Sample records for smart card based

  1. Design and implementation of a smart card based healthcare information system.

    PubMed

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.

  2. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    NASA Astrophysics Data System (ADS)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  3. Smart Cards and remote entrusting

    NASA Astrophysics Data System (ADS)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  4. Implementing a High-Assurance Smart-Card OS

    NASA Astrophysics Data System (ADS)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  5. Optical smart card using semipassive communication.

    PubMed

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  6. Optical smart card using semipassive communication

    NASA Astrophysics Data System (ADS)

    Glaser, I.; Green, Shlomo; Dimkov, Ilan

    2006-03-01

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  7. Ridership impacts of South Florida's EASY smart card.

    DOT National Transportation Integrated Search

    2013-07-01

    Smart card-based Automated Fare Collection Systems (AFCS) are being increasingly deployed in transit systems across the US. Miami-Dade Transit (MDT) has recently deployed such a system branded as the EASY Card. The South Florida Regional Transportati...

  8. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    NASA Astrophysics Data System (ADS)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  9. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  10. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  11. Playing the Smart Card.

    ERIC Educational Resources Information Center

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…

  12. Biometrics and smart cards combine to offer high security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. Thesemore » Cards will function only when they are being used by the authorized individuals to whom they are issued.« less

  13. [New electronic data carriers in Bosnia-Herzegovina].

    PubMed

    Masić, I; Pandza, H; Knezević, Z; Toromanović, S

    1999-01-01

    Bosnia and Herzegovina has been developing new Health Care System based on Electronic Registration Card. Developing countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transfer, searching and protection of data using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Both technologies offer the advantages and disadvantages. Three types of electronic card are currently in use: Hybrid Card, Smart Card and Laser Card. Hybrid Card offers characteristics of both Smart Card and Laser Card. The differences among these cards, such as a capacity, total price, price per byte, security system are discussed here. The dilemma is, which card should be used as a data carrier. The Electronic Family Registration Card is a question of strategic interest for B&H, but also a big investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.

  14. Telematics and smart cards in integrated health information system.

    PubMed

    Sicurello, F; Nicolosi, A

    1997-01-01

    Telematics and information technology are the base on which it will be possible to build an integrated health information system to support population and improve their quality of life. This system should be based on record linkage of all data based on the interactions of the patients with the health structures, such as general practitioners, specialists, health institutes and hospitals, pharmacies, etc. The record linkage can provide the connection and integration of various records, thanks to the use of telematic technology (either urban or geographical local networks, such as the Internet) and electronic data cards. Particular emphasis should be placed on the introduction of smart cards, such as portable health cards, which will contain a standardized data set and will be sufficient to access different databases found in various health services. The inter-operability of the social-health records (including multimedia types) and the smart cards (which are one of the most important prerequisites for the homogenization and wide diffusion of these cards at an European level) should be strongly taken into consideration. In this framework a project is going to be developed aiming towards the integration of various data bases distributed territorially, from the reading of the software and the updating of the smart cards to the complete management of the patients' evaluation records, to the quality of the services offered and to the health planning. The applications developed will support epidemiological investigation software and data analysis. The inter-connection of all the databases of the various structures involved will take place through a coordination center, the most important system of which we will call "record linkage" or "integrated database". Smart cards will be distributed to a sample group of possible users and the necessary smart card management tools will be installed in all the structures involved. All the final users (the patients) in the whole network of services involved will be monitored for the duration of the project. The system users will also include general practitioners, social workers, physicians, health operators, pharmacists, laboratory workers and administrative personnel of the municipality and of the health structures concerned.

  15. Managing medical and insurance information through a smart-card-based information system.

    PubMed

    Lambrinoudakis, C; Gritzalis, S

    2000-08-01

    The continuously increased mobility of patients and doctors, in conjunction with the existence of medical groups consisting of private doctors, general practitioners, hospitals, medical centers, and insurance companies, pose significant difficulties on the management of patients' medical data. Inevitably this affects the quality of the health care services provided. The evolving smart card technology can be utilized for the implementation of a secure portable electronic medical record, carried by the patient herself/himself. In addition to the medical data, insurance information can be stored in the smart card thus facilitating the creation of an "intelligent system" supporting the efficient management of patient's data. In this paper we present the main architectural and functional characteristics of such a system. We also highlight how the security features offered by smart cards can be exploited in order to ensure confidentiality and integrity of the medical data stored in the patient cards.

  16. Imaging standards for smart cards

    NASA Astrophysics Data System (ADS)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-02-01

    "Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  17. Imaging standards for smart cards

    NASA Astrophysics Data System (ADS)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-01-01

    'Smart cards' are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper reviews imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper concludes with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  18. Prevention of Information Leakage by Photo-Coupling in Smart Card

    NASA Astrophysics Data System (ADS)

    Shen, Sung-Shiou; Chiu, Jung-Hui

    Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.

  19. Smart cards: a specific application in the hospital.

    PubMed

    Güler, I; Zengin, R M; Sönmez, M

    1998-12-01

    Computers have the ability to process and access tremendous amounts of information in our daily lives. But, now, individuals have this ability by carrying a smart card in their own wallets. These cards provide us the versatility, power, and security of computers. This study begins with a short description of smart cards and their advantages. Then, an electronic circuit that is designed for healthcare application in hospitals is introduced. This circuit functions as a smart card holder identifier, access controller for hospital doors and also can be used as a smart card reader/writer. Design steps of this electronic circuit, operation principles, serial communication with P.C., and the software are examined. Finally a complete access control network for hospital doors that functions with smart cards is discussed.

  20. Using smart card technology to monitor the eating habits of children in a school cafeteria: 1. Developing and validating the methodology.

    PubMed

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The aim of the study was to test the feasibility of using smart card technology to track the eating behaviours of nearly a thousand children in a school cafeteria. Within a large boys' school a smart card based system was developed that was capable of providing a full electronic audit of all the individual transactions that occurred within the cafeteria. This dataset was interfaced to an electronic version of the McCance and Widdowson composition of foods dataset. The accuracy of the smart card generated data and the influence of portion size and wastage were determined empirically during two 5-day trials. The smart card system created succeeded in generating precise data on the food choices made by hundreds of children over an indefinite time period. The data was expanded to include a full nutrient analysis of all the foods chosen. The accuracy of this information was only constrained by the limitations facing all food composition research, e.g. variations in recipes, portion sizes, cooking practices, etc. Although technically possible to introduce wastage correction factors into the software, thereby providing information upon foods consumed, this was not seen as universally practical. The study demonstrated the power of smart card technology for monitoring food/nutrient choice over limitless time in environments such as school cafeterias. The strengths, limitations and applications of such technology are discussed.

  1. Location Based Application Availability

    NASA Astrophysics Data System (ADS)

    Naeem Akram, Raja; Markantonakis, Konstantinos; Mayes, Keith

    Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a single device. This paper builds onto the NFC initiative and avoids the smart card ownership issues that hinder the adoption of such devices. The proposal integrates the Global Positioning System with the NFC in mobile phones to provide a ubiquitously and flexible service access model.

  2. Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials

    NASA Astrophysics Data System (ADS)

    Park, Jun-Cheol

    User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.

  3. A microprocessor card software server to support the Quebec health microprocessor card project.

    PubMed

    Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P

    1995-01-01

    The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.

  4. Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits

    NASA Astrophysics Data System (ADS)

    Bußmeyer, Daniel; Gröbert, Felix; Schwenk, Jörg; Wegener, Christoph

    Due to recent attacks on online banking systems and consequent soaring losses through fraud, different methods have been developed to ensure a secure connection between a bank and its customers. One method is the inclusion of smart card readers into these schemes, which come along with different benefits, e.g., convenience and costs, and endangerments, especially on the security side.

  5. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    PubMed

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  6. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    PubMed Central

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-01-01

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331

  7. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  8. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  9. Smart Cards for Transit : Multi-Use Remotely Interrogated Stored-Data Cards for Fare and Toll Payment

    DOT National Transportation Integrated Search

    1995-04-01

    This project developed relevant information on existing and future, stored readable/writable data card technology for fare and toll payments. The project supports the FTA objective of developing a plan for a common standard card-based fare payment sy...

  10. Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC)

    NASA Astrophysics Data System (ADS)

    Ratnadewi; Pramono Adhie, Roy; Hutama, Yonatan; Saleh Ahmar, A.; Setiawan, M. I.

    2018-01-01

    Cryptography is a method used to create secure communication by manipulating sent messages during the communication occurred so only intended party that can know the content of that messages. Some of the most commonly used cryptography methods to protect sent messages, especially in the form of text, are DES and 3DES cryptography method. This research will explain the DES and 3DES cryptography method and its use for stored data security in smart cards that working in the NFC-based communication system. Several things that will be explained in this research is the ways of working of DES and 3DES cryptography method in doing the protection process of a data and software engineering through the creation of application using C++ programming language to realize and test the performance of DES and 3DES cryptography method in encrypted data writing process to smart cards and decrypted data reading process from smart cards. The execution time of the entering and the reading process data using a smart card DES cryptography method is faster than using 3DES cryptography.

  11. An mHealth Framework to Improve Birth Outcomes in Benue State, Nigeria: A Study Protocol.

    PubMed

    Ezeanolue, Echezona Edozie; Gbadamosi, Semiu Olatunde; Olawepo, John Olajide; Iwelunmor, Juliet; Sarpong, Daniel; Eze, Chuka; Ogidi, Amaka; Patel, Dina; Onoka, Chima

    2017-05-26

    The unprecedented coverage of mobile technology across the globe has led to an increase in the use of mobile health apps and related strategies to make health information available at the point of care. These strategies have the potential to improve birth outcomes, but are limited by the availability of Internet services, especially in resource-limited settings such as Nigeria. Our primary objective is to determine the feasibility of developing an integrated mobile health platform that is able to collect data from community-based programs, embed collected data into a smart card, and read the smart card using a mobile phone-based app without the need for Internet access. Our secondary objectives are to determine (1) the acceptability of the smart card among pregnant women and (2) the usability of the smart card by pregnant women and health facilities in rural Nigeria. We will leverage existing technology to develop a platform that integrates a database, smart card technology, and a mobile phone-based app to read the smart cards. We will recruit 300 pregnant women with one of the three conditions-HIV, hepatitis B virus infection, and sickle cell trait or disease-and four health facilities in their community. We will use Glasgow's Reach, Effectiveness, Adoption, Implementation, and Maintenance framework as a guide to assess the implementation, acceptability, and usability of the mHealth platform. We have recruited four health facilities and 300 pregnant women with at least one of the eligible conditions. Over the course of 3 months, we will complete the development of the mobile health platform and each participant will be offered a smart card; staff in each health facility will receive training on the use of the mobile health platform. Findings from this study could offer a new approach to making health data from pregnant women available at the point of delivery without the need for an Internet connection. This would allow clinicians to implement evidence-based interventions in real time to improve health outcomes. ClinicalTrials.gov NCT03027258; https://clinicaltrials.gov/ct2/show/NCT03027258 (Archived by WebCite at http://www.webcitation.org/6owR2D0kE). ©Echezona Edozie Ezeanolue, Semiu Olatunde Gbadamosi, John Olajide Olawepo, Juliet Iwelunmor, Daniel Sarpong, Chuka Eze, Amaka Ogidi, Dina Patel, Chima Onoka. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 26.05.2017.

  12. From Secure Memories to Smart Card Security

    NASA Astrophysics Data System (ADS)

    Handschuh, Helena; Trichina, Elena

    Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.

  13. An end-to-end secure patient information access card system.

    PubMed

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  14. A Smart City Application: A Fully Controlled Street Lighting Isle Based on Raspberry-Pi Card, a ZigBee Sensor Network and WiMAX

    PubMed Central

    Leccese, Fabio; Cagnetti, Marco; Trinca, Daniele

    2014-01-01

    A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field. PMID:25529206

  15. A smart city application: a fully controlled street lighting isle based on Raspberry-Pi card, a ZigBee sensor network and WiMAX.

    PubMed

    Leccese, Fabio; Cagnetti, Marco; Trinca, Daniele

    2014-12-18

    A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field.

  16. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  17. Smart cards--the key to trustworthy health information systems.

    PubMed Central

    Neame, R.

    1997-01-01

    Some 20 years after they were first developed, "smart cards" are set to play a crucial part in healthcare systems. Last year about a billion were supplied, mainly for use in the financial sector, but their special features make them of particular strategic importance for the health sector, where they offer a ready made solution to some key problems of security and confidentiality. This article outlines what smart cards are and why they are so important in managing health information. I discuss some of the unique features of smart cards that are of special importance in the development of secure and trustworthy health information systems. Smart cards would enable individuals' identities to be authenticated and communications to be secured and would provide the mechanisms for implementing strong security, differential access to data, and definitive audit trails. Patient cards can also with complete security carry personal details, data on current health problems and medications, emergency care data, and pointers to where medical records for the patient can be found. Provider cards can in addition carry authorisations and information on computer set up. PMID:9055719

  18. Authentication techniques for smart cards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thoroughmore » understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.« less

  19. Emerging Technology for School Security

    ERIC Educational Resources Information Center

    Doss, Kevin T.

    2012-01-01

    Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…

  20. Mobile Language Study

    DTIC Science & Technology

    2003-08-18

    Language Study 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5d. TASK NUMBER 6. AUTHOR(S) Professor Mads Dam, Pablo Giambiagi 5e...Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39-18 SPC 01-4025 Mobile Language Study Final...smart card applications. Smart cards can be programmed using general-purpose languages ; but because of their limited resources, smart card programs

  1. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S

    2015-11-01

    In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.

  2. Signal processing for smart cards

    NASA Astrophysics Data System (ADS)

    Quisquater, Jean-Jacques; Samyde, David

    2003-06-01

    In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight the same results can be obtained with only one smart card, but this idea is not completely true because the statistical properties of the signal are not the same. As the two smart cards are submitted to the same external noise during the measurement, it is more easy to reduce the influence of perturbations. This paper shows the importance of accurate countermeasures against differential analysis.

  3. Design issues for semi-passive optical communication devices

    NASA Astrophysics Data System (ADS)

    Glaser, I.

    2007-09-01

    Optical smart cards are devices containing a retro-reflector, light modulator, and some computing and data storage capabilities to affect semi-passive communication. They do not produce light; instead they modulate and send back light received from a stationary unit. These devices can replace contact-based smart cards as well as RF based ones for applications ranging from identification to transmitting and validating data. Since their transmission is essentially focused on the receiving unit, they are harder to eavesdrop than RF devices, yet need no physical contact or alignment. In this paper we explore optical design issues of these devices and estimate their optical behavior. Specifically, we analyze how these compact devices can be optimized for selected application profiles. Some of the key parameters addressed are effective light efficiency (how much modulated signal can be received by the stationary unit given the amount of light it transmits), range of tilt angles (angle between device surface normal to the line connecting the optical smart card with the stationary unit) through which the device would be effective, and power requirements of the semi-passive unit. In addition, issues concerning compact packaging of this device are discussed. Finally, results of the analysis are employed to produce a comparison of achievable capabilities of these optical smart cards, as opposed to alternative devices, and discuss potential applications were they can be best utilized.

  4. Stream processing health card application.

    PubMed

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  5. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Baldridge, Tim

    2005-01-01

    The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.

  6. Adoption of smart cards in the medical sector: the Canadian experience.

    PubMed

    Auber, B A; Hamel, G

    2001-10-01

    This research evaluates the factors influencing the adoption of smart cards in the medical sector (a smart card has a micro-processor containing information about the patient: identification, emergency data (allergies, blood type, etc.), vaccination, drugs used, and the general medical record). This research was conducted after a pilot study designed to evaluate the use of such smart cards. Two hundred and ninety-nine professionals, along with 7248 clients, used the smart card for a year. The targeted population included mostly elderly people, infants, and pregnant women (the most intensive users of health care services). Following this pilot study, two surveys were conducted, together with numerous interviews, to assess the factors influencing adoption of the technology. A general picture emerged. indicating that although the new card is well-perceived by individuals, tangible benefits must be available to motivate professionals and clients to adopt the technology. Results show that the fundamental dimension that needs to be assessed before massive diffusion is the relative advantage to the professional. The system must provide a direct benefit to its user. The relative advantage of the system for the professional is directly linked to the obligation for the client to use the card. The system is beneficial for the professional only if the information on the card is complete. Technical adequacy is a necessary but not sufficient condition for adoption.

  7. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.

  8. Using smart card technology to prevent sales of alcohol to underage persons

    DOT National Transportation Integrated Search

    2001-07-01

    This report documents the results of a demonstration and evaluation project to examine the effectiveness of smart card technology (i.e., magnetic stripe on the driver's license and a card reader system) as a means of providing alcohol retailers with ...

  9. Smart Icon Cards

    ERIC Educational Resources Information Center

    Dunbar, Laura

    2015-01-01

    Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."

  10. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    PubMed

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.

  11. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  12. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  13. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  14. A more secure anonymous user authentication scheme for the integrated EPR information system.

    PubMed

    Wen, Fengtong

    2014-05-01

    Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.

  15. Network security system for health and medical information using smart IC card

    NASA Astrophysics Data System (ADS)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  16. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  17. 29 CFR 4.123 - Administrative limitations, variances, tolerances, and exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... servicing of cards (including credit cards, debit cards, purchase cards, smart cards, and similar card... military personnel in buying and selling homes (which shall not include actual moving or storage of...

  18. Health smart cards: differing perceptions of emergency department patients and staff.

    PubMed

    Mohd Rosli, Reizal; Taylor, David McD; Knott, Jonathan C; Das, Atandrila; Dent, Andrew W

    2009-02-01

    An analytical, cross-sectional survey of 270 emergency department patients and 92 staff undertaken in three tertiary referral hospital emergency departments was completed to compare the perceptions of patients and staff regarding the use of health smart cards containing patient medical records. The study recorded data on a range of health smart card issues including awareness, privacy, confidentiality, security, advantages and disadvantages, and willingness to use. A significantly higher proportion of staff had heard of the card. The perceived disadvantages reported by patients and staff were, overall, significantly different, with the staff reporting more disadvantages. A significantly higher proportion of patients believed that they should choose what information is on the card and who should have access to the information. Patients were more conservative regarding what information should be included, but staff were more conservative regarding who should have access to the information. Significantly fewer staff believed that patients could reliably handle the cards. Overall, however, the cards were considered acceptable and useful, and their introduction would be supported.

  19. Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.

  20. Health innovation for patient safety improvement.

    PubMed

    Sellappans, Renukha; Chua, Siew Siang; Tajuddin, Nur Amani Ahmad; Mei Lai, Pauline Siew

    2013-01-01

    Medication error has been identified as a major factor affecting patient safety. Many innovative efforts such as Computerised Physician Order Entry (CPOE), a Pharmacy Information System, automated dispensing machines and Point of Administration Systems have been carried out with the aim of improving medication safety. However, areas remain that require urgent attention. One main area will be the lack of continuity of care due to the breakdown of communication between multiple healthcare providers. Solutions may include consideration of "health smart cards" that carry vital patient medical information in the form of a "credit card" or use of the Malaysian identification card. However, costs and technical aspects associated with the implementation of this health smart card will be a significant barrier. Security and confidentiality, on the other hand, are expected to be of primary concern to patients. Challenges associated with the implementation of a health smart card might include physician buy-in for use in his or her everyday practice. Training and technical support should also be available to ensure the smooth implementation of this system. Despite these challenges, implementation of a health smart card moves us closer to seamless care in our country, thereby increasing the productivity and quality of healthcare.

  1. DIABCARD a smart card for patients with chronic diseases.

    PubMed

    Engelbrecht, R; Hildebrand, C

    1997-01-01

    Within the European Union-sponsored project DIABCARD, the core of a chip-card-based medical information system for patients with chronic diseases, exemplified on diabetes mellitus, has been developed. The long-term goal of the project is to improve the medical record and the quality of care for patients with chronic diseases. The basic idea is to have a portable electronic medical record on a smart card. This will improve the communication between the different healthcare personnel and between different institutions and, at the same time, promote shared care. The DIABCARD chip-card-based medical information system will offer controlled access to the necessary and up-to-date patient record to everyone involved in the patient's treatment, and it will help reduce the constantly rising healthcare expenditure. The system first was implemented in a small version. The system architecture contains hardware, software, and orgware. It considers especially the memory of the chip card, the processor, the data structure, security functions, the operating system on the chip card, the interface between the chip card and the application, and various application areas. The DIABCARD dataset was defined via an information model, which describes the different communication processes, via acknowledged diabetes datasets and medical scenarios. It includes, among others, emergency data, data for quality assurance, and data for blood glucose self-monitoring. The first prototype has been developed, and a pilot was run for 3 months.

  2. ORANGES evaluation discussion group process

    DOT National Transportation Integrated Search

    2003-03-24

    This report describes and documents the process and methodology to be used to conduct a series of before and after discussion groups with smart card holders and participating agency employees as part of the ORANGES multiple purpose smart card Field O...

  3. 48 CFR 532.7002 - Solicitation requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    .... Identify the card brand(s) under the GSA SmartPay program that may be used to make payments under the... the card brand(s) under the GSA SmartPay program that may be used to make payments under the contract...

  4. Ridership impacts of South Florida's EASY smart card : [summary].

    DOT National Transportation Integrated Search

    2013-07-01

    Transit agencies across the U.S. increasingly are replacing electronic fare reading systems with Advanced Fare Collection (AFC) or smart card systems. In 2009, Miami-Dade Transit (MDT) was the first Florida transit agency to deploy AFC, branded...

  5. The Security Email Based on Smart Card

    NASA Astrophysics Data System (ADS)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  6. Safe pill-dispensing.

    PubMed

    Testa, Massimiliano; Pollard, John

    2007-01-01

    Each patient is supplied with a smart-card containing a Radio Frequency IDentification (RFID) chip storing a unique identification code. The patient places the Smart-card on a pill-dispenser unit containing an RFID reader. The RFID chip is read and the code sent to a Base-station via a wireless Bluetooth link. A database containing both patient details and treatment information is queried at the Base-station using the RFID as the search key. The patient's treatment data (i.e., drug names, quantities, time, etc.) are retrieved and sent back to the pill-dispenser unit via Bluetooth. Appropriate quantities of the required medications are automatically dispensed, unless the patient has already taken his/her daily dose. Safe, confidential communication and operation is ensured.

  7. Investigating the Activities of Children toward a Smart Storytelling Toy

    ERIC Educational Resources Information Center

    Kara, Nuri; Aydin, Cansu Cigdem; Cagiltay, Kursat

    2013-01-01

    This paper introduces StoryTech, a smart storytelling toy that features a virtual space, which includes computer-based graphics and characters, and a real space, which includes plush toys, background cards, and a communication interface. When children put real objects on the receiver panel, the computer program shows related backgrounds and…

  8. Family Registration Card as electronic medical carrier in Bosnia and Herzegovina.

    PubMed

    Novo, Ahmed; Masic, Izet; Toromanovic, Selim; Loncarevic, Nedim; Junuzovic, Dzelaludin; Dizdarevic, Jadranka

    2004-01-01

    Medical documentation is a very important part of the medical documentalistics and is occupies a large part of daily work of medical staff working in Primary Health Care. Paper documentation is going to be replaced by electronic cards in Bosnia and Herzegovina and a new Health Care System is under development, based on an Electronic Family Registration Card. Developed countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transferring, searching and protecting data, using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Three types of electronic card are currently in use: a Hybrid Card, a Smart Card and a Laser Card. The dilemma is which card should be used as a data carrier. The Electronic Family Registration Cared is a question of strategic interest for B&H, but also a great investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.

  9. A Smart Card-Based Electronic School Absenteeism System for Influenza-Like Illness Surveillance in Hong Kong: Design, Implementation, and Feasibility Assessment.

    PubMed

    Ip, Dennis Km; Lau, Eric Hy; So, Hau Chi; Xiao, Jingyi; Lam, Chi Kin; Fang, Vicky J; Tam, Yat Hung; Leung, Gabriel M; Cowling, Benjamin J

    2017-10-06

    School-aged children have the highest incidence of respiratory virus infections each year, and transmission of respiratory viruses such as influenza virus can be a major concern in school settings. School absenteeism data have been employed as a component of influenza surveillance systems in some locations. Data timeliness and system acceptance remain as key determinants affecting the usefulness of a prospective surveillance system. The aim of this study was to assess the feasibility of implementing an electronic school absenteeism surveillance system using smart card-based technology for influenza-like illness (ILI) surveillance among a representative network of local primary and secondary schools in Hong Kong. We designed and implemented a surveillance system according to the Protocol for a Standardized information infrastructure for Pandemic and Emerging infectious disease Response (PROSPER). We employed an existing smart card-based education and school administration platform for data capture, customized the user interface, and used additional back end systems built for other downstream surveillance steps. We invited local schools to participate and collected absenteeism data by the implemented system. We compared temporal trend of the absenteeism data with data from existing community sentinel and laboratory surveillance data. We designed and implemented an ILI surveillance system utilizing smart card-based attendance tracking approach for data capture. We implemented the surveillance system in a total of 107 schools (including 66 primary schools and 41 secondary schools), covering a total of 75,052 children. The system successfully captured information on absences for 2 consecutive academic years (2012-2013 and 2013-2014). The absenteeism data we collected from the system reflected ILI activity in the community, with an upsurge in disease activity detected up to 1 to 2 weeks preceding other existing surveillance systems. We designed and implemented a novel smart card technology-based school absenteeism surveillance system. Our study demonstrated the feasibility of building a large-scale surveillance system riding on a routinely adopted data collection approach and the use of simple system enhancement to minimize workload implication and enhance system acceptability. Data from this system have potential value in supplementing existing sentinel influenza surveillance for situational awareness of influenza activity in the community. ©Dennis KM Ip, Eric HY Lau, Hau Chi So, Jingyi Xiao, Chi Kin Lam, Vicky J Fang, Yat Hung Tam, Gabriel M Leung, Benjamin J Cowling. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 06.10.2017.

  10. Can a patient smart card improve decision making in a clinical setting?.

    PubMed

    Bérubé, J; Papillon, M J; Lavoie, G; Durant, P; Fortin, J P

    1995-01-01

    In the health field, clinical information is the raw material for the clinician delivering health services. Therefore, the clinical information available to the physician is often incomplete or even non¿existent upon consultation. Furthermore, the reconstruction of the medical history, which is the most important source of data for the clinician to establish a diagnosis and initiate a treatment, suffers from many constraints. The smart card, like the one used in Quebec's project, could ease the physician's decision-making by allowing fast access to accurate and pertinent data. The smart card is a major asset in the present health system.

  11. Real Electronic Commerce: Smart Cards on the Superhighway.

    ERIC Educational Resources Information Center

    Birch, David

    1997-01-01

    Technologies of payment rather than technologies of connection are the real trigger for the expansion of electronic commerce on the Internet. This article discusses "smart cards," highlighting Mondex, the electronic purse developed in the United Kingdom. Predicts that cash will be replaced by "e-cash," which is cheaper to make,…

  12. [Smart card systems in health care (protection, key-functions, divided data bases, applications)].

    PubMed

    Simon, P

    1999-04-25

    Barely more than 15 years have passed since electronic memory cards appeared, their popularity has grown rapidly (first of all as a cash-saving device and later for other purposes, as well). This is due also to the growing interest towards development of the intelligence of information systems for the follow-up of patients' health condition and medical care in countries with a highly developed health and insurance system (need for the creation of data bases divided for individuals) and also to their commitment towards a better control of the quality and costs of health care. We can come to the conclusion that the aim of research, development and the creation of systems in health informatics is to prevent illness and to give a direct informatic support to medical and nursing activity carried out in the patients' interests. The smart card and the surrounding application systems are certainly the appropriate means for the achievement of these aims.

  13. Front end design of smartphone-based mobile health

    NASA Astrophysics Data System (ADS)

    Zhang, Changfan; He, Lingsong; Gao, Zhiqiang; Ling, Cong; Du, Jianhao

    2015-02-01

    Mobile health has been a new trend all over the world with the rapid development of intelligent terminals and mobile internet. It can help patients monitor health in-house and is convenient for doctors to diagnose remotely. Smart-phone-based mobile health has big advantages in cost and data sharing. Front end design of it mainly focuses on two points: one is implementation of medical sensors aimed at measuring kinds of medical signal; another is acquisition of medical signal from sensors to smart phone. In this paper, the above two aspects were both discussed. First, medical sensor implementation was proposed to refer to mature measurement solutions with ECG (electrocardiograph) sensor design taken for example. And integrated chip using can simplify design. Then second, typical data acquisition architecture of smart phones, namely Bluetooth and MIC (microphone)-based architecture, were compared. Bluetooth architecture should be equipped with an acquisition card; MIC design uses sound card of smart phone instead. Smartphone-based virtual instrument app design corresponding to above acquisition architecture was discussed. In experiments, Bluetooth and MIC architecture were used to acquire blood pressure and ECG data respectively. The results showed that Bluetooth design can guarantee high accuracy during the acquisition and transmission process, and MIC design is competitive because of low cost and convenience.

  14. Determining the feasibility of objective adherence measurement with blister packaging smart technology.

    PubMed

    van Onzenoort, Hein A; Neef, Cees; Verberk, Willem W; van Iperen, H Peter; de Leeuw, Peter W; van der Kuy, Paul-Hugo M

    2012-05-15

    The results of a feasibility study of blister-pack smart technology for monitoring medication adherence are reported. Research in the area of objective therapy compliance measurement has led to the development of microprocessor-driven systems that record the time a unit dose is removed from blister packaging. One device under development is the Smart Blister-a label imprinted with event-detection circuitry that can be affixed to standard commercial blister cards. In the first trial of the device in actual clinical practice, 115 community-dwelling Dutch patients receiving valsartan maintenance therapy (160 mg once daily) were given 14-day blister packages equipped with the Smart Blister. On the return of empty blister cards to the 20 participating community pharmacies, the stored information was scanned and downloaded for data analysis and patient counseling purposes. A total of 245 Smart Blister-equipped packages were used by valsartan recipients during the eight-month study. The device was largely effective in recording patient and blister-card identification data and other desired information. However, in 17% of cases, the Smart Blister system registered multiple tablet-removal events at the same time, presumably indicating unintentional breakage of nearby conductive circuits and the need for design refinements. The Smart Blister-equipped medication cards were generally well received by patients and pharmacies. An evaluation of the functionality and robustness of the Smart Blister in a real-world clinical practice situation yielded some promising results, but the findings also indicated a need for design refinements and additional performance testing of the device.

  15. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    PubMed Central

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  16. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less

  18. A Cashless Society? The Plastic Revolution. Resources in Technology.

    ERIC Educational Resources Information Center

    Ritz, John M.

    1993-01-01

    Relates the history of credit cards, their evolution to current forms, and innovations (debit cards, token cards, smart cards). Considers their sociocultural impact. Provides a design brief, including objectives, resources, evaluation criteria, outcomes, and a quiz. (SK)

  19. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  20. Protecting Digital Evidence Integrity by Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Saleem, Shahzad; Popov, Oliver

    RFC 3227 provides general guidelines for digital evidence collection and archiving, while the International Organization on Computer Evidence offers guidelines for best practice in the digital forensic examination. In the light of these guidelines we will analyze integrity protection mechanism provided by EnCase and FTK which is mainly based on Message Digest Codes (MDCs). MDCs for integrity protection are not tamper proof, hence they can be forged. With the proposed model for protecting digital evidence integrity by using smart cards (PIDESC) that establishes a secure platform for digitally signing the MDC (in general for a whole range of cryptographic services) in combination with Public Key Cryptography (PKC), one can show that this weakness might be overcome.

  1. Overview

    Science.gov Websites

    maintaining both types of cards. Common Access Card (CAC) "Smart" ID card for active-duty military personnel, Selected Reserve, DoD civilian employees, and eligible contractor personnel. CAC Types & and military retirees to access service benefits and privileges. ID Card Types & Eligibility

  2. Comparison of the Effects of SMART Board Technology and Flash Card Instruction on Sight Word Recognition and Observational Learning

    ERIC Educational Resources Information Center

    Mechling, Linda C.; Gast, David L.; Thompson, Kimberly L.

    2009-01-01

    This study compared the effectiveness of SMART Board, interactive whiteboard technology and traditional flash cards in teaching reading in a small-group instructional arrangement. Three students with moderate intellectual disabilities were taught to read grocery store aisle marker words under each condition. Observational learning (students…

  3. 48 CFR 22.1003-4 - Administrative limitations, variations, tolerances, and exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., purchase cards, smart cards, and similar card services). (iii) Hotel/motel services for conferences... appraisers to assist Federal employees or military personnel in buying and selling homes (which shall not...

  4. Evaluation of the Geotech SMART24BH 20Vpp/5Vpp data acquisition system with active fortezza crypto card data signing and authentication.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rembold, Randy Kai; Hart, Darren M.

    Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIAmore » crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.« less

  5. On the security of two remote user authentication schemes for telecare medical information systems.

    PubMed

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  6. 48 CFR 313.301 - Government-wide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., Appendix B, “Improving the Management of Government Charge Card Programs;” GSA's SmartPay Program guidance; and HHS Purchase Card program standards. (2) The OPDIVs, through their designated Agency/Organization... training requirements to ensure effective implementation of the HHS purchase card program. (3) OPDIVs shall...

  7. Miniaturised wireless smart tag for optical chemical analysis applications.

    PubMed

    Steinberg, Matthew D; Kassal, Petar; Tkalčec, Biserka; Murković Steinberg, Ivana

    2014-01-01

    A novel miniaturised photometer has been developed as an ultra-portable and mobile analytical chemical instrument. The low-cost photometer presents a paradigm shift in mobile chemical sensor instrumentation because it is built around a contactless smart card format. The photometer tag is based on the radio-frequency identification (RFID) smart card system, which provides short-range wireless data and power transfer between the photometer and a proximal reader, and which allows the reader to also energise the photometer by near field electromagnetic induction. RFID is set to become a key enabling technology of the Internet-of-Things (IoT), hence devices such as the photometer described here will enable numerous mobile, wearable and vanguard chemical sensing applications in the emerging connected world. In the work presented here, we demonstrate the characterisation of a low-power RFID wireless sensor tag with an LED/photodiode-based photometric input. The performance of the wireless photometer has been tested through two different model analytical applications. The first is photometry in solution, where colour intensity as a function of dye concentration was measured. The second is an ion-selective optode system in which potassium ion concentrations were determined by using previously well characterised bulk optode membranes. The analytical performance of the wireless photometer smart tag is clearly demonstrated by these optical absorption-based analytical experiments, with excellent data agreement to a reference laboratory instrument. © 2013 Elsevier B.V. All rights reserved.

  8. JPEG2000 vs. full frame wavelet packet compression for smart card medical records.

    PubMed

    Leehan, Joaquín Azpirox; Lerallut, Jean-Francois

    2006-01-01

    This paper describes a comparison among different compression methods to be used in the context of electronic health records in the newer version of "smart cards". The JPEG2000 standard is compared to a full-frame wavelet packet compression method at high (33:1 and 50:1) compression rates. Results show that the full-frame method outperforms the JPEG2K standard qualitatively and quantitatively.

  9. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.

  10. A study of smart card for radiation exposure history of patient.

    PubMed

    Rehani, Madan M; Kushi, Joseph F

    2013-04-01

    The purpose of this article is to undertake a study on developing a prototype of a smart card that, when swiped in a system with access to the radiation exposure monitoring server, will locate the patient's radiation exposure history from that institution or set of associated institutions to which it has database access. Like the ATM or credit card, the card acts as a secure unique "token" rather than having cash, credit, or dose data on the card. The system provides the requested radiation history report, which then can be printed or sent by e-mail to the patient. The prototype system is capable of extending outreach to wherever the radiation exposure monitoring server extends, at county, state, or national levels. It is anticipated that the prototype shall pave the way for quick availability of patient exposure history for use in clinical practice for strengthening radiation protection of patients.

  11. SAE for the prediction of road traffic status from taxicab operating data and bus smart card data

    NASA Astrophysics Data System (ADS)

    Zhengfeng, Huang; Pengjun, Zheng; Wenjun, Xu; Gang, Ren

    Road traffic status is significant for trip decision and traffic management, and thus should be predicted accurately. A contribution is that we consider multi-modal data for traffic status prediction than only using single source data. With the substantial data from Ningbo Passenger Transport Management Sector (NPTMS), we wished to determine whether it was possible to develop Stacked Autoencoders (SAEs) for accurately predicting road traffic status from taxicab operating data and bus smart card data. We show that SAE performed better than linear regression model and Back Propagation (BP) neural network for determining the relationship between road traffic status and those factors. In a 26-month data experiment using SAE, we show that it is possible to develop highly accurate predictions (91% test accuracy) of road traffic status from daily taxicab operating data and bus smart card data.

  12. Web Card - Clean Cities Plug-In Electric Vehicle Handbook for Public Charging Station Hosts

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    A 2" x 3-1/4" web card which has a quick response code for accessing the PEV Handbook for Public Charging Station Hosts via a smart phone. The cards are intended to be handed out instead of the handbook.

  13. Digital Signature Management.

    ERIC Educational Resources Information Center

    Hassler, Vesna; Biely, Helmut

    1999-01-01

    Describes the Digital Signature Project that was developed in Austria to establish an infrastructure for applying smart card-based digital signatures in banking and electronic-commerce applications. Discusses the need to conform to international standards, an international certification infrastructure, and security features for a public directory…

  14. A smart-card-enabled privacy preserving E-prescription system.

    PubMed

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.

  15. Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

    NASA Astrophysics Data System (ADS)

    Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra

    The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.

  16. Common Badging and Access Control System (CBACS)

    NASA Technical Reports Server (NTRS)

    Dischinger, Portia

    2005-01-01

    This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.

  17. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  18. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    PubMed

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  19. Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373

  20. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  1. Biometrics encryption combining palmprint with two-layer error correction codes

    NASA Astrophysics Data System (ADS)

    Li, Hengjian; Qiu, Jian; Dong, Jiwen; Feng, Guang

    2017-07-01

    To bridge the gap between the fuzziness of biometrics and the exactitude of cryptography, based on combining palmprint with two-layer error correction codes, a novel biometrics encryption method is proposed. Firstly, the randomly generated original keys are encoded by convolutional and cyclic two-layer coding. The first layer uses a convolution code to correct burst errors. The second layer uses cyclic code to correct random errors. Then, the palmprint features are extracted from the palmprint images. Next, they are fused together by XORing operation. The information is stored in a smart card. Finally, the original keys extraction process is the information in the smart card XOR the user's palmprint features and then decoded with convolutional and cyclic two-layer code. The experimental results and security analysis show that it can recover the original keys completely. The proposed method is more secure than a single password factor, and has higher accuracy than a single biometric factor.

  2. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    PubMed

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  3. Demonstration of holographic smart card system using the optical memory technology

    NASA Astrophysics Data System (ADS)

    Kim, JungHoi; Choi, JaeKwang; An, JunWon; Kim, Nam; Lee, KwonYeon; Jeon, SeckHee

    2003-05-01

    In this paper, we demonstrate the holographic smart card system using digital holographic memory technique that uses reference beam encrypted by the random phase mask to prevent unauthorized users from accessing the stored digital page. The input data that include document data, a picture of face, and a fingerprint for identification is encoded digitally and then coupled with the reference beam modulated by a random phase mask. Therefore, this proposed system can execute recording in the order of MB~GB and readout all personal information from just one card without any additional database system. Also, recorded digital holograms can't be reconstructed without a phase key and can't be copied by using computers, scanners, or photography.

  4. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  5. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359

  6. Patient health record on a smart card.

    PubMed

    Naszlady, A; Naszlady, J

    1998-02-01

    A validated health questionnaire has been used for the documentation of a patient's history (826 items) and of the findings from physical examination (591 items) in our clinical ward for 25 years. This computerized patient record has been completed in EUCLIDES code (CEN TC/251) for laboratory tests and an ATC and EAN code listing for the names of the drugs permanently required by the patient. In addition, emergency data were also included on an EEPROM chipcard with a 24 kb capacity. The program is written in FOX-PRO language. A group of 5000 chronically ill in-patients received these cards which contain their health data. For security reasons the contents of the smart card is only accessible by a doctor's PIN coded key card. The personalization of each card was carried out in our health center and the depersonalized alphanumeric data were collected for further statistical evaluation. This information served as a basis for a real need assessment of health care and for the calculation of its cost. Code-combined with an optical card, a completely paperless electronic patient record system has been developed containing all three information carriers in medicine: Texts, Curves and Pictures.

  7. Evaluation strategy : Puget Sound regional fare card : FY01 earmark evaluation

    DOT National Transportation Integrated Search

    2003-06-24

    King County Metro Transit is the lead agency responsible for implementing the Central Puget Sound Regional Fare Coordination Project (RFC Project). The project features a smart card technology that will support and link the fare collection systems of...

  8. Vehicle Fault Diagnose Based on Smart Sensor

    NASA Astrophysics Data System (ADS)

    Zhining, Li; Peng, Wang; Jianmin, Mei; Jianwei, Li; Fei, Teng

    In the vehicle's traditional fault diagnose system, we usually use a computer system with a A/D card and with many sensors connected to it. The disadvantage of this system is that these sensor can hardly be shared with control system and other systems, there are too many connect lines and the electro magnetic compatibility(EMC) will be affected. In this paper, smart speed sensor, smart acoustic press sensor, smart oil press sensor, smart acceleration sensor and smart order tracking sensor were designed to solve this problem. With the CAN BUS these smart sensors, fault diagnose computer and other computer could be connected together to establish a network system which can monitor and control the vehicle's diesel and other system without any duplicate sensor. The hard and soft ware of the smart sensor system was introduced, the oil press, vibration and acoustic signal are resampled by constant angle increment to eliminate the influence of the rotate speed. After the resample, the signal in every working cycle could be averaged in angle domain and do other analysis like order spectrum.

  9. [Electronic medical records in Bosnia-Herzegovina. The electronic card--the medical record of the future in Boznia-Herzegovina].

    PubMed

    Masić, I; Pandza, H; Ridanović, Z; Dover, M

    1997-01-01

    The biggest problem in organisation of the effective and rational health care of good quality in Bosnia quality and Herzegovina is a functional and updated Health Information System. In this system, important role play Health Statistic System in which documentation and evidence are very important segment. Developed countries proceeded from the manual and semiautomatic method of medical data processing and system management to the new methods of entering, storage, transfer, searching and protection of data using electronic equipment. Recently, the competition between manufacturers of the Smart Card and Laser Card is reality. Also scientific and professional debate exists about the standard card for storage of medical information in Health Care System. First option is supported by West European countries that developing Smart Card called Eurocard and second by USA and Far East countries. Because the Health Care System and other segments of Society of Bosnia and Herzegovina innovate intensively similar systems, the authors of this article intend to open discussion, and to show advantages and failures of each technological medium.

