLUBS Special Standards of Diligence; Prohibitions; and Special Measures for Casinos and Card Clubs § 1021.610 Due diligence programs for correspondent accounts for...

  2. 31 CFR 1021.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... CARD CLUBS Special Standards of Diligence; Prohibitions; and Special Measures for Casinos and Card Clubs § 1021.620 Due diligence programs for private banking accounts. (a) Refer to § 1010.620 of this...

  3. FASTER 3: A generalized-geometry Monte Carlo computer program for the transport of neutrons and gamma rays. Volume 2: Users manual

    NASA Technical Reports Server (NTRS)

    Jordan, T. M.

    1970-01-01

    A description of the FASTER-III program for Monte Carlo Carlo calculation of photon and neutron transport in complex geometries is presented. Major revisions include the capability of calculating minimum weight shield configurations for primary and secondary radiation and optimal importance sampling parameters. The program description includes a users manual describing the preparation of input data cards, the printout from a sample problem including the data card images, definitions of Fortran variables, the program logic, and the control cards required to run on the IBM 7094, IBM 360, UNIVAC 1108 and CDC 6600 computers.

  4. SMART Fires: A COTS Approach to Tactical Fire Support Using a Smartphone

    DTIC Science & Technology

    2011-09-01

    Battalion Landing Team C2 Command and Control C2PC Command and Control Personal Computer CAC Common Access Card COC Combat Operation Center COIN...functionality to way-points. It is currently available on the iTunes App Store for $5.99 (Tactical NAV, 2010). 11 MILS are a unit...download on both the iTunes App Store and the Android Marketplace. Apps for the Army (A4A) also created a repository for the applications submitted, along

  5. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    DTIC Science & Technology

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  6. Spending Smart: How To Budget and Finance. Making Sense of Your Budget Dollars; Success with Budget Proposals; Encumbering Grants: Managing the Money; Write a Grant? Me?; Using Microsoft[R] Excel To Plan and Budget in Your School Library; Charging Ahead; The No-Money Lottery; Coffee, Anyone?

    ERIC Educational Resources Information Center

    Bernstein, Allison; Baule, Steve; Farmer, Lesley S. J.; Anderson, Cyndee; Barringer, Crystal; Buchanan, Peggy; Fullner, Sheryl Kindle; Knop, Kathi; Larson, Chris

    2002-01-01

    Includes eight articles that address issues related to budgeting and finances in secondary school libraries. Topics include limited budgets; budget proposals; administering grants; writing grants; using Microsoft's Excel software for budgeting; using credit cards for library purchases; offering prizes for donating books; and offering coffee and…

  7. Development and design of a late-model fitness test instrument based on LabView

    NASA Astrophysics Data System (ADS)

    Xie, Ying; Wu, Feiqing

    2010-12-01

    Undergraduates are pioneers of China's modernization program and undertake the historic mission of rejuvenating our nation in the 21st century, whose physical fitness is vital. A smart fitness test system can well help them understand their fitness and health conditions, thus they can choose more suitable approaches and make practical plans for exercising according to their own situation. following the future trends, a Late-model fitness test Instrument based on LabView has been designed to remedy defects of today's instruments. The system hardware consists of fives types of sensors with their peripheral circuits, an acquisition card of NI USB-6251 and a computer, while the system software, on the basis of LabView, includes modules of user register, data acquisition, data process and display, and data storage. The system, featured by modularization and an open structure, is able to be revised according to actual needs. Tests results have verified the system's stability and reliability.

  8. Architecture for distributed actuation and sensing using smart piezoelectric elements

    NASA Astrophysics Data System (ADS)

    Etienne-Cummings, Ralph; Pourboghrat, Farzad; Maruboyina, Hari K.; Abrate, Serge; Dhali, Shirshak K.

    1998-07-01

    We discuss vibration control of a cantilevered plate with multiple sensors and actuators. An architecture is chosen to minimize the number of control and sensing wires required. A custom VLSI chip, integrated with the sensor/actuator elements, controls the local behavior of the plate. All the actuators are addressed in parallel; local decode logic selects which actuator is stimulated. Downloaded binary data controls the applied voltage and modulation frequency for each actuator, and High Voltage MOSFETs are used to activate them. The sensors, which are independent adjacent piezoelectric ceramic elements, can be accessed in a random or sequential manner. An A/D card and GPIB interconnected test equipment allow a PC to read the sensors' outputs and dictate the actuation procedure. A visual programming environment is used to integrate the sensors, controller and actuators. Based on the constitutive relations for the piezoelectric material, simple models for the sensors and actuators are derived. A two level hierarchical robust controller is derived for motion control and for damping of vibrations.

  9. 41 CFR 101-26.509-2 - Requisitioning tabulating machine cards not available from Federal Supply Schedule contracts.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... machine cards not available from Federal Supply Schedule contracts. 101-26.509-2 Section 101-26.509-2... Programs § 101-26.509-2 Requisitioning tabulating machine cards not available from Federal Supply Schedule contracts. (a) Requisitions for tabulating machine cards covered by Federal Supply Schedule contracts which...

  10. 42 CFR 403.811 - Enrollment and disenrollment and associated endorsed sponsor requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... card programs, offered in the individual's State of residence. (11) In order to access negotiated... residence outside the service area of the current program; (ii) A change in residence to or from a long-term... individual's current endorsed discount card program is terminated or terminates; or (v) Other exceptional...

  11. 31 CFR 1028.210 - Anti-money laundering programs for operators of credit card systems.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... minimum, the program must: (1) Incorporate policies, procedures, and internal controls designed to ensure... program reasonably designed to prevent the operator of a credit card system from being used to facilitate... Designated Nationals List issued by Treasury's Office of Foreign Assets Control; (C) A person located in, or...

  12. 31 CFR 1028.210 - Anti-money laundering programs for operators of credit card systems.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... minimum, the program must: (1) Incorporate policies, procedures, and internal controls designed to ensure... program reasonably designed to prevent the operator of a credit card system from being used to facilitate... Designated Nationals List issued by Treasury's Office of Foreign Assets Control; (C) A person located in, or...

  13. 31 CFR 1028.210 - Anti-money laundering programs for operators of credit card systems.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... minimum, the program must: (1) Incorporate policies, procedures, and internal controls designed to ensure... program reasonably designed to prevent the operator of a credit card system from being used to facilitate... Designated Nationals List issued by Treasury's Office of Foreign Assets Control; (C) A person located in, or...

  14. 31 CFR 1028.210 - Anti-money laundering programs for operators of credit card systems.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... minimum, the program must: (1) Incorporate policies, procedures, and internal controls designed to ensure... program reasonably designed to prevent the operator of a credit card system from being used to facilitate... Designated Nationals List issued by Treasury's Office of Foreign Assets Control; (C) A person located in, or...

  15. Using medical history embedded in biometrics medical card for user identity authentication: data representation by AVT hierarchical data tree.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.

  16. MVRTA Charge-A-Ride Program : Credit Card Fare Post-Payment in Haverhill, MA.

    DOT National Transportation Integrated Search

    1988-03-01

    This report presents an evaluation of a demonstration of automated fare collection using on-board credit card readers and recorders on general revenue service buses in Haverhill, Massachusetts. The demonstration project employed a credit card system ...

  17. The "We Card" program: tobacco industry "youth smoking prevention" as industry self-preservation.

    PubMed

    Apollonio, Dorie E; Malone, Ruth E

    2010-07-01

    The "We Card" program is the most ubiquitous tobacco industry "youth smoking prevention" program in the United States, and its retailer materials have been copied in other countries. The program's effectiveness has been questioned, but no previous studies have examined its development, goals, and uses from the tobacco industry's perspective. On the basis of our analysis of tobacco industry documents released under the 1998 Master Settlement Agreement, we concluded that the We Card program was undertaken for 2 primary purposes: to improve the tobacco industry's image and to reduce regulation and the enforcement of existing laws. Policymakers should be cautious about accepting industry self-regulation at face value, both because it redounds to the industry's benefit and because it is ineffective.

  18. Notification: Fiscal Year 2015 Risk Assessment of EPA's Purchase Card and Convenience Check Programs

    EPA Pesticide Factsheets

    Project #OA-FY15-0064, August 26, 2015. The U.S. Environmental Protection Agency (EPA) Office oflnspector General (OIG) plans to begin the preliminary research phase ofauditing the agency's purchase card and convenience check programs.

  19. Material fatigue data obtained by card-programmed hydraulic loading system

    NASA Technical Reports Server (NTRS)

    Davis, W. T.

    1967-01-01

    Fatigue tests using load distributions from actual loading histories encountered in flight are programmed on punched electronic accounting machine cards. With this hydraulic loading system, airframe designers can apply up to 55 load levels to a test specimen.

  20. Medicare's Drug Discount Card Program: Beneficiaries' Experience with Choice

    PubMed Central

    Hassol, Andrea; Wrobel, Marian V.; Doksum, Teresa

    2007-01-01

    This article describes Medicare beneficiaries' experience with the choice among Medicare drug discount cards and is based primarily on surveys and focus groups with beneficiaries as well as interviews with other stakeholders. Although competition and choice have the potential to reduce cost and enhance quality in the Medicare Program, our findings highlight some of the challenges involved in making choice work in practice. Despite the unique and temporary nature of the drug discount card program, these findings have considerable relevance to the Part D drug benefit and to other Medicare initiatives that rely on choice. PMID:17722747

  1. 78 FR 51649 - Supplemental Nutrition Assistance Program: Trafficking Controls and Fraud Investigations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-21

    ... card, a household's shopping behavior is three times more likely to be flagged as potential [[Page... many first-time users do not understand how to use the card and a grace period in the beginning would... that a replacement card is not needed every time the benefits are spent down or that once a card is...

  2. Smart Kids: SMART Connections.

    ERIC Educational Resources Information Center

    Martin, Jennifer; And Others

    1991-01-01

    SMART (Science, Math, and Relevant Technology) Connections, an afterschool offshoot of a program addressing the scarcity of women in science, provides low-income children and children of color, both boys and girls, with hands-on science experience. Efforts continue to be made to ensure that the program works equally for boys as for girls. (CJS)

  3. [Aspects of data protection in telemedicine].

    PubMed

    Vetter, R

    2001-10-01

    Telemedical applications like the electronic patient file, the electronic physician's letter and the electronic consultation ("Telekonsil"), the electronic prescription, the electronic patient's card (the "patient smart card") facilitate and improve the processing of sensitive medical data as well as the possibilities for using medical resources in an unusual degree and can thereby substantially contribute to the well-being of the patient. However, improving the quality of medical supply must not lead to a degradation of the patients' rights, in particular their right of self-determination. The introduction and the use of telemedical applications do not change the legal basic conditions for medical data processing. Therefore, a patient-friendly telemedicine must include data protection as well. Data protective telemedicine requires medical secrecy ensuring the patients' rights of information and transparency, correction of false and the up-to-date deletion of information that is no longer necessary, as well as secure data processing. All electronic processing of patients' data must meet the requirements of data security, i.e. the confidentiality, the integrity, the availability of the data at any time and the verifiability of the data processing have to be guaranteed. For this, electronic signatures and encodings have to be used, medical information systems have to be protected effectively against any risks resulting from open networks, particularly the Internet, and data processing has to be monitored. Electronic patient files may be open only to the treating physician and the medical assistants up to the necessary extent, ensuring the possibility of an emergency access. Any access beyond that does require the special consent of the patient. The medical secrecy has to be ensured. The electronic prescription with a documentation of the patient's medication requires the consent of the patient and must protect the rights of the physicians. In particular it has to ensure that the respective physician's prescribing behaviour cannot be stored or become known from a third party. Furthermore it has to protect the pharmacists' right to hide their turnover from other pharmacies. So-called patient smart cards require the consent of the patient. The right of the patient to keep his information secret, must be ensured with access options to the information stored on the smart card. Electronic physician's letters and socalled Telekonsile, i.e. the consultation with professional colleagues who were not involved in the patient's treatment from the beginning, require basically the agreement of the patient--if there cannot be dealt with anonymized data already from the beginning. In emergencies, after adequate consideration and weighing of values and interests, the consent of the patient can be suspected. The adherence to these boundary conditions ensures security and trustworthiness of telemedicine regarding the security of data processing as well as the rights of self-determination of all who are concerned. Data protection is also a contribution for the acceptance of these revolutionary advancements in the medical world.

  4. A modular radiative transfer program for gas filter correlation radiometry

    NASA Technical Reports Server (NTRS)

    Casas, J. C.; Campbell, S. A.

    1977-01-01

    The fundamentals of a computer program, simulated monochromatic atmospheric radiative transfer (SMART), which calculates atmospheric path transmission, solar radiation, and thermal radiation in the 4.6 micrometer spectral region, are described. A brief outline of atmospheric absorption properties and line by line transmission calculations is explained in conjunction with an outline of the SMART computational procedures. Program flexibility is demonstrated by simulating the response of a gas filter correlation radiometer as one example of an atmospheric infrared sensor. Program limitations, input data requirements, program listing, and comparison of SMART transmission calculations are presented.

  5. Developing a High Level Data Base to Teach Reproductive Endocrinology Using the HyperCard Program.

    ERIC Educational Resources Information Center

    Friedler, Yael; Shabo, Amnon

    1990-01-01

    Describes a database courseware using the HyperCard program on the subject of human reproductive endocrinology and feedback mechanisms. Discusses some issues concerning database courseware development. Presents several examples of the courseware display. (Author/YP)

  6. Notification: Review of the U.S. Environmental Protection Agency's Purchase Card and Convenience Check Program

    EPA Pesticide Factsheets

    Project #OA-FY13-0116, December 20, 2012. The U.S. Environmental Protection Agency, Office of Inspector General, plans to begin preliminary research for an audit of the agency’s purchase card and convenience check programs.

  7. Noncontact power/interrogation system for smart structures

    NASA Astrophysics Data System (ADS)

    Spillman, William B., Jr.; Durkee, S.

    1994-05-01

    The field of smart structures has been largely driven by the development of new high performance designed materials. Use of these materials has been generally limited due to the fact that they have not been in use long enough for statistical data bases to be developed on their failure modes. Real time health monitoring is therefore required for the benefits of structures using these materials to be realized. In this paper a non-contact method of powering and interrogating embedded electronic and opto-electronic systems is described. The technique utilizes inductive coupling between external and embedded coils etched on thin electronic circuit cards. The technique can be utilized to interrogate embedded sensors and to provide > 250 mW for embedded electronics. The system has been successfully demonstrated with a number of composite and plastic materials through material thicknesses up to 1 cm. An analytical description of the system is provided along with experimental results.

  8. A Welcomed Intrusion: A Response to Card and Giuliano's Evaluation of a Gifted Program

    ERIC Educational Resources Information Center

    Warne, Russell T.

    2016-01-01

    Card and Giuliano conducted a regression discontinuity study in a large Florida school district to investigate the magnitude of academic benefits of the district's gifted program. They found that for children identified as gifted through an intelligence test, the program provided few or no benefits. But children who were admitted to the gifted…

  9. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  10. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    PubMed

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.

  11. Being “SMART” about Adolescent Conduct Problems Prevention: Executing a SMART Pilot Study in a Juvenile Diversion Agency

    PubMed Central

    August, Gerald J.; Piehler, Timothy F.; Bloomquist, Michael L.

    2014-01-01

    OBJECTIVE The development of adaptive treatment strategies (ATS) represents the next step in innovating conduct problems prevention programs within a juvenile diversion context. Towards this goal, we present the theoretical rationale, associated methods, and anticipated challenges for a feasibility pilot study in preparation for implementing a full-scale SMART (i.e., sequential, multiple assignment, randomized trial) for conduct problems prevention. The role of a SMART design in constructing ATS is presented. METHOD The SMART feasibility pilot study includes a sample of 100 youth (13–17 years of age) identified by law enforcement as early stage offenders and referred for pre-court juvenile diversion programming. Prior data on the sample population detail a high level of ethnic diversity and approximately equal representations of both genders. Within the SMART, youth and their families are first randomly assigned to one of two different brief-type evidence-based prevention programs, featuring parent-focused behavioral management or youth-focused strengths-building components. Youth who do not respond sufficiently to brief first-stage programming will be randomly assigned a second time to either an extended parent- or youth-focused second-stage programming. Measures of proximal intervention response and measures of potential candidate tailoring variables for developing ATS within this sample are detailed. RESULTS Results of the described pilot study will include information regarding feasibility and acceptability of the SMART design. This information will be used to refine a subsequent full-scale SMART. CONCLUSIONS The use of a SMART to develop ATS for prevention will increase the efficiency and effectiveness of prevention programing for youth with developing conduct problems. PMID:25256135

  12. SmartMom Text Messaging for Prenatal Education: A Qualitative Focus Group Study to Explore Canadian Women’s Perceptions

    PubMed Central

    Munro, Sarah; Hui, Amber; Salmons, Vanessa; Solomon, Carolyn; Gemmell, Emily; Torabi, Nahal

    2017-01-01

    Background We engaged Canadian women in the development of a prenatal education program delivered via one-way text messaging called SmartMom. SmartMom is the first peer-reviewed, evidence-based mHealth program for prenatal education in Canada and the first to be endorsed by the Society of Obstetricians and Gynaecologists of Canada. Objective To explore women’s preferences for a prenatal education program by text messaging. Methods We conducted a qualitative focus group study in three Canadian communities in the Northern Health Authority. Women completed a demographic questionnaire, participated in a guided discussion about their pregnancy information-seeking behavior, reviewed a printed copy of the SmartMom text messages, and then engaged in a moderated discussion about their perceptions of the usability of the SmartMom program. Open-ended questions explored women’s perceptions regarding the message content, acceptability of receiving information by text message, positive health behaviors they might engage in after receiving a message, modifiable program factors, and intention to use the program. Thematic analysis of transcribed audio recordings was undertaken and modifications were made to the SmartMom program based on these findings. Results A total of 40 women participated in seven focus groups in three rural northern communities. The vast majority had a mobile phone (39/40, 98%), used text messages “all the time” (28/40, 70%), and surfed the Internet on their phone (37/40, 93%). Participants perceived SmartMom to be highly acceptable and relevant. The text message modality reflected how participants currently sought pregnancy-related information and provided them with local information tailored to their gestational age, which they had not received through other pregnancy resources. Women recommended adding the opportunity to receive supplemental streams of messages tailored to their individual needs, for example, depression, pregnancy after previous cesarean, >35 years of age, new immigrants, and harm reduction for smoking and alcohol. Conclusions This formative qualitative evaluation provides evidence that a prenatal education program by text messaging, SmartMom, is acceptable to the end users. These findings support the usability of the SmartMom program at a population level and the development of an evaluation program exploring the effects of the text messages on adoption of health-promoting behaviors and maternal-child health outcomes. PMID:28174149

  13. Using Credit Cards To Pay Bus Fares in Phoenix

    DOT National Transportation Integrated Search

    1996-01-01

    In 1991 the City of Phoenix Public Transit System, first in the nation to install magnetic card readers on the electronic fareboxes in its buses, implemented a program known as Bus Card Plus, which billed employers for trips made by employees using e...

  14. The Watershed Report Card.

    ERIC Educational Resources Information Center

    Kelly, Allyson

    1996-01-01

    Outlines the history and development of the Watershed Report Card, an integrated program that educates Ontario participants about the holistic nature of a watershed and fosters community stewardship of the local ecosystem. The program consists of the inventory level, assessment and monitoring level, and remediation level. Emphasizes partnerships…

  15. A computer program to trace seismic ray distribution in complex two-dimensional geological models

    USGS Publications Warehouse

    Yacoub, Nazieh K.; Scott, James H.

    1970-01-01

    A computer program has been developed to trace seismic rays and their amplitudes and energies through complex two-dimensional geological models, for which boundaries between elastic units are defined by a series of digitized X-, Y-coordinate values. Input data for the program includes problem identification, control parameters, model coordinates and elastic parameter for the elastic units. The program evaluates the partitioning of ray amplitude and energy at elastic boundaries, computes the total travel time, total travel distance and other parameters for rays arising at the earth's surface. Instructions are given for punching program control cards and data cards, and for arranging input card decks. An example of printer output for a simple problem is presented. The program is written in FORTRAN IV language. The listing of the program is shown in the Appendix, with an example output from a CDC-6600 computer.

