Design and implementation of a smart card based healthcare information system.
Kardas, Geylani; Tunali, E Turhan
2006-01-01
Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.
ERIC Educational Resources Information Center
Zuzack, Christine A.
1997-01-01
Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…
Imaging standards for smart cards
NASA Astrophysics Data System (ADS)
Ellson, Richard N.; Ray, Lawrence A.
1996-02-01
"Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.
Imaging standards for smart cards
NASA Astrophysics Data System (ADS)
Ellson, Richard N.; Ray, Lawrence A.
1996-01-01
'Smart cards' are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper reviews imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper concludes with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.
Prevention of Information Leakage by Photo-Coupling in Smart Card
NASA Astrophysics Data System (ADS)
Shen, Sung-Shiou; Chiu, Jung-Hui
Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.
Smart cards: a specific application in the hospital.
Güler, I; Zengin, R M; Sönmez, M
1998-12-01
Computers have the ability to process and access tremendous amounts of information in our daily lives. But, now, individuals have this ability by carrying a smart card in their own wallets. These cards provide us the versatility, power, and security of computers. This study begins with a short description of smart cards and their advantages. Then, an electronic circuit that is designed for healthcare application in hospitals is introduced. This circuit functions as a smart card holder identifier, access controller for hospital doors and also can be used as a smart card reader/writer. Design steps of this electronic circuit, operation principles, serial communication with P.C., and the software are examined. Finally a complete access control network for hospital doors that functions with smart cards is discussed.
Smart Cards and remote entrusting
NASA Astrophysics Data System (ADS)
Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad
Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.
A microprocessor card software server to support the Quebec health microprocessor card project.
Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P
1995-01-01
The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.
Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System
NASA Astrophysics Data System (ADS)
Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won
2009-12-01
As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
Optical smart card using semipassive communication.
Glaser, I; Green, Shlomo; Dimkov, Ilan
2006-03-15
An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.
Optical smart card using semipassive communication
NASA Astrophysics Data System (ADS)
Glaser, I.; Green, Shlomo; Dimkov, Ilan
2006-03-01
An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.
Smart cards--the key to trustworthy health information systems.
Neame, R.
1997-01-01
Some 20 years after they were first developed, "smart cards" are set to play a crucial part in healthcare systems. Last year about a billion were supplied, mainly for use in the financial sector, but their special features make them of particular strategic importance for the health sector, where they offer a ready made solution to some key problems of security and confidentiality. This article outlines what smart cards are and why they are so important in managing health information. I discuss some of the unique features of smart cards that are of special importance in the development of secure and trustworthy health information systems. Smart cards would enable individuals' identities to be authenticated and communications to be secured and would provide the mechanisms for implementing strong security, differential access to data, and definitive audit trails. Patient cards can also with complete security carry personal details, data on current health problems and medications, emergency care data, and pointers to where medical records for the patient can be found. Provider cards can in addition carry authorisations and information on computer set up. PMID:9055719
Authentication techniques for smart cards
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nelson, R.A.
1994-02-01
Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thoroughmore » understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.« less
Emerging Technology for School Security
ERIC Educational Resources Information Center
Doss, Kevin T.
2012-01-01
Locks and keys ring up huge costs for education institutions. No wonder many facility directors and public-safety directors have turned to automated access-control systems with magnetic-stripe cards, proximity cards and, most recently, smart cards. Smart cards can provide a host of on- and off-campus services beyond security. In addition to…
2003-08-18
Language Study 5c. PROGRAM ELEMENT NUMBER 5d. PROJECT NUMBER 5d. TASK NUMBER 6. AUTHOR(S) Professor Mads Dam, Pablo Giambiagi 5e...Standard Form 298 (Rev. 8/98) Prescribed by ANSI Std. Z39-18 SPC 01-4025 Mobile Language Study Final...smart card applications. Smart cards can be programmed using general-purpose languages ; but because of their limited resources, smart card programs
Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Obaidat, Mohammad S
2015-11-01
In order to access remote medical server, generally the patients utilize smart card to login to the server. It has been observed that most of the user (patient) authentication protocols suffer from smart card stolen attack that means the attacker can mount several common attacks after extracting smart card information. Recently, Lu et al.'s proposes a session key agreement protocol between the patient and remote medical server and claims that the same protocol is secure against relevant security attacks. However, this paper presents several security attacks on Lu et al.'s protocol such as identity trace attack, new smart card issue attack, patient impersonation attack and medical server impersonation attack. In order to fix the mentioned security pitfalls including smart card stolen attack, this paper proposes an efficient remote mutual authentication protocol using smart card. We have then simulated the proposed protocol using widely-accepted AVISPA simulation tool whose results make certain that the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. Moreover, the rigorous security analysis proves that the proposed protocol provides strong security protection on the relevant security attacks including smart card stolen attack. We compare the proposed scheme with several related schemes in terms of computation cost and communication cost as well as security functionalities. It has been observed that the proposed scheme is comparatively better than related existing schemes.
Ridership impacts of South Florida's EASY smart card.
DOT National Transportation Integrated Search
2013-07-01
Smart card-based Automated Fare Collection Systems (AFCS) are being increasingly deployed in transit systems across the US. Miami-Dade Transit (MDT) has recently deployed such a system branded as the EASY Card. The South Florida Regional Transportati...
Stream processing health card application.
Polat, Seda; Gündem, Taflan Imre
2012-10-01
In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.
Biometrics and smart cards combine to offer high security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Seidman, S.
1986-01-01
This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. Thesemore » Cards will function only when they are being used by the authorized individuals to whom they are issued.« less
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Baldridge, Tim
2005-01-01
The goals of the project are: Achieve high business value through a common badging and access control system that integrates with smart cards. Provide physical (versus logical) deployment of smart cards initially. Provides a common consistent and reliable environment into which to release the smart card. Gives opportunity to develop agency-wide consistent processes, practices and policies. Enables enterprise data capture and management. Promotes data validation prior to SC issuance.
Adoption of smart cards in the medical sector: the Canadian experience.
Auber, B A; Hamel, G
2001-10-01
This research evaluates the factors influencing the adoption of smart cards in the medical sector (a smart card has a micro-processor containing information about the patient: identification, emergency data (allergies, blood type, etc.), vaccination, drugs used, and the general medical record). This research was conducted after a pilot study designed to evaluate the use of such smart cards. Two hundred and ninety-nine professionals, along with 7248 clients, used the smart card for a year. The targeted population included mostly elderly people, infants, and pregnant women (the most intensive users of health care services). Following this pilot study, two surveys were conducted, together with numerous interviews, to assess the factors influencing adoption of the technology. A general picture emerged. indicating that although the new card is well-perceived by individuals, tangible benefits must be available to motivate professionals and clients to adopt the technology. Results show that the fundamental dimension that needs to be assessed before massive diffusion is the relative advantage to the professional. The system must provide a direct benefit to its user. The relative advantage of the system for the professional is directly linked to the obligation for the client to use the card. The system is beneficial for the professional only if the information on the card is complete. Technical adequacy is a necessary but not sufficient condition for adoption.
Using smart card technology to prevent sales of alcohol to underage persons
DOT National Transportation Integrated Search
2001-07-01
This report documents the results of a demonstration and evaluation project to examine the effectiveness of smart card technology (i.e., magnetic stripe on the driver's license and a card reader system) as a means of providing alcohol retailers with ...
Managing medical and insurance information through a smart-card-based information system.
Lambrinoudakis, C; Gritzalis, S
2000-08-01
The continuously increased mobility of patients and doctors, in conjunction with the existence of medical groups consisting of private doctors, general practitioners, hospitals, medical centers, and insurance companies, pose significant difficulties on the management of patients' medical data. Inevitably this affects the quality of the health care services provided. The evolving smart card technology can be utilized for the implementation of a secure portable electronic medical record, carried by the patient herself/himself. In addition to the medical data, insurance information can be stored in the smart card thus facilitating the creation of an "intelligent system" supporting the efficient management of patient's data. In this paper we present the main architectural and functional characteristics of such a system. We also highlight how the security features offered by smart cards can be exploited in order to ensure confidentiality and integrity of the medical data stored in the patient cards.
ERIC Educational Resources Information Center
Dunbar, Laura
2015-01-01
Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."
Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P
2005-08-01
The aim of the study was to test the feasibility of using smart card technology to track the eating behaviours of nearly a thousand children in a school cafeteria. Within a large boys' school a smart card based system was developed that was capable of providing a full electronic audit of all the individual transactions that occurred within the cafeteria. This dataset was interfaced to an electronic version of the McCance and Widdowson composition of foods dataset. The accuracy of the smart card generated data and the influence of portion size and wastage were determined empirically during two 5-day trials. The smart card system created succeeded in generating precise data on the food choices made by hundreds of children over an indefinite time period. The data was expanded to include a full nutrient analysis of all the foods chosen. The accuracy of this information was only constrained by the limitations facing all food composition research, e.g. variations in recipes, portion sizes, cooking practices, etc. Although technically possible to introduce wastage correction factors into the software, thereby providing information upon foods consumed, this was not seen as universally practical. The study demonstrated the power of smart card technology for monitoring food/nutrient choice over limitless time in environments such as school cafeterias. The strengths, limitations and applications of such technology are discussed.
Practical and Secure Recovery of Disk Encryption Key Using Smart Cards
NASA Astrophysics Data System (ADS)
Omote, Kazumasa; Kato, Kazuhiko
In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.
A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards
NASA Astrophysics Data System (ADS)
Son, Kyungho; Han, Dong-Guk; Won, Dongho
In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.
29 CFR 4.123 - Administrative limitations, variances, tolerances, and exemptions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... servicing of cards (including credit cards, debit cards, purchase cards, smart cards, and similar card... military personnel in buying and selling homes (which shall not include actual moving or storage of...
Health smart cards: differing perceptions of emergency department patients and staff.
Mohd Rosli, Reizal; Taylor, David McD; Knott, Jonathan C; Das, Atandrila; Dent, Andrew W
2009-02-01
An analytical, cross-sectional survey of 270 emergency department patients and 92 staff undertaken in three tertiary referral hospital emergency departments was completed to compare the perceptions of patients and staff regarding the use of health smart cards containing patient medical records. The study recorded data on a range of health smart card issues including awareness, privacy, confidentiality, security, advantages and disadvantages, and willingness to use. A significantly higher proportion of staff had heard of the card. The perceived disadvantages reported by patients and staff were, overall, significantly different, with the staff reporting more disadvantages. A significantly higher proportion of patients believed that they should choose what information is on the card and who should have access to the information. Patients were more conservative regarding what information should be included, but staff were more conservative regarding who should have access to the information. Significantly fewer staff believed that patients could reliably handle the cards. Overall, however, the cards were considered acceptable and useful, and their introduction would be supported.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887
Securing Sensitive Flight and Engine Simulation Data Using Smart Card Technology
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
NASA Glenn Research Center has developed a smart card prototype capable of encrypting and decrypting disk files required to run a distributed aerospace propulsion simulation. Triple Data Encryption Standard (3DES) encryption is used to secure the sensitive intellectual property on disk pre, during, and post simulation execution. The prototype operates as a secure system and maintains its authorized state by safely storing and permanently retaining the encryption keys only on the smart card. The prototype is capable of authenticating a single smart card user and includes pre simulation and post simulation tools for analysis and training purposes. The prototype's design is highly generic and can be used to protect any sensitive disk files with growth capability to urn multiple simulations. The NASA computer engineer developed the prototype on an interoperable programming environment to enable porting to other Numerical Propulsion System Simulation (NPSS) capable operating system environments.
Health innovation for patient safety improvement.
Sellappans, Renukha; Chua, Siew Siang; Tajuddin, Nur Amani Ahmad; Mei Lai, Pauline Siew
2013-01-01
Medication error has been identified as a major factor affecting patient safety. Many innovative efforts such as Computerised Physician Order Entry (CPOE), a Pharmacy Information System, automated dispensing machines and Point of Administration Systems have been carried out with the aim of improving medication safety. However, areas remain that require urgent attention. One main area will be the lack of continuity of care due to the breakdown of communication between multiple healthcare providers. Solutions may include consideration of "health smart cards" that carry vital patient medical information in the form of a "credit card" or use of the Malaysian identification card. However, costs and technical aspects associated with the implementation of this health smart card will be a significant barrier. Security and confidentiality, on the other hand, are expected to be of primary concern to patients. Challenges associated with the implementation of a health smart card might include physician buy-in for use in his or her everyday practice. Training and technical support should also be available to ensure the smooth implementation of this system. Despite these challenges, implementation of a health smart card moves us closer to seamless care in our country, thereby increasing the productivity and quality of healthcare.
ORANGES evaluation discussion group process
DOT National Transportation Integrated Search
2003-03-24
This report describes and documents the process and methodology to be used to conduct a series of before and after discussion groups with smart card holders and participating agency employees as part of the ORANGES multiple purpose smart card Field O...
48 CFR 532.7002 - Solicitation requirements.
Code of Federal Regulations, 2011 CFR
2011-10-01
.... Identify the card brand(s) under the GSA SmartPay program that may be used to make payments under the... the card brand(s) under the GSA SmartPay program that may be used to make payments under the contract...
Ridership impacts of South Florida's EASY smart card : [summary].
DOT National Transportation Integrated Search
2013-07-01
Transit agencies across the U.S. increasingly are replacing electronic fare reading systems with Advanced Fare Collection (AFC) or smart card systems. In 2009, Miami-Dade Transit (MDT) was the first Florida transit agency to deploy AFC, branded...
Telematics and smart cards in integrated health information system.
Sicurello, F; Nicolosi, A
1997-01-01
Telematics and information technology are the base on which it will be possible to build an integrated health information system to support population and improve their quality of life. This system should be based on record linkage of all data based on the interactions of the patients with the health structures, such as general practitioners, specialists, health institutes and hospitals, pharmacies, etc. The record linkage can provide the connection and integration of various records, thanks to the use of telematic technology (either urban or geographical local networks, such as the Internet) and electronic data cards. Particular emphasis should be placed on the introduction of smart cards, such as portable health cards, which will contain a standardized data set and will be sufficient to access different databases found in various health services. The inter-operability of the social-health records (including multimedia types) and the smart cards (which are one of the most important prerequisites for the homogenization and wide diffusion of these cards at an European level) should be strongly taken into consideration. In this framework a project is going to be developed aiming towards the integration of various data bases distributed territorially, from the reading of the software and the updating of the smart cards to the complete management of the patients' evaluation records, to the quality of the services offered and to the health planning. The applications developed will support epidemiological investigation software and data analysis. The inter-connection of all the databases of the various structures involved will take place through a coordination center, the most important system of which we will call "record linkage" or "integrated database". Smart cards will be distributed to a sample group of possible users and the necessary smart card management tools will be installed in all the structures involved. All the final users (the patients) in the whole network of services involved will be monitored for the duration of the project. The system users will also include general practitioners, social workers, physicians, health operators, pharmacists, laboratory workers and administrative personnel of the municipality and of the health structures concerned.
Location Based Application Availability
NASA Astrophysics Data System (ADS)
Naeem Akram, Raja; Markantonakis, Konstantinos; Mayes, Keith
Smart cards are being integrated into a diverse range of industries: ranging from banking, telecom, transport, home/office access control to health and E-passport. Traditionally, cardholders are required to carry a smart card for each application. However, recent developments in the Near Field Communication (NFC) have renewed the interest in multiple applications for different services on a single device. This paper builds onto the NFC initiative and avoids the smart card ownership issues that hinder the adoption of such devices. The proposal integrates the Global Positioning System with the NFC in mobile phones to provide a ubiquitously and flexible service access model.
[New electronic data carriers in Bosnia-Herzegovina].
Masić, I; Pandza, H; Knezević, Z; Toromanović, S
1999-01-01
Bosnia and Herzegovina has been developing new Health Care System based on Electronic Registration Card. Developing countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transfer, searching and protection of data using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Both technologies offer the advantages and disadvantages. Three types of electronic card are currently in use: Hybrid Card, Smart Card and Laser Card. Hybrid Card offers characteristics of both Smart Card and Laser Card. The differences among these cards, such as a capacity, total price, price per byte, security system are discussed here. The dilemma is, which card should be used as a data carrier. The Electronic Family Registration Card is a question of strategic interest for B&H, but also a big investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.
Can a patient smart card improve decision making in a clinical setting?.
Bérubé, J; Papillon, M J; Lavoie, G; Durant, P; Fortin, J P
1995-01-01
In the health field, clinical information is the raw material for the clinician delivering health services. Therefore, the clinical information available to the physician is often incomplete or even non¿existent upon consultation. Furthermore, the reconstruction of the medical history, which is the most important source of data for the clinician to establish a diagnosis and initiate a treatment, suffers from many constraints. The smart card, like the one used in Quebec's project, could ease the physician's decision-making by allowing fast access to accurate and pertinent data. The smart card is a major asset in the present health system.