  10. [Application of patient card technology to health care].

    PubMed

    Sayag, E; Danon, Y L

    1995-03-15

    The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.

  11. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    PubMed

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  12. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    PubMed Central

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  13. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  14. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  15. Develop 3G Application with The J2ME SATSA API

    NASA Astrophysics Data System (ADS)

    JunWu, Xu; JunLing, Liang

    This paper describes research in the use of the Security and Trust Services API for J2ME (SATSA) to develop mobile applications. for 3G networks. SATSA defines a set of APIs that allows J2ME applications to communicate with and access functionality, secure storage and cryptographic operations provided by security elements such as smart cards and Wireless Identification Modules (WIM). A Java Card application could also work as an authentication module in a J2ME-based e-bank application. The e-bank application would allow its users to access their bank accounts using their cell phones.

  16. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  17. Access Denied

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  18. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    PubMed Central

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hart, Darren M.

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA cryptomore » card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.« less

  20. New and Improved: Security Goes High-Tech.

    ERIC Educational Resources Information Center

    Gamble, Cheryl

    2002-01-01

    Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…

  1. Progress on Component Evaluation for Nuclear Explosion Monitoring

    DTIC Science & Technology

    2008-09-01

    one data logger, Geotech Smart24. For the infrasound sensors tested, the test results allow us to conclude that both sensors had sufficiently quiet...a lower frequency than expected. Sandia was also asked to evaluate the Geotech Smart24 data logger for qualification as a replacement to the Geotech ...results of using 26-bit quantization. Characterization Geotech Smart24 Data-Logger with Active Fortezza Crypto Card Data Signing Over the spring

  2. New secure communication-layer standard for medical image management (ISCL)

    NASA Astrophysics Data System (ADS)

    Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1999-07-01

    This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.

  3. An Indian eye to personalized medicine.

    PubMed

    Jauhari, Shaurya; Rizvi, S A M

    2015-04-01

    Acknowledging the successful sequencing of the human genome and the valuable insights it has rendered, genetic drafting of non-human organisms can further enhance the understanding of modern biology. The price of sequencing technology has plummeted with time, and there is a noticeable enhancement in its implementation and recurrent usage. Sequenced genome information can be contained in a microarray chip, and then processed by a computer system for inferring analytics and predictions. Specifically, smart cards have been significantly applicable to assimilate and retrieve complex data, with ease and implicit mobility. Herein, we propose "The G-Card", a development with respect to the prevalent smart card, and an extension to the Electronic Health Record (EHR), that will hold the genome sequence of an individual, so that the medical practitioner can better investigate irregularities in a patient's health and hence recommend a precise prognosis. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Students using mobile phones in the classroom: Can the phones increase content learning

    NASA Astrophysics Data System (ADS)

    Rinehart, David Lee

    A study was conducted at a high-performing school in Southern California to explore the effects on learning content from students using their own smart phones in and out of the classroom. The study used a Switching Replications design format which allowed two independent analyses of posttest scores between a group using e-flash cards on smart phones and a group using paper flash cards. Quantitative data was collected via two tailed, t-tests and qualitative data was collected through observations and interviews. Results suggest that knowledge level learning may be increased with mobile phone use, but no effect on comprehension level learning was found. Students found the phones to be convenient in accessing flash cards anytime and anywhere. Enthusiasm for using the phones in class while initially high waned over the 1 month study duration. Students perceived the phones to not be a significant source of distraction outside of class.

  5. Newer Technologies for School Security. ERIC Digest Number 145.

    ERIC Educational Resources Information Center

    Schneider, Tod

    This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…

  6. The effect of using the health smart card vs. CPOE reminder system on the prescribing practices of non-obstetric physicians during outpatient visits for pregnant women in Taiwan.

    PubMed

    Long, An-Jim; Chang, Polun

    2012-09-01

    There is an evidence that pregnant women have been prescribed a significant number of improper medications that could lead to potential damage for a developing fetus due to discontinuity of care. The safety of pregnant women raises public concern and there is a need to identify ways to prevent potential adverse events to the pregnant woman. This study used a health smart card with a clinical reminder system to keep continuous records of general outpatient visits of pregnant women to protect them from potential adverse events caused by improper prescription. The health smart card, issued to all 23 million citizens in Taiwan, was used to work with a Computerized Physician Order Entry (CPOE) implemented at a 700-bed teaching medical center in Taipei to provide the outpatient information of pregnant women. FDA pregnancy risk classification was used to categorize the risk of pregnant women. The log file, combined with the physicians' and patients' profiles, were statistically examined using the Mantel-Haenszel technique to evaluate the impact of system in changing physician's prescription behavior. A total of 441 patients ranged in age from 15 to 50 years with 1114 prescriptions involved in FDA pregnancy risk classification C, D, and X during the study period. 144 reminders (13.1%) were accepted by physicians for further assessment and 100 (69.4%) of them were modified. Non-obstetric physicians in non-emergency setting were more intended to accept reminders (27.8%, 4.9 folds than obstetricians). Reminders triggered on patients in second trimester (15.5%) were accepted by all physicians more than third trimester (OR 1.52, p<0.05). A health smart card armed with CPOE reminder system and well-defined criteria had the potential to decrease harmful medication prescribed to pregnant patients. The results show better conformance for non-obstetric physicians (26%) and when physicians accepted the alerts they are more likely to went back and review their orders (69%). In sum, reminder criteria of FDA pregnancy risk classification C for obstetricians and reminder based on different trimesters is suggested to be refined to improve system acceptability and to decrease improper prescription. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  7. A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor

    NASA Astrophysics Data System (ADS)

    Swee Wen, Khoo; Mahinderjit Singh, Manmeet

    2016-11-01

    Location based service is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. NFC location based service is using one of the modes of NFC such as peer-to-peer, reader/writer, and card emulation to obtain the information of the object and then get the location of the object. In this paper, the proposed solution is I- NFC-enabled Pervasive Social Networking apps for florists. It combines the NFC location based service with Online Social Network (OSN). In addition, a smart advisor in the system to provide output in making their own decision while purchasing products.The development of the system demonstrates that a designed commerce site is provided which enable a communication between NFC-enabled smartphone, NFC-enabled application and OSN. GPS functionalities also implemented to provide map and location of business services. Smart advisor also designed to provide information for users who do not have ideas what to purchase.

  8. Facilitating and securing offline e-medicine service through image steganography.

    PubMed

    Kamal, A H M; Islam, M Mahfuzul

    2014-06-01

    E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation.

  9. The exploration of the exhibition informatization

    NASA Astrophysics Data System (ADS)

    Zhang, Jiankang

    2017-06-01

    The construction and management of exhibition informatization is the main task and choke point during the process of Chinese exhibition industry’s transformation and promotion. There are three key points expected to realize a breakthrough during the construction of Chinese exhibition informatization, and the three aspects respectively are adopting service outsourcing to construct and maintain the database, adopting advanced chest card technology to collect various kinds of information, developing statistics analysis to maintain good cutomer relations. The success of Chinese exhibition informatization mainly calls for mature suppliers who can provide construction and maintenance of database, the proven technology, a sense of data security, advanced chest card technology, the ability of data mining and analysis and the ability to improve the exhibition service basing on the commercial information got from the data analysis. Several data security measures are expected to apply during the process of system developing, including the measures of the terminal data security, the internet data security, the media data security, the storage data security and the application data security. The informatization of this process is based on the chest card designing. At present, there are several types of chest card technology: bar code chest card; two-dimension code card; magnetic stripe chest card; smart-chip chest card. The information got from the exhibition data will help the organizers to make relevant service strategies, quantify the accumulated indexes of the customers, and improve the level of the customer’s satisfaction and loyalty, what’s more, the information can also provide more additional services like the commercial trips, VIP ceremonial reception.

  10. Retention of data in heat-damaged SIM cards and potential recovery methods.

    PubMed

    Jones, B J; Kenyon, A J

    2008-05-02

    Examination of various SIM cards and smart card devices indicates that data may be retained in SIM card memory structures even after heating to temperatures up to 450 degrees C, which the National Institute of Standards and Technology (NIST) has determined to be approximately the maximum average sustained temperature at desk height in a house fire. However, in many cases, and certainly for temperatures greater than 450 degrees C, the SIM card chip has suffered structural or mechanical damage that renders simple probing or rewiring ineffective. Nevertheless, this has not necessarily affected the data, which is stored as charge in floating gates, and alternative methods for directly accessing the stored charge may be applicable.

  11. Tecnologias mas nuevas para la seguridad escolar (Newer Technologies for School Security). ERIC Digest.

    ERIC Educational Resources Information Center

    Schneider, Tod

    This digest in Spanish describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that…

  12. Making Our Students Smart about Money

    ERIC Educational Resources Information Center

    Godfrey, Neale S.

    2006-01-01

    According to Senator Daniel Akaka, sponsor of the 2004 Credit Card Minimum Payment Warning Act, 45% of college students are in credit card debt, with an average debt of US$ 3,000. Moreover, 150,000 young adults between the ages of 18-24 declared bankruptcy last year. In this article, the author describes how financial literacy can educate young…

  13. The Learning Credit Card: A Tool for Managing Personal Development

    ERIC Educational Resources Information Center

    Rushby, Nick; Twining, John; Twining, Nick; Devitt, Thomas

    2008-01-01

    This is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of smart card technology to support learning and the management of learning. The study had two strands--the state of the art of the technology and its potential for supporting,…

  14. Towards a SIM-Less Existence: The Evolution of Smart Learning Networks

    ERIC Educational Resources Information Center

    Al-Khouri, Ali M.

    2015-01-01

    This article proposes that the widespread availability of wireless networks creates a case in which there is no real need for SIM cards. Recent technological developments offer the capability to outperform SIM cards and provide more innovative dimensions to current systems of mobility. In this context of changing realities in the domain of…

  15. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  16. Charge It Right. FDIC Money Smart Financial Education Curriculum = Uso Correcto de su Tarjeta de Credito. FDIC Money Smart Plan de Education para Capacitacion en Finanzas.

    ERIC Educational Resources Information Center

    Federal Deposit Insurance Corp., Washington, DC.

    This module on managing a credit card is one of ten in the Money Smart curriculum, and includes an instructor guide and a take-home guide. It was developed to help adults outside the financial mainstream enhance their money skills and create positive banking relationships. It is designed to enable participants to describe the costs and benefits of…

  17. Using smart card technology to monitor the eating habits of children in a school cafeteria: 3. The nutritional significance of beverage and dessert choices.

    PubMed

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The consumption patterns of beverages and desserts features highly in the current debate surrounding children's nutrition. The aim of this study was to continuously monitor the choice of beverages and desserts made by nearly 1000 children in a school cafeteria. A newly developed smart card system was used to monitor the food choices of diners (7-16-year-old boys) in a school cafeteria over 89 days. A wide variety of beverages and desserts were on offer daily. Despite coming from an affluent, well-educated demographic group, the boys' choices of beverages and desserts mirrored those of children in general. Buns and cookies were over 10 times more popular than fresh fruits and yogurts. Sugary soft-drinks were over 20 times more popular than fresh fruit drinks and milk combined. Appropriate choices could, over a month, reduce intake of added sugar by over 800 g and fat by over 200 g. The smart card system was very effective at monitoring total product choices for nearly 1000 diners. In agreement with a recent national school meal survey, where choice is extensive, children show a preference for products high in fat and/or sugar. The consequences of these preferences are discussed.

  18. Predicting traffic volumes and estimating the effects of shocks in massive transportation systems.

    PubMed

    Silva, Ricardo; Kang, Soong Moon; Airoldi, Edoardo M

    2015-05-05

    Public transportation systems are an essential component of major cities. The widespread use of smart cards for automated fare collection in these systems offers a unique opportunity to understand passenger behavior at a massive scale. In this study, we use network-wide data obtained from smart cards in the London transport system to predict future traffic volumes, and to estimate the effects of disruptions due to unplanned closures of stations or lines. Disruptions, or shocks, force passengers to make different decisions concerning which stations to enter or exit. We describe how these changes in passenger behavior lead to possible overcrowding and model how stations will be affected by given disruptions. This information can then be used to mitigate the effects of these shocks because transport authorities may prepare in advance alternative solutions such as additional buses near the most affected stations. We describe statistical methods that leverage the large amount of smart-card data collected under the natural state of the system, where no shocks take place, as variables that are indicative of behavior under disruptions. We find that features extracted from the natural regime data can be successfully exploited to describe different disruption regimes, and that our framework can be used as a general tool for any similar complex transportation system.

  19. Predicting traffic volumes and estimating the effects of shocks in massive transportation systems

    PubMed Central

    Silva, Ricardo; Kang, Soong Moon; Airoldi, Edoardo M.

    2015-01-01

    Public transportation systems are an essential component of major cities. The widespread use of smart cards for automated fare collection in these systems offers a unique opportunity to understand passenger behavior at a massive scale. In this study, we use network-wide data obtained from smart cards in the London transport system to predict future traffic volumes, and to estimate the effects of disruptions due to unplanned closures of stations or lines. Disruptions, or shocks, force passengers to make different decisions concerning which stations to enter or exit. We describe how these changes in passenger behavior lead to possible overcrowding and model how stations will be affected by given disruptions. This information can then be used to mitigate the effects of these shocks because transport authorities may prepare in advance alternative solutions such as additional buses near the most affected stations. We describe statistical methods that leverage the large amount of smart-card data collected under the natural state of the system, where no shocks take place, as variables that are indicative of behavior under disruptions. We find that features extracted from the natural regime data can be successfully exploited to describe different disruption regimes, and that our framework can be used as a general tool for any similar complex transportation system. PMID:25902504

  20. Portable electrocardiogram device using Android smartphone.

    PubMed

    Brucal, S G E; Clamor, G K D; Pasiliao, L A O; Soriano, J P F; Varilla, L P M

    2016-08-01

    Portable electrocardiogram (ECG) capturing device can be interfaced to a smart phone installed with an android-based application (app). This app processes and analyses the data sent by the device to provide an interpretation of the patient/user's heart current condition (e.g.: beats per minute, heart signal waveform, R-R interval). The ECG recorded by the app is stored in the smart phone's Secure Digital (SD) card and cloud storage which can be accessed remotely by a physician to aid in providing medical diagnosis. The project aims to help patients living at a far distance from hospitals and experience difficulty in consulting their physician for regular check-ups, and assist doctors in regularly monitoring their patient's heart condition. The hardware data acquisition device and software application were subjected to trials in a clinic with volunteer-patients to measure the ECG and heart rate, data saving speed on the SD card, success rate of the saved data and uploaded file. Different ECG tests using the project prototype were done for 12 patients/users and yielded a reading difference of 7.61% in an R-R interval reading and 5.35% in heart rate reading as compared with the cardiologist's conventional 12-electrode ECG machine. Using the developed ECG device, it took less than 5 seconds to save ECG reading using SD card and approximately 2 minutes to upload via cloud.

  1. A Smart Card-Based Electronic School Absenteeism System for Influenza-Like Illness Surveillance in Hong Kong: Design, Implementation, and Feasibility Assessment

    PubMed Central

    Lau, Eric HY; So, Hau Chi; Xiao, Jingyi; Lam, Chi Kin; Fang, Vicky J; Tam, Yat Hung; Leung, Gabriel M; Cowling, Benjamin J

    2017-01-01

    Background School-aged children have the highest incidence of respiratory virus infections each year, and transmission of respiratory viruses such as influenza virus can be a major concern in school settings. School absenteeism data have been employed as a component of influenza surveillance systems in some locations. Data timeliness and system acceptance remain as key determinants affecting the usefulness of a prospective surveillance system. Objective The aim of this study was to assess the feasibility of implementing an electronic school absenteeism surveillance system using smart card–based technology for influenza-like illness (ILI) surveillance among a representative network of local primary and secondary schools in Hong Kong. Methods We designed and implemented a surveillance system according to the Protocol for a Standardized information infrastructure for Pandemic and Emerging infectious disease Response (PROSPER). We employed an existing smart card–based education and school administration platform for data capture, customized the user interface, and used additional back end systems built for other downstream surveillance steps. We invited local schools to participate and collected absenteeism data by the implemented system. We compared temporal trend of the absenteeism data with data from existing community sentinel and laboratory surveillance data. Results We designed and implemented an ILI surveillance system utilizing smart card–based attendance tracking approach for data capture. We implemented the surveillance system in a total of 107 schools (including 66 primary schools and 41 secondary schools), covering a total of 75,052 children. The system successfully captured information on absences for 2 consecutive academic years (2012-2013 and 2013-2014). The absenteeism data we collected from the system reflected ILI activity in the community, with an upsurge in disease activity detected up to 1 to 2 weeks preceding other existing surveillance systems. Conclusions We designed and implemented a novel smart card technology–based school absenteeism surveillance system. Our study demonstrated the feasibility of building a large-scale surveillance system riding on a routinely adopted data collection approach and the use of simple system enhancement to minimize workload implication and enhance system acceptability. Data from this system have potential value in supplementing existing sentinel influenza surveillance for situational awareness of influenza activity in the community. PMID:28986338

  2. Dual-Input AND Gate From Single-Channel Thin-Film FET

    NASA Technical Reports Server (NTRS)

    Miranda, F. A.; Pinto, N. J.; Perez, R.; Mueller, C. H.

    2008-01-01

    A regio-regular poly(3-hexylthiophene) (RRP3HT) thin-film transistor having a split-gate architecture has been fabricated on a doped silicon/silicon nitride substrate and characterized. RRP3HT is a semiconducting polymer that has a carrier mobility and on/off ratio when used in a field effect transistor (FET) configuration. This commercially available polymer is very soluble in common organic solvents and is easily processed to form uniform thin films. The most important polymer-based device fabricated and studied is the FET, since it forms the building block in logic circuits and switches for active matrix (light-emitting-diode) (LED) displays, smart cards, and radio frequency identification (RFID) cards.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Colbert, C.; Moles, D.R.

    This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Securitymore » Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.« less

  4. Facilitating and securing offline e-medicine service through image steganography

    PubMed Central

    Islam, M. Mahfuzul

    2014-01-01

    E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation. PMID:26609382

  5. An RFID Based Smart Feeder for Hummingbirds.

    PubMed

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei

    2015-12-16

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.

  6. An RFID Based Smart Feeder for Hummingbirds

    PubMed Central

    Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F.; Tang, Wei

    2015-01-01

    We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future. PMID:26694402

  7. Automated visual inspection system based on HAVNET architecture

    NASA Astrophysics Data System (ADS)

    Burkett, K.; Ozbayoglu, Murat A.; Dagli, Cihan H.

    1994-10-01

    In this study, the HAusdorff-Voronoi NETwork (HAVNET) developed at the UMR Smart Engineering Systems Lab is tested in the recognition of mounted circuit components commonly used in printed circuit board assembly systems. The automated visual inspection system used consists of a CCD camera, a neural network based image processing software and a data acquisition card connected to a PC. The experiments are run in the Smart Engineering Systems Lab in the Engineering Management Dept. of the University of Missouri-Rolla. The performance analysis shows that the vision system is capable of recognizing different components under uncontrolled lighting conditions without being effected by rotation or scale differences. The results obtained are promising and the system can be used in real manufacturing environments. Currently the system is being customized for a specific manufacturing application.

  8. Registration system of cloud campus by using android smart tablet.

    PubMed

    Kamada, Shin; Ichimura, Takumi; Shigeyasu, Tetsuya; Takemoto, Yasuhiko

    2014-01-01

    Near Field Communication (NFC) standard covers communication protocols and data exchange formats. NFC technology is one of radio-frequency identification (RFID) standards. In Japan, Felica card is a popular way to identify the unique ID. We developed the attendance management system (AMS) as the Android application which works in the smart tablet with NFC. Generally, the AMS in the university is fixed to the wall and each student touches or slides his/her own card to the dedicated equipment. Because a teacher can use his/her own smart tablet and/or smartphone, the attendance records are viewed anytime and anywhere. Moreover, we developed the collecting system between PC and some tablets by using Android beam. Any personal data are encrypted and the file can be transferred over the NFC Bluetooth Handover between PC Linux and smart tablet. By the mining of the collected records, early discovery for chronic non-attenders are extracted in educational affairs section. In this paper, a registration system on the cloud campus system by using the personal smartphone with NFC is developed. The system enables to introduce the university courses that are open to the general public.

  9. 48 CFR 1401.603-3 - Appointment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the bureau/office procedures within the constraints of DOI Integrated Charge Card Program Policy Manual located at http://www.doi.gov/pam/chargecard. Additional guidance is available in the GSA Smart...

  10. 48 CFR 1401.603-3 - Appointment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the bureau/office procedures within the constraints of DOI Integrated Charge Card Program Policy Manual located at http://www.doi.gov/pam/chargecard. Additional guidance is available in the GSA Smart...

  11. Smartcards. Smart move.

    PubMed

    Mathieson, Steve

    2005-09-08

    European nations outside the UK use smartcards to speed up reimbursements. France has had a card since 1998 and this may soon include health data. The UK is at present only issuing smartcards for healthcare staff's use.

  12. Analysis of OPACITY and PLAID Protocols for Contactless Smart Cards

    DTIC Science & Technology

    2012-09-01

    9 3. Access Control ........................................................................ 9 E . THREATS AND...Synchronization .............................. 23 c. Simple Integration and Interoperability ..................... 24 E . MODES OF OPERATION...Interoperability ..................... 47 E . MODES OF OPERATIONS ................................................................ 47 F. SUGGESTED KEY

  13. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  14. Pocket EZPIN device for healthcare IC cards to enhance the security and convenience of senior citizens.

    PubMed

    Lai, Jiun-Tze; Hou, Ting-Wei

    2008-04-01

    An application that adopts smart cards often requires users to enter a PIN (Personal Identification Number) code. In Taiwan's healthcare system, a PIN is used to protect a card holder's private data. However, should one forget one's PIN, the procedure to set up a new PIN is inconvenient. There is a higher probability that senior citizens may forget their PINs. We propose a device which stores the PIN of the cardholder's Healthcare IC card. When the healthcare IC card reader requires the cardholder to enter his/her PIN, the cardholder pushes a button of the device to remotely sends the cardholder's encrypted PIN, for example by Infra Red. The device is designed to be low cost and easy to carry, and, hence, affordable to be a gift to senior citizens. Moreover, if the cardholder should forget to take the device with him/her, the card still works as normal. The device would be helpful in ensuring the public's privacy and convenience in Taiwan's healthcare system.

  15. Smart Passport : Ventura County Transportation Commission's demonstration project

    DOT National Transportation Integrated Search

    1998-09-01

    In January 1996 the Ventura County Transportation Commission (VCTC) began the implementation of an advanced bus pass (fare card media), or Smartcard, called the "Passport," on all Ventura County transit systems which incorporated a number of emerging...

  16. Using smart card technology to monitor the eating habits of children in a school cafeteria: 2. The nutrient contents of all meals chosen by a group of 8- to 11-year-old boys over 78 days.

    PubMed

    Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P

    2005-08-01

    The aim of the study was to test the abilities of the newly created smart card system to track the nutrient contents of foods chosen over several months by individual diners in a school cafeteria. From the food choice and composition of food data sets, an Access database was created encompassing 30 diners (aged 8-11 years), 78 days and eight nutrients. Data were available for a total of 1909 meals. Based upon population mean values the cohort were clearly choosing meals containing higher than the recommended maximum amounts for sugar and lower than the recommended minimum amounts of fibre, iron and vitamin A. Protein and vitamin C contents of meals chosen were well above minimum requirements. Over the 1909 meals, nutrient requirements were met 41% of the time. The system created was very effective at continually monitoring food choices of individual diners over limitless time. The data generated raised questions on the common practice of presenting nutrient intakes as population mean values calculated over a few days. The impact of heavily fortified foods on such studies in general is discussed.

  17. Design and Implementation of KSP on the Next Generation Cryptography API

    NASA Astrophysics Data System (ADS)

    Lina, Zhang

    With good seamless connectivity and higher safety, KSP (Key Storage Providers) is the inexorable trend of security requirements and development to take the place of CSP (Cryptographic Service Provider). But the study on KSP has just started in our country, and almost no reports of its implementation can be found. Based on the analysis of function modules and the architecture of Cryptography API (Next Generation (CNG)), this paper discusses the design and implementation of KSP (key storage providers) based on smart card in detail, and an example is also presented to illustrate how to use KSP in Windows Vista.

  18. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  19. Looking to the Future.

    ERIC Educational Resources Information Center

    College Planning & Management, 1997

    1997-01-01

    Ten possible trends on college campuses are examined. They include distance learning; rehabilitation of existing buildings; use of construction management firms; salaries for facilities directors; virtual universities; off-site garages; outside residence hall contractors; classrooms in residential buildings; and smart cards for entry and…

  20. Ventura County fare integration : a case study : promoting seamless regional fare coordination

    DOT National Transportation Integrated Search

    2001-09-01

    This report details the approach taken in one specific region to plan, operate, and maintain a multi-agency, transit fare collection payment system demonstration utilizing smart card technology as well as other ITS (intelligent transportation systems...

  1. The SMile Card: a computerised data card for multiple sclerosis patients. SMile Card Scientific Board.

    PubMed

    Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A

    2000-04-01

    The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.

  2. Consumers' Interest In Provider Ratings Grows, And Improved Report Cards And Other Steps Could Accelerate Their Use.

    PubMed

    Findlay, Steven D

    2016-04-01

    Encouraging patients and consumers to use data and other information in choosing health care providers is an important way to enhance patient engagement and improve the quality of care. The growing use of technology, including smart phones and near-ubiquitous Internet access, provides consumers with easy access to websites that collect and report assessments and ratings of providers, primarily physicians and hospitals. In addition to new technology, recent laws and changes in society and the delivery of care are laying the foundation for greater use by consumers of provider performance report cards. Such use could be accelerated if the shortcomings of current report card efforts were addressed. Recommendations include making online report cards easier to use and more understandable, engaging, substantive, and relevant to consumers' health and medical concerns and choices. Project HOPE—The People-to-People Health Foundation, Inc.

  3. Optimised to Fail: Card Readers for Online Banking

    NASA Astrophysics Data System (ADS)

    Drimer, Saar; Murdoch, Steven J.; Anderson, Ross

    The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.

  4. Smart-card-based automatic meal record system intervention tool for analysis using data mining approach.

    PubMed

    Zenitani, Satoko; Nishiuchi, Hiromu; Kiuchi, Takahiro

    2010-04-01

    The Smart-card-based Automatic Meal Record system for company cafeterias (AutoMealRecord system) was recently developed and used to monitor employee eating habits. The system could be a unique nutrition assessment tool for automatically monitoring the meal purchases of all employees, although it only focuses on company cafeterias and has never been validated. Before starting an interventional study, we tested the reliability of the data collected by the system using the data mining approach. The AutoMealRecord data were examined to determine if it could predict current obesity. All data used in this study (n = 899) were collected by a major electric company based in Tokyo, which has been operating the AutoMealRecord system for several years. We analyzed dietary patterns by principal component analysis using data from the system and extracted 5 major dietary patterns: healthy, traditional Japanese, Chinese, Japanese noodles, and pasta. The ability to predict current body mass index (BMI) with dietary preference was assessed with multiple linear regression analyses, and in the current study, BMI was positively correlated with male gender, preference for "Japanese noodles," mean energy intake, protein content, and frequency of body measurement at a body measurement booth in the cafeteria. There was a negative correlation with age, dietary fiber, and lunchtime cafeteria use (R(2) = 0.22). This regression model predicted "would-be obese" participants (BMI >or= 23) with 68.8% accuracy by leave-one-out cross validation. This shows that there was sufficient predictability of BMI based on data from the AutoMealRecord System. We conclude that the AutoMealRecord system is valuable for further consideration as a health care intervention tool. Copyright 2010 Elsevier Inc. All rights reserved.

  5. Machine learning techniques to predict sensitive patterns to fault attack in the Java Card application

    NASA Astrophysics Data System (ADS)

    Chahrazed, Yahiaoui; Jean-Louis, Lanet; Mohamed, Mezghiche; Karim, Tamine

    2018-01-01

    Fault attack represents one of the serious threats against Java Card security. It consists of physical perturbation of chip components to introduce faults in the code execution. A fault may be induced using a laser beam to impact opcodes and operands of instructions. This could lead to a mutation of the application code in such a way that it becomes hostile. Any successful attack may reveal a secret information stored in the card or grant an undesired authorisation. We propose a methodology to recognise, during the development step, the sensitive patterns to the fault attack in the Java Card applications. It is based on the concepts from text categorisation and machine learning. In fact, in this method, we represented the patterns using opcodes n-grams as features, and we evaluated different machine learning classifiers. The results show that the classifiers performed poorly when classifying dangerous sensitive patterns, due to the imbalance of our data-set. The number of dangerous sensitive patterns is much lower than the number of not dangerous patterns. We used resampling techniques to balance the class distribution in our data-set. The experimental results indicated that the resampling techniques improved the accuracy of the classifiers. In addition, our proposed method reduces the execution time of sensitive patterns classification in comparison to the SmartCM tool. This tool is used in our study to evaluate the effect of faults on Java Card applications.

  6. A Trusted Portable Computing Device

    NASA Astrophysics Data System (ADS)

    Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang

    A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.

  7. Information technology in the foxhole.

    PubMed

    Eyestone, S M

    1995-08-01

    The importance of digital data capture at the point of health care service within the military environment is highlighted. Current paper-based data capture does not allow for efficient data reuse throughout the medical support information domain. A simple, high-level process and data flow model is used to demonstrate the importance of data capture at point of service. The Department of Defense is developing a personal digital assistant, called MEDTAG, that accomplishes point of service data capture in the field using a prototype smart card as a data store in austere environments.

  8. 48 CFR 301.608 - Training requirements for purchase cardholders, Approving Officials, and Agency/Organization...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... REGULATION SYSTEM Career Development, Contracting Authority, and Responsibilities 301.608 Training... CON 237). • Advanced simplified acquisition procedures or Appropriations law. Purchase card holders...). • Advanced simplified acquisition procedures or Appropriations law. • CON 100 (Shaping Smart Business...

  9. 48 CFR 301.608 - Training requirements for purchase cardholders, Approving Officials, and Agency/Organization...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... REGULATION SYSTEM Career Development, Contracting Authority, and Responsibilities 301.608 Training... CON 237). • Advanced simplified acquisition procedures or Appropriations law. Purchase card holders...). • Advanced simplified acquisition procedures or Appropriations law. • CON 100 (Shaping Smart Business...

  10. Mobile Device Management

    DTIC Science & Technology

    2012-01-01

    password policies (or smart card authentication), disabling compo- nents of the operating system that were deemed unsafe, allowing users to only install...written nearly 100 applications for the iOS and Android platforms with over 1,500,000 downloads on iTunes and Google Play. CPT Braunstein is a

  11. Consolidating Our Country’s Biometric Resources and the Possible Implications

    DTIC Science & Technology

    2008-03-02

    passenger’s quick access through airport security by pre-clearing travelers. The Fly Clear smart cards store the passenger’s personal information...Fly Through Airport Security , undated); “Fly Through Airport Security ,”; available from http://flyclear.com/about/clear _howclearworks.html

  12. Noncontact power/interrogation system for smart structures

    NASA Astrophysics Data System (ADS)

    Spillman, William B., Jr.; Durkee, S.

    1994-05-01

    The field of smart structures has been largely driven by the development of new high performance designed materials. Use of these materials has been generally limited due to the fact that they have not been in use long enough for statistical data bases to be developed on their failure modes. Real time health monitoring is therefore required for the benefits of structures using these materials to be realized. In this paper a non-contact method of powering and interrogating embedded electronic and opto-electronic systems is described. The technique utilizes inductive coupling between external and embedded coils etched on thin electronic circuit cards. The technique can be utilized to interrogate embedded sensors and to provide > 250 mW for embedded electronics. The system has been successfully demonstrated with a number of composite and plastic materials through material thicknesses up to 1 cm. An analytical description of the system is provided along with experimental results.

  13. Mapping and navigational control for a “smart” wheelchair.

    PubMed

    Schultz, Dana L; Shea, Kathleen M; Barrett, Steven F

    2012-01-01

    A “smart” wheelchair is in development to provide mobility to those unable to control a traditional wheelchair. A “smart” wheelchair is an autonomous machine with the ability to navigate a mapped environment while avoiding obstacles. The flexibility and complex design of “smart” wheelchairs have made those currently available expensive. Ongoing research at the University of Wyoming has been aimed at designing a cheaper, alternative control system that could be interfaced with a typical powered wheelchair. The goal of this project is to determine methods for mapping and navigational control for the wheelchair. The control system acquires data from eighteen sensors and uses the data to navigate around a pre-programmed map which is stored on a micro SD card. The control system also provides a user interface in the form of a touchscreen LCD. The designed system will be an easy-to-use and cost effective alternative to current “smart” wheelchair technology.

  14. 41 CFR 102-34.320 - What Government-issued charge cards may I use to purchase fuel and motor vehicle related services?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...

  15. 41 CFR 102-34.320 - What Government-issued charge cards may I use to purchase fuel and motor vehicle related services?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay ® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...

  16. 41 CFR 102-34.320 - What Government-issued charge cards may I use to purchase fuel and motor vehicle related services?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...

  17. 41 CFR 102-34.320 - What Government-issued charge cards may I use to purchase fuel and motor vehicle related services?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...

  18. 41 CFR 102-34.320 - What Government-issued charge cards may I use to purchase fuel and motor vehicle related services?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay ® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...

  19. Your Guide to Smart Year-Round Fundraising.

    ERIC Educational Resources Information Center

    Gensheimer, Cynthia Francis

    1994-01-01

    Describes three seasonal fund-raising projects that can be linked with the curriculum and require only a few parent volunteers. The projects are profitable without requiring large amounts of effort. They include selling holiday cards, conducting read-a-thons, and participating in save-the-rainforest group sales. Tips for holding successful fund…

  20. Médicarte software developed for the Quebec microprocessor health card project.

    PubMed

    Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P

    1995-01-01

    The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the software was developed for each of the four groups of health care providers involved. In addition we designed an application to interface with existing pharmaceutical software. For practical reasons and to make it possible to differentiate between the different access profiles, the information stored on the card is divided in several blocks: Identification, Emergency, History (personal and family), Screening Tests, Vaccinations, Drug Profile, General follow-up, and some Specific follow-ups (Pregnancy, Ophthalmology, Kidney failure, Cardiology, Pediatrics, Diabetes, Pneumology, Specific parameters). Over 14,000 diagnoses and symptoms are classified with four levels of precision, the codification being based on the ICPC (International Classification for Primary Care). The software contains different applications to assist the clinician in decision making. A "Drug Advisor" helps the prescriber by detecting possible interactions between drugs, giving indications (doses) and contraindications, cautions, potential side-effects and therapeutic alternatives. There is also a prevention module providing recommendations for vaccination and periodic examinations based on the patient's age and sex. The pharmaceutical, vaccination, and screening tests data banks are updated every six months. These sections of the software are accessible to access card holders at any times, even without a patient card, and constitute in themselves an interesting clinical tool. We developed a software server (SCAM) allowing the different applications to access the data in a memory card regardless of the type of memory card used. Using a single high level command language, this server provides a standardized utilization of memory cards from various manufacturers. It ensures the compatibility of the applications using the card as a storage medium. (abstract truncated)

  1. Smart pillow for heart-rate monitoring using a fiber optic sensor

    NASA Astrophysics Data System (ADS)

    Chen, Zhihao; Teo, Ju Teng; Ng, Soon Huat; Yim, Huiqing

    2011-03-01

    In this paper, we propose and demonstrate a new method to monitor heart rate using fiber optic microbending based sensor for in-bed non-intrusive monitoring. The sensing system consists of transmitter, receiver, sensor mat, National Instrument (NI) data acquisition (DAQ) card and a computer for signal processing. The sensor mat is embedded inside a commercial pillow. The heart rate measurement system shows an accuracy of +/-2 beats, which has been successfully demonstrated in a field trial. The key technological advantage of our system is its ability to measure heart rate with no preparation and minimal compliance by the patient.

  2. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    PubMed

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.

  3. Effect of Technological Changes in Information Transfer on the Delivery of Pharmacy Services.

    ERIC Educational Resources Information Center

    Barker, Kenneth N.; And Others

    1989-01-01

    Personal computer technology has arrived in health care. Specific technological advances are optical disc storage, smart cards, voice recognition, and robotics. This paper discusses computers in medicine, in nursing, in conglomerates, and with patients. Future health care will be delivered in primary care centers, medical supermarkets, specialized…

  4. 49 CFR 395.16 - Electronic on-board recording devices.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... “sufficiently precise,” for purposes of this paragraph means the nearest city, town or village. (3) When the CMV... driving, and where released from work), the name of the nearest city, town, or village, with State... password) that identifies the driver or to provide other information (such as smart cards, biometrics) that...

  5. Geometry creation for MCNP by Sabrina and XSM

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Van Riper, K.A.

    The Monte Carlo N-Particle transport code MCNP is based on a surface description of 3-dimensional geometry. Cells are defined in terms of boolean operations on signed quadratic surfaces. MCNP geometry is entered as a card image file containing coefficients of the surface equations and a list of surfaces and operators describing cells. Several programs are available to assist in creation of the geometry specification, among them Sabrina and the new ``Smart Editor`` code XSM. We briefly describe geometry creation in Sabrina and then discuss XSM in detail. XSM is under development; our discussion is based on the state of XSMmore » as of January 1, 1994.« less

  6. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication

    NASA Astrophysics Data System (ADS)

    Murdoch, Steven J.; Anderson, Ross

    Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.

  7. Integrity mechanism for eHealth tele-monitoring system in smart home environment.

    PubMed

    Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos

    2009-01-01

    During the past few years, a lot of effort has been invested in research and development of eHealth tele-monitoring systems that will provide many benefits for healthcare delivery from the healthcare provider to the patient's home. However, there is a plethora of security requirements in eHealth tele-monitoring systems. Data integrity of the transferred medical data is one of the most important security requirements that should be satisfied in these systems, since medical information is extremely sensitive information, and even sometimes life threatening information. In this paper, we present a data integrity mechanism for eHealth tele-monitoring system that operates in a smart home environment. Agent technology is applied to achieve data integrity with the use of cryptographic smart cards. Furthermore, the overall security infrastructure and its various components are described.

  8. Accuracy of autotitrating CPAP to estimate the residual Apnea-Hypopnea Index in patients with obstructive sleep apnea on treatment with autotitrating CPAP.

    PubMed

    Desai, Himanshu; Patel, Anil; Patel, Pinal; Grant, Brydon J B; Mador, M Jeffery

    2009-11-01

    Autotitrating continuous positive airway pressure (auto-CPAP) devices now have a smart card (a pocket-sized card with embedded integrated circuits which records data from the CPAP machine such as CPAP usage, CPAP pressure, large leak, etc.) which can estimate the Apnea-Hypopnea Index (AHI) on therapy. The aim of this study was to determine the accuracy of auto-CPAP in estimating the residual AHI in patients with obstructive sleep apnea (OSA) who were treated with auto-CPAP without a CPAP titration study. We studied 99 patients with OSA from April 2005 to May 2007 who underwent a repeat sleep study using auto-CPAP. The estimated AHI from auto-CPAP was compared with the AHI from an overnight polysomnogram (PSG) on auto-CPAP using Bland-Altman plot and likelihood ratio analyses. A PSG AHI cutoff of five events per hour was used to differentiate patients optimally treated with auto-CPAP from those with residual OSA on therapy. Bland and Altman analysis showed good agreement between auto-CPAP AHI and PSG AHI. There was no significant bias when smart card estimates of AHI at home were compared to smart card estimates obtained in the sleep laboratory. An auto-CPAP cutoff for the AHI of six events per hour was shown to be optimal for differentiating patients with and without residual OSA with a sensitivity of 0.92 (95% confidence interval (CI) 0.76 to 0.98) and specificity of 0.90 (95% CI 0.82 to 0.95) with a positive likelihood ratio (LR) of 9.6 (95% CI 5.1 to 21.5) and a negative likelihood ratio of 0.085 (95% CI 0.02 to 0.25). Auto-CPAP AHI of eight events per hour yielded the optimal sensitivity (0.94, 95% CI 0.73 to 0.99) and specificity (0.90, 95% CI 0.82 to 0.95) with a positive LR of 9.6 (95% CI 5.23 to 20.31) and a negative LR of 0.065 (95% CI 0.004 to 0.279) to identify patients with a PSG AHI of > or = 10 events per hour. Auto-CPAP estimate of AHI may be used to estimate residual AHI in patients with OSA of varying severity treated with auto-CPAP.

  9. Using medical history embedded in biometrics medical card for user identity authentication: privacy preserving authentication model by features matching.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.

  10. Slovenian national health insurance card: the next step.

    PubMed

    Kalin, T; Kandus, G; Trcek, D; Zupan, B

    1999-01-01

    The Slovenian national health insurance company started a full-scale deployment of the insurance smart card that is at the present used for insurance data and identification purpose only. There is ample capacity on the cards that were selected, to contain much more data than needed for the purely administrative and charging purposes. There are plans to include some basic medical information, donor information, etc. On the other hand, there are no firm plans to use the security infrastructure and the extensive network, connecting the insurance company with the more than 200 self service terminals positioned at the medical facilities through the country to build an integrated medical information system that would be very beneficial to the patients and the medical community. This paper is proposing some possible future developments and further discusses on the security issues involved with such countrywide medical information system.

  11. Using Technology To Combat Truancy. Number 10 in a Series of CTC Trust Publications.

    ERIC Educational Resources Information Center

    Haigh, Gerald

    The 14 City Technology Colleges (CTCs) opened so far in Great Britain are achieving an average attendance rate of between 90 percent and 97 percent. This high level of attendance has been assisted by the use of electronic registration (role taking) devices, including smart cards, portable computers, and optical readers. This report compares…

  12. Online detection of potential duplicate medications and changes of physician behavior for outpatients visiting multiple hospitals using national health insurance smart cards in Taiwan.