  16. MacMouse. Developing Preschool Readiness Concepts and Skills with HyperCard and MacRecorder.

    ERIC Educational Resources Information Center

    Fitterman, L. Jeffrey

    Through developments with the use of the "Apple Macintosh" computer, "HyperCard," and "MacRecorder," children in preschool handicapped programs are now capable of participating in appropriate computerized learning experiences. "HyperCard" allows educators to produce their own computerized instructional…

  17. Procurement Cards Pave the Way to Efficient Purchasing.

    ERIC Educational Resources Information Center

    Enos, Eileen D.

    1999-01-01

    As educators battle restricted budgets, inflation, and enrollment changes, strategic sourcing management is replacing traditional transaction-based procurement. Procurement-card programs, allowing organizations to use credit cards for small purchases or low-value items, save time and enhance controls over merchants, credit limits, issuance limits,…

  18. Smart Choice Health Insurance©: A New, Interdisciplinary Program to Enhance Health Insurance Literacy.

    PubMed

    Brown, Virginia; Russell, Mia; Ginter, Amanda; Braun, Bonnie; Little, Lynn; Pippidis, Maria; McCoy, Teresa

    2016-03-01

    Smart Choice Health Insurance© is a consumer education program based on the definition and emerging measurement of health insurance literacy and a review of literature and appropriate theoretical frameworks. An interdisciplinary team of financial and health educators was formed to develop and pilot the program, with the goal of reducing confusion and increasing confidence in the consumer's ability to make a smart health insurance decision. Educators in seven states, certified to teach the program, conducted workshops for 994 consumers. Results show statistically significant evidence of increased health insurance literacy, confidence, and capacity to make a smart choice health insurance choice. Discussion centers on the impact the program had on specific groups, next steps to reach a larger audience, and implications for educators, consumers, and policymakers nationwide. © 2015 Society for Public Health Education.

  19. Report: EPA's Fiscal Year 2015 Purchase Card and Convenience Check Program Assessed as Low Risk

    EPA Pesticide Factsheets

    Report #16-P-0124, March 29, 2016. We determined the EPA's purchase card and convenience check program for FY 2015 to be at a low risk for illegal, improper or erroneous purchases and payments due to strengthened internal controls.

  20. Mechanization in a New Medical School Library II. Serials and Circulation

    PubMed Central

    Payne, Ladye Margarete; Small, Louise; Divett, Robert T.

    1966-01-01

    The serials and circulation phases of the data-processing system in use at the University of New Mexico Library of the Medical Sciences are described. The development of the programs is also reported. The serials program uses simple punched card equipment. The circulation program uses the IBM 357 Data Collection System and punched card data-processing equipment. Images PMID:5921473

  1. Chemically programmed ink-jet printed resistive WORM memory array and readout circuit

    NASA Astrophysics Data System (ADS)

    Andersson, H.; Manuilskiy, A.; Sidén, J.; Gao, J.; Hummelgård, M.; Kunninmel, G. V.; Nilsson, H.-E.

    2014-09-01

    In this paper an ink-jet printed write once read many (WORM) resistive memory fabricated on paper substrate is presented. The memory elements are programmed for different resistance states by printing triethylene glycol monoethyl ether on the substrate before the actual memory element is printed using silver nano particle ink. The resistance is thus able to be set to a broad range of values without changing the geometry of the elements. A memory card consisting of 16 elements is manufactured for which the elements are each programmed to one of four defined logic levels, providing a total of 4294 967 296 unique possible combinations. Using a readout circuit, originally developed for resistive sensors to avoid crosstalk between elements, a memory card reader is manufactured that is able to read the values of the memory card and transfer the data to a PC. Such printed memory cards can be used in various applications.

  2. 7 CFR 1484.55 - What expenditures may not be reimbursed under the Cooperator program?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... salaries of third party personnel; (16) Membership fees in clubs and social organizations; (17) Indemnity... trade fairs, shows, and exhibits; (19) Business cards; (20) Seasonal greeting cards; (21) Subscriptions to non-trade related publications; (22) Credit card fees; (23) Refreshments, or related equipment...

  3. 7 CFR 1484.55 - What expenditures may not be reimbursed under the Cooperator program?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... salaries of third party personnel; (16) Membership fees in clubs and social organizations; (17) Indemnity... trade fairs, shows, and exhibits; (19) Business cards; (20) Seasonal greeting cards; (21) Subscriptions to non-trade related publications; (22) Credit card fees; (23) Refreshments, or related equipment...

  4. 7 CFR 1484.55 - What expenditures may not be reimbursed under the Cooperator program?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... commodity; (15) Goods and services and salaries of third party personnel; (16) Membership fees in clubs and... sponsored activities, other than trade fairs, shows, and exhibits; (19) Business cards; (20) Seasonal greeting cards; (21) Subscriptions to non-trade related publications; (22) Credit card fees; (23...

  5. 7 CFR 1484.55 - What expenditures may not be reimbursed under the Cooperator program?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... salaries of third party personnel; (16) Membership fees in clubs and social organizations; (17) Indemnity... trade fairs, shows, and exhibits; (19) Business cards; (20) Seasonal greeting cards; (21) Subscriptions to non-trade related publications; (22) Credit card fees; (23) Refreshments, or related equipment...

  6. 75 FR 16579 - Electronic Fund Transfers

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-01

    ... consumer as a gift. In addition, gift cards can be received through a loyalty, award, or promotional... visit the store or for customer retention purposes, such as through a frequent buyer program. Merchants... gift card or gift certificate and loyalty, award, and promotional gift cards. \\7\\ 74 FR 60986 (Nov. 20...

  7. Academic Competitiveness and SMART Grant Programs: First-Year Lessons Learned

    ERIC Educational Resources Information Center

    Choy, Susan P.; Berkner, Lutz; Lee, John; Topper, Amelia

    2009-01-01

    The "Higher Education Reconciliation Act of 2005" created two new grant programs for undergraduates: the Academic Competitiveness Grant (ACG) program and National Science and Mathematics Access to Retain Talent (National SMART) Grant program. The ACG program is intended to encourage students to take challenging courses in high school and thus…

  8. SmartWay

    EPA Pesticide Factsheets

    SmartWay is an EPA program that helps the freight transportation sector improve supply chain efficiency. SmartWay reduces transportation-related emissions, environmental risks for companies and increases global energy security.

  9. Strut your SmartWay Stuff

    EPA Pesticide Factsheets

    This EPA presentation provides information on the SmartWay Transport Partnership Program, including SW brand market research results, program success, partner participation, logo usage, and available promotional and publicity resources.

  10. CARD Annual Report, Year Ending June 30, 1986.

    ERIC Educational Resources Information Center

    Iowa State Univ. of Science and Technology, Ames. Center for Agricultural and Rural Development.

    This report outlines the activities of the Center for Agricultural and Rural Development (CARD), Iowa State University, for the year ending June 30, 1986. Progress was made in expanding and enhancing the policy research program, which comprises four divisions. The natural resources and conservation program participated with the Soil Conservation…

  11. Notification: Fiscal Year 2016 Risk Assessment of EPA’s Purchase Card and Convenience Check Program

    EPA Pesticide Factsheets

    Project #OA-FY16-0229, July 14, 2016. The EPA OIG plans to begin a risk assessment of the EPA’s purchase card and convenience check program with the Office of Acquisition Management (OAM) within the Office of Administration and Resources Management (OARM).

  12. CODAP: Control Card Specifications for the Univac 1108.

    ERIC Educational Resources Information Center

    Stacey, William D.; And Others

    The document is one of three in a series of technical reports covering the control card and programing aspects of the Comprehensive Occupational Data Analysis Programs (CODAP), a highly interactive and efficient system of computer routines for analyzing, organizing, and reporting occupational information. The document contains control card…

  13. Reminder cards and immunization rates among Latinos and the rural poor in Northeast Colorado.

    PubMed

    Hicks, Paul; Tarr, Gillian A M; Hicks, Ximena Prieto

    2007-01-01

    Immunization rates are static in the United States. Risk factors for not being up to date (UTD) include ethnicity and lower socioeconomic status. Reminder cards increase immunization rates in urban settings. Their effect in poor, Latino, and rural children is unknown. Language-appropriate reminder cards were sent to active patients not UTD listing the vaccines missing; the card served as the physician order for the vaccine. Missed opportunities were addressed through discussion with staff and posters in patient care rooms. UTD rates before and after intervention were measured. Dual-purpose reminder/order cards increased the rate of UTD from 61.3% to 73.4%; children living near the clinic, patients who speak only Spanish, and Latinos overall showed preferential effectiveness. Children eligible to participate in the Vaccines for Children program had similar increases in UTD rates but had lower baseline and final UTD rates than did children not eligible for the Vaccines for Children program. The rate of missed opportunities did not change. The number of children to whom reminder cards needed to be sent for them to become fully immunized is 8 (number needed to treat). In poor, rural, and Latino populations, language-appropriate reminder/order cards increase immunization rates.

  14. The mother's card: a simplified aid for primary health workers.

    PubMed

    Shah, K P; Shah, P M

    1981-02-01

    The Mother's Card and its use are described. The card is filled out by the health worker and provides data on the mother concerning family planning, menstrual cycles, pregnancy period (including whether at risk, state of nutrition, immunization against tetanus, and expected date of birth), and breastfeeding. The card is kept by the mother, and the health worker keeps a copy. Each card has space for 10 years and up to 4 pregnancies. The cards have been used successfully in India since 1976 and in Somalia since early 1980, and were useful in strengthening family planning programs as well as identifying pregnancies at risk for special attention.

  15. 78 FR 22846 - Smart Grid Advisory Committee Meeting Cancellation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-17

    ... DEPARTMENT OF COMMERCE National Institute of Standards and Technology Smart Grid Advisory... Commerce. ACTION: Notice of meeting cancellation. SUMMARY: The meeting of the Smart Grid Advisory Committee... INFORMATION CONTACT: Mr. Cuong Nguyen, Smart Grid and Cyber-Physical Systems Program Office, National...

  16. A Combat Gaming Method for Tank Platoon Leader Training: TRAX 1

    DTIC Science & Technology

    1985-09-01

    COVERED A COMBAT GAMING METHOD FOR TANK PLATOON LEADER October 1983-October 1984 TRAINING: TRAX I T PERFORMING ORG. REPORT NUMBER 7. AUTHOR(o) S. CONTRACT ...AirLand Battle. Armor, July-August, 5-6. Furlong, M.D. (1984). Fighting smart at the National Training Center. Armor, May-June, 26-32. Henricksen, K...13. Qross H+9 f57372 *1TP Task p 6-2 &coke drifts oer rute MIK . Cnical 1. 1emain in M)pp-4 Inst/Ctlr denies bypass. Cards Contaminated 2. qest bypass

  17. Holography gets smart

    NASA Astrophysics Data System (ADS)

    Lowe, Chris; Larbey, Cynthia

    2008-02-01

    At least 6% of world trade, amounting to some 200bn per year, involves counterfeit goods. But this figure would be even higher were it not for the humble hologram. Invented 50 years ago, holograms provide authentication tags to deter copying, and can be found everywhere from credit cards, passports and banknotes to consumer goods, cosmetics and pharmaceuticals. Holography also underpins supermarket scanners and CD players; it can even be used to store optical data in 3D. Now, however, holograms are making their mark as powerful yet cheap diagnostic tools, which could in particular have many applications in biomedicine.

  18. A Trusted Portable Computing Device

    NASA Astrophysics Data System (ADS)

    Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang

    A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.

  19. Information technology in the foxhole.

    PubMed

    Eyestone, S M

    1995-08-01

    The importance of digital data capture at the point of health care service within the military environment is highlighted. Current paper-based data capture does not allow for efficient data reuse throughout the medical support information domain. A simple, high-level process and data flow model is used to demonstrate the importance of data capture at point of service. The Department of Defense is developing a personal digital assistant, called MEDTAG, that accomplishes point of service data capture in the field using a prototype smart card as a data store in austere environments.

  20. Framework for End-User Programming of Cross-Smart Space Applications

    PubMed Central

    Palviainen, Marko; Kuusijärvi, Jarkko; Ovaska, Eila

    2012-01-01

    Cross-smart space applications are specific types of software services that enable users to share information, monitor the physical and logical surroundings and control it in a way that is meaningful for the user's situation. For developing cross-smart space applications, this paper makes two main contributions: it introduces (i) a component design and scripting method for end-user programming of cross-smart space applications and (ii) a backend framework of components that interwork to support the brunt of the RDFScript translation, and the use and execution of ontology models. Before end-user programming activities, the software professionals must develop easy-to-apply Driver components for the APIs of existing software systems. Thereafter, end-users are able to create applications from the commands of the Driver components with the help of the provided toolset. The paper also introduces the reference implementation of the framework, tools for the Driver component development and end-user programming of cross-smart space applications and the first evaluation results on their application. PMID:23202169

  1. NPS Government Purchase Card Program: An Analysis of Internal Controls

    DTIC Science & Technology

    2014-03-01

    approving official APC agency program coordinator CCPMD Consolidated Card Program Management Division CH cardholder COSO Committee of Sponsoring...correct, and minimize fraud, waste, and abuse” (DPAP, 2011, p. 2-2). To minimize risks , the management and internal controls should have support from...three interrelated subjects: enterprise risk management (ERM), internal control, and fraud deterrence” (para. 6). The 23 five components of an

  2. SmartWay Global Green Freight Action Webinar

    EPA Pesticide Factsheets

    This EPA presentation provides information on the SmartWay Transport Partnership Program, including SW brand market research results, program success, partner participation, logo usage, and available promotional and publicity resources.

  3. 2016 SmartWay Awardee Best Practices Webinar

    EPA Pesticide Factsheets

    This EPA presentation provides information on the SmartWay Transport Partnership Program, including SW brand market research results, program success, partner participation, logo usage, and available promotional and publicity resources.

  4. SmartMom Text Messaging for Prenatal Education: A Qualitative Focus Group Study to Explore Canadian Women's Perceptions.

    PubMed

    Munro, Sarah; Hui, Amber; Salmons, Vanessa; Solomon, Carolyn; Gemmell, Emily; Torabi, Nahal; Janssen, Patricia A

    2017-02-07

    We engaged Canadian women in the development of a prenatal education program delivered via one-way text messaging called SmartMom. SmartMom is the first peer-reviewed, evidence-based mHealth program for prenatal education in Canada and the first to be endorsed by the Society of Obstetricians and Gynaecologists of Canada. To explore women's preferences for a prenatal education program by text messaging. We conducted a qualitative focus group study in three Canadian communities in the Northern Health Authority. Women completed a demographic questionnaire, participated in a guided discussion about their pregnancy information-seeking behavior, reviewed a printed copy of the SmartMom text messages, and then engaged in a moderated discussion about their perceptions of the usability of the SmartMom program. Open-ended questions explored women's perceptions regarding the message content, acceptability of receiving information by text message, positive health behaviors they might engage in after receiving a message, modifiable program factors, and intention to use the program. Thematic analysis of transcribed audio recordings was undertaken and modifications were made to the SmartMom program based on these findings. A total of 40 women participated in seven focus groups in three rural northern communities. The vast majority had a mobile phone (39/40, 98%), used text messages "all the time" (28/40, 70%), and surfed the Internet on their phone (37/40, 93%). Participants perceived SmartMom to be highly acceptable and relevant. The text message modality reflected how participants currently sought pregnancy-related information and provided them with local information tailored to their gestational age, which they had not received through other pregnancy resources. Women recommended adding the opportunity to receive supplemental streams of messages tailored to their individual needs, for example, depression, pregnancy after previous cesarean, >35 years of age, new immigrants, and harm reduction for smoking and alcohol. This formative qualitative evaluation provides evidence that a prenatal education program by text messaging, SmartMom, is acceptable to the end users. These findings support the usability of the SmartMom program at a population level and the development of an evaluation program exploring the effects of the text messages on adoption of health-promoting behaviors and maternal-child health outcomes. ©Sarah Munro, Amber Hui, Vanessa Salmons, Carolyn Solomon, Emily Gemmell, Nahal Torabi, Patricia A Janssen. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 07.02.2017.

  5. SmartWay Program Successes

    EPA Pesticide Factsheets

    This page provides success metrics and statistics about the SmartWay program and what is has done to reduce greenhouse gas emissions, climate change, and other environmental impacts of freight transportation and supply chain.

  6. HyperCard K-12: Classroom Computer Learning Special Supplement Sponsored by Apple Computer.

    ERIC Educational Resources Information Center

    Classroom Computer Learning, 1989

    1989-01-01

    Follows the development of hypertext which is the electronic movement of large amounts of text. Probes the use of the Macintosh HyperCard and its applications in education. Notes programs are stackable in the computer. Provides tool, resource, and stack directory along with tips for using HyperCard. (MVL)

  7. Teaching with HyperCard in Place of a Textbook.

    ERIC Educational Resources Information Center

    Mackey, Neosha; And Others

    1992-01-01

    To alleviate the staffing pressures of increased demands for tours and classes at the Duane G. Meyer Library, Southwest Missouri State University, two HyperCard programs were developed--a library instruction text and a library orientation tour. A study of the relative effectiveness of the HyperCard text with paper texts for bibliographic…

  8. Credit Cards on Campus: Academic Inquiry, Objective Empiricism, or Advocacy Research?

    ERIC Educational Resources Information Center

    Manning, Robert D.; Kirshak, Ray

    2005-01-01

    Professors John M. Barron and Michael E. Staten's article in Vol. 34, No. 3 of this journal, "Usage of Credit Cards Received through College Student-Marketing Programs," purports to "provide benchmark measures of college student credit card usage." Based on empirical analyses of proprietary industry data, they conclude that "There is no…

  9. Idea Cards for Water Flow. Elementary Science Study.

    ERIC Educational Resources Information Center

    Elementary Science Study, Newton, MA.

    Presented are 29 activity cards designed for use with the Elementary Science Study (ESS) program. Each card describes an experiment on one aspect of water flow such as siphoning, methods of removing water from a container, aspirators, floats, and water behavior in various tubing linkups. Activities are intended for individual or small group study;…

  10. 12 CFR 226.53 - Allocation of payments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End... periodic payment for a credit card account under an open-end (not home-secured) consumer credit plan, the... program. When a balance on a credit card account under an open-end (not home-secured) consumer credit plan...

  11. 12 CFR 226.53 - Allocation of payments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End... periodic payment for a credit card account under an open-end (not home-secured) consumer credit plan, the... program. When a balance on a credit card account under an open-end (not home-secured) consumer credit plan...

  12. The Revenue vs. Service Balance

    ERIC Educational Resources Information Center

    Savarese, John

    2006-01-01

    Ten years ago, students at the University of Vermont (UVM) had to carry separate ID cards, meal cards, and athletic cards. Today, the single CATcard combines all of these functions, plus library privileges, an optional declining balance program called CAT$cratch, access to computer labs, use of vending machines without quarters, and even a ride on…

  13. Médicarte software developed for the Quebec microprocessor health card project.

    PubMed

    Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P

    1995-01-01

    The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the software was developed for each of the four groups of health care providers involved. In addition we designed an application to interface with existing pharmaceutical software. For practical reasons and to make it possible to differentiate between the different access profiles, the information stored on the card is divided in several blocks: Identification, Emergency, History (personal and family), Screening Tests, Vaccinations, Drug Profile, General follow-up, and some Specific follow-ups (Pregnancy, Ophthalmology, Kidney failure, Cardiology, Pediatrics, Diabetes, Pneumology, Specific parameters). Over 14,000 diagnoses and symptoms are classified with four levels of precision, the codification being based on the ICPC (International Classification for Primary Care). The software contains different applications to assist the clinician in decision making. A "Drug Advisor" helps the prescriber by detecting possible interactions between drugs, giving indications (doses) and contraindications, cautions, potential side-effects and therapeutic alternatives. There is also a prevention module providing recommendations for vaccination and periodic examinations based on the patient's age and sex. The pharmaceutical, vaccination, and screening tests data banks are updated every six months. These sections of the software are accessible to access card holders at any times, even without a patient card, and constitute in themselves an interesting clinical tool. We developed a software server (SCAM) allowing the different applications to access the data in a memory card regardless of the type of memory card used. Using a single high level command language, this server provides a standardized utilization of memory cards from various manufacturers. It ensures the compatibility of the applications using the card as a storage medium. (abstract truncated)

  14. Evaluation of Nucleic Acid Preservation Cards for West Nile Virus Testing in Dead Birds

    PubMed Central

    Foss, Leslie; Reisen, William K.; Fang, Ying; Kramer, Vicki; Padgett, Kerry

    2016-01-01

    The California West Nile virus (WNV) Dead Bird Surveillance Program (DBSP) is an important component of WNV surveillance in the state. We evaluated FTA™ and RNASound™ cards as an alternative method for sampling dead birds for WNV molecular testing as these cards allow for more cost effective, rapid, and safer diagnostic sampling than the shipment of bird carcasses. To evaluate accuracy of results among avian sampling regimes, Reverse-Transcription Polymerase Chain Reaction (RT-PCR) results from FTA™ and RNASound™ cards were compared with results from kidney tissue, brain tissue, or oral swabs in lysis buffer in 2012–2013. In addition, RT-PCR results were compared with results from oral swabs tested by rapid antigen tests (RAMP™ and VecTOR™). While test results from the cards were not as sensitive as kidney tissue testing, they were more likely to provide accurate results than rapid antigen tests, and detected WNV in corvids as well as in other passerines, raptors, and waterfowl. Overall, WNV RT-PCR cycle threshold (Ct) scores from the cards were higher than those from tissue testing, but both card products displayed high sensitivity and specificity. American Crow samples provided the highest sensitivity. The cards also proved to be easier and more convenient vehicles for collecting and shipping samples, and in 2014 our program launched use of RNASound™ cards in the DBSP. Both FTA™ and RNASound™ products displayed 96% agreement with tissue results and are an adequate alternative sampling method for WNV dead bird testing. PMID:27341492

  15. Adaptive smart wing design for military aircraft: requirements, concepts, and payoffs

    NASA Astrophysics Data System (ADS)

    Kudva, Jayanth N.; Appa, Kari; Van Way, Craig B.; Lockyer, Allen J.