Real Electronic Commerce: Smart Cards on the Superhighway.
ERIC Educational Resources Information Center
Birch, David
1997-01-01
Technologies of payment rather than technologies of connection are the real trigger for the expansion of electronic commerce on the Internet. This article discusses "smart cards," highlighting Mondex, the electronic purse developed in the United Kingdom. Predicts that cash will be replaced by "e-cash," which is cheaper to make,…
van Onzenoort, Hein A; Neef, Cees; Verberk, Willem W; van Iperen, H Peter; de Leeuw, Peter W; van der Kuy, Paul-Hugo M
2012-05-15
The results of a feasibility study of blister-pack smart technology for monitoring medication adherence are reported. Research in the area of objective therapy compliance measurement has led to the development of microprocessor-driven systems that record the time a unit dose is removed from blister packaging. One device under development is the Smart Blister-a label imprinted with event-detection circuitry that can be affixed to standard commercial blister cards. In the first trial of the device in actual clinical practice, 115 community-dwelling Dutch patients receiving valsartan maintenance therapy (160 mg once daily) were given 14-day blister packages equipped with the Smart Blister. On the return of empty blister cards to the 20 participating community pharmacies, the stored information was scanned and downloaded for data analysis and patient counseling purposes. A total of 245 Smart Blister-equipped packages were used by valsartan recipients during the eight-month study. The device was largely effective in recording patient and blister-card identification data and other desired information. However, in 17% of cases, the Smart Blister system registered multiple tablet-removal events at the same time, presumably indicating unintentional breakage of nearby conductive circuits and the need for design refinements. The Smart Blister-equipped medication cards were generally well received by patients and pharmacies. An evaluation of the functionality and robustness of the Smart Blister in a real-world clinical practice situation yielded some promising results, but the findings also indicated a need for design refinements and additional performance testing of the device.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less
A Cashless Society? The Plastic Revolution. Resources in Technology.
ERIC Educational Resources Information Center
Ritz, John M.
1993-01-01
Relates the history of credit cards, their evolution to current forms, and innovations (debit cards, token cards, smart cards). Considers their sociocultural impact. Provides a design brief, including objectives, resources, evaluation criteria, outcomes, and a quiz. (SK)
maintaining both types of cards. Common Access Card (CAC) "Smart" ID card for active-duty military personnel, Selected Reserve, DoD civilian employees, and eligible contractor personnel. CAC Types & and military retirees to access service benefits and privileges. ID Card Types & Eligibility
ERIC Educational Resources Information Center
Mechling, Linda C.; Gast, David L.; Thompson, Kimberly L.
2009-01-01
This study compared the effectiveness of SMART Board, interactive whiteboard technology and traditional flash cards in teaching reading in a small-group instructional arrangement. Three students with moderate intellectual disabilities were taught to read grocery store aisle marker words under each condition. Observational learning (students…
Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials
NASA Astrophysics Data System (ADS)
Park, Jun-Cheol
User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.
From Secure Memories to Smart Card Security
NASA Astrophysics Data System (ADS)
Handschuh, Helena; Trichina, Elena
Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.
48 CFR 22.1003-4 - Administrative limitations, variations, tolerances, and exemptions.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., purchase cards, smart cards, and similar card services). (iii) Hotel/motel services for conferences... appraisers to assist Federal employees or military personnel in buying and selling homes (which shall not...
48 CFR 313.301 - Government-wide commercial purchase card.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., Appendix B, “Improving the Management of Government Charge Card Programs;” GSA's SmartPay Program guidance; and HHS Purchase Card program standards. (2) The OPDIVs, through their designated Agency/Organization... training requirements to ensure effective implementation of the HHS purchase card program. (3) OPDIVs shall...
DOT National Transportation Integrated Search
1995-04-01
This project developed relevant information on existing and future, stored readable/writable data card technology for fare and toll payments. The project supports the FTA objective of developing a plan for a common standard card-based fare payment sy...
NASA Astrophysics Data System (ADS)
Ratnadewi; Pramono Adhie, Roy; Hutama, Yonatan; Saleh Ahmar, A.; Setiawan, M. I.
2018-01-01
Cryptography is a method used to create secure communication by manipulating sent messages during the communication occurred so only intended party that can know the content of that messages. Some of the most commonly used cryptography methods to protect sent messages, especially in the form of text, are DES and 3DES cryptography method. This research will explain the DES and 3DES cryptography method and its use for stored data security in smart cards that working in the NFC-based communication system. Several things that will be explained in this research is the ways of working of DES and 3DES cryptography method in doing the protection process of a data and software engineering through the creation of application using C++ programming language to realize and test the performance of DES and 3DES cryptography method in encrypted data writing process to smart cards and decrypted data reading process from smart cards. The execution time of the entering and the reading process data using a smart card DES cryptography method is faster than using 3DES cryptography.
Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho
2017-04-25
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.
Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho
2017-01-01
User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331
An mHealth Framework to Improve Birth Outcomes in Benue State, Nigeria: A Study Protocol.
Ezeanolue, Echezona Edozie; Gbadamosi, Semiu Olatunde; Olawepo, John Olajide; Iwelunmor, Juliet; Sarpong, Daniel; Eze, Chuka; Ogidi, Amaka; Patel, Dina; Onoka, Chima
2017-05-26
The unprecedented coverage of mobile technology across the globe has led to an increase in the use of mobile health apps and related strategies to make health information available at the point of care. These strategies have the potential to improve birth outcomes, but are limited by the availability of Internet services, especially in resource-limited settings such as Nigeria. Our primary objective is to determine the feasibility of developing an integrated mobile health platform that is able to collect data from community-based programs, embed collected data into a smart card, and read the smart card using a mobile phone-based app without the need for Internet access. Our secondary objectives are to determine (1) the acceptability of the smart card among pregnant women and (2) the usability of the smart card by pregnant women and health facilities in rural Nigeria. We will leverage existing technology to develop a platform that integrates a database, smart card technology, and a mobile phone-based app to read the smart cards. We will recruit 300 pregnant women with one of the three conditions-HIV, hepatitis B virus infection, and sickle cell trait or disease-and four health facilities in their community. We will use Glasgow's Reach, Effectiveness, Adoption, Implementation, and Maintenance framework as a guide to assess the implementation, acceptability, and usability of the mHealth platform. We have recruited four health facilities and 300 pregnant women with at least one of the eligible conditions. Over the course of 3 months, we will complete the development of the mobile health platform and each participant will be offered a smart card; staff in each health facility will receive training on the use of the mobile health platform. Findings from this study could offer a new approach to making health data from pregnant women available at the point of delivery without the need for an Internet connection. This would allow clinicians to implement evidence-based interventions in real time to improve health outcomes. ClinicalTrials.gov NCT03027258; https://clinicaltrials.gov/ct2/show/NCT03027258 (Archived by WebCite at http://www.webcitation.org/6owR2D0kE). ©Echezona Edozie Ezeanolue, Semiu Olatunde Gbadamosi, John Olajide Olawepo, Juliet Iwelunmor, Daniel Sarpong, Chuka Eze, Amaka Ogidi, Dina Patel, Chima Onoka. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 26.05.2017.
Signal processing for smart cards
NASA Astrophysics Data System (ADS)
Quisquater, Jean-Jacques; Samyde, David
2003-06-01
In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight the same results can be obtained with only one smart card, but this idea is not completely true because the statistical properties of the signal are not the same. As the two smart cards are submitted to the same external noise during the measurement, it is more easy to reduce the influence of perturbations. This paper shows the importance of accurate countermeasures against differential analysis.
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits
NASA Astrophysics Data System (ADS)
Bußmeyer, Daniel; Gröbert, Felix; Schwenk, Jörg; Wegener, Christoph
Due to recent attacks on online banking systems and consequent soaring losses through fraud, different methods have been developed to ensure a secure connection between a bank and its customers. One method is the inclusion of smart card readers into these schemes, which come along with different benefits, e.g., convenience and costs, and endangerments, especially on the security side.
JPEG2000 vs. full frame wavelet packet compression for smart card medical records.
Leehan, Joaquín Azpirox; Lerallut, Jean-Francois
2006-01-01
This paper describes a comparison among different compression methods to be used in the context of electronic health records in the newer version of "smart cards". The JPEG2000 standard is compared to a full-frame wavelet packet compression method at high (33:1 and 50:1) compression rates. Results show that the full-frame method outperforms the JPEG2K standard qualitatively and quantitatively.
An end-to-end secure patient information access card system.
Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T
2000-03-01
The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.
A study of smart card for radiation exposure history of patient.
Rehani, Madan M; Kushi, Joseph F
2013-04-01
The purpose of this article is to undertake a study on developing a prototype of a smart card that, when swiped in a system with access to the radiation exposure monitoring server, will locate the patient's radiation exposure history from that institution or set of associated institutions to which it has database access. Like the ATM or credit card, the card acts as a secure unique "token" rather than having cash, credit, or dose data on the card. The system provides the requested radiation history report, which then can be printed or sent by e-mail to the patient. The prototype system is capable of extending outreach to wherever the radiation exposure monitoring server extends, at county, state, or national levels. It is anticipated that the prototype shall pave the way for quick availability of patient exposure history for use in clinical practice for strengthening radiation protection of patients.
SAE for the prediction of road traffic status from taxicab operating data and bus smart card data
NASA Astrophysics Data System (ADS)
Zhengfeng, Huang; Pengjun, Zheng; Wenjun, Xu; Gang, Ren
Road traffic status is significant for trip decision and traffic management, and thus should be predicted accurately. A contribution is that we consider multi-modal data for traffic status prediction than only using single source data. With the substantial data from Ningbo Passenger Transport Management Sector (NPTMS), we wished to determine whether it was possible to develop Stacked Autoencoders (SAEs) for accurately predicting road traffic status from taxicab operating data and bus smart card data. We show that SAE performed better than linear regression model and Back Propagation (BP) neural network for determining the relationship between road traffic status and those factors. In a 26-month data experiment using SAE, we show that it is possible to develop highly accurate predictions (91% test accuracy) of road traffic status from daily taxicab operating data and bus smart card data.
Leccese, Fabio; Cagnetti, Marco; Trinca, Daniele
2014-01-01
A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field. PMID:25529206
Leccese, Fabio; Cagnetti, Marco; Trinca, Daniele
2014-12-18
A smart city application has been realized and tested. It is a fully remote controlled isle of lamp posts based on new technologies. It has been designed and organized in different hierarchical layers, which perform local activities to physically control the lamp posts and transmit information with another for remote control. Locally, each lamp post uses an electronic card for management and a ZigBee tlc network transmits data to a central control unit, which manages the whole isle. The central unit is realized with a Raspberry-Pi control card due to its good computing performance at very low price. Finally, a WiMAX connection was tested and used to remotely control the smart grid, thus overcoming the distance limitations of commercial Wi-Fi networks. The isle has been realized and tested for some months in the field.
Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng
2013-06-01
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.
Web Card - Clean Cities Plug-In Electric Vehicle Handbook for Public Charging Station Hosts
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
A 2" x 3-1/4" web card which has a quick response code for accessing the PEV Handbook for Public Charging Station Hosts via a smart phone. The cards are intended to be handed out instead of the handbook.
A smart-card-enabled privacy preserving E-prescription system.
Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H
2004-03-01
Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.
NASA Astrophysics Data System (ADS)
Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra
The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
Common Badging and Access Control System (CBACS)
NASA Technical Reports Server (NTRS)
Dischinger, Portia
2005-01-01
This slide presentation presents NASA's Common Badging and Access Control System. NASA began a Smart Card implementation in January 2004. Following site surveys, it was determined that NASA's badging and access control systems required upgrades to common infrastructure in order to provide flexibly, usability, and return on investment prior to a smart card implantation. Common Badging and Access Control System (CBACS) provides the common infrastructure from which FIPS-201 compliant processes, systems, and credentials can be developed and used.
Design issues for semi-passive optical communication devices
NASA Astrophysics Data System (ADS)
Glaser, I.
2007-09-01
Optical smart cards are devices containing a retro-reflector, light modulator, and some computing and data storage capabilities to affect semi-passive communication. They do not produce light; instead they modulate and send back light received from a stationary unit. These devices can replace contact-based smart cards as well as RF based ones for applications ranging from identification to transmitting and validating data. Since their transmission is essentially focused on the receiving unit, they are harder to eavesdrop than RF devices, yet need no physical contact or alignment. In this paper we explore optical design issues of these devices and estimate their optical behavior. Specifically, we analyze how these compact devices can be optimized for selected application profiles. Some of the key parameters addressed are effective light efficiency (how much modulated signal can be received by the stationary unit given the amount of light it transmits), range of tilt angles (angle between device surface normal to the line connecting the optical smart card with the stationary unit) through which the device would be effective, and power requirements of the semi-passive unit. In addition, issues concerning compact packaging of this device are discussed. Finally, results of the analysis are employed to produce a comparison of achievable capabilities of these optical smart cards, as opposed to alternative devices, and discuss potential applications were they can be best utilized.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.
A security and privacy preserving e-prescription system based on smart cards.
Hsu, Chien-Lung; Lu, Chung-Fu
2012-12-01
In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.
Demonstration of holographic smart card system using the optical memory technology
NASA Astrophysics Data System (ADS)
Kim, JungHoi; Choi, JaeKwang; An, JunWon; Kim, Nam; Lee, KwonYeon; Jeon, SeckHee
2003-05-01
In this paper, we demonstrate the holographic smart card system using digital holographic memory technique that uses reference beam encrypted by the random phase mask to prevent unauthorized users from accessing the stored digital page. The input data that include document data, a picture of face, and a fingerprint for identification is encoded digitally and then coupled with the reference beam modulated by a random phase mask. Therefore, this proposed system can execute recording in the order of MB~GB and readout all personal information from just one card without any additional database system. Also, recorded digital holograms can't be reconstructed without a phase key and can't be copied by using computers, scanners, or photography.
Network security system for health and medical information using smart IC card
NASA Astrophysics Data System (ADS)
Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki
1998-07-01
A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.
Patient health record on a smart card.
Naszlady, A; Naszlady, J
1998-02-01
A validated health questionnaire has been used for the documentation of a patient's history (826 items) and of the findings from physical examination (591 items) in our clinical ward for 25 years. This computerized patient record has been completed in EUCLIDES code (CEN TC/251) for laboratory tests and an ATC and EAN code listing for the names of the drugs permanently required by the patient. In addition, emergency data were also included on an EEPROM chipcard with a 24 kb capacity. The program is written in FOX-PRO language. A group of 5000 chronically ill in-patients received these cards which contain their health data. For security reasons the contents of the smart card is only accessible by a doctor's PIN coded key card. The personalization of each card was carried out in our health center and the depersonalized alphanumeric data were collected for further statistical evaluation. This information served as a basis for a real need assessment of health care and for the calculation of its cost. Code-combined with an optical card, a completely paperless electronic patient record system has been developed containing all three information carriers in medicine: Texts, Curves and Pictures.
Evaluation strategy : Puget Sound regional fare card : FY01 earmark evaluation
DOT National Transportation Integrated Search
2003-06-24
King County Metro Transit is the lead agency responsible for implementing the Central Puget Sound Regional Fare Coordination Project (RFC Project). The project features a smart card technology that will support and link the fare collection systems of...
Masić, I; Pandza, H; Ridanović, Z; Dover, M
1997-01-01
The biggest problem in organisation of the effective and rational health care of good quality in Bosnia quality and Herzegovina is a functional and updated Health Information System. In this system, important role play Health Statistic System in which documentation and evidence are very important segment. Developed countries proceeded from the manual and semiautomatic method of medical data processing and system management to the new methods of entering, storage, transfer, searching and protection of data using electronic equipment. Recently, the competition between manufacturers of the Smart Card and Laser Card is reality. Also scientific and professional debate exists about the standard card for storage of medical information in Health Care System. First option is supported by West European countries that developing Smart Card called Eurocard and second by USA and Far East countries. Because the Health Care System and other segments of Society of Bosnia and Herzegovina innovate intensively similar systems, the authors of this article intend to open discussion, and to show advantages and failures of each technological medium.
[Application of patient card technology to health care].
Sayag, E; Danon, Y L
1995-03-15
The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.
A more secure anonymous user authentication scheme for the integrated EPR information system.
Wen, Fengtong
2014-05-01
Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.
Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho
2014-01-01
An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847
DIABCARD a smart card for patients with chronic diseases.