    PubMed

    Hsu, Min-Huei; Yeh, Yu-Ting; Chen, Chien-Yuan; Liu, Chien-Hsiang; Liu, Chien-Tsai

    2011-03-01

    Doctor shopping (or hospital shopping), which means changing doctors (or hospitals) without professional referral for the same or similar illness conditions, is common in Hong Kong, Taiwan and Japan. Due to the lack of infrastructure for sharing health information and medication history among hospitals, doctor-shopping patients are more likely to receive duplicate medications and suffer adverse drug reactions. The Bureau of National Health Insurance (BNHI) adopted smart cards (or NHI-IC cards) as health cards in Taiwan. With their NHI-IC cards, patients can freely access different medical institutions. Because an NHI-IC card carries information about a patient's prescribed medications received from different hospitals nationwide, we used this system to address the problem of duplicate medications for outpatients visiting multiple hospitals. A computerized physician order entry (CPOE) system was enhanced with the capability of accessing NHI-IC cards and providing alerts to physicians when the system detects potential duplicate medications at the time of prescribing. Physician responses to the alerts were also collected to analyze changes in physicians' behavior. Chi-square tests and two-sided z-tests with Bonferroni adjustments for multiple comparisons were used to assess statistical significance of differences in actions taken by physicians over the three months. The enhanced CPOE system for outpatient services was implemented and installed at the Pediatric and Urology Departments of Taipei Medical University Wan-Fang Hospital in March 2007. The "Change Log" that recorded physician behavior was activated during a 3-month study period from April to June 2007. In 67.93% of patient visits, the physicians read patient NHI-IC cards, and in 16.76% of the reads, the NHI-IC card contained at least one prescribed medication that was taken by the patient. Among the prescriptions issued by physicians, on average, there were 2.36% prescriptions containing at least one medication that might be duplicative to the prior prescriptions stored in NHI-IC cards. The rate of potential duplicate medication alerts for the Pediatric Department was higher than that for the Urology Department (2.78% versus 1.67%). However, the rate of revisions to prescriptions was higher in the Urology Department than the Pediatric Department. Overall, the rate of physicians reviewing and revising their prescriptions was 29.25%; the rate of physicians reviewing without revising their prescriptions was 43.62%; the rate of physicians turning off the alert screens right after the screens popped up (overridden) was 27.13%. Thus, physicians accepted alerts to review their prescriptions with patients in most situations (72.87%). Moreover, over the study period, the rate of total revisions made to prescriptions increased and the "overridden" rate decreased. Our approach enhances the capability of CPOE systems using NHI-IC cards as a nationwide infrastructure to provide more complete patient health information and medication history sharing among hospitals in Taiwan. Thus, our system can provide a better prescribing tool to help physicians detect potential duplicate medications for frequent doctor-shopping patients and hence enhance patient safety across hospital boundaries. However, the effectiveness of detecting duplicate medications with our approach is very much dependent on the completeness of NHI-IC cards, which in turn primarily depends on physician use of the cards when prescribing. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rembold, Randy Kai; Hart, Darren M.; Harris, James Mark

    Sandia National Laboratories has tested, evaluated and reported on the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication in SAND2008-. One test, Input Terminated Noise, allows us to characterize the self-noise of the Smart24 system. By computing the power spectral density (PSD) of the input terminated noise time series data set and correcting for the instrument response of different seismometers, the resulting spectrum can be compared to the USGS new low noise model (NLNM) of Peterson (1996), and determine the ability of the matched system of seismometer and Smart24 to be quiet enough formore » any general deployment location. Four seismometer models were evaluated: the Streckeisen STS2-Low and High Gain, Guralp CMG3T and Geotech GS13 models. Each has a unique pass-band as defined by the frequency band of the instrument corrected noise spectrum that falls below the new low-noise model.« less

  14. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  15. Comparison of Urban Human Movements Inferring from Multi-Source Spatial-Temporal Data

    NASA Astrophysics Data System (ADS)

    Cao, Rui; Tu, Wei; Cao, Jinzhou; Li, Qingquan

    2016-06-01

    The quantification of human movements is very hard because of the sparsity of traditional data and the labour intensive of the data collecting process. Recently, much spatial-temporal data give us an opportunity to observe human movement. This research investigates the relationship of city-wide human movements inferring from two types of spatial-temporal data at traffic analysis zone (TAZ) level. The first type of human movement is inferred from long-time smart card transaction data recording the boarding actions. The second type of human movement is extracted from citywide time sequenced mobile phone data with 30 minutes interval. Travel volume, travel distance and travel time are used to measure aggregated human movements in the city. To further examine the relationship between the two types of inferred movements, the linear correlation analysis is conducted on the hourly travel volume. The obtained results show that human movements inferred from smart card data and mobile phone data have a correlation of 0.635. However, there are still some non-ignorable differences in some special areas. This research not only reveals the citywide spatial-temporal human dynamic but also benefits the understanding of the reliability of the inference of human movements with big spatial-temporal data.

  16. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    PubMed

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  17. Security aspects in teleradiology workflow

    NASA Astrophysics Data System (ADS)

    Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter

    2000-05-01

    The medicolegal necessity of privacy, security and confidentiality was the aim of the attempt to develop a secure teleradiology workflow between the telepartners -- radiologist and the referring physician. To avoid the lack of dataprotection and datasecurity we introduced biometric fingerprint scanners in combination with smart cards to identify the teleradiology partners and communicated over an encrypted TCP/IP satellite link between Innsbruck and Reutte. We used an asymmetric kryptography method to guarantee authentification, integrity of the data-packages and confidentiality of the medical data. It was necessary to use a biometric feature to avoid a case of mistaken identity of persons, who wanted access to the system. Only an invariable electronical identification allowed a legal liability to the final report and only a secure dataconnection allowed the exchange of sensible medical data between different partners of Health Care Networks. In our study we selected the user friendly combination of a smart card and a biometric fingerprint technique, called SkymedTM Double Guard Secure Keyboard (Agfa-Gevaert) to confirm identities and log into the imaging workstations and the electronic patient record. We examined the interoperability of the used software with the existing platforms. Only the WIN-XX operating systems could be protected at the time of our study.

  18. A Control System and Streaming DAQ Platform with Image-Based Trigger for X-ray Imaging

    NASA Astrophysics Data System (ADS)

    Stevanovic, Uros; Caselle, Michele; Cecilia, Angelica; Chilingaryan, Suren; Farago, Tomas; Gasilov, Sergey; Herth, Armin; Kopmann, Andreas; Vogelgesang, Matthias; Balzer, Matthias; Baumbach, Tilo; Weber, Marc

    2015-06-01

    High-speed X-ray imaging applications play a crucial role for non-destructive investigations of the dynamics in material science and biology. On-line data analysis is necessary for quality assurance and data-driven feedback, leading to a more efficient use of a beam time and increased data quality. In this article we present a smart camera platform with embedded Field Programmable Gate Array (FPGA) processing that is able to stream and process data continuously in real-time. The setup consists of a Complementary Metal-Oxide-Semiconductor (CMOS) sensor, an FPGA readout card, and a readout computer. It is seamlessly integrated in a new custom experiment control system called Concert that provides a more efficient way of operating a beamline by integrating device control, experiment process control, and data analysis. The potential of the embedded processing is demonstrated by implementing an image-based trigger. It records the temporal evolution of physical events with increased speed while maintaining the full field of view. The complete data acquisition system, with Concert and the smart camera platform was successfully integrated and used for fast X-ray imaging experiments at KIT's synchrotron radiation facility ANKA.

  19. Real-time optimizations for integrated smart network camera

    NASA Astrophysics Data System (ADS)

    Desurmont, Xavier; Lienard, Bruno; Meessen, Jerome; Delaigle, Jean-Francois

    2005-02-01

    We present an integrated real-time smart network camera. This system is composed of an image sensor, an embedded PC based electronic card for image processing and some network capabilities. The application detects events of interest in visual scenes, highlights alarms and computes statistics. The system also produces meta-data information that could be shared between other cameras in a network. We describe the requirements of such a system and then show how the design of the system is optimized to process and compress video in real-time. Indeed, typical video-surveillance algorithms as background differencing, tracking and event detection should be highly optimized and simplified to be used in this hardware. To have a good adequation between hardware and software in this light embedded system, the software management is written on top of the java based middle-ware specification established by the OSGi alliance. We can integrate easily software and hardware in complex environments thanks to the Java Real-Time specification for the virtual machine and some network and service oriented java specifications (like RMI and Jini). Finally, we will report some outcomes and typical case studies of such a camera like counter-flow detection.

  20. Human Interactive Triboelectric Nanogenerator as a Self-Powered Smart Seat.

    PubMed

    Chandrasekhar, Arunkumar; Alluri, Nagamalleswara Rao; Saravanakumar, Balasubramaniam; Selvarajan, Sophia; Kim, Sang-Jae

    2016-04-20

    A lightweight, flexible, cost-effective, and robust, single-electrode-based Smart Seat-Triboelectric Nanogenerator (SS-TENG) is introduced as a promising eco-friendly approach for harvesting energy from the living environment, for use in integrated self-powered systems. An effective method for harvesting biomechanical energy from human motion such as walking, running, and sitting, utilizing widely adaptable everyday contact materials (newspaper, denim, polyethylene covers, and bus cards) is demonstrated. The working mechanism of the SS-TENG is based on the generation and transfer of triboelectric charge carriers between the active layer and user-friendly contact materials. The performance of SS-TENG (52 V and 5.2 μA for a multiunit SS-TENG) is systematically studied and demonstrated in a range of applications including a self-powered passenger seat number indicator and a STOP-indicator using LEDs, using a simple logical circuit. Harvested energy is used as a direct power source to drive 60 blue and green commercially available LEDs and a monochrome LCD. This feasibility study confirms that triboelectric nanogenerators are a suitable technology for energy harvesting from human motion during transportation, which could be used to operate a variety of wireless devices, GPS systems, electronic devices, and other sensors during travel.

  1. DOD Business Systems Modernization: Planned Investment in Navy Program to Create Cashless Shipboard Environment Needs to Be Justified and Better Managed

    DTIC Science & Technology

    2008-09-01

    Abbreviations ATM automated teller machine BEA business enterprise architecture DOD...Limitations Automated Teller Machines (ATMs)-At-Sea 1988 Localized, shipboard ATMs that received and accounted for a portion of sailors’ and...use smart card technology for electronic retail ransactions and (2) economically justified on the basis of reliable analyses of stimated costs and

  2. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  3. MARC ES: a computer program for estimating medical information storage requirements.

    PubMed

    Konoske, P J; Dobbins, R W; Gauker, E D

    1998-01-01

    During combat, documentation of medical treatment information is critical for maintaining continuity of patient care. However, knowledge of prior status and treatment of patients is limited to the information noted on a paper field medical card. The Multi-technology Automated Reader Card (MARC), a smart card, has been identified as a potential storage mechanism for casualty medical information. Focusing on data capture and storage technology, this effort developed a Windows program, MARC ES, to estimate storage requirements for the MARC. The program calculates storage requirements for a variety of scenarios using medical documentation requirements, casualty rates, and casualty flows and provides the user with a tool to estimate the space required to store medical data at each echelon of care for selected operational theaters. The program can also be used to identify the point at which data must be uploaded from the MARC if size constraints are imposed. Furthermore, this model can be readily extended to other systems that store or transmit medical information.

  4. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  5. Light-weight cyptography for resource constrained environments

    NASA Astrophysics Data System (ADS)

    Baier, Patrick; Szu, Harold

    2006-04-01

    We give a survey of "light-weight" encryption algorithms designed to maximise security within tight resource constraints (limited memory, power consumption, processor speed, chip area, etc.) The target applications of such algorithms are RFIDs, smart cards, mobile phones, etc., which may store, process and transmit sensitive data, but at the same time do not always support conventional strong algorithms. A survey of existing algorithms is given and new proposal is introduced.

  6. A System for Anesthesia Drug Administration Using Barcode Technology: The Codonics Safe Label System and Smart Anesthesia Manager.

    PubMed

    Jelacic, Srdjan; Bowdle, Andrew; Nair, Bala G; Kusulos, Dolly; Bower, Lynnette; Togashi, Kei

    2015-08-01

    Many anesthetic drug errors result from vial or syringe swaps. Scanning the barcodes on vials before drug preparation, creating syringe labels that include barcodes, and scanning the syringe label barcodes before drug administration may help to prevent errors. In contrast, making syringe labels by hand that comply with the recommendations of regulatory agencies and standards-setting bodies is tedious and time consuming. A computerized system that uses vial barcodes and generates barcoded syringe labels could address both safety issues and labeling recommendations. We measured compliance of syringe labels in multiple operating rooms (ORs) with the recommendations of regulatory agencies and standards-setting bodies before and after the introduction of the Codonics Safe Label System (SLS). The Codonics SLS was then combined with Smart Anesthesia Manager software to create an anesthesia barcode drug administration system, which allowed us to measure the rate of scanning syringe label barcodes at the time of drug administration in 2 cardiothoracic ORs before and after introducing a coffee card incentive. Twelve attending cardiothoracic anesthesiologists and the OR satellite pharmacy participated. The use of the Codonics SLS drug labeling system resulted in >75% compliant syringe labels (95% confidence interval, 75%-98%). All syringe labels made using the Codonics SLS system were compliant. The average rate of scanning barcodes on syringe labels using Smart Anesthesia Manager was 25% (730 of 2976) over 13 weeks but increased to 58% (956 of 1645) over 8 weeks after introduction of a simple (coffee card) incentive (P < 0.001). An anesthesia barcode drug administration system resulted in a moderate rate of scanning syringe label barcodes at the time of drug administration. Further, adaptation of the system will be required to achieve a higher utilization rate.

  7. Experimental evaluation of fingerprint verification system based on double random phase encoding

    NASA Astrophysics Data System (ADS)

    Suzuki, Hiroyuki; Yamaguchi, Masahiro; Yachida, Masuyoshi; Ohyama, Nagaaki; Tashima, Hideaki; Obi, Takashi

    2006-03-01

    We proposed a smart card holder authentication system that combines fingerprint verification with PIN verification by applying a double random phase encoding scheme. In this system, the probability of accurate verification of an authorized individual reduces when the fingerprint is shifted significantly. In this paper, a review of the proposed system is presented and preprocessing for improving the false rejection rate is proposed. In the proposed method, the position difference between two fingerprint images is estimated by using an optimized template for core detection. When the estimated difference exceeds the permissible level, the user inputs the fingerprint again. The effectiveness of the proposed method is confirmed by a computational experiment; its results show that the false rejection rate is improved.

  8. An understanding of human dynamics in urban subway traffic from the Maximum Entropy Principle

    NASA Astrophysics Data System (ADS)

    Yong, Nuo; Ni, Shunjiang; Shen, Shifei; Ji, Xuewei

    2016-08-01

    We studied the distribution of entry time interval in Beijing subway traffic by analyzing the smart card transaction data, and then deduced the probability distribution function of entry time interval based on the Maximum Entropy Principle. Both theoretical derivation and data statistics indicated that the entry time interval obeys power-law distribution with an exponential cutoff. In addition, we pointed out the constraint conditions for the distribution form and discussed how the constraints affect the distribution function. It is speculated that for bursts and heavy tails in human dynamics, when the fitted power exponent is less than 1.0, it cannot be a pure power-law distribution, but with an exponential cutoff, which may be ignored in the previous studies.

  9. Smartphone Cortex Controlled Real-Time Image Processing and Reprocessing for Concentration Independent LED Induced Fluorescence Detection in Capillary Electrophoresis.

    PubMed

    Szarka, Mate; Guttman, Andras

    2017-10-17

    We present the application of a smartphone anatomy based technology in the field of liquid phase bioseparations, particularly in capillary electrophoresis. A simple capillary electrophoresis system was built with LED induced fluorescence detection and a credit card sized minicomputer to prove the concept of real time fluorescent imaging (zone adjustable time-lapse fluorescence image processor) and separation controller. The system was evaluated by analyzing under- and overloaded aminopyrenetrisulfonate (APTS)-labeled oligosaccharide samples. The open source software based image processing tool allowed undistorted signal modulation (reprocessing) if the signal was inappropriate for the actual detection system settings (too low or too high). The novel smart detection tool for fluorescently labeled biomolecules greatly expands dynamic range and enables retrospective correction for injections with unsuitable signal levels without the necessity to repeat the analysis.

  10. On the security of a dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Lin, Han-Yu

    2013-04-01

    Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.

  11. Time Delay Measurements of Key Generation Process on Smart Cards

    DTIC Science & Technology

    2015-03-01

    random number generator is available (Chatterjee & Gupta, 2009). The ECC algorithm will grow in usage as information becomes more and more secure. Figure...Worldwide Mobile Enterprise Security Software 2012–2016 Forecast and Analysis), mobile identity and access management is expected to grow by 27.6 percent...iPad, tablets) as well as 80000 BlackBerry phones. The mobility plan itself will be deployed in three phases over 2014, with the first phase

  12. Army Sustainment. Volume 42, Issue 3. May-June 2010

    DTIC Science & Technology

    2010-06-01

    created smart cards, refined the content and layout of routine briefs, and developed a workable battle rhythm for the rotation. Many...of classroom MDMP exercise is their only MDMP experience. (Photo by MAJ Christopher LeCron) MAY–jUNE 2010 17 headquarters’ G/S–4 and LNO, ensuring...CTSSB proceed ing. After organizing the survey data, 10 Centra class- rooms were created in ALMS. These classrooms were designated as the sites for each

  13. A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors

    DTIC Science & Technology

    2012-01-01

    and mobile phones, lottery ticket vending machines , and various electronic payment systems. The main reason for their use in such applications is that...military applications such as secure communication links. However, the proliferation of Automated Teller Machines (ATMs) in the ’80s introduced them to...commercial applications. Today many popular consumer devices have cryptographic processors in them, for example, smart- cards for pay-TV access machines

  14. Secure Biometric E-Voting Scheme

    NASA Astrophysics Data System (ADS)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  15. Performance Assessment Method for a Forged Fingerprint Detection Algorithm

    NASA Astrophysics Data System (ADS)

    Shin, Yong Nyuo; Jun, In-Kyung; Kim, Hyun; Shin, Woochang

    The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. With the recognition that this threat factor may disrupt the large-scale civil service operations approaching implementation, such as electronic ID cards and e-Government systems, many agencies and vendors around the world continue to develop forged fingerprint detection technology, but no objective performance assessment method has, to date, been reported. Therefore, in this paper, we propose a methodology designed to evaluate the objective performance of the forged fingerprint detection technology that is currently attracting a great deal of attention.

  16. Dynamical hologram generation for high speed optical trapping of smart droplet microtools

    PubMed Central

    Lanigan, P. M. P.; Munro, I.; Grace, E. J.; Casey, D. R.; Phillips, J.; Klug, D. R.; Ces, O.; Neil, M. A. A.

    2012-01-01

    This paper demonstrates spatially selective sampling of the plasma membrane by the implementation of time-multiplexed holographic optical tweezers for Smart Droplet Microtools (SDMs). High speed (>1000fps) dynamical hologram generation was computed on the graphics processing unit of a standard display card and controlled by a user friendly LabView interface. Time multiplexed binary holograms were displayed in real time and mirrored to a ferroelectric Spatial Light Modulator. SDMs were manufactured with both liquid cores (as previously described) and solid cores, which confer significant advantages in terms of stability, polydispersity and ease of use. These were coated with a number of detergents, the most successful based upon lipids doped with transfection reagents. In order to validate these, trapped SDMs were maneuvered up to the plasma membrane of giant vesicles containing Nile Red and human biliary epithelial (BE) colon cancer cells with green fluorescent labeled protein (GFP)-labeled CAAX (a motif belonging to the Ras protein). Bright field and fluorescence images showed that successful trapping and manipulation of multiple SDMs in x, y, z was achieved with success rates of 30-50% and that subsequent membrane-SDM interactions led to the uptake of Nile Red or GFP-CAAX into the SDM. PMID:22808432

  17. New developments in flexible cholesteric liquid crystal displays

    NASA Astrophysics Data System (ADS)

    Schneider, Tod; Davis, Donald J.; Franklin, Sean; Venkataraman, Nithya; McDaniel, Diaz; Nicholson, Forrest; Montbach, Erica; Khan, Asad; Doane, J. William

    2007-02-01

    Flexible Cholesteric liquid crystal displays have been rapidly maturing into a strong contender in the flexible display market. Encapsulation of the Cholesteric liquid crystal permits the use of flexible plastic substrates and roll-to-roll production. Recent advances include ultra-thin displays, laser-cut segmented displays of variable geometry, and smart card applications. Exciting technologies such as simultaneous laser-edge sealing and singulation enable high volume production, excellent quality control and non-traditional display geometries and formats.

  18. Ring aggregation pattern of metro passenger trips: A study using smart card data

    NASA Astrophysics Data System (ADS)

    Wang, Ziyang; Hu, Yuxin; Zhu, Peng; Qin, Yong; Jia, Limin

    2018-02-01

    With the widespread implementation of smart cards and with more travel details being recorded, travel patterns can be studied more precisely and deeply. Although considerable attention has been paid to travel patterns, the relationship between travel patterns and the functional structure of a city is yet to be well understood. In this research, we study this relationship by analysing metro passenger trip data (in Beijing and Shenzhen in China and London in the United Kingdom), and we present two unprecedented findings. First, through averaging, a linear relationship is found to exist between individual travel distance and the distance between the origin and the city centre. The underlying mechanism is a travel pattern we call "ring aggregation", i.e., the daily movement of city passengers is aggregated into a ring (with approximately equal distances to the city centre). Then, for commuting trips, the daily travel pattern can be regarded as switching between the outer residential ring and the inner work ring. Second, this linear relationship and the ring aggregation pattern seem to be exclusive characteristics of metro systems (and may also fit other moderate- and long-distance transportation modes) but do not apply to short-distance transportation modes, such as bicycles and taxis. This finding implies that the ring aggregation pattern is a product of the relationship between travel patterns and the city functional structure at a large scope.

  19. Evaluation of the feasibility of security technologies in teleradiology as biometric fingerprint scanners for data exchange over a satellite WAN

    NASA Astrophysics Data System (ADS)

    Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter

    2000-05-01

    We evaluated the feasibility of fingerprint-scanners in combination with smart cards for personal identification and transmission of encrypted TCP/IP-data-packages via satellite between the university-hospital of Innsbruck and the rural hospital of Reutte. The aim of our study was the proof of the userfriendliness of the SkymedTM technology for security purpose in teleradiology. We examined the time of the personal identification process, the time for the necessary training and the personal satisfaction. The images were sent from the local PACS in Reutte via a Data-Encryption-and-Transmission- Box via satellite from Reutte to Innsbruck. We used an asymmetric bandwidth of 512 kbit/s from Reutte to Innsbruck and 128 kbit/s in the opposite direction. Window NT 4.0- operating PCs were used for the electronical patient record, the medical inquiry of the referring physician and the final report of the radiologist. The images were reported on an UNIX-PACS viewing station. After identification through fingerprint-scanners in combination with the smart card the radiologist was able to open the electronic patient record (EPR) from Reutte and sign with his digital signature his confirmed final report before it was send back to Reutte. The used security technology enables encrypted communication over a WAN, which fulfill data-protection.

  20. ShopSmart 4 Health - protocol of a skills-based randomised controlled trial promoting fruit and vegetable consumption among socioeconomically disadvantaged women.

    PubMed

    Ball, Kylie; McNaughton, Sarah A; Le, Ha; Andrianopoulos, Nick; Inglis, Victoria; McNeilly, Briohny; Lichomets, Irene; Granados, Alba; Crawford, David

    2013-05-14

    There is a need for evidence on the most effective and cost-effective approaches for promoting healthy eating among groups that do not meet dietary recommendations for good health, such as those with low incomes or experiencing socioeconomic disadvantage. This paper describes the ShopSmart 4 Health study, a randomised controlled trial conducted by Deakin University, Coles Supermarkets and the Heart Foundation, to investigate the effectiveness and cost-effectiveness of a skill-building intervention for promoting increased purchasing and consumption of fruits and vegetables amongst women of low socioeconomic position (SEP). ShopSmart 4 Health employed a randomised controlled trial design. Women aged 18-60 years, holding a Coles store loyalty card, who shopped at Coles stores within socioeconomically disadvantaged neighbourhoods and met low-income eligibility criteria were invited to participate. Consenting women completed a baseline survey assessing food shopping and eating habits and food-related behaviours and attitudes. On receipt of their completed survey, women were randomised to either a skill-building intervention or a wait-list control condition. Intervention effects will be evaluated via self-completion surveys and using supermarket transaction sales data, collected at pre- and post-intervention and 6-month follow-up. An economic evaluation from a societal perspective using a cost-consequences approach will compare the costs and outcomes between intervention and control groups. Process evaluation will be undertaken to identify perceived value and effects of intervention components. This study will provide data to address the currently limited evidence base regarding the effectiveness and cost-effectiveness of skill-building intervention strategies aimed at increasing fruit and vegetable consumption among socioeconomically disadvantaged women, a target group at high risk of poor diets. Current Controlled Trials ISRCTN48771770.

  1. Smart patient, smart community: improving client participation in family planning consultations through a community education and mass-media program in Indonesia.

    PubMed

    Kim, Young Mi; Bazant, Eva; Storey, J Douglas

    In health care consultations, patients often receive insufficient information from providers and communicate little with providers about their needs or concerns. This study evaluated a combined community education and mass media intervention to improve clients' participation in family planning consultations. A household survey was conducted with 1,200 women in three sub-districts (two intervention and one control) of West Java province in Indonesia. A comparison of post-campaign findings among family planning clients suggests that the intervention as a whole had a positive effect on client participation, specifically the number of clients who prepared questions to ask the service provider prior to a family planning visit in the past year. Multivariate analyses showed that the "Smart Card" intervention and elements of the "Sahabat" (Friend) mass media campaign were positively associated with clients' preparation of questions and question asking behavior during family planning consultations, indicating that a combined community education and mass-media approach can improve client communication with providers and improve the quality of family planning counseling.

  2. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-07-24

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

  3. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

    PubMed Central

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-01-01

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged. PMID:23887085

  4. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments

    PubMed Central

    Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050

  5. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

    PubMed

    Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.

  6. Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care.

    PubMed

    Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting

    2014-09-01

    Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.

  7. Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals

    NASA Astrophysics Data System (ADS)

    Houdeau, Detlef

    The first implementation of biometric documents, called biometric passports, based on a regulation is running, the second implementation since end of CY 2008 is coming to Europe. The focus is on persons staying for business, study or leisure for more than 3 months in Europe and coming from a state outside Europe and not being a member of the Visa-Waiver-Program of the EU. This second wave increases the demand for the security industry for certified security microcontroller chips, secure smart cards, readers and supporting infrastructure on top of the biometric Passport business. It underlines the continuing advance of contactless identification technology in the public sector. The article gives an overview on the application, the technology, the EU regulation, the EU roadmap and the implementations.

  8. MediLink: a wearable telemedicine system for emergency and mobile applications.

    PubMed

    Koval, T; Dudziak, M

    1999-01-01

    The practical needs of the medical professional faced with critical care or emergency situations differ from those working in many environments where telemedicine and mobile computing have been introduced and tested. One constructive criticism of the telemedicine initiative has been to question what positive benefits are gained from videoconferencing, paperless transactions, and online access to patient record. With a goal of producing a positive answer to such questions an architecture for multipurpose mobile telemedicine applications has been developed. The core technology is based upon a wearable personal computer with a smart-card interface coupled with speech, pen, video input and wireless intranet connectivity. The TransPAC system with the MedLink software system is designed to provide an integrated solution for a broad range of health care functions where mobile and hands-free or limited-access systems are preferred or necessary and where the capabilities of other mobile devices are insufficient or inappropriate. Structured and noise-resistant speech-to-text interfacing plus the use of a web browser-like display, accessible through either a flatpanel, standard, or headset monitor, gives the beltpack TransPAC computer the functions of a complete desktop including PCMCIA card interfaces for internet connectivity and a secure smartcard with 16-bit microprocessor and upwards of 64K memory. The card acts to provide user access control for security, user custom configuration of applications and display and vocabulary, and memory to diminish the need for PC-server communications while in an active session. TransPAC is being implemented for EMT and ER staff usage.

  9. SMART Fires: A COTS Approach to Tactical Fire Support Using a Smartphone

    DTIC Science & Technology

    2011-09-01

    Battalion Landing Team C2 Command and Control C2PC Command and Control Personal Computer CAC Common Access Card COC Combat Operation Center COIN...functionality to way-points. It is currently available on the iTunes App Store for $5.99 (Tactical NAV, 2010). 11 MILS are a unit...download on both the iTunes App Store and the Android Marketplace. Apps for the Army (A4A) also created a repository for the applications submitted, along

  10. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    DTIC Science & Technology

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  11. Spending Smart: How To Budget and Finance. Making Sense of Your Budget Dollars; Success with Budget Proposals; Encumbering Grants: Managing the Money; Write a Grant? Me?; Using Microsoft[R] Excel To Plan and Budget in Your School Library; Charging Ahead; The No-Money Lottery; Coffee, Anyone?

    ERIC Educational Resources Information Center

    Bernstein, Allison; Baule, Steve; Farmer, Lesley S. J.; Anderson, Cyndee; Barringer, Crystal; Buchanan, Peggy; Fullner, Sheryl Kindle; Knop, Kathi; Larson, Chris

    2002-01-01

    Includes eight articles that address issues related to budgeting and finances in secondary school libraries. Topics include limited budgets; budget proposals; administering grants; writing grants; using Microsoft's Excel software for budgeting; using credit cards for library purchases; offering prizes for donating books; and offering coffee and…

  12. Using medical history embedded in biometrics medical card for user identity authentication: data representation by AVT hierarchical data tree.

    PubMed

    Fong, Simon; Zhuang, Yan

    2012-01-01

    User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.

  13. [Aspects of data protection in telemedicine].

    PubMed

    Vetter, R

    2001-10-01

    Telemedical applications like the electronic patient file, the electronic physician's letter and the electronic consultation ("Telekonsil"), the electronic prescription, the electronic patient's card (the "patient smart card") facilitate and improve the processing of sensitive medical data as well as the possibilities for using medical resources in an unusual degree and can thereby substantially contribute to the well-being of the patient. However, improving the quality of medical supply must not lead to a degradation of the patients' rights, in particular their right of self-determination. The introduction and the use of telemedical applications do not change the legal basic conditions for medical data processing. Therefore, a patient-friendly telemedicine must include data protection as well. Data protective telemedicine requires medical secrecy ensuring the patients' rights of information and transparency, correction of false and the up-to-date deletion of information that is no longer necessary, as well as secure data processing. All electronic processing of patients' data must meet the requirements of data security, i.e. the confidentiality, the integrity, the availability of the data at any time and the verifiability of the data processing have to be guaranteed. For this, electronic signatures and encodings have to be used, medical information systems have to be protected effectively against any risks resulting from open networks, particularly the Internet, and data processing has to be monitored. Electronic patient files may be open only to the treating physician and the medical assistants up to the necessary extent, ensuring the possibility of an emergency access. Any access beyond that does require the special consent of the patient. The medical secrecy has to be ensured. The electronic prescription with a documentation of the patient's medication requires the consent of the patient and must protect the rights of the physicians. In particular it has to ensure that the respective physician's prescribing behaviour cannot be stored or become known from a third party. Furthermore it has to protect the pharmacists' right to hide their turnover from other pharmacies. So-called patient smart cards require the consent of the patient. The right of the patient to keep his information secret, must be ensured with access options to the information stored on the smart card. Electronic physician's letters and socalled Telekonsile, i.e. the consultation with professional colleagues who were not involved in the patient's treatment from the beginning, require basically the agreement of the patient--if there cannot be dealt with anonymized data already from the beginning. In emergencies, after adequate consideration and weighing of values and interests, the consent of the patient can be suspected. The adherence to these boundary conditions ensures security and trustworthiness of telemedicine regarding the security of data processing as well as the rights of self-determination of all who are concerned. Data protection is also a contribution for the acceptance of these revolutionary advancements in the medical world.

  14. Robust Face Recognition via Multi-Scale Patch-Based Matrix Regression.

    PubMed

    Gao, Guangwei; Yang, Jian; Jing, Xiaoyuan; Huang, Pu; Hua, Juliang; Yue, Dong

    2016-01-01

    In many real-world applications such as smart card solutions, law enforcement, surveillance and access control, the limited training sample size is the most fundamental problem. By making use of the low-rank structural information of the reconstructed error image, the so-called nuclear norm-based matrix regression has been demonstrated to be effective for robust face recognition with continuous occlusions. However, the recognition performance of nuclear norm-based matrix regression degrades greatly in the face of the small sample size problem. An alternative solution to tackle this problem is performing matrix regression on each patch and then integrating the outputs from all patches. However, it is difficult to set an optimal patch size across different databases. To fully utilize the complementary information from different patch scales for the final decision, we propose a multi-scale patch-based matrix regression scheme based on which the ensemble of multi-scale outputs can be achieved optimally. Extensive experiments on benchmark face databases validate the effectiveness and robustness of our method, which outperforms several state-of-the-art patch-based face recognition algorithms.

  15. Architecture and implementation for a system enabling smartphones to access smart card based healthcare records.

    PubMed

    Karampelas, Vasilios; Pallikarakis, Nicholas; Mantas, John

    2013-01-01

    The healthcare researchers', academics' and practitioners' interest concerning the development of Healthcare Information Systems has been on a steady rise for the last decades. Fueling this steady rise has been the healthcare professional need of quality information, in every healthcare provision incident, whenever and wherever this incident may take place. In order to address this need a truly mobile health care system is required, one that will be able to provide a healthcare provider with accurate patient-related information regardless of the time and place that healthcare is provided. In order to fulfill this role the present study proposes the architecture for a Healthcare Smartcard system, which provides authenticated healthcare professionals with remote mobile access to a Patient's Healthcare Record, through their Smartphone. Furthermore the research proceeds to develop a working prototype system.

  16. Using Smart Pumps to Understand and Evaluate Clinician Practice Patterns to Ensure Patient Safety

    PubMed Central

    Mansfield, Jennifer; Jarrett, Steven

    2013-01-01

    Background: Safety software installed on intravenous (IV) infusion pumps has been shown to positively impact the quality of patient care through avoidance of medication errors. The data derived from the use of smart pumps are often overlooked, although these data provide helpful insight into the delivery of quality patient care. Objective: The objectives of this report are to describe the value of implementing IV infusion safety software and analyzing the data and reports generated by this system. Case study: Based on experience at the Carolinas HealthCare System (CHS), executive score cards provide an aggregate view of compliance rate, number of alerts, overrides, and edits. The report of serious errors averted (ie, critical catches) supplies the location, date, and time of the critical catch, thereby enabling management to pinpoint the end-user for educational purposes. By examining the number of critical catches, a return on investment may be calculated. Assuming 3,328 of these events each year, an estimated cost avoidance would be $29,120,000 per year for CHS. Other reports allow benchmarking between institutions. Conclusion: A review of the data about medication safety across CHS has helped garner support for a medication safety officer position with the goal of ultimately creating a safer environment for the patient. PMID:24474836

  17. A Combat Gaming Method for Tank Platoon Leader Training: TRAX 1

    DTIC Science & Technology

    1985-09-01

    COVERED A COMBAT GAMING METHOD FOR TANK PLATOON LEADER October 1983-October 1984 TRAINING: TRAX I T PERFORMING ORG. REPORT NUMBER 7. AUTHOR(o) S. CONTRACT ...AirLand Battle. Armor, July-August, 5-6. Furlong, M.D. (1984). Fighting smart at the National Training Center. Armor, May-June, 26-32. Henricksen, K...13. Qross H+9 f57372 *1TP Task p 6-2 &coke drifts oer rute MIK . Cnical 1. 1emain in M)pp-4 Inst/Ctlr denies bypass. Cards Contaminated 2. qest bypass

  18. Holography gets smart

    NASA Astrophysics Data System (ADS)

    Lowe, Chris; Larbey, Cynthia

    2008-02-01

    At least 6% of world trade, amounting to some 200bn per year, involves counterfeit goods. But this figure would be even higher were it not for the humble hologram. Invented 50 years ago, holograms provide authentication tags to deter copying, and can be found everywhere from credit cards, passports and banknotes to consumer goods, cosmetics and pharmaceuticals. Holography also underpins supermarket scanners and CD players; it can even be used to store optical data in 3D. Now, however, holograms are making their mark as powerful yet cheap diagnostic tools, which could in particular have many applications in biomedicine.

  19. wHospital: a web-based application with digital signature for drugs dispensing management.

    PubMed

    Rossi, Lorenzo; Margola, Lorenzo; Manzelli, Vacia; Bandera, Alessandra

    2006-01-01

    wHospital is the result of an information technology research project, based on the utilization of a web based application for managing the hospital drugs dispensing. Part of wHospital back bone and its key distinguishing characteristic is the adoption of the digital signature system,initially deployed by the Government of Lombardia, a Northern Italy Region, throughout the distribution of smart cards to all the healthcare and hospital staffs. The developed system is a web-based application with a proposed Health Records Digital Signature (HReDS) handshake to comply with the national law and with the Joint Commission International Standards. The prototype application, for a single hospital Operative Unit (OU), has focused on data and process management, related to drug therapy. Following a multi-faceted selection process, the Infective Disease OU of the Hospital in Busto Arsizio, Lombardia, was chosen for the development and prototype implementation. The project lead time, from user requirement analysis to training and deployment was approximately 8 months. This paper highlights the applied project methodology, the system architecture, and the achieved preliminary results.

  20. Development and design of a late-model fitness test instrument based on LabView

    NASA Astrophysics Data System (ADS)

    Xie, Ying; Wu, Feiqing

    2010-12-01

    Undergraduates are pioneers of China's modernization program and undertake the historic mission of rejuvenating our nation in the 21st century, whose physical fitness is vital. A smart fitness test system can well help them understand their fitness and health conditions, thus they can choose more suitable approaches and make practical plans for exercising according to their own situation. following the future trends, a Late-model fitness test Instrument based on LabView has been designed to remedy defects of today's instruments. The system hardware consists of fives types of sensors with their peripheral circuits, an acquisition card of NI USB-6251 and a computer, while the system software, on the basis of LabView, includes modules of user register, data acquisition, data process and display, and data storage. The system, featured by modularization and an open structure, is able to be revised according to actual needs. Tests results have verified the system's stability and reliability.

  1. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    PubMed

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.

  2. Spatiotemporal Patterns of Urban Human Mobility

    NASA Astrophysics Data System (ADS)

    Hasan, Samiul; Schneider, Christian M.; Ukkusuri, Satish V.; González, Marta C.

    2013-04-01

    The modeling of human mobility is adopting new directions due to the increasing availability of big data sources from human activity. These sources enclose digital information about daily visited locations of a large number of individuals. Examples of these data include: mobile phone calls, credit card transactions, bank notes dispersal, check-ins in internet applications, among several others. In this study, we consider the data obtained from smart subway fare card transactions to characterize and model urban mobility patterns. We present a simple mobility model for predicting peoples' visited locations using the popularity of places in the city as an interaction parameter between different individuals. This ingredient is sufficient to reproduce several characteristics of the observed travel behavior such as: the number of trips between different locations in the city, the exploration of new places and the frequency of individual visits of a particular location. Moreover, we indicate the limitations of the proposed model and discuss open questions in the current state of the art statistical models of human mobility.

  3. ShopSmart 4 Health – Protocol of a skills-based randomised controlled trial promoting fruit and vegetable consumption among socioeconomically disadvantaged women

    PubMed Central

    2013-01-01

    Background There is a need for evidence on the most effective and cost-effective approaches for promoting healthy eating among groups that do not meet dietary recommendations for good health, such as those with low incomes or experiencing socioeconomic disadvantage. This paper describes the ShopSmart 4 Health study, a randomised controlled trial conducted by Deakin University, Coles Supermarkets and the Heart Foundation, to investigate the effectiveness and cost-effectiveness of a skill-building intervention for promoting increased purchasing and consumption of fruits and vegetables amongst women of low socioeconomic position (SEP). Methods/design ShopSmart 4 Health employed a randomised controlled trial design. Women aged 18–60 years, holding a Coles store loyalty card, who shopped at Coles stores within socioeconomically disadvantaged neighbourhoods and met low-income eligibility criteria were invited to participate. Consenting women completed a baseline survey assessing food shopping and eating habits and food-related behaviours and attitudes. On receipt of their completed survey, women were randomised to either a skill-building intervention or a wait-list control condition. Intervention effects will be evaluated via self-completion surveys and using supermarket transaction sales data, collected at pre- and post-intervention and 6-month follow-up. An economic evaluation from a societal perspective using a cost-consequences approach will compare the costs and outcomes between intervention and control groups. Process evaluation will be undertaken to identify perceived value and effects of intervention components. Discussion This study will provide data to address the currently limited evidence base regarding the effectiveness and cost-effectiveness of skill-building intervention strategies aimed at increasing fruit and vegetable consumption among socioeconomically disadvantaged women, a target group at high risk of poor diets. Trial registration Current Controlled Trials ISRCTN48771770 PMID:23668896

  4. Representation of Cultural Role-Play for Training

    NASA Technical Reports Server (NTRS)

    Santarelli, Thomas; Pepe, Aaron; Rosenzweiz, Larry; Paulus, John; Yi, Ahn Na

    2010-01-01

    The Department of Defense (000) has successfully applied a number of methods for cultural familiarization training ranging from stand-up classroom training, to face-to-face live role-play, to so-called smart-cards. Recent interest has turned to the use of single and mUlti-player gaming technologies to augment these traditional methods of cultural familiarization. One such system, termed CulturePad, has been designed as a game-based role-play environment suitable for use in training and experimentation involving cultural roleplay scenarios. This paper describes the initial CulturePad effort focused on a literature review regarding the use of role-play for cultural training and a feasibility assessment of using a game-mediated environment for role-play. A small-scale pilot involving cultural experts was conducted to collect qualitative behavioral data comparing live role-play to game-mediated role-play in a multiplayer gaming engine.

  5. Packaging strategy for maximizing the performance of a screen printed piezoelectric energy harvester

    NASA Astrophysics Data System (ADS)

    Zhang, Z.; Zhu, D.; Tudor, M. J.; Beeby, S. P.

    2013-12-01

    This paper reports the extended design and simulation of a screen printed piezoelectric energy harvester. The proposed design was based on a previous credit card sized smart tag sensor node, and packages the power conditioning circuit in the free space above the tungsten proof mass layer. This approach enables electronic components to be mounted onto the cantilever beam, which provides additional weight at the tip of the cantilever structure. The design structure contains a T-shape cantilever beam with size of 47 mm × 30 mm × 0.85 mm which is fabricated using screen printing. ANSYS simulation results predict the revised architecture can generate 421.9 μW approximately twice of the RMS power produced by the original design along with a higher open-circuit RMS Voltage of 8.0 V while the resonant frequency is dropped to 53.4 Hz.

  6. "Smart pebble" designs for sediment transport monitoring

    NASA Astrophysics Data System (ADS)

    Valyrakis, Manousos; Alexakis, Athanasios; Pavlovskis, Edgars

    2015-04-01

    Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions.