    1995-05-01

    New developments in smart structures and materials have made it possible to revisit earlier work in adaptive and flexible wing technology, and remove some of the limitations for technology transition to next-generation aircraft. Research performed by Northrop Grumman, under internal funding, has led to a new program sponsored by ARPA to investigate the application of smart structures and materials technologies to twist and adapt and aircraft wing. Conceptual designs are presented based on state-of-the-art materials, including shape memory alloys, piezoelectrics, and fiber optic sensors for incorporation in a proposed smart wing design. Plans are described to demonstrate proof-of-concept on a prototype 1/10 scale -18 model that will be tested in a wind tunnel for final validation. Highlights of the proposed program are summarized with respect to program objectives, requirements, key concept design features, demonstration testing, and smart wing technology payoffs and risks.

  16. 76 FR 41647 - Airworthiness Directives; Lockheed Martin Corporation/Lockheed Martin Aeronautics Company Model...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-15

    ... ``company manuals, job cards, maintenance programs, computerized tracking programs and record keeping... disagree with increasing the estimated work- hours for the time that it takes for writing job cards... new, improved 12 $10,288 $11,308 24 $271,392 fuel dump masts. Dry bay zonal inspection, 952 None $80...

  17. Report Card on the Effectiveness of Teacher Training Programs

    ERIC Educational Resources Information Center

    Tennessee State Board of Education, 2010

    2010-01-01

    Tennessee Code Annotated 49-5-108 requires the state to develop a report card or assessment on the effectiveness of teacher training programs. This report includes data on the performance of each institution's graduates in the following areas required by state statute: placement and retention rates, Praxis results, and teacher effect data based on…

  18. Reducing Excessive Absenteeism among First Grade Public School Students.

    ERIC Educational Resources Information Center

    Doty, Jeanice J.

    An elementary school teacher designed and implemented a program intended to reduce excessive absenteeism among first grade public school students. The program consisted of four basic parts: (1) perusal of attendance cards and grade books prior to treatment; (2) implementaton of treatment; (3) post-perusal of attendance cards and grade books; and…

  19. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  20. Assessing Semantic Knowledge Using Computer-Based and Paper-Based Media

    DTIC Science & Technology

    1992-01-01

    capitalized upon in this research. Computer-Based Assessment A computer-based game or test, FlashCards (Liggett & Federico, 1986), was adopt- ed and adapted...alterative forms did not have to be specifically or previously programmed as such. FlashCards is analogous to using real flash cards. That is, a...reflects their degree of confidence in their answer. Also, for each answer the student’s response latency is recorded and displayed. FlashCards quizzed

  1. Multi-axis control based on movement control cards in NC systems

    NASA Astrophysics Data System (ADS)

    Jiang, Tingbiao; Wei, Yunquan

    2005-12-01

    Today most movement control cards need special control software of topper computers and are only suitable for fixed-axis controls. Consequently, the number of axes which can be controlled is limited. Advanced manufacture technology develops at a very high speed, and that development brings forth. New requirements for movement control in mechanisms and electronics. This paper introduces products of the 5th generation of movement control cards, PMAC 2A-PC/104, made by the Delta Tau Company in the USA. Based on an analysis of PMAC 2A-PC/104, this paper first describes two aspects relevant to the hardware structure of movement control cards and the interrelated software of the topper computers. Then, two methods are presented for solving these problems. The first method is to set limit switches on the movement control cards; all of them can be used to control each moving axis. The second method is to program applied software with existing programming language (for example, VC ++, Visual Basic, Delphi, and so forth). This program is much easier to operate and expand by its users. By using a limit switch, users can choose different axes in movement control cards. Also, users can change parts of the parameters in the control software of topper computers to realize different control axes. Combining these 2 methods proves to be convenient for realizing multi-axis control in numerical control systems.

  2. Evaluation -- Northern Virginia Smart Traffic Center (NVSTC) integration program

    DOT National Transportation Integrated Search

    2002-02-01

    The Northern Virginia Smart Traffic Center (NVSTC) Integration Program was an ambitious undertaking to enhance the effectiveness of intelligent transportation systems (ITS) in the Washington metropolitan area by interconnecting regional systems. The ...

  3. How the SmartWay Partnership Works

    EPA Pesticide Factsheets

    This page describes how the SmartWay program and the SmartWay Transport Partnership work for carriers, shippers, and logistics companies to track air quality, reduce fuel consumption, improve freight supply chain sustainability.

  4. The effect of a public health card program on the supply of health care.

    PubMed

    Johar, Meliyanni

    2010-05-01

    The supply-side responsiveness to public programs targeted to consumers is not widely studied. However, it is unlikely that supply variables remain constant, particularly when their link to the demand initiative is weak. The aim of this study is to provide such analysis, using the experience of the Indonesian health card program, which is a demand-sided program. Without an increase in staff or an appropriate salary revision, the salary payment system of the public sector may not adequately reward the existing health workers, lowering their incentives to maintain their public position. Using data from the Indonesian Family Life Surveys on public health centres, the leading providers of outpatient services in the public sector, this study found some evidence that the health card program resulted in a reduction in the number of full-time GPs working in these facilities. Other conditions not related to workers' compensation, such as infrastructure conditions and registration fees, were not adversely affected. Identification of this program's effect is achieved by variations in time and the intensity of health card distribution across communities. The findings highlight the importance of public policy management in general, and sheds light on physicians' behaviour in developing countries, about which we know very little. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT; ULTRASONIC AQUEOUS CLEANING SYSTEMS, SMART SONIC CORPORATION, SMART SONIC

    EPA Science Inventory

    This report is a product of the U.S. EPA's Environmental Technoloy Verification (ETV) Program and is focused on the Smart Sonics Ultrasonic Aqueous Cleaning Systems. The verification is based on three main objectives. (1) The Smart Sonic Aqueous Cleaning Systems, Model 2000 and...

  6. Single-arm trial of the second version of an acceptance & commitment therapy smartphone application for smoking cessation.

    PubMed

    Bricker, Jonathan B; Copeland, Wade; Mull, Kristin E; Zeng, Emily Y; Watson, Noreen L; Akioka, Katrina J; Heffner, Jaimee L

    2017-01-01

    The first randomized trial of a smartphone application (app) for adult smoking cessation (SmartQuit 1.0) revealed key features that predict cessation. These findings guided the revision of this Acceptance & Commitment Therapy (ACT)-based application (SmartQuit 2.0), which was primarily tested to examine participant receptivity, short-term cessation and reduction, and the relationship between program completion, smoking cessation and reduction. Secondarily, outcomes were descriptively compared with the SmartQuit1.0 trial. Adult participants (78% female, 25% with high school or less education, 30% unemployed) were recruited into the single-arm pilot trial (N=99) of SmartQuit 2.0 with a two-month follow-up (85% retention). Regarding receptivity, 84% of participants were satisfied with SmartQuit 2.0 (vs. 59% for SmartQuit1.0), 73% would recommend it to a friend (vs. 48% for SmartQuit1.0), 81% found the ACT exercises useful for quitting (vs. 44% for SmartQuit1.0). At the 2-month follow-up, the quit rates were 21% for 7-day point prevalence (vs. 23% for SmartQuit1.0), 11% for 30-day point prevalence (vs. 13% for SmartQuit1.0), and 75% of participants reduced their smoking frequency (vs. 57% for SmartQuit1.0). Among program completers (24% of total sample), the quit rates were 33% for 7-day point prevalence, 28% for 30-day point prevalence, and 88% of participants reduced their smoking frequency. The revised app had high user receptivity, modest quit rates, and high smoking reduction rates. Program completion may be key to boosting the app's effectiveness. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  7. Depression as a moderator of benefit from Media Smart: a school-based eating disorder prevention program.

    PubMed

    Wilksch, Simon M; Wade, Tracey D

    2014-01-01

    To investigate if baseline depression moderated response to Media Smart, an 8-lesson school-based program previously found to achieve a long-term risk reduction effect in young adolescents. 540 Grade 8 students (M age = 13.62 years, SD = .37) from 4 schools participated with 11 classes receiving the Media Smart program (126 girls; 107 boys) and 13 comparison classes receiving their normal lessons (147 girls; 160 boys). Shape and weight concern, media internalization, body dissatisfaction, dieting, ineffectiveness, and perceived pressure were the outcome variables. Moderation was indicated by significant interaction effects for group (Media Smart; Control) × moderator (high depression; low depression) × time (post-program; 6-month follow-up; 2.5-year follow-up), with baseline entered as a covariate. Such effects were found for shape and weight concern, media internalization, body dissatisfaction, ineffectiveness and perceived pressure. Post-hoc testing found high depression Media Smart participants scored significantly lower than their control counterparts at post-program on shape and weight concern, media internalization and dieting, whereas low depression Media Smart participants scored significantly lower on shape and weight concern at 2.5-year follow-up. Media Smart achieved a reduction in eating disorder risk factors for high-depression participants and a reduced rate of growth in risk factor scores for low-depression participants. Trial registry name: Australian New Zealand Clinical Trials Registry. URL: http://www.anzctr.org.au. Registration identification number: ACTRN12608000545369. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. Spatiotemporal Patterns of Urban Human Mobility

    NASA Astrophysics Data System (ADS)

    Hasan, Samiul; Schneider, Christian M.; Ukkusuri, Satish V.; González, Marta C.

    2013-04-01

    The modeling of human mobility is adopting new directions due to the increasing availability of big data sources from human activity. These sources enclose digital information about daily visited locations of a large number of individuals. Examples of these data include: mobile phone calls, credit card transactions, bank notes dispersal, check-ins in internet applications, among several others. In this study, we consider the data obtained from smart subway fare card transactions to characterize and model urban mobility patterns. We present a simple mobility model for predicting peoples' visited locations using the popularity of places in the city as an interaction parameter between different individuals. This ingredient is sufficient to reproduce several characteristics of the observed travel behavior such as: the number of trips between different locations in the city, the exploration of new places and the frequency of individual visits of a particular location. Moreover, we indicate the limitations of the proposed model and discuss open questions in the current state of the art statistical models of human mobility.

  9. Bellevue Smart Traveler And Cellular Telecommunication

    DOT National Transportation Integrated Search

    1993-05-01

    SEATTLE (BELLEVUE) SMART TRAVELER OR SST : PHASE I OF THE BELLEVUE SMART TRAVELER PROJECT WAS FUNDED BY THE FEDERAL TRANSIT ADMINISTRATION UNDER THE ADVANCED PUBLIC TRANSPORTATION SYSTEMS (APTS) PROGRAM. THE GRANTEE, THE MUNICIPALITY OF METROPOLIT...

  10. Reminder card helps patients remember OCs.

    PubMed

    1999-11-01

    Organon has developed the Reminder Card to help women patients remember their regular intake of oral contraceptive (OC) pills. About 50% of women take birth control pills as prescribed, 25% miss a pill per month, and 25% miss two or more pills in the same time frame. The plastic card, about the size and shape of a credit card, contains a microchip timer. Reminder cards are available to providers who use the Starter Kits issued by the company for new-start patients on the Mircette OC. When patients begin their first pack of pills, they select the time of day they prefer to have the Reminder Card emit its tiny beep. The time is set into the microchip timer and the card is programmed to sound automatically at the pre-set time each day for the next three months. The direction for using the Reminder Card is outlined.

  11. Operating a Geiger Müller tube using a PC sound card

    NASA Astrophysics Data System (ADS)

    Azooz, A. A.

    2009-01-01

    In this paper, a simple MATLAB-based PC program that enables the computer to function as a replacement for the electronic scalar-counter system associated with a Geiger-Müller (GM) tube is described. The program utilizes the ability of MATLAB to acquire data directly from the computer sound card. The signal from the GM tube is applied to the computer sound card via the line in port. All standard GM experiments, pulse shape and statistical analysis experiments can be carried out using this system. A new visual demonstration of dead time effects is also presented.

  12. A Low-Cost Part-Task Flight Training System: An Application of a Head Mounted Display

    DTIC Science & Technology

    1990-12-01

    architecture. The task at hand was to develop a software emulation libary that would emulate the function calls used within the Flight and Dog programs. This...represented in two hexadecimal digits for each color. The format of the packed long integer looks like aaggbbrr with each color value representing a...Western Digital ethernet card as the cheapest compatible card available. Good fortune arrived, as I was calling to order the card, I saw an unused card

  13. VMOMS — A computer code for finding moment solutions to the Grad-Shafranov equation

    NASA Astrophysics Data System (ADS)

    Lao, L. L.; Wieland, R. M.; Houlberg, W. A.; Hirshman, S. P.

    1982-08-01

    Title of program: VMOMS Catalogue number: ABSH Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland (See application form in this issue) Computer: PDP-10/KL10; Installation: ORNL Fusion Energy Division, Oak Ridge National Laboratory, Oak Ridge, TN 37830, USA Operating system: TOPS 10 Programming language used: FORTRAN High speed storage required: 9000 words No. of bits in a word: 36 Overlay structure: none Peripherals used: line printer, disk drive No. of cards in combined program and test deck: 2839 Card punching code: ASCII

  14. Tools of the Courseware Trade: A Comparison of ToolBook 1.0 and HyperCard 2.0.

    ERIC Educational Resources Information Center

    Brader, Lorinda L.

    1990-01-01

    Compares two authoring tools that were developed to enable users without programing experience to create and modify software. HyperCard, designed for Macintosh microcomputers, and ToolBook, for microcomputers that run on MS-DOS, are compared in the areas of programing languages, graphics and printing capabilities, user interface, system…

  15. Bus-Programmable Slave Card

    NASA Technical Reports Server (NTRS)

    Hall, William A.

    1990-01-01

    Slave microprocessors in multimicroprocessor computing system contains modified circuit cards programmed via bus connecting master processor with slave microprocessors. Enables interactive, microprocessor-based, single-loop control. Confers ability to load and run program from master/slave bus, without need for microprocessor development station. Tristate buffers latch all data and information on status. Slave central processing unit never connected directly to bus.

  16. United States Air Force High School Apprenticeship Program. 1990 Program Management Report. Volume 2

    DTIC Science & Technology

    1991-04-18

    49-3 documentation application. The demonstration was created with Apple Computer’s HyperCard using a flowchart -like format with which the user could...Software, Inc.,1989. F-1_6 A/B Avionic System Manual. Fort Worth, TX: General Dynamics, 1990.I 5HyperCard Beginners Guide: An Introduction to

  17. Making the Most of Scarce Resources: A Small College Language Department's Experience with HyperCard.

    ERIC Educational Resources Information Center

    Donaldson, Randall P.; Morgan, Leslie Zarker

    1994-01-01

    The development and use of two programs developed at Loyola College using HyperCard are described. One is a reading comprehension program of a Renaissance Italian text; the other, in German, uses scanned-in maps of the various stages of German political development to illustrate German history. (21 references) (LB)

  18. Authentication Without Secrets

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pierson, Lyndon G.; Robertson, Perry J.

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integritymore » of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.« less

  19. Share Your Participation in SmartWay-Best Practices

    EPA Pesticide Factsheets

    SmartWay partners and affiliates can use the SmartWay logo in a variety of ways to promote their participation in the program and signal their commitment to sustainable freight transportation to customers and clients.

  20. Launch Pad Coatings for Smart Corrosion Control

    NASA Technical Reports Server (NTRS)

    Calle, Luz M.; Hintze, Paul E.; Bucherl, Cori N.; Li, Wenyan; Buhrow, Jerry W.; Curran, Jerome P.; Whitten, Mary C.

    2010-01-01

    Corrosion is the degradation of a material as a result of its interaction with the environment. The environment at the KSC launch pads has been documented by ASM International (formerly American Society for Metals) as the most corrosive in the US. The 70 tons of highly corrosive hydrochloric acid that are generated by the solid rocket boosters during a launch exacerbate the corrosiveness of the environment at the pads. Numerous failures at the pads are caused by the pitting of stainless steels, rebar corrosion, and the degradation of concrete. Corrosion control of launch pad structures relies on the use of coatings selected from the qualified products list (QPL) of the NASA Standard 5008A for Protective Coating of Carbon Steel, Stainless Steel, and Aluminum on Launch Structures, Facilities, and Ground Support Equipment. This standard was developed to establish uniform engineering practices and methods and to ensure the inclusion of essential criteria in the coating of ground support equipment (GSE) and facilities used by or for NASA. This standard is applicable to GSE and facilities that support space vehicle or payload programs or projects and to critical facilities at all NASA locations worldwide. Environmental regulation changes have dramatically reduced the production, handling, use, and availability of conventional protective coatings for application to KSC launch structures and ground support equipment. Current attrition rate of qualified KSC coatings will drastically limit the number of commercial off the shelf (COTS) products available for the Constellation Program (CxP) ground operations (GO). CxP GO identified corrosion detection and control technologies as a critical, initial capability technology need for ground processing of Ares I and Ares V to meet Constellation Architecture Requirements Document (CARD) CxP 70000 operability requirements for reduced ground processing complexity, streamlined integrated testing, and operations phase affordability. Researchers at NASA's Corrosion Technology Laboratory at KSC are developing a smart, environmentally friendly coating system for early corrosion detection, inhibition, and self healing of mechanical damage without external intervention. This smart coating will detect and respond actively to corrosion and mechanical damage such as abrasion and scratches, in a functional and predictable manner, and will be capable of adapting its properties dynamically. This coating is being developed using corrosion sensitive microcapsules that deliver the contents of their core (corrosion inhibiting compounds, corrosion indicators, and self healing agents) on demand when corrosion or mechanical damage to the coating occurs.

  1. Manufacturing of Smart Structures Using Fiber Placement Manufacturing Processes

    NASA Technical Reports Server (NTRS)

    Thomas, Matthew M.; Glowasky, Robert A.; McIlroy, Bruce E.; Story, Todd A.

    1996-01-01

    Smart structures research and development, with the ultimate aim of rapid commercial and military production of these structures, are at the forefront of the Synthesis and Processing of Intelligent Cost-Effective Structures (SPICES) program. As part of this ARPA-sponsored program, MDA-E is using fiber placement processes to manufacture integrated smart structure systems. These systems comprise advanced composite structures with embedded fiber optic sensors, shape memory alloys, piezoelectric actuators, and miniature accelerometers. Cost-effective approaches and solutions to smart material synthesis in the fiber-placement process, based upon integrated product development, are discussed herein.

  2. 77 FR 38609 - Notice of Submission for OMB Review; Federal Student Aid; Pell Grant, ACG, and National SMART...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-28

    ..., and National SMART Reporting Under the Common Origination and Disbursement (COD) System SUMMARY: The... records. Title of Collection: Pell Grant, ACG, and National SMART Reporting under the Common Origination.... Abstract: The Federal Pell Grant, ACG, and National SMART Programs are student financial assistance...