Engelbrecht, R; Hildebrand, C
1997-01-01
Within the European Union-sponsored project DIABCARD, the core of a chip-card-based medical information system for patients with chronic diseases, exemplified on diabetes mellitus, has been developed. The long-term goal of the project is to improve the medical record and the quality of care for patients with chronic diseases. The basic idea is to have a portable electronic medical record on a smart card. This will improve the communication between the different healthcare personnel and between different institutions and, at the same time, promote shared care. The DIABCARD chip-card-based medical information system will offer controlled access to the necessary and up-to-date patient record to everyone involved in the patient's treatment, and it will help reduce the constantly rising healthcare expenditure. The system first was implemented in a small version. The system architecture contains hardware, software, and orgware. It considers especially the memory of the chip card, the processor, the data structure, security functions, the operating system on the chip card, the interface between the chip card and the application, and various application areas. The DIABCARD dataset was defined via an information model, which describes the different communication processes, via acknowledged diabetes datasets and medical scenarios. It includes, among others, emergency data, data for quality assurance, and data for blood glucose self-monitoring. The first prototype has been developed, and a pilot was run for 3 months.
ERIC Educational Resources Information Center
Villano, Matt
2008-01-01
Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…
New and Improved: Security Goes High-Tech.
ERIC Educational Resources Information Center
Gamble, Cheryl
2002-01-01
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
Progress on Component Evaluation for Nuclear Explosion Monitoring
2008-09-01
one data logger, Geotech Smart24. For the infrasound sensors tested, the test results allow us to conclude that both sensors had sufficiently quiet...a lower frequency than expected. Sandia was also asked to evaluate the Geotech Smart24 data logger for qualification as a replacement to the Geotech ...results of using 26-bit quantization. Characterization Geotech Smart24 Data-Logger with Active Fortezza Crypto Card Data Signing Over the spring
New secure communication-layer standard for medical image management (ISCL)
NASA Astrophysics Data System (ADS)
Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki
1999-07-01
This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rembold, Randy Kai; Hart, Darren M.
Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIAmore » crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.« less
On the security of two remote user authentication schemes for telecare medical information systems.
Kim, Kee-Won; Lee, Jae-Dong
2014-05-01
The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.
Mishra, Raghavendra; Barnwal, Amit Kumar
2015-05-01
The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.
Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho
2016-03-01
Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
2015-06-01
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
An Indian eye to personalized medicine.
Jauhari, Shaurya; Rizvi, S A M
2015-04-01
Acknowledging the successful sequencing of the human genome and the valuable insights it has rendered, genetic drafting of non-human organisms can further enhance the understanding of modern biology. The price of sequencing technology has plummeted with time, and there is a noticeable enhancement in its implementation and recurrent usage. Sequenced genome information can be contained in a microarray chip, and then processed by a computer system for inferring analytics and predictions. Specifically, smart cards have been significantly applicable to assimilate and retrieve complex data, with ease and implicit mobility. Herein, we propose "The G-Card", a development with respect to the prevalent smart card, and an extension to the Electronic Health Record (EHR), that will hold the genome sequence of an individual, so that the medical practitioner can better investigate irregularities in a patient's health and hence recommend a precise prognosis. Copyright © 2014 Elsevier Ltd. All rights reserved.
Students using mobile phones in the classroom: Can the phones increase content learning
NASA Astrophysics Data System (ADS)
Rinehart, David Lee
A study was conducted at a high-performing school in Southern California to explore the effects on learning content from students using their own smart phones in and out of the classroom. The study used a Switching Replications design format which allowed two independent analyses of posttest scores between a group using e-flash cards on smart phones and a group using paper flash cards. Quantitative data was collected via two tailed, t-tests and qualitative data was collected through observations and interviews. Results suggest that knowledge level learning may be increased with mobile phone use, but no effect on comprehension level learning was found. Students found the phones to be convenient in accessing flash cards anytime and anywhere. Enthusiasm for using the phones in class while initially high waned over the 1 month study duration. Students perceived the phones to not be a significant source of distraction outside of class.
Newer Technologies for School Security. ERIC Digest Number 145.
ERIC Educational Resources Information Center
Schneider, Tod
This digest describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that allows for…
Investigating the Activities of Children toward a Smart Storytelling Toy
ERIC Educational Resources Information Center
Kara, Nuri; Aydin, Cansu Cigdem; Cagiltay, Kursat
2013-01-01
This paper introduces StoryTech, a smart storytelling toy that features a virtual space, which includes computer-based graphics and characters, and a real space, which includes plush toys, background cards, and a communication interface. When children put real objects on the receiver panel, the computer program shows related backgrounds and…
Facilitating and securing offline e-medicine service through image steganography.
Kamal, A H M; Islam, M Mahfuzul
2014-06-01
E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation.
Retention of data in heat-damaged SIM cards and potential recovery methods.
Jones, B J; Kenyon, A J
2008-05-02
Examination of various SIM cards and smart card devices indicates that data may be retained in SIM card memory structures even after heating to temperatures up to 450 degrees C, which the National Institute of Standards and Technology (NIST) has determined to be approximately the maximum average sustained temperature at desk height in a house fire. However, in many cases, and certainly for temperatures greater than 450 degrees C, the SIM card chip has suffered structural or mechanical damage that renders simple probing or rewiring ineffective. Nevertheless, this has not necessarily affected the data, which is stored as charge in floating gates, and alternative methods for directly accessing the stored charge may be applicable.
ERIC Educational Resources Information Center
Schneider, Tod
This digest in Spanish describes several technologies that can be used to control access to, and improve surveillance of, school grounds. Access can be controlled by using "smart" cards to control keyed entries. Many schools have problems with multiple copies of keys, and these card systems are integrated with computer software that…
Making Our Students Smart about Money
ERIC Educational Resources Information Center
Godfrey, Neale S.
2006-01-01
According to Senator Daniel Akaka, sponsor of the 2004 Credit Card Minimum Payment Warning Act, 45% of college students are in credit card debt, with an average debt of US$ 3,000. Moreover, 150,000 young adults between the ages of 18-24 declared bankruptcy last year. In this article, the author describes how financial literacy can educate young…
The Learning Credit Card: A Tool for Managing Personal Development
ERIC Educational Resources Information Center
Rushby, Nick; Twining, John; Twining, Nick; Devitt, Thomas
2008-01-01
This is the report of a five month study, undertaken by Sundridge Park Training Technologies in association with Guildford Educational Services to assess the potential of smart card technology to support learning and the management of learning. The study had two strands--the state of the art of the technology and its potential for supporting,…
Towards a SIM-Less Existence: The Evolution of Smart Learning Networks
ERIC Educational Resources Information Center
Al-Khouri, Ali M.
2015-01-01
This article proposes that the widespread availability of wireless networks creates a case in which there is no real need for SIM cards. Recent technological developments offer the capability to outperform SIM cards and provide more innovative dimensions to current systems of mobility. In this context of changing realities in the domain of…
Testa, Massimiliano; Pollard, John
2007-01-01
Each patient is supplied with a smart-card containing a Radio Frequency IDentification (RFID) chip storing a unique identification code. The patient places the Smart-card on a pill-dispenser unit containing an RFID reader. The RFID chip is read and the code sent to a Base-station via a wireless Bluetooth link. A database containing both patient details and treatment information is queried at the Base-station using the RFID as the search key. The patient's treatment data (i.e., drug names, quantities, time, etc.) are retrieved and sent back to the pill-dispenser unit via Bluetooth. Appropriate quantities of the required medications are automatically dispensed, unless the patient has already taken his/her daily dose. Safe, confidential communication and operation is ensured.
Protecting Digital Evidence Integrity by Using Smart Cards
NASA Astrophysics Data System (ADS)
Saleem, Shahzad; Popov, Oliver
RFC 3227 provides general guidelines for digital evidence collection and archiving, while the International Organization on Computer Evidence offers guidelines for best practice in the digital forensic examination. In the light of these guidelines we will analyze integrity protection mechanism provided by EnCase and FTK which is mainly based on Message Digest Codes (MDCs). MDCs for integrity protection are not tamper proof, hence they can be forged. With the proposed model for protecting digital evidence integrity by using smart cards (PIDESC) that establishes a secure platform for digitally signing the MDC (in general for a whole range of cryptographic services) in combination with Public Key Cryptography (PKC), one can show that this weakness might be overcome.
ERIC Educational Resources Information Center
Federal Deposit Insurance Corp., Washington, DC.
This module on managing a credit card is one of ten in the Money Smart curriculum, and includes an instructor guide and a take-home guide. It was developed to help adults outside the financial mainstream enhance their money skills and create positive banking relationships. It is designed to enable participants to describe the costs and benefits of…
Quantum key distribution using card, base station and trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson
Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less
Quantum key distribution using card, base station and trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson
Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less
Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P
2005-08-01
The consumption patterns of beverages and desserts features highly in the current debate surrounding children's nutrition. The aim of this study was to continuously monitor the choice of beverages and desserts made by nearly 1000 children in a school cafeteria. A newly developed smart card system was used to monitor the food choices of diners (7-16-year-old boys) in a school cafeteria over 89 days. A wide variety of beverages and desserts were on offer daily. Despite coming from an affluent, well-educated demographic group, the boys' choices of beverages and desserts mirrored those of children in general. Buns and cookies were over 10 times more popular than fresh fruits and yogurts. Sugary soft-drinks were over 20 times more popular than fresh fruit drinks and milk combined. Appropriate choices could, over a month, reduce intake of added sugar by over 800 g and fat by over 200 g. The smart card system was very effective at monitoring total product choices for nearly 1000 diners. In agreement with a recent national school meal survey, where choice is extensive, children show a preference for products high in fat and/or sugar. The consequences of these preferences are discussed.
Predicting traffic volumes and estimating the effects of shocks in massive transportation systems.
Silva, Ricardo; Kang, Soong Moon; Airoldi, Edoardo M
2015-05-05
Public transportation systems are an essential component of major cities. The widespread use of smart cards for automated fare collection in these systems offers a unique opportunity to understand passenger behavior at a massive scale. In this study, we use network-wide data obtained from smart cards in the London transport system to predict future traffic volumes, and to estimate the effects of disruptions due to unplanned closures of stations or lines. Disruptions, or shocks, force passengers to make different decisions concerning which stations to enter or exit. We describe how these changes in passenger behavior lead to possible overcrowding and model how stations will be affected by given disruptions. This information can then be used to mitigate the effects of these shocks because transport authorities may prepare in advance alternative solutions such as additional buses near the most affected stations. We describe statistical methods that leverage the large amount of smart-card data collected under the natural state of the system, where no shocks take place, as variables that are indicative of behavior under disruptions. We find that features extracted from the natural regime data can be successfully exploited to describe different disruption regimes, and that our framework can be used as a general tool for any similar complex transportation system.
Predicting traffic volumes and estimating the effects of shocks in massive transportation systems
Silva, Ricardo; Kang, Soong Moon; Airoldi, Edoardo M.
2015-01-01
Public transportation systems are an essential component of major cities. The widespread use of smart cards for automated fare collection in these systems offers a unique opportunity to understand passenger behavior at a massive scale. In this study, we use network-wide data obtained from smart cards in the London transport system to predict future traffic volumes, and to estimate the effects of disruptions due to unplanned closures of stations or lines. Disruptions, or shocks, force passengers to make different decisions concerning which stations to enter or exit. We describe how these changes in passenger behavior lead to possible overcrowding and model how stations will be affected by given disruptions. This information can then be used to mitigate the effects of these shocks because transport authorities may prepare in advance alternative solutions such as additional buses near the most affected stations. We describe statistical methods that leverage the large amount of smart-card data collected under the natural state of the system, where no shocks take place, as variables that are indicative of behavior under disruptions. We find that features extracted from the natural regime data can be successfully exploited to describe different disruption regimes, and that our framework can be used as a general tool for any similar complex transportation system. PMID:25902504
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078
A robust and effective smart-card-based remote user authentication mechanism using hash function.
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.
Ip, Dennis Km; Lau, Eric Hy; So, Hau Chi; Xiao, Jingyi; Lam, Chi Kin; Fang, Vicky J; Tam, Yat Hung; Leung, Gabriel M; Cowling, Benjamin J
2017-10-06
School-aged children have the highest incidence of respiratory virus infections each year, and transmission of respiratory viruses such as influenza virus can be a major concern in school settings. School absenteeism data have been employed as a component of influenza surveillance systems in some locations. Data timeliness and system acceptance remain as key determinants affecting the usefulness of a prospective surveillance system. The aim of this study was to assess the feasibility of implementing an electronic school absenteeism surveillance system using smart card-based technology for influenza-like illness (ILI) surveillance among a representative network of local primary and secondary schools in Hong Kong. We designed and implemented a surveillance system according to the Protocol for a Standardized information infrastructure for Pandemic and Emerging infectious disease Response (PROSPER). We employed an existing smart card-based education and school administration platform for data capture, customized the user interface, and used additional back end systems built for other downstream surveillance steps. We invited local schools to participate and collected absenteeism data by the implemented system. We compared temporal trend of the absenteeism data with data from existing community sentinel and laboratory surveillance data. We designed and implemented an ILI surveillance system utilizing smart card-based attendance tracking approach for data capture. We implemented the surveillance system in a total of 107 schools (including 66 primary schools and 41 secondary schools), covering a total of 75,052 children. The system successfully captured information on absences for 2 consecutive academic years (2012-2013 and 2013-2014). The absenteeism data we collected from the system reflected ILI activity in the community, with an upsurge in disease activity detected up to 1 to 2 weeks preceding other existing surveillance systems. We designed and implemented a novel smart card technology-based school absenteeism surveillance system. Our study demonstrated the feasibility of building a large-scale surveillance system riding on a routinely adopted data collection approach and the use of simple system enhancement to minimize workload implication and enhance system acceptability. Data from this system have potential value in supplementing existing sentinel influenza surveillance for situational awareness of influenza activity in the community. ©Dennis KM Ip, Eric HY Lau, Hau Chi So, Jingyi Xiao, Chi Kin Lam, Vicky J Fang, Yat Hung Tam, Gabriel M Leung, Benjamin J Cowling. Originally published in JMIR Public Health and Surveillance (http://publichealth.jmir.org), 06.10.2017.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Colbert, C.; Moles, D.R.
This paper reports that the authors developed for the Air Force the Mark VI Personal Identity Verifier (PIV) for controlling access to a fixed or mobile ICBM site, a computer terminal, or mainframe. The Mark VI records the digitized silhouettes of four fingers of each hand on an AT and T smart card. Like fingerprints, finger shapes, lengths, and widths constitute an unguessable biometric password. A Security Officer enrolls an authorized person who places each hand, in turn, on a backlighted panel. An overhead scanning camera records the right and left hand reference templates on the smart card. The Securitymore » Officer adds to the card: name, personal identification number (PIN), and access restrictions such as permitted days of the week, times of day, and doors. To gain access, cardowner inserts card into a reader slot and places either hand on the panel. Resulting access template is matched to the reference template by three sameness algorithms. The final match score is an average of 12 scores (each of the four fingers, matched for shape, length, and width), expressing the degree of sameness. (A perfect match would score 100.00.) The final match score is compared to a predetermined score (threshold), generating an accept or reject decision.« less
Facilitating and securing offline e-medicine service through image steganography
Islam, M. Mahfuzul
2014-01-01
E-medicine is a process to provide health care services to people using the Internet or any networking technology. In this Letter, a new idea is proposed to model the physical structure of the e-medicine system to better provide offline health care services. Smart cards are used to authenticate the user singly. A very unique technique is also suggested to verify the card owner's identity and to embed secret data to the card while providing patients' reports either at booths or at the e-medicine server system. The simulation results of card authentication and embedding procedure justify the proposed implementation. PMID:26609382
[Smart card systems in health care (protection, key-functions, divided data bases, applications)].
Simon, P
1999-04-25
Barely more than 15 years have passed since electronic memory cards appeared, their popularity has grown rapidly (first of all as a cash-saving device and later for other purposes, as well). This is due also to the growing interest towards development of the intelligence of information systems for the follow-up of patients' health condition and medical care in countries with a highly developed health and insurance system (need for the creation of data bases divided for individuals) and also to their commitment towards a better control of the quality and costs of health care. We can come to the conclusion that the aim of research, development and the creation of systems in health informatics is to prevent illness and to give a direct informatic support to medical and nursing activity carried out in the patients' interests. The smart card and the surrounding application systems are certainly the appropriate means for the achievement of these aims.
The Security Email Based on Smart Card
NASA Astrophysics Data System (ADS)
Lina, Zhang; Jiang, Meng Hai.
Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.
Family Registration Card as electronic medical carrier in Bosnia and Herzegovina.
Novo, Ahmed; Masic, Izet; Toromanovic, Selim; Loncarevic, Nedim; Junuzovic, Dzelaludin; Dizdarevic, Jadranka
2004-01-01
Medical documentation is a very important part of the medical documentalistics and is occupies a large part of daily work of medical staff working in Primary Health Care. Paper documentation is going to be replaced by electronic cards in Bosnia and Herzegovina and a new Health Care System is under development, based on an Electronic Family Registration Card. Developed countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transferring, searching and protecting data, using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Three types of electronic card are currently in use: a Hybrid Card, a Smart Card and a Laser Card. The dilemma is which card should be used as a data carrier. The Electronic Family Registration Cared is a question of strategic interest for B&H, but also a great investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.