  7. "Smart pebble" design for environmental monitoring applications

    NASA Astrophysics Data System (ADS)

    Valyrakis, Manousos; Pavlovskis, Edgars

    2014-05-01

    Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, while focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions. "Smart pebble" allows for a wider range of environmental sensors (e.g. for environmental/pollutant monitoring) to be incorporated so as to extend the range of its application, enabling accurate environmental monitoring which is required to ensure infrastructure resilience and preservation of ecological health.

  8. Improving computer security by health smart card.

    PubMed

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual national implementation of the CPS project and the introduction of new functions using electronic signatures and encryption.

  9. Big data, smart cities and city planning

    PubMed Central

    2013-01-01

    I define big data with respect to its size but pay particular attention to the fact that the data I am referring to is urban data, that is, data for cities that are invariably tagged to space and time. I argue that this sort of data are largely being streamed from sensors, and this represents a sea change in the kinds of data that we have about what happens where and when in cities. I describe how the growth of big data is shifting the emphasis from longer term strategic planning to short-term thinking about how cities function and can be managed, although with the possibility that over much longer periods of time, this kind of big data will become a source for information about every time horizon. By way of conclusion, I illustrate the need for new theory and analysis with respect to 6 months of smart travel card data of individual trips on Greater London’s public transport systems. PMID:29472982

  10. Big data, smart cities and city planning.

    PubMed

    Batty, Michael

    2013-11-01

    I define big data with respect to its size but pay particular attention to the fact that the data I am referring to is urban data, that is, data for cities that are invariably tagged to space and time. I argue that this sort of data are largely being streamed from sensors, and this represents a sea change in the kinds of data that we have about what happens where and when in cities. I describe how the growth of big data is shifting the emphasis from longer term strategic planning to short-term thinking about how cities function and can be managed, although with the possibility that over much longer periods of time, this kind of big data will become a source for information about every time horizon. By way of conclusion, I illustrate the need for new theory and analysis with respect to 6 months of smart travel card data of individual trips on Greater London's public transport systems.

  11. Study on the weighing system based on optical fiber Bragg grating

    NASA Astrophysics Data System (ADS)

    Wang, Xiaona; Yu, Qingxu; Li, Yefang

    2010-10-01

    The optical fiber sensor based on wavelength demodulation such as fiber Bragg grating(FBG), with merits of immunity to electromagnetic interference, low drift and high precision, has been widely used in many areas, such as structural health monitoring and smart materials, and the wavelength demodulation system was also studied widely. In the paper, a weighing system based on FBG was studied. The optical source is broadband Erbium-doped fiber ring laser with a spectral range of 1500~1600nm and optical power of 2mW; A Fabry-Perot Etalon with orientation precision of 1pm was adopted as real-time wavelength calibration for the swept laser; and multichannel high resolution simultaneous sampling card was used in the system to acquire sensing signals simultaneously, thus high-resolution and real-time calibration of sweep-wavelength can be achieved. The FBG was adhered to a cantilever beam and the Bragg wavelength was demodulated with the system. The weighing system was done after calibrated with standard weight. Experimental results show that the resolution of the weighing system is 0.5 g with a full scale of 2Kg.

  12. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    PubMed

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  13. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.

    PubMed

    Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung

    2017-01-01

    A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.

  14. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps

    PubMed Central

    Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han

    2017-01-01

    A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615

  15. WLC Preface

    NASA Astrophysics Data System (ADS)

    Miret, Josep M.; Sebé, Francesc

    Low-cost devices are the key component of several applications: RFID tags permit an automated supply chain management while smart cards are a secure means of storing cryptographic keys required for remote and secure authentication in e-commerce and e-government applications. These devices must be cheap in order to permit their cost-effective massive manufacturing and deployment. Unfortunately, their low cost limits their computational power. Other devices such as nodes of sensor networks suffer from an additional constraint, namely, their limited battery life. Secure applications designed for these devices cannot make use of classical cryptographic primitives designed for full-fledged computers.

  16. Comparative study of minutiae selection algorithms for ISO fingerprint templates

    NASA Astrophysics Data System (ADS)

    Vibert, B.; Charrier, C.; Le Bars, J.-M.; Rosenberger, C.

    2015-03-01

    We address the selection of fingerprint minutiae given a fingerprint ISO template. Minutiae selection plays a very important role when a secure element (i.e. a smart-card) is used. Because of the limited capability of computation and memory, the number of minutiae of a stored reference in the secure element is limited. We propose in this paper a comparative study of 6 minutiae selection methods including 2 methods from the literature and 1 like reference (No Selection). Experimental results on 3 fingerprint databases from the Fingerprint Verification Competition show their relative efficiency in terms of performance and computation time.

  17. Hacker tracking Security system for HMI

    NASA Astrophysics Data System (ADS)

    Chauhan, Rajeev Kumar

    2011-12-01

    Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.

  18. In vitro reconstitution of interactions in the CARD9 signalosome

    PubMed Central

    Park, Jin Hee; Choi, Jae Young; Mustafa, Mir Faisal; Park, Hyun Ho

    2017-01-01

    The caspase-associated recruitment domain (CARD)-containing protein 9 (CARD9) signalosome is composed of CARD9, B-cell CLL/lymphoma 10 (BCL10) and mucosa-associated lymphoid tissue lymphoma translocation protein 1 (MALT1). The CARD9 signalosome has been reported to exert critical functions in the immunoreceptor tyrosine-based activation motif-coupled receptor-mediated activation of myeloid cells, through nuclear factor-κB pathways during innate immunity processes. During CARD9 signalosome assembly, BCL10 has been revealed to function as an adaptor protein and to interact with CARD9 via CARD-CARD interactions; BCL10 also interacts with MALT1 via its C-terminal Ser/Thr-rich region and the first immunoglobulin domain of MALT1. The CARD9 signalosome is implicated in critical biological processes; however, its structural and biochemical characteristics have yet to be elucidated. In the present study, CARD9 and BCL10 CARDs were successfully purified and characterized, and their biochemical properties were investigated. In addition, CARD9-BCL10 complexes were reconstituted in vitro under low salt and pH conditions. Furthermore, based on structural modeling data, a scheme was proposed to describe the interactions between CARD9 and BCL10. This provides a further understanding of the mechanism of how the CARD9 signalosome may be assembled. PMID:28765954

  19. Assessing Semantic Knowledge Using Computer-Based and Paper-Based Media

    DTIC Science & Technology

    1992-01-01

    capitalized upon in this research. Computer-Based Assessment A computer-based game or test, FlashCards (Liggett & Federico, 1986), was adopt- ed and adapted...alterative forms did not have to be specifically or previously programmed as such. FlashCards is analogous to using real flash cards. That is, a...reflects their degree of confidence in their answer. Also, for each answer the student’s response latency is recorded and displayed. FlashCards quizzed

  20. A Mechanism for Anonymous Credit Card Systems

    NASA Astrophysics Data System (ADS)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  1. Onboard spectral imager data processor

    NASA Astrophysics Data System (ADS)

    Otten, Leonard J.; Meigs, Andrew D.; Franklin, Abraham J.; Sears, Robert D.; Robison, Mark W.; Rafert, J. Bruce; Fronterhouse, Donald C.; Grotbeck, Ronald L.

    1999-10-01

    Previous papers have described the concept behind the MightySat II.1 program, the satellite's Fourier Transform imaging spectrometer's optical design, the design for the spectral imaging payload, and its initial qualification testing. This paper discusses the on board data processing designed to reduce the amount of downloaded data by an order of magnitude and provide a demonstration of a smart spaceborne spectral imaging sensor. Two custom components, a spectral imager interface 6U VME card that moves data at over 30 MByte/sec, and four TI C-40 processors mounted to a second 6U VME and daughter card, are used to adapt the sensor to the spacecraft and provide the necessary high speed processing. A system architecture that offers both on board real time image processing and high-speed post data collection analysis of the spectral data has been developed. In addition to the on board processing of the raw data into a usable spectral data volume, one feature extraction technique has been incorporated. This algorithm operates on the basic interferometric data. The algorithm is integrated within the data compression process to search for uploadable feature descriptions.

  2. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  3. Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.

    PubMed

    Yau, Wei-Chuen; Phan, Raphael C-W

    2013-12-01

    Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.

  4. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702

  5. Prototype of smart office system using based security system

    NASA Astrophysics Data System (ADS)

    Prasetyo, T. F.; Zaliluddin, D.; Iqbal, M.

    2018-05-01

    Creating a new technology in the modern era gives a positive impact on business and industry. Internet of Things (IoT) as a new communication technology is very useful in realizing smart systems such as: smart home, smart office, smart parking and smart city. This study presents a prototype of the smart office system which was designed as a security system based on IoT. Smart office system development method used waterfall model. IoT-based smart office system used platform (project builder) cayenne so that. The data can be accessed and controlled through internet network from long distance. Smart office system used arduino mega 2560 microcontroller as a controller component. In this study, Smart office system is able to detect threats of dangerous objects made from metals, earthquakes, fires, intruders or theft and perform security monitoring outside the building by using raspberry pi cameras on autonomous robots in real time to the security guard.

  6. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    PubMed Central

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  7. Critical capacity, travel time delays and travel time distribution of rapid mass transit systems

    NASA Astrophysics Data System (ADS)

    Legara, Erika Fille; Monterola, Christopher; Lee, Kee Khoon; Hung, Gih Guang

    2014-07-01

    We set up a mechanistic agent-based model of a rapid mass transit system. Using empirical data from Singapore's unidentifiable smart fare card, we validate our model by reconstructing actual travel demand and duration of travel statistics. We subsequently use this model to investigate two phenomena that are known to significantly affect the dynamics within the RTS: (1) overloading in trains and (2) overcrowding in the RTS platform. We demonstrate that by varying the loading capacity of trains, a tipping point emerges at which an exponential increase in the duration of travel time delays is observed. We also probe the impact on the rail system dynamics of three types of passenger growth distribution across stations: (i) Dirac delta, (ii) uniform and (iii) geometric, which is reminiscent of the effect of land use on transport. Under the assumption of a fixed loading capacity, we demonstrate the dependence of a given origin-destination (OD) pair on the flow volume of commuters in station platforms.

  8. Architecture for distributed actuation and sensing using smart piezoelectric elements

    NASA Astrophysics Data System (ADS)

    Etienne-Cummings, Ralph; Pourboghrat, Farzad; Maruboyina, Hari K.; Abrate, Serge; Dhali, Shirshak K.

    1998-07-01

    We discuss vibration control of a cantilevered plate with multiple sensors and actuators. An architecture is chosen to minimize the number of control and sensing wires required. A custom VLSI chip, integrated with the sensor/actuator elements, controls the local behavior of the plate. All the actuators are addressed in parallel; local decode logic selects which actuator is stimulated. Downloaded binary data controls the applied voltage and modulation frequency for each actuator, and High Voltage MOSFETs are used to activate them. The sensors, which are independent adjacent piezoelectric ceramic elements, can be accessed in a random or sequential manner. An A/D card and GPIB interconnected test equipment allow a PC to read the sensors' outputs and dictate the actuation procedure. A visual programming environment is used to integrate the sensors, controller and actuators. Based on the constitutive relations for the piezoelectric material, simple models for the sensors and actuators are derived. A two level hierarchical robust controller is derived for motion control and for damping of vibrations.

  9. Research on the SIM card implementing functions of transport card

    NASA Astrophysics Data System (ADS)

    Li, Yi; Wang, Lin

    2015-12-01

    This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.

  10. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    PubMed

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  11. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2015-03-01

    The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.

  12. To err is human nature. Can transfusion errors due to human factors ever be eliminated?

    PubMed

    Lau, F Y; Cheng, G

    2001-11-01

    Fatal hemolytic transfusion reaction due to ABO incompatibility occurs mainly as a result of clerical errors. Blood sample drawn from the wrong patient and labeled as another patient's specimen will not be detected by the blood bank unless there is a previous ABO grouping result. In Hong Kong, we had designed a transfusion wristband system--portable barcode scanner system to detect such clerical errors. The system was well accepted by the house staff and had prevented two BO mismatched transfusion. Other current system of patient's identification may have similar results, but the wristband system has the advantages of being simple, inexpensive and easy to implement. The Hong Kong Government is planning to replace the personal identity card for all citizens with an electronic smart card by 2003. If the new card contains the person's detailed red cell phenotypes in digital code, then the phenotypes of all blood donors and admitted patients will be readily available. It is feasible to issue phenotype-matched blood to patients without any need of pre-transfusion testing, therefore eliminating mismatched transfusions for most patients. Our pilot study of 474 patients showed that the system was safe and up to 98% of admitted patients could be transfused without delays. Patients with rare phenotypes, visitors or illegal immigrants may still need pre-transfusion antibody screen, but if most patients can be issued blood units without testings, the potential savings in health care amount to US$14 million/year.

  13. Experimental demonstration of free-space based 120 Gb/s reconfigurable card-to-card optical interconnects.

    PubMed

    Wang, Ke; Nirmalathas, Ampalavanapillai; Lim, Christina; Skafidas, Efstratios; Alameh, Kamal

    2014-10-01

    In this Letter, we propose and experimentally demonstrate a free-space based reconfigurable card-to-card optical interconnect architecture with 16-carrierless-amplitude-phase modulation. Experimental results show that up to 120 Gb/s (3×40  Gb/s) flexible interconnection can be achieved for up to 30 cm distance with a worst-case receiver sensitivity of -9.70  dBm.

  14. Design of transnational mobile e-payment application based on SIM card

    NASA Astrophysics Data System (ADS)

    Qian, Tang; Zhen, Li

    2018-05-01

    Facing the stronger demands of transnational mobile communications and internet-based mobile wireless value-added services, the interconnection and interworking of multiple communication operators and their win-win cooperations become a crucial target in the new round of mobile economic development. Previous researches showed that mobile communications and value-add services are not only technical problems, but also more economic problems.we design a general oncard operating system based on SIM card that could be responsible for coordinating and distributing card hardware and software resources. These applications such as transnational mobile payment, consumption management and many other supplemented functions share the API interfaces, hardware and software resources provided by the operation system, although they are independent of each other. The layer structure of SIM card design not only greatly reduces the complexity of COS development, but also saves the most tense card resources and extends SIM cards applications.

  15. Smart Cutting Tools and Smart Machining: Development Approaches, and Their Implementation and Application Perspectives

    NASA Astrophysics Data System (ADS)

    Cheng, Kai; Niu, Zhi-Chao; Wang, Robin C.; Rakowski, Richard; Bateman, Richard

    2017-09-01

    Smart machining has tremendous potential and is becoming one of new generation high value precision manufacturing technologies in line with the advance of Industry 4.0 concepts. This paper presents some innovative design concepts and, in particular, the development of four types of smart cutting tools, including a force-based smart cutting tool, a temperature-based internally-cooled cutting tool, a fast tool servo (FTS) and smart collets for ultraprecision and micro manufacturing purposes. Implementation and application perspectives of these smart cutting tools are explored and discussed particularly for smart machining against a number of industrial application requirements. They are contamination-free machining, machining of tool-wear-prone Si-based infra-red devices and medical applications, high speed micro milling and micro drilling, etc. Furthermore, implementation techniques are presented focusing on: (a) plug-and-produce design principle and the associated smart control algorithms, (b) piezoelectric film and surface acoustic wave transducers to measure cutting forces in process, (c) critical cutting temperature control in real-time machining, (d) in-process calibration through machining trials, (e) FE-based design and analysis of smart cutting tools, and (f) application exemplars on adaptive smart machining.

  16. Thin Film Li Ion Microbatteries for NASA Applications

    NASA Technical Reports Server (NTRS)

    West, W. C.; Ratnakumar, B. V.; Brandon, E.; Blosiu, J. O.; Surampudi, S.

    1999-01-01

    Rechargeable thin film microbatteries have recently become the topic of widespread research for use in low power applications such as battery-backed CMOS memory, miniaturized implantable medical devices and smart cards. In particular, the Center for Integrated Space Microsystems (CISM) at NASA's Jet Propulsion Laboratory has interest in applying this technology for secondary power systems in miniaturized satellites, microsensors, microactuators and other remote MEMS applications. The general requirements of the microbatteries for these applications are high specific energy, wide range of temperature stability. low self-discharge rate, and flexibility of cell design. The thin film Li ion materials system using LiCoO2(LiPO(x)N(1-x))SnO is expected to fulfill these requirements.

  17. Spilt milk: an inter-sectoral partnership that failed to advance milk security for low-income lone mothers in Nova Scotia, Canada.

    PubMed

    McIntyre, Lynn; Glanville, N Theresa; Hilchie-Pye, Andrea

    2011-03-01

    Canadian agricultural policy supports higher milk prices. Consequently, poor families lack sufficient funds to purchase adequate quantities of milk. Low-income lone mothers in the Canadian province of Nova Scotia suggested their preferred strategies for improved access to milk. We then built inter-sectoral support for a policy intervention to address their recommendations. Our research-to-action process led to a policy dialogue focusing on an electronic smart card that would permit the delivery of lower-priced milk to poor households. While all agreed that milk insecurity was an important issue, the project ultimately failed because of the entrenched positions of influential stakeholder groups.

  18. Exit Cards: Creating a Dialogue for Continuous Evaluation

    ERIC Educational Resources Information Center

    Patka, Mazna; Wallin-Ruschman, Jennifer; Wallace, Tenille; Robbins, Candice

    2016-01-01

    This study explored the use of Exit Cards, which are formative evaluations of student knowledge and instruction undertaken at every class meeting. Its results are based on Exit Card data from two undergraduate research methods courses. Thematic analysis indicated that students used Exit Cards to communicate (1) what they learned, (2) challenges…

  19. [Electronic data records in primary health care and aspects of their development in Bosnia and Herzegovina].

    PubMed

    Novo, Ahmed; Masić, Izet; Toromanović, Selim; Karić, Mediha; Zunić, Lejla

    2004-01-01

    In Medical Informatics medical documentation and evidention are most probably the key areas. Also, in primary health care it is very important and part of daily activity of medical staff. Bosnia and Herzegovina is trying to be close to developed countries and to modernize and computerize current systems of documentation and to cross over from manual and semi manual methods to computerized medical data analysis. The most of European countries have developed standards and classification systems in primary health care for collecting, examination, analysis and interpretation of medical data assessed. One of possibilities as well as dilemma, which data carrier should be used for storage and manipulation of patient data in primary health care, is use of electronic medical record. Most of the South East European countries use chip or smart card and some of countries in neighborhood (Italy) choose laser card as patient data carrier. Both technologies have the advantages and disadvantages what was comprehensively colaborated by the authors in this paper, with intention to help experts who make decisions in this segment to create and to correctly influence on improvement of quality, correctness and accuracy of medical documentation in primary health care.

  20. Evaluation and comparison of FTA card and CTAB DNA extraction methods for non-agricultural taxa.

    PubMed

    Siegel, Chloe S; Stevenson, Florence O; Zimmer, Elizabeth A

    2017-02-01

    An efficient, effective DNA extraction method is necessary for comprehensive analysis of plant genomes. This study analyzed the quality of DNA obtained using paper FTA cards prepared directly in the field when compared to the more traditional cetyltrimethylammonium bromide (CTAB)-based extraction methods from silica-dried samples. DNA was extracted using FTA cards according to the manufacturer's protocol. In parallel, CTAB-based extractions were done using the automated AutoGen DNA isolation system. DNA quality for both methods was determined for 15 non-agricultural species collected in situ, by gel separation, spectrophotometry, fluorometry, and successful amplification and sequencing of nuclear and chloroplast gene markers. The FTA card extraction method yielded less concentrated, but also less fragmented samples than the CTAB-based technique. The card-extracted samples provided DNA that could be successfully amplified and sequenced. The FTA cards are also useful because the collected samples do not require refrigeration, extensive laboratory expertise, or as many hazardous chemicals as extractions using the CTAB-based technique. The relative success of the FTA card method in our study suggested that this method could be a valuable tool for studies in plant population genetics and conservation biology that may involve screening of hundreds of individual plants. The FTA cards, like the silica gel samples, do not contain plant material capable of propagation, and therefore do not require permits from the U.S. Department of Agriculture (USDA) Animal and Plant Health Inspection Service (APHIS) for transportation.

  1. One size fits all electronics for insole-based activity monitoring.

    PubMed

    Hegde, Nagaraj; Bries, Matthew; Melanson, Edward; Sazonov, Edward

    2017-07-01

    Footwear based wearable sensors are becoming prominent in many areas of monitoring health and wellness, such as gait and activity monitoring. In our previous research we introduced an insole based wearable system SmartStep, which is completely integrated in a socially acceptable package. From a manufacturing perspective, SmartStep's electronics had to be custom made for each shoe size, greatly complicating the manufacturing process. In this work we explore the possibility of making a universal electronics platform for SmartStep - SmartStep 3.0, which can be used in the most common insole sizes without modifications. A pilot human subject experiments were run to compare the accuracy between the one-size fits all (SmartStep 3.0) and custom size SmartStep 2.0. A total of ~10 hours of data was collected in the pilot study involving three participants performing different activities of daily living while wearing SmartStep 2.0 and SmartStep 3.0. Leave one out cross validation resulted in a 98.5% average accuracy from SmartStep 2.0, while SmartStep 3.0 resulted in 98.3% accuracy, suggesting that the SmartStep 3.0 can be as accurate as SmartStep 2.0, while fitting most common shoe sizes.

  2. MalaCards: an integrated compendium for diseases and their annotation

    PubMed Central

    Rappaport, Noa; Nativ, Noam; Stelzer, Gil; Twik, Michal; Guan-Golan, Yaron; Iny Stein, Tsippi; Bahir, Iris; Belinky, Frida; Morrey, C. Paul; Safran, Marilyn; Lancet, Doron

    2013-01-01

    Comprehensive disease classification, integration and annotation are crucial for biomedical discovery. At present, disease compilation is incomplete, heterogeneous and often lacking systematic inquiry mechanisms. We introduce MalaCards, an integrated database of human maladies and their annotations, modeled on the architecture and strategy of the GeneCards database of human genes. MalaCards mines and merges 44 data sources to generate a computerized card for each of 16 919 human diseases. Each MalaCard contains disease-specific prioritized annotations, as well as inter-disease connections, empowered by the GeneCards relational database, its searches and GeneDecks set analyses. First, we generate a disease list from 15 ranked sources, using disease-name unification heuristics. Next, we use four schemes to populate MalaCards sections: (i) directly interrogating disease resources, to establish integrated disease names, synonyms, summaries, drugs/therapeutics, clinical features, genetic tests and anatomical context; (ii) searching GeneCards for related publications, and for associated genes with corresponding relevance scores; (iii) analyzing disease-associated gene sets in GeneDecks to yield affiliated pathways, phenotypes, compounds and GO terms, sorted by a composite relevance score and presented with GeneCards links; and (iv) searching within MalaCards itself, e.g. for additional related diseases and anatomical context. The latter forms the basis for the construction of a disease network, based on shared MalaCards annotations, embodying associations based on etiology, clinical features and clinical conditions. This broadly disposed network has a power-law degree distribution, suggesting that this might be an inherent property of such networks. Work in progress includes hierarchical malady classification, ontological mapping and disease set analyses, striving to make MalaCards an even more effective tool for biomedical research. Database URL: http://www.malacards.org/ PMID:23584832

  3. Design and Use of Task Cards in the Reciprocal Style of Teaching

    ERIC Educational Resources Information Center

    Iserbyt, Peter; Byra, Mark

    2013-01-01

    Task cards are instructional tools that combine a picture of a skill with written instructions about how to perform the skill. This article provides practical guidelines for developing research-based task cards for use in physical education classes. Fitness-related motor skills are used as examples to clarify design principles for task cards. The…

  4. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data

    PubMed Central

    Zhong, Chen; Batty, Michael; Manley, Ed; Wang, Jiaqiu; Wang, Zijia; Chen, Feng; Schmitt, Gerhard

    2016-01-01

    To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more amenable. PMID:26872333

  5. Variability in Regularity: Mining Temporal Mobility Patterns in London, Singapore and Beijing Using Smart-Card Data.

    PubMed

    Zhong, Chen; Batty, Michael; Manley, Ed; Wang, Jiaqiu; Wang, Zijia; Chen, Feng; Schmitt, Gerhard

    2016-01-01

    To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more amenable.

  6. The Pivotal Role of the Parieto-Occipital Lobe in Card Game-Induced Reflex Epilepsy: A Voxel-Based Morphometry Study.

    PubMed

    Park, Kang Min; Kim, Sung Eun; Lee, Byung In

    2016-01-01

    The pathogenesis of card game-induced reflex epilepsy has not been determined so far. The aim of this study was to evaluate structural abnormalities using voxel-based morphometry (VBM) analysis, which may give some clue about the pathogenesis in card game-induced reflex epilepsy. The 3 subjects were diagnosed with card game-induced reflex epilepsy. Evaluation involved a structured interview to obtain clinical information and brain MRI. In VBM analysis, Statistical Parametric Mapping 8 running on the MATLAB platform was employed to analyze the structural differences between patients with card game-induced reflex epilepsy and age- and sex-matched control subjects. The results of VBM analysis revealed that patients with card game-induced reflex epilepsy had significantly increased gray matter volume in the right occipital and parietal lobe. However, there were no structures with decreased gray matter volume in patients with card game-induced reflex epilepsy compared with control subjects. In addition, we found that the patients with card game-induced reflex epilepsy had onset of seizures in adulthood rather than in adolescence, and all of the patients were men. The parieto-occipital lobes might be partially involved in the neuronal network responsible for card game-induced reflex epilepsy. © 2016 S. Karger AG, Basel.

  7. Introducing Teamwork Challenges in Simulation Using Game Cards.

    PubMed

    Chang, Todd P; Kwan, Karen Y; Liberman, Danica; Song, Eric; Dao, Eugene H; Chung, Dayun; Morton, Inge; Festekjian, Ara

    2015-08-01

    Poor teamwork and communication during resuscitations are linked to patient safety problems and poorer outcomes. We present a novel simulation-based educational intervention using game cards to introduce challenges in teamwork. This intervention uses sets of game cards that designate roles, limitations, or communication challenges designed to introduce common communication or teamwork problems. Game cards are designed to be applicable for any simulation-based scenario and are independent from patient physiology. In our example, participants were pediatric emergency medicine fellows undergoing simulation training for orientation. We describe the use of card sets in different scenarios with increasing teamwork challenge and difficulty. Both postscenario and summative debriefings were facilitated to allow participants to reflect on their performance and discover ways to apply their strategies to real resuscitations. In this article, we present our experience with the novel use of game cards to modify simulation scenarios to improve communication and teamwork skills.

  8. Data-nonintrusive photonics-based credit card verifier with a low false rejection rate.

    PubMed

    Sumriddetchkajorn, Sarun; Intaravanne, Yuttana

    2010-02-10

    We propose and experimentally demonstrate a noninvasive credit card verifier with a low false rejection rate (FRR). Our key idea is based on the use of three broadband light sources in our data-nonintrusive photonics-based credit card verifier structure, where spectral components of the embossed hologram images are registered as red, green, and blue. In this case, nine distinguishable variables are generated for a feed-forward neural network (FFNN). In addition, we investigate the center of mass of the image histogram projected onto the x axis (I(color)), making our system more tolerant of the intensity fluctuation of the light source. We also reduce the unwanted signals on each hologram image by simply dividing the hologram image into three zones and then calculating their corresponding I(color) values for red, green, and blue bands. With our proposed concepts, we implement our field test prototype in which three broadband white light light-emitting diodes (LEDs), a two-dimensional digital color camera, and a four-layer FFNN are used. Based on 249 genuine credit cards and 258 counterfeit credit cards, we find that the average of differences in I(color) values between genuine and counterfeit credit cards is improved by 1.5 times and up to 13.7 times. In this case, we can effectively verify credit cards with a very low FRR of 0.79%.

  9. Evolution of optically nondestructive and data-non-intrusive credit card verifiers

    NASA Astrophysics Data System (ADS)

    Sumriddetchkajorn, Sarun; Intaravanne, Yuttana

    2010-04-01

    Since the deployment of the credit card, the number of credit card fraud cases has grown rapidly with a huge amount of loss in millions of US dollars. Instead of asking more information from the credit card's holder or taking risk through payment approval, a nondestructive and data-non-intrusive credit card verifier is highly desirable before transaction begins. In this paper, we review optical techniques that have been proposed and invented in order to make the genuine credit card more distinguishable than the counterfeit credit card. Several optical approaches for the implementation of credit card verifiers are also included. In particular, we highlight our invention on a hyperspectral-imaging based portable credit card verifier structure that offers a very low false error rate of 0.79%. Other key features include low cost, simplicity in design and implementation, no moving part, no need of an additional decoding key, and adaptive learning.

  10. Evaluation and comparison of FTA card and CTAB DNA extraction methods for non-agricultural taxa1

    PubMed Central

    Siegel, Chloe S.; Stevenson, Florence O.; Zimmer, Elizabeth A.

    2017-01-01

    Premise of the study: An efficient, effective DNA extraction method is necessary for comprehensive analysis of plant genomes. This study analyzed the quality of DNA obtained using paper FTA cards prepared directly in the field when compared to the more traditional cetyltrimethylammonium bromide (CTAB)–based extraction methods from silica-dried samples. Methods: DNA was extracted using FTA cards according to the manufacturer’s protocol. In parallel, CTAB-based extractions were done using the automated AutoGen DNA isolation system. DNA quality for both methods was determined for 15 non-agricultural species collected in situ, by gel separation, spectrophotometry, fluorometry, and successful amplification and sequencing of nuclear and chloroplast gene markers. Results: The FTA card extraction method yielded less concentrated, but also less fragmented samples than the CTAB-based technique. The card-extracted samples provided DNA that could be successfully amplified and sequenced. The FTA cards are also useful because the collected samples do not require refrigeration, extensive laboratory expertise, or as many hazardous chemicals as extractions using the CTAB-based technique. Discussion: The relative success of the FTA card method in our study suggested that this method could be a valuable tool for studies in plant population genetics and conservation biology that may involve screening of hundreds of individual plants. The FTA cards, like the silica gel samples, do not contain plant material capable of propagation, and therefore do not require permits from the U.S. Department of Agriculture (USDA) Animal and Plant Health Inspection Service (APHIS) for transportation. PMID:28224056

  11. Color Coded Cards for Student Behavior Management in Higher Education Environments

    ERIC Educational Resources Information Center

    Alhalabi, Wadee; Alhalabi, Mobeen

    2017-01-01

    The Color Coded Cards system as a possibly effective class management tool is the focus of this research. The Color Coded Cards system involves each student being given a card with a specific color based on his or her behavior. The main objective of the research is to find out whether this system effectively improves students' behavior, thus…

  12. Validity Evidence for the Chinese Version Classroom Appraisal of Resources and Demands (CARD)

    ERIC Educational Resources Information Center

    Zhang, Juan; Wang, Chuang; Lambert, Richard; Wu, Chenggang; Wen, Hongbo

    2017-01-01

    The Classroom Appraisal of Resources and Demands (CARD) was designed to evaluate teacher stress based on subjective evaluations of classroom demands and resources. However, the CARD has been mostly utilized in western countries. The aim of the current study was to provide aspects of the validity of responses to a Chinese version of the CARD that…

  13. SMARTE: IMPROVING REVITALIZATION DECISIONS (BERLIN, GERMANY)

    EPA Science Inventory

    The U.S.-German Bilateral Working Group is developing Site-specific Management Approaches and Redevelopment Tools (SMART). In the U.S., the SMART compilation is housed in a web-based, decision support tool called SMARTe. All tools within SMARTe that are developed specifically for...

  14. OnCampus: a mobile platform towards a smart campus.

    PubMed

    Dong, Xin; Kong, Xiangjie; Zhang, Fulin; Chen, Zhen; Kang, Jialiang

    2016-01-01

    An increasing number of researchers and practitioners are working to develop smart cities. Considerable attention has been paid to the college campus as it is an important component of smart cities. Consequently, the question of how to construct a smart campus has become a topical one. Here, we propose a scheme that can facilitate the construction of a smart and friendly campus. We primarily focus on three aspects of smart campuses. These are: the formation of social circles based on interests mining, the provision of educational guidance based on emotion analysis of information posted on a platform, and development of a secondary trading platform aimed at optimizing the allocation of campus resources. Based on these objectives, we designed and implemented a mobile platform called OnCampus as the first step towards the development of a smart campus that has been introduced in some colleges. We found that OnCampus could successfully accomplish the three above mentioned functions of a smart campus.

  15. Concept of Smart Cyberspace for Smart Grid Implementation

    NASA Astrophysics Data System (ADS)

    Zhukovskiy, Y.; Malov, D.

    2018-05-01

    The concept of Smart Cyberspace for Smart Grid (SG) implementation is presented in the paper. The classification of electromechanical units, based on the amount of analysing data, the classification of electromechanical units, based on the data processing speed; and the classification of computational network organization, based on required resources, are proposed in this paper. The combination of the considered classifications is formalized, which can be further used in organizing and planning of SG.

  16. Unconditionally Secure Credit/Debit Card Chip Scheme and Physical Unclonable Function

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Entesari, Kamran; Granqvist, Claes-Göran; Kwan, Chiman

    The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).

  17. Long-term storage and safe retrieval of human papillomavirus DNA using FTA elute cards.

    PubMed

    Barth, Heidi; Morel, Adrien; Mougin, Christiane; Averous, Gerlinde; Legrain, Michèle; Fender, Muriel; Risch, Simone; Fafi-Kremer, Samira; Velten, Michel; Oudet, Pierre; Baldauf, Jean-Jacques; Stoll-Keller, Françoise

    2016-03-01

    Biobanking or collection and storage of specimens for future research purposes have become an essential tool in many fields of biomedical research and aims to provide a better understanding of disease mechanisms as well as the identification of disease-specific biomarkers that can navigate in complex diseases. In this study, we assessed the use of Flinders Technology Associates (FTA) cards as a long-term storage device for cervical specimens with suspected human papillomavirus (HPV) infections. HPV detection and genotyping results in liquid-based transport media were compared to HPV results from FTA cards. The overall agreement for the presence of any HPV infection between liquid-based medium and FTA cards stored for 1 year at ambient temperature was 100%. Reproducibility analysis of HPV detection and genotyping from FTA cards demonstrated that FTA cards are a reliable medium to store and preserve viral nucleic acids. Biobanking of cervical cells on FTA cards may provide a key resource for epidemiological and retrospective HPV studies. Copyright © 2015 Elsevier B.V. All rights reserved.

  18. Variables Influencing Credit Card Balances of Students at a Midwestern University

    ERIC Educational Resources Information Center

    Mattson, Lucretia; Sahlhoff, Kathleen; Blackstone, Judith; Peden, Blaine; Nahm, Abraham Y.

    2004-01-01

    This research used a Web-based survey of students at a Midwest regional university to measure the extent of credit card use by first-year students and seniors. The results indicate that the variables influencing credit card use and the carrying of a balance from one month to the next include the number of cards held by the student, the student's…

  19. Genic insights from integrated human proteomics in GeneCards.

    PubMed

    Fishilevich, Simon; Zimmerman, Shahar; Kohn, Asher; Iny Stein, Tsippi; Olender, Tsviya; Kolker, Eugene; Safran, Marilyn; Lancet, Doron

    2016-01-01

    GeneCards is a one-stop shop for searchable human gene annotations (http://www.genecards.org/). Data are automatically mined from ∼120 sources and presented in an integrated web card for every human gene. We report the application of recent advances in proteomics to enhance gene annotation and classification in GeneCards. First, we constructed the Human Integrated Protein Expression Database (HIPED), a unified database of protein abundance in human tissues, based on the publically available mass spectrometry (MS)-based proteomics sources ProteomicsDB, Multi-Omics Profiling Expression Database, Protein Abundance Across Organisms and The MaxQuant DataBase. The integrated database, residing within GeneCards, compares favourably with its individual sources, covering nearly 90% of human protein-coding genes. For gene annotation and comparisons, we first defined a protein expression vector for each gene, based on normalized abundances in 69 normal human tissues. This vector is portrayed in the GeneCards expression section as a bar graph, allowing visual inspection and comparison. These data are juxtaposed with transcriptome bar graphs. Using the protein expression vectors, we further defined a pairwise metric that helps assess expression-based pairwise proximity. This new metric for finding functional partners complements eight others, including sharing of pathways, gene ontology (GO) terms and domains, implemented in the GeneCards Suite. In parallel, we calculated proteome-based differential expression, highlighting a subset of tissues that overexpress a gene and subserving gene classification. This textual annotation allows users of VarElect, the suite's next-generation phenotyper, to more effectively discover causative disease variants. Finally, we define the protein-RNA expression ratio and correlation as yet another attribute of every gene in each tissue, adding further annotative information. The results constitute a significant enhancement of several GeneCards sections and help promote and organize the genome-wide structural and functional knowledge of the human proteome. Database URL:http://www.genecards.org/. © The Author(s) 2016. Published by Oxford University Press.

  20. SMARTE: SUSTAINABLE MANAGEMENT APPROACHES AND REVITALIZATION TOOLS-ELECTRONIC (BELFAST, IRELAND)

    EPA Science Inventory

    The U.S.-German Bilateral Working Group is developing Site-specific Management Approaches and Redevelopment Tools (SMART). In the U.S., the SMART compilation is housed in a web-based, decision support tool called SMARTe. All tools within SMARTe that are developed specifically for...

  1. Near-infrared diffuse reflection systems for chlorophyll content of tomato leaves measurement

    NASA Astrophysics Data System (ADS)

    Jiang, Huanyu; Ying, Yibin; Lu, Huishan

    2006-10-01

    In this study, two measuring systems for chlorophyll content of tomato leaves were developed based on near-infrared spectral techniques. The systems mainly consists of a FT-IR spectrum analyzer, optic fiber diffuses reflection accessories and data card. Diffuse reflectance of intact tomato leaves was measured by an optics fiber optic fiber diffuses reflection accessory and a smart diffuses reflection accessory. Calibration models were developed from spectral and constituent measurements. 90 samples served as the calibration sets and 30 samples served as the validation sets. Partial least squares (PLS) and principal component regression (PCR) technique were used to develop the prediction models by different data preprocessing. The best model for chlorophyll content had a high correlation efficient of 0.9348 and a low standard error of prediction RMSEP of 4.79 when we select full range (12500-4000 cm -1), MSC path length correction method by the log(1/R). The results of this study suggest that FT-NIR method can be feasible to detect chlorophyll content of tomato leaves rapidly and nondestructively.

  2. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-01-01

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012

  3. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  4. Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'.

    PubMed

    Islam, S K Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.

  5. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  6. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  7. Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’

    PubMed Central

    Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401

  8. RUASN: a robust user authentication framework for wireless sensor networks.

    PubMed

    Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae

    2011-01-01

    In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.

  9. The application of autostereoscopic display in smart home system based on mobile devices

    NASA Astrophysics Data System (ADS)

    Zhang, Yongjun; Ling, Zhi

    2015-03-01

    Smart home is a system to control home devices which are more and more popular in our daily life. Mobile intelligent terminals based on smart homes have been developed, make remote controlling and monitoring possible with smartphones or tablets. On the other hand, 3D stereo display technology developed rapidly in recent years. Therefore, a iPad-based smart home system adopts autostereoscopic display as the control interface is proposed to improve the userfriendliness of using experiences. In consideration of iPad's limited hardware capabilities, we introduced a 3D image synthesizing method based on parallel processing with Graphic Processing Unit (GPU) implemented it with OpenGL ES Application Programming Interface (API) library on IOS platforms for real-time autostereoscopic displaying. Compared to the traditional smart home system, the proposed system applied autostereoscopic display into smart home system's control interface enhanced the reality, user-friendliness and visual comfort of interface.

  10. Study of Smart Campus Development Using Internet of Things Technology

    NASA Astrophysics Data System (ADS)

    Widya Sari, Marti; Wahyu Ciptadi, Prahenusa; Hafid Hardyanto, R.

    2017-04-01

    This paper describes the development of smart campus using Internet of Things (IoT) technology. Through smart campus, it is possible that a campus is connected via online by the outside entity, so that the teaching approach based on technology can be conducted in real time. This research was conducted in smart education, smart parking and smart room. Observation and literature studies were applied as the research method with the related theme for the sake of system design of smart campus. The result of this research is the design of smart campus system that includes smart education development, smart parking and smart room with the sake of Universitas PGRI Yogyakarta as the case study.

  11. Department of the Navy Acquisition and Capabilities Guidebook

    DTIC Science & Technology

    2012-05-01

    Cost Estimates/Service Cost Position..................................... 5-1 5.1.2 Cost Analysis Requirements Description ( CARD ) 5-2 5.1.3...Description ( CARD ). 7. Satisfactory review of program health. 8. Concurrence with draft TDS, TES, and SEP. 9. Approval of full funding...Description ( CARD ) SECNAV M-5000.2 May 2012 5-3 Enclosure (1) A sound cost estimate is based on a well-defined program. The CARD is used

  12. Smartcards in Libraries: A Brave New World.

    ERIC Educational Resources Information Center

    Myhill, Martin

    1998-01-01

    Describes the University of Exeter (UK), Mondex, and NatWest UK smartcard-based campus card system project. Smartcards, wallet-sized plastic cards with microprocessors, interface with network terminal devices and are programmable as data, identity, and finance cards. International standard multiple operating system (MULTOS) increases current…

  13. Small-molecule inhibitors directly target CARD9 and mimic its protective variant in inflammatory bowel disease.

    PubMed

    Leshchiner, Elizaveta S; Rush, Jason S; Durney, Michael A; Cao, Zhifang; Dančík, Vlado; Chittick, Benjamin; Wu, Huixian; Petrone, Adam; Bittker, Joshua A; Phillips, Andrew; Perez, Jose R; Shamji, Alykhan F; Kaushik, Virendar K; Daly, Mark J; Graham, Daniel B; Schreiber, Stuart L; Xavier, Ramnik J

    2017-10-24

    Advances in human genetics have dramatically expanded our understanding of complex heritable diseases. Genome-wide association studies have identified an allelic series of CARD9 variants associated with increased risk of or protection from inflammatory bowel disease (IBD). The predisposing variant of CARD9 is associated with increased NF-κB-mediated cytokine production. Conversely, the protective variant lacks a functional C-terminal domain and is unable to recruit the E3 ubiquitin ligase TRIM62. Here, we used biochemical insights into CARD9 variant proteins to create a blueprint for IBD therapeutics and recapitulated the mechanism of the CARD9 protective variant using small molecules. We developed a multiplexed bead-based technology to screen compounds for disruption of the CARD9-TRIM62 interaction. We identified compounds that directly and selectively bind CARD9, disrupt TRIM62 recruitment, inhibit TRIM62-mediated ubiquitinylation of CARD9, and demonstrate cellular activity and selectivity in CARD9-dependent pathways. Taken together, small molecules targeting CARD9 illustrate a path toward improved IBD therapeutics. Published under the PNAS license.