  3. Green Technology for Smart Cities

    NASA Astrophysics Data System (ADS)

    Casini, M.

    2017-08-01

    In view of the enormous social and environmental changes at the global level, more and more cities worldwide have directed their development strategies towards smart policies aimed at sustainable mobility, energy upgrading of the building stock, increase of energy production from renewable sources, improvement of waste management and implementation of ICT infrastructures. The goal is to turn into Smart Cities, able to improve the quality of life of their inhabitants by offering a lasting opportunity for cultural, economic and social growth within a healthy, safe, stimulating and dynamic environment. After an overview of the role of cities in climate changes and environmental pollution worldwide, the article provides an up to date definition of Smart City and of its main expected features, focussing on technology innovation, smart governance and main financing and support programs. An analysis of the most interesting initiatives at the international level pursued by cities investigating the three main areas of Green Buildings, Smart grid-Smart lighting, and Smart mobility is given, with the objective to offer a broad reference for the identification of development sustainable plans and programs at the urban level within the current legislative framework.

  4. Measuring Success in Your Fuels Program: From the Report Card to Valuable Learning

    Treesearch

    Paula Nasiatka; David Christenson

    2006-01-01

    How can a unit learn in everyday fuels programs and from program reviews? How can a unit move from living in the “report card” culture to discovering more effective ways to improve what it knows and how it learns? Six specific tasks are critical to organizational learning according to David A. Garvin of Harvard Business School. By engaging in these tasks a unit can...

  5. Cardiac surgery report cards: comprehensive review and statistical critique.

    PubMed

    Shahian, D M; Normand, S L; Torchiana, D F; Lewis, S M; Pastore, J O; Kuntz, R E; Dreyer, P I

    2001-12-01

    Public report cards and confidential, collaborative peer education represent distinctly different approaches to cardiac surgery quality assessment and improvement. This review discusses the controversies regarding their methodology and relative effectiveness. Report cards have been the more commonly used approach, typically as a result of state legislation. They are based on the presumption that publication of outcomes effectively motivates providers, and that market forces will reward higher quality. Numerous studies have challenged the validity of these hypotheses. Furthermore, although states with report cards have reported significant decreases in risk-adjusted mortality, it is unclear whether this improvement resulted from public disclosure or, rather, from the development of internal quality programs by hospitals. An additional confounding factor is the nationwide decline in heart surgery mortality, including states without quality monitoring. Finally, report cards may engender negative behaviors such as high-risk case avoidance and "gaming" of the reporting system, especially if individual surgeon results are published. The alternative approach, continuous quality improvement, may provide an opportunity to enhance performance and reduce interprovider variability while avoiding the unintended negative consequences of report cards. This collaborative method, which uses exchange visits between programs and determination of best practice, has been highly effective in northern New England and in the Veterans Affairs Administration. However, despite their potential advantages, quality programs based solely on confidential continuous quality improvement do not address the issue of public accountability. For this reason, some states may continue to mandate report cards. In such instances, it is imperative that appropriate statistical techniques and report formats are used, and that professional organizations simultaneously implement continuous quality improvement programs. The statistical methodology underlying current report cards is flawed, and does not justify the degree of accuracy presented to the public. All existing risk-adjustment methods have substantial inherent imprecision, and this is compounded when the results of such patient-level models are aggregated and used inappropriately to assess provider performance. Specific problems include sample size differences, clustering of observations, multiple comparisons, and failure to account for the random component of interprovider variability. We advocate the use of hierarchical or multilevel statistical models to address these concerns, as well as report formats that emphasize the statistical uncertainty of the results.

  6. Unlocking SmartWay Data for Shippers: Optimize Supply Chain Decision Making and Enhance CSR Reporting

    EPA Pesticide Factsheets

    This EPA presentation provides information on the SmartWay Transport Partnership Program, including SW brand market research results, program success, partner participation, logo usage, and available promotional and publicity resources.

  7. The long-term impact of a math, science and technology program on grade school girls

    NASA Astrophysics Data System (ADS)

    Sullivan, Sandra Judd

    The purpose of this study was to determine if a math, science, and technology intervention program improved grade school girls' attitudes and stereotypes toward science and scientists, as well as participation levels in science-related activities, two years after their participating in the program. The intervention program evaluated was Operation SMART, developed by Girls Incorporated. Participants were recruited from the 6th and 7th grades from two public middle schools in Northern California. One hundred twenty-seven girls signed up for the survey and were assigned to either the SMART group (previous SMART participants) or Non-SMART group (no previous experience with SMART). The survey consisted of five parts: (1) a background information sheet, (2) the Modified Attitudes Toward Science Inventory, (3) the What Do You Do? survey, (4) the Draw-A-Scientist Test-Revised, and (5) a career interests and role models/influencer survey. Results indicated that there were no significant differences between the SMART and Non-SMART groups on any of the test measures. However, middle school attended did have a significant effect on the outcome variables. Girls from Middle School A reported more positive attitudes toward science, while girls from Middle School B reported higher participation levels in extracurricular science activities. Possible explanations for these findings suggest too much time had passed between treatment effect and time of measurement as well as the strong influence of teacher and school environment on girls' attitudes and stereotypes. Recommendations for future research are discussed.

  8. The SMART Platform: early experience enabling substitutable applications for electronic health records.

    PubMed

    Mandl, Kenneth D; Mandel, Joshua C; Murphy, Shawn N; Bernstam, Elmer Victor; Ramoni, Rachel L; Kreda, David A; McCoy, J Michael; Adida, Ben; Kohane, Isaac S

    2012-01-01

    The Substitutable Medical Applications, Reusable Technologies (SMART) Platforms project seeks to develop a health information technology platform with substitutable applications (apps) constructed around core services. The authors believe this is a promising approach to driving down healthcare costs, supporting standards evolution, accommodating differences in care workflow, fostering competition in the market, and accelerating innovation. The Office of the National Coordinator for Health Information Technology, through the Strategic Health IT Advanced Research Projects (SHARP) Program, funds the project. The SMART team has focused on enabling the property of substitutability through an app programming interface leveraging web standards, presenting predictable data payloads, and abstracting away many details of enterprise health information technology systems. Containers--health information technology systems, such as electronic health records (EHR), personally controlled health records, and health information exchanges that use the SMART app programming interface or a portion of it--marshal data sources and present data simply, reliably, and consistently to apps. The SMART team has completed the first phase of the project (a) defining an app programming interface, (b) developing containers, and (c) producing a set of charter apps that showcase the system capabilities. A focal point of this phase was the SMART Apps Challenge, publicized by the White House, using http://www.challenge.gov website, and generating 15 app submissions with diverse functionality. Key strategic decisions must be made about the most effective market for further disseminating SMART: existing market-leading EHR vendors, new entrants into the EHR market, or other stakeholders such as health information exchanges.

  9. Improving computer security by health smart card.

    PubMed

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual national implementation of the CPS project and the introduction of new functions using electronic signatures and encryption.

  10. The Department of Veterans Affairs Optical Patient Card Workstation.

    PubMed Central

    Gomez, E.; Demetriades, J. E.; Babcock, D.; Peterson, J.

    1991-01-01

    The Department of Veterans Affairs has developed an optical patient card application which will undergo alpha testing in 1991. The optical cards are carried by patients and contain administrative, clinical, and image information. An optical patient card workstation (OPCW) will read/write these cards and pass this information to the VA Decentralized Hospital Computer Program (DHCP), the VA's health care information system. The intent of this work is to study the potential benefits of this technology to the VA's distributed health care network, with a large mobile patient population. It is hoped that the use of optical cards and the OPCW will enhance clinicians ability to work with a timely composite health record, and expedite the administrative workload of the medical center. PMID:1807626

  11. The Department of Veterans Affairs Optical Patient Card Workstation.

    PubMed

    Gomez, E; Demetriades, J E; Babcock, D; Peterson, J

    1991-01-01

    The Department of Veterans Affairs has developed an optical patient card application which will undergo alpha testing in 1991. The optical cards are carried by patients and contain administrative, clinical, and image information. An optical patient card workstation (OPCW) will read/write these cards and pass this information to the VA Decentralized Hospital Computer Program (DHCP), the VA's health care information system. The intent of this work is to study the potential benefits of this technology to the VA's distributed health care network, with a large mobile patient population. It is hoped that the use of optical cards and the OPCW will enhance clinicians ability to work with a timely composite health record, and expedite the administrative workload of the medical center.

  12. The Educator's Guide to HyperCard and HyperTalk. A Longwood Professional Book.

    ERIC Educational Resources Information Center

    Culp, George H.; Watkins, G. Morgan

    This book and three accompanying floppy disks introduce HyperCard 2.1 for the Macintosh microcomputer and its programming component, HyperTalk, to educators. The first four chapters introduce the basics of HyperCard, including its structure, which is based on a hierarchy of units; the use of tools and graphics; and ways of linking information…

  13. HyperCard as a Text Analysis Tool for the Qualitative Researcher.

    ERIC Educational Resources Information Center

    Handler, Marianne G.; Turner, Sandra V.

    HyperCard is a general-purpose program for the Macintosh computer that allows multiple ways of viewing and accessing a large body of information. Two ways in which HyperCard can be used as a research tool are illustrated. One way is to organize and analyze qualitative data from observations, interviews, surveys, and other documents. The other way…

  14. Big data, smart cities and city planning

    PubMed Central

    2013-01-01

    I define big data with respect to its size but pay particular attention to the fact that the data I am referring to is urban data, that is, data for cities that are invariably tagged to space and time. I argue that this sort of data are largely being streamed from sensors, and this represents a sea change in the kinds of data that we have about what happens where and when in cities. I describe how the growth of big data is shifting the emphasis from longer term strategic planning to short-term thinking about how cities function and can be managed, although with the possibility that over much longer periods of time, this kind of big data will become a source for information about every time horizon. By way of conclusion, I illustrate the need for new theory and analysis with respect to 6 months of smart travel card data of individual trips on Greater London’s public transport systems. PMID:29472982

  15. Big data, smart cities and city planning.

    PubMed

    Batty, Michael

    2013-11-01

    I define big data with respect to its size but pay particular attention to the fact that the data I am referring to is urban data, that is, data for cities that are invariably tagged to space and time. I argue that this sort of data are largely being streamed from sensors, and this represents a sea change in the kinds of data that we have about what happens where and when in cities. I describe how the growth of big data is shifting the emphasis from longer term strategic planning to short-term thinking about how cities function and can be managed, although with the possibility that over much longer periods of time, this kind of big data will become a source for information about every time horizon. By way of conclusion, I illustrate the need for new theory and analysis with respect to 6 months of smart travel card data of individual trips on Greater London's public transport systems.

  16. Cost benefit analysis for smart grid projects

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Karali, Nihan; He, Gang; Mauzey, J

    The U.S. is unusual in that a definition of the term “smart grid” was written into legislation, appearing in the Energy Independence and Security Act (2007). When the recession called for stimulus spending and the American Recovery and Reinvestment Act (ARRA, 2009) was passed, a framework already existed for identification of smart grid projects. About $4.5B of the U.S. Department of Energy’s (U.S. DOE’s) $37B allocation from ARRA was directed to smart grid projects of two types, investment grants and demonstrations. Matching funds from other sources more than doubled the total value of ARRA-funded smart grid projects. The Smart Gridmore » Investment Grant Program (SGIG) consumed all but $620M of the ARRA funds, which was available for the 32 projects in the Smart Grid Demonstration Program (SGDP, or demonstrations). Given the economic potential of these projects and the substantial investments required, there was keen interest in estimating the benefits of the projects (i.e., quantifying and monetizing the performance of smart grid technologies). Common method development and application, data collection, and analysis to calculate and publicize the benefits were central objectives of the program. For this purpose standard methods and a software tool, the Smart Grid Computational Tool (SGCT), were developed by U.S. DOE and a spreadsheet model was made freely available to grantees and other analysts. The methodology was intended to define smart grid technologies or assets, the mechanisms by which they generate functions, their impacts and, ultimately, their benefits. The SGCT and its application to the Demonstration Projects are described, and actual projects in Southern California and in China are selected to test and illustrate the tool. The usefulness of the methodology and tool for international analyses is then assessed.« less

  17. Outcomes of three universal eating disorder risk reduction programs by participants with higher and lower baseline shape and weight concern.

    PubMed

    Wilksch, Simon M; Paxton, Susan J; Byrne, Susan M; Austin, S Bryn; O'Shea, Anne; Wade, Tracey D

    2017-01-01

    To investigate if baseline shape and weight concern (SWC) moderated outcomes in Prevention Across the Spectrum, a randomized-controlled trial (RCT) of 3 school-based programs aimed at reducing eating disorder and obesity risk factors. N = 1,316 Grade 7 and 8 girls and boys (M age = 13.21 years) across three Australian states were randomly allocated to: Media Smart; Life Smart; Helping, Encouraging, Listening and Protecting Peers Initiative (HELPP) or control (usual school class). Moderation was explored by testing interaction effects for group (Media Smart; Life Smart; HELPP; Control) × moderator (SWC: higher-SWC; lower-SWC) × time (post-program; 6-month follow-up; 12-month follow-up), with baseline risk factor scores entered as covariates. Moderation effects were found for shape concern, weight concern, eating concern, regular eating (i.e., meal skipping), physical activity, body dissatisfaction, dieting, and perfectionism. Post-hoc testing found eating concern at post-program was the only variable where higher-SWC Media Smart participants experienced a reduction in risk relative to controls. Both higher-SWC Life Smart and HELPP participants reported an increase in eating concern relative to controls and both groups were skipping more meals than controls at 12-month follow-up. Amongst lower-SWC participants, Media Smart was the only group to experience a benefit relative to controls (physical activity). This study highlights the need for moderator analyses to become more routinely conducted in universal trials, to ensure that participants across baseline risk levels are benefiting and not harmed from program participation. © 2016 Wiley Periodicals, Inc. (Int J Eat Disord 2017; 50:66-75). © 2016 Wiley Periodicals, Inc.

  18. NREL: SMARTS - Register for SMARTS

    Science.gov Websites

    provided free of charge to the User under the conditions that: The User recognizes that the Program is the Author's preliminary acceptance only if it is distributed free of charge. The Program is not to be used for

  19. Efficiency Begins at Home, but What About the Neighbors: Getting to Know Your SmartWay Carriers!

    EPA Pesticide Factsheets

    This EPA presentation provides information on the SmartWay Transport Partnership Program, including SW brand market research results, program success, partner participation, logo usage, and available promotional and publicity resources.

  20. Effect of a Smart Start Playground Improvement Grant on Child Care Playground Hazards. Smart Start Evaluation Report.

    ERIC Educational Resources Information Center

    Kotch, Jonathan; Guthrie, Christine

    Smart Start (North Carolina) playground improvement grants were awarded to cover playground safety assessment, planning and evaluation, quality enhancements (such as fencing, surfacing, and new equipment), and safety programs. Visual inspections were conducted of the safety of child care home and center playgrounds after Smart Start-sponsored…

  1. Start Smart, Stay Smart, Milwaukee: State of Milwaukee's Children, 2002.

    ERIC Educational Resources Information Center

    Mallory, Joyce

    As part of the mission of the Start Smart, Stay Smart Milwaukee program to ensure that all Milwaukee area children enter school with the skills necessary for academic achievement and a lifetime of growth and development, the organization is tracking key indicators across the years of growth and development to young adulthood to better assess the…

  2. Identifying Procurement Fraud in Defense Agencies: An Analysis of the Government Purchase Card Program

    DTIC Science & Technology

    2011-04-30

    fielding, contracting, interoperability, organizational behavior, risk management , cost estimating, and many others. Approaches range from... COSO ), (Whittington & Pany, 2012). In addition, the Federal Financial Management Improvement Act of 1996 identified internal control as an...fraud indicators within the DoD Government Purchase Card Programs and provides recommendations for improving the management of Government Purchase

  3. Handbook for Implementing Agile in Department of Defense Information Technology Acquisition

    DTIC Science & Technology

    2010-12-15

    Wire-frame Mockup of iTunes Cover Flow Feature (source: http://www.balsamiq.com/products/mockups/examples#mytunez...programming. The JOPES customer was included early in the development process in order to understand requirements management (story cards ), observe...transition by teaching the new members Agile processes, such as story card development, refactoring, and pair programming. Additionally, the team worked to

  4. 78 FR 15799 - 30-Day Notice of Proposed Information Collection: Statement Regarding a Lost or Stolen U.S...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-12

    ...: Statement Regarding a Lost or Stolen U.S. Passport Book and/or Card ACTION: Notice of request for public... Collection: Statement Regarding a Lost or Stolen U.S. Passport Book and/or Card OMB Control Number: 1405-0014... Affairs, Passport Services, Office of Program Management and Operational Support, Program Coordination...

  5. Operating a Geiger-Muller Tube Using a PC Sound Card

    ERIC Educational Resources Information Center

    Azooz, A. A.

    2009-01-01

    In this paper, a simple MATLAB-based PC program that enables the computer to function as a replacement for the electronic scalar-counter system associated with a Geiger-Muller (GM) tube is described. The program utilizes the ability of MATLAB to acquire data directly from the computer sound card. The signal from the GM tube is applied to the…

  6. 49 CFR 1572.201 - Transportation of hazardous materials via commercial motor vehicle from Canada or Mexico to and...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... subpart for purposes of this section: FAST means Free and Secure Trade program of the Bureau of Customs... 1572.5. (d) FAST card. A commercial motor vehicle driver who holds a current Free and Secure Trade (FAST) program card satisfies the requirements of this section. Commercial motor vehicle drivers who...

  7. 49 CFR 1572.201 - Transportation of hazardous materials via commercial motor vehicle from Canada or Mexico to and...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... subpart for purposes of this section: FAST means Free and Secure Trade program of the Bureau of Customs... 1572.5. (d) FAST card. A commercial motor vehicle driver who holds a current Free and Secure Trade (FAST) program card satisfies the requirements of this section. Commercial motor vehicle drivers who...

  8. 49 CFR 1572.201 - Transportation of hazardous materials via commercial motor vehicle from Canada or Mexico to and...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... subpart for purposes of this section: FAST means Free and Secure Trade program of the Bureau of Customs... 1572.5. (d) FAST card. A commercial motor vehicle driver who holds a current Free and Secure Trade (FAST) program card satisfies the requirements of this section. Commercial motor vehicle drivers who...

  9. 49 CFR 1572.201 - Transportation of hazardous materials via commercial motor vehicle from Canada or Mexico to and...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... subpart for purposes of this section: FAST means Free and Secure Trade program of the Bureau of Customs... 1572.5. (d) FAST card. A commercial motor vehicle driver who holds a current Free and Secure Trade (FAST) program card satisfies the requirements of this section. Commercial motor vehicle drivers who...

  10. Smart pillow for heart-rate monitoring using a fiber optic sensor

    NASA Astrophysics Data System (ADS)

    Chen, Zhihao; Teo, Ju Teng; Ng, Soon Huat; Yim, Huiqing

    2011-03-01

    In this paper, we propose and demonstrate a new method to monitor heart rate using fiber optic microbending based sensor for in-bed non-intrusive monitoring. The sensing system consists of transmitter, receiver, sensor mat, National Instrument (NI) data acquisition (DAQ) card and a computer for signal processing. The sensor mat is embedded inside a commercial pillow. The heart rate measurement system shows an accuracy of +/-2 beats, which has been successfully demonstrated in a field trial. The key technological advantage of our system is its ability to measure heart rate with no preparation and minimal compliance by the patient.

  11. WLC Preface

    NASA Astrophysics Data System (ADS)

    Miret, Josep M.; Sebé, Francesc

    Low-cost devices are the key component of several applications: RFID tags permit an automated supply chain management while smart cards are a secure means of storing cryptographic keys required for remote and secure authentication in e-commerce and e-government applications. These devices must be cheap in order to permit their cost-effective massive manufacturing and deployment. Unfortunately, their low cost limits their computational power. Other devices such as nodes of sensor networks suffer from an additional constraint, namely, their limited battery life. Secure applications designed for these devices cannot make use of classical cryptographic primitives designed for full-fledged computers.