Registration system of cloud campus by using android smart tablet.
Kamada, Shin; Ichimura, Takumi; Shigeyasu, Tetsuya; Takemoto, Yasuhiko
2014-01-01
Near Field Communication (NFC) standard covers communication protocols and data exchange formats. NFC technology is one of radio-frequency identification (RFID) standards. In Japan, Felica card is a popular way to identify the unique ID. We developed the attendance management system (AMS) as the Android application which works in the smart tablet with NFC. Generally, the AMS in the university is fixed to the wall and each student touches or slides his/her own card to the dedicated equipment. Because a teacher can use his/her own smart tablet and/or smartphone, the attendance records are viewed anytime and anywhere. Moreover, we developed the collecting system between PC and some tablets by using Android beam. Any personal data are encrypted and the file can be transferred over the NFC Bluetooth Handover between PC Linux and smart tablet. By the mining of the collected records, early discovery for chronic non-attenders are extracted in educational affairs section. In this paper, a registration system on the cloud campus system by using the personal smartphone with NFC is developed. The system enables to introduce the university courses that are open to the general public.
48 CFR 1401.603-3 - Appointment.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the bureau/office procedures within the constraints of DOI Integrated Charge Card Program Policy Manual located at http://www.doi.gov/pam/chargecard. Additional guidance is available in the GSA Smart...
48 CFR 1401.603-3 - Appointment.
Code of Federal Regulations, 2011 CFR
2011-10-01
... the bureau/office procedures within the constraints of DOI Integrated Charge Card Program Policy Manual located at http://www.doi.gov/pam/chargecard. Additional guidance is available in the GSA Smart...
Front end design of smartphone-based mobile health
NASA Astrophysics Data System (ADS)
Zhang, Changfan; He, Lingsong; Gao, Zhiqiang; Ling, Cong; Du, Jianhao
2015-02-01
Mobile health has been a new trend all over the world with the rapid development of intelligent terminals and mobile internet. It can help patients monitor health in-house and is convenient for doctors to diagnose remotely. Smart-phone-based mobile health has big advantages in cost and data sharing. Front end design of it mainly focuses on two points: one is implementation of medical sensors aimed at measuring kinds of medical signal; another is acquisition of medical signal from sensors to smart phone. In this paper, the above two aspects were both discussed. First, medical sensor implementation was proposed to refer to mature measurement solutions with ECG (electrocardiograph) sensor design taken for example. And integrated chip using can simplify design. Then second, typical data acquisition architecture of smart phones, namely Bluetooth and MIC (microphone)-based architecture, were compared. Bluetooth architecture should be equipped with an acquisition card; MIC design uses sound card of smart phone instead. Smartphone-based virtual instrument app design corresponding to above acquisition architecture was discussed. In experiments, Bluetooth and MIC architecture were used to acquire blood pressure and ECG data respectively. The results showed that Bluetooth design can guarantee high accuracy during the acquisition and transmission process, and MIC design is competitive because of low cost and convenience.
Mathieson, Steve
2005-09-08
European nations outside the UK use smartcards to speed up reimbursements. France has had a card since 1998 and this may soon include health data. The UK is at present only issuing smartcards for healthcare staff's use.
Analysis of OPACITY and PLAID Protocols for Contactless Smart Cards
2012-09-01
9 3. Access Control ........................................................................ 9 E . THREATS AND...Synchronization .............................. 23 c. Simple Integration and Interoperability ..................... 24 E . MODES OF OPERATION...Interoperability ..................... 47 E . MODES OF OPERATIONS ................................................................ 47 F. SUGGESTED KEY
Lee, Tian-Fu; Liu, Chuan-Ming
2013-06-01
A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.
Robust anonymous authentication scheme for telecare medical information systems.
Xie, Qi; Zhang, Jun; Dong, Na
2013-04-01
Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.
Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian
2015-01-01
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.
Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian
2015-01-01
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373
Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho
2015-01-01
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).
Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho
2015-01-01
A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks). PMID:25849359
Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao
2014-09-01
Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.
Lai, Jiun-Tze; Hou, Ting-Wei
2008-04-01
An application that adopts smart cards often requires users to enter a PIN (Personal Identification Number) code. In Taiwan's healthcare system, a PIN is used to protect a card holder's private data. However, should one forget one's PIN, the procedure to set up a new PIN is inconvenient. There is a higher probability that senior citizens may forget their PINs. We propose a device which stores the PIN of the cardholder's Healthcare IC card. When the healthcare IC card reader requires the cardholder to enter his/her PIN, the cardholder pushes a button of the device to remotely sends the cardholder's encrypted PIN, for example by Infra Red. The device is designed to be low cost and easy to carry, and, hence, affordable to be a gift to senior citizens. Moreover, if the cardholder should forget to take the device with him/her, the card still works as normal. The device would be helpful in ensuring the public's privacy and convenience in Taiwan's healthcare system.
Miniaturised wireless smart tag for optical chemical analysis applications.
Steinberg, Matthew D; Kassal, Petar; Tkalčec, Biserka; Murković Steinberg, Ivana
2014-01-01
A novel miniaturised photometer has been developed as an ultra-portable and mobile analytical chemical instrument. The low-cost photometer presents a paradigm shift in mobile chemical sensor instrumentation because it is built around a contactless smart card format. The photometer tag is based on the radio-frequency identification (RFID) smart card system, which provides short-range wireless data and power transfer between the photometer and a proximal reader, and which allows the reader to also energise the photometer by near field electromagnetic induction. RFID is set to become a key enabling technology of the Internet-of-Things (IoT), hence devices such as the photometer described here will enable numerous mobile, wearable and vanguard chemical sensing applications in the emerging connected world. In the work presented here, we demonstrate the characterisation of a low-power RFID wireless sensor tag with an LED/photodiode-based photometric input. The performance of the wireless photometer has been tested through two different model analytical applications. The first is photometry in solution, where colour intensity as a function of dye concentration was measured. The second is an ion-selective optode system in which potassium ion concentrations were determined by using previously well characterised bulk optode membranes. The analytical performance of the wireless photometer smart tag is clearly demonstrated by these optical absorption-based analytical experiments, with excellent data agreement to a reference laboratory instrument. © 2013 Elsevier B.V. All rights reserved.
Smart Passport : Ventura County Transportation Commission's demonstration project
DOT National Transportation Integrated Search
1998-09-01
In January 1996 the Ventura County Transportation Commission (VCTC) began the implementation of an advanced bus pass (fare card media), or Smartcard, called the "Passport," on all Ventura County transit systems which incorporated a number of emerging...
Biometrics encryption combining palmprint with two-layer error correction codes
NASA Astrophysics Data System (ADS)
Li, Hengjian; Qiu, Jian; Dong, Jiwen; Feng, Guang
2017-07-01
To bridge the gap between the fuzziness of biometrics and the exactitude of cryptography, based on combining palmprint with two-layer error correction codes, a novel biometrics encryption method is proposed. Firstly, the randomly generated original keys are encoded by convolutional and cyclic two-layer coding. The first layer uses a convolution code to correct burst errors. The second layer uses cyclic code to correct random errors. Then, the palmprint features are extracted from the palmprint images. Next, they are fused together by XORing operation. The information is stored in a smart card. Finally, the original keys extraction process is the information in the smart card XOR the user's palmprint features and then decoded with convolutional and cyclic two-layer code. The experimental results and security analysis show that it can recover the original keys completely. The proposed method is more secure than a single password factor, and has higher accuracy than a single biometric factor.
Vehicle Fault Diagnose Based on Smart Sensor
NASA Astrophysics Data System (ADS)
Zhining, Li; Peng, Wang; Jianmin, Mei; Jianwei, Li; Fei, Teng
In the vehicle's traditional fault diagnose system, we usually use a computer system with a A/D card and with many sensors connected to it. The disadvantage of this system is that these sensor can hardly be shared with control system and other systems, there are too many connect lines and the electro magnetic compatibility(EMC) will be affected. In this paper, smart speed sensor, smart acoustic press sensor, smart oil press sensor, smart acceleration sensor and smart order tracking sensor were designed to solve this problem. With the CAN BUS these smart sensors, fault diagnose computer and other computer could be connected together to establish a network system which can monitor and control the vehicle's diesel and other system without any duplicate sensor. The hard and soft ware of the smart sensor system was introduced, the oil press, vibration and acoustic signal are resampled by constant angle increment to eliminate the influence of the rotate speed. After the resample, the signal in every working cycle could be averaged in angle domain and do other analysis like order spectrum.
Long, An-Jim; Chang, Polun
2012-09-01
There is an evidence that pregnant women have been prescribed a significant number of improper medications that could lead to potential damage for a developing fetus due to discontinuity of care. The safety of pregnant women raises public concern and there is a need to identify ways to prevent potential adverse events to the pregnant woman. This study used a health smart card with a clinical reminder system to keep continuous records of general outpatient visits of pregnant women to protect them from potential adverse events caused by improper prescription. The health smart card, issued to all 23 million citizens in Taiwan, was used to work with a Computerized Physician Order Entry (CPOE) implemented at a 700-bed teaching medical center in Taipei to provide the outpatient information of pregnant women. FDA pregnancy risk classification was used to categorize the risk of pregnant women. The log file, combined with the physicians' and patients' profiles, were statistically examined using the Mantel-Haenszel technique to evaluate the impact of system in changing physician's prescription behavior. A total of 441 patients ranged in age from 15 to 50 years with 1114 prescriptions involved in FDA pregnancy risk classification C, D, and X during the study period. 144 reminders (13.1%) were accepted by physicians for further assessment and 100 (69.4%) of them were modified. Non-obstetric physicians in non-emergency setting were more intended to accept reminders (27.8%, 4.9 folds than obstetricians). Reminders triggered on patients in second trimester (15.5%) were accepted by all physicians more than third trimester (OR 1.52, p<0.05). A health smart card armed with CPOE reminder system and well-defined criteria had the potential to decrease harmful medication prescribed to pregnant patients. The results show better conformance for non-obstetric physicians (26%) and when physicians accepted the alerts they are more likely to went back and review their orders (69%). In sum, reminder criteria of FDA pregnancy risk classification C for obstetricians and reminder based on different trimesters is suggested to be refined to improve system acceptability and to decrease improper prescription. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
ERIC Educational Resources Information Center
College Planning & Management, 1997
1997-01-01
Ten possible trends on college campuses are examined. They include distance learning; rehabilitation of existing buildings; use of construction management firms; salaries for facilities directors; virtual universities; off-site garages; outside residence hall contractors; classrooms in residential buildings; and smart cards for entry and…
ERIC Educational Resources Information Center
Hassler, Vesna; Biely, Helmut
1999-01-01
Describes the Digital Signature Project that was developed in Austria to establish an infrastructure for applying smart card-based digital signatures in banking and electronic-commerce applications. Discusses the need to conform to international standards, an international certification infrastructure, and security features for a public directory…
Ventura County fare integration : a case study : promoting seamless regional fare coordination
DOT National Transportation Integrated Search
2001-09-01
This report details the approach taken in one specific region to plan, operate, and maintain a multi-agency, transit fare collection payment system demonstration utilizing smart card technology as well as other ITS (intelligent transportation systems...
Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A
2000-04-01
The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.
Findlay, Steven D
2016-04-01
Encouraging patients and consumers to use data and other information in choosing health care providers is an important way to enhance patient engagement and improve the quality of care. The growing use of technology, including smart phones and near-ubiquitous Internet access, provides consumers with easy access to websites that collect and report assessments and ratings of providers, primarily physicians and hospitals. In addition to new technology, recent laws and changes in society and the delivery of care are laying the foundation for greater use by consumers of provider performance report cards. Such use could be accelerated if the shortcomings of current report card efforts were addressed. Recommendations include making online report cards easier to use and more understandable, engaging, substantive, and relevant to consumers' health and medical concerns and choices. Project HOPE—The People-to-People Health Foundation, Inc.
Optimised to Fail: Card Readers for Online Banking
NASA Astrophysics Data System (ADS)
Drimer, Saar; Murdoch, Steven J.; Anderson, Ross
The Chip Authentication Programme (CAP) has been introduced by banks in Europe to deal with the soaring losses due to online banking fraud. A handheld reader is used together with the customer’s debit card to generate one-time codes for both login and transaction authentication. The CAP protocol is not public, and was rolled out without any public scrutiny. We reverse engineered the UK variant of card readers and smart cards and here provide the first public description of the protocol. We found numerous weaknesses that are due to design errors such as reusing authentication tokens, overloading data semantics, and failing to ensure freshness of responses. The overall strategic error was excessive optimisation. There are also policy implications. The move from signature to PIN for authorising point-of-sale transactions shifted liability from banks to customers; CAP introduces the same problem for online banking. It may also expose customers to physical harm.
Code of Federal Regulations, 2011 CFR
2011-10-01
... REGULATION SYSTEM Career Development, Contracting Authority, and Responsibilities 301.608 Training... CON 237). • Advanced simplified acquisition procedures or Appropriations law. Purchase card holders...). • Advanced simplified acquisition procedures or Appropriations law. • CON 100 (Shaping Smart Business...
Code of Federal Regulations, 2012 CFR
2012-10-01
... REGULATION SYSTEM Career Development, Contracting Authority, and Responsibilities 301.608 Training... CON 237). • Advanced simplified acquisition procedures or Appropriations law. Purchase card holders...). • Advanced simplified acquisition procedures or Appropriations law. • CON 100 (Shaping Smart Business...
2012-01-01
password policies (or smart card authentication), disabling compo- nents of the operating system that were deemed unsafe, allowing users to only install...written nearly 100 applications for the iOS and Android platforms with over 1,500,000 downloads on iTunes and Google Play. CPT Braunstein is a
Consolidating Our Country’s Biometric Resources and the Possible Implications
2008-03-02
passenger’s quick access through airport security by pre-clearing travelers. The Fly Clear smart cards store the passenger’s personal information...Fly Through Airport Security , undated); “Fly Through Airport Security ,”; available from http://flyclear.com/about/clear _howclearworks.html
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hart, Darren M.
Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA cryptomore » card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.« less
Mapping and navigational control for a smart wheelchair.
Schultz, Dana L; Shea, Kathleen M; Barrett, Steven F
2012-01-01
A smart wheelchair is in development to provide mobility to those unable to control a traditional wheelchair. A smart wheelchair is an autonomous machine with the ability to navigate a mapped environment while avoiding obstacles. The flexibility and complex design of smart wheelchairs have made those currently available expensive. Ongoing research at the University of Wyoming has been aimed at designing a cheaper, alternative control system that could be interfaced with a typical powered wheelchair. The goal of this project is to determine methods for mapping and navigational control for the wheelchair. The control system acquires data from eighteen sensors and uses the data to navigate around a pre-programmed map which is stored on a micro SD card. The control system also provides a user interface in the form of a touchscreen LCD. The designed system will be an easy-to-use and cost effective alternative to current smart wheelchair technology.
Code of Federal Regulations, 2012 CFR
2012-01-01
... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...
Code of Federal Regulations, 2013 CFR
2013-07-01
... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay ® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...
Code of Federal Regulations, 2011 CFR
2011-01-01
... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...
Code of Federal Regulations, 2010 CFR
2010-07-01
... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...
Code of Federal Regulations, 2014 CFR
2014-01-01
... collect motor vehicle data at the time of purchase. Where appropriate, State sales and motor fuel taxes...: General Services Administration, ATTN: GSA SmartPay ® (QMB), 2200 Crystal Drive, Arlington, VA 22202. (b...
Develop 3G Application with The J2ME SATSA API
NASA Astrophysics Data System (ADS)
JunWu, Xu; JunLing, Liang
This paper describes research in the use of the Security and Trust Services API for J2ME (SATSA) to develop mobile applications. for 3G networks. SATSA defines a set of APIs that allows J2ME applications to communicate with and access functionality, secure storage and cryptographic operations provided by security elements such as smart cards and Wireless Identification Modules (WIM). A Java Card application could also work as an authentication module in a J2ME-based e-bank application. The e-bank application would allow its users to access their bank accounts using their cell phones.
Your Guide to Smart Year-Round Fundraising.
ERIC Educational Resources Information Center
Gensheimer, Cynthia Francis
1994-01-01
Describes three seasonal fund-raising projects that can be linked with the curriculum and require only a few parent volunteers. The projects are profitable without requiring large amounts of effort. They include selling holiday cards, conducting read-a-thons, and participating in save-the-rainforest group sales. Tips for holding successful fund…
Portable electrocardiogram device using Android smartphone.