  14. Exploring the critical quality attributes and models of smart homes.

    PubMed

    Ted Luor, Tainyi; Lu, Hsi-Peng; Yu, Hueiju; Lu, Yinshiu

    2015-12-01

    Research on smart homes has significantly increased in recent years owing to their considerably improved affordability and simplicity. However, the challenge is that people have different needs (or attitudes toward smart homes), and provision should be tailored to individuals. A few studies have classified the functions of smart homes. Therefore, the Kano model is first adopted as a theoretical base to explore whether the functional classifications of smart homes are attractive or necessary, or both. Second, three models and test user attitudes toward three function types of smart homes are proposed. Based on the Kano model, the principal results, namely, two "Attractive Quality" and nine "Indifferent Quality" items, are found. Verification of the hypotheses also indicates that the entertainment, security, and automation functions are significantly correlated with the variables "perceive useful" and "attitude." Cost consideration is negatively correlated with attitudes toward entertainment and automation. Results suggest that smart home providers should survey user needs for their product instead of merely producing smart homes based on the design of the builder or engineer. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  15. Reliability analysis in interdependent smart grid systems

    NASA Astrophysics Data System (ADS)

    Peng, Hao; Kan, Zhe; Zhao, Dandan; Han, Jianmin; Lu, Jianfeng; Hu, Zhaolong

    2018-06-01

    Complex network theory is a useful way to study many real complex systems. In this paper, a reliability analysis model based on complex network theory is introduced in interdependent smart grid systems. In this paper, we focus on understanding the structure of smart grid systems and studying the underlying network model, their interactions, and relationships and how cascading failures occur in the interdependent smart grid systems. We propose a practical model for interdependent smart grid systems using complex theory. Besides, based on percolation theory, we also study the effect of cascading failures effect and reveal detailed mathematical analysis of failure propagation in such systems. We analyze the reliability of our proposed model caused by random attacks or failures by calculating the size of giant functioning components in interdependent smart grid systems. Our simulation results also show that there exists a threshold for the proportion of faulty nodes, beyond which the smart grid systems collapse. Also we determine the critical values for different system parameters. In this way, the reliability analysis model based on complex network theory can be effectively utilized for anti-attack and protection purposes in interdependent smart grid systems.

  16. The relationship between standards-based reporting systems and third-grade mathematics and science achievement

    NASA Astrophysics Data System (ADS)

    Prejean-Harris, Rose M.

    Over the last decade, accountability has been the driving force for many changes in education in the United States. One major educational reform effort is the standards-based movement with a focus of combining a number of processes that involve aligning curriculum, instruction, assessment and feedback to specific standards that are measureable and indicative of student achievement. The purpose of this study is to determine if the type of report card is a possible predictor of third grade student achievement on standardized tests in mathematics and science for the 2012 Criterion-Referenced Competency Test (CRCT). The results of this study concluded that the difference in test scores in mathematics and science for students in the traditional report card group was not statistically significant when compared to the scores of students in the standards-based report card group when controlling for poverty level, school locale, and school district. However, students in the traditional report card group scored an average of 1.01 point higher in mathematics and 2.27 points higher in science than students in the standards-based report card group.

  17. Metacognitive components in smart learning environment

    NASA Astrophysics Data System (ADS)

    Sumadyo, M.; Santoso, H. B.; Sensuse, D. I.

    2018-03-01

    Metacognitive ability in digital-based learning process helps students in achieving learning goals. So that digital-based learning environment should make the metacognitive component as a facility that must be equipped. Smart Learning Environment is the concept of a learning environment that certainly has more advanced components than just a digital learning environment. This study examines the metacognitive component of the smart learning environment to support the learning process. A review of the metacognitive literature was conducted to examine the components involved in metacognitive learning strategies. Review is also conducted on the results of study smart learning environment, ranging from design to context in building smart learning. Metacognitive learning strategies certainly require the support of adaptable, responsive and personalize learning environments in accordance with the principles of smart learning. The current study proposed the role of metacognitive component in smart learning environment, which is useful as the basis of research in building environment in smart learning.

  18. Augmented reality application utility for aviation maintenance work instruction

    NASA Astrophysics Data System (ADS)

    Pourcho, John Bryan

    Current aviation maintenance work instructions do not display information effectively enough to prevent costly errors and safety concerns. Aircraft are complex assemblies of highly interrelated components that confound troubleshooting and can make the maintenance procedure difficult (Drury & Gramopadhye, 2001). The sophisticated nature of aircraft maintenance necessitates a revolutionized training intervention for aviation maintenance technicians (United States General Accounting Office, 2003). Quite simply, the paper based job task cards fall short of offering rapid access to technical data and the system or component visualization necessary for working on complex integrated aircraft systems. Possible solutions to this problem include upgraded standards for paper based task cards and the use of integrated 3D product definition used on various mobile platforms (Ropp, Thomas, Lee, Broyles, Lewin, Andreychek, & Nicol, 2013). Previous studies have shown that incorporation of 3D graphics in work instructions allow the user to more efficiently and accurately interpret maintenance information (Jackson & Batstone, 2008). For aircraft maintenance workers, the use of mobile 3D model-based task cards could make current paper task card standards obsolete with their ability to deliver relevant, synchronized information to and from the hangar. Unlike previous versions of 3D model-based definition task cards and paper task cards, which are currently used in the maintenance industry, 3D model based definition task cards have the potential to be more mobile and accessible. Utilizing augmented reality applications on mobile devices to seamlessly deliver 3D product definition on mobile devices could increase the efficiency, accuracy, and reduce the mental workload for technicians when performing maintenance tasks (Macchiarella, 2004). This proposal will serve as a literary review of the aviation maintenance industry, the spatial ability of maintenance technicians, and benefits of modern digital hardware to educate, point out gaps in research, and observe possible foundations on which to build the future of aviation maintenance job task cards leading to a the methodology of the proposed study.

  19. Procurement Cards Pave the Way to Efficient Purchasing.

    ERIC Educational Resources Information Center

    Enos, Eileen D.

    1999-01-01

    As educators battle restricted budgets, inflation, and enrollment changes, strategic sourcing management is replacing traditional transaction-based procurement. Procurement-card programs, allowing organizations to use credit cards for small purchases or low-value items, save time and enhance controls over merchants, credit limits, issuance limits,…

  20. 75 FR 61470 - Smart One Energy, LLC; Supplemental Notice That Initial Market-Based Rate Filing Includes Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-05

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. ER10-2943-000] Smart One Energy, LLC; Supplemental Notice That Initial Market- Based Rate Filing Includes Request for Blanket... proceeding of Smart One Energy, LLC's application for market-based rate authority, with an accompanying rate...

  1. Automated Clinical Assessment from Smart home-based Behavior Data

    PubMed Central

    Dawadi, Prafulla Nath; Cook, Diane Joyce; Schmitter-Edgecombe, Maureen

    2016-01-01

    Smart home technologies offer potential benefits for assisting clinicians by automating health monitoring and well-being assessment. In this paper, we examine the actual benefits of smart home-based analysis by monitoring daily behaviour in the home and predicting standard clinical assessment scores of the residents. To accomplish this goal, we propose a Clinical Assessment using Activity Behavior (CAAB) approach to model a smart home resident’s daily behavior and predict the corresponding standard clinical assessment scores. CAAB uses statistical features that describe characteristics of a resident’s daily activity performance to train machine learning algorithms that predict the clinical assessment scores. We evaluate the performance of CAAB utilizing smart home sensor data collected from 18 smart homes over two years using prediction and classification-based experiments. In the prediction-based experiments, we obtain a statistically significant correlation (r = 0.72) between CAAB-predicted and clinician-provided cognitive assessment scores and a statistically significant correlation (r = 0.45) between CAAB-predicted and clinician-provided mobility scores. Similarly, for the classification-based experiments, we find CAAB has a classification accuracy of 72% while classifying cognitive assessment scores and 76% while classifying mobility scores. These prediction and classification results suggest that it is feasible to predict standard clinical scores using smart home sensor data and learning-based data analysis. PMID:26292348

  2. Application of an artificial neural network to pump card diagnosis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashenayi, K.; Lea, J.F.; Kemp, F.

    1994-12-01

    Beam pumping is the most frequently used artificial-lift technique for oil production. Downhole pump cards are used to evaluate performance of the pumping unit. Pump cards can be generated from surface dynamometer cards using a 1D wave equation with viscous damping, as suggested by Gibbs and Neely. Pump cards contain significant information describing the behavior of the pump. However, interpretation of these cards is tedious and time-consuming; hence, an automated system capable of interpreting these cards could speed interpretation and warn of pump failures. This work presents the results of a DOS-based computer program capable of correctly classifying pump cards.more » The program uses a hybrid artificial neural network (ANN) to identify significant features of the pump card. The hybrid ANN uses classical and sinusoidal perceptrons. The network is trained using an error-back-propagation technique. The program correctly identified pump problems for more than 180 different training and test pump cards. The ANN takes a total of 80 data points as input. Sixty data points are collected from the pump card perimeter, and the remaining 20 data points represent the slope at selected points on the pump card perimeter. Pump problem conditions are grouped into 11 distinct classes. The network is capable of identifying one or more of these problem conditions for each pump card. Eight examples are presented and discussed.« less

  3. Smart learning services based on smart cloud computing.

    PubMed

    Kim, Svetlana; Song, Su-Mi; Yoon, Yong-Ik

    2011-01-01

    Context-aware technologies can make e-learning services smarter and more efficient since context-aware services are based on the user's behavior. To add those technologies into existing e-learning services, a service architecture model is needed to transform the existing e-learning environment, which is situation-aware, into the environment that understands context as well. The context-awareness in e-learning may include the awareness of user profile and terminal context. In this paper, we propose a new notion of service that provides context-awareness to smart learning content in a cloud computing environment. We suggest the elastic four smarts (E4S)--smart pull, smart prospect, smart content, and smart push--concept to the cloud services so smart learning services are possible. The E4S focuses on meeting the users' needs by collecting and analyzing users' behavior, prospecting future services, building corresponding contents, and delivering the contents through cloud computing environment. Users' behavior can be collected through mobile devices such as smart phones that have built-in sensors. As results, the proposed smart e-learning model in cloud computing environment provides personalized and customized learning services to its users.

  4. Smart Learning Services Based on Smart Cloud Computing

    PubMed Central

    Kim, Svetlana; Song, Su-Mi; Yoon, Yong-Ik

    2011-01-01

    Context-aware technologies can make e-learning services smarter and more efficient since context-aware services are based on the user’s behavior. To add those technologies into existing e-learning services, a service architecture model is needed to transform the existing e-learning environment, which is situation-aware, into the environment that understands context as well. The context-awareness in e-learning may include the awareness of user profile and terminal context. In this paper, we propose a new notion of service that provides context-awareness to smart learning content in a cloud computing environment. We suggest the elastic four smarts (E4S)—smart pull, smart prospect, smart content, and smart push—concept to the cloud services so smart learning services are possible. The E4S focuses on meeting the users’ needs by collecting and analyzing users’ behavior, prospecting future services, building corresponding contents, and delivering the contents through cloud computing environment. Users’ behavior can be collected through mobile devices such as smart phones that have built-in sensors. As results, the proposed smart e-learning model in cloud computing environment provides personalized and customized learning services to its users. PMID:22164048

  5. Organizational, Cultural, and Psychological Determinants of Smart Infusion Pump Work Arounds: A Study of 3 U.S. Health Systems.

    PubMed

    Dunford, Benjamin B; Perrigino, Matthew; Tucker, Sharon J; Gaston, Cynthia L; Young, Jim; Vermace, Beverly J; Walroth, Todd A; Buening, Natalie R; Skillman, Katherine L; Berndt, Dawn

    2017-09-01

    We investigated nurse perceptions of smart infusion medication pumps to provide evidence-based insights on how to help reduce work around and improve compliance with patient safety policies. Specifically, we investigated the following 3 research questions: (1) What are nurses' current attitudes about smart infusion pumps? (2) What do nurses think are the causes of smart infusion pump work arounds? and (3) To whom do nurses turn for smart infusion pump training and troubleshooting? We surveyed a large number of nurses (N = 818) in 3 U.S.-based health care systems to address the research questions above. We assessed nurses' opinions about smart infusion pumps, organizational perceptions, and the reasons for work arounds using a voluntary and anonymous Web-based survey. Using qualitative research methods, we coded open-ended responses to questions about the reasons for work arounds to organize responses into useful categories. The nurses reported widespread satisfaction with smart infusion pumps. However, they reported numerous organizational, cultural, and psychological causes of smart pump work arounds. Of 1029 open-ended responses to the question "why do smart pump work arounds occur?" approximately 44% of the causes were technology related, 47% were organization related, and 9% were related to individual factors. Finally, an overwhelming majority of nurses reported seeking solutions to smart pump problems from coworkers and being trained primarily on the job. Hospitals may significantly improve adherence to smart pump safety features by addressing the nontechnical causes of work arounds and by providing more leadership and formalized training for resolving smart pump-related problems.

  6. Automated Cognitive Health Assessment From Smart Home-Based Behavior Data.

    PubMed

    Dawadi, Prafulla Nath; Cook, Diane Joyce; Schmitter-Edgecombe, Maureen

    2016-07-01

    Smart home technologies offer potential benefits for assisting clinicians by automating health monitoring and well-being assessment. In this paper, we examine the actual benefits of smart home-based analysis by monitoring daily behavior in the home and predicting clinical scores of the residents. To accomplish this goal, we propose a clinical assessment using activity behavior (CAAB) approach to model a smart home resident's daily behavior and predict the corresponding clinical scores. CAAB uses statistical features that describe characteristics of a resident's daily activity performance to train machine learning algorithms that predict the clinical scores. We evaluate the performance of CAAB utilizing smart home sensor data collected from 18 smart homes over two years. We obtain a statistically significant correlation ( r=0.72) between CAAB-predicted and clinician-provided cognitive scores and a statistically significant correlation ( r=0.45) between CAAB-predicted and clinician-provided mobility scores. These prediction results suggest that it is feasible to predict clinical scores using smart home sensor data and learning-based data analysis.

  7. Carded Tow Real-Time Color Assessment: A Spectral Camera-Based System.

    PubMed

    Furferi, Rocco; Governi, Lapo; Volpe, Yary; Carfagni, Monica

    2016-08-31

    One of the most important parameters to be controlled during the production of textile yarns obtained by mixing pre-colored fibers, is the color correspondence between the manufactured yarn and a given reference, usually provided by a designer or a customer. Obtaining yarns from raw pre-colored fibers is a complex manufacturing process entailing a number of steps such as laboratory sampling, color recipe corrections, blowing, carding and spinning. Carding process is the one devoted to transform a "fuzzy mass" of tufted fibers into a regular mass of untwisted fibers, named "tow". During this process, unfortunately, the correspondence between the color of the tow and the target one cannot be assured, thus leading to yarns whose color differs from the one used for reference. To solve this issue, the main aim of this work is to provide a system able to perform a spectral camera-based real-time measurement of a carded tow, to assess its color correspondence with a reference carded fabric and, at the same time, to monitor the overall quality of the tow during the carding process. Tested against a number of differently colored carded fabrics, the proposed system proved its effectiveness in reliably assessing color correspondence in real-time.

  8. Feasibility and accuracy evaluation of three human papillomavirus assays for FTA card-based sampling: a pilot study in cervical cancer screening.

    PubMed

    Wang, Shao-Ming; Hu, Shang-Ying; Chen, Wen; Chen, Feng; Zhao, Fang-Hui; He, Wei; Ma, Xin-Ming; Zhang, Yu-Qing; Wang, Jian; Sivasubramaniam, Priya; Qiao, You-Lin

    2015-11-04

    Liquid-state specimen carriers are inadequate for sample transportation in large-scale screening projects in low-resource settings, which necessitates the exploration of novel non-hazardous solid-state alternatives. Studies investigating the feasibility and accuracy of a solid-state human papillomavirus (HPV) sampling medium in combination with different down-stream HPV DNA assays for cervical cancer screening are needed. We collected two cervical specimens from 396 women, aged 25-65 years, who were enrolled in a cervical cancer screening trial. One sample was stored using DCM preservative solution and the other was applied to a Whatman Indicating FTA Elute® card (FTA card). All specimens were processed using three HPV testing methods, including Hybrid capture 2 (HC2), careHPV™, and Cobas®4800 tests. All the women underwent a rigorous colposcopic evaluation that included using a microbiopsy protocol. Compared to the liquid-based carrier, the FTA card demonstrated comparable sensitivity for detecting high grade Cervical Intraepithelial Neoplasia (CIN) using HC2 (91.7 %), careHPV™ (83.3 %), and Cobas®4800 (91.7 %) tests. Moreover, the FTA card showed a higher specificity compared to a liquid-based carrier for HC2 (79.5 % vs. 71.6 %, P = 0.015), comparable specificity for careHPV™ (78.1 % vs. 73.0 %, P > 0.05), but lower specificity for the Cobas®4800 test (62.4 % vs. 69.9 %, P = 0.032). Generally, the FTA card-based sampling medium's accuracy was comparable with that of liquid-based medium for the three HPV testing assays. FTA cards are a promising sample carrier for cervical cancer screening. With further optimization, it can be utilized for HPV testing in areas of varying economic development.

  9. Community-based asthma care: trial of a "credit card" asthma self-management plan.

    PubMed

    D'Souza, W; Crane, J; Burgess, C; Te Karu, H; Fox, C; Harper, M; Robson, B; Howden-Chapman, P; Crossland, L; Woodman, K

    1994-07-01

    Although asthma self-management plans are widely recommended as essential in the long-term treatment of adult asthma, there have been few studies examining their use. Our objective was to assess the effect of a "credit card" adult asthma self-management plan in a community experiencing major health problems from asthma, by means of a before and after intervention trial of the efficacy of the "credit card" plan, when introduced through community-based asthma clinics. The participants were 69 Maori people with asthma. The "credit card" plan consisted of written guidelines for the self-management of asthma, based on self-assessment of asthma severity, printed on a plastic card. On one side, management guidelines were based on the interpretation of peak expiratory flow rate (PEFR) recordings, whilst the reverse side was based on symptoms. The outcome measures used were before and after comparison of markers of asthma morbidity and requirement for acute medical treatment; and a structured questionnaire assessing the acceptability and use of the credit card plan. Following the introduction of the plan, the mean PEFR increased from 347 to 389 l.min-1, the percentage of nights woken fell from 30.4 to 16.9%, and the number of days "out of action" fell from 3.8 to 1.7%. The requirements for acute medical treatment also fell during the intervention period. Most participants commented favourably on the content and usefulness of the plan. In the situation of worsening asthma, 28% of subjects found the peak flow side of the card most helpful, 7% the symptoms side, and 48% found both sides equally helpful.(ABSTRACT TRUNCATED AT 250 WORDS)

  10. Silicon on insulator achieved using electrochemical etching

    DOEpatents

    McCarthy, A.M.

    1997-10-07

    Bulk crystalline silicon wafers are transferred after the completion of circuit fabrication to form thin films of crystalline circuitry on almost any support, such as metal, semiconductor, plastic, polymer, glass, wood, and paper. In particular, this technique is suitable to form silicon-on-insulator (SOI) wafers, whereby the devices and circuits formed exhibit superior performance after transfer due to the removal of the silicon substrate. The added cost of the transfer process to conventional silicon fabrication is insignificant. No epitaxial, lift-off, release or buried oxide layers are needed to perform the transfer of single or multiple wafers onto support members. The transfer process may be performed at temperatures of 50 C or less, permits transparency around the circuits and does not require post-transfer patterning. Consequently, the technique opens up new avenues for the use of integrated circuit devices in high-brightness, high-resolution video-speed color displays, reduced-thickness increased-flexibility intelligent cards, flexible electronics on ultrathin support members, adhesive electronics, touch screen electronics, items requiring low weight materials, smart cards, intelligent keys for encryption systems, toys, large area circuits, flexible supports, and other applications. The added process flexibility also permits a cheap technique for increasing circuit speed of market driven technologies such as microprocessors at little added expense. 57 figs.

  11. Silicon on insulator achieved using electrochemical etching

    DOEpatents

    McCarthy, Anthony M.

    1997-01-01

    Bulk crystalline silicon wafers are transferred after the completion of circuit fabrication to form thin films of crystalline circuitry on almost any support, such as metal, semiconductor, plastic, polymer, glass, wood, and paper. In particular, this technique is suitable to form silicon-on-insulator (SOI) wafers, whereby the devices and circuits formed exhibit superior performance after transfer due to the removal of the silicon substrate. The added cost of the transfer process to conventional silicon fabrication is insignificant. No epitaxial, lift-off, release or buried oxide layers are needed to perform the transfer of single or multiple wafers onto support members. The transfer process may be performed at temperatures of 50.degree. C. or less, permits transparency around the circuits and does not require post-transfer patterning. Consequently, the technique opens up new avenues for the use of integrated circuit devices in high-brightness, high-resolution video-speed color displays, reduced-thickness increased-flexibility intelligent cards, flexible electronics on ultrathin support members, adhesive electronics, touch screen electronics, items requiring low weight materials, smart cards, intelligent keys for encryption systems, toys, large area circuits, flexible supports, and other applications. The added process flexibility also permits a cheap technique for increasing circuit speed of market driven technologies such as microprocessors at little added expense.

  12. IR Cards: Inquiry-Based Introduction to Infrared Spectroscopy

    ERIC Educational Resources Information Center

    Bennett, Jacqueline; Forster, Tabetha

    2010-01-01

    As infrared spectroscopy (IR) is frequently used in undergraduate organic chemistry courses, an inductive introduction to IR spectroscopy that uses index cards printed with spectra, structures, and chemical names is described. Groups of students are given an alphabetized deck of these "IR cards" to sort into functional groups. The students then…

  13. An Excel-lent Card Trick

    ERIC Educational Resources Information Center

    Zullo, Holly S.

    2011-01-01

    Card tricks based on mathematical principles can be a great way to get students interested in exploring some important mathematical ideas. In this article, the author discusses a simple spreadsheet implementation that shows students why the card trick works and allows them to explore several variations. As an added bonus, students are introduced…

  14. 12 CFR 226.59 - Reevaluation of rate increases.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and... to a credit card account under an open-end (not home-secured) consumer credit plan, based on the... new credit card accounts under an open-end (not home-secured) consumer credit plan. (2) Rate increases...

  15. 12 CFR 226.59 - Reevaluation of rate increases.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and... to a credit card account under an open-end (not home-secured) consumer credit plan, based on the... new credit card accounts under an open-end (not home-secured) consumer credit plan. (2) Rate increases...

  16. An evaluation of clinical performance of FTA cards for HPV 16/18 detection using cobas 4800 HPV Test compared to dry swab and liquid medium.

    PubMed

    Dong, Li; Lin, Chunqing; Li, Li; Wang, Margaret; Cui, Jianfeng; Feng, Ruimei; Liu, Bin; Wu, Zeni; Lian, Jia; Liao, Guangdong; Chen, Wen; Qiao, Youlin

    2017-09-01

    Effective dry storage and transport media as an alternative to conventional liquid-based medium would facilitate the accessibility of women in the low-resource settings to human papillomavirus (HPV)- based cervical cancer screening. To evaluate analytical and clinical performance of indicating FTA™ Elute Cartridge (FTA card) for the detection of HPV16/18 and cervical precancerous lesions and cancer compared to dry swab and liquid medium. Ninety patients with abnormal cytology and/or HPV infection were included for analysis. Three specimens of cervical exfoliated cells from each woman were randomly collected by FTA card, dry swab or liquid-based medium prior to colposcopy examination. The subsequent HPV DNA tests were performed on cobas 4800 HPV platform. High-risk HPV (hrHPV) positivity rate was 63.3%, 62.2% and 65.6% for samples collected by FTA card, dry swab and liquid medium, respectively. The overall agreements and kappa values for the detection of hrHPV, HPV 16 and HPV 18 between FTA card and liquid-based medium were 88.9% (κ=0.76), 97.8% (κ=0.94) and 100% (κ=1.0),respectively; between FTA card and dry swab were 92.1% (κ=0.83), 94.5% (κ=0.87) and 100% (κ=1.0), respectively. The performances of hrHPV tested by FTA card, dry swab, and liquid-based medium for detecting CIN2+ were comparable in terms of the sensitivity and specificity. The specificity of detection of CIN2+ by HPV16/18 increased by approximately 40% compared to hrHPV for any medium albeit at cost of a moderate loss of sensitivity. Dry medium might offer an alternative to conventional liquid-based medium in the HPV-based cervical cancer screening program especially in low-resource settings but still needs further evaluation. Copyright © 2017. Published by Elsevier B.V.

  17. The use of FTA cards for preserving unfixed cytological material for high-throughput molecular analysis.

    PubMed

    Saieg, Mauro Ajaj; Geddie, William R; Boerner, Scott L; Liu, Ni; Tsao, Ming; Zhang, Tong; Kamel-Reid, Suzanne; da Cunha Santos, Gilda

    2012-06-25

    Novel high-throughput molecular technologies have made the collection and storage of cells and small tissue specimens a critical issue. The FTA card provides an alternative to cryopreservation for biobanking fresh unfixed cells. The current study compared the quality and integrity of the DNA obtained from 2 types of FTA cards (Classic and Elute) using 2 different extraction protocols ("Classic" and "Elute") and assessed the feasibility of performing multiplex mutational screening using fine-needle aspiration (FNA) biopsy samples. Residual material from 42 FNA biopsies was collected in the cards (21 Classic and 21 Elute cards). DNA was extracted using the Classic protocol for Classic cards and both protocols for Elute cards. Polymerase chain reaction for p53 (1.5 kilobase) and CARD11 (500 base pair) was performed to assess DNA integrity. Successful p53 amplification was achieved in 95.2% of the samples from the Classic cards and in 80.9% of the samples from the Elute cards using the Classic protocol and 28.5% using the Elute protocol (P = .001). All samples (both cards) could be amplified for CARD11. There was no significant difference in the DNA concentration or 260/280 purity ratio when the 2 types of cards were compared. Five samples were also successfully analyzed by multiplex MassARRAY spectrometry, with a mutation in KRAS found in 1 case. High molecular weight DNA was extracted from the cards in sufficient amounts and quality to perform high-throughput multiplex mutation assays. The results of the current study also suggest that FTA Classic cards preserve better DNA integrity for molecular applications compared with the FTA Elute cards. Copyright © 2012 American Cancer Society.

  18. National Aerospace Planning Process Enhancements: Analysis and Innovation

    DTIC Science & Technology

    2014-03-01

    and backward in time). Asset availability awareness is described based on “Dashboard” and “Magnet’s Grid” visualizations. A “Hockey Card ” metaphor...Magnets Grid” strategy for detailed visualization of air assets (i.e. aircraft). Sections 4.3.4 through 4.3.4.1 propose “Mission Hockey Cards ” to...missions). These three options are presented to the users as three rows of Mission Hockey Cards , with one Card for each new mission and for each

  19. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    PubMed Central

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023

  20. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    PubMed

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  1. High-speed free-space based reconfigurable card-to-card optical interconnects with broadcast capability.

    PubMed

    Wang, Ke; Nirmalathas, Ampalavanapillai; Lim, Christina; Skafidas, Efstratios; Alameh, Kamal

    2013-07-01

    In this paper, we propose and experimentally demonstrate a free-space based high-speed reconfigurable card-to-card optical interconnect architecture with broadcast capability, which is required for control functionalities and efficient parallel computing applications. Experimental results show that 10 Gb/s data can be broadcast to all receiving channels for up to 30 cm with a worst-case receiver sensitivity better than -12.20 dBm. In addition, arbitrary multicasting with the same architecture is also investigated. 10 Gb/s reconfigurable point-to-point link and multicast channels are simultaneously demonstrated with a measured receiver sensitivity power penalty of ~1.3 dB due to crosstalk.

  2. Personal medical information system using laser card

    NASA Astrophysics Data System (ADS)

    Cho, Seong H.; Kim, Keun Ho; Choi, Hyung-Sik; Park, Hyun Wook

    1996-04-01

    The well-known hospital information system (HIS) and the picture archiving and communication system (PACS) are typical applications of multimedia to medical area. This paper proposes a personal medical information save-and-carry system using a laser card. This laser card is very useful, especially in emergency situations, because the medical information in the laser card can be read at anytime and anywhere if there exists a laser card reader/writer. The contents of the laser card include the clinical histories of a patient such as clinical chart, exam result, diagnostic reports, images, and so on. The purpose of this system is not a primary diagnosis, but emergency reference of clinical history of the patient. This personal medical information system consists of a personal computer integrated with laser card reader/writer, color frame grabber, color CCD camera and a high resolution image scanner optionally. Window-based graphical user interface was designed for easy use. The laser card has relatively sufficient capacity to store the personal medical information, and has fast access speed to restore and load the data with a portable size as compact as a credit card. Database items of laser card provide the doctors with medical data such as laser card information, patient information, clinical information, and diagnostic result information.

  3. Printable organic and inorganic materials for flexible electrochemical devices

    NASA Astrophysics Data System (ADS)

    Wojcik, Pawel Jerzy

    The growing demand of consumer printed electronics such as smart cards, smart packaging, automotive displays, electronic paper and others led to the increased interest in fully printed electrochemical devices. These components are expected to be developed based on printed thin films derived from cheap and widely accessible compounds. This dissertation presents the long stretch of technical research that was performed to realize printed energy efficient concepts such as electrochromic displays and smart-windows. Within this broad theme, the presented study had a number of specific objectives, however, the overall aim was to develop low-cost material systems (i.e. printable mixtures) at a lab-scale, which would be compatible with large-scale roll-to-roll processing. Presented results concern three main topics: (i) dual-phase inorganic electrochromic material processed at low temperature, (ii) enhancement in electrochromic performance via metaloxide nanoparticles engineering, and (iii) highly conductive and mechanically stable solid-state electrolyte. First two topics are related to crystallographic structure of metal-oxide films derived from sol-gel precursor, which is shown to be critical for electrochemical performance. The proposed method of microstructure control enables development of electrochromic films which outperform their amorphous or nanocrystalline analogues presented in the state-of-the-art due to their superior chemical and physical properties. Developed materials and processes resulted in electrochemical devices exhibiting optical density on the level of 0.82 and switching time shorter than 3 seconds, reaching performance at practical level. Third topic concerns a new concept of solid state electrolyte based on plastic crystal doped with lithium salt, dispersed in a thermosetting polymer resin network. This soft matter printable electrolyte meets requirements for electrochromic applications, exhibiting ionic conductivities of 10. -6 - 10. -4 S cm-1 at ambient temperature, Young'sModulus in the range of 0.1 - 1.4 MPa and operational temperature up to 115°C. In order to extract information from massive computational data, model developed material systems and optimize composition, an efficient mathematical methodology based on statistical techniques was applied. This approach significantly reduces the number of experiments to be realized, while maintaining a high accuracy of the analysis. Using this approach the number of experiments has been reduced from 162 down to 30 in case of dual-phase electrochromic films, and from 729 down to 28 in study on solid-state electrolyte (when comparing to classical three-level full factorial approach). Coupling of statistical methods with formulation of electrochemically active materials shows the potential to maximize the capabilities of these systems.

  4. Evaluation of using ferrofluid as an interface material for a field-reversible thermal connector

    NASA Astrophysics Data System (ADS)

    Yousif, Ahmed S.

    The electrical functionality of an avionics chassis is limited due to heat dissipation limits. The limits arise due to the fact that components in an avionic computer boxes are packed very compactly, with the components mounted onto plug-in cards, and the harsh environment experienced by the chassis limits how heat can be dissipated from the cards. Convective and radiative heat transfer to the ambient are generally not possible. Therefore it is necessary to have heat transferred from the components conducted to the edge of the plug-in cards. The heat then needs to conduct from the card edge to a cold block that not only holds the card in place, but also removes the generated heat by some heat transfer fluid that is circulated through the cold block. The interface between the plug-in card and the cold block typically has a high thermal resistance since it is necessary for the card to have the capability to be re-workable, meaning that the card can be removed and then returned to the chassis. Reducing the thermal resistance of the interface is the objective of the current study and the topic of this thesis. The current design uses a pressure interface between the card and cold block. The contact pressure is increased through the addition of a wedgelock, which is a field-reversible mechanical connector. To use a wedgelock, the cold block has channels milled on the surface with widths that are larger than the thickness of the plug-in card and the un-expanded wedgelock. The card edge is placed in the channel and placed against one of the channel walls. A wedgelock is then placed between the card and the other channel wall. The wedgelock is then expanded by using either a screw or a lever. As the wedgelock expands it fills in the remaining channel gap and bears against the other face of the plug-in card. The majority of heat generated by the components on the plug-in card is forced to conduct from the card into the wall of the cold block, effectively a single sided, dry conduction heat transfer path. Having started as a student design competition named RevCon Challenge, work was performed to evaluate the use of new field-reversible thermal connectors. The new design proposed by the University of Missouri utilized oil based iron nanoparticles, commonly known as a ferrofluid, as a thermal interface material. By using a liquid type of interface material the channel gap can be reduced to a few micrometers, within machining tolerances, and heat can be dissipated off both sides of the card. The addition of nanoparticles improves the effective thermal conductivity of base fluid. The use of iron nanoparticles allows magnets to be used to hold the fluid in place, so the electronic cards may be easily inserted and removed while keeping the ferrofluid in the cold block channel. The ferrofluid-based design which was investigated has shown lower thermal resistance than the current wedgelock design. These results open the door for further development of electronic cards by using higher heat emitting components without compromising the simplicity of attaching/detaching cards from cooling plates.

  5. TOPICAL REVIEW: Smart aggregates: multi-functional sensors for concrete structures—a tutorial and a review

    NASA Astrophysics Data System (ADS)

    Song, Gangbing; Gu, Haichang; Mo, Yi-Lung

    2008-06-01

    This paper summarizes the authors' recent pioneering research work in piezoceramic-based smart aggregates and their innovative applications in concrete civil structures. The basic operating principle of smart aggregates is first introduced. The proposed smart aggregate is formed by embedding a waterproof piezoelectric patch with lead wires into a small concrete block. The proposed smart aggregates are multi-functional and can perform three major tasks: early-age concrete strength monitoring, impact detection and structural health monitoring. The proposed smart aggregates are embedded into the desired location before the casting of the concrete structure. The concrete strength development is monitored by observing the high frequency harmonic wave response of the smart aggregate. Impact on the concrete structure is detected by observing the open-circuit voltage of the piezoceramic patch in the smart aggregate. For structural health monitoring purposes, a smart aggregate-based active sensing system is designed for the concrete structure. Wavelet packet analysis is used as a signal-processing tool to analyze the sensor signal. A damage index based on the wavelet packet analysis is used to determine the structural health status. To better describe the time-history and location information of damage, two types of damage index matrices are proposed: a sensor-history damage index matrix and an actuator-sensor damage index matrix. To demonstrate the multi-functionality of the proposed smart aggregates, different types of concrete structures have been used as test objects, including concrete bridge bent-caps, concrete cylinders and a concrete frame. Experimental results have verified the effectiveness and the multi-functionality of the proposed smart aggregates. The multi-functional smart aggregates have the potential to be applied to the comprehensive monitoring of concrete structures from their earliest stages and throughout their lifetime.

  6. Study on smart city construction of Jiujiang based on IOT technology

    NASA Astrophysics Data System (ADS)

    Liu, Zeliang; Wang, Ying; Xu, Qin; Yan, Tao

    2017-06-01

    At present, with the technology of the Internet of things (IOT), building smart city is forming a powerful wave of city, which promotes economic and social development of city. This paper expounds the connotation of smart city, explores the social and economic significance of the construction of smart city, analyzes the present situation of smart city construction in Jiujiang, studies the basic principles development altar get and key construction projects, and puts forward relevant of Jiujiang smart city construction, and puts forward relevant proposals about smart construction in Jiujiang, Jiangxi.

  7. Cue Cards: A Self-Regulatory Strategy for Students with Learning Disabilities

    ERIC Educational Resources Information Center

    Conderman, Greg; Hedin, Laura

    2011-01-01

    General and special educators have used many instructional strategies to help students with learning disabilities (LD) succeed in school. One of those strategies is cue cards. As a vehicle for supporting evidence-based practices, cue cards help students (a) learn academic and behavioral steps, principles, procedures, processes, and rules; (b)…

  8. Credit Cards on Campus: Academic Inquiry, Objective Empiricism, or Advocacy Research?

    ERIC Educational Resources Information Center

    Manning, Robert D.; Kirshak, Ray

    2005-01-01

    Professors John M. Barron and Michael E. Staten's article in Vol. 34, No. 3 of this journal, "Usage of Credit Cards Received through College Student-Marketing Programs," purports to "provide benchmark measures of college student credit card usage." Based on empirical analyses of proprietary industry data, they conclude that "There is no…

  9. Are Rorschach Responses Influenced by Society's Change?

    ERIC Educational Resources Information Center

    Ames, Louise Bates

    1975-01-01

    Based on the general belief that people "normally" see male figures on Rorschach Card III and females on Card VII; to see the opposite, according to some, would indicate a confusing of sex roles. This study makes two comparisons: age and time changes of individual responses to these cards in different decades. (DEP)

  10. 12 CFR 226.59 - Reevaluation of rate increases.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... SYSTEM TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End...) Evaluation of increased rate. If a card issuer increases an annual percentage rate that applies to a credit card account under an open-end (not home-secured) consumer credit plan, based on the credit risk of the...

  11. 12 CFR 226.59 - Reevaluation of rate increases.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... SYSTEM TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End...) Evaluation of increased rate. If a card issuer increases an annual percentage rate that applies to a credit card account under an open-end (not home-secured) consumer credit plan, based on the credit risk of the...

  12. Use of FTA card for dry collection, transportation and storage of cervical cell specimen to detect high-risk HPV.

    PubMed

    Gustavsson, Inger; Lindell, Monica; Wilander, Erik; Strand, Anders; Gyllensten, Ulf

    2009-10-01

    The FTA elute micro card, which enable the collection, transport, and archiving of DNA could be an attractive alternative to a liquid based collection system for detection of human papillomavirus (HPV). To develop a method based on the FTA elute micro card for dry collection of cervical epithelial cell samples, suitable for subsequent PCR-based HPV testing. The method was evaluated by a comparison of the DNA collected by cytobrush and the regular FTA elute micro card from 50 cervical cell samples. The method was then used to estimate the DNA amount in 1040 samples applied to the indicating FTA elute micro card. The agreement in HPV positivity between the cytobrush and FTA samples (94%) was excellent (kappa=0.88, 95% CI 0.748-1). All the 1040 samples on the indicating FTA card had sufficient amounts of genomic DNA (>10 copies of a single copy gene) to be suitable for HPV typing. In 53 of the 1040 women the day in the menstrual cycle was noted, and the copy number during follicular phase day 9-13 was found to be statistically significantly lower than for the other three stages in the menstrual cycle (day 4-8, 14, >14) and during menopause. The indicating FTA elute micro card represents a suitable medium for collection of cervical cell samples, although follow-up studies are needed to verify the detection of low frequency HPV types.

  13. 34 CFR 668.58 - Interim disbursements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., ACG, National SMART Grant, or campus-based program funds to the applicant; (ii) Employ the applicant..., ACG, National SMART Grant, or campus-based funds; or (ii)(A) May make one disbursement of any combination of Federal Pell Grant, ACG, National SMART Grant, Federal Perkins Loan, or FSEOG funds for the...

  14. 34 CFR 668.58 - Interim disbursements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., ACG, National SMART Grant, or campus-based program funds to the applicant; (ii) Employ the applicant..., ACG, National SMART Grant, or campus-based funds; or (ii)(A) May make one disbursement of any combination of Federal Pell Grant, ACG, National SMART Grant, Federal Perkins Loan, or FSEOG funds for the...

  15. Cryptanalysis of SFLASH with Slightly Modified Parameters

    NASA Astrophysics Data System (ADS)

    Dubois, Vivien; Fouque, Pierre-Alain; Stern, Jacques

    SFLASH is a signature scheme which belongs to a family of multivariate schemes proposed by Patarin et al. in 1998 [9]. The SFLASH scheme itself has been designed in 2001 [8] and has been selected in 2003 by the NESSIE European Consortium [6] as the best known solution for implementation on low cost smart cards. In this paper, we show that slight modifications of the parameters of SFLASH within the general family initially proposed renders the scheme insecure. The attack uses simple linear algebra, and allows to forge a signature for an arbitrary message in a question of minutes for practical parameters, using only the public key. Although SFLASH itself is not amenable to our attack, it is worrying to observe that no rationale was ever offered for this "lucky" choice of parameters.

  16. Carded Tow Real-Time Color Assessment: A Spectral Camera-Based System

    PubMed Central

    Furferi, Rocco; Governi, Lapo; Volpe, Yary; Carfagni, Monica

    2016-01-01

    One of the most important parameters to be controlled during the production of textile yarns obtained by mixing pre-colored fibers, is the color correspondence between the manufactured yarn and a given reference, usually provided by a designer or a customer. Obtaining yarns from raw pre-colored fibers is a complex manufacturing process entailing a number of steps such as laboratory sampling, color recipe corrections, blowing, carding and spinning. Carding process is the one devoted to transform a “fuzzy mass” of tufted fibers into a regular mass of untwisted fibers, named “tow”. During this process, unfortunately, the correspondence between the color of the tow and the target one cannot be assured, thus leading to yarns whose color differs from the one used for reference. To solve this issue, the main aim of this work is to provide a system able to perform a spectral camera-based real-time measurement of a carded tow, to assess its color correspondence with a reference carded fabric and, at the same time, to monitor the overall quality of the tow during the carding process. Tested against a number of differently colored carded fabrics, the proposed system proved its effectiveness in reliably assessing color correspondence in real-time. PMID:27589765

  17. A streaming-based solution for remote visualization of 3D graphics on mobile devices.

    PubMed

    Lamberti, Fabrizio; Sanna, Andrea

    2007-01-01

    Mobile devices such as Personal Digital Assistants, Tablet PCs, and cellular phones have greatly enhanced user capability to connect to remote resources. Although a large set of applications are now available bridging the gap between desktop and mobile devices, visualization of complex 3D models is still a task hard to accomplish without specialized hardware. This paper proposes a system where a cluster of PCs, equipped with accelerated graphics cards managed by the Chromium software, is able to handle remote visualization sessions based on MPEG video streaming involving complex 3D models. The proposed framework allows mobile devices such as smart phones, Personal Digital Assistants (PDAs), and Tablet PCs to visualize objects consisting of millions of textured polygons and voxels at a frame rate of 30 fps or more depending on hardware resources at the server side and on multimedia capabilities at the client side. The server is able to concurrently manage multiple clients computing a video stream for each one; resolution and quality of each stream is tailored according to screen resolution and bandwidth of the client. The paper investigates in depth issues related to latency time, bit rate and quality of the generated stream, screen resolutions, as well as frames per second displayed.