  12. Design and Implementation of KSP on the Next Generation Cryptography API

    NASA Astrophysics Data System (ADS)

    Lina, Zhang

    With good seamless connectivity and higher safety, KSP (Key Storage Providers) is the inexorable trend of security requirements and development to take the place of CSP (Cryptographic Service Provider). But the study on KSP has just started in our country, and almost no reports of its implementation can be found. Based on the analysis of function modules and the architecture of Cryptography API (Next Generation (CNG)), this paper discusses the design and implementation of KSP (key storage providers) based on smart card in detail, and an example is also presented to illustrate how to use KSP in Windows Vista.

  13. Comparative study of minutiae selection algorithms for ISO fingerprint templates

    NASA Astrophysics Data System (ADS)

    Vibert, B.; Charrier, C.; Le Bars, J.-M.; Rosenberger, C.

    2015-03-01

    We address the selection of fingerprint minutiae given a fingerprint ISO template. Minutiae selection plays a very important role when a secure element (i.e. a smart-card) is used. Because of the limited capability of computation and memory, the number of minutiae of a stored reference in the secure element is limited. We propose in this paper a comparative study of 6 minutiae selection methods including 2 methods from the literature and 1 like reference (No Selection). Experimental results on 3 fingerprint databases from the Fingerprint Verification Competition show their relative efficiency in terms of performance and computation time.

  14. Hacker tracking Security system for HMI

    NASA Astrophysics Data System (ADS)

    Chauhan, Rajeev Kumar

    2011-12-01

    Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.

  15. Introduction to the 2017 SmartWay Truck Carrier Tool

    EPA Pesticide Factsheets

    This webinar provides an overview of EPA’s SmartWay program and the 2017 SmartWay Truck Carrier Tool, provides a live demonstration of the Tool, and explains how you can calculate and report your company’s emissions.

  16. Chattanooga SmartBus Project : phase III evaluation report

    DOT National Transportation Integrated Search

    2009-12-01

    This report presents the results of Phase III of the national evaluation of the Chattanooga Area Regional Transportation Authoritys (CARTA) SmartBus Project. The SmartBus Project is a comprehensive transit ITS program for the city of Chattanooga, ...

  17. Report: EPA Could Improve the SmartWay Transport Partnership Program by Implementing a Direct Data Verification Process

    EPA Pesticide Factsheets

    Report #12-P-0747, August 30, 2012. Recent studies corroborate EPA’s claims that its SmartWay Transport Partnership program helps remove marketplace barriers in order to deploy fuel efficient technologies faster.

  18. Image Display and Manipulation System (IDAMS) program documentation, Appendixes A-D. [including routines, convolution filtering, image expansion, and fast Fourier transformation

    NASA Technical Reports Server (NTRS)

    Cecil, R. W.; White, R. A.; Szczur, M. R.

    1972-01-01

    The IDAMS Processor is a package of task routines and support software that performs convolution filtering, image expansion, fast Fourier transformation, and other operations on a digital image tape. A unique task control card for that program, together with any necessary parameter cards, selects each processing technique to be applied to the input image. A variable number of tasks can be selected for execution by including the proper task and parameter cards in the input deck. An executive maintains control of the run; it initiates execution of each task in turn and handles any necessary error processing.

  19. Notification: Purchase Card and Convenience Check Audit

    EPA Pesticide Factsheets

    Project #OA-FY13-0116, April 11, 2013. The U.S. Environmental Protection Agency, Office of Inspector General, is beginning the fieldwork phase of its audit of the agency’s purchase card and convenience check programs.

  20. Waveform stimulus subsystem: An advanced technology multifunction subsystem on a card

    NASA Astrophysics Data System (ADS)

    Pritchard, David J.

    The F-15 TISS ATE (automatic test equipment) requires subsystem-on-a-card technology to achieve the required functionality within the space constraints. The waveform stimulus subsystem (WSS), an example of this advanced technology, is considered. The WSS circuit card consists of two 40-MHz pulse generators and an 80-MHz aribtrary waveform generator. Each generator is independently programmed and is available simultaneously to the user. The implementation of this highly integrated malfunction-detection system on a card is described, and the benefits to performance and maintainability are highlighted.

  1. HyperCard and Other Macintosh Applications in Astronomy Education

    NASA Astrophysics Data System (ADS)

    Meisel, D.

    1992-12-01

    For the past six years, Macintosh computers have been used in introductory astronomy classes and laboratories with HyperCard and other commercial Macintosh software. I will review some of the available software that has been found particularly useful in undergraduate situations. The review will start with HyperCard (a programmable "index card" system) since it is a mature multimedia platform for the Macintosh. Experiences with the Voyager, the TS-24, MathCad, NIH Image, and other programs as used by the author and George Mumford (Tufts University) in courses and workshops will be described.

  2. User's manual for SEDCALC, a computer program for computation of suspended-sediment discharge

    USGS Publications Warehouse

    Koltun, G.F.; Gray, John R.; McElhone, T.J.

    1994-01-01

    Sediment-Record Calculations (SEDCALC), a menu-driven set of interactive computer programs, was developed to facilitate computation of suspended-sediment records. The programs comprising SEDCALC were developed independently in several District offices of the U.S. Geological Survey (USGS) to minimize the intensive labor associated with various aspects of sediment-record computations. SEDCALC operates on suspended-sediment-concentration data stored in American Standard Code for Information Interchange (ASCII) files in a predefined card-image format. Program options within SEDCALC can be used to assist in creating and editing the card-image files, as well as to reformat card-image files to and from formats used by the USGS Water-Quality System. SEDCALC provides options for creating card-image files containing time series of equal-interval suspended-sediment concentrations from 1. digitized suspended-sediment-concentration traces, 2. linear interpolation between log-transformed instantaneous suspended-sediment-concentration data stored at unequal time intervals, and 3. nonlinear interpolation between log-transformed instantaneous suspended-sediment-concentration data stored at unequal time intervals. Suspended-sediment discharge can be computed from the streamflow and suspended-sediment-concentration data or by application of transport relations derived by regressing log-transformed instantaneous streamflows on log-transformed instantaneous suspended-sediment concentrations or discharges. The computed suspended-sediment discharge data are stored in card-image files that can be either directly imported to the USGS Automated Data Processing System or used to generate plots by means of other SEDCALC options.

  3. Technical Report of the National Marrow Donor Program

    DTIC Science & Technology

    2010-08-25

    Marrow Toxic Agents March 01,2010 through June 30, 2010 o Government Emergency Teleco=unications Service (GETS) calling cards were tested to...validate the ability ofRITN centers and selected NMDP staff to establish telephone contact during times of high telephone line congestion and validate card ...recruitment centers, including the following: New Registry Member Exit Card which reinforces key messages regarding the commitment one has made after

  4. Introduction to the 2018 SmartWay Truck Carrier Tool Webinar

    EPA Pesticide Factsheets

    This webinar provides an overview of EPA’s SmartWay program and the 2018 SmartWay Truck Carrier Tool, provides a live demonstration of the Tool, and explains how you can calculate and report your company’s emissions.

  5. Dissemination of go sun smart in outdoor recreation: effect of program exposure on sun protection of guests at high-altitude ski areas.

    PubMed

    Walkosz, Barbara J; Buller, David B; Andersen, Peter A; Scott, Michael D; Dignan, Mark B; Cutter, Gary R; Liu, Xia; Maloy, Julie A

    2014-09-01

    Go Sun Smart is a theory-based health communication program designed to influence sun-protection behaviors of employees and guests at high-altitude ski areas to reduce skin cancer risk. The effects of Go Sun Smart, in a Phase IV dissemination randomized posttest-only trial, on sun-protection behaviors of ski area guests are reported. Program use was assessed by on-site observation and guest message exposure, and sun protection was measured in intercept surveys at ski areas. Dissemination strategy-enhanced versus basic-was not significantly related to sun safety practices. Additional analyses examined the relation between message exposure and guests' sun safety practices. Ski areas displaying at least 6 Go Sun Smart materials in guest-only areas and 9 Go Sun Smart materials throughout the area increased guests' message exposure. Higher message exposure within the high-use ski areas was associated with improved sun protection by guests but not within the low-use ski areas. The authors underscore the importance of program implementation and message exposure on the success of evidence-based health communication efforts applied industrywide.

  6. The SMART Platform: early experience enabling substitutable applications for electronic health records

    PubMed Central

    Mandel, Joshua C; Murphy, Shawn N; Bernstam, Elmer Victor; Ramoni, Rachel L; Kreda, David A; McCoy, J Michael; Adida, Ben; Kohane, Isaac S

    2012-01-01

    Objective The Substitutable Medical Applications, Reusable Technologies (SMART) Platforms project seeks to develop a health information technology platform with substitutable applications (apps) constructed around core services. The authors believe this is a promising approach to driving down healthcare costs, supporting standards evolution, accommodating differences in care workflow, fostering competition in the market, and accelerating innovation. Materials and methods The Office of the National Coordinator for Health Information Technology, through the Strategic Health IT Advanced Research Projects (SHARP) Program, funds the project. The SMART team has focused on enabling the property of substitutability through an app programming interface leveraging web standards, presenting predictable data payloads, and abstracting away many details of enterprise health information technology systems. Containers—health information technology systems, such as electronic health records (EHR), personally controlled health records, and health information exchanges that use the SMART app programming interface or a portion of it—marshal data sources and present data simply, reliably, and consistently to apps. Results The SMART team has completed the first phase of the project (a) defining an app programming interface, (b) developing containers, and (c) producing a set of charter apps that showcase the system capabilities. A focal point of this phase was the SMART Apps Challenge, publicized by the White House, using http://www.challenge.gov website, and generating 15 app submissions with diverse functionality. Conclusion Key strategic decisions must be made about the most effective market for further disseminating SMART: existing market-leading EHR vendors, new entrants into the EHR market, or other stakeholders such as health information exchanges. PMID:22427539

  7. Smart School Snacks: A Comprehensive Preschool Nutrition Education Program

    ERIC Educational Resources Information Center

    Bernath, Penny; Masi, Wendy

    2006-01-01

    By adopting the Smart School Snacks program, administrators and teachers at the Nova Southeastern University (NSU) preschool center have prompted a healthy change in attitude about snacks. Simple healthy snacks have become the norm at the center and are welcomed by children and families alike. Family involvement is a critical part of the program.…

  8. AquaSMART: Water & Boating Safety, Grades 3-5. Teacher's Guide.

    ERIC Educational Resources Information Center

    Texas State Dept. of Parks and Wildlife, Austin.

    This teacher's guide accompanies a program designed to teach water and boating safety to students in grades 3-5. The written curriculum accompanies a video, AquaSMART 3-5. The theme of the curriculum is AquaSMART. To become AquaSMART, students must learn 10 basic lessons for water and boating safety. The written curriculum begins with an overview…

  9. AquaSMART: Water & Boating Safety, Grades K-2. Teacher's Guide.

    ERIC Educational Resources Information Center

    Texas State Dept. of Parks and Wildlife, Austin.

    This teacher's guide accompanies a program designed to teach water and boating safety to students in grades K-2. The written curriculum accompanies a video, AquaSMART K-2. The theme of the curriculum is AquaSMART. To become AquaSMART, students must learn 10 basic lessons for water and boating safety. The teacher's guide begins with an overview of…

  10. Oregon Schools for the 21st Century: Oregon Report Card 1993-94. An Annual Report to the State Legislature on Oregon's Public Schools.

    ERIC Educational Resources Information Center

    Oregon State Dept. of Education, Salem.

    The Oregon Report Card is an annual portrait of the state's public schools. The first five sections describe statewide progress toward implementing Oregon's Educational Act for the 21st Century, some of the state's exemplary school-improvement programs, and the clear relationship between Oregon's program and national education goals. The remaining…

  11. HYPERCLIPS

    NASA Technical Reports Server (NTRS)

    Hill, R. W.

    1994-01-01

    The integration of CLIPS into HyperCard combines the intuitive, interactive user interface of the Macintosh with the powerful symbolic computation of an expert system interpreter. HyperCard is an excellent environment for quickly developing the front end of an application with buttons, dialogs, and pictures, while the CLIPS interpreter provides a powerful inference engine for complex problem solving and analysis. In order to understand the benefit of integrating HyperCard and CLIPS, consider the following: HyperCard is an information storage and retrieval system which exploits the use of the graphics and user interface capabilities of the Apple Macintosh computer. The user can easily define buttons, dialog boxes, information templates, pictures, and graphic displays through the use of the HyperCard tools and scripting language. What is generally lacking in this environment is a powerful reasoning engine for complex problem solving, and this is where CLIPS plays a role. CLIPS 5.0 (C Language Integrated Production System, v5.0) was developed at the Johnson Space Center Software Technology Branch to allow artificial intelligence research, development, and delivery on conventional computers. CLIPS 5.0 supports forward chaining rule systems, object-oriented language, and procedural programming for the construction of expert systems. It features incremental reset, seven conflict resolution stategies, truth maintenance, and user-defined external functions. Since CLIPS is implemented in the C language it is highly portable; in addition, it is embeddable as a callable routine from a program written in another language such as Ada or Fortran. By integrating HyperCard and CLIPS the advantages and uses of both packages are made available for a wide range of applications: rapid prototyping of knowledge-based expert systems, interactive simulations of physical systems and intelligent control of hypertext processes, to name a few. HyperCLIPS 2.0 is written in C-Language (54%) and Pascal (46%) for Apple Macintosh computers running Macintosh System 6.0.2 or greater. HyperCLIPS requires HyperCard 1.2 or higher and at least 2Mb of RAM are recommended to run. An executable is provided. To compile the source code, the Macintosh Programmer's Workshop (MPW) version 3.0, CLIPS 5.0 (MSC-21927), and the MPW C-Language compiler are also required. NOTE: Installing this program under Macintosh System 7 requires HyperCard v2.1. This program is distributed on a 3.5 inch Macintosh format diskette. A copy of the program documentation is included on the diskette, but may be purchased separately. HyperCLIPS was developed in 1990 and version 2.0 was released in 1991. HyperCLIPS is a copyrighted work with all copyright vested in NASA. Apple, Macintosh, MPW, and HyperCard are registered trademarks of Apple Computer, Inc.

  12. 12 CFR 712.5 - What activities and services are preapproved for CUSOs?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... services: (1) Automated teller machine (ATM) services; (2) Credit card and debit card services; (3) Data... brokerage or agency: (1) Agency for sale of insurance; (2) Provision of vehicle warranty programs; (3...

  13. 12 CFR 712.5 - What activities and services are preapproved for CUSOs?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... services: (1) Automated teller machine (ATM) services; (2) Credit card and debit card services; (3) Data... brokerage or agency: (1) Agency for sale of insurance; (2) Provision of vehicle warranty programs; (3...

  14. 12 CFR 712.5 - What activities and services are preapproved for CUSOs?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... services: (1) Automated teller machine (ATM) services; (2) Credit card and debit card services; (3) Data... brokerage or agency: (1) Agency for sale of insurance; (2) Provision of vehicle warranty programs; (3...

  15. 12 CFR 712.5 - What activities and services are preapproved for CUSOs?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... services: (1) Automated teller machine (ATM) services; (2) Credit card and debit card services; (3) Data... brokerage or agency: (1) Agency for sale of insurance; (2) Provision of vehicle warranty programs; (3...

  16. Converting Mosquito Surveillance to Arbovirus Surveillance with Honey-Baited Nucleic Acid Preservation Cards.

    PubMed

    Flies, Emily J; Toi, Cheryl; Weinstein, Philip; Doggett, Stephen L; Williams, Craig R

    2015-07-01

    Spatially and temporally accurate information about infectious mosquito distribution allows for pre-emptive public health interventions that can reduce the burden of mosquito-borne infections on human populations. However, the labile nature of arboviruses, the low prevalence of infection in mosquitoes, the expensive labor costs for mosquito identification and sorting, and the specialized equipment required for arbovirus testing can obstruct arbovirus surveillance efforts. The recently developed techniques of testing mosquito expectorate using honey-baited nucleic acid preservation cards or sugar bait stations allows a sensitive method of testing for infectious, rather than infected, mosquito vectors. Here we report the results from the first large-scale incorporation of honey-baited cards into an existing mosquito surveillance program. During 4 months of the peak virus season (January-April, 2014) for a total of 577 trap nights, we set CO2-baited encephalitis vector survey (EVS) light traps at 88 locations in South Australia. The collection container for the EVS trap was modified to allow for the placement of a honey-baited nucleic acid preservation card (FTA™ card) inside. After collection, mosquitoes were maintained in a humid environment and allowed access to the cards for 1 week. Cards were then analyzed for common endemic Australian arboviruses using a nested RT-PCR. Eighteen virus detections, including 11 Ross River virus, four Barmah Forest virus, and three Stratford virus (not previously reported from South Australia) were obtained. Our findings suggest that adding FTA cards to an existing mosquito surveillance program is a rapid and efficient way of detecting infectious mosquitoes with high spatial resolution.

  17. Quality-improvement analytics for intravenous infusion pumps.

    PubMed

    Skledar, Susan J; Niccolai, Cynthia S; Schilling, Dennis; Costello, Susan; Mininni, Nicolette; Ervin, Kelly; Urban, Alana

    2013-04-15

    The implementation of a smart-pump continuous quality-improvement (CQI) program across a large health system is described, with an emphasis on key metrics for outcomes analyses and program refinement. Three years ago, the University of Pittsburgh Medical Center health system launched a CQI initiative to help ensure the safe use of 6000 smart pumps in its 14 inpatient facilities. A centralized team led by pharmacists is responsible for the retrieval and interpretation of smart-pump data, which is continuously transmitted to a main server. CQI findings are regularly posted on the health system's interdisciplinary intranet. Monitored metrics include rates of compliance with preprogrammed infusion limits, the top 20 drugs involved in alerts, drugs associated with alert-override rates of ≥90%, numbers of alerts by infusion type, nurse responses to alerts, and alert rate per drug library update. Based on the collected CQI data and site-specific requests, four systemwide updates of the smart-pump drug library were performed during the first 18 months of the program, reducing "nuisance alerts" by about 10% per update cycle and enabling targeted interventions to reduce rapid-infusion errors, other adverse drug events (ADEs), and pump-programming workarounds. Over one 12-month period, bedside alerts prompted nurses to reprogram or cancel continuous infusions an average of 400 times per month, potentially averting i.v. medication ADEs. A smart-pump CQI program is an effective tool for enhancing the safety of i.v. medication administration. The ongoing refinement of the drug library through the development and implementation of key interventions promotes the growth and sustainability of the smart-pump initiative systemwide.

  18. Integrating to Learn and Learning to Integrate: A Case Study of an Online Master's Program on Science-Mathematics Integration for Middle School Teachers

    ERIC Educational Resources Information Center

    Lee, Mimi Miyoung; Chauvot, Jennifer; Plankis, Brian; Vowell, Julie; Culpepper, Shea

    2011-01-01

    iSMART (Integration of Science, Mathematics, and Reflective Teaching) Program is an online science and mathematics integrated graduate program for middle school teachers across the state of Texas. As part of a large design-based research project, this paper describes the initial stages of the design process of the iSMART program for its first…

  19. Water-use computer programs for Florida

    USGS Publications Warehouse

    Geiger, L.H.

    1984-01-01

    Using U.S. Geological Survey computer programs L149-L153, this report shows how to process water-use data for the functional water-use categories: public supply, rural supply, industrial self-supplied, irrigation, and thermo-electric power generation. The programs are used to selectively retrieve entries and list them in a format suitable for publication. Instructions are given for coding cards to produce tables of water-use data for each of the functional use categories. These cards contain entries that identify a particular water-use data-collection site in Florida. Entries on the cards include location information such as county code, water management district code, hydrologic unit code, and, where applicable, a site name and number. Annual and monthly pumpage is included. These entries are shown with several different headings; for example, surface water or ground water, freshwater or saline pumpages, or consumptive use. All the programs use a similar approach; however, the actual programs differ with each functional water-use category and are discussed separately. Data prepared for these programs can also be processed by the National Water-Use Data System. (USGS)

  20. Smart-card-based automatic meal record system intervention tool for analysis using data mining approach.

    PubMed

    Zenitani, Satoko; Nishiuchi, Hiromu; Kiuchi, Takahiro

    2010-04-01

    The Smart-card-based Automatic Meal Record system for company cafeterias (AutoMealRecord system) was recently developed and used to monitor employee eating habits. The system could be a unique nutrition assessment tool for automatically monitoring the meal purchases of all employees, although it only focuses on company cafeterias and has never been validated. Before starting an interventional study, we tested the reliability of the data collected by the system using the data mining approach. The AutoMealRecord data were examined to determine if it could predict current obesity. All data used in this study (n = 899) were collected by a major electric company based in Tokyo, which has been operating the AutoMealRecord system for several years. We analyzed dietary patterns by principal component analysis using data from the system and extracted 5 major dietary patterns: healthy, traditional Japanese, Chinese, Japanese noodles, and pasta. The ability to predict current body mass index (BMI) with dietary preference was assessed with multiple linear regression analyses, and in the current study, BMI was positively correlated with male gender, preference for "Japanese noodles," mean energy intake, protein content, and frequency of body measurement at a body measurement booth in the cafeteria. There was a negative correlation with age, dietary fiber, and lunchtime cafeteria use (R(2) = 0.22). This regression model predicted "would-be obese" participants (BMI >or= 23) with 68.8% accuracy by leave-one-out cross validation. This shows that there was sufficient predictability of BMI based on data from the AutoMealRecord System. We conclude that the AutoMealRecord system is valuable for further consideration as a health care intervention tool. Copyright 2010 Elsevier Inc. All rights reserved.