Brucal, S G E; Clamor, G K D; Pasiliao, L A O; Soriano, J P F; Varilla, L P M
2016-08-01
Portable electrocardiogram (ECG) capturing device can be interfaced to a smart phone installed with an android-based application (app). This app processes and analyses the data sent by the device to provide an interpretation of the patient/user's heart current condition (e.g.: beats per minute, heart signal waveform, R-R interval). The ECG recorded by the app is stored in the smart phone's Secure Digital (SD) card and cloud storage which can be accessed remotely by a physician to aid in providing medical diagnosis. The project aims to help patients living at a far distance from hospitals and experience difficulty in consulting their physician for regular check-ups, and assist doctors in regularly monitoring their patient's heart condition. The hardware data acquisition device and software application were subjected to trials in a clinic with volunteer-patients to measure the ECG and heart rate, data saving speed on the SD card, success rate of the saved data and uploaded file. Different ECG tests using the project prototype were done for 12 patients/users and yielded a reading difference of 7.61% in an R-R interval reading and 5.35% in heart rate reading as compared with the cardiologist's conventional 12-electrode ECG machine. Using the developed ECG device, it took less than 5 seconds to save ECG reading using SD card and approximately 2 minutes to upload via cloud.
Effect of Technological Changes in Information Transfer on the Delivery of Pharmacy Services.
ERIC Educational Resources Information Center
Barker, Kenneth N.; And Others
1989-01-01
Personal computer technology has arrived in health care. Specific technological advances are optical disc storage, smart cards, voice recognition, and robotics. This paper discusses computers in medicine, in nursing, in conglomerates, and with patients. Future health care will be delivered in primary care centers, medical supermarkets, specialized…
49 CFR 395.16 - Electronic on-board recording devices.
Code of Federal Regulations, 2011 CFR
2011-10-01
... “sufficiently precise,” for purposes of this paragraph means the nearest city, town or village. (3) When the CMV... driving, and where released from work), the name of the nearest city, town, or village, with State... password) that identifies the driver or to provide other information (such as smart cards, biometrics) that...
Das, Ashok Kumar; Bruhadeshwar, Bezawada
2013-10-01
Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.
Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
Das, Ashok Kumar
2015-03-01
An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication
NASA Astrophysics Data System (ADS)
Murdoch, Steven J.; Anderson, Ross
Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.
Integrity mechanism for eHealth tele-monitoring system in smart home environment.
Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos
2009-01-01
During the past few years, a lot of effort has been invested in research and development of eHealth tele-monitoring systems that will provide many benefits for healthcare delivery from the healthcare provider to the patient's home. However, there is a plethora of security requirements in eHealth tele-monitoring systems. Data integrity of the transferred medical data is one of the most important security requirements that should be satisfied in these systems, since medical information is extremely sensitive information, and even sometimes life threatening information. In this paper, we present a data integrity mechanism for eHealth tele-monitoring system that operates in a smart home environment. Agent technology is applied to achieve data integrity with the use of cryptographic smart cards. Furthermore, the overall security infrastructure and its various components are described.
Desai, Himanshu; Patel, Anil; Patel, Pinal; Grant, Brydon J B; Mador, M Jeffery
2009-11-01
Autotitrating continuous positive airway pressure (auto-CPAP) devices now have a smart card (a pocket-sized card with embedded integrated circuits which records data from the CPAP machine such as CPAP usage, CPAP pressure, large leak, etc.) which can estimate the Apnea-Hypopnea Index (AHI) on therapy. The aim of this study was to determine the accuracy of auto-CPAP in estimating the residual AHI in patients with obstructive sleep apnea (OSA) who were treated with auto-CPAP without a CPAP titration study. We studied 99 patients with OSA from April 2005 to May 2007 who underwent a repeat sleep study using auto-CPAP. The estimated AHI from auto-CPAP was compared with the AHI from an overnight polysomnogram (PSG) on auto-CPAP using Bland-Altman plot and likelihood ratio analyses. A PSG AHI cutoff of five events per hour was used to differentiate patients optimally treated with auto-CPAP from those with residual OSA on therapy. Bland and Altman analysis showed good agreement between auto-CPAP AHI and PSG AHI. There was no significant bias when smart card estimates of AHI at home were compared to smart card estimates obtained in the sleep laboratory. An auto-CPAP cutoff for the AHI of six events per hour was shown to be optimal for differentiating patients with and without residual OSA with a sensitivity of 0.92 (95% confidence interval (CI) 0.76 to 0.98) and specificity of 0.90 (95% CI 0.82 to 0.95) with a positive likelihood ratio (LR) of 9.6 (95% CI 5.1 to 21.5) and a negative likelihood ratio of 0.085 (95% CI 0.02 to 0.25). Auto-CPAP AHI of eight events per hour yielded the optimal sensitivity (0.94, 95% CI 0.73 to 0.99) and specificity (0.90, 95% CI 0.82 to 0.95) with a positive LR of 9.6 (95% CI 5.23 to 20.31) and a negative LR of 0.065 (95% CI 0.004 to 0.279) to identify patients with a PSG AHI of > or = 10 events per hour. Auto-CPAP estimate of AHI may be used to estimate residual AHI in patients with OSA of varying severity treated with auto-CPAP.
Slovenian national health insurance card: the next step.
Kalin, T; Kandus, G; Trcek, D; Zupan, B
1999-01-01
The Slovenian national health insurance company started a full-scale deployment of the insurance smart card that is at the present used for insurance data and identification purpose only. There is ample capacity on the cards that were selected, to contain much more data than needed for the purely administrative and charging purposes. There are plans to include some basic medical information, donor information, etc. On the other hand, there are no firm plans to use the security infrastructure and the extensive network, connecting the insurance company with the more than 200 self service terminals positioned at the medical facilities through the country to build an integrated medical information system that would be very beneficial to the patients and the medical community. This paper is proposing some possible future developments and further discusses on the security issues involved with such countrywide medical information system.
Using Technology To Combat Truancy. Number 10 in a Series of CTC Trust Publications.
ERIC Educational Resources Information Center
Haigh, Gerald
The 14 City Technology Colleges (CTCs) opened so far in Great Britain are achieving an average attendance rate of between 90 percent and 97 percent. This high level of attendance has been assisted by the use of electronic registration (role taking) devices, including smart cards, portable computers, and optical readers. This report compares…
Hsu, Min-Huei; Yeh, Yu-Ting; Chen, Chien-Yuan; Liu, Chien-Hsiang; Liu, Chien-Tsai
2011-03-01
Doctor shopping (or hospital shopping), which means changing doctors (or hospitals) without professional referral for the same or similar illness conditions, is common in Hong Kong, Taiwan and Japan. Due to the lack of infrastructure for sharing health information and medication history among hospitals, doctor-shopping patients are more likely to receive duplicate medications and suffer adverse drug reactions. The Bureau of National Health Insurance (BNHI) adopted smart cards (or NHI-IC cards) as health cards in Taiwan. With their NHI-IC cards, patients can freely access different medical institutions. Because an NHI-IC card carries information about a patient's prescribed medications received from different hospitals nationwide, we used this system to address the problem of duplicate medications for outpatients visiting multiple hospitals. A computerized physician order entry (CPOE) system was enhanced with the capability of accessing NHI-IC cards and providing alerts to physicians when the system detects potential duplicate medications at the time of prescribing. Physician responses to the alerts were also collected to analyze changes in physicians' behavior. Chi-square tests and two-sided z-tests with Bonferroni adjustments for multiple comparisons were used to assess statistical significance of differences in actions taken by physicians over the three months. The enhanced CPOE system for outpatient services was implemented and installed at the Pediatric and Urology Departments of Taipei Medical University Wan-Fang Hospital in March 2007. The "Change Log" that recorded physician behavior was activated during a 3-month study period from April to June 2007. In 67.93% of patient visits, the physicians read patient NHI-IC cards, and in 16.76% of the reads, the NHI-IC card contained at least one prescribed medication that was taken by the patient. Among the prescriptions issued by physicians, on average, there were 2.36% prescriptions containing at least one medication that might be duplicative to the prior prescriptions stored in NHI-IC cards. The rate of potential duplicate medication alerts for the Pediatric Department was higher than that for the Urology Department (2.78% versus 1.67%). However, the rate of revisions to prescriptions was higher in the Urology Department than the Pediatric Department. Overall, the rate of physicians reviewing and revising their prescriptions was 29.25%; the rate of physicians reviewing without revising their prescriptions was 43.62%; the rate of physicians turning off the alert screens right after the screens popped up (overridden) was 27.13%. Thus, physicians accepted alerts to review their prescriptions with patients in most situations (72.87%). Moreover, over the study period, the rate of total revisions made to prescriptions increased and the "overridden" rate decreased. Our approach enhances the capability of CPOE systems using NHI-IC cards as a nationwide infrastructure to provide more complete patient health information and medication history sharing among hospitals in Taiwan. Thus, our system can provide a better prescribing tool to help physicians detect potential duplicate medications for frequent doctor-shopping patients and hence enhance patient safety across hospital boundaries. However, the effectiveness of detecting duplicate medications with our approach is very much dependent on the completeness of NHI-IC cards, which in turn primarily depends on physician use of the cards when prescribing. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
The exploration of the exhibition informatization
NASA Astrophysics Data System (ADS)
Zhang, Jiankang
2017-06-01
The construction and management of exhibition informatization is the main task and choke point during the process of Chinese exhibition industry’s transformation and promotion. There are three key points expected to realize a breakthrough during the construction of Chinese exhibition informatization, and the three aspects respectively are adopting service outsourcing to construct and maintain the database, adopting advanced chest card technology to collect various kinds of information, developing statistics analysis to maintain good cutomer relations. The success of Chinese exhibition informatization mainly calls for mature suppliers who can provide construction and maintenance of database, the proven technology, a sense of data security, advanced chest card technology, the ability of data mining and analysis and the ability to improve the exhibition service basing on the commercial information got from the data analysis. Several data security measures are expected to apply during the process of system developing, including the measures of the terminal data security, the internet data security, the media data security, the storage data security and the application data security. The informatization of this process is based on the chest card designing. At present, there are several types of chest card technology: bar code chest card; two-dimension code card; magnetic stripe chest card; smart-chip chest card. The information got from the exhibition data will help the organizers to make relevant service strategies, quantify the accumulated indexes of the customers, and improve the level of the customer’s satisfaction and loyalty, what’s more, the information can also provide more additional services like the commercial trips, VIP ceremonial reception.
Dual-Input AND Gate From Single-Channel Thin-Film FET
NASA Technical Reports Server (NTRS)
Miranda, F. A.; Pinto, N. J.; Perez, R.; Mueller, C. H.
2008-01-01
A regio-regular poly(3-hexylthiophene) (RRP3HT) thin-film transistor having a split-gate architecture has been fabricated on a doped silicon/silicon nitride substrate and characterized. RRP3HT is a semiconducting polymer that has a carrier mobility and on/off ratio when used in a field effect transistor (FET) configuration. This commercially available polymer is very soluble in common organic solvents and is easily processed to form uniform thin films. The most important polymer-based device fabricated and studied is the FET, since it forms the building block in logic circuits and switches for active matrix (light-emitting-diode) (LED) displays, smart cards, and radio frequency identification (RFID) cards.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rembold, Randy Kai; Hart, Darren M.; Harris, James Mark
Sandia National Laboratories has tested, evaluated and reported on the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication in SAND2008-. One test, Input Terminated Noise, allows us to characterize the self-noise of the Smart24 system. By computing the power spectral density (PSD) of the input terminated noise time series data set and correcting for the instrument response of different seismometers, the resulting spectrum can be compared to the USGS new low noise model (NLNM) of Peterson (1996), and determine the ability of the matched system of seismometer and Smart24 to be quiet enough formore » any general deployment location. Four seismometer models were evaluated: the Streckeisen STS2-Low and High Gain, Guralp CMG3T and Geotech GS13 models. Each has a unique pass-band as defined by the frequency band of the instrument corrected noise spectrum that falls below the new low-noise model.« less
A provably-secure ECC-based authentication scheme for wireless sensor networks.
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-11-06
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.
Wen, Fengtong
2013-12-01
User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-01-01
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009
Comparison of Urban Human Movements Inferring from Multi-Source Spatial-Temporal Data
NASA Astrophysics Data System (ADS)
Cao, Rui; Tu, Wei; Cao, Jinzhou; Li, Qingquan
2016-06-01
The quantification of human movements is very hard because of the sparsity of traditional data and the labour intensive of the data collecting process. Recently, much spatial-temporal data give us an opportunity to observe human movement. This research investigates the relationship of city-wide human movements inferring from two types of spatial-temporal data at traffic analysis zone (TAZ) level. The first type of human movement is inferred from long-time smart card transaction data recording the boarding actions. The second type of human movement is extracted from citywide time sequenced mobile phone data with 30 minutes interval. Travel volume, travel distance and travel time are used to measure aggregated human movements in the city. To further examine the relationship between the two types of inferred movements, the linear correlation analysis is conducted on the hourly travel volume. The obtained results show that human movements inferred from smart card data and mobile phone data have a correlation of 0.635. However, there are still some non-ignorable differences in some special areas. This research not only reveals the citywide spatial-temporal human dynamic but also benefits the understanding of the reliability of the inference of human movements with big spatial-temporal data.
Wu, Fan; Xu, Lili
2013-08-01
Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619
Security aspects in teleradiology workflow
NASA Astrophysics Data System (ADS)
Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter
2000-05-01
The medicolegal necessity of privacy, security and confidentiality was the aim of the attempt to develop a secure teleradiology workflow between the telepartners -- radiologist and the referring physician. To avoid the lack of dataprotection and datasecurity we introduced biometric fingerprint scanners in combination with smart cards to identify the teleradiology partners and communicated over an encrypted TCP/IP satellite link between Innsbruck and Reutte. We used an asymmetric kryptography method to guarantee authentification, integrity of the data-packages and confidentiality of the medical data. It was necessary to use a biometric feature to avoid a case of mistaken identity of persons, who wanted access to the system. Only an invariable electronical identification allowed a legal liability to the final report and only a secure dataconnection allowed the exchange of sensible medical data between different partners of Health Care Networks. In our study we selected the user friendly combination of a smart card and a biometric fingerprint technique, called SkymedTM Double Guard Secure Keyboard (Agfa-Gevaert) to confirm identities and log into the imaging workstations and the electronic patient record. We examined the interoperability of the used software with the existing platforms. Only the WIN-XX operating systems could be protected at the time of our study.
An RFID Based Smart Feeder for Hummingbirds.
Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F; Tang, Wei
2015-12-16
We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9-11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future.
An RFID Based Smart Feeder for Hummingbirds
Ibarra, Vicente; Araya-Salas, Marcelo; Tang, Yu-ping; Park, Charlie; Hyde, Anthony; Wright, Timothy F.; Tang, Wei
2015-01-01
We present an interdisciplinary effort to record feeding behaviors and control the diet of a hummingbird species (Phaethornis longirostris, the long-billed hermit or LBH) by developing a Radio Frequency Identification (RFID) based smart feeder. The system contains an RFID reader, a microcontroller, and a servo-controlled hummingbird feeder opener; the system is presented as a tool for studying the cognitive ability of the LBH species. When equipped with glass capsule RFID tags (which are mounted on the hummingbird), the smart feeder can provide specific diets for predetermined sets of hummingbirds at the discretion of biologists. This is done by reading the unique RFID tag on the hummingbirds and comparing the ID number with the pre-programmed ID numbers stored in the smart feeder. The smart feeder records the time and ID of each hummingbird visit. The system data is stored in a readily available SD card and is powered by two 9 V batteries. The detection range of the system is approximately 9–11 cm. Using this system, biologists can assign the wild hummingbirds to different experimental groups and monitor their diets to determine if they develop a preference to any of the available nectars. During field testing, the smart feeder system has demonstrated consistent detection (when compared to detections observed by video-recordings) of RFID tags on hummingbirds and provides pre-designed nectars varying water and sugar concentrations to target individuals. The smart feeder can be applied to other biological and environmental studies in the future. PMID:26694402
2008-09-01
Abbreviations ATM automated teller machine BEA business enterprise architecture DOD...Limitations Automated Teller Machines (ATMs)-At-Sea 1988 Localized, shipboard ATMs that received and accounted for a portion of sailors’ and...use smart card technology for electronic retail ransactions and (2) economically justified on the basis of reliable analyses of stimated costs and
Ergonomics issues in national identity card for homeland security.
Yeow, Paul H P; Yuen, Y Y; Loo, W H
2013-09-01
Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.
MARC ES: a computer program for estimating medical information storage requirements.