  18. Extracting potential bus lines of Customized City Bus Service based on public transport big data

    NASA Astrophysics Data System (ADS)

    Ren, Yibin; Chen, Ge; Han, Yong; Zheng, Huangcheng

    2016-11-01

    Customized City Bus Service (CCBS) can reduce the traffic congestion and environmental pollution that caused by the increasing in private cars, effectively. This study aims to extract the potential bus lines and each line's passenger density of CCBS by mining the public transport big data. The datasets used in this study are mainly Smart Card Data (SCD) and bus GPS data of Qingdao, China, from October 11th and November 7th 2015. Firstly, we compute the temporal-origin-destination (TOD) of passengers by mining SCD and bus GPS data. Compared with the traditional OD, TOD not only has the spatial location, but also contains the trip's boarding time. Secondly, based on the traditional DBSCAN algorithm, we put forwards an algorithm, named TOD-DBSCAN, combined with the spatial-temporal features of TOD.TOD-DBSCAN is used to cluster the TOD trajectories in peak hours of all working days. Then, we define two variables P and N to describe the possibility and passenger destiny of a potential CCBS line. P is the probability of the CCBS line. And N represents the potential passenger destiny of the line. Lastly, we visualize the potential CCBS lines extracted by our procedure on the map and analyse relationship between potential CCBS lines and the urban spatial structure.

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT; ULTRASONIC AQUEOUS CLEANING SYSTEMS, SMART SONIC CORPORATION, SMART SONIC

    EPA Science Inventory

    This report is a product of the U.S. EPA's Environmental Technoloy Verification (ETV) Program and is focused on the Smart Sonics Ultrasonic Aqueous Cleaning Systems. The verification is based on three main objectives. (1) The Smart Sonic Aqueous Cleaning Systems, Model 2000 and...

  20. 75 FR 75724 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-06

    ... of the OCC. The OCC requires independent credit card banks to pay an additional assessment based on receivables attributable to accounts owned by the bank. Independent credit card banks are national banks that primarily engage in credit card operations and are not affiliated with a full service national bank. The OCC...

  1. Using Playing Cards to Simulate a Molecular Clock

    ERIC Educational Resources Information Center

    Westerling, Karin E.

    2008-01-01

    Changes in DNA base-repair may serve as an indicator of the time elapsed since divergence from a common ancestor. DNA sequences can now be analyzed. The simulation presented in this article allows students to observe the accumulation of changes in a randomly mutating sequence of playing cards. The cards are analogous to DNA nucleotide or protein…

  2. Graphene-based smart materials

    NASA Astrophysics Data System (ADS)

    Yu, Xiaowen; Cheng, Huhu; Zhang, Miao; Zhao, Yang; Qu, Liangti; Shi, Gaoquan

    2017-09-01

    The high specific surface area and the excellent mechanical, electrical, optical and thermal properties of graphene make it an attractive component for high-performance stimuli-responsive or 'smart' materials. Complementary to these inherent properties, functionalization or hybridization can substantially improve the performance of these materials. Typical graphene-based smart materials include mechanically exfoliated perfect graphene, chemical vapour deposited high-quality graphene, chemically modified graphene (for example, graphene oxide and reduced graphene oxide) and their macroscopic assemblies or composites. These materials are sensitive to a range of stimuli, including gas molecules or biomolecules, pH value, mechanical strain, electrical field, and thermal or optical excitation. In this Review, we outline different graphene-based smart materials and their potential applications in actuators, chemical or strain sensors, self-healing materials, photothermal therapy and controlled drug delivery. We also introduce the working mechanisms of graphene-based smart materials and discuss the challenges facing the realization of their practical applications.

  3. 78 FR 7774 - SmartEnergy Holdings, LLC; Supplemental Notice That Initial Market-Based Rate Filing Includes...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. ER13-779-000] SmartEnergy Holdings, LLC; Supplemental Notice That Initial Market-Based Rate Filing Includes Request for Blanket Section 204 Authorization This is a supplemental notice in the above-referenced proceeding, of SmartEnergy...

  4. Redesigning pictographs for patients with low health literacy and establishing preliminary steps for delivery via smart phones.

    PubMed

    Wolpin, Seth E; Nguyen, Juliet K; Parks, Jason J; Lam, Annie Y; Morisky, Donald E; Fernando, Lara; Chu, Adeline; Berry, Donna L

    2016-01-01

    Pictographs (or pictograms) have been widely utilized to convey medication related messages and to address nonadherence among patients with low health literacy. Yet, patients do not always interpret the intended messages on commonly used pictographs correctly and there are questions how they may be delivered on mobile devices. Our objectives are to refine a set of pictographs to use as medication reminders and to establish preliminary steps for delivery via smart phones. Card sorting was used to identify existing pictographs that focus group members found "not easy" to understand. Participants then explored improvements to these pictographs while iterations were sketched in real-time by a graphic artist. Feedback was also solicited on how selected pictographs might be delivered via smart phones in a sequential reminder message. The study was conducted at a community learning center that provides literacy services to underserved populations in Seattle, WA. Participants aged 18 years and older who met the criteria for low health literacy using S-TOFHLA were recruited. Among the 45 participants screened for health literacy, 29 were eligible and consented to participate. Across four focus group sessions, participants examined 91 commonly used pictographs, 20 of these were ultimately refined to improve comprehensibility using participatory design approaches. All participants in the fifth focus group owned and used cell phones and provided feedback on preferred sequencing of pictographs to represent medication messages. Low literacy adults found a substantial number of common medication label pictographs difficult to understand. Participative design processes helped generate new pictographs, as well as feedback on the sequencing of messages on cell phones, that may be evaluated in future research.

  5. A rhythm-based authentication scheme for smart media devices.

    PubMed

    Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk

    2014-01-01

    In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.

  6. A Rhythm-Based Authentication Scheme for Smart Media Devices

    PubMed Central

    Lee, Jae Dong; Park, Jong Hyuk

    2014-01-01

    In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. PMID:25110743

  7. FPGA-based fused smart sensor for dynamic and vibration parameter extraction in industrial robot links.

    PubMed

    Rodriguez-Donate, Carlos; Morales-Velazquez, Luis; Osornio-Rios, Roque Alfredo; Herrera-Ruiz, Gilberto; de Jesus Romero-Troncoso, Rene

    2010-01-01

    Intelligent robotics demands the integration of smart sensors that allow the controller to efficiently measure physical quantities. Industrial manipulator robots require a constant monitoring of several parameters such as motion dynamics, inclination, and vibration. This work presents a novel smart sensor to estimate motion dynamics, inclination, and vibration parameters on industrial manipulator robot links based on two primary sensors: an encoder and a triaxial accelerometer. The proposed smart sensor implements a new methodology based on an oversampling technique, averaging decimation filters, FIR filters, finite differences and linear interpolation to estimate the interest parameters, which are computed online utilizing digital hardware signal processing based on field programmable gate arrays (FPGA).

  8. FPGA-Based Fused Smart Sensor for Dynamic and Vibration Parameter Extraction in Industrial Robot Links

    PubMed Central

    Rodriguez-Donate, Carlos; Morales-Velazquez, Luis; Osornio-Rios, Roque Alfredo; Herrera-Ruiz, Gilberto; de Jesus Romero-Troncoso, Rene

    2010-01-01

    Intelligent robotics demands the integration of smart sensors that allow the controller to efficiently measure physical quantities. Industrial manipulator robots require a constant monitoring of several parameters such as motion dynamics, inclination, and vibration. This work presents a novel smart sensor to estimate motion dynamics, inclination, and vibration parameters on industrial manipulator robot links based on two primary sensors: an encoder and a triaxial accelerometer. The proposed smart sensor implements a new methodology based on an oversampling technique, averaging decimation filters, FIR filters, finite differences and linear interpolation to estimate the interest parameters, which are computed online utilizing digital hardware signal processing based on field programmable gate arrays (FPGA). PMID:22319345

  9. Design of smart home gateway based on Wi-Fi and ZigBee

    NASA Astrophysics Data System (ADS)

    Li, Yang

    2018-04-01

    With the increasing demand for home lifestyle, the traditional smart home products have been unable to meet the needs of users. Aim at the complex wiring, high cost and difficult operation problems of traditional smart home system, this paper designs a home gateway for smart home system based on Wi-Fi and ZigBee. This paper first gives a smart home system architecture base on cloud server, Wi-Fi and ZigBee. This architecture enables users to access the smart home system remotely from Internet through the cloud server or through Wi-Fi at home. It also offers the flexibility and low cost of ZigBee wireless networking for home equipment. This paper analyzes the functional requirements of the home gateway, and designs a modular hardware architecture based on the RT5350 wireless gateway module and the CC2530 ZigBee coordinator module. Also designs the software of the home gateway, including the gateway master program and the ZigBee coordinator program. Finally, the smart home system and home gateway are tested in two kinds of network environments, internal network and external network. The test results show that the designed home gateway can meet the requirements, support remote and local access, support multi-user, support information security technology, and can timely report equipment status information.

  10. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  11. AVQS: attack route-based vulnerability quantification scheme for smart grid.

    PubMed

    Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik

    2014-01-01

    A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  12. Impact of Report Cards On Employees: A Natural Experiment

    PubMed Central

    Knutson, David J.; Kind, Elizabeth A.; Fowles, Jinnet B.; Adlis, Susan

    1998-01-01

    To determine the effect of survey-based, health plan report cards on employees as they selected their 1995 health plan, the authors surveyed two groups of Minnesota State employees, one of which received the report card and one that did not. Both groups were surveyed before and after their enrollment. The authors looked for report card effects on relative changes in the employees' knowledge of health plan benefits and their ratings of quality and cost attributes, as well as their plan choice, rates of switching plans, and willingness to pay higher premiums. The only report card effect found was an increase in perceived knowledge for employees with single coverage. PMID:10387425

  13. A Multi-level Fuzzy Evaluation Method for Smart Distribution Network Based on Entropy Weight

    NASA Astrophysics Data System (ADS)

    Li, Jianfang; Song, Xiaohui; Gao, Fei; Zhang, Yu

    2017-05-01

    Smart distribution network is considered as the future trend of distribution network. In order to comprehensive evaluate smart distribution construction level and give guidance to the practice of smart distribution construction, a multi-level fuzzy evaluation method based on entropy weight is proposed. Firstly, focus on both the conventional characteristics of distribution network and new characteristics of smart distribution network such as self-healing and interaction, a multi-level evaluation index system which contains power supply capability, power quality, economy, reliability and interaction is established. Then, a combination weighting method based on Delphi method and entropy weight method is put forward, which take into account not only the importance of the evaluation index in the experts’ subjective view, but also the objective and different information from the index values. Thirdly, a multi-level evaluation method based on fuzzy theory is put forward. Lastly, an example is conducted based on the statistical data of some cites’ distribution network and the evaluation method is proved effective and rational.

  14. A tele-home care system exploiting the DVB-T technology and MHP.

    PubMed

    Angius, G; Pani, D; Raffo, L; Randaccio, P; Seruis, S

    2008-01-01

    The aim of this research work is the development of a low-cost system for telemedicine based on the DVB-T technology. The diffusion of DVB-T standard and the low cost of DVB-T set-top boxes bring the vision of a capillary distribution of tele-home care monitoring systems with easy-to-use patient's interface. Exploiting the potentiality of the DVB-T set-top box, we transformed it into an "on-demand tele-home care interface". The Xlet we developed is able to govern the functionality of an external microcontroller-based unit for the acquisition of the bio-signals of interest. The uplink connection is used to send the exam results to a remote care center. The Xlet providing the patient interface on the set-top box is uploaded by a DVB-T broadcaster without any intervention in the patient's home. A prototypal low-cost base station for the acquisition of the patient's signals (1-lead ECG) has been developed. It is able to be connected to the set-top box via an infrared link. A smart-card-based system is in charge for the customization of the Xlet for every patient. The proposed system, based on a currently widespread infrastructure, is able to allow the patients monitoring from home without any installation procedure. Even untrained (or elderly) people can easily use such system due to their practice with the basic DVB-T home-entertainment equipments.

  15. Driving profile modeling and recognition based on soft computing approach.

    PubMed

    Wahab, Abdul; Quek, Chai; Tan, Chin Keong; Takeda, Kazuya

    2009-04-01

    Advancements in biometrics-based authentication have led to its increasing prominence and are being incorporated into everyday tasks. Existing vehicle security systems rely only on alarms or smart card as forms of protection. A biometric driver recognition system utilizing driving behaviors is a highly novel and personalized approach and could be incorporated into existing vehicle security system to form a multimodal identification system and offer a greater degree of multilevel protection. In this paper, detailed studies have been conducted to model individual driving behavior in order to identify features that may be efficiently and effectively used to profile each driver. Feature extraction techniques based on Gaussian mixture models (GMMs) are proposed and implemented. Features extracted from the accelerator and brake pedal pressure were then used as inputs to a fuzzy neural network (FNN) system to ascertain the identity of the driver. Two fuzzy neural networks, namely, the evolving fuzzy neural network (EFuNN) and the adaptive network-based fuzzy inference system (ANFIS), are used to demonstrate the viability of the two proposed feature extraction techniques. The performances were compared against an artificial neural network (NN) implementation using the multilayer perceptron (MLP) network and a statistical method based on the GMM. Extensive testing was conducted and the results show great potential in the use of the FNN for real-time driver identification and verification. In addition, the profiling of driver behaviors has numerous other potential applications for use by law enforcement and companies dealing with buses and truck drivers.

  16. Health care transformation through collaboration on open-source informatics projects: integrating a medical applications platform, research data repository, and patient summarization.

    PubMed

    Klann, Jeffrey G; McCoy, Allison B; Wright, Adam; Wattanasin, Nich; Sittig, Dean F; Murphy, Shawn N

    2013-05-30

    The Strategic Health IT Advanced Research Projects (SHARP) program seeks to conquer well-understood challenges in medical informatics through breakthrough research. Two SHARP centers have found alignment in their methodological needs: (1) members of the National Center for Cognitive Informatics and Decision-making (NCCD) have developed knowledge bases to support problem-oriented summarizations of patient data, and (2) Substitutable Medical Apps, Reusable Technologies (SMART), which is a platform for reusable medical apps that can run on participating platforms connected to various electronic health records (EHR). Combining the work of these two centers will ensure wide dissemination of new methods for synthesized views of patient data. Informatics for Integrating Biology and the Bedside (i2b2) is an NIH-funded clinical research data repository platform in use at over 100 sites worldwide. By also working with a co-occurring initiative to SMART-enabling i2b2, we can confidently write one app that can be used extremely broadly. Our goal was to facilitate development of intuitive, problem-oriented views of the patient record using NCCD knowledge bases that would run in any EHR. To do this, we developed a collaboration between the two SHARPs and an NIH center, i2b2. First, we implemented collaborative tools to connect researchers at three institutions. Next, we developed a patient summarization app using the SMART platform and a previously validated NCCD problem-medication linkage knowledge base derived from the National Drug File-Reference Terminology (NDF-RT). Finally, to SMART-enable i2b2, we implemented two new Web service "cells" that expose the SMART application programming interface (API), and we made changes to the Web interface of i2b2 to host a "carousel" of SMART apps. We deployed our SMART-based, NDF-RT-derived patient summarization app in this SMART-i2b2 container. It displays a problem-oriented view of medications and presents a line-graph display of laboratory results. This summarization app can be run in any EHR environment that either supports SMART or runs SMART-enabled i2b2. This i2b2 "clinical bridge" demonstrates a pathway for reusable app development that does not require EHR vendors to immediately adopt the SMART API. Apps can be developed in SMART and run by clinicians in the i2b2 repository, reusing clinical data extracted from EHRs. This may encourage the adoption of SMART by supporting SMART app development until EHRs adopt the platform. It also allows a new variety of clinical SMART apps, fueled by the broad aggregation of data types available in research repositories. The app (including its knowledge base) and SMART-i2b2 are open-source and freely available for download.

  17. A portable smart phone-based plasmonic nanosensor readout platform that measures transmitted light intensities of nanosubstrates using an ambient light sensor.

    PubMed

    Fu, Qiangqiang; Wu, Ze; Xu, Fangxiang; Li, Xiuqing; Yao, Cuize; Xu, Meng; Sheng, Liangrong; Yu, Shiting; Tang, Yong

    2016-05-21

    Plasmonic nanosensors may be used as tools for diagnostic testing in the field of medicine. However, quantification of plasmonic nanosensors often requires complex and bulky readout instruments. Here, we report the development of a portable smart phone-based plasmonic nanosensor readout platform (PNRP) for accurate quantification of plasmonic nanosensors. This device operates by transmitting excitation light from a LED through a nanosubstrate and measuring the intensity of the transmitted light using the ambient light sensor of a smart phone. The device is a cylinder with a diameter of 14 mm, a length of 38 mm, and a gross weight of 3.5 g. We demonstrated the utility of this smart phone-based PNRP by measuring two well-established plasmonic nanosensors with this system. In the first experiment, the device measured the morphology changes of triangular silver nanoprisms (AgNPRs) in an immunoassay for the detection of carcinoembryonic antigen (CEA). In the second experiment, the device measured the aggregation of gold nanoparticles (AuNPs) in an aptamer-based assay for the detection of adenosine triphosphate (ATP). The results from the smart phone-based PNRP were consistent with those from commercial spectrophotometers, demonstrating that the smart phone-based PNRP enables accurate quantification of plasmonic nanosensors.

  18. SMARTe 2008

    EPA Science Inventory

    Sustainable Management Approaches and Revitalization Tools - electronic (SMARTe), is an open-source, web-based, decision support system for developing and evaluating future reuse scenarios for potentially contaminated land. SMARTe contains resources and analysis tools for all asp...

  19. SMARTe 2011

    EPA Science Inventory

    Sustainable Management Approaches and Revitalization Tools - electronic (SMARTe), is an open-source, web-based, decisions support system for developing and evaluating future reuse scenarios for potentially contaminated land. SMARTe contains resources and analysis tools for all a...

  20. SMARTE 2007

    EPA Science Inventory

    Sustainable Management Approaches and Revitalization Tools-electronic (SMARTe), is an open-source, web-based, decision support system for developing and evaluating future reuse scenarios for potentially contaminated land. SMARTe contains guidance and analysis tools for all aspect...

  1. Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids

    PubMed Central

    Zhang, Liping; Tang, Shanyu; Luo, He

    2016-01-01

    In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951

  2. Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.

    PubMed

    Zhang, Liping; Tang, Shanyu; Luo, He

    2016-01-01

    In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.

  3. Comparing Dynamic Treatment Regimes Using Repeated-Measures Outcomes: Modeling Considerations in SMART Studies

    PubMed Central

    Lu, Xi; Nahum-Shani, Inbal; Kasari, Connie; Lynch, Kevin G.; Oslin, David W.; Pelham, William E.; Fabiano, Gregory; Almirall, Daniel

    2016-01-01

    A dynamic treatment regime (DTR) is a sequence of decision rules, each of which recommends a treatment based on a patient’s past and current health status. Sequential, multiple assignment, randomized trials (SMARTs) are multi-stage trial designs that yield data specifically for building effective DTRs. Modeling the marginal mean trajectories of a repeated-measures outcome arising from a SMART presents challenges, because traditional longitudinal models used for randomized clinical trials do not take into account the unique design features of SMART. We discuss modeling considerations for various forms of SMART designs, emphasizing the importance of considering the timing of repeated measures in relation to the treatment stages in a SMART. For illustration, we use data from three SMART case studies with increasing level of complexity, in autism, child attention deficit hyperactivity disorder (ADHD), and adult alcoholism. In all three SMARTs we illustrate how to accommodate the design features along with the timing of the repeated measures when comparing DTRs based on mean trajectories of the repeated-measures outcome. PMID:26638988

  4. Comparing dynamic treatment regimes using repeated-measures outcomes: modeling considerations in SMART studies.

    PubMed

    Lu, Xi; Nahum-Shani, Inbal; Kasari, Connie; Lynch, Kevin G; Oslin, David W; Pelham, William E; Fabiano, Gregory; Almirall, Daniel

    2016-05-10

    A dynamic treatment regime (DTR) is a sequence of decision rules, each of which recommends a treatment based on a patient's past and current health status. Sequential, multiple assignment, randomized trials (SMARTs) are multi-stage trial designs that yield data specifically for building effective DTRs. Modeling the marginal mean trajectories of a repeated-measures outcome arising from a SMART presents challenges, because traditional longitudinal models used for randomized clinical trials do not take into account the unique design features of SMART. We discuss modeling considerations for various forms of SMART designs, emphasizing the importance of considering the timing of repeated measures in relation to the treatment stages in a SMART. For illustration, we use data from three SMART case studies with increasing level of complexity, in autism, child attention deficit hyperactivity disorder, and adult alcoholism. In all three SMARTs, we illustrate how to accommodate the design features along with the timing of the repeated measures when comparing DTRs based on mean trajectories of the repeated-measures outcome. Copyright © 2015 John Wiley & Sons, Ltd.

  5. The Educator's Guide to HyperCard and HyperTalk. A Longwood Professional Book.

    ERIC Educational Resources Information Center

    Culp, George H.; Watkins, G. Morgan

    This book and three accompanying floppy disks introduce HyperCard 2.1 for the Macintosh microcomputer and its programming component, HyperTalk, to educators. The first four chapters introduce the basics of HyperCard, including its structure, which is based on a hierarchy of units; the use of tools and graphics; and ways of linking information…

  6. SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid

    PubMed Central

    Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin

    2016-01-01

    The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid. PMID:27043573

  7. SACRB-MAC: A High-Capacity MAC Protocol for Cognitive Radio Sensor Networks in Smart Grid.

    PubMed

    Yang, Zhutian; Shi, Zhenguo; Jin, Chunlin

    2016-03-31

    The Cognitive Radio Sensor Network (CRSN) is considered as a viable solution to enhance various aspects of the electric power grid and to realize a smart grid. However, several challenges for CRSNs are generated due to the harsh wireless environment in a smart grid. As a result, throughput and reliability become critical issues. On the other hand, the spectrum aggregation technique is expected to play an important role in CRSNs in a smart grid. By using spectrum aggregation, the throughput of CRSNs can be improved efficiently, so as to address the unique challenges of CRSNs in a smart grid. In this regard, we proposed Spectrum Aggregation Cognitive Receiver-Based MAC (SACRB-MAC), which employs the spectrum aggregation technique to improve the throughput performance of CRSNs in a smart grid. Moreover, SACRB-MAC is a receiver-based MAC protocol, which can provide a good reliability performance. Analytical and simulation results demonstrate that SACRB-MAC is a promising solution for CRSNs in a smart grid.

  8. Design and implementation of reliability evaluation of SAS hard disk based on RAID card

    NASA Astrophysics Data System (ADS)

    Ren, Shaohua; Han, Sen

    2015-10-01

    Because of the huge advantage of RAID technology in storage, it has been widely used. However, the question associated with this technology is that the hard disk based on the RAID card can not be queried by Operating System. Therefore how to read the self-information and log data of hard disk has been a problem, while this data is necessary for reliability test of hard disk. In traditional way, this information can be read just suitable for SATA hard disk, but not for SAS hard disk. In this paper, we provide a method by using LSI RAID card's Application Program Interface, communicating with RAID card and analyzing the feedback data to solve the problem. Then we will get the necessary information to assess the SAS hard disk.

  9. Human Factors Assessment of Respiratory Support Pack (RSP) Cue Card

    NASA Technical Reports Server (NTRS)

    Whitmore, Mihriban; Hudy, Cynthia; Smith, Danielle; Byrne, Vicky

    2005-01-01

    The Respiratory Support Pack (RSP) is a medical pack onboard the International Space Station (ISS) that contains much of the necessary equipment for providing aid to a conscious or unconscious crewmember in respiratory distress. Inside the RSP lid pocket is a 5.5 by 11 inch paper cue card, which is used by a Crew Medical Officer as the procedure to set up the equipment and deliver oxygen to a crewmember. In training, crewmembers expressed concerns about the readability and usability of the cue card; consequently, updating the cue card was prioritized as an activity to be completed prior to Space Shuttle return-to-flight. The Usability Testing and Analysis Facility at the Johnson Space Center evaluated the current layout of the cue card, and proposed several new cue card designs based on human factors principals. A series of three studies were performed in order to experimentally compare performance with each of the cue card designs. Nonmedically trained personnel used either a redesigned RSP cue card, or the original card to simulate resuscitation (using a mannequin along with the hardware). Time to completion, errors and subjective ratings were recorded. The addition of pictures, colors, borders, and simplification of the flow of information (making minimal changes to the actual procedure content) elicited great benefits during testing. Time to complete RSP procedures was reduced by as much as three minutes with the final cue card design. Detailed results from these studies, as well as general guidelines for cue card design will be discussed.

  10. Activity Learning as a Foundation for Security Monitoring in Smart Homes.

    PubMed

    Dahmen, Jessamyn; Thomas, Brian L; Cook, Diane J; Wang, Xiaobo

    2017-03-31

    Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed.

  11. Results From Nigeria's 2016 Report Card on Physical Activity for Children and Youth.

    PubMed

    Adeniyi, Ade F; Odukoya, Olukemi O; Oyeyemi, Adewale L; Adedoyin, Rufus A; Ojo, Olatunde S; Metseagharun, Edirin; Akinroye, Kingsley K

    2016-11-01

    The Nigerian Report card on Physical Activity (PA) in Children and Youth was first developed in 2013 to inform practice and policy on healthy living and prevention of noncommunicable diseases among Nigerian children and youth. This article summarizes the results of the 2016 report card and provides updated evidence on the current situation in Nigeria. A comprehensive review of literature was undertaken by the Report Card Working Group. Grades were assigned to 10 PA indicators based on the criteria used for the 2013 edition. Grades assigned to the indicators were Overall PA, D; Active Play and Leisure, C; Active Transportation, B; Sedentary Behaviors (screen-based, F and nonscreen-based, D); Overweight and Obesity, A; PA in Schools, C-; Government/Nongovernment Organizations/Private Sector/Policy, B. The following indicators were graded as Incomplete: Organized Sport and PA, Community and Built Environment, and Family and Peers. The overall PA levels of Nigerian children and youth seemed to be declining compared with the 2013 Report card but with slight improvement in active play and leisure, and PA in school settings. A substantial number of Nigerian children and youth still have high sedentary behaviors, overweight and obesity. Efforts are needed to promote PA among them.

  12. Trehalose significantly enhances the recovery of serum and serum exosomal miRNA from a paper-based matrix.

    PubMed

    Neo, Shu Hui; Chung, Ka Yan; Quek, Jia Min; Too, Heng-Phon

    2017-11-30

    The preservation of nucleic acids from clinical samples is critical to facilitate accurate molecular diagnosis. The use of a paper matrix, Flinders Technology Associates (FTA) Elute cards, to archive DNA and viral RNA is well-documented. However, the feasibility of FTA Elute cards for archiving serum and serum exosomal microRNAs (miRNAs) remains unclear. Here, we performed a comprehensive evaluation of FTA Elute cards for miRNA storage and recovery in different pre-analytical conditions. The recovery of serum miRNA dry-spotted on FTA Elute cards by direct elution with water at high temperature was poor. However, serum miRNAs dry-spotted on the cards were isolated with about 40% yield when using QIAzol lysis reagent and recovery was improved remarkably (>80%) upon extraction from cards pre-treated with trehalose. miRNAs stored on the cards remained stable at room temperature and can be kept for prolonged periods. Furthermore, miRNAs could be similarly recovered from serum exosomes dry-spotted on the cards. Importantly, when using sera from gastric cancer (GC) patients, the miRNAs were efficiently recovered from trehalose pre-treated cards without affecting their representation. Collectively, we have demonstrated the potential of FTA Elute cards to archive serum and serum exosomal miRNAs, making it useful for biomarker discovery and diagnostics.

  13. A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Chang, Ya-Fen; Yu, Shih-Hui; Shiao, Ding-Rui

    2013-04-01

    Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.

  14. Viewpoint Integration for Hand-Based Recognition of Social Interactions from a First-Person View.

    PubMed

    Bambach, Sven; Crandall, David J; Yu, Chen

    2015-11-01

    Wearable devices are becoming part of everyday life, from first-person cameras (GoPro, Google Glass), to smart watches (Apple Watch), to activity trackers (FitBit). These devices are often equipped with advanced sensors that gather data about the wearer and the environment. These sensors enable new ways of recognizing and analyzing the wearer's everyday personal activities, which could be used for intelligent human-computer interfaces and other applications. We explore one possible application by investigating how egocentric video data collected from head-mounted cameras can be used to recognize social activities between two interacting partners (e.g. playing chess or cards). In particular, we demonstrate that just the positions and poses of hands within the first-person view are highly informative for activity recognition, and present a computer vision approach that detects hands to automatically estimate activities. While hand pose detection is imperfect, we show that combining evidence across first-person views from the two social partners significantly improves activity recognition accuracy. This result highlights how integrating weak but complimentary sources of evidence from social partners engaged in the same task can help to recognize the nature of their interaction.

  15. RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

    PubMed Central

    Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae

    2011-01-01

    In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost. PMID:22163888

  16. Viewpoint Integration for Hand-Based Recognition of Social Interactions from a First-Person View

    PubMed Central

    Bambach, Sven; Crandall, David J.; Yu, Chen

    2016-01-01

    Wearable devices are becoming part of everyday life, from first-person cameras (GoPro, Google Glass), to smart watches (Apple Watch), to activity trackers (FitBit). These devices are often equipped with advanced sensors that gather data about the wearer and the environment. These sensors enable new ways of recognizing and analyzing the wearer’s everyday personal activities, which could be used for intelligent human-computer interfaces and other applications. We explore one possible application by investigating how egocentric video data collected from head-mounted cameras can be used to recognize social activities between two interacting partners (e.g. playing chess or cards). In particular, we demonstrate that just the positions and poses of hands within the first-person view are highly informative for activity recognition, and present a computer vision approach that detects hands to automatically estimate activities. While hand pose detection is imperfect, we show that combining evidence across first-person views from the two social partners significantly improves activity recognition accuracy. This result highlights how integrating weak but complimentary sources of evidence from social partners engaged in the same task can help to recognize the nature of their interaction. PMID:28966999

  17. Technology development of high-quality semiconductor devices using solution-processed crystallization of pentacene

    NASA Astrophysics Data System (ADS)

    Liu, Hung-Wei

    Organic electronic materials and processing techniques have attracted considerable attention for developing organic thin-film transistors (OTFTs), since they may be patterned on flexible substrates which may be bent into a variety of shapes for applications such as displays, smart cards, solar devices and sensors Various fabrication methods for building pentacene-based OTFTs have been demonstrated. Traditional vacuum deposition and vapor deposition methods have been studied for deposition on plastic and paper, but these are unlikely to scale well to large area printing. Researchers have developed methods for processing OTFTs from solution because of the potential for low-cost and large area device manufacturing, such as through inkjet or offset printing. Most methods require the use of precursors which are used to make pentacene soluble, and these methods have typically produced much lower carrier mobility than the best vacuum deposited devices. We have investigated devices built from solution-processed pentacene that is locally crystallized at room temperature on the polymer substrates. Pentacene crystals grown in this manner are highly localized at pre-determined sites, have good crystallinity and show good carrier mobility, making this an attractive method for large area manufacturing of semiconductor devices.

  18. Determinants affecting consumer adoption of contactless credit card: an empirical study.

    PubMed

    Wang, Yu-Min

    2008-12-01

    The contactless credit card is one of the most promising technological innovations in the field of electronic payments. It provides consumers with greater control of payments, convenience, and transaction speed. However, contactless credit cards have yet to gain significant rates of adoption in the marketplace. Thus, effort must be made to identify factors affecting consumer adoption of contactless credit cards. Based on the technology acceptance model, innovation diffusion theory, and the relevant literature, seven variables (perceived usefulness, perceived ease of use, compatibility, perceived risk, trust, consumer involvement, availability of infrastructure) are proposed to help predict consumer adoption of contactless credit cards. Data collected from 312 respondents in Taiwan is tested against the proposed prediction model using the logistic regression approach. The results and implications of our study contribute to an expanded understanding of the factors that affect consumer adoption of contactless credit cards.

  19. Surface Plasmon Resonance Biosensor Based on Smart Phone Platforms

    NASA Astrophysics Data System (ADS)

    Liu, Yun; Liu, Qiang; Chen, Shimeng; Cheng, Fang; Wang, Hanqi; Peng, Wei

    2015-08-01

    We demonstrate a fiber optic surface plasmon resonance (SPR) biosensor based on smart phone platforms. The light-weight optical components and sensing element are connected by optical fibers on a phone case. This SPR adaptor can be conveniently installed or removed from smart phones. The measurement, control and reference channels are illuminated by the light entering the lead-in fibers from the phone’s LED flash, while the light from the end faces of the lead-out fibers is detected by the phone’s camera. The SPR-sensing element is fabricated by a light-guiding silica capillary that is stripped off its cladding and coated with 50-nm gold film. Utilizing a smart application to extract the light intensity information from the camera images, the light intensities of each channel are recorded every 0.5 s with refractive index (RI) changes. The performance of the smart phone-based SPR platform for accurate and repeatable measurements was evaluated by detecting different concentrations of antibody binding to a functionalized sensing element, and the experiment results were validated through contrast experiments with a commercial SPR instrument. This cost-effective and portable SPR biosensor based on smart phones has many applications, such as medicine, health and environmental monitoring.

  20. Surface Plasmon Resonance Biosensor Based on Smart Phone Platforms.

    PubMed

    Liu, Yun; Liu, Qiang; Chen, Shimeng; Cheng, Fang; Wang, Hanqi; Peng, Wei

    2015-08-10

    We demonstrate a fiber optic surface plasmon resonance (SPR) biosensor based on smart phone platforms. The light-weight optical components and sensing element are connected by optical fibers on a phone case. This SPR adaptor can be conveniently installed or removed from smart phones. The measurement, control and reference channels are illuminated by the light entering the lead-in fibers from the phone's LED flash, while the light from the end faces of the lead-out fibers is detected by the phone's camera. The SPR-sensing element is fabricated by a light-guiding silica capillary that is stripped off its cladding and coated with 50-nm gold film. Utilizing a smart application to extract the light intensity information from the camera images, the light intensities of each channel are recorded every 0.5 s with refractive index (RI) changes. The performance of the smart phone-based SPR platform for accurate and repeatable measurements was evaluated by detecting different concentrations of antibody binding to a functionalized sensing element, and the experiment results were validated through contrast experiments with a commercial SPR instrument. This cost-effective and portable SPR biosensor based on smart phones has many applications, such as medicine, health and environmental monitoring.

  1. [Evaluation of a registration card for logging electrocardiographic records into standard personal computers].

    PubMed

    Pizzuti, A; Baralis, G; Bassignana, A; Antonielli, E; Di Leo, M

    1997-01-01

    The MS200 Cardioscope, from MRT Micro as., Norway, is a 12 channel ECG card to be directly inserted into a standard personal computer (PC). The standard ISA Bus compatible half length card comes with a set of 10 cables with electrodes and the software for recording, displaying and saving ECG signals. The system is supplied with DOS or Windows software. The goal of the present work was to evaluate the affordability and usability of the MS200 in a clinical setting. We tested the 1.5 DOS version of the software. In 30 patients with various cardiac diseases the ECG signal has been recorded with MS200 and with standard Hellige CardioSmart equipment. The saved ECGs were recalled and printed using an Epson Stylus 800 ink-jet printer. Two cardiologists reviewed the recordings for a looking at output quality, amplitude and speed precision, artifacts, etc. 1) Installation: the card has proven to be totally compatible with the hardware; no changes in default settings had to be made. 2) Usage: the screens are clear; the commands and menus are intuitive and easy to use. Due to the boot-strap and software loading procedures and, most important, off-line printing, the time needed to obtain a complete ECG printout has been longer than that of the reference machine. 3) Archiving and retrieval of ECG: the ECG curves can be saved in original or compressed form: selecting the latter, the noise and non-ECG information is filtered away and the space consumption on disk is reduced: on average, 20 Kb are needed for 10 seconds of signal. The MS200 can be run on a Local Area Network and is prepared for integrating with an existing informative system: we are currently testing the system in this scenery. 4) MS200 includes options for on-line diagnosis, a technology we have not tested in the present work. 5) The only setting allowed for printing full pages is letter size (A4): the quality of printouts is good, with a resolution of 180 DPI. In conclusion, the MS200 system seems reliable and safe. In the configuration we tested, it cannot substitute a dedicated ECG equipment: from this point of view, a smaller PCMCIA-type card with a battery-operated notebook PC will be more suitable for clinical uses. Nevertheless, the possibility to log and track ECG records, integrated into the department informative system, may provide a valuable tool for improving access to medical information.

  2. An u-Service Model Based on a Smart Phone for Urban Computing Environments

    NASA Astrophysics Data System (ADS)

    Cho, Yongyun; Yoe, Hyun

    In urban computing environments, all of services should be based on the interaction between humans and environments around them, which frequently and ordinarily in home and office. This paper propose an u-service model based on a smart phone for urban computing environments. The suggested service model includes a context-aware and personalized service scenario development environment that can instantly describe user's u-service demand or situation information with smart devices. To do this, the architecture of the suggested service model consists of a graphical service editing environment for smart devices, an u-service platform, and an infrastructure with sensors and WSN/USN. The graphic editor expresses contexts as execution conditions of a new service through a context model based on ontology. The service platform deals with the service scenario according to contexts. With the suggested service model, an user in urban computing environments can quickly and easily make u-service or new service using smart devices.

  3. SMARTE TUTORIAL CD

    EPA Science Inventory

    SMARTe is a web-based decision support tool intended to help revitalization practitioners find information, perform data analysis, communicate, and evaluate future reuse options for a site or area. A tutorial was developed to help users navigate SMARTe. This tutorial is approxima...

  4. Tailoring of the Tell-us Card communication tool for nurses to increase patient participation using Intervention Mapping.

    PubMed

    van Belle, Elise; Zwakhalen, Sandra M G; Caris, Josien; Van Hecke, Ann; Huisman-de Waal, Getty; Heinen, Maud

    2018-02-01

    To describe the tailoring of the Tell-us Card intervention for enhanced patient participation to the Dutch hospital setting using Intervention Mapping as a systematic approach. Even though patient participation is essential in any patient-to-nurse encounter, care plans often fail to take patients' preferences into account. The Tell-us Card intervention seems promising, but needs to be tailored and tested before implementation in a different setting or on large scale. Description of the Intervention Mapping framework to systematically tailor the Tell-us Card intervention to the Dutch hospital setting. Intervention Mapping consists of: (i) identification of the problem through needs assessment and determination of fit, based on patients and nurses interviews and focus group interviews; (ii) developing a logic model of change and matrices, based on literature and interviews; (iii) selection of theory-based methods and practical applications; (iv) producing programme components and piloting; (v) planning for adoption, implementation and sustainability; and (vi) preparing for programme evaluation. Knowledge, attitude, outcome expectations, self-efficacy and skills were identified as the main determinants influencing the use of the Tell-us Card. Linking identified determinants and performance objectives with behaviour change techniques from the literature resulted in a well-defined and tailored intervention and evaluation plan. The Tell-us Card intervention was adapted to fit the Dutch hospital setting and prepared for evaluation. The Medical Research Council framework was followed, and the Intervention Mapping approach was used to prepare a pilot study to confirm feasibility and relevant outcomes. This article shows how Intervention Mapping is applied within the Medical Research Council framework to adapt the Tell-us Card intervention, which could serve as a guide for the tailoring of similar interventions. © 2017 John Wiley & Sons Ltd.

  5. Mobile-PKI Service Model for Ubiquitous Environment

    NASA Astrophysics Data System (ADS)

    Jeun, Inkyung; Chun, Kilsoo

    One of the most important things in PKI(Public Key Infrastructure) is the private key management issue. The private key must be deal with safely for secure PKI service. Even though PKI service is usually used for identification and authentication of user in e-commerce, PKI service has many inconvenient factors. Especially, the fact that storage media of private key for PKI service is limited to PC hard disk drive or smart card users must always carry, gives an inconvenience to user and is not suitable in ubiquitous network. This paper suggests the digital signature service using a mobile phone(m-PKI service) which is suitable in future network. A mobile phone is the most widely used for personal communication means and has a characteristic of high movability. We can use the PKI service anytime and anywhere using m-PKI.

  6. [Prenatal patient cards and quality of prenatal care in public health services in Greater Metropolitan Vitória, Espírito Santo State, Brazil].

    PubMed

    Santos Neto, Edson Theodoro dos; Oliveira, Adauto Emmerich; Zandonade, Eliana; Gama, Silvana Granado Nogueira da; Leal, Maria do Carmo

    2012-09-01

    This study aimed to assess the completeness of prenatal care information on the patients' prenatal care cards, according to coverage by various public health services: Family Health Strategy (FHS), Community-Based Health Workers' Program (CBHWP), and traditional Primary Care Units (PCU) in Greater Metropolitan Vitória, Espírito Santo State, Brazil. In a cross-sectional study, 1,006 prenatal cards were randomly selected from postpartum women at maternity hospitals in the metropolitan area. Completeness of the cards was assessed according to the criteria proposed by Romero & Cunha, which measure the quality on a scale from excellent (< 5% incomplete cards) to very bad (> 50% incomplete cards). In general, completion of information on the cards was bad (> 20% incomplete), but cards were filled out better in the FHS than in the CBHWP and PCU, especially for tetanus vaccination (p = 0.016) and gestational weight (p = 0.039). In conclusion, the quality of prenatal care in the public health system in Greater Metropolitan Vitória fails to meet the Brazilian national guidelines for maternal and child health.