  1. Logistics Company Partner 2.0.15 Tool: Quick Start Guide, 2015 Data Year - United States Version

    EPA Pesticide Factsheets

    This EPA document provides focused guidance and worksheets for SmartWay Logistics Company Partners on how to complete the SmartWay Logistics Tool and participate in the SmartWay program. (EPA publication # EPA-420-B-16-063)

  2. PLCs used in smart home control

    NASA Astrophysics Data System (ADS)

    Barz, C.; Deaconu, S. I.; Latinovic, T.; Berdie, A.; Pop-Vadean, A.; Horgos, M.

    2016-02-01

    This paper presents the realization of a smart home automation using Siemens PLCs. The smart home interface is realized using the HMI Weintek eMT3070a touchscreen, which shows the window for controlling and monitoring the lighting, room temperature, irrigation systems, swimming pool, etc. By using PLCs, the smart home can be controlled via Ethernet and it can be programmed to the needs of tenants.

  3. Colombia - A Case Study in Smart Power

    DTIC Science & Technology

    2014-05-22

    COLOMBIA–A CASE STUDY IN SMART POWER A Monograph by John P. Brady Foreign Service Officer United States Agency for...Colombia–A Case Study in Smart Power 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) John P. Brady...of Candidate: John P. Brady Monograph Title: Colombia–A Case Study in Smart Power Approved by: , Monograph Director Robert W

  4. Making Dynamic Digital Maps Cross-Platform and WWW Capable

    NASA Astrophysics Data System (ADS)

    Condit, C. D.

    2001-05-01

    High-quality color geologic maps are an invaluable information resource for educators, students and researchers. However, maps with large datasets that include images, or various types of movies, in addition to site locations where analytical data has been collected, are difficult to publish in a format that facilitates their easy access, distribution and use. The development of capable desktop computers and object oriented graphical programming environments has facilitated publication of such data sets in an encapsulated form. The original Dynamic Digital Map (DDM) programs, developed using the Macintosh based SuperCard programming environment, exemplified this approach, in which all data are included in a single package designed so that display and access to the data did not depend on proprietary programs. These DDMs were aimed for ease of use, and allowed data to be displayed by several methods, including point-and-click at icons pin-pointing sample (or image) locations on maps, and from clicklists of sample or site numbers. Each of these DDMs included an overview and automated tour explaining the content organization and program use. This SuperCard development culminated in a "DDM Template", which is a SuperCard shell into which SuperCard users could insert their own content and thus create their own DDMs, following instructions in an accompanying "DDM Cookbook" (URL http://www.geo.umass.edu/faculty/condit/condit2.html). These original SuperCard-based DDMs suffered two critical limitations: a single user platform (Macintosh) and, although they can be downloaded from the web, their use lacked an integration into the WWW. Over the last eight months I have been porting the DDM technology to MetaCard, which is aggressively cross-platform (11 UNIX dialects, WIN32 and Macintosh). The new MetaCard DDM is redesigned to make the maps and images accessible either from CD or the web, using the "LoadNGo" concept. LoadNGo allows the user to download the stand-alone DDM program using a standard browser, and then use the program independently to access images, maps and data with fast web connections. DDMs are intended to be a fast and inexpensive way to publish and make accessible, as an integrated product, high-quality color maps and data sets. They are not a substitute for the analytical capability of GIS; however maps produced using GIS and CAD programs can be easily integrated into DDMs. The preparation of any map product is a time consuming effort. To compliment that effort, the DDM Templates have build into them the capability to contain explanatory text at three different user levels (or perhaps in three different languages), thus one DDM may be used as both a research publication medium and an educational outreach product, with the user choosing which user mode to access the data.

  5. Assistance with Obtaining a Replacement Card Form

    EPA Pesticide Factsheets

    Form to be submitted to Section 608 Technician Certification Program Manager if a technician wants to replace a certification card, and the record of the original certification is in the data submitted by companies that have gone out of business.

  6. Stress Management and Resiliency Training (SMART) program among Department of Radiology faculty: a pilot randomized clinical trial.

    PubMed

    Sood, Amit; Sharma, Varun; Schroeder, Darrell R; Gorman, Brian

    2014-01-01

    To test the efficacy of a Stress Management and Resiliency Training (SMART) program for decreasing stress and anxiety and improving resilience and quality of life among Department of Radiology physicians. The study was approved by the institutional review board. A total of 26 Department of Radiology physicians were randomized in a single-blind trial to either the SMART program or a wait-list control arm for 12 weeks. The program involved a single 90-min group session in the SMART training with two follow-up phone calls. Primary outcomes measured at baseline and week 12 included the Perceived Stress Scale, Linear Analog Self-Assessment Scale, Mindful Attention Awareness Scale, and Connor-Davidson Resilience Scale. A total of 22 physicians completed the study. A statistically significant improvement in perceived stress, anxiety, quality of life, and mindfulness at 12 weeks was observed in the study arm compared to the wait-list control arm; resilience also improved in the active arm, but the changes were not statistically significant when compared to the control arm. A single session to decrease stress among radiologists using the SMART program is feasible. Furthermore, the intervention afforded statistically significant and clinically meaningful improvement in anxiety, stress, quality of life, and mindful attention. Further studies including larger sample size and longer follow-up are warranted. Copyright © 2014. Published by Elsevier Inc.

  7. Learn about Smart Sectors

    EPA Pesticide Factsheets

    about the Smart Sectors program including: Meaningful Collaboration with Regulated Sectors; Sensible Policies to Improve Environmental Outcomes; Better EPA Practices and Streamlined Operations; Historical Context

  8. Smart-Grid Backbone Network Real-Time Delay Reduction via Integer Programming.

    PubMed

    Pagadrai, Sasikanth; Yilmaz, Muhittin; Valluri, Pratyush

    2016-08-01

    This research investigates an optimal delay-based virtual topology design using integer linear programming (ILP), which is applied to the current backbone networks such as smart-grid real-time communication systems. A network traffic matrix is applied and the corresponding virtual topology problem is solved using the ILP formulations that include a network delay-dependent objective function and lightpath routing, wavelength assignment, wavelength continuity, flow routing, and traffic loss constraints. The proposed optimization approach provides an efficient deterministic integration of intelligent sensing and decision making, and network learning features for superior smart grid operations by adaptively responding the time-varying network traffic data as well as operational constraints to maintain optimal virtual topologies. A representative optical backbone network has been utilized to demonstrate the proposed optimization framework whose simulation results indicate that superior smart-grid network performance can be achieved using commercial networks and integer programming.

  9. Development and Use of Mark Sense Record Cards for Recording Medical Data on Pilots Subjected to Acceleration Stress

    NASA Technical Reports Server (NTRS)

    Smedal, Harald A.; Havill, C. Dewey

    1962-01-01

    A TIME-HONORED system of recording medical histories and the data obtained on physical and laboratory examination has been that of writing the information on record sheets that go into a folder for each patient. In order to have information which would be more readily retrieved, 'a program was initiated in 1952 by the U. S. Naval School of Aviation Medicine in connection with their "Care of the Flyer" study to place this information on machine record cards. In 1958, a machine record card method was developed for recording medical data in connection with the astronaut selection program. Machine record cards were also developed by the Aero Medical Laboratory, Wright-Patterson AFB, Ohio, and the Aviation Medical Acceleration Laboratory, Naval Air Development Center, Johnsville, Pennsylvania, for use in connection with a variety of tests including acceleration stress.1 Therefore, a variety of systems resulted in which data of a medical nature could easily be recalled. During the NASA, Ames Research Center centrifuge studies/'S the pilot subjects were interviewed after each centrifuge run, or series of runs, and subjective information was recorded in a log book by the usual history taking methods referred to above. After the methods Were reviewed, it' was recognized that a card system would be very useful in recording data from our pilots after they had been exposed to acceleration stress. Since the acceleration stress cards already developed did not meet our requirements, it was decided a different card was needed.

  10. The Visualization Toolkit (VTK): Rewriting the rendering code for modern graphics cards

    NASA Astrophysics Data System (ADS)

    Hanwell, Marcus D.; Martin, Kenneth M.; Chaudhary, Aashish; Avila, Lisa S.

    2015-09-01

    The Visualization Toolkit (VTK) is an open source, permissively licensed, cross-platform toolkit for scientific data processing, visualization, and data analysis. It is over two decades old, originally developed for a very different graphics card architecture. Modern graphics cards feature fully programmable, highly parallelized architectures with large core counts. VTK's rendering code was rewritten to take advantage of modern graphics cards, maintaining most of the toolkit's programming interfaces. This offers the opportunity to compare the performance of old and new rendering code on the same systems/cards. Significant improvements in rendering speeds and memory footprints mean that scientific data can be visualized in greater detail than ever before. The widespread use of VTK means that these improvements will reap significant benefits.

  11. Big Memory Elegance: HyperCard Information Processing and Desktop Publishing.

    ERIC Educational Resources Information Center

    Bitter, Gary G.; Gerson, Charles W., Jr.

    1991-01-01

    Discusses hardware requirements, functions, and applications of five information processing and desktop publishing software packages for the Macintosh: HyperCard, PageMaker, Cricket Presents, Power Point, and Adobe illustrator. Benefits of these programs for schools are considered. (MES)

  12. Computer program CDCID: an automated quality control program using CDC update

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Singer, G.L.; Aguilar, F.

    1984-04-01

    A computer program, CDCID, has been developed in coordination with a quality control program to provide a highly automated method of documenting changes to computer codes at EG and G Idaho, Inc. The method uses the standard CDC UPDATE program in such a manner that updates and their associated documentation are easily made and retrieved in various formats. The method allows each card image of a source program to point to the document which describes it, who created the card, and when it was created. The method described is applicable to the quality control of computer programs in general. Themore » computer program described is executable only on CDC computing systems, but the program could be modified and applied to any computing system with an adequate updating program.« less

  13. Bringing the Community into the Process: Issues and Promising Practices for Involving Parents & Business in Local Smart Start Partnerships. UNC Smart Start Evaluation Report.

    ERIC Educational Resources Information Center

    Cornish, Mary; Noblit, George

    Smart Start is North Carolina's partnership between state government and local leaders, service providers, and families to better serve children under age 6 and their families. The aim of the program is ensuring that all children enter school healthy and ready to learn. This study examined parent and business involvement in local Smart Start…

  14. Adaptive Interventions and SMART Designs: Application to child behavior research in a community setting.

    PubMed

    Kidwell, Kelley M; Hyde, Luke W

    2016-09-01

    Heterogeneity between and within people necessitates the need for sequential personalized interventions to optimize individual outcomes. Personalized or adaptive interventions (AIs) are relevant for diseases and maladaptive behavioral trajectories when one intervention is not curative and success of a subsequent intervention may depend on individual characteristics or response. AIs may be applied to medical settings and to investigate best prevention, education, and community-based practices. AIs can begin with low-cost or low-burden interventions and followed with intensified or alternative interventions for those who need it most. AIs that guide practice over the course of a disease, program, or school year can be investigated through sequential multiple assignment randomized trials (SMARTs). To promote the use of SMARTs, we provide a hypothetical SMART in a Head Start program to address child behavior problems. We describe the advantages and limitations of SMARTs, particularly as they may be applied to the field of evaluation.

  15. Logistics Company Partner 2.0.15 Tool: Data Entry and Troubleshooting Guide, 2015 Data Year - United States Version

    EPA Pesticide Factsheets

    This EPA document provides detailed data entry and troubleshooting guidance for SmartWay Logistics Company Partners on how to complete the SmartWay Logistics Tool and participate in the SmartWay program. (EPA publication # EPA-420-B-16-062)

  16. School Smarts: A Reflection of Pedagogical and Personal Insights

    ERIC Educational Resources Information Center

    Barrera, Magdalena L.

    2014-01-01

    Recent studies show that many college instructors still believe that Latino students lack the "school smarts" for academic success. This essay challenges the notion of school smarts in order to highlight Latino students' numerous strengths. I share my model for a mentorship program that facilitates better student-faculty…

  17. 34 CFR 668.58 - Interim disbursements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., ACG, National SMART Grant, or campus-based program funds to the applicant; (ii) Employ the applicant..., ACG, National SMART Grant, or campus-based funds; or (ii)(A) May make one disbursement of any combination of Federal Pell Grant, ACG, National SMART Grant, Federal Perkins Loan, or FSEOG funds for the...

  18. 34 CFR 668.58 - Interim disbursements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., ACG, National SMART Grant, or campus-based program funds to the applicant; (ii) Employ the applicant..., ACG, National SMART Grant, or campus-based funds; or (ii)(A) May make one disbursement of any combination of Federal Pell Grant, ACG, National SMART Grant, Federal Perkins Loan, or FSEOG funds for the...

  19. 78 FR 18322 - Smart Grid Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-26

    ... meeting is to discuss the NIST Smart Grid Program Plan. The agenda may change to accommodate Committee business. The final agenda will be posted on the Smart Grid Web site at http://www.nist.gov/smartgrid..., Administration Building, National Institute of Standards and Technology (NIST), 100 Bureau Drive, Gaithersburg...

  20. 75 FR 55306 - Smart Grid Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... orientation for Committee members and provide an update on NIST's Smart Grid program. The agenda may change to accommodate Committee business. The final agenda will be posted on the Smart Grid Web site at http://www.nist... Room C, in the Administration Building at NIST in Gaithersburg, Maryland. Please note admittance...

  1. QuickSmart: a basic academic skills intervention for middle school students with learning difficulties.

    PubMed

    Graham, Lorraine; Bellert, Anne; Thomas, Jenny; Pegg, John

    2007-01-01

    QuickSmart is a basic academic skills intervention designed for persistently low-achieving students in the middle years of schooling that aims to improve the automaticity of basic skills to improve higher-order processes, such as problem solving and comprehension, as measured on standardized tests. The QuickSmart instructional program consists of three structured, teacher- or teacher aide-directed, 30-minute, small-group lessons each week for approximately 26 weeks. In this study, 42 middle school students experiencing learning difficulties (LD) completed the QuickSmart reading program, and a further 42 students with LD took part in the QuickSmart mathematics program. To investigate the effects of the intervention, comparisons were made between the reading and mathematics progress of the intervention group and a group of 10 high-achieving and 10 average-achieving peers. The results indicated that although the standardized reading comprehension and mathematics scores of QuickSmart students remained below those of comparison students, they improved significantly from pretest to posttest. In contrast, the standardized scores of comparison students were not significantly different from pretest to posttest. On measures of response speed and accuracy gathered using the Cognitive Aptitude Assessment System (CAAS), QuickSmart students were able to narrow the gap between their performance and that of their high- and average-achieving peers. Implications are drawn regarding the importance of interventions that emphasize the automaticity of basic academic skills for students with learning difficulties.

  2. QoS Differential Scheduling in Cognitive-Radio-Based Smart Grid Networks: An Adaptive Dynamic Programming Approach.

    PubMed

    Yu, Rong; Zhong, Weifeng; Xie, Shengli; Zhang, Yan; Zhang, Yun

    2016-02-01

    As the next-generation power grid, smart grid will be integrated with a variety of novel communication technologies to support the explosive data traffic and the diverse requirements of quality of service (QoS). Cognitive radio (CR), which has the favorable ability to improve the spectrum utilization, provides an efficient and reliable solution for smart grid communications networks. In this paper, we study the QoS differential scheduling problem in the CR-based smart grid communications networks. The scheduler is responsible for managing the spectrum resources and arranging the data transmissions of smart grid users (SGUs). To guarantee the differential QoS, the SGUs are assigned to have different priorities according to their roles and their current situations in the smart grid. Based on the QoS-aware priority policy, the scheduler adjusts the channels allocation to minimize the transmission delay of SGUs. The entire transmission scheduling problem is formulated as a semi-Markov decision process and solved by the methodology of adaptive dynamic programming. A heuristic dynamic programming (HDP) architecture is established for the scheduling problem. By the online network training, the HDP can learn from the activities of primary users and SGUs, and adjust the scheduling decision to achieve the purpose of transmission delay minimization. Simulation results illustrate that the proposed priority policy ensures the low transmission delay of high priority SGUs. In addition, the emergency data transmission delay is also reduced to a significantly low level, guaranteeing the differential QoS in smart grid.

  3. Quarterly Performance/Technical Report of the National Marrow Donor Program

    DTIC Science & Technology

    2011-01-28

    emergency notification system, the NMDP public announcement system, Government Emergency Telecommunications Service calling cards (GETS cards ), and the...Contract Audit Agency RCC Renal Cell Carcinoma DIY Do it yourself RCI BMT Resource for Clinical Investigations in Blood and Marrow Transplantation

  4. Improving Institutional Report Card Indicators

    ERIC Educational Resources Information Center

    McGowan, Veronica

    2016-01-01

    Institutional report cards are increasingly being used by higher educational institutions to present academic outcomes to external audiences of prospective students and parents, as well as program and institutional evaluators. While some prospective students are served by national transparency measures most users mine information from the…

  5. Design of a decision support system, trained on GPU, for assisting melanoma diagnosis in dermatoscopy images

    NASA Astrophysics Data System (ADS)

    Glotsos, Dimitris; Kostopoulos, Spiros; Lalissidou, Stella; Sidiropoulos, Konstantinos; Asvestas, Pantelis; Konstandinou, Christos; Xenogiannopoulos, George; Konstantina Nikolatou, Eirini; Perakis, Konstantinos; Bouras, Thanassis; Cavouras, Dionisis

    2015-09-01

    The purpose of this study was to design a decision support system for assisting the diagnosis of melanoma in dermatoscopy images. Clinical material comprised images of 44 dysplastic (clark's nevi) and 44 malignant melanoma lesions, obtained from the dermatology database Dermnet. Initially, images were processed for hair removal and background correction using the Dull Razor algorithm. Processed images were segmented to isolate moles from surrounding background, using a combination of level sets and an automated thresholding approach. Morphological (area, size, shape) and textural features (first and second order) were calculated from each one of the segmented moles. Extracted features were fed to a pattern recognition system assembled with the Probabilistic Neural Network Classifier, which was trained to distinguish between benign and malignant cases, using the exhaustive search and the leave one out method. The system was designed on the GPU card (GeForce 580GTX) using CUDA programming framework and C++ programming language. Results showed that the designed system discriminated benign from malignant moles with 88.6% accuracy employing morphological and textural features. The proposed system could be used for analysing moles depicted on smart phone images after appropriate training with smartphone images cases. This could assist towards early detection of melanoma cases, if suspicious moles were to be captured on smartphone by patients and be transferred to the physician together with an assessment of the mole's nature.

  6. Annual Report Card on California Teacher Preparation Programs for the Academic Year 2014-2015 as Required by Title II of the Higher Education Act

    ERIC Educational Resources Information Center

    Suckow, Marjorie A.

    2016-01-01

    This report presents the "Annual Report Card on California Teacher Preparation Programs for the Academic Year 2014-2015" as required by Title II of the Higher Education Act. In 2008, the law was reauthorized and changes were made to the Title II data collection and reporting requirements. The 2008-09 reporting year was the pilot year in…

  7. Space missions for automation and robotics technologies (SMART) program

    NASA Technical Reports Server (NTRS)

    Ciffone, D. L.; Lum, H., Jr.