Konoske, P J; Dobbins, R W; Gauker, E D
1998-01-01
During combat, documentation of medical treatment information is critical for maintaining continuity of patient care. However, knowledge of prior status and treatment of patients is limited to the information noted on a paper field medical card. The Multi-technology Automated Reader Card (MARC), a smart card, has been identified as a potential storage mechanism for casualty medical information. Focusing on data capture and storage technology, this effort developed a Windows program, MARC ES, to estimate storage requirements for the MARC. The program calculates storage requirements for a variety of scenarios using medical documentation requirements, casualty rates, and casualty flows and provides the user with a tool to estimate the space required to store medical data at each echelon of care for selected operational theaters. The program can also be used to identify the point at which data must be uploaded from the MARC if size constraints are imposed. Furthermore, this model can be readily extended to other systems that store or transmit medical information.
Light-weight cyptography for resource constrained environments
NASA Astrophysics Data System (ADS)
Baier, Patrick; Szu, Harold
2006-04-01
We give a survey of "light-weight" encryption algorithms designed to maximise security within tight resource constraints (limited memory, power consumption, processor speed, chip area, etc.) The target applications of such algorithms are RFIDs, smart cards, mobile phones, etc., which may store, process and transmit sensitive data, but at the same time do not always support conventional strong algorithms. A survey of existing algorithms is given and new proposal is introduced.
Lambert, N; Plumb, J; Looise, B; Johnson, I T; Harvey, I; Wheeler, C; Robinson, M; Rolfe, P
2005-08-01
The aim of the study was to test the abilities of the newly created smart card system to track the nutrient contents of foods chosen over several months by individual diners in a school cafeteria. From the food choice and composition of food data sets, an Access database was created encompassing 30 diners (aged 8-11 years), 78 days and eight nutrients. Data were available for a total of 1909 meals. Based upon population mean values the cohort were clearly choosing meals containing higher than the recommended maximum amounts for sugar and lower than the recommended minimum amounts of fibre, iron and vitamin A. Protein and vitamin C contents of meals chosen were well above minimum requirements. Over the 1909 meals, nutrient requirements were met 41% of the time. The system created was very effective at continually monitoring food choices of individual diners over limitless time. The data generated raised questions on the common practice of presenting nutrient intakes as population mean values calculated over a few days. The impact of heavily fortified foods on such studies in general is discussed.
Mishra, Dheerendra
2015-03-01
Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.
A Pervasive Social Networking Application: I-NFC enabled Florist Smart Advisor
NASA Astrophysics Data System (ADS)
Swee Wen, Khoo; Mahinderjit Singh, Manmeet
2016-11-01
Location based service is an information and entertainment service, accessible with mobile devices through the mobile network and utilizing the ability to make use of the geographical position of the mobile device. NFC location based service is using one of the modes of NFC such as peer-to-peer, reader/writer, and card emulation to obtain the information of the object and then get the location of the object. In this paper, the proposed solution is I- NFC-enabled Pervasive Social Networking apps for florists. It combines the NFC location based service with Online Social Network (OSN). In addition, a smart advisor in the system to provide output in making their own decision while purchasing products.The development of the system demonstrates that a designed commerce site is provided which enable a communication between NFC-enabled smartphone, NFC-enabled application and OSN. GPS functionalities also implemented to provide map and location of business services. Smart advisor also designed to provide information for users who do not have ideas what to purchase.
Jelacic, Srdjan; Bowdle, Andrew; Nair, Bala G; Kusulos, Dolly; Bower, Lynnette; Togashi, Kei
2015-08-01
Many anesthetic drug errors result from vial or syringe swaps. Scanning the barcodes on vials before drug preparation, creating syringe labels that include barcodes, and scanning the syringe label barcodes before drug administration may help to prevent errors. In contrast, making syringe labels by hand that comply with the recommendations of regulatory agencies and standards-setting bodies is tedious and time consuming. A computerized system that uses vial barcodes and generates barcoded syringe labels could address both safety issues and labeling recommendations. We measured compliance of syringe labels in multiple operating rooms (ORs) with the recommendations of regulatory agencies and standards-setting bodies before and after the introduction of the Codonics Safe Label System (SLS). The Codonics SLS was then combined with Smart Anesthesia Manager software to create an anesthesia barcode drug administration system, which allowed us to measure the rate of scanning syringe label barcodes at the time of drug administration in 2 cardiothoracic ORs before and after introducing a coffee card incentive. Twelve attending cardiothoracic anesthesiologists and the OR satellite pharmacy participated. The use of the Codonics SLS drug labeling system resulted in >75% compliant syringe labels (95% confidence interval, 75%-98%). All syringe labels made using the Codonics SLS system were compliant. The average rate of scanning barcodes on syringe labels using Smart Anesthesia Manager was 25% (730 of 2976) over 13 weeks but increased to 58% (956 of 1645) over 8 weeks after introduction of a simple (coffee card) incentive (P < 0.001). An anesthesia barcode drug administration system resulted in a moderate rate of scanning syringe label barcodes at the time of drug administration. Further, adaptation of the system will be required to achieve a higher utilization rate.
Lau, Eric HY; So, Hau Chi; Xiao, Jingyi; Lam, Chi Kin; Fang, Vicky J; Tam, Yat Hung; Leung, Gabriel M; Cowling, Benjamin J
2017-01-01
Background School-aged children have the highest incidence of respiratory virus infections each year, and transmission of respiratory viruses such as influenza virus can be a major concern in school settings. School absenteeism data have been employed as a component of influenza surveillance systems in some locations. Data timeliness and system acceptance remain as key determinants affecting the usefulness of a prospective surveillance system. Objective The aim of this study was to assess the feasibility of implementing an electronic school absenteeism surveillance system using smart card–based technology for influenza-like illness (ILI) surveillance among a representative network of local primary and secondary schools in Hong Kong. Methods We designed and implemented a surveillance system according to the Protocol for a Standardized information infrastructure for Pandemic and Emerging infectious disease Response (PROSPER). We employed an existing smart card–based education and school administration platform for data capture, customized the user interface, and used additional back end systems built for other downstream surveillance steps. We invited local schools to participate and collected absenteeism data by the implemented system. We compared temporal trend of the absenteeism data with data from existing community sentinel and laboratory surveillance data. Results We designed and implemented an ILI surveillance system utilizing smart card–based attendance tracking approach for data capture. We implemented the surveillance system in a total of 107 schools (including 66 primary schools and 41 secondary schools), covering a total of 75,052 children. The system successfully captured information on absences for 2 consecutive academic years (2012-2013 and 2013-2014). The absenteeism data we collected from the system reflected ILI activity in the community, with an upsurge in disease activity detected up to 1 to 2 weeks preceding other existing surveillance systems. Conclusions We designed and implemented a novel smart card technology–based school absenteeism surveillance system. Our study demonstrated the feasibility of building a large-scale surveillance system riding on a routinely adopted data collection approach and the use of simple system enhancement to minimize workload implication and enhance system acceptability. Data from this system have potential value in supplementing existing sentinel influenza surveillance for situational awareness of influenza activity in the community. PMID:28986338
Time Delay Measurements of Key Generation Process on Smart Cards
2015-03-01
random number generator is available (Chatterjee & Gupta, 2009). The ECC algorithm will grow in usage as information becomes more and more secure. Figure...Worldwide Mobile Enterprise Security Software 2012–2016 Forecast and Analysis), mobile identity and access management is expected to grow by 27.6 percent...iPad, tablets) as well as 80000 BlackBerry phones. The mobility plan itself will be deployed in three phases over 2014, with the first phase
Army Sustainment. Volume 42, Issue 3. May-June 2010
2010-06-01
created smart cards, refined the content and layout of routine briefs, and developed a workable battle rhythm for the rotation. Many...of classroom MDMP exercise is their only MDMP experience. (Photo by MAJ Christopher LeCron) MAY–jUNE 2010 17 headquarters’ G/S–4 and LNO, ensuring...CTSSB proceed ing. After organizing the survey data, 10 Centra class- rooms were created in ALMS. These classrooms were designated as the sites for each
A Qualitative Security Analysis of a New Class of 3-D Integrated Crypto Co-processors
2012-01-01
and mobile phones, lottery ticket vending machines , and various electronic payment systems. The main reason for their use in such applications is that...military applications such as secure communication links. However, the proliferation of Automated Teller Machines (ATMs) in the ’80s introduced them to...commercial applications. Today many popular consumer devices have cryptographic processors in them, for example, smart- cards for pay-TV access machines
Secure Biometric E-Voting Scheme
NASA Astrophysics Data System (ADS)
Ahmed, Taha Kh.; Aborizka, Mohamed
The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.
Automated visual inspection system based on HAVNET architecture
NASA Astrophysics Data System (ADS)
Burkett, K.; Ozbayoglu, Murat A.; Dagli, Cihan H.
1994-10-01
In this study, the HAusdorff-Voronoi NETwork (HAVNET) developed at the UMR Smart Engineering Systems Lab is tested in the recognition of mounted circuit components commonly used in printed circuit board assembly systems. The automated visual inspection system used consists of a CCD camera, a neural network based image processing software and a data acquisition card connected to a PC. The experiments are run in the Smart Engineering Systems Lab in the Engineering Management Dept. of the University of Missouri-Rolla. The performance analysis shows that the vision system is capable of recognizing different components under uncontrolled lighting conditions without being effected by rotation or scale differences. The results obtained are promising and the system can be used in real manufacturing environments. Currently the system is being customized for a specific manufacturing application.
NASA Astrophysics Data System (ADS)
Chahrazed, Yahiaoui; Jean-Louis, Lanet; Mohamed, Mezghiche; Karim, Tamine
2018-01-01
Fault attack represents one of the serious threats against Java Card security. It consists of physical perturbation of chip components to introduce faults in the code execution. A fault may be induced using a laser beam to impact opcodes and operands of instructions. This could lead to a mutation of the application code in such a way that it becomes hostile. Any successful attack may reveal a secret information stored in the card or grant an undesired authorisation. We propose a methodology to recognise, during the development step, the sensitive patterns to the fault attack in the Java Card applications. It is based on the concepts from text categorisation and machine learning. In fact, in this method, we represented the patterns using opcodes n-grams as features, and we evaluated different machine learning classifiers. The results show that the classifiers performed poorly when classifying dangerous sensitive patterns, due to the imbalance of our data-set. The number of dangerous sensitive patterns is much lower than the number of not dangerous patterns. We used resampling techniques to balance the class distribution in our data-set. The experimental results indicated that the resampling techniques improved the accuracy of the classifiers. In addition, our proposed method reduces the execution time of sensitive patterns classification in comparison to the SmartCM tool. This tool is used in our study to evaluate the effect of faults on Java Card applications.
Performance Assessment Method for a Forged Fingerprint Detection Algorithm
NASA Astrophysics Data System (ADS)
Shin, Yong Nyuo; Jun, In-Kyung; Kim, Hyun; Shin, Woochang
The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. With the recognition that this threat factor may disrupt the large-scale civil service operations approaching implementation, such as electronic ID cards and e-Government systems, many agencies and vendors around the world continue to develop forged fingerprint detection technology, but no objective performance assessment method has, to date, been reported. Therefore, in this paper, we propose a methodology designed to evaluate the objective performance of the forged fingerprint detection technology that is currently attracting a great deal of attention.
New developments in flexible cholesteric liquid crystal displays
NASA Astrophysics Data System (ADS)
Schneider, Tod; Davis, Donald J.; Franklin, Sean; Venkataraman, Nithya; McDaniel, Diaz; Nicholson, Forrest; Montbach, Erica; Khan, Asad; Doane, J. William
2007-02-01
Flexible Cholesteric liquid crystal displays have been rapidly maturing into a strong contender in the flexible display market. Encapsulation of the Cholesteric liquid crystal permits the use of flexible plastic substrates and roll-to-roll production. Recent advances include ultra-thin displays, laser-cut segmented displays of variable geometry, and smart card applications. Exciting technologies such as simultaneous laser-edge sealing and singulation enable high volume production, excellent quality control and non-traditional display geometries and formats.
Ring aggregation pattern of metro passenger trips: A study using smart card data
NASA Astrophysics Data System (ADS)
Wang, Ziyang; Hu, Yuxin; Zhu, Peng; Qin, Yong; Jia, Limin
2018-02-01
With the widespread implementation of smart cards and with more travel details being recorded, travel patterns can be studied more precisely and deeply. Although considerable attention has been paid to travel patterns, the relationship between travel patterns and the functional structure of a city is yet to be well understood. In this research, we study this relationship by analysing metro passenger trip data (in Beijing and Shenzhen in China and London in the United Kingdom), and we present two unprecedented findings. First, through averaging, a linear relationship is found to exist between individual travel distance and the distance between the origin and the city centre. The underlying mechanism is a travel pattern we call "ring aggregation", i.e., the daily movement of city passengers is aggregated into a ring (with approximately equal distances to the city centre). Then, for commuting trips, the daily travel pattern can be regarded as switching between the outer residential ring and the inner work ring. Second, this linear relationship and the ring aggregation pattern seem to be exclusive characteristics of metro systems (and may also fit other moderate- and long-distance transportation modes) but do not apply to short-distance transportation modes, such as bicycles and taxis. This finding implies that the ring aggregation pattern is a product of the relationship between travel patterns and the city functional structure at a large scope.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-08-16
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
NASA Astrophysics Data System (ADS)
Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter
2000-05-01
We evaluated the feasibility of fingerprint-scanners in combination with smart cards for personal identification and transmission of encrypted TCP/IP-data-packages via satellite between the university-hospital of Innsbruck and the rural hospital of Reutte. The aim of our study was the proof of the userfriendliness of the SkymedTM technology for security purpose in teleradiology. We examined the time of the personal identification process, the time for the necessary training and the personal satisfaction. The images were sent from the local PACS in Reutte via a Data-Encryption-and-Transmission- Box via satellite from Reutte to Innsbruck. We used an asymmetric bandwidth of 512 kbit/s from Reutte to Innsbruck and 128 kbit/s in the opposite direction. Window NT 4.0- operating PCs were used for the electronical patient record, the medical inquiry of the referring physician and the final report of the radiologist. The images were reported on an UNIX-PACS viewing station. After identification through fingerprint-scanners in combination with the smart card the radiologist was able to open the electronic patient record (EPR) from Reutte and sign with his digital signature his confirmed final report before it was send back to Reutte. The used security technology enables encrypted communication over a WAN, which fulfill data-protection.
Kim, Young Mi; Bazant, Eva; Storey, J Douglas
In health care consultations, patients often receive insufficient information from providers and communicate little with providers about their needs or concerns. This study evaluated a combined community education and mass media intervention to improve clients' participation in family planning consultations. A household survey was conducted with 1,200 women in three sub-districts (two intervention and one control) of West Java province in Indonesia. A comparison of post-campaign findings among family planning clients suggests that the intervention as a whole had a positive effect on client participation, specifically the number of clients who prepared questions to ask the service provider prior to a family planning visit in the past year. Multivariate analyses showed that the "Smart Card" intervention and elements of the "Sahabat" (Friend) mass media campaign were positively associated with clients' preparation of questions and question asking behavior during family planning consultations, indicating that a combined community education and mass-media approach can improve client communication with providers and improve the quality of family planning counseling.
SMART Fires: A COTS Approach to Tactical Fire Support Using a Smartphone
2011-09-01
Battalion Landing Team C2 Command and Control C2PC Command and Control Personal Computer CAC Common Access Card COC Combat Operation Center COIN...functionality to way-points. It is currently available on the iTunes App Store for $5.99 (Tactical NAV, 2010). 11 MILS are a unit...download on both the iTunes App Store and the Android Marketplace. Apps for the Army (A4A) also created a repository for the applications submitted, along
2002-03-22
may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure
ERIC Educational Resources Information Center
Bernstein, Allison; Baule, Steve; Farmer, Lesley S. J.; Anderson, Cyndee; Barringer, Crystal; Buchanan, Peggy; Fullner, Sheryl Kindle; Knop, Kathi; Larson, Chris
2002-01-01
Includes eight articles that address issues related to budgeting and finances in secondary school libraries. Topics include limited budgets; budget proposals; administering grants; writing grants; using Microsoft's Excel software for budgeting; using credit cards for library purchases; offering prizes for donating books; and offering coffee and…
Fong, Simon; Zhuang, Yan
2012-01-01
User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.
[Aspects of data protection in telemedicine].