  7. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  8. AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid

    PubMed Central

    Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik

    2014-01-01

    A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification. PMID:25152923

  9. Analyzing Resiliency of the Smart Grid Communication Architectures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anas AlMajali, Anas; Viswanathan, Arun; Neuman, Clifford

    Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an RF mesh based architecture, under cyber attacks. We analyze the resiliency of the communication architecture by studying the performance of high-level smart grid functions such as metering, and demand response which depend on communication. Disrupting the operation of these functions impacts the operational resiliency of the smart grid. Our analysis shows that it takes an attacker only a small fraction of meters to compromisemore » the communication resiliency of the smart grid. We discuss the implications of our result to critical smart grid functions and to the overall security of the smart grid.« less

  10. Activity Learning as a Foundation for Security Monitoring in Smart Homes

    PubMed Central

    Dahmen, Jessamyn; Thomas, Brian L.; Cook, Diane J.; Wang, Xiaobo

    2017-01-01

    Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed. PMID:28362342

  11. Multiple sensor smart robot hand with force control

    NASA Technical Reports Server (NTRS)

    Killion, Richard R.; Robinson, Lee R.; Bejczy, Antal

    1987-01-01

    A smart robot hand developed at JPL for the Protoflight Manipulator Arm (PFMA) is described. The development of this smart hand was based on an integrated design and subsystem architecture by considering mechanism, electronics, sensing, control, display, and operator interface in an integrated design approach. The mechanical details of this smart hand and the overall subsystem are described elsewhere. The sensing and electronics components of the JPL/PFMA smart hand are summarized and it is described in some detail in control capabilities.

  12. SMARTE: HELPING COMMUNITIES OVERCOME OBSTACLES TO REVITALIZATION (04/23/07)

    EPA Science Inventory

    Sustainable Management Approaches and Revitalization Tools - electronic (SMARTe), is an open-source, web-based, decision support system for developing and evaluating future reuse scenarios for potentially contaminated land. SMARTe contains information and analysis tools for all a...

  13. Translating Disparities Research to Policy: A Qualitative Study of State Mental Health Policymakers' Perceptions of Mental Health Care Disparities Report Cards

    PubMed Central

    Valentine, Anne; DeAngelo, Darcie; Alegría, Margarita; Cook, Benjamin L.

    2014-01-01

    Report cards have been used to increase accountability and quality of care in health care settings, and to improve state infrastructure for providing quality mental health care services. However, to date, report cards have not been used to compare states on racial/ethnic disparities in mental health care. This qualitative study examines reactions of mental health care policymakers to a proposed mental health care disparities report card generated from population-based survey data of mental health and mental health care utilization. We elicited feedback about the content, format, and salience of the report card. Interviews were conducted with nine senior advisors to state policymakers and one policy director of a national non-governmental organization from across the U.S. Four primary themes emerged: fairness in state-by-state comparisons; disconnect between the goals and language of policymakers and researchers; concerns about data quality and; targeted suggestions from policymakers. Participant responses provide important information that can contribute to making evidence-based research more accessible to policymakers. Further, policymakers suggested ways to improve the structure and presentation of report cards to make them more accessible to policymakers and to foster equity considerations during the implementation of new health care legislation. To reduce mental health care disparities, effort is required to facilitate understanding between researchers and relevant stakeholders about research methods, standards for interpretation of research-based evidence and its use in evaluating policies aimed at ameliorating disparities. PMID:25383993

  14. Crowdsourced Smart Cities versus Corporate Smart Cities

    NASA Astrophysics Data System (ADS)

    Alizadeh, Tooran

    2018-05-01

    Considering the speedy growth of smart-city promises and practices, there is an urgent need to take a critical approach and offer an integrated vision for an otherwise fragmented and sectoral concept. In particular, the literature warns about a critical deficit around the theorization of the smart city because discussions of relevant smart city theories or frameworks are few and fall short of offering alternative practical resolutions to the dominant discourse. In developing a response to such a deficit, this paper takes up the challenge to broaden theoretical insights into smart cities, by offering a bottom-up understanding of the ‘smart city’ concept with special attention to the potential of passive crowdsourcing based on the ocean of mostly untapped and unutilized available data in the public domain. Crowdsourced smart cities are proposed as an alternative to enable public engagement in smart city debates and decision-making – especially when dealing with global digital corporations.

  15. Air Force Smart Bases

    DTIC Science & Technology

    2017-10-19

    the future. Then to design an information and data architecture to enable many use cases for further mission experimentation and acquisition strategy...development. A key feature of the future of smart cities (or, in our case , smart bases) is that citizen engagement with one another and with their...cybersecurity on Air Force installations. Participants The design sprint brought in over 30 participants from across the military and industry

  16. An interactive web-based application for Comprehensive Analysis of RNAi-screen Data.

    PubMed

    Dutta, Bhaskar; Azhir, Alaleh; Merino, Louis-Henri; Guo, Yongjian; Revanur, Swetha; Madhamshettiwar, Piyush B; Germain, Ronald N; Smith, Jennifer A; Simpson, Kaylene J; Martin, Scott E; Buehler, Eugen; Beuhler, Eugen; Fraser, Iain D C

    2016-02-23

    RNAi screens are widely used in functional genomics. Although the screen data can be susceptible to a number of experimental biases, many of these can be corrected by computational analysis. For this purpose, here we have developed a web-based platform for integrated analysis and visualization of RNAi screen data named CARD (for Comprehensive Analysis of RNAi Data; available at https://card.niaid.nih.gov). CARD allows the user to seamlessly carry out sequential steps in a rigorous data analysis workflow, including normalization, off-target analysis, integration of gene expression data, optimal thresholds for hit selection and network/pathway analysis. To evaluate the utility of CARD, we describe analysis of three genome-scale siRNA screens and demonstrate: (i) a significant increase both in selection of subsequently validated hits and in rejection of false positives, (ii) an increased overlap of hits from independent screens of the same biology and (iii) insight to microRNA (miRNA) activity based on siRNA seed enrichment.

  17. An interactive web-based application for Comprehensive Analysis of RNAi-screen Data

    PubMed Central

    Dutta, Bhaskar; Azhir, Alaleh; Merino, Louis-Henri; Guo, Yongjian; Revanur, Swetha; Madhamshettiwar, Piyush B.; Germain, Ronald N.; Smith, Jennifer A.; Simpson, Kaylene J.; Martin, Scott E.; Beuhler, Eugen; Fraser, Iain D. C.

    2016-01-01

    RNAi screens are widely used in functional genomics. Although the screen data can be susceptible to a number of experimental biases, many of these can be corrected by computational analysis. For this purpose, here we have developed a web-based platform for integrated analysis and visualization of RNAi screen data named CARD (for Comprehensive Analysis of RNAi Data; available at https://card.niaid.nih.gov). CARD allows the user to seamlessly carry out sequential steps in a rigorous data analysis workflow, including normalization, off-target analysis, integration of gene expression data, optimal thresholds for hit selection and network/pathway analysis. To evaluate the utility of CARD, we describe analysis of three genome-scale siRNA screens and demonstrate: (i) a significant increase both in selection of subsequently validated hits and in rejection of false positives, (ii) an increased overlap of hits from independent screens of the same biology and (iii) insight to microRNA (miRNA) activity based on siRNA seed enrichment. PMID:26902267

  18. Secure E-Business applications based on the European Citizen Card

    NASA Astrophysics Data System (ADS)

    Zipfel, Christian; Daum, Henning; Meister, Gisela

    The introduction of ID cards enhanced with electronic authentication services opens up the possibility to use these for identification and authentication in e-business applications. To avoid incompatible national solutions, the specification of the European Citizen Card aims at defining interoperable services for such use cases. Especially the given device authentication methods can help to eliminate security problems with current e-business and online banking applications.

  19. Design of Formats and Packs of Catalog Cards.

    ERIC Educational Resources Information Center

    OCLC Online Computer Library Center, Inc., Dublin, OH.

    The three major functions of the Ohio College Library Center's Shared Cataloging System are: 1) provision of union catalog location listing; 2) making available cataloging done by one library to all other users of the system; and 3) production of catalog cards. The system, based on a central machine readable data base, speeds cataloging and…

  20. Business Japanese, a HyperCard Simulation.

    ERIC Educational Resources Information Center

    Saito-Abbott, Yoshiko; Abbott, Thomas

    This paper describes Business Japanese (BJ), a HyperCard based tutorial designed as courseware for use in a third-year Japanese course at the University of Texas, Austin (UTA). A major objective was to develop good courseware based on proven language learning theory that would integrate theory, practice, and technology. BJ stresses a realistic and…

  1. Smart manufacturing systems for Industry 4.0: Conceptual framework, scenarios, and future perspectives

    NASA Astrophysics Data System (ADS)

    Zheng, Pai; wang, Honghui; Sang, Zhiqian; Zhong, Ray Y.; Liu, Yongkui; Liu, Chao; Mubarok, Khamdi; Yu, Shiqiang; Xu, Xun

    2018-06-01

    Information and communication technology is undergoing rapid development, and many disruptive technologies, such as cloud computing, Internet of Things, big data, and artificial intelligence, have emerged. These technologies are permeating the manufacturing industry and enable the fusion of physical and virtual worlds through cyber-physical systems (CPS), which mark the advent of the fourth stage of industrial production (i.e., Industry 4.0). The widespread application of CPS in manufacturing environments renders manufacturing systems increasingly smart. To advance research on the implementation of Industry 4.0, this study examines smart manufacturing systems for Industry 4.0. First, a conceptual framework of smart manufacturing systems for Industry 4.0 is presented. Second, demonstrative scenarios that pertain to smart design, smart machining, smart control, smart monitoring, and smart scheduling, are presented. Key technologies and their possible applications to Industry 4.0 smart manufacturing systems are reviewed based on these demonstrative scenarios. Finally, challenges and future perspectives are identified and discussed.

  2. Use of Occult Blood Detection Cards for Real-Time PCR-Based Diagnosis of Schistosoma Mansoni Infection

    PubMed Central

    Schunk, Mirjam; Kebede Mekonnen, Seleshi; Wondafrash, Beyene; Mengele, Carolin; Fleischmann, Erna; Herbinger, Karl-Heinz; Verweij, Jaco J.; Geldmacher, Christof; Bretzel, Gisela; Löscher, Thomas; Zeynudin, Ahmed

    2015-01-01

    Background In Schistosoma mansoni infection, diagnosis and control after treatment mainly rely on parasitological stool investigations which are laborious and have limited sensitivity. PCR methods have shown equal or superior sensitivity but preservation and storage methods limit their use in the field. Therefore, the use of occult blood detection cards (fecal cards) for easy sampling and storage of fecal samples for further PCR testing was evaluated in a pilot study. Methodology Stool specimens were collected in a highly endemic area for S. mansoni in Ethiopia and submitted in an investigator-blinded fashion to microscopic examination by Kato-Katz thick smear as well as to real-time PCR using either fresh frozen stool samples or stool smears on fecal cards which have been stored at ambient temperature for up to ten months. Principal Findings Out of 55 stool samples, 35 were positive by microscopy, 33 and 32 were positive by PCR of frozen samples and of fecal card samples, respectively. When microscopy was used as diagnostic “gold standard”, the sensitivity of PCR on fresh stool was 94.3% (95%-CI: 86.6; 100) and on fecal cards 91.4% (95%-CI: 82.2; 100). Conclusions The use of fecal cards proved to be a simple and useful method for stool collection and prolonged storage prior to PCR based diagnosis of S. mansoni infection. This technique may be a valuable approach for large scale surveillance and post treatment assessments PMID:26360049

  3. Use of Occult Blood Detection Cards for Real-Time PCR-Based Diagnosis of Schistosoma Mansoni Infection.

    PubMed

    Schunk, Mirjam; Kebede Mekonnen, Seleshi; Wondafrash, Beyene; Mengele, Carolin; Fleischmann, Erna; Herbinger, Karl-Heinz; Verweij, Jaco J; Geldmacher, Christof; Bretzel, Gisela; Löscher, Thomas; Zeynudin, Ahmed

    2015-01-01

    In Schistosoma mansoni infection, diagnosis and control after treatment mainly rely on parasitological stool investigations which are laborious and have limited sensitivity. PCR methods have shown equal or superior sensitivity but preservation and storage methods limit their use in the field. Therefore, the use of occult blood detection cards (fecal cards) for easy sampling and storage of fecal samples for further PCR testing was evaluated in a pilot study. Stool specimens were collected in a highly endemic area for S. mansoni in Ethiopia and submitted in an investigator-blinded fashion to microscopic examination by Kato-Katz thick smear as well as to real-time PCR using either fresh frozen stool samples or stool smears on fecal cards which have been stored at ambient temperature for up to ten months. Out of 55 stool samples, 35 were positive by microscopy, 33 and 32 were positive by PCR of frozen samples and of fecal card samples, respectively. When microscopy was used as diagnostic "gold standard", the sensitivity of PCR on fresh stool was 94.3% (95%-CI: 86.6; 100) and on fecal cards 91.4% (95%-CI: 82.2; 100). The use of fecal cards proved to be a simple and useful method for stool collection and prolonged storage prior to PCR based diagnosis of S. mansoni infection. This technique may be a valuable approach for large scale surveillance and post treatment assessments.

  4. A credit card verifier structure using diffraction and spectroscopy concepts

    NASA Astrophysics Data System (ADS)

    Sumriddetchkajorn, Sarun; Intaravanne, Yuttana

    2008-04-01

    We propose and experimentally demonstrate an angle-multiplexing based optical structure for verifying a credit card. Our key idea comes from the fact that the fine detail of the embossed hologram stamped on the credit card is hard to duplicate and therefore its key color features can be used for distinguishing between the real and counterfeit ones. As the embossed hologram is a diffractive optical element, we choose to shine one at a time a number of broadband lightsources, each at different incident angle, on the embossed hologram of the credit card in such a way that different color spectra per incident angle beam is diffracted and separated in space. In this way, the number of pixels of each color plane is investigated. Then we apply a feed forward back propagation neural network configuration to separate the counterfeit credit card from the real one. Our experimental demonstration using two off-the-shelf broadband white light emitting diodes, one digital camera, a 3-layer neural network, and a notebook computer can identify all 69 counterfeit credit cards from eight real credit cards.

  5. Structure of the Mtb CarD/RNAP β-lobes complex reveals the molecular basis of interaction and presents a distinct DNA-binding domain for Mtb CarD.

    PubMed

    Gulten, Gulcin; Sacchettini, James C

    2013-10-08

    CarD from Mycobacterium tuberculosis (Mtb) is an essential protein shown to be involved in stringent response through downregulation of rRNA and ribosomal protein genes. CarD interacts with the β-subunit of RNAP and this interaction is vital for Mtb's survival during the persistent infection state. We have determined the crystal structure of CarD in complex with the RNAP β-subunit β1 and β2 domains at 2.1 Å resolution. The structure reveals the molecular basis of CarD/RNAP interaction, providing a basis to further our understanding of RNAP regulation by CarD. The structural fold of the CarD N-terminal domain is conserved in RNAP interacting proteins such as TRCF-RID and CdnL, and displays similar interactions to the predicted homology model based on the TRCF/RNAP β1 structure. Interestingly, the structure of the C-terminal domain, which is required for complete CarD function in vivo, represents a distinct DNA-binding fold. Copyright © 2013 Elsevier Ltd. All rights reserved.

  6. GET SMARTE: A DECISION SUPPORT SYSTEM TO REVITALIZE COMMUNITIES - CABERNET 2007

    EPA Science Inventory

    Sustainable Management Approaches and Revitalization Tools - electronic (SMARTe), is an open-source, web-based, decision support system for developing and evaluating future reuse scenarios for potentially contaminated land. SMARTe contains information and analysis tools for all a...

  7. WSN- and IOT-Based Smart Homes and Their Extension to Smart Buildings

    PubMed Central

    Ghayvat, Hemant; Mukhopadhyay, Subhas; Gui, Xiang; Suryadevara, Nagender

    2015-01-01

    Our research approach is to design and develop reliable, efficient, flexible, economical, real-time and realistic wellness sensor networks for smart home systems. The heterogeneous sensor and actuator nodes based on wireless networking technologies are deployed into the home environment. These nodes generate real-time data related to the object usage and movement inside the home, to forecast the wellness of an individual. Here, wellness stands for how efficiently someone stays fit in the home environment and performs his or her daily routine in order to live a long and healthy life. We initiate the research with the development of the smart home approach and implement it in different home conditions (different houses) to monitor the activity of an inhabitant for wellness detection. Additionally, our research extends the smart home system to smart buildings and models the design issues related to the smart building environment; these design issues are linked with system performance and reliability. This research paper also discusses and illustrates the possible mitigation to handle the ISM band interference and attenuation losses without compromising optimum system performance. PMID:25946630

  8. WSN- and IOT-Based Smart Homes and Their Extension to Smart Buildings.

    PubMed

    Ghayvat, Hemant; Mukhopadhyay, Subhas; Gui, Xiang; Suryadevara, Nagender

    2015-05-04

    Our research approach is to design and develop reliable, efficient, flexible, economical, real-time and realistic wellness sensor networks for smart home systems. The heterogeneous sensor and actuator nodes based on wireless networking technologies are deployed into the home environment. These nodes generate real-time data related to the object usage and movement inside the home, to forecast the wellness of an individual. Here, wellness stands for how efficiently someone stays fit in the home environment and performs his or her daily routine in order to live a long and healthy life. We initiate the research with the development of the smart home approach and implement it in different home conditions (different houses) to monitor the activity of an inhabitant for wellness detection. Additionally, our research extends the smart home system to smart buildings and models the design issues related to the smart building environment; these design issues are linked with system performance and reliability. This research paper also discusses and illustrates the possible mitigation to handle the ISM band interference and attenuation losses without compromising optimum system performance.

  9. Optical security features for plastic card documents

    NASA Astrophysics Data System (ADS)

    Hossick Schott, Joachim

    1998-04-01

    Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.

  10. Clinical evaluation of human papillomavirus detection by careHPV™ test on physician-samples and self-samples using the indicating FTA Elute® card.

    PubMed

    Wang, Shao-Ming; Hu, Shang-Ying; Chen, Feng; Chen, Wen; Zhao, Fang-Hui; Zhang, Yu-Qing; Ma, Xin-Ming; Qiao, You-Lin

    2014-01-01

    To make the clinical evaluation of a solid-state human papillomavirus (HPV) sampling medium in combination with an economical HPV testing method (careHPV™) for cervical cancer screening. 396 women aged 25-65 years were enrolled for cervical cancer screening, and four samples were collected. Two samples were collected by woman themselves, among which one was stored in DCM preservative solution (called "liquid sample") and the other was applied on the Whatman Indicating FTA Elute® card (FTA card). Another two samples were collected by physician and stored in DCM preservative solution and FTA card, respectively. All the samples were detected by careHPV™ test. All the women were administered a colposcopy examination, and biopsies were taken for pathological confirmation if necessary. FTA card demonstrated a comparable sensitivity of detecting high grade Cervical Intraepithelial Neoplasia (CIN) with the liquid sample carrier for self and physician-sampling, but showed a higher specificity than that of liquid sample carrier for self-sampling (FTA vs Liquid: 79.0% vs 71.6%, p=0.02). Generally, the FTA card had a comparable accuracy with that of Liquid-based medium by different sampling operators, with an area under the curve of 0.807 for physician and FTA, 0.781 for physician and Liquid, 0.728 for self and FTA, and 0.733 for self and Liquid (p>0.05). FTA card is a promising sample carrier for cervical cancer screening. With appropriate education programmes and further optimization of the experimental workflow, FTA card based self-collection in combination with centralized careHPV™ testing can help expand the coverage of cervical cancer screening in low-resource areas.

  11. Business Case Analysis of the Marine Corps Base Pendleton Virtual Smart Grid

    DTIC Science & Technology

    2017-06-01

    Metering Infrastructure on DOD installations. An examination of five case studies highlights the costs and benefits of the Virtual Smart Grid (VSG...studies highlights the costs and benefits of the Virtual Smart Grid (VSG) developed by Space and Naval Warfare Systems Command for use at Marine Corps...41 A. SMART GRID BENEFITS .....................................................................41 B. SUMMARY OF VSG ESTIMATED COSTS AND BENEFITS

  12. Center-Based Child Care in the Pioneer Smart Start Partnerships of North Carolina. UNC Smart Start Evaluation Report.

    ERIC Educational Resources Information Center

    Maxwell, Kelly; Bryant, Donna; Peisner-Feinberg, Ellen; Buysse, Virginia

    Smart Start is North Carolina's partnership between state government and local leaders, service providers, and families to better serve children under 6 years and their families to ensure that all children enter school healthy and prepared to succeed. This study acquired a baseline measure of the quality of child care in the 12 pioneer Smart Start…

  13. Design of the smart scenic spot service platform

    NASA Astrophysics Data System (ADS)

    Yin, Min; Wang, Shi-tai

    2015-12-01

    With the deepening of the smart city construction, the model "smart+" is rapidly developing. Guilin, the international tourism metropolis fast constructing need smart tourism technology support. This paper studied the smart scenic spot service object and its requirements. And then constructed the smart service platform of the scenic spot application of 3S technology (Geographic Information System (GIS), Remote Sensing (RS) and Global Navigation Satellite System (GNSS)) and the Internet of things, cloud computing. Based on Guilin Seven-star Park scenic area as an object, this paper designed the Seven-star smart scenic spot service platform framework. The application of this platform will improve the tourists' visiting experience, make the tourism management more scientifically and standardly, increase tourism enterprises operating earnings.

  14. DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    Smart grids are susceptible to cyber-attack as a result of new communication, control and computation techniques employed in the grid. In this paper, we characterize and analyze the resiliency of smart grid communication architecture, specifically an RF mesh based architecture, under cyber attacks. We analyze the resiliency of the communication architecture by studying the performance of high-level smart grid functions such as metering, and demand response which depend on communication. Disrupting the operation of these functions impacts the operational resiliency of the smart grid. Our analysis shows that it takes an attacker only a small fraction of meters to compromisemore » the communication resiliency of the smart grid. We discuss the implications of our result to critical smart grid functions and to the overall security of the smart grid.« less

  15. Exploration and design of smart home circuit based on ZigBee

    NASA Astrophysics Data System (ADS)

    Luo, Huirong

    2018-05-01

    To apply ZigBee technique in smart home circuit design, in the hardware design link of ZigBee node, TI Company's ZigBee wireless communication chip CC2530 was used to complete the design of ZigBee RF module circuit and peripheral circuit. In addition, the function demand and the overall scheme of the intelligent system based on smart home furnishing were proposed. Finally, the smart home system was built by combining ZigBee network and intelligent gateway. The function realization, reliability and power consumption of ZigBee network were tested. The results showed that ZigBee technology was applied to smart home system, making it have some advantages in terms of flexibility, scalability, power consumption and indoor aesthetics. To sum up, the system has high application value.

  16. Age verification cards fail to fully prevent minors from accessing tobacco products.

    PubMed

    Kanda, Hideyuki; Osaki, Yoneatsu; Ohida, Takashi; Kaneita, Yoshitaka; Munezawa, Takeshi

    2011-03-01

    Proper age verification can prevent minors from accessing tobacco products. For this reason, electronic locking devices based on a proof-of age system utilising cards were installed in almost every tobacco vending machine across Japan and Germany to restrict sales to minors. We aimed to clarify the associations between amount smoked by high school students and the usage of age verification cards by conducting a nationwide cross-sectional survey of students in Japan. This survey was conducted in 2008. We asked high school students, aged 13-18 years, in Japan about their smoking behaviour, where they purchase cigarettes, if or if not they have used age verification cards, and if yes, how they obtained this card. As the amount smoked increased, the prevalence of purchasing cigarettes from vending machines also rose for both males and females. The percentage of those with experience of using an age verification card was also higher among those who smoked more. Somebody outside of family was the top source of obtaining cards. Surprisingly, around 5% of males and females belonging to the group with highest smoking levels applied for cards themselves. Age verification cards cannot fully prevent minors from accessing tobacco products. These findings suggest that a total ban of tobacco vending machines, not an age verification system, is needed to prevent sales to minors.

  17. Cloud computing for energy management in smart grid - an application survey

    NASA Astrophysics Data System (ADS)

    Naveen, P.; Kiing Ing, Wong; Kobina Danquah, Michael; Sidhu, Amandeep S.; Abu-Siada, Ahmed

    2016-03-01

    The smart grid is the emerging energy system wherein the application of information technology, tools and techniques that make the grid run more efficiently. It possesses demand response capacity to help balance electrical consumption with supply. The challenges and opportunities of emerging and future smart grids can be addressed by cloud computing. To focus on these requirements, we provide an in-depth survey on different cloud computing applications for energy management in the smart grid architecture. In this survey, we present an outline of the current state of research on smart grid development. We also propose a model of cloud based economic power dispatch for smart grid.

  18. A Cost Effective System Design Approach for Critical Space Systems

    NASA Technical Reports Server (NTRS)

    Abbott, Larry Wayne; Cox, Gary; Nguyen, Hai

    2000-01-01

    NASA-JSC required an avionics platform capable of serving a wide range of applications in a cost-effective manner. In part, making the avionics platform cost effective means adhering to open standards and supporting the integration of COTS products with custom products. Inherently, operation in space requires low power, mass, and volume while retaining high performance, reconfigurability, scalability, and upgradability. The Universal Mini-Controller project is based on a modified PC/104-Plus architecture while maintaining full compatibility with standard COTS PC/104 products. The architecture consists of a library of building block modules, which can be mixed and matched to meet a specific application. A set of NASA developed core building blocks, processor card, analog input/output card, and a Mil-Std-1553 card, have been constructed to meet critical functions and unique interfaces. The design for the processor card is based on the PowerPC architecture. This architecture provides an excellent balance between power consumption and performance, and has an upgrade path to the forthcoming radiation hardened PowerPC processor. The processor card, which makes extensive use of surface mount technology, has a 166 MHz PowerPC 603e processor, 32 Mbytes of error detected and corrected RAM, 8 Mbytes of Flash, and I Mbytes of EPROM, on a single PC/104-Plus card. Similar densities have been achieved with the quad channel Mil-Std-1553 card and the analog input/output cards. The power management built into the processor and its peripheral chip allows the power and performance of the system to be adjusted to meet the requirements of the application, allowing another dimension to the flexibility of the Universal Mini-Controller. Unique mechanical packaging allows the Universal Mini-Controller to accommodate standard COTS and custom oversized PC/104-Plus cards. This mechanical packaging also provides thermal management via conductive cooling of COTS boards, which are typically designed for convection cooling methods.

  19. Field-Programmable Gate Array-based fluxgate magnetometer with digital integration

    NASA Astrophysics Data System (ADS)

    Butta, Mattia; Janosek, Michal; Ripka, Pavel

    2010-05-01

    In this paper, a digital magnetometer based on printed circuit board fluxgate is presented. The fluxgate is pulse excited and the signal is extracted by gate integration. We investigate the possibility to perform integration on very narrow gates (typically 500 ns) by using digital techniques. The magnetometer is based on field-programmable gate array (FPGA) card: we will show all the advantages and disadvantages, given by digitalization of fluxgate output voltage by means of analog-to-digital converter on FPGA card, as well as digitalization performed by external digitizer. Due to very narrow gate, it is shown that a magnetometer entirely based on a FPGA card is preferable, because it avoids noise due to trigger instability. Both open loop and feedback operative mode are described and achieved results are presented.

  20. FreeWalker: a smart insole for longitudinal gait analysis.

    PubMed

    Wang, Baitong; Rajput, Kuldeep Singh; Tam, Wing-Kin; Tung, Anthony K H; Yang, Zhi

    2015-08-01

    Gait analysis is an important diagnostic measure to investigate the pattern of walking. Traditional gait analysis is generally carried out in a gait lab, with equipped force and body tracking sensors, which needs a trained medical professional to interpret the results. This procedure is tedious, expensive, and unreliable and makes it difficult to track the progress across multiple visits. In this paper, we present a smart insole called FreeWalker, which provides quantitative gait analysis outside the confinement of traditional lab, at low- cost. The insole consists of eight pressure sensors and two motion tracking sensors, i.e. 3-axis accelerometer and 3-axis gyroscope. This enables measurement of under-foot pressure distribution and motion sequences in real-time. The insole is enabled with onboard SD card as well as wireless data transmission, which help in continuous gait-cycle analysis. The data is then sent to a gateway, for analysis and interpretation of data, using a user interface where gait features are graphically displayed. We also present validation result of a subject's left foot, who was asked to perform a specific task. Experiment results show that we could achieve a data-sampling rate of over 1 KHz, transmitting data up to a distance of 20 meter and maintain a battery life of around 24 hours. Taking advantage of these features, FreeWalker can be used in various applications, like medical diagnosis, rehabilitation, sports and entertainment.

  1. A rule-based smart automated fertilization and irrigation systems

    NASA Astrophysics Data System (ADS)

    Yousif, Musab El-Rashid; Ghafar, Khairuddin; Zahari, Rahimi; Lim, Tiong Hoo

    2018-04-01

    Smart automation in industries has become very important as it can improve the reliability and efficiency of the systems. The use of smart technologies in agriculture have increased over the year to ensure and control the production of crop and address food security. However, it is important to use proper irrigation systems avoid water wastage and overfeeding of the plant. In this paper, a Smart Rule-based Automated Fertilization and Irrigation System is proposed and evaluated. We propose a rule based decision making algorithm to monitor and control the food supply to the plant and the soil quality. A build-in alert system is also used to update the farmer using a text message. The system is developed and evaluated using a real hardware.

  2. Performance evaluation of cognitive radio in advanced metering infrastructure communication

    NASA Astrophysics Data System (ADS)

    Hiew, Yik-Kuan; Mohd Aripin, Norazizah; Din, Norashidah Md

    2016-03-01

    Smart grid is an intelligent electricity grid system. A reliable two-way communication system is required to transmit both critical and non-critical smart grid data. However, it is difficult to locate a huge chunk of dedicated spectrum for smart grid communications. Hence, cognitive radio based communication is applied. Cognitive radio allows smart grid users to access licensed spectrums opportunistically with the constraint of not causing harmful interference to licensed users. In this paper, a cognitive radio based smart grid communication framework is proposed. Smart grid framework consists of Home Area Network (HAN) and Advanced Metering Infrastructure (AMI), while AMI is made up of Neighborhood Area Network (NAN) and Wide Area Network (WAN). In this paper, the authors only report the findings for AMI communication. AMI is smart grid domain that comprises smart meters, data aggregator unit, and billing center. Meter data are collected by smart meters and transmitted to data aggregator unit by using cognitive 802.11 technique; data aggregator unit then relays the data to billing center using cognitive WiMAX and TV white space. The performance of cognitive radio in AMI communication is investigated using Network Simulator 2. Simulation results show that cognitive radio improves the latency and throughput performances of AMI. Besides, cognitive radio also improves spectrum utilization efficiency of WiMAX band from 5.92% to 9.24% and duty cycle of TV band from 6.6% to 10.77%.

  3. Secure smart grid communications and information integration based on digital watermarking in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Yan, Xin; Zhang, Ling; Wu, Yang; Luo, Youlong; Zhang, Xiaoxing

    2017-02-01

    As more and more wireless sensor nodes and networks are employed to acquire and transmit the state information of power equipment in smart grid, we are in urgent need of some viable security solutions to ensure secure smart grid communications. Conventional information security solutions, such as encryption/decryption, digital signature and so forth, are not applicable to wireless sensor networks in smart grid any longer, where bulk messages need to be exchanged continuously. The reason is that these cryptographic solutions will account for a large portion of the extremely limited resources on sensor nodes. In this article, a security solution based on digital watermarking is adopted to achieve the secure communications for wireless sensor networks in smart grid by data and entity authentications at a low cost of operation. Our solution consists of a secure framework of digital watermarking, and two digital watermarking algorithms based on alternating electric current and time window, respectively. Both watermarking algorithms are composed of watermark generation, embedding and detection. The simulation experiments are provided to verify the correctness and practicability of our watermarking algorithms. Additionally, a new cloud-based architecture for the information integration of smart grid is proposed on the basis of our security solutions.

  4. SMARTE 2007 TUTORIAL - JANUARY 2007 REVISION

    EPA Science Inventory

    SMARTe 2007 is a web-based decision support tool intended to help revitalization practitioners find information, perform data analysis, communicate, and evaluate future reuse options for a site or area. This tutorial CD was developed to help users navigate SMARTe 2007. It is appr...

  5. Detection of enteropathogens associated with travelers’ diarrhea using a multiplex Luminex-based assay performed on stool samples smeared on Whatman FTA Elute cards

    PubMed Central

    Lalani, Tahaniyat; Tisdale, Michele D; Maguire, Jason D; Wongsrichanalai, Chansuda; Riddle, Mark S; Tribble, David R

    2015-01-01

    We evaluated the limits of detection (LoD) for an 11-plex PCR-Luminex assay performed on Whatman FTA Elute cards smeared with stool containing pathogens associated with travelers’ diarrhea. LoDs ranged between 102-105 CFU, PFU or cysts/g for most pathogens except Cryptosporidium. Campylobacter and norovirus LoD increased with prolonged storage of cards. PMID:26072151

  6. Evaluating stakeholder management performance using a stakeholder report card: the next step in theory and practice.

    PubMed

    Malvey, Donna; Fottler, Myron D; Slovensky, Donna J

    2002-01-01

    In the highly competitive health care environment, the survival of an organization may depend on how well powerful stakeholders are managed. Yet, the existing strategic stakeholder management process does not include evaluation of stakeholder management performance. To address this critical gap, this paper proposes a systematic method for evaluation using a stakeholder report card. An example of a physician report card based on this methodology is presented.

  7. Hearing results using the SMart piston prosthesis.

    PubMed

    Fayad, Jose N; Semaan, Maroun T; Meier, Josh C; House, John W

    2009-12-01

    SMart, a newly introduced piston prosthesis for stapedotomy, is a nitinol-based, heat-activated, self-crimping prosthesis. We review our hearing results and postoperative complications using this self-crimped piston prosthesis and compare them with those obtained using stainless steel or platinum piston prostheses. Audiometric results using the SMart piston are identical to those obtained using a conventional piston prosthesis. Retrospective chart review. Private neurotologic tertiary referral center. The 416 ears reviewed included 306 with a SMart prosthesis and 110 conventional prostheses. 61% were women. Mean follow-up time was 5.6 (standard deviation [SD], 6.3 mo) and 6.9 months (SD, 7.0 mo) for the 2 groups, respectively. Stapedotomy using the SMart or a conventional (non-SMart) prosthesis. Audiometric hearing results, including pure-tone average (PTA) and air-bone gap (ABG), and prevalence of postoperative complications. Mean postoperative PTA was 32.6 (SD, 16.8) dB for the SMart group and 29.4 (SD, 13.5) dB for the non-SMart group, with ABGs of 7.6 (SD, 8.9) and 6.0 (SD, 5.2) dB, respectively. Mean change (decrease) in ABG was 18.7 (SD, 13.1) dB for the SMart group and 19.9 (SD, 10.3) dB for the non-SMart group. High-frequency bone PTAs showed overclosure of 2.0 (SD, 7.9) dB for the SMart group and 3.6 (SD, 8.6) dB for the non-SMart group. Postoperative vertigo and tinnitus were infrequent. No significant differences in these audiometric outcomes or complication rates were noted between groups. There was no significant difference in rate of gap closure to within 10 dB (78.3 versus 84.2%, SMart and non-SMart, respectively) or 20 dB (94.2 and 98.0%). Compared with conventional stapes prostheses, the nitinol-based SMart is a safe and reliable stapes prosthesis that eliminates manual crimping without significantly altering the audiometric outcome. Complications are rare, but longer follow-up is needed before establishing long-term stability.

  8. Smart Electronic Textiles.

    PubMed

    Weng, Wei; Chen, Peining; He, Sisi; Sun, Xuemei; Peng, Huisheng

    2016-05-17

    This Review describes the state-of-the-art of wearable electronics (smart textiles). The unique and promising advantages of smart electronic textiles are highlighted by comparing them with the conventional planar counterparts. The main kinds of smart electronic textiles based on different functionalities, namely the generation, storage, and utilization of electricity, are then discussed with an emphasis on the use of functional materials. The remaining challenges are summarized together with important new directions to provide some useful clues for the future development of smart electronic textiles. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. IEEE 1451.2 based Smart sensor system using ADuc847

    NASA Astrophysics Data System (ADS)

    Sreejithlal, A.; Ajith, Jose

    IEEE 1451 standard defines a standard interface for connecting transducers to microprocessor based data acquisition systems, instrumentation systems, control and field networks. Smart transducer interface module (STIM) acts as a unit which provides signal conditioning, digitization and data packet generation functions to the transducers connected to it. This paper describes the implementation of a microcontroller based smart transducer interface module based on IEEE 1451.2 standard. The module, implemented using ADuc847 microcontroller has 2 transducer channels and is programmed using Embedded C language. The Sensor system consists of a Network Controlled Application Processor (NCAP) module which controls the Smart transducer interface module (STIM) over an IEEE1451.2-RS232 bus. The NCAP module is implemented as a software module in C# language. The hardware details, control principles involved and the software implementation for the STIM are described in detail.

  10. Evaluation of four automated protocols for extraction of DNA from FTA cards.

    PubMed

    Stangegaard, Michael; Børsting, Claus; Ferrero-Miliani, Laura; Frank-Hansen, Rune; Poulsen, Lena; Hansen, Anders J; Morling, Niels

    2013-10-01

    Extraction of DNA using magnetic bead-based techniques on automated DNA extraction instruments provides a fast, reliable, and reproducible method for DNA extraction from various matrices. Here, we have compared the yield and quality of DNA extracted from FTA cards using four automated extraction protocols on three different instruments. The extraction processes were repeated up to six times with the same pieces of FTA cards. The sample material on the FTA cards was either blood or buccal cells. With the QIAamp DNA Investigator and QIAsymphony DNA Investigator kits, it was possible to extract DNA from the FTA cards in all six rounds of extractions in sufficient amount and quality to obtain complete short tandem repeat (STR) profiles on a QIAcube and a QIAsymphony SP. With the PrepFiler Express kit, almost all the extractable DNA was extracted in the first two rounds of extractions. Furthermore, we demonstrated that it was possible to successfully extract sufficient DNA for STR profiling from previously processed FTA card pieces that had been stored at 4 °C for up to 1 year. This showed that rare or precious FTA card samples may be saved for future analyses even though some DNA was already extracted from the FTA cards.

  11. Using the CDC Worksite Health ScoreCard to Assess Employer Health Promotion Efforts: A Case Study at Johns Hopkins Medicine.

    PubMed

    Safeer, Richard; Bowen, Wendy; Maung, Zaw; Lucik, Meg

    2018-02-01

    The aim of this study was to determine whether the Centers for Disease Control and Prevention Worksite Health ScoreCard (ScoreCard) is an effective vehicle for measuring workplace health promotion programs and causing change in a large employer with multiple entities defined by different physical environments and types of workers. Johns Hopkins Medicine (JHM) representatives completed a baseline ScoreCard for each of their entities. In the subsequent year, improvement of the ScoreCard was tied to leadership performance evaluation. JHM year over year scores were analyzed, along with comparisons to national benchmarks. Eleven of the 12 JHM entities improved their overall score from year one to year two and the JHM enterprise surpassed national benchmarks in year two. Organizations can use the ScoreCard as an effective measurement tool and as a method to improve the number of evidenced-based health promotion strategies provided to their employees.

  12. "InFection Four": Development of a Youth-Informed Sexual Health Card Game

    ERIC Educational Resources Information Center

    Gilliam, Melissa; Jagoda, Patrick; Heathcock, Stephen; Sutherland, Ainsley

    2014-01-01

    Games may be useful tools for learning and communicating about sexual and reproductive health. This article discusses the collaborative design and subsequent evaluation of a narrative-based card game. This game was created in a workshop based on positive youth development, which allowed youth to be involved as game designers and game players.…

  13. Self-Administered, Home-Based SMART (Sensorimotor Active Rehabilitation Training) Arm Training: A Single-Case Report.

    PubMed

    Hayward, Kathryn S; Neibling, Bridee A; Barker, Ruth N

    2015-01-01

    This single-case, mixed-method study explored the feasibility of self-administered, home-based SMART (sensorimotor active rehabilitation training) Arm training for a 57-yr-old man with severe upper-limb disability after a right frontoparietal hemorrhagic stroke 9 mo earlier. Over 4 wk of self-administered, home-based SMART Arm training, the participant completed 2,100 repetitions unassisted. His wife provided support for equipment set-up and training progressions. Clinically meaningful improvements in arm impairment (strength), activity (arm and hand tasks), and participation (use of arm in everyday tasks) occurred after training (at 4 wk) and at follow-up (at 16 wk). Areas for refinement of SMART Arm training derived from thematic analysis of the participant's and researchers' journals focused on enabling independence, ensuring home and user friendliness, maintaining the motivation to persevere, progressing toward everyday tasks, and integrating practice into daily routine. These findings suggest that further investigation of self-administered, home-based SMART Arm training is warranted for people with stroke who have severe upper-limb disability. Copyright © 2015 by the American Occupational Therapy Association, Inc.

  14. Use of personalized Dynamic Treatment Regimes (DTRs) and Sequential Multiple Assignment Randomized Trials (SMARTs) in mental health studies

    PubMed Central

    Liu, Ying; ZENG, Donglin; WANG, Yuanjia

    2014-01-01

    Summary Dynamic treatment regimens (DTRs) are sequential decision rules tailored at each point where a clinical decision is made based on each patient’s time-varying characteristics and intermediate outcomes observed at earlier points in time. The complexity, patient heterogeneity, and chronicity of mental disorders call for learning optimal DTRs to dynamically adapt treatment to an individual’s response over time. The Sequential Multiple Assignment Randomized Trial (SMARTs) design allows for estimating causal effects of DTRs. Modern statistical tools have been developed to optimize DTRs based on personalized variables and intermediate outcomes using rich data collected from SMARTs; these statistical methods can also be used to recommend tailoring variables for designing future SMART studies. This paper introduces DTRs and SMARTs using two examples in mental health studies, discusses two machine learning methods for estimating optimal DTR from SMARTs data, and demonstrates the performance of the statistical methods using simulated data. PMID:25642116

  15. Development of a mini-mobile digital radiography system by using wireless smart devices.

    PubMed

    Jeong, Chang-Won; Joo, Su-Chong; Ryu, Jong-Hyun; Lee, Jinseok; Kim, Kyong-Woo; Yoon, Kwon-Ha

    2014-08-01

    The current technologies that trend in digital radiology (DR) are toward systems using portable smart mobile as patient-centered care. We aimed to develop a mini-mobile DR system by using smart devices for wireless connection into medical information systems. We developed a mini-mobile DR system consisting of an X-ray source and a Complementary Metal-Oxide Semiconductor (CMOS) sensor based on a flat panel detector for small-field diagnostics in patients. It is used instead of the systems that are difficult to perform with a fixed traditional device. We also designed a method for embedded systems in the development of portable DR systems. The external interface used the fast and stable IEEE 802.11n wireless protocol, and we adapted the device for connections with Picture Archiving and Communication System (PACS) and smart devices. The smart device could display images on an external monitor other than the monitor in the DR system. The communication modules, main control board, and external interface supporting smart devices were implemented. Further, a smart viewer based on the external interface was developed to display image files on various smart devices. In addition, the advantage of operators is to reduce radiation dose when using remote smart devices. It is integrated with smart devices that can provide X-ray imaging services anywhere. With this technology, it can permit image observation on a smart device from a remote location by connecting to the external interface. We evaluated the response time of the mini-mobile DR system to compare to mobile PACS. The experimental results show that our system outperforms conventional mobile PACS in this regard.