    1985-01-01

    The motivations, features and expected benefits and applications of the NASA SMART program are summarized. SMART is intended to push the state of the art in automation and robotics, a goal that Public Law 98-371 mandated be an inherent part of the Space Station program. The effort would first require tests of sensors, manipulators, computers and other subsystems as seeds for the evolution of flight-qualified subsystems. Consideration is currently being given to robotics systems as add-ons to the RMS, MMU and OMV and a self-contained automation and robotics module which would be tended by astronaut visits. Probable experimentation and development paths that would be pursued with the equipment are discussed, along with the management structure and procedures for the program. The first hardware flight is projected for 1989.

  8. SuperState: a computer program for the control of operant behavioral experimentation.

    PubMed

    Zhang, Fuqiang

    2006-09-15

    Operant behavioral researches require precise control of experimental devices for delivering stimuli and monitoring behavioral responses. The author developed a software solution named SuperState for controlling hardware devices and running reinforcement schedules. The Microsoft Windows compatible software was written by use of an object-oriented programming language Borland Delphi 5.0, which has simplified the programming of the application. SuperState is a stand-alone easy-to-use green software, without the need for the experimenter to master any scripting languages. It features: (1) control of multiple operant cages running independent reinforcement schedules; (2) enough cage devices (16 digital inputs and 16 digital outputs for each cage) suitable for the need of most operant behavioral equipments; (3) control of most standard ISA-type digital interface cards including Med-Associates Super-port cards and a PCI-type card AC6412, and highly expandable to support other PCI-type interface cards; (4) high-resolution device control (1ms); (5) a built-in real-time cumulative recorder; (6) extensive data analyzing including event recorder, cumulative recorder, block analyzing; the summarized results can be transferred easily to Microsoft Excel spreadsheets through the Clipboard.

  9. A Case Study of Engaging Hard-to-Reach Participants in the Research Process: Community Advisors on Research Design and Strategies (CARDS)®.

    PubMed

    Kaiser, Betty L; Thomas, Gay R; Bowers, Barbara J

    2017-02-01

    Lack of diversity among study participants in clinical research limits progress in eliminating health disparities. The engagement of lay stakeholders, such as patient or community advisory boards (CABs), has the potential to increase recruitment and retention of underrepresented groups by providing a structure for gathering feedback on research plans and materials from this target population. However, many CABs intentionally recruit prominent stakeholders who are connected to or comfortable with research and academia and thus may not accurately represent the perspectives of underrepresented groups who have been labeled hard-to-reach, including racial minorities and low-income or low-literacy populations. We developed a partnership between the University of Wisconsin-Madison School of Nursing and two community centers to deliberately engage hard-to-reach people in two lay advisory groups, the Community Advisors on Research Design and Strategies (CARDS)®. Community center staff recruited the CARDS from center programs, including parenting and childcare programs, women's support groups, food pantries, and senior meal programs. The CARDS model differs from other CABs in its participants, processes, and outcomes. Since 2010, the CARDS have met monthly with nurses and other researchers, helping them understand how research processes and the language, tone, appearance, and organization of research materials can discourage people from enrolling in clinical studies. We have successfully used the CARDS model to bring hard-to-reach populations into the research process and have sustained their participation. The model represents a promising strategy for increasing the diversity of participants in clinical research. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  10. Medicare-approved drug discount cards and renal transplant patients: how much can these cards reduce prescription costs?

    PubMed

    Chisholm, Marie A; Marshall, Josh; Smith, Kimberly E; Garrett, Charlene J; Turner, Jeanie C

    2005-06-01

    Post-transplant prescription medications are expensive, often costing over 12,000 dollars annually. Many solid-organ transplant patients have Medicare coverage and patients enrolled in Medicare-approved drug discount card (MADDC) programs may be able to receive prescription medications at a reduced price. However, many transplant healthcare practitioners are unaware of the utility of MADDCs. The purpose of this study was to determine whether enrolling renal transplant patients (RTPs) into a MADDC produces significant savings in prescription costs. Two Medicare RTPs, with prescription medication profiles representative of an RTP within 3 months post-transplant and an RTP greater than 5 yr post-transplant, were randomly selected from the Medication Access Program's database. Cost benefit analyses were from the patients' perspective and were performed using the: (i) prescription cost from the Medicare website of MADDCs that listed the greatest and least prescription costs compared with the retail cash price of the same prescription without using the MADDCs; and (ii) MADDCs' annual enrollment fee. The potential cost difference of using MADDCs and not using MADDCs to purchase the prescription medications were calculated. RTPs' monthly out-of-pocket cost for prescription medications ranged from 162 dollars to 340 dollars, and MADDCs offered discounts of 20-37% from retail prices; thus outweighing the MADDC enrollment cost. MADDCs, when selected and used appropriately, can reduce prescription medication cost for RTPs. Card selection is of great importance as discount rates vary greatly among cards, and only under restricted circumstances is a patient allowed to switch to another card. It is imperative that practitioners are aware of these programs and utilize cost-effective prescribing practices.

  11. Learn about SmartWay

    EPA Pesticide Factsheets

    The SmartWay® Program is public-private initiative between EPA, large and small trucking companies, rail carriers, logistics companies, commercial manufacturers, retailers, and other federal and state agencies.

  12. History of Satellite Orbit Determination at NSWCDD

    DTIC Science & Technology

    2018-01-31

    run . Segment 40 did pass editing and its use was optional after Segment 20. Segment 30 needed to be run before Segment 80. Segment 70 was run as...control cards required to run the program. These included a CHARGE card related to usage charges and various REQUEST, ATTACH, and CATALOG cards...each) could be done in a single run after the long-arc solution had converged. These short arcs used the pass matrices from the long-arc run in their

  13. SMART Money: Do Financial Incentives Encourage College Students to Study Science?

    ERIC Educational Resources Information Center

    Evans, Brent J.

    2012-01-01

    This research examines the short term success of a postsecondary federal financial aid program, the SMART Grant, designed to increase this stock of scientific human capital. An exploration of the success of this program provides the opportunity to address two critically important research questions. Do financial incentives encourage students to…

  14. Improving Elementary Science Instruction and Student Achievement: The Impact of a Professional Development Program

    ERIC Educational Resources Information Center

    Borman, Kathryn M.; Cotner, Bridget A.; Lee, Reginald S.; Boydston, Theodore L.; Lanehart, Rheta

    2009-01-01

    This study was designed to establish the efficacy of Teaching SMART (Teaching Science, Mathematics and Relevant Technologies); a science professional development program for teachers with students in grades 3 through 5. Teaching SMART promotes scientific inquiry and emphasizes the importance of equity, empowerment, exploration, and fun in the…

  15. A Combined Research/Educational Curriculum in Smart Sensors and Integrated Devices.

    ERIC Educational Resources Information Center

    Auner, G. W.; Siy, P.; Naik, R.; Wenger, L.; Liu, G-Y.; Schwiebert, L. J.

    The researchers are developing a new curriculum which integrates ongoing research efforts in the Center for Smart Sensors and Integrated Devices into a cooperative educational and traineeship program. A forerunner to this program was initiated with funding by a National Science Foundation (NSF) Combined Research and Curriculum Development (CRCD)…

  16. [Development and evaluation of "Hospice Smart Patient" service program].

    PubMed

    Park, Chai-Soon; Yoo, Yang-Sook; Choi, Dong-Won; Park, Hyun-Jeong; Kim, Ji-In

    2011-02-01

    The purpose of this study was to develop and implement the Hospice Smart Patient Program and to evaluate its effectiveness. It was quasi-experimental non-equivalent pre-post study. Breast cancer patients who underwent surgery, chemotherapy or radiotherapy, or who needed palliative care, participated in the study. Participants were divided into two groups, experimental and control groups based on their preferences. The program was developed after literature review and discussion among experts on hospice and palliative care. Participants who were in the experimental group received either face-to-face or phone "Hospice Smart Patient" Service at least once a week for 5 months. There was a significant difference in quality of life and communication skill between the two groups after the service was provided. In addition, participants in experimental group showed improved decision making skills, mastery sense, and understanding of hospice and palliative care, which would be beneficial in improving their quality of life. We have concluded that the "Hospice Smart Patient" Program is useful for cancer patients in decision making, improving self-control and choosing hospice care to improve their quality of life.

  17. 12 CFR 337.5 - Exemption.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Exemption. 337.5 Section 337.5 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY UNSAFE AND UNSOUND BANKING PRACTICES § 337.5 Exemption. Check guaranty card programs, customer-sponsored credit card...

  18. 12 CFR 337.5 - Exemption.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Exemption. 337.5 Section 337.5 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY UNSAFE AND UNSOUND BANKING PRACTICES § 337.5 Exemption. Check guaranty card programs, customer-sponsored credit card...

  19. 12 CFR 337.5 - Exemption.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Exemption. 337.5 Section 337.5 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY UNSAFE AND UNSOUND BANKING PRACTICES § 337.5 Exemption. Check guaranty card programs, customer-sponsored credit card...

  20. 12 CFR 337.5 - Exemption.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Exemption. 337.5 Section 337.5 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY UNSAFE AND UNSOUND BANKING PRACTICES § 337.5 Exemption. Check guaranty card programs, customer-sponsored credit card...

  1. EnergySmart Schools National Financing Roundtable--Key Outcomes

    ERIC Educational Resources Information Center

    US Department of Energy, 2009

    2009-01-01

    As a follow-up to the release of its "Guide to Financing EnergySmart Schools", the U.S. Department of Energy's EnergySmart Schools program hosted the National Financing Roundtable on February 5, 2009. This event was held prior to the seventh Annual High Performance Schools Symposium, hosted by the Council of Educational Facility Planners…

  2. EnergySmart Schools National Financing Roundtable II—Key Outcomes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-11-01

    As a follow-up to the release of its Guide to Financing EnergySmart Schools, the the National Financing Roundtable brought together individuals with diverse knowledge of school building programs and projects to discuss financing issues and options that build upon those described in the first Guide to Financing EnergySmart Schools.

  3. Do universal media literacy programs have an effect on weight and shape concern by influencing media internalization?

    PubMed

    Wade, Tracey D; Wilksch, Simon M; Paxton, Susan J; Byrne, Susan M; Austin, S Bryn

    2017-07-01

    The current study examined whether media internalization, found to mediate the relationship between selected prevention programs and outcomes, mediated the impact of two universal prevention programs that targeted risk factors for eating disorders and obesity, namely weight concern, and shape concern. Students randomized to a media literacy (Media Smart) program (N = 269, 65% females, mean age 12.97 years) and a healthy lifestyle (Life Smart) program (N = 347, 69% females, mean age 13.07 years) were included in the analyses. There were four waves of data (baseline, end of intervention, 6- and 12-month follow-up). Latent growth curve modeling was used to explore whether group assignment influenced levels of media internalization, and whether that in turn influenced change over time of our two outcome variables. Being randomly allocated to Media Smart as opposed to Life Smart resulted in less growth of both outcome variables through the influence on decreasing levels of media internalization. Findings provided support for the suggestion that media literacy programs exert an impact on outcomes related to eating disorder risk through changes to media internalization. Future research should examine whether these mechanisms of change differ between girls and boys. © 2017 Wiley Periodicals, Inc.

  4. Overview of demonstrator program of Japanese Smart Materials and Structure System project

    NASA Astrophysics Data System (ADS)

    Tajima, Naoyuki; Sakurai, Tateo; Sasajima, Mikio; Takeda, Nobuo; Kishi, Teruo

    2003-08-01

    The Japanese Smart Material and Structure System Project started in 1998 as five years' program that funded by METI (Ministry of Economy, Trade and Industry) and supported by NEDO (New Energy and Industrial Technology Development Organization). Total budget of five years was finally about 3.8 billion Japanese yen. This project has been conducted as the Academic Institutions Centered Program, namely, one of collaborated research and development among seven universities (include one foreign university), seventeen Industries (include two foreign companies), and three national laboratories. At first, this project consisted of four research groups that were structural health monitoring, smart manufacturing, active/adaptive structures, and actuator material/devices. Two years later, we decided that two demonstrator programs should be added in order to integrate the developed sensor and actuator element into the smart structure system and verify the research and development results of above four research groups. The application target of these demonstrators was focused to the airplane, and two demonstrators that these shapes simulate to the fuselage of small commercial airplane (for example, Boeing B737) had been established. Both demonstrators are cylindrical structures with 1.5 m in diameter and 3 m in length that the first demonstrator has CFRP skin-stringer and the second one has CFRP skin. The first demonstrator integrates the following six innovative techniques: (1) impact monitoring using embedded small diameter optical fiber sensors newly developed in this program, (2) impact monitoring using the integrated acoustic emission (AE) systems, (3) whole-field strain mapping using the BOTDR/FBG integrated system, (4) damage suppression using embedded shape memory alloy (SMA) films, (5) maximum and cyclic strain sensing using smart composite patches, and (6) smart manufacturing using the integrated sensing system. The second one is for demonstrating the suppression of vibration and acoustic noise generated in the composite cylindrical structure. In this program, High-performance PZT actuators/sensors developed in this program are also installed. The whole tests and evaluations have now been finished. This paper presents the outline of demonstrator programs, followed by six presentations that show the detail verification results of industrial demonstration themes.

  5. A Two-Stage Stochastic Mixed-Integer Programming Approach to the Smart House Scheduling Problem

    NASA Astrophysics Data System (ADS)

    Ozoe, Shunsuke; Tanaka, Yoichi; Fukushima, Masao

    A “Smart House” is a highly energy-optimized house equipped with photovoltaic systems (PV systems), electric battery systems, fuel cell cogeneration systems (FC systems), electric vehicles (EVs) and so on. Smart houses are attracting much attention recently thanks to their enhanced ability to save energy by making full use of renewable energy and by achieving power grid stability despite an increased power draw for installed PV systems. Yet running a smart house's power system, with its multiple power sources and power storages, is no simple task. In this paper, we consider the problem of power scheduling for a smart house with a PV system, an FC system and an EV. We formulate the problem as a mixed integer programming problem, and then extend it to a stochastic programming problem involving recourse costs to cope with uncertain electricity demand, heat demand and PV power generation. Using our method, we seek to achieve the optimal power schedule running at the minimum expected operation cost. We present some results of numerical experiments with data on real-life demands and PV power generation to show the effectiveness of our method.

  6. User's manual for THPLOT, A FORTRAN 77 Computer program for time history plotting

    NASA Technical Reports Server (NTRS)

    Murray, J. E.

    1982-01-01

    A general purpose FORTRAN 77 computer program (THPLOT) for plotting time histories using Calcomp pen plotters is described. The program is designed to read a time history data file and to generate time history plots for selected time intervals and/or selected data channels. The capabilities of the program are described. The card input required to define the plotting operation is described and examples of card input and the resulting plotted output are given. The examples are followed by a description of the printed output, including both normal output and error messages. Lastly, implementation of the program is described. A complete listing of the program with reference maps produced by the CDC FTN 5.0 compiler is included.

  7. Iris Recognition: The Consequences of Image Compression

    NASA Astrophysics Data System (ADS)

    Ives, Robert W.; Bishop, Daniel A.; Du, Yingzi; Belcher, Craig

    2010-12-01

    Iris recognition for human identification is one of the most accurate biometrics, and its employment is expanding globally. The use of portable iris systems, particularly in law enforcement applications, is growing. In many of these applications, the portable device may be required to transmit an iris image or template over a narrow-bandwidth communication channel. Typically, a full resolution image (e.g., VGA) is desired to ensure sufficient pixels across the iris to be confident of accurate recognition results. To minimize the time to transmit a large amount of data over a narrow-bandwidth communication channel, image compression can be used to reduce the file size of the iris image. In other applications, such as the Registered Traveler program, an entire iris image is stored on a smart card, but only 4 kB is allowed for the iris image. For this type of application, image compression is also the solution. This paper investigates the effects of image compression on recognition system performance using a commercial version of the Daugman iris2pi algorithm along with JPEG-2000 compression, and links these to image quality. Using the ICE 2005 iris database, we find that even in the face of significant compression, recognition performance is minimally affected.

  8. System for simultaneously loading program to master computer memory devices and corresponding slave computer memory devices

    NASA Technical Reports Server (NTRS)

    Hall, William A. (Inventor)

    1993-01-01

    A bus programmable slave module card for use in a computer control system is disclosed which comprises a master computer and one or more slave computer modules interfacing by means of a bus. Each slave module includes its own microprocessor, memory, and control program for acting as a single loop controller. The slave card includes a plurality of memory means (S1, S2...) corresponding to a like plurality of memory devices (C1, C2...) in the master computer, for each slave memory means its own communication lines connectable through the bus with memory communication lines of an associated memory device in the master computer, and a one-way electronic door which is switchable to either a closed condition or a one-way open condition. With the door closed, communication lines between master computer memory (C1, C2...) and slave memory (S1, S2...) are blocked. In the one-way open condition invention, the memory communication lines or each slave memory means (S1, S2...) connect with the memory communication lines of its associated memory device (C1, C2...) in the master computer, and the memory devices (C1, C2...) of the master computer and slave card are electrically parallel such that information seen by the master's memory is also seen by the slave's memory. The slave card is also connectable to a switch for electronically removing the slave microprocessor from the system. With the master computer and the slave card in programming mode relationship, and the slave microprocessor electronically removed from the system, loading a program in the memory devices (C1, C2...) of the master accomplishes a parallel loading into the memory devices (S1, S2...) of the slave.

  9. DoD Cardholders Used Their Government Travel Cards for Personal Use at Casinos and Adult Entertainment Establishments

    DTIC Science & Technology

    2015-05-19

    liaison to GSA, Citibank, and the Component Program Managers ( CPMs ) on all travel card-related issues. DoD Comptrollers The Military Department...Appendix. Introduction DODIG-2015-125 │ 3 Component Program Managers CPMs are DoD personnel (military or civilian) designated in writing by the Component...or suspension of accounts. As a result, CPMs and APCs did not have sufficient details on transactions that occurred at casinos or adult

  10. 77 FR 23631 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-20

    ..., 217, 242, 245, and 252 Government procurement. Mary Overstreet, Editor, Defense Acquisition... ``Deputy Assistant Secretary of the Army (Procurement)'' in alphabetical order; 0 b. In the Army list by... purchase, travel, and fuel card programs is available in the ``Department of Defense Government Charge Card...

  11. Medicare prescription drug discount cards.

    PubMed

    Bryant, Natasha

    2004-01-01

    With the passage of the Medicare Prescription Drug Improvement and Modernization Act of 2003 came the creation of a Part D drug benefit through Medicare. Until that benefit is implemented, Medicare has established a drug discount card program to help your clients save money on their outpatient prescription drug expenses. In this brief, we discuss the Medicare-approved discount cards--who is eligible, how they work, how your clients can best make important decisions about them, and what help is out there for people with low incomes.

  12. [Prenatal patient cards and quality of prenatal care in public health services in Greater Metropolitan Vitória, Espírito Santo State, Brazil].

    PubMed

    Santos Neto, Edson Theodoro dos; Oliveira, Adauto Emmerich; Zandonade, Eliana; Gama, Silvana Granado Nogueira da; Leal, Maria do Carmo

    2012-09-01

    This study aimed to assess the completeness of prenatal care information on the patients' prenatal care cards, according to coverage by various public health services: Family Health Strategy (FHS), Community-Based Health Workers' Program (CBHWP), and traditional Primary Care Units (PCU) in Greater Metropolitan Vitória, Espírito Santo State, Brazil. In a cross-sectional study, 1,006 prenatal cards were randomly selected from postpartum women at maternity hospitals in the metropolitan area. Completeness of the cards was assessed according to the criteria proposed by Romero & Cunha, which measure the quality on a scale from excellent (< 5% incomplete cards) to very bad (> 50% incomplete cards). In general, completion of information on the cards was bad (> 20% incomplete), but cards were filled out better in the FHS than in the CBHWP and PCU, especially for tetanus vaccination (p = 0.016) and gestational weight (p = 0.039). In conclusion, the quality of prenatal care in the public health system in Greater Metropolitan Vitória fails to meet the Brazilian national guidelines for maternal and child health.