Vetter, R
2001-10-01
Telemedical applications like the electronic patient file, the electronic physician's letter and the electronic consultation ("Telekonsil"), the electronic prescription, the electronic patient's card (the "patient smart card") facilitate and improve the processing of sensitive medical data as well as the possibilities for using medical resources in an unusual degree and can thereby substantially contribute to the well-being of the patient. However, improving the quality of medical supply must not lead to a degradation of the patients' rights, in particular their right of self-determination. The introduction and the use of telemedical applications do not change the legal basic conditions for medical data processing. Therefore, a patient-friendly telemedicine must include data protection as well. Data protective telemedicine requires medical secrecy ensuring the patients' rights of information and transparency, correction of false and the up-to-date deletion of information that is no longer necessary, as well as secure data processing. All electronic processing of patients' data must meet the requirements of data security, i.e. the confidentiality, the integrity, the availability of the data at any time and the verifiability of the data processing have to be guaranteed. For this, electronic signatures and encodings have to be used, medical information systems have to be protected effectively against any risks resulting from open networks, particularly the Internet, and data processing has to be monitored. Electronic patient files may be open only to the treating physician and the medical assistants up to the necessary extent, ensuring the possibility of an emergency access. Any access beyond that does require the special consent of the patient. The medical secrecy has to be ensured. The electronic prescription with a documentation of the patient's medication requires the consent of the patient and must protect the rights of the physicians. In particular it has to ensure that the respective physician's prescribing behaviour cannot be stored or become known from a third party. Furthermore it has to protect the pharmacists' right to hide their turnover from other pharmacies. So-called patient smart cards require the consent of the patient. The right of the patient to keep his information secret, must be ensured with access options to the information stored on the smart card. Electronic physician's letters and socalled Telekonsile, i.e. the consultation with professional colleagues who were not involved in the patient's treatment from the beginning, require basically the agreement of the patient--if there cannot be dealt with anonymized data already from the beginning. In emergencies, after adequate consideration and weighing of values and interests, the consent of the patient can be suspected. The adherence to these boundary conditions ensures security and trustworthiness of telemedicine regarding the security of data processing as well as the rights of self-determination of all who are concerned. Data protection is also a contribution for the acceptance of these revolutionary advancements in the medical world.
Noncontact power/interrogation system for smart structures
NASA Astrophysics Data System (ADS)
Spillman, William B., Jr.; Durkee, S.
1994-05-01
The field of smart structures has been largely driven by the development of new high performance designed materials. Use of these materials has been generally limited due to the fact that they have not been in use long enough for statistical data bases to be developed on their failure modes. Real time health monitoring is therefore required for the benefits of structures using these materials to be realized. In this paper a non-contact method of powering and interrogating embedded electronic and opto-electronic systems is described. The technique utilizes inductive coupling between external and embedded coils etched on thin electronic circuit cards. The technique can be utilized to interrogate embedded sensors and to provide > 250 mW for embedded electronics. The system has been successfully demonstrated with a number of composite and plastic materials through material thicknesses up to 1 cm. An analytical description of the system is provided along with experimental results.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-01-01
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890
Maitra, Tanmoy; Giri, Debasis
2014-12-01
The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost.
A Combat Gaming Method for Tank Platoon Leader Training: TRAX 1
1985-09-01
COVERED A COMBAT GAMING METHOD FOR TANK PLATOON LEADER October 1983-October 1984 TRAINING: TRAX I T PERFORMING ORG. REPORT NUMBER 7. AUTHOR(o) S. CONTRACT ...AirLand Battle. Armor, July-August, 5-6. Furlong, M.D. (1984). Fighting smart at the National Training Center. Armor, May-June, 26-32. Henricksen, K...13. Qross H+9 f57372 *1TP Task p 6-2 &coke drifts oer rute MIK . Cnical 1. 1emain in M)pp-4 Inst/Ctlr denies bypass. Cards Contaminated 2. qest bypass
NASA Astrophysics Data System (ADS)
Lowe, Chris; Larbey, Cynthia
2008-02-01
At least 6% of world trade, amounting to some 200bn per year, involves counterfeit goods. But this figure would be even higher were it not for the humble hologram. Invented 50 years ago, holograms provide authentication tags to deter copying, and can be found everywhere from credit cards, passports and banknotes to consumer goods, cosmetics and pharmaceuticals. Holography also underpins supermarket scanners and CD players; it can even be used to store optical data in 3D. Now, however, holograms are making their mark as powerful yet cheap diagnostic tools, which could in particular have many applications in biomedicine.
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
Information technology in the foxhole.
Eyestone, S M
1995-08-01
The importance of digital data capture at the point of health care service within the military environment is highlighted. Current paper-based data capture does not allow for efficient data reuse throughout the medical support information domain. A simple, high-level process and data flow model is used to demonstrate the importance of data capture at point of service. The Department of Defense is developing a personal digital assistant, called MEDTAG, that accomplishes point of service data capture in the field using a prototype smart card as a data store in austere environments.
Médicarte software developed for the Quebec microprocessor health card project.
Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P
1995-01-01
The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the software was developed for each of the four groups of health care providers involved. In addition we designed an application to interface with existing pharmaceutical software. For practical reasons and to make it possible to differentiate between the different access profiles, the information stored on the card is divided in several blocks: Identification, Emergency, History (personal and family), Screening Tests, Vaccinations, Drug Profile, General follow-up, and some Specific follow-ups (Pregnancy, Ophthalmology, Kidney failure, Cardiology, Pediatrics, Diabetes, Pneumology, Specific parameters). Over 14,000 diagnoses and symptoms are classified with four levels of precision, the codification being based on the ICPC (International Classification for Primary Care). The software contains different applications to assist the clinician in decision making. A "Drug Advisor" helps the prescriber by detecting possible interactions between drugs, giving indications (doses) and contraindications, cautions, potential side-effects and therapeutic alternatives. There is also a prevention module providing recommendations for vaccination and periodic examinations based on the patient's age and sex. The pharmaceutical, vaccination, and screening tests data banks are updated every six months. These sections of the software are accessible to access card holders at any times, even without a patient card, and constitute in themselves an interesting clinical tool. We developed a software server (SCAM) allowing the different applications to access the data in a memory card regardless of the type of memory card used. Using a single high level command language, this server provides a standardized utilization of memory cards from various manufacturers. It ensures the compatibility of the applications using the card as a storage medium. (abstract truncated)
Fong, Simon; Zhuang, Yan
2012-01-01
Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.
Spatiotemporal Patterns of Urban Human Mobility
NASA Astrophysics Data System (ADS)
Hasan, Samiul; Schneider, Christian M.; Ukkusuri, Satish V.; González, Marta C.
2013-04-01
The modeling of human mobility is adopting new directions due to the increasing availability of big data sources from human activity. These sources enclose digital information about daily visited locations of a large number of individuals. Examples of these data include: mobile phone calls, credit card transactions, bank notes dispersal, check-ins in internet applications, among several others. In this study, we consider the data obtained from smart subway fare card transactions to characterize and model urban mobility patterns. We present a simple mobility model for predicting peoples' visited locations using the popularity of places in the city as an interaction parameter between different individuals. This ingredient is sufficient to reproduce several characteristics of the observed travel behavior such as: the number of trips between different locations in the city, the exploration of new places and the frequency of individual visits of a particular location. Moreover, we indicate the limitations of the proposed model and discuss open questions in the current state of the art statistical models of human mobility.
"Smart pebble" designs for sediment transport monitoring
NASA Astrophysics Data System (ADS)
Valyrakis, Manousos; Alexakis, Athanasios; Pavlovskis, Edgars
2015-04-01
Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions.
"Smart pebble" design for environmental monitoring applications
NASA Astrophysics Data System (ADS)
Valyrakis, Manousos; Pavlovskis, Edgars
2014-05-01
Sediment transport, due to primarily the action of water, wind and ice, is one of the most significant geomorphic processes responsible for shaping Earth's surface. It involves entrainment of sediment grains in rivers and estuaries due to the violently fluctuating hydrodynamic forces near the bed. Here an instrumented particle, namely a "smart pebble", is developed to investigate the exact flow conditions under which individual grains may be entrained from the surface of a gravel bed. This could lead in developing a better understanding of the processes involved, while focusing on the response of the particle during a variety of flow entrainment events. The "smart pebble" is a particle instrumented with MEMS sensors appropriate for capturing the hydrodynamic forces a coarse particle might experience during its entrainment from the river bed. A 3-axial gyroscope and accelerometer registers data to a memory card via a microcontroller, embedded in a 3D-printed waterproof hollow spherical particle. The instrumented board is appropriately fit and centred into the shell of the pebble, so as to achieve a nearly uniform distribution of the mass which could otherwise bias its motion. The "smart pebble" is powered by an independent power to ensure autonomy and sufficiently long periods of operation appropriate for deployment in the field. Post-processing and analysis of the acquired data is currently performed offline, using scientific programming software. The performance of the instrumented particle is validated, conducting a series of calibration experiments under well-controlled laboratory conditions. "Smart pebble" allows for a wider range of environmental sensors (e.g. for environmental/pollutant monitoring) to be incorporated so as to extend the range of its application, enabling accurate environmental monitoring which is required to ensure infrastructure resilience and preservation of ecological health.
Improving computer security by health smart card.
Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert
2003-01-01
The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual national implementation of the CPS project and the introduction of new functions using electronic signatures and encryption.
Big data, smart cities and city planning
2013-01-01
I define big data with respect to its size but pay particular attention to the fact that the data I am referring to is urban data, that is, data for cities that are invariably tagged to space and time. I argue that this sort of data are largely being streamed from sensors, and this represents a sea change in the kinds of data that we have about what happens where and when in cities. I describe how the growth of big data is shifting the emphasis from longer term strategic planning to short-term thinking about how cities function and can be managed, although with the possibility that over much longer periods of time, this kind of big data will become a source for information about every time horizon. By way of conclusion, I illustrate the need for new theory and analysis with respect to 6 months of smart travel card data of individual trips on Greater London’s public transport systems. PMID:29472982
Big data, smart cities and city planning.
Batty, Michael
2013-11-01
I define big data with respect to its size but pay particular attention to the fact that the data I am referring to is urban data, that is, data for cities that are invariably tagged to space and time. I argue that this sort of data are largely being streamed from sensors, and this represents a sea change in the kinds of data that we have about what happens where and when in cities. I describe how the growth of big data is shifting the emphasis from longer term strategic planning to short-term thinking about how cities function and can be managed, although with the possibility that over much longer periods of time, this kind of big data will become a source for information about every time horizon. By way of conclusion, I illustrate the need for new theory and analysis with respect to 6 months of smart travel card data of individual trips on Greater London's public transport systems.
Smart pillow for heart-rate monitoring using a fiber optic sensor
NASA Astrophysics Data System (ADS)
Chen, Zhihao; Teo, Ju Teng; Ng, Soon Huat; Yim, Huiqing
2011-03-01
In this paper, we propose and demonstrate a new method to monitor heart rate using fiber optic microbending based sensor for in-bed non-intrusive monitoring. The sensing system consists of transmitter, receiver, sensor mat, National Instrument (NI) data acquisition (DAQ) card and a computer for signal processing. The sensor mat is embedded inside a commercial pillow. The heart rate measurement system shows an accuracy of +/-2 beats, which has been successfully demonstrated in a field trial. The key technological advantage of our system is its ability to measure heart rate with no preparation and minimal compliance by the patient.
NASA Astrophysics Data System (ADS)
Miret, Josep M.; Sebé, Francesc
Low-cost devices are the key component of several applications: RFID tags permit an automated supply chain management while smart cards are a secure means of storing cryptographic keys required for remote and secure authentication in e-commerce and e-government applications. These devices must be cheap in order to permit their cost-effective massive manufacturing and deployment. Unfortunately, their low cost limits their computational power. Other devices such as nodes of sensor networks suffer from an additional constraint, namely, their limited battery life. Secure applications designed for these devices cannot make use of classical cryptographic primitives designed for full-fledged computers.
Design and Implementation of KSP on the Next Generation Cryptography API
NASA Astrophysics Data System (ADS)
Lina, Zhang
With good seamless connectivity and higher safety, KSP (Key Storage Providers) is the inexorable trend of security requirements and development to take the place of CSP (Cryptographic Service Provider). But the study on KSP has just started in our country, and almost no reports of its implementation can be found. Based on the analysis of function modules and the architecture of Cryptography API (Next Generation (CNG)), this paper discusses the design and implementation of KSP (key storage providers) based on smart card in detail, and an example is also presented to illustrate how to use KSP in Windows Vista.
Comparative study of minutiae selection algorithms for ISO fingerprint templates
NASA Astrophysics Data System (ADS)
Vibert, B.; Charrier, C.; Le Bars, J.-M.; Rosenberger, C.
2015-03-01
We address the selection of fingerprint minutiae given a fingerprint ISO template. Minutiae selection plays a very important role when a secure element (i.e. a smart-card) is used. Because of the limited capability of computation and memory, the number of minutiae of a stored reference in the secure element is limited. We propose in this paper a comparative study of 6 minutiae selection methods including 2 methods from the literature and 1 like reference (No Selection). Experimental results on 3 fingerprint databases from the Fingerprint Verification Competition show their relative efficiency in terms of performance and computation time.
Hacker tracking Security system for HMI
NASA Astrophysics Data System (ADS)
Chauhan, Rajeev Kumar
2011-12-01
Conventional Supervisory control and data Acquisition (SCADA) systems use PC, notebook, thin client, and PDA as a Client. Nowadays the Process Industries are following multi shift system that's why multi- client of different category have to work at a single human Machine Interface (HMI). They may hack the HMI Display and change setting of the other client. This paper introduces a Hacker tracking security (HTS) System for HMI. This is developed by using the conventional and Biometric authentication. HTS system is developed by using Numeric passwords, Smart card, biometric, blood flow and Finger temperature. This work is also able to identify the hackers.
Zenitani, Satoko; Nishiuchi, Hiromu; Kiuchi, Takahiro
2010-04-01
The Smart-card-based Automatic Meal Record system for company cafeterias (AutoMealRecord system) was recently developed and used to monitor employee eating habits. The system could be a unique nutrition assessment tool for automatically monitoring the meal purchases of all employees, although it only focuses on company cafeterias and has never been validated. Before starting an interventional study, we tested the reliability of the data collected by the system using the data mining approach. The AutoMealRecord data were examined to determine if it could predict current obesity. All data used in this study (n = 899) were collected by a major electric company based in Tokyo, which has been operating the AutoMealRecord system for several years. We analyzed dietary patterns by principal component analysis using data from the system and extracted 5 major dietary patterns: healthy, traditional Japanese, Chinese, Japanese noodles, and pasta. The ability to predict current body mass index (BMI) with dietary preference was assessed with multiple linear regression analyses, and in the current study, BMI was positively correlated with male gender, preference for "Japanese noodles," mean energy intake, protein content, and frequency of body measurement at a body measurement booth in the cafeteria. There was a negative correlation with age, dietary fiber, and lunchtime cafeteria use (R(2) = 0.22). This regression model predicted "would-be obese" participants (BMI >or= 23) with 68.8% accuracy by leave-one-out cross validation. This shows that there was sufficient predictability of BMI based on data from the AutoMealRecord System. We conclude that the AutoMealRecord system is valuable for further consideration as a health care intervention tool. Copyright 2010 Elsevier Inc. All rights reserved.
Onboard spectral imager data processor
NASA Astrophysics Data System (ADS)
Otten, Leonard J.; Meigs, Andrew D.; Franklin, Abraham J.; Sears, Robert D.; Robison, Mark W.; Rafert, J. Bruce; Fronterhouse, Donald C.; Grotbeck, Ronald L.
1999-10-01
Previous papers have described the concept behind the MightySat II.1 program, the satellite's Fourier Transform imaging spectrometer's optical design, the design for the spectral imaging payload, and its initial qualification testing. This paper discusses the on board data processing designed to reduce the amount of downloaded data by an order of magnitude and provide a demonstration of a smart spaceborne spectral imaging sensor. Two custom components, a spectral imager interface 6U VME card that moves data at over 30 MByte/sec, and four TI C-40 processors mounted to a second 6U VME and daughter card, are used to adapt the sensor to the spacecraft and provide the necessary high speed processing. A system architecture that offers both on board real time image processing and high-speed post data collection analysis of the spectral data has been developed. In addition to the on board processing of the raw data into a usable spectral data volume, one feature extraction technique has been incorporated. This algorithm operates on the basic interferometric data. The algorithm is integrated within the data compression process to search for uploadable feature descriptions.
To err is human nature. Can transfusion errors due to human factors ever be eliminated?
Lau, F Y; Cheng, G
2001-11-01
Fatal hemolytic transfusion reaction due to ABO incompatibility occurs mainly as a result of clerical errors. Blood sample drawn from the wrong patient and labeled as another patient's specimen will not be detected by the blood bank unless there is a previous ABO grouping result. In Hong Kong, we had designed a transfusion wristband system--portable barcode scanner system to detect such clerical errors. The system was well accepted by the house staff and had prevented two BO mismatched transfusion. Other current system of patient's identification may have similar results, but the wristband system has the advantages of being simple, inexpensive and easy to implement. The Hong Kong Government is planning to replace the personal identity card for all citizens with an electronic smart card by 2003. If the new card contains the person's detailed red cell phenotypes in digital code, then the phenotypes of all blood donors and admitted patients will be readily available. It is feasible to issue phenotype-matched blood to patients without any need of pre-transfusion testing, therefore eliminating mismatched transfusions for most patients. Our pilot study of 474 patients showed that the system was safe and up to 98% of admitted patients could be transfused without delays. Patients with rare phenotypes, visitors or illegal immigrants may still need pre-transfusion antibody screen, but if most patients can be issued blood units without testings, the potential savings in health care amount to US$14 million/year.