  16. Towards a conceptual framework of OSH risk management in smart working environments based on smart PPE, ambient intelligence and the Internet of Things technologies.

    PubMed

    Podgórski, Daniel; Majchrzycka, Katarzyna; Dąbrowska, Anna; Gralewicz, Grzegorz; Okrasa, Małgorzata

    2017-03-01

    Recent developments in domains of ambient intelligence (AmI), Internet of Things, cyber-physical systems (CPS), ubiquitous/pervasive computing, etc., have led to numerous attempts to apply ICT solutions in the occupational safety and health (OSH) area. A literature review reveals a wide range of examples of smart materials, smart personal protective equipment and other AmI applications that have been developed to improve workers' safety and health. Because the use of these solutions modifies work methods, increases complexity of production processes and introduces high dynamism into thus created smart working environments (SWE), a new conceptual framework for dynamic OSH management in SWE is called for. A proposed framework is based on a new paradigm of OSH risk management consisting of real-time risk assessment and the capacity to monitor the risk level of each worker individually. A rationale for context-based reasoning in SWE and a respective model of the SWE-dedicated CPS are also proposed.

  17. Reduction of peak energy demand based on smart appliances energy consumption adjustment

    NASA Astrophysics Data System (ADS)

    Powroźnik, P.; Szulim, R.

    2017-08-01

    In the paper the concept of elastic model of energy management for smart grid and micro smart grid is presented. For the proposed model a method for reducing peak demand in micro smart grid has been defined. The idea of peak demand reduction in elastic model of energy management is to introduce a balance between demand and supply of current power for the given Micro Smart Grid in the given moment. The results of the simulations studies were presented. They were carried out on real household data available on UCI Machine Learning Repository. The results may have practical application in the smart grid networks, where there is a need for smart appliances energy consumption adjustment. The article presents a proposal to implement the elastic model of energy management as the cloud computing solution. This approach of peak demand reduction might have application particularly in a large smart grid.

  18. Measuring level of friendliness of smart city: a perceptual study

    NASA Astrophysics Data System (ADS)

    Sani Roychansyah, Muhammad; Felasari, Sushardjanti

    2018-03-01

    Currently the concept of smart city comes not only at the level of discussion, but some cities have stepped in the stage of implementation. Many of promised benefits will be met for the needs of urban residents if the city applies this concept. Conversely, many professionals and scholars are still in doubt about readiness of a city in the application of this concept. Dimension of friendliness of the real city certainly will have some limitations in a smart city that relies more on interactions with information and communication technology (ICT). This new paradigm becomes background of this paper in viewing the friendliness dimension of a smart city based on city residents’ perceptions. This paper uses case of 2 cities that have different level of readiness in the application of smart city. They are Yogyakarta City and Magelang City, both are located in Central Java. The method applied in this paper is quantitative method based on perceptual answer of respondents structured in a Likert Scale. Importance Performance Analysis (IPA) is then used to look at the attributes of smart city’s dimension which will show the relationship of the level of city friendliness and the level of city readiness in an application of smart city. The result briefly shows that the level of city sensitivity in the application of smart city is very influential in viewing the friendliness of the city. The city that is better equipped to meet the needs of its population according to the dimensions of the smart city based on its existing characteristics has higher friendliness. Time period of applying a smart city concept as the City of Yogyakarta has done longer before Magelang City, is not a guarantee that the city then has a better level of friendliness. The urban citizens have appropriate affective aspect to articulate between what they need and what the city has provided.

  19. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Granhus, B.; Heid, S.

    Den norske statsoljeselskap a.s. (Statoil) which is a major Norwegian oil company has used a mainframe (VM/CMS) based occupational health information system (OHIS) since 1991. The system is distributed among 11 offshore platforms, two refineries and three office centers. It contains medical (25000) workplace (1500) and 6500 material safety data sheet (MSDS) records. The paper deals with the experiences and challenges met during the development of this system and a new client/server based version for Windows{reg_sign}. In 1992 the Norwegian Data Inspectorate introduced new legislation setting extremely strict standards for data protection and privacy. This demanded new solutions not yetmore » utilized for systems of this scale. The solution implements a fully encrypted data flow between the user of the medical modules, while the non sensitive data from the other modules are not encrypted. This involves the use of a special {open_quotes}smart-card{close_quotes} containing the user privileges as well as the encryption key. The system will combine the advantages of a local system together with the integration force of a centralized system. The new system was operational by February 1996. The paper also summarizes the experiences we have had with our OHIS, areas of good and bad cost/benefit, development pitfalls, and which factors are most important for customer satisfaction. This is very important because of the ever increasing demand for efficiency together with company reorganization and changing technology.« less

  20. Smart watch-based coaching with tiotropium and olodaterol ameliorates physical activity in patients with chronic obstructive pulmonary disease

    PubMed Central

    Hataji, Osamu; Nishii, Yoichi; Ito, Kentaro; Sakaguchi, Tadashi; Saiki, Haruko; Suzuki, Yuta; D'Alessandro-Gabazza, Corina; Fujimoto, Hajime; Kobayashi, Tetsu; Gabazza, Esteban C.; Taguchi, Osamu

    2017-01-01

    Combined therapy with tiotropium and olodaterol notably improves parameters of lung function and quality of life in patients with chronic obstructive pulmonary disease (COPD) compared to mono-components; however, its effect on physical activity is unknown. The present study evaluated whether combination therapy affects daily physical performance in patients with COPD under a smart watch-based encouragement program. This was a non-blinded clinical trial with no randomization or placebo control. A total of 20 patients with COPD were enrolled in the present study. The patients carried an accelerometer for 4 weeks; they received no therapy during the first 2 weeks but they were treated with combined tiotropium and olodaterol under a smart watch-based encouragement program for the last 2 weeks. The pulmonary function test, COPD assessment test, 6-min walk distance and parameters of physical activity were significantly improved (P<0.05) by combination therapy under smart watch-based coaching compared with values prior to treatment. To the best of our knowledge, the present study for the first time provides evidence that smart watch-based coaching in combination with tiotropium and olodaterol may improve daily physical activity in chronic obstructive pulmonary disease. PMID:29104624

  1. Smart watch-based coaching with tiotropium and olodaterol ameliorates physical activity in patients with chronic obstructive pulmonary disease.

    PubMed

    Hataji, Osamu; Nishii, Yoichi; Ito, Kentaro; Sakaguchi, Tadashi; Saiki, Haruko; Suzuki, Yuta; D'Alessandro-Gabazza, Corina; Fujimoto, Hajime; Kobayashi, Tetsu; Gabazza, Esteban C; Taguchi, Osamu

    2017-11-01

    Combined therapy with tiotropium and olodaterol notably improves parameters of lung function and quality of life in patients with chronic obstructive pulmonary disease (COPD) compared to mono-components; however, its effect on physical activity is unknown. The present study evaluated whether combination therapy affects daily physical performance in patients with COPD under a smart watch-based encouragement program. This was a non-blinded clinical trial with no randomization or placebo control. A total of 20 patients with COPD were enrolled in the present study. The patients carried an accelerometer for 4 weeks; they received no therapy during the first 2 weeks but they were treated with combined tiotropium and olodaterol under a smart watch-based encouragement program for the last 2 weeks. The pulmonary function test, COPD assessment test, 6-min walk distance and parameters of physical activity were significantly improved (P<0.05) by combination therapy under smart watch-based coaching compared with values prior to treatment. To the best of our knowledge, the present study for the first time provides evidence that smart watch-based coaching in combination with tiotropium and olodaterol may improve daily physical activity in chronic obstructive pulmonary disease.

  2. The Use of Smart phones in Ophthalmology.

    PubMed

    Zvornicanin, Edita; Zvornicanin, Jasmin; Hadziefendic, Bahrudin

    2014-06-01

    Smart phones are being increasingly used among health professionals. Ophthalmological applications are widely available and can turn smart phones into sophisticated medical devices. Smart phones can be useful instruments for the practice of evidence-based medicine, professional education, mobile clinical communication, patient education, disease self-management, remote patient monitoring or as powerful administrative tools. Several applications are available for different ophthalmological examinations that can assess visual acuity, color vision, astigmatism, pupil size, Amsler grid test and more. Smart phones can be useful ophthalmic devices for taking images of anterior and posterior eye segment. Professional literature and educational material for patients are easily available with use of smart phones. Smart phones can store great amount of informations and are useful for long term monitoring with caution for patient confidentiality. The use of smart phones especially as diagnostic tools is not standardized and results should be carefully considered. Innovative role of smartphone technology and its use in research, education and information sharing makes smart phones a future of ophthalmology and medicine.

  3. FTA Cards Facilitate Storage, Shipment, and Detection of Arboviruses in Infected Aedes aegypti Collected in Adult Mosquito Traps.

    PubMed

    Hall-Mendelin, Sonja; Hewitson, Glen R; Genge, Doris; Burtonclay, Peter J; De Jong, Amanda J; Pyke, Alyssa T; van den Hurk, Andrew F

    2017-05-01

    AbstractThe utility of applying infected Aedes aegypti to Flinders Technology Associates (FTA ® ) cards for storage, transport, and detection of dengue, Zika, and Barmah Forest viruses was assessed in laboratory-based experiments. The mosquitoes had been removed from Gravid Aedes Traps maintained under conditions of high temperature and humidity. RNA of all viruses could be detected in infected mosquitoes on FTA cards either individually or in pools with uninfected mosquitoes, and stored for up to 28 days. Importantly, there was only a minimal decrease in RNA levels in mosquitoes between days 0 and 28, indicating that viral RNA was relatively stable on the cards. FTA cards thus provide a mechanism for storing potentially infected mosquitoes collected in the field and transporting them to a central diagnostic facility for virus detection.

  4. FTA Cards Facilitate Storage, Shipment, and Detection of Arboviruses in Infected Aedes aegypti Collected in Adult Mosquito Traps

    PubMed Central

    Hall-Mendelin, Sonja; Hewitson, Glen R.; Genge, Doris; Burtonclay, Peter J.; De Jong, Amanda J.; Pyke, Alyssa T.; van den Hurk, Andrew F.

    2017-01-01

    The utility of applying infected Aedes aegypti to Flinders Technology Associates (FTA®) cards for storage, transport, and detection of dengue, Zika, and Barmah Forest viruses was assessed in laboratory-based experiments. The mosquitoes had been removed from Gravid Aedes Traps maintained under conditions of high temperature and humidity. RNA of all viruses could be detected in infected mosquitoes on FTA cards either individually or in pools with uninfected mosquitoes, and stored for up to 28 days. Importantly, there was only a minimal decrease in RNA levels in mosquitoes between days 0 and 28, indicating that viral RNA was relatively stable on the cards. FTA cards thus provide a mechanism for storing potentially infected mosquitoes collected in the field and transporting them to a central diagnostic facility for virus detection. PMID:28500814

  5. Conveying population education through games.

    PubMed

    1987-01-01

    Games are extremely useful for conveying population education messages because they are entertaining, because they involve the players in the learning situation, and because, by compressing space and time, they enable the players to perceive the effects of future events on their own lives. One teaching game, called "Futures Wheel," enables the players to move step by step from an abstract real-world situation to its impact on their own lives. Another game, called "Card Game on Family Welfare," is played by 4 players using cards illustrating such things as preparation for marriage, planned families, small families, responsible parenthood, and women's roles. 24 of the 25 cards dealt to the players have matching pictures on a base sheet. The player who loses, i.e., cannot find a match for his last card, is holding the card which displays an unhappy big family.

  6. Use of a Nutrition Behavior Change Counseling Tool: Lessons from a Rapid Qualitative Assessment in Eastern Zambia

    PubMed Central

    Weiss, Ingrid; Stepanovic, Serena; Chinyemba, Ulembe; Bateman, Jessica; Hemminger, Carolyn; Burrows, Emily

    2016-01-01

    The U.S. Agency for International Development Feed the Future Mawa Project – led by Catholic Relief Services – aims to improve food and economic security for farming households in Zambia’s Eastern Province. Mawa employs social and behavior change (SBC) strategies with households and communities to improve nutrition and reduce stunting among children under two (CU2). To support these strategies, sub-partner University Research Co., LLC employed a participatory process to develop a series of 35 action cards, each illustrating one project-promoted behavior, that are used at household and community group levels. Caregivers of CU2 are given a full set of action cards to promote household dialogue and support for the promoted behaviors. As a final step in the action card tool development process, a qualitative rapid assessment was conducted 1 month after implementation to investigate preliminary ways action cards were being used, and if the methods of using the cards had the potential to impact behavior change. The research team conducted nine key informant interviews and four focus group discussions with Mawa staff and administered 41 qualitative interview questionnaires with project participants in the Chipata and Lundazi districts. Although not based on a representative sampling frame, the assessment produced valuable results for program improvement purposes. It also provided a feedback mechanism for community-based staff and project participants, a crucial step in the participatory tool development process. The assessment found that Mawa staff at every level use action cards combined with at least one other social behavior change tool for each nutrition intervention. Our results suggest that Mawa staff and project participants share a common understanding of the cards’ purpose. Each group noted that the cards provide a visual cue for action and reinforce previous Mawa nutrition messages. Intended uses confirmed by the assessment include encouraging household cooperation, negotiating behavior change, telling stories, and integrating messages with other project sectors. Based on the findings, recommendations for future project activities include aligning efforts against a theory of change to optimize use of all SBC tools; leveraging action card use to strengthen cross-sectoral integration within Mawa; and specific ongoing monitoring of action card use to improve activity implementation. PMID:27630980

  7. Smart house-based optimal operation of thermal unit commitment for a smart grid considering transmission constraints

    NASA Astrophysics Data System (ADS)

    Howlader, Harun Or Rashid; Matayoshi, Hidehito; Noorzad, Ahmad Samim; Muarapaz, Cirio Celestino; Senjyu, Tomonobu

    2018-05-01

    This paper presents a smart house-based power system for thermal unit commitment programme. The proposed power system consists of smart houses, renewable energy plants and conventional thermal units. The transmission constraints are considered for the proposed system. The generated power of the large capacity renewable energy plant leads to the violated transmission constraints in the thermal unit commitment programme, therefore, the transmission constraint should be considered. This paper focuses on the optimal operation of the thermal units incorporated with controllable loads such as Electrical Vehicle and Heat Pump water heater of the smart houses. The proposed method is compared with the power flow in thermal units operation without controllable loads and the optimal operation without the transmission constraints. Simulation results show the validation of the proposed method.

  8. Fabrication of Microcapsules for Dye-Doped Polymer-Dispersed Liquid Crystal-Based Smart Windows.

    PubMed

    Kim, Mingyun; Park, Kyun Joo; Seok, Seunghwan; Ok, Jong Min; Jung, Hee-Tae; Choe, Jaehoon; Kim, Do Hyun

    2015-08-19

    A dye-doped polymer-dispersed liquid crystal (PDLC) is an attractive material for application in smart windows. Smart windows using a PDLC can be operated simply and have a high contrast ratio compared to those of other devices that employed photochromic or thermochromic material. However, in conventional dye-doped PDLC methods, dye contamination can cause problems and has a limited degree of commercialization of electric smart windows. Here, we report on an approach to resolve dye-related problems by encapsulating the dye in monodispersed capsules. By encapsulation, a fabricated dye-doped PDLC had a contrast ratio of >120 at 600 nm. This fabrication method of encapsulating the dye in a core-shell structured microcapsule in a dye-doped PDLC device provides a practical platform for dye-doped PDLC-based smart windows.

  9. Evaluation of FTA(®) card for the rescue of infectious foot-and-mouth disease virus by chemical transfection of extracted RNA in cultured cells.

    PubMed

    Biswal, Jitendra K; Subramaniam, Saravanan; Ranjan, Rajeev; Pattnaik, Bramhadev

    2016-08-01

    Foot-and-mouth disease (FMD) is a highly contagious epidemic disease of transboundary importance. Inadequate storage and shipment of suspected clinical samples can compromise the ability to detect and characterise FMD virus (FMDV) in endemic countries, thereby, leading to the loss of valuable virological and epidemiological data. This study, investigates the potential of using FTA(®) cards for dry transportation of clinical samples and subsequent recovery of infectious FMDV by chemical transfection of FTA(®) card fixed RNA as an alternative to the conventional cell culture based virus isolation method. A higher proportion of infectious FMDV was rescued from clinical samples (cell culture isolates, tongue epithelial suspension and impression smears) by the FTA(®) card fixed RNA transfection method (76%) compared to the conventional cell culture based virus isolation (56%), suggesting a better performance of the current RNA transfection procedure. Furthermore, it was possible to rescue live virus by the transfection of RNA extracted from FTA(®) card impregnated with clinical samples that had been stored at varying temperature (4-37 °C) up to a period of six weeks. The VP1 sequence data and antigenic relationships with the vaccine strains, between viruses rescued by FTA(®) card fixed RNA transfection and conventional cell culture, were comparable. Therefore, these results support the use of the FTA(®) card for the economic, dry, non-hazardous transport of FMD suspected clinical samples from the site of collection to national/international reference laboratories. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Estimating Origin-Destination Matrices Using AN Efficient Moth Flame-Based Spatial Clustering Approach

    NASA Astrophysics Data System (ADS)

    Heidari, A. A.; Moayedi, A.; Abbaspour, R. Ali

    2017-09-01

    Automated fare collection (AFC) systems are regarded as valuable resources for public transport planners. In this paper, the AFC data are utilized to analysis and extract mobility patterns in a public transportation system. For this purpose, the smart card data are inserted into a proposed metaheuristic-based aggregation model and then converted to O-D matrix between stops, since the size of O-D matrices makes it difficult to reproduce the measured passenger flows precisely. The proposed strategy is applied to a case study from Haaglanden, Netherlands. In this research, moth-flame optimizer (MFO) is utilized and evaluated for the first time as a new metaheuristic algorithm (MA) in estimating transit origin-destination matrices. The MFO is a novel, efficient swarm-based MA inspired from the celestial navigation of moth insects in nature. To investigate the capabilities of the proposed MFO-based approach, it is compared to methods that utilize the K-means algorithm, gray wolf optimization algorithm (GWO) and genetic algorithm (GA). The sum of the intra-cluster distances and computational time of operations are considered as the evaluation criteria to assess the efficacy of the optimizers. The optimality of solutions of different algorithms is measured in detail. The traveler's behavior is analyzed to achieve to a smooth and optimized transport system. The results reveal that the proposed MFO-based aggregation strategy can outperform other evaluated approaches in terms of convergence tendency and optimality of the results. The results show that it can be utilized as an efficient approach to estimating the transit O-D matrices.

  11. The effects of MCH insurance cards on improving equity in access and use of maternal and child health care services in Tanzania: a mixed methods analysis.

    PubMed

    Kuwawenaruwa, August; Mtei, Gemini; Baraka, Jitihada; Tani, Kassimu

    2016-11-18

    Inequity in access and use of child and maternal health services is impeding progress towards reduction of maternal mortality in low-income countries. To address low usage of maternal and newborn health care services as well as financial protection of families, some countries have adopted demand-side financing. In 2010, Tanzania introduced free health insurance cards to pregnant women and their families to influence access, use, and provision of health services. However, little is known about whether the use of the maternal and child health cards improved equity in access and use of maternal and child health care services. A mixed methods approach was used in Rungwe district where maternal and child health insurance cards had been implemented. To assess equity, three categories of beneficiaries' education levels were used and were compared to that of women of reproductive age in the region from previous surveys. To explore factors influencing women's decisions on delivery site and use of the maternal and child health insurance card and attitudes towards the birth experience itself, a qualitative assessment was conducted at representative facilities at the district, ward, facility, and community level. A total of 31 in-depth interviews were conducted on women who delivered during the previous year and other key informants. Women with low educational attainment were under-represented amongst those who reported having received the maternal and child health insurance card and used it for facility delivery. Qualitative findings revealed that problems during the current pregnancy served as both a motivator and a barrier for choosing a facility-based delivery. Decision about delivery site was also influenced by having experienced or witnessed problems during previous birth delivery and by other individual, financial, and health system factors, including fines levied on women who delivered at home. To improve equity in access to facility-based delivery care using strategies such as maternal and child health insurance cards is necessary to ensure beneficiaries and other stakeholders are well informed of the programme, as giving women insurance cards only does not guarantee facility-based delivery.

  12. Adapting a commercial power system simulator for smart grid based system study and vulnerability assessment

    NASA Astrophysics Data System (ADS)

    Navaratne, Uditha Sudheera

    The smart grid is the future of the power grid. Smart meters and the associated network play a major role in the distributed system of the smart grid. Advance Metering Infrastructure (AMI) can enhance the reliability of the grid, generate efficient energy management opportunities and many innovations around the future smart grid. These innovations involve intense research not only on the AMI network itself but as also on the influence an AMI network can have upon the rest of the power grid. This research describes a smart meter testbed with hardware in loop that can facilitate future research in an AMI network. The smart meters in the testbed were developed such that their functionality can be customized to simulate any given scenario such as integrating new hardware components into a smart meter or developing new encryption algorithms in firmware. These smart meters were integrated into the power system simulator to simulate the power flow variation in the power grid on different AMI activities. Each smart meter in the network also provides a communication interface to the home area network. This research delivers a testbed for emulating the AMI activities and monitoring their effect on the smart grid.

  13. Hardware accelerator design for change detection in smart camera

    NASA Astrophysics Data System (ADS)

    Singh, Sanjay; Dunga, Srinivasa Murali; Saini, Ravi; Mandal, A. S.; Shekhar, Chandra; Chaudhury, Santanu; Vohra, Anil

    2011-10-01

    Smart Cameras are important components in Human Computer Interaction. In any remote surveillance scenario, smart cameras have to take intelligent decisions to select frames of significant changes to minimize communication and processing overhead. Among many of the algorithms for change detection, one based on clustering based scheme was proposed for smart camera systems. However, such an algorithm could achieve low frame rate far from real-time requirements on a general purpose processors (like PowerPC) available on FPGAs. This paper proposes the hardware accelerator capable of detecting real time changes in a scene, which uses clustering based change detection scheme. The system is designed and simulated using VHDL and implemented on Xilinx XUP Virtex-IIPro FPGA board. Resulted frame rate is 30 frames per second for QVGA resolution in gray scale.

  14. Multi-axis control based on movement control cards in NC systems

    NASA Astrophysics Data System (ADS)

    Jiang, Tingbiao; Wei, Yunquan

    2005-12-01

    Today most movement control cards need special control software of topper computers and are only suitable for fixed-axis controls. Consequently, the number of axes which can be controlled is limited. Advanced manufacture technology develops at a very high speed, and that development brings forth. New requirements for movement control in mechanisms and electronics. This paper introduces products of the 5th generation of movement control cards, PMAC 2A-PC/104, made by the Delta Tau Company in the USA. Based on an analysis of PMAC 2A-PC/104, this paper first describes two aspects relevant to the hardware structure of movement control cards and the interrelated software of the topper computers. Then, two methods are presented for solving these problems. The first method is to set limit switches on the movement control cards; all of them can be used to control each moving axis. The second method is to program applied software with existing programming language (for example, VC ++, Visual Basic, Delphi, and so forth). This program is much easier to operate and expand by its users. By using a limit switch, users can choose different axes in movement control cards. Also, users can change parts of the parameters in the control software of topper computers to realize different control axes. Combining these 2 methods proves to be convenient for realizing multi-axis control in numerical control systems.

  15. A novel signal amplification technology for ELISA based on catalyzed reporter deposition. Demonstration of its applicability for measuring aflatoxin B(1).

    PubMed

    Bhattacharya, D; Bhattacharya, R; Dhar, T K

    1999-11-19

    In an earlier communication we have described a novel signal amplification technology termed Super-CARD, which is able to significantly improve antigen detection sensitivity in conventional Dot-ELISA by approximately 10(5)-fold. The method utilizes hitherto unreported synthesized electron rich proteins containing multiple phenolic groups which, when immobilized over a solid phase as blocking agent, markedly increases the signal amplification capability of the existing CARD method (Bhattacharya, R., Bhattacharya, D., Dhar, T.K., 1999. A novel signal amplification technology based on catalyzed reporter deposition and its application in a Dot-ELISA with ultra high sensitivity. J. Immunol. Methods 227, 31.). In this paper we describe the utilization of this Super-CARD amplification technique in ELISA and its applicability for the rapid determination of aflatoxin B(1) (AFB(1)) in infected seeds. Using this method under identical conditions, the increase in absorbance over the CARD method was approximately 400%. The limit of detection of AFB(1) by this method was 0.1 pg/well, the sensitivity enhancement being 5-fold over the optimized CARD ELISA. Furthermore, the total incubation time was reduced to 16 min compared to 50 min for the CARD method. Assay specificity was not adversely affected and the amount of AFB(1) measured in seed extracts correlated well with the values obtained by conventional ELISA.

  16. Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme

    PubMed Central

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  17. Load Balancing Integrated Least Slack Time-Based Appliance Scheduling for Smart Home Energy Management.

    PubMed

    Silva, Bhagya Nathali; Khan, Murad; Han, Kijun

    2018-02-25

    The emergence of smart devices and smart appliances has highly favored the realization of the smart home concept. Modern smart home systems handle a wide range of user requirements. Energy management and energy conservation are in the spotlight when deploying sophisticated smart homes. However, the performance of energy management systems is highly influenced by user behaviors and adopted energy management approaches. Appliance scheduling is widely accepted as an effective mechanism to manage domestic energy consumption. Hence, we propose a smart home energy management system that reduces unnecessary energy consumption by integrating an automated switching off system with load balancing and appliance scheduling algorithm. The load balancing scheme acts according to defined constraints such that the cumulative energy consumption of the household is managed below the defined maximum threshold. The scheduling of appliances adheres to the least slack time (LST) algorithm while considering user comfort during scheduling. The performance of the proposed scheme has been evaluated against an existing energy management scheme through computer simulation. The simulation results have revealed a significant improvement gained through the proposed LST-based energy management scheme in terms of cost of energy, along with reduced domestic energy consumption facilitated by an automated switching off mechanism.

  18. Split Bregman multicoil accelerated reconstruction technique: A new framework for rapid reconstruction of cardiac perfusion MRI

    PubMed Central

    Kamesh Iyer, Srikant; Tasdizen, Tolga; Likhite, Devavrat; DiBella, Edward

    2016-01-01

    Purpose: Rapid reconstruction of undersampled multicoil MRI data with iterative constrained reconstruction method is a challenge. The authors sought to develop a new substitution based variable splitting algorithm for faster reconstruction of multicoil cardiac perfusion MRI data. Methods: The new method, split Bregman multicoil accelerated reconstruction technique (SMART), uses a combination of split Bregman based variable splitting and iterative reweighting techniques to achieve fast convergence. Total variation constraints are used along the spatial and temporal dimensions. The method is tested on nine ECG-gated dog perfusion datasets, acquired with a 30-ray golden ratio radial sampling pattern and ten ungated human perfusion datasets, acquired with a 24-ray golden ratio radial sampling pattern. Image quality and reconstruction speed are evaluated and compared to a gradient descent (GD) implementation and to multicoil k-t SLR, a reconstruction technique that uses a combination of sparsity and low rank constraints. Results: Comparisons based on blur metric and visual inspection showed that SMART images had lower blur and better texture as compared to the GD implementation. On average, the GD based images had an ∼18% higher blur metric as compared to SMART images. Reconstruction of dynamic contrast enhanced (DCE) cardiac perfusion images using the SMART method was ∼6 times faster than standard gradient descent methods. k-t SLR and SMART produced images with comparable image quality, though SMART was ∼6.8 times faster than k-t SLR. Conclusions: The SMART method is a promising approach to reconstruct good quality multicoil images from undersampled DCE cardiac perfusion data rapidly. PMID:27036592

  19. SUSTAINABLE MANAGEMENT APPROACHES AND REVITALIZATION TOOLS-ELECTRONIC (SMARTE): OVERVIEW AND DEMONSTRATION FOR FINAL PHASE 3 CONFERENCE

    EPA Science Inventory

    The U.S. contingent of the U.S.-German Bilateral Working Group is developing Sustainable Management Approaches and Revitalization Tools-electronic (SMARTe). SMARTe is a web-based, decision support system designed to assist stakeholders in developing and evaluating alternative reu...

  20. Smartness as a Cultural Practice in Schools

    ERIC Educational Resources Information Center

    Hatt, Beth

    2012-01-01

    This study explores smartness as a cultural construct rather than a biological capacity. The cultural construction of smartness has broad consequences related to teacher expectations, student academic identity development, and schooling inequities. This study is based on a 1-year ethnography in a kindergarten classroom, and the author investigates…

  1. Smart Sensors Gather Information for Machine Diagnostics

    NASA Technical Reports Server (NTRS)

    2014-01-01

    Stennis Space Center was interested in using smart sensors to monitor components on test stands and avert equipment failures. Partnering with St. Paul, Minnesota-based Lion Precision through a Cooperative Agreement, the team developed a smart sensor and the associated communication protocols. The same sensor is now commercially available for manufacturing.

  2. Computer-Based Training for Library Staff: A Demonstration Project Using HyperCard. Final Performance Report.

    ERIC Educational Resources Information Center

    Bayne, Pauline S; Rader, Joe C.

    The purpose of this project was to demonstrate that computer-based training (CBT) sessions, produced as HyperCard stacks (files), are an efficient and effective component for staff training in libraries. The purpose was successfully met in the 15-month period of development, evaluation, and implementation, and the University of Tennessee (UT)…

  3. Understanding the Impact of Online Grading and Standards-Based Report Cards: A Phenomenological Study on Teacher Instruction at the Elementary Level

    ERIC Educational Resources Information Center

    Mathena, Ann Ashley

    2017-01-01

    The purpose of this transcendental, phenomenological study was to understand the impact of online grading and standards-based report cards on elementary teacher instruction at a suburban school system. This research study examined teacher instruction and assessment, sharing obstacles, and resources necessary for the effective use of…

  4. Training and Maintenance of a Picture-Based Communication Response in Older Adults with Dementia

    ERIC Educational Resources Information Center

    Trahan, Maranda A.; Donaldson, Jeanne M.; McNabney, Matthew K.; Kahng, SungWoo

    2014-01-01

    We examined whether adults with dementia could learn to emit a picture-based communication response and if this skill would maintain over time. Three women with moderate to severe dementia were taught to exchange a picture card for a highly preferred activity. All participants quickly learned to exchange the picture card and maintained this…

  5. Breadboard Amplifier: Building and Using Simple Electrophysiology Equipment.

    PubMed

    Crisp, Kevin M; Lin, Hunter; Prosper, Issa

    2016-01-01

    Electrophysiology is a valuable skill for the neuroscientist, but the learning curve for students can be steep. Here we describe a very simple electromyography (EMG) amplifier that can be built from scratch by students with no electronics experience in about 30 minutes, making it ideal for incorporating into a laboratory activity. With few parts and no adjustments except the gain, students can begin physiology experiments quickly while having the satisfaction of having built the equipment themselves. Because the output of the circuit goes to a computer sound card, students can listen to electrophysiological activity as they see it on the computer screen, a feature many of our students greatly appreciated. Various applications are discussed, including dual channel recording, using streaming media platforms with remote lab partners and acquiring data in the field on a smart phone. Our students reported that they enjoyed being able to build a working device and using it to record from their own muscles.

  6. [Telematics in the health system and data protection].

    PubMed

    Müller, J H

    2005-06-01

    In the health system, telematics are to be used for the benefit of patients and to make it possible for them to receive better medical care. Telematics must be employed in accordance with the guidelines of data protection and this means in particular that the patient must remain the master of his data. Therefore, he must be able to decide in which situation and to whom he wants to reveal his medical data. For this reason, the exact implementation of the introduction of the electronic medical smart card envisaged by the law requires detailed access authorisations and limitations, which must be reinforced by ample technical security measures. These measures must be transmitted to the patients through co-operation of doctors and health insurance companies in such a transparent way that they recognise the advantages of the new technology. The higher the acceptance is on the patients' side, the more they will be willing to participate voluntarily in telematic projects.

  7. The Case for a Smoker's License

    PubMed Central

    Chapman, Simon

    2012-01-01

    Background to the debate Tobacco continues to kill millions of people around the world each year and its use is increasing in some countries, which makes the need for new, creative, and radical efforts to achieve the tobacco control endgame vitally important. One such effort is discussed in this PLOS Medicine Debate, where Simon Chapman presents his proposal for a “smoker's license” and Jeff Collin argues against. Chapman sets out a case for introducing a smart card license for smokers designed to limit access to tobacco products and encourage cessation. Key elements of the smoker's license include smokers setting daily limits, financial incentives for permanent license surrender, and a test of health risk knowledge for commencing smokers. Collin argues against the proposal, saying that it would shift focus away from the real vector of the epidemic—the tobacco industry—and that by focusing on individuals it would censure victims, increase stigmatization of smokers, and marginalize the poor. PMID:23152726

  8. Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest

    NASA Astrophysics Data System (ADS)

    Tanaka, Hidema

    It is well known that there is relationship between electromagnetic emanation and processing information in IT devices such as personal computers and smart cards. By analyzing such electromagnetic emanation, eavesdropper will be able to get some information, so it becomes a real threat of information security. In this paper, we show how to estimate amount of information that is leaked as electromagnetic emanation. We assume the space between the IT device and the receiver is a communication channel, and we define the amount of information leakage via electromagnetic emanations by its channel capacity. By some experimental results of Tempest, we show example estimations of amount of information leakage. Using the value of channel capacity, we can calculate the amount of information per pixel in the reconstructed image. And we evaluate the effectiveness of Tempest fonts generated by Gaussian method and its threshold of security.

  9. Wireless Communications in Smart Grid

    NASA Astrophysics Data System (ADS)

    Bojkovic, Zoran; Bakmaz, Bojan

    Communication networks play a crucial role in smart grid, as the intelligence of this complex system is built based on information exchange across the power grid. Wireless communications and networking are among the most economical ways to build the essential part of the scalable communication infrastructure for smart grid. In particular, wireless networks will be deployed widely in the smart grid for automatic meter reading, remote system and customer site monitoring, as well as equipment fault diagnosing. With an increasing interest from both the academic and industrial communities, this chapter systematically investigates recent advances in wireless communication technology for the smart grid.

  10. Smart homes for people with neurological disability: state of the art.

    PubMed

    Gentry, Tony

    2009-01-01

    Smart home technology can include environmental adaptations that allow remote control of home appliances, electronic communication, safety monitoring and automated task cueing, any of which may prove useful for people with neurological disability. This article outlines currently available smart home technologies, examines the burgeoning research in this area, discusses clinical and consumer resources and reviews ethical, funding and professional training considerations for smart home applications. I conclude that more outcomes-based research and collaboration among stakeholders is essential in order to establish guidance for designing, selecting and implementing individualized smart home solutions for those with neurological disability.

  11. Integrity Verification for SCADA Devices Using Bloom Filters and Deep Packet Inspection

    DTIC Science & Technology

    2014-03-27

    prevent intrusions in smart grids [PK12]. Parthasarathy proposed an anomaly detection based IDS that takes into account system state. In his implementation...Security, 25(7):498–506, 10 2006. [LMV12] O. Linda, M. Manic, and T. Vollmer. Improving cyber-security of smart grid systems via anomaly detection and...6 2012. 114 [PK12] S. Parthasarathy and D. Kundur. Bloom filter based intrusion detection for smart grid SCADA. In Electrical & Computer Engineering

  12. Hyperspectral imaging-based credit card verifier structure with adaptive learning.

    PubMed

    Sumriddetchkajorn, Sarun; Intaravanne, Yuttana

    2008-12-10

    We propose and experimentally demonstrate a hyperspectral imaging-based optical structure for verifying a credit card. Our key idea comes from the fact that the fine detail of the embossed hologram stamped on the credit card is hard to duplicate, and therefore its key color features can be used for distinguishing between the real and counterfeit ones. As the embossed hologram is a diffractive optical element, we shine a number of broadband light sources one at a time, each at a different incident angle, on the embossed hologram of the credit card in such a way that different color spectra per incident angle beam are diffracted and separated in space. In this way, the center of mass of the histogram on each color plane is investigated by using a feed-forward backpropagation neural-network configuration. Our experimental demonstration using two off-the-shelf broadband white light emitting diodes, one digital camera, and a three-layer neural network can effectively identify 38 genuine and 109 counterfeit credit cards with false rejection rates of 5.26% and 0.92%, respectively. Key features include low cost, simplicity, no moving parts, no need of an additional decoding key, and adaptive learning.

  13. A model of urban rational growth based on grey prediction

    NASA Astrophysics Data System (ADS)

    Xiao, Wenjing

    2017-04-01

    Smart growth focuses on building sustainable cities, using compact development to prevent urban sprawl. This paper establishes a series of models to implement smart growth theories into city design. Besides two specific city design cases are shown. Firstly, We establishes Smart Growth Measure Model to measure the success of smart growth of a city. And we use Full Permutation Polygon Synthetic Indicator Method to calculate the Comprehensive Indicator (CI) which is used to measure the success of smart growth. Secondly, this paper uses the principle of smart growth to develop a new growth plan for two cities. We establish an optimization model to maximum CI value. The Particle Swarm Optimization (PSO) algorithm is used to solve the model. Combined with the calculation results and the specific circumstances of cities, we make their the smart growth plan respectively.

  14. Complex IoT Systems as Enablers for Smart Homes in a Smart City Vision.

    PubMed

    Lynggaard, Per; Skouby, Knud Erik

    2016-11-02

    The world is entering a new era, where Internet-of-Things (IoT), smart homes, and smart cities will play an important role in meeting the so-called big challenges. In the near future, it is foreseen that the majority of the world's population will live their lives in smart homes and in smart cities. To deal with these challenges, to support a sustainable urban development, and to improve the quality of life for citizens, a multi-disciplinary approach is needed. It seems evident, however, that a new, advanced Information and Communications Technology ICT infrastructure is a key feature to realize the "smart" vision. This paper proposes a specific solution in the form of a hierarchical layered ICT based infrastructure that handles ICT issues related to the "big challenges" and seamlessly integrates IoT, smart homes, and smart city structures into one coherent unit. To exemplify benefits of this infrastructure, a complex IoT system has been deployed, simulated and elaborated. This simulation deals with wastewater energy harvesting from smart buildings located in a smart city context. From the simulations, it has been found that the proposed infrastructure is able to harvest between 50% and 75% of the wastewater energy in a smart residential building. By letting the smart city infrastructure coordinate and control the harvest time and duration, it is possible to achieve considerable energy savings in the smart homes, and it is possible to reduce the peak-load for district heating plants.

  15. Design of Smart Home Systems Prototype Using MyRIO

    NASA Astrophysics Data System (ADS)

    Ratna Wati, Dwi Ann; Abadianto, Dika

    2017-06-01

    This paper presents the design of smart home systems prototype. It applies. MyRIO 1900 embedded device as the main controller of the smart home systems. The systems include wireless monitoring systems and email based notifications as well as data logging. The prototype systems use simulated sensor such as temperature sensor, push button as proximity sensor, and keypad while its simulated actuators are buzzer as alarm system, LED as light and LCD. Based on the test and analysis, the smart home systems prototype as well as the wireless monitoring systems have real time responses when input signals are available. Tbe performance of MyRIO controller is excellent and it results in a stable system.

  16. Will hospital report cards make the grade?

    PubMed

    1997-07-01

    Hospital report cards that document patients' medical outcomes are attracting increasing attention for their role in guiding health care decisions by employers, consumers and providers. Significant questions remain, however, regarding the validity and utility of this information. This Issue Brief is based on a seminar held by the Center for Studying Health System Change at which two expert panels discussed whether report cards make the grade. The first panel approached this subject through a Socratic dialogue that focused on the release of a hypothetical community hospital report card. The second panel weighed in on two research presentations related to report cards. The panelists agreed that efforts to collect and report clinical outcomes data are flawed. Even so, release of the data can help improve clinical quality and foster an environment in which health care quality information ultimately has an impact on health care decision making.

  17. Security Enhanced EMV-Based Mobile Payment Protocol

    PubMed Central

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions. PMID:25302334

  18. Security enhanced EMV-based mobile payment protocol.

    PubMed

    Yang, Ming-Hour

    2014-01-01

    Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant's reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer's credits for risk control, and users can have online-equivalent credits in offline transactions.

  19. Detection of enteropathogens associated with travelers' diarrhea using a multiplex Luminex-based assay performed on stool samples smeared on Whatman FTA Elute cards.

    PubMed

    Lalani, Tahaniyat; Tisdale, Michele D; Maguire, Jason D; Wongsrichanalai, Chansuda; Riddle, Mark S; Tribble, David R

    2015-09-01

    We evaluated the limits of detection (LoD) for an 11-plex PCR-Luminex assay performed on Whatman(™) FTA Elute cards smeared with stool containing pathogens associated with travelers' diarrhea. LoDs ranged from 10(2) to 10(5)CFU, PFU, or cysts/g for most pathogens except Cryptosporidium. Campylobacter and norovirus LoDs increased with prolonged storage of cards. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. A Web of Things-Based Emerging Sensor Network Architecture for Smart Control Systems.

    PubMed

    Khan, Murad; Silva, Bhagya Nathali; Han, Kijun

    2017-02-09

    The Web of Things (WoT) plays an important role in the representation of the objects connected to the Internet of Things in a more transparent and effective way. Thus, it enables seamless and ubiquitous web communication between users and the smart things. Considering the importance of WoT, we propose a WoT-based emerging sensor network (WoT-ESN), which collects data from sensors, routes sensor data to the web, and integrate smart things into the web employing a representational state transfer (REST) architecture. A smart home scenario is introduced to evaluate the proposed WoT-ESN architecture. The smart home scenario is tested through computer simulation of the energy consumption of various household appliances, device discovery, and response time performance. The simulation results show that the proposed scheme significantly optimizes the energy consumption of the household appliances and the response time of the appliances.

Top