  13. To err is human nature. Can transfusion errors due to human factors ever be eliminated?

    PubMed

    Lau, F Y; Cheng, G

    2001-11-01

    Fatal hemolytic transfusion reaction due to ABO incompatibility occurs mainly as a result of clerical errors. Blood sample drawn from the wrong patient and labeled as another patient's specimen will not be detected by the blood bank unless there is a previous ABO grouping result. In Hong Kong, we had designed a transfusion wristband system--portable barcode scanner system to detect such clerical errors. The system was well accepted by the house staff and had prevented two BO mismatched transfusion. Other current system of patient's identification may have similar results, but the wristband system has the advantages of being simple, inexpensive and easy to implement. The Hong Kong Government is planning to replace the personal identity card for all citizens with an electronic smart card by 2003. If the new card contains the person's detailed red cell phenotypes in digital code, then the phenotypes of all blood donors and admitted patients will be readily available. It is feasible to issue phenotype-matched blood to patients without any need of pre-transfusion testing, therefore eliminating mismatched transfusions for most patients. Our pilot study of 474 patients showed that the system was safe and up to 98% of admitted patients could be transfused without delays. Patients with rare phenotypes, visitors or illegal immigrants may still need pre-transfusion antibody screen, but if most patients can be issued blood units without testings, the potential savings in health care amount to US$14 million/year.

  14. Energy Smart Schools: Creating a Sustainable Learning Environment in Ohio.

    ERIC Educational Resources Information Center

    Ohio Energy Project, Lewis Center.

    In 1999, the Ohio Energy Project (OEP) was awarded a grant through Rebuild America, under the U.S. Department of Energy, to develop an EnergySmart Schools Program for Ohio. Together with its partners, this program serves to empower students to improve the conditions of their school buildings through education, thus increasing scientific literacy…

  15. Facilitating Smart-Girl: Feminist Pedagogy in Service Learning in Action

    ERIC Educational Resources Information Center

    Williams, Rhonda L.; Ferber, Abby L.

    2008-01-01

    This article discusses an innovative program, Smart-Girl, developed in collaboration among feminist scholars, educators, and business women concerned with intervening in and improving the lives of adolescent girls in their community. This program is unique not only in its success, but also in the social and emotional impact it has had on the high…

  16. Chart Card: feasibility of a tool for improving emergency department care in sickle cell disease.

    PubMed

    Neumayr, Lynne; Pringle, Steven; Giles, Stephen; Quirolo, Keith C; Paulukonis, Susan; Vichinsky, Elliott P; Treadwell, Marsha J

    2010-11-01

    Patients with sickle cell disease (SCD) are concerned with emergency department care, including time to treatment and staff attitudes and knowledge. Providers are concerned about rapid access to patient information and SCD treatment protocols. A software application that stores and retrieves encrypted personal medical information on a plastic credit card-sized Chart Card was designed. To determine the applicability and feasibility of the Chart Card on patient satisfaction with emergency department care and provider accessibility to patient information and care protocols. One-half of 44 adults (aged -18 years) and 50 children with SCD were randomized to either the Chart Card or usual care. Patient satisfaction was surveyed pre and post implementation of the Chart Card program, and emergency department staff was surveyed about familiarity with SCD treatment protocols. Patient satisfaction with emergency department care and efficacy in health care increased post Chart Card implementation. Providers valued immediate access to patient information and SCD treatment guidelines. The technology has potential for application in the treatment of other illnesses in other settings.

  17. Design of smart home gateway based on Wi-Fi and ZigBee

    NASA Astrophysics Data System (ADS)

    Li, Yang

    2018-04-01

    With the increasing demand for home lifestyle, the traditional smart home products have been unable to meet the needs of users. Aim at the complex wiring, high cost and difficult operation problems of traditional smart home system, this paper designs a home gateway for smart home system based on Wi-Fi and ZigBee. This paper first gives a smart home system architecture base on cloud server, Wi-Fi and ZigBee. This architecture enables users to access the smart home system remotely from Internet through the cloud server or through Wi-Fi at home. It also offers the flexibility and low cost of ZigBee wireless networking for home equipment. This paper analyzes the functional requirements of the home gateway, and designs a modular hardware architecture based on the RT5350 wireless gateway module and the CC2530 ZigBee coordinator module. Also designs the software of the home gateway, including the gateway master program and the ZigBee coordinator program. Finally, the smart home system and home gateway are tested in two kinds of network environments, internal network and external network. The test results show that the designed home gateway can meet the requirements, support remote and local access, support multi-user, support information security technology, and can timely report equipment status information.

  18. 75 FR 81721 - Debit Card Interchange Fees and Routing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-28

    ... may be processed and from inhibiting the ability of a merchant to direct the routing of an electronic... alternatives, the issuers and networks would be prohibited from inhibiting a merchant's ability to direct the... restrictions, card-issuing arrangements, and incentive programs for both merchants and issuers. Interested...

  19. Army Needs to Identify Government Purchase Card High-Risk Transactions

    DTIC Science & Technology

    2012-01-20

    Purchase Card Program Data Mining Process Needs Improvement 11...Mining Process Needs Improvement The 17 transactions that were noncompliant occurred because cardholders ignored the GPC business rules so the...Scope and Methodology 16 Use of Computer- Processed Data 16 Use of Technical Assistance 17 Prior Coverage

  20. Adaptive Interventions and SMART Designs: Application to child behavior research in a community setting

    PubMed Central

    Kidwell, Kelley M.; Hyde, Luke W.

    2016-01-01

    Heterogeneity between and within people necessitates the need for sequential personalized interventions to optimize individual outcomes. Personalized or adaptive interventions (AIs) are relevant for diseases and maladaptive behavioral trajectories when one intervention is not curative and success of a subsequent intervention may depend on individual characteristics or response. AIs may be applied to medical settings and to investigate best prevention, education, and community-based practices. AIs can begin with low-cost or low-burden interventions and followed with intensified or alternative interventions for those who need it most. AIs that guide practice over the course of a disease, program, or school year can be investigated through sequential multiple assignment randomized trials (SMARTs). To promote the use of SMARTs, we provide a hypothetical SMART in a Head Start program to address child behavior problems. We describe the advantages and limitations of SMARTs, particularly as they may be applied to the field of evaluation. PMID:28239254

  1. 2017 SmartWay Logistics Tool Demonstration

    EPA Pesticide Factsheets

    This EPA presentation provides information on the SmartWay Logistics Carrier Tool: its background and development, participation in the program, application process, emission metrics, tool demonstration, data collection, and schedule for 2017.

  2. 2017 SmartWay Shipper Tool Demonstration

    EPA Pesticide Factsheets

    This EPA presentation provides information on the SmartWay Logistics Carrier Tool: its background and development, participation in the program, application process, emission metrics, tool demonstration, data collection, and schedule for 2017.

  3. The New, Improved 2016 SmartWay Truck Carrier Tool

    EPA Pesticide Factsheets

    This EPA presentation provides information on the SmartWay Transport Partnership Program, including key information about EPA, Partners' roles, benefits, tools, partner recognition, awards, and brand value. Transcript available

  4. Using the CDC Worksite Health ScoreCard to Assess Employer Health Promotion Efforts: A Case Study at Johns Hopkins Medicine.

    PubMed

    Safeer, Richard; Bowen, Wendy; Maung, Zaw; Lucik, Meg

    2018-02-01

    The aim of this study was to determine whether the Centers for Disease Control and Prevention Worksite Health ScoreCard (ScoreCard) is an effective vehicle for measuring workplace health promotion programs and causing change in a large employer with multiple entities defined by different physical environments and types of workers. Johns Hopkins Medicine (JHM) representatives completed a baseline ScoreCard for each of their entities. In the subsequent year, improvement of the ScoreCard was tied to leadership performance evaluation. JHM year over year scores were analyzed, along with comparisons to national benchmarks. Eleven of the 12 JHM entities improved their overall score from year one to year two and the JHM enterprise surpassed national benchmarks in year two. Organizations can use the ScoreCard as an effective measurement tool and as a method to improve the number of evidenced-based health promotion strategies provided to their employees.

  5. 2017 SmartWay Multimodal Carrier Tool Demonstration

    EPA Pesticide Factsheets

    This EPA presentation provides information on the SmartWay Multimodal Carrier Tool: its background and development, participation in the program, application process, emission metrics, tool demonstration, data collection, and schedule for 2017.

  6. A School-Based Brand Marketing Program's Adherence to Federal Nutrition Criteria.

    PubMed

    Moran, Alyssa J; Rimm, Eric B; Taveras, Elsie M

    2017-11-01

    The Healthy, Hunger-Free Kids Act of 2010 gave the U.S. Department of Agriculture authority to regulate school wellness policies, which include nutritional standards for foods advertised in schools. Brand marketing programs, which encourage students to purchase a company's products in exchange for money or rewards, were not explicitly prohibited. This study assesses the nutritional quality of products participating in "Box Tops for Education" ("Box Tops"), one of the largest national brand marketing programs in schools. Participating foods and beverages were obtained from the Box Tops product list and matched to nutrient information and ingredients from manufacturer websites in 2016 (N=949). Products were categorized as beverages (n=13); entrees (n=171); snacks (n=677); or fruits and vegetables exempt from the Smart Snacks in School Standards ("Smart Snacks" standards) (n=88) to assess the percentage that met the Smart Snacks standards. Of the foods participating in the Box Tops program, 69% of beverages, 26% of entrees, and 23% of snacks met the Smart Snacks standards. Most foods met the standards for trans fats (98%); calories (90%); and sugar (89%); but fewer met the requirements for sodium (60%). Noncompliant snacks contained more than twice the recommended sodium (mean=420 mg, SD=191 mg) and percent calories from saturated fat (mean=22%, SD=13%). Fewer than one third of Box Tops foods met the Smart Snacks standards. Schools should consider whether the benefit of participation outweighs the harm of exposing kids to unhealthful marketing. Alternatively, schools could opt not to participate unless companies limit redeemable products to household items or healthful options meeting the Smart Snacks standards. Copyright © 2017 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  7. A computer program for simulating salinity loads in streams

    USGS Publications Warehouse

    Glover, Kent C.

    1978-01-01

    A FORTRAN IV program that simulates salinity loads in streams is described. Daily values of stream-discharge in cubic feet per second, or stream-discharge and specific conductance in micromhos, are used to estimate daily loads in tons by one of five available methods. The loads are then summarized by computing either total and mean monthly loads or various statistics for each calendar day. Results are output in tabular and, if requested, punch card format. Under selection of appropriate methods for estimating and summarizing daily loads is provided through the coding of program control cards. The program is designed to interface directly with data retrieved from the U.S. Geological Survey WATSTORE Daily Values File. (Woodard-USGS)

  8. Societal costs versus savings from wild-card patent extension legislation to spur critically needed antibiotic development.

    PubMed

    Spellberg, B; Miller, L G; Kuo, M N; Bradley, J; Scheld, W M; Edwards, J E

    2007-06-01

    Over the last two decades, an alarming rise in infections caused by antibiotic-resistant microbes has been paralleled by an equally alarming decline in the development of new antibiotics to deal with the threat. In response to this brewing "perfect storm" of infectious diseases, the Infectious Diseases Society of America (IDSA) has released a white paper that proposes incentives to stimulate critically needed antibiotic development by pharmaceutical companies. A cornerstone of the recommendations is establishment of a "wild-card patent extension" program. This program would allow a company receiving United States (US) Food and Drug Administration (FDA) approval for a new anti-infective agent targeting a drug-resistant pathogen to extend the patent on a drug within their active portfolio. However, wild-card patent extension legislation is highly controversial due to concerns regarding its societal cost. We performed a systematic literature review to estimate the societal cost of wild-card patent extension compared to the savings resulting from the availability of one new antibiotic to treat multi-drug-resistant Pseudomonas aeruginosa. We conservatively estimate that wild-card patent extension applied to one new antibiotic would cost $7.7 billion over the first 2 years, and $3.9 billion over the next 18 years. Thus, even if the new antibiotic abrogated only 50% of the annual societal cost of multidrug-resistant P. aeruginosa (estimated $2.7 billion), wild-card patent extension would be cost neutral by 10 years after approval of the new antibiotic, and would save society approximately $4.6 billion by 20 years after approval. Wild-card patent extension appears to be a cost-effective strategy to spur anti-infective development. Although our analysis is limited by the precision of published data, our model employed conservative assumptions.

  9. Active coatings technologies for tailorable military coating systems

    NASA Astrophysics Data System (ADS)

    Zunino, J. L., III

    2007-04-01

    The main objective of the U.S. Army's Active Coatings Technologies Program is to develop technologies that can be used in combination to tailor coatings for utilization on Army Materiel. The Active Coatings Technologies Program, ACT, is divided into several thrusts, including the Smart Coatings Materiel Program, Munitions Coatings Technologies, Active Sensor packages, Systems Health Monitoring, Novel Technology Development, as well as other advanced technologies. The goal of the ACT Program is to conduct research leading to the development of multiple coatings systems for use on various military platforms, incorporating unique properties such as self repair, selective removal, corrosion resistance, sensing, ability to modify coatings' physical properties, colorizing, and alerting logistics staff when tanks or weaponry require more extensive repair. A partnership between the U.S. Army Corrosion Office at Picatinny Arsenal, NJ along with researchers at the New Jersey Institute of Technology, NJ, Clemson University, SC, University of New Hampshire, NH, and University of Massachusetts (Lowell), MA, are developing the next generation of Smart Coatings Materiel via novel technologies such as nanotechnology, Micro-electromechanical Systems (MEMS), meta-materials, flexible electronics, electrochromics, electroluminescence, etc. This paper will provide the reader with an overview of the Active Coatings Technologies Program, including an update of the on-going Smart Coatings Materiel Program, its progress thus far, description of the prototype Smart Coatings Systems and research tasks as well as future nanotechnology concepts, and applications for the Department of Defense.

  10. Key Principles in Providing Integrated Behavioral Health Services for Young Children and Their Families: The "Starting Early Starting Smart" Experience.

    ERIC Educational Resources Information Center

    Hanson, Lori, Comp.; Deere, David, Comp.; Lee, Carol Amundson, Comp.; Lewin, Amy, Comp.; Seval, Carolyn, Comp.

    This paper describes the Starting Early Starting Smart (SESS) project, an early intervention program that has been developed in the context of the national, multi-site program and evaluation. The emphasis in SESS is on the integration of behavioral health services into easily accessible, non-threatening settings where caregivers naturally and…

  11. Leveraging mobile smart devices to improve interprofessional communications in inpatient practice setting: A literature review.

    PubMed

    Aungst, Timothy Dy; Belliveau, Paul

    2015-01-01

    As mobile smart device use has increased in society, the healthcare community has begun using these devices for communication among professionals in practice settings. The purpose of this review is to describe primary literature which reports on the experiences with interprofessional healthcare communication via mobile smart devices. Based on these findings, this review also addresses how these devices may be utilized to facilitate interprofessional education (IPE) in health professions education programs. The literature search revealed limited assessments of mobile smart device use in clinical practice settings. In available reports, communication with mobile smart devices was perceived as more effective and faster among interdisciplinary members. Notable drawbacks included discrepancies in the urgency labeling of messages, increased interruptions associated with constant accessibility to team members, and professionalism breakdowns. Recently developed interprofessional competencies include an emphasis on ensuring that health profession students can effectively communicate on interprofessional teams. With the increasing reliance on mobile smart devices in the absence of robust benefit and risk assessments on their use in clinical practice settings, use of these devices may be leveraged to facilitate IPE activities in health education professions programs while simultaneously educating students on their proper use in patient care settings.

  12. How SmartWay Advances Sustainable Transportation Supply Chains

    EPA Pesticide Factsheets

    This page provides information on how the SmartWay program has achieved reductions in freight transportation-related greenhouse gas emissions and how it will continue to do so with its Vision 2020 strategies.

  13. SMART on FHIR: a standards-based, interoperable apps platform for electronic health records

    PubMed Central

    Kreda, David A; Mandl, Kenneth D; Kohane, Isaac S; Ramoni, Rachel B

    2016-01-01

    Objective In early 2010, Harvard Medical School and Boston Children’s Hospital began an interoperability project with the distinctive goal of developing a platform to enable medical applications to be written once and run unmodified across different healthcare IT systems. The project was called Substitutable Medical Applications and Reusable Technologies (SMART). Methods We adopted contemporary web standards for application programming interface transport, authorization, and user interface, and standard medical terminologies for coded data. In our initial design, we created our own openly licensed clinical data models to enforce consistency and simplicity. During the second half of 2013, we updated SMART to take advantage of the clinical data models and the application-programming interface described in a new, openly licensed Health Level Seven draft standard called Fast Health Interoperability Resources (FHIR). Signaling our adoption of the emerging FHIR standard, we called the new platform SMART on FHIR. Results We introduced the SMART on FHIR platform with a demonstration that included several commercial healthcare IT vendors and app developers showcasing prototypes at the Health Information Management Systems Society conference in February 2014. This established the feasibility of SMART on FHIR, while highlighting the need for commonly accepted pragmatic constraints on the base FHIR specification. Conclusion In this paper, we describe the creation of SMART on FHIR, relate the experience of the vendors and developers who built SMART on FHIR prototypes, and discuss some challenges in going from early industry prototyping to industry-wide production use. PMID:26911829

  14. Thin Film Li Ion Microbatteries for NASA Applications

    NASA Technical Reports Server (NTRS)

    West, W. C.; Ratnakumar, B. V.; Brandon, E.; Blosiu, J. O.; Surampudi, S.

    1999-01-01

    Rechargeable thin film microbatteries have recently become the topic of widespread research for use in low power applications such as battery-backed CMOS memory, miniaturized implantable medical devices and smart cards. In particular, the Center for Integrated Space Microsystems (CISM) at NASA's Jet Propulsion Laboratory has interest in applying this technology for secondary power systems in miniaturized satellites, microsensors, microactuators and other remote MEMS applications. The general requirements of the microbatteries for these applications are high specific energy, wide range of temperature stability. low self-discharge rate, and flexibility of cell design. The thin film Li ion materials system using LiCoO2(LiPO(x)N(1-x))SnO is expected to fulfill these requirements.

  15. Spilt milk: an inter-sectoral partnership that failed to advance milk security for low-income lone mothers in Nova Scotia, Canada.

    PubMed

    McIntyre, Lynn; Glanville, N Theresa; Hilchie-Pye, Andrea

    2011-03-01

    Canadian agricultural policy supports higher milk prices. Consequently, poor families lack sufficient funds to purchase adequate quantities of milk. Low-income lone mothers in the Canadian province of Nova Scotia suggested their preferred strategies for improved access to milk. We then built inter-sectoral support for a policy intervention to address their recommendations. Our research-to-action process led to a policy dialogue focusing on an electronic smart card that would permit the delivery of lower-priced milk to poor households. While all agreed that milk insecurity was an important issue, the project ultimately failed because of the entrenched positions of influential stakeholder groups.

  16. HyperCard Monitor System.

    ERIC Educational Resources Information Center

    Harris, Julian; Maurer, Hermann

    An investigation into high level event monitoring within the scope of a well-known multimedia application, HyperCard--a program on the Macintosh computer, is carried out. A monitoring system is defined as a system which automatically monitors usage of some activity and gathers statistics based on what is has observed. Monitor systems can give the…

  17. Understanding the Cost and Quality of Military-Related Education Benefit Programs

    DTIC Science & Technology

    2013-01-01

    2002; Stanley, 2003). Evidence also suggests that a similar pro- gram in Canada led to large increases in college attainment ( Lemieux and Card, 2001...U.S. Government Accountability Office, GAO-10-948T, 2010. Lemieux , Thomas, and David Card, “Education, Earnings, and the Canadian GI Bill,” The

  18. Market Rummy. Technical Note No. 4.

    ERIC Educational Resources Information Center

    Gunter, Jock

    A card game, "Mercado," or Market Rummy, designed to teach basic market skills to rural Ecuadorians is described. Two to five people can play the game, which is presently used in night community meetings and in the educational program in coastal cooperatives. The game consists of two decks of cards: one represents money, the other…

  19. 75 FR 42116 - 60-Day Notice of Intention To Request Clearance of Collection of Information; Opportunity for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-20

    ... develop goals to improve program effectiveness and public accountability and to measure performance related to these goals. The Visitor Survey Card (VSC) project measures performance toward those goals through a short visitor survey card. The project is an element of the NPS Strategic Plan and the...

  20. 38 CFR 1.467 - Restrictions on the use of identification cards and public signs.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Immunodeficiency Virus (hiv), Or Sickle Cell Anemia § 1.467 Restrictions on the use of identification cards and... abuse, alcoholism or alcohol abuse, HIV infection, or sickle cell anemia treatment program. A facility... alcohol abuse, HIV infection, or sickle cell anemia. (b) Treatment locations should not be identified by...

Top