Thin Film Li Ion Microbatteries for NASA Applications
NASA Technical Reports Server (NTRS)
West, W. C.; Ratnakumar, B. V.; Brandon, E.; Blosiu, J. O.; Surampudi, S.
1999-01-01
Rechargeable thin film microbatteries have recently become the topic of widespread research for use in low power applications such as battery-backed CMOS memory, miniaturized implantable medical devices and smart cards. In particular, the Center for Integrated Space Microsystems (CISM) at NASA's Jet Propulsion Laboratory has interest in applying this technology for secondary power systems in miniaturized satellites, microsensors, microactuators and other remote MEMS applications. The general requirements of the microbatteries for these applications are high specific energy, wide range of temperature stability. low self-discharge rate, and flexibility of cell design. The thin film Li ion materials system using LiCoO2(LiPO(x)N(1-x))SnO is expected to fulfill these requirements.
McIntyre, Lynn; Glanville, N Theresa; Hilchie-Pye, Andrea
2011-03-01
Canadian agricultural policy supports higher milk prices. Consequently, poor families lack sufficient funds to purchase adequate quantities of milk. Low-income lone mothers in the Canadian province of Nova Scotia suggested their preferred strategies for improved access to milk. We then built inter-sectoral support for a policy intervention to address their recommendations. Our research-to-action process led to a policy dialogue focusing on an electronic smart card that would permit the delivery of lower-priced milk to poor households. While all agreed that milk insecurity was an important issue, the project ultimately failed because of the entrenched positions of influential stakeholder groups.
Geometry creation for MCNP by Sabrina and XSM
DOE Office of Scientific and Technical Information (OSTI.GOV)
Van Riper, K.A.
The Monte Carlo N-Particle transport code MCNP is based on a surface description of 3-dimensional geometry. Cells are defined in terms of boolean operations on signed quadratic surfaces. MCNP geometry is entered as a card image file containing coefficients of the surface equations and a list of surfaces and operators describing cells. Several programs are available to assist in creation of the geometry specification, among them Sabrina and the new ``Smart Editor`` code XSM. We briefly describe geometry creation in Sabrina and then discuss XSM in detail. XSM is under development; our discussion is based on the state of XSMmore » as of January 1, 1994.« less
Novo, Ahmed; Masić, Izet; Toromanović, Selim; Karić, Mediha; Zunić, Lejla
2004-01-01
In Medical Informatics medical documentation and evidention are most probably the key areas. Also, in primary health care it is very important and part of daily activity of medical staff. Bosnia and Herzegovina is trying to be close to developed countries and to modernize and computerize current systems of documentation and to cross over from manual and semi manual methods to computerized medical data analysis. The most of European countries have developed standards and classification systems in primary health care for collecting, examination, analysis and interpretation of medical data assessed. One of possibilities as well as dilemma, which data carrier should be used for storage and manipulation of patient data in primary health care, is use of electronic medical record. Most of the South East European countries use chip or smart card and some of countries in neighborhood (Italy) choose laser card as patient data carrier. Both technologies have the advantages and disadvantages what was comprehensively colaborated by the authors in this paper, with intention to help experts who make decisions in this segment to create and to correctly influence on improvement of quality, correctness and accuracy of medical documentation in primary health care.
Zhong, Chen; Batty, Michael; Manley, Ed; Wang, Jiaqiu; Wang, Zijia; Chen, Feng; Schmitt, Gerhard
2016-01-01
To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more amenable. PMID:26872333
Zhong, Chen; Batty, Michael; Manley, Ed; Wang, Jiaqiu; Wang, Zijia; Chen, Feng; Schmitt, Gerhard
2016-01-01
To discover regularities in human mobility is of fundamental importance to our understanding of urban dynamics, and essential to city and transport planning, urban management and policymaking. Previous research has revealed universal regularities at mainly aggregated spatio-temporal scales but when we zoom into finer scales, considerable heterogeneity and diversity is observed instead. The fundamental question we address in this paper is at what scales are the regularities we detect stable, explicable, and sustainable. This paper thus proposes a basic measure of variability to assess the stability of such regularities focusing mainly on changes over a range of temporal scales. We demonstrate this by comparing regularities in the urban mobility patterns in three world cities, namely London, Singapore and Beijing using one-week of smart-card data. The results show that variations in regularity scale as non-linear functions of the temporal resolution, which we measure over a scale from 1 minute to 24 hours thus reflecting the diurnal cycle of human mobility. A particularly dramatic increase in variability occurs up to the temporal scale of about 15 minutes in all three cities and this implies that limits exist when we look forward or backward with respect to making short-term predictions. The degree of regularity varies in fact from city to city with Beijing and Singapore showing higher regularity in comparison to London across all temporal scales. A detailed discussion is provided, which relates the analysis to various characteristics of the three cities. In summary, this work contributes to a deeper understanding of regularities in patterns of transit use from variations in volumes of travellers entering subway stations, it establishes a generic analytical framework for comparative studies using urban mobility data, and it provides key points for the management of variability by policy-makers intent on for making the travel experience more amenable.
MediLink: a wearable telemedicine system for emergency and mobile applications.
Koval, T; Dudziak, M
1999-01-01
The practical needs of the medical professional faced with critical care or emergency situations differ from those working in many environments where telemedicine and mobile computing have been introduced and tested. One constructive criticism of the telemedicine initiative has been to question what positive benefits are gained from videoconferencing, paperless transactions, and online access to patient record. With a goal of producing a positive answer to such questions an architecture for multipurpose mobile telemedicine applications has been developed. The core technology is based upon a wearable personal computer with a smart-card interface coupled with speech, pen, video input and wireless intranet connectivity. The TransPAC system with the MedLink software system is designed to provide an integrated solution for a broad range of health care functions where mobile and hands-free or limited-access systems are preferred or necessary and where the capabilities of other mobile devices are insufficient or inappropriate. Structured and noise-resistant speech-to-text interfacing plus the use of a web browser-like display, accessible through either a flatpanel, standard, or headset monitor, gives the beltpack TransPAC computer the functions of a complete desktop including PCMCIA card interfaces for internet connectivity and a secure smartcard with 16-bit microprocessor and upwards of 64K memory. The card acts to provide user access control for security, user custom configuration of applications and display and vocabulary, and memory to diminish the need for PC-server communications while in an active session. TransPAC is being implemented for EMT and ER staff usage.
A Control System and Streaming DAQ Platform with Image-Based Trigger for X-ray Imaging
NASA Astrophysics Data System (ADS)
Stevanovic, Uros; Caselle, Michele; Cecilia, Angelica; Chilingaryan, Suren; Farago, Tomas; Gasilov, Sergey; Herth, Armin; Kopmann, Andreas; Vogelgesang, Matthias; Balzer, Matthias; Baumbach, Tilo; Weber, Marc
2015-06-01
High-speed X-ray imaging applications play a crucial role for non-destructive investigations of the dynamics in material science and biology. On-line data analysis is necessary for quality assurance and data-driven feedback, leading to a more efficient use of a beam time and increased data quality. In this article we present a smart camera platform with embedded Field Programmable Gate Array (FPGA) processing that is able to stream and process data continuously in real-time. The setup consists of a Complementary Metal-Oxide-Semiconductor (CMOS) sensor, an FPGA readout card, and a readout computer. It is seamlessly integrated in a new custom experiment control system called Concert that provides a more efficient way of operating a beamline by integrating device control, experiment process control, and data analysis. The potential of the embedded processing is demonstrated by implementing an image-based trigger. It records the temporal evolution of physical events with increased speed while maintaining the full field of view. The complete data acquisition system, with Concert and the smart camera platform was successfully integrated and used for fast X-ray imaging experiments at KIT's synchrotron radiation facility ANKA.
Real-time optimizations for integrated smart network camera
NASA Astrophysics Data System (ADS)
Desurmont, Xavier; Lienard, Bruno; Meessen, Jerome; Delaigle, Jean-Francois
2005-02-01
We present an integrated real-time smart network camera. This system is composed of an image sensor, an embedded PC based electronic card for image processing and some network capabilities. The application detects events of interest in visual scenes, highlights alarms and computes statistics. The system also produces meta-data information that could be shared between other cameras in a network. We describe the requirements of such a system and then show how the design of the system is optimized to process and compress video in real-time. Indeed, typical video-surveillance algorithms as background differencing, tracking and event detection should be highly optimized and simplified to be used in this hardware. To have a good adequation between hardware and software in this light embedded system, the software management is written on top of the java based middle-ware specification established by the OSGi alliance. We can integrate easily software and hardware in complex environments thanks to the Java Real-Time specification for the virtual machine and some network and service oriented java specifications (like RMI and Jini). Finally, we will report some outcomes and typical case studies of such a camera like counter-flow detection.
Dynamical hologram generation for high speed optical trapping of smart droplet microtools
Lanigan, P. M. P.; Munro, I.; Grace, E. J.; Casey, D. R.; Phillips, J.; Klug, D. R.; Ces, O.; Neil, M. A. A.
2012-01-01
This paper demonstrates spatially selective sampling of the plasma membrane by the implementation of time-multiplexed holographic optical tweezers for Smart Droplet Microtools (SDMs). High speed (>1000fps) dynamical hologram generation was computed on the graphics processing unit of a standard display card and controlled by a user friendly LabView interface. Time multiplexed binary holograms were displayed in real time and mirrored to a ferroelectric Spatial Light Modulator. SDMs were manufactured with both liquid cores (as previously described) and solid cores, which confer significant advantages in terms of stability, polydispersity and ease of use. These were coated with a number of detergents, the most successful based upon lipids doped with transfection reagents. In order to validate these, trapped SDMs were maneuvered up to the plasma membrane of giant vesicles containing Nile Red and human biliary epithelial (BE) colon cancer cells with green fluorescent labeled protein (GFP)-labeled CAAX (a motif belonging to the Ras protein). Bright field and fluorescence images showed that successful trapping and manipulation of multiple SDMs in x, y, z was achieved with success rates of 30-50% and that subsequent membrane-SDM interactions led to the uptake of Nile Red or GFP-CAAX into the SDM. PMID:22808432
Human Interactive Triboelectric Nanogenerator as a Self-Powered Smart Seat.
Chandrasekhar, Arunkumar; Alluri, Nagamalleswara Rao; Saravanakumar, Balasubramaniam; Selvarajan, Sophia; Kim, Sang-Jae
2016-04-20
A lightweight, flexible, cost-effective, and robust, single-electrode-based Smart Seat-Triboelectric Nanogenerator (SS-TENG) is introduced as a promising eco-friendly approach for harvesting energy from the living environment, for use in integrated self-powered systems. An effective method for harvesting biomechanical energy from human motion such as walking, running, and sitting, utilizing widely adaptable everyday contact materials (newspaper, denim, polyethylene covers, and bus cards) is demonstrated. The working mechanism of the SS-TENG is based on the generation and transfer of triboelectric charge carriers between the active layer and user-friendly contact materials. The performance of SS-TENG (52 V and 5.2 μA for a multiunit SS-TENG) is systematically studied and demonstrated in a range of applications including a self-powered passenger seat number indicator and a STOP-indicator using LEDs, using a simple logical circuit. Harvested energy is used as a direct power source to drive 60 blue and green commercially available LEDs and a monochrome LCD. This feasibility study confirms that triboelectric nanogenerators are a suitable technology for energy harvesting from human motion during transportation, which could be used to operate a variety of wireless devices, GPS systems, electronic devices, and other sensors during travel.
Experimental evaluation of fingerprint verification system based on double random phase encoding
NASA Astrophysics Data System (ADS)
Suzuki, Hiroyuki; Yamaguchi, Masahiro; Yachida, Masuyoshi; Ohyama, Nagaaki; Tashima, Hideaki; Obi, Takashi
2006-03-01
We proposed a smart card holder authentication system that combines fingerprint verification with PIN verification by applying a double random phase encoding scheme. In this system, the probability of accurate verification of an authorized individual reduces when the fingerprint is shifted significantly. In this paper, a review of the proposed system is presented and preprocessing for improving the false rejection rate is proposed. In the proposed method, the position difference between two fingerprint images is estimated by using an optimized template for core detection. When the estimated difference exceeds the permissible level, the user inputs the fingerprint again. The effectiveness of the proposed method is confirmed by a computational experiment; its results show that the false rejection rate is improved.
An understanding of human dynamics in urban subway traffic from the Maximum Entropy Principle
NASA Astrophysics Data System (ADS)
Yong, Nuo; Ni, Shunjiang; Shen, Shifei; Ji, Xuewei
2016-08-01
We studied the distribution of entry time interval in Beijing subway traffic by analyzing the smart card transaction data, and then deduced the probability distribution function of entry time interval based on the Maximum Entropy Principle. Both theoretical derivation and data statistics indicated that the entry time interval obeys power-law distribution with an exponential cutoff. In addition, we pointed out the constraint conditions for the distribution form and discussed how the constraints affect the distribution function. It is speculated that for bursts and heavy tails in human dynamics, when the fitted power exponent is less than 1.0, it cannot be a pure power-law distribution, but with an exponential cutoff, which may be ignored in the previous studies.
Silicon on insulator achieved using electrochemical etching
McCarthy, A.M.
1997-10-07
Bulk crystalline silicon wafers are transferred after the completion of circuit fabrication to form thin films of crystalline circuitry on almost any support, such as metal, semiconductor, plastic, polymer, glass, wood, and paper. In particular, this technique is suitable to form silicon-on-insulator (SOI) wafers, whereby the devices and circuits formed exhibit superior performance after transfer due to the removal of the silicon substrate. The added cost of the transfer process to conventional silicon fabrication is insignificant. No epitaxial, lift-off, release or buried oxide layers are needed to perform the transfer of single or multiple wafers onto support members. The transfer process may be performed at temperatures of 50 C or less, permits transparency around the circuits and does not require post-transfer patterning. Consequently, the technique opens up new avenues for the use of integrated circuit devices in high-brightness, high-resolution video-speed color displays, reduced-thickness increased-flexibility intelligent cards, flexible electronics on ultrathin support members, adhesive electronics, touch screen electronics, items requiring low weight materials, smart cards, intelligent keys for encryption systems, toys, large area circuits, flexible supports, and other applications. The added process flexibility also permits a cheap technique for increasing circuit speed of market driven technologies such as microprocessors at little added expense. 57 figs.
Silicon on insulator achieved using electrochemical etching
McCarthy, Anthony M.
1997-01-01
Bulk crystalline silicon wafers are transferred after the completion of circuit fabrication to form thin films of crystalline circuitry on almost any support, such as metal, semiconductor, plastic, polymer, glass, wood, and paper. In particular, this technique is suitable to form silicon-on-insulator (SOI) wafers, whereby the devices and circuits formed exhibit superior performance after transfer due to the removal of the silicon substrate. The added cost of the transfer process to conventional silicon fabrication is insignificant. No epitaxial, lift-off, release or buried oxide layers are needed to perform the transfer of single or multiple wafers onto support members. The transfer process may be performed at temperatures of 50.degree. C. or less, permits transparency around the circuits and does not require post-transfer patterning. Consequently, the technique opens up new avenues for the use of integrated circuit devices in high-brightness, high-resolution video-speed color displays, reduced-thickness increased-flexibility intelligent cards, flexible electronics on ultrathin support members, adhesive electronics, touch screen electronics, items requiring low weight materials, smart cards, intelligent keys for encryption systems, toys, large area circuits, flexible supports, and other applications. The added process flexibility also permits a cheap technique for increasing circuit speed of market driven technologies such as microprocessors at little added expense.
Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting
2014-09-01
Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.
Second Wave of Biometric ID-documents in Europe: The Residence Permit for non-EU/EEA Nationals
NASA Astrophysics Data System (ADS)
Houdeau, Detlef
The first implementation of biometric documents, called biometric passports, based on a regulation is running, the second implementation since end of CY 2008 is coming to Europe. The focus is on persons staying for business, study or leisure for more than 3 months in Europe and coming from a state outside Europe and not being a member of the Visa-Waiver-Program of the EU. This second wave increases the demand for the security industry for certified security microcontroller chips, secure smart cards, readers and supporting infrastructure on top of the biometric Passport business. It underlines the continuing advance of contactless identification technology in the public sector. The article gives an overview on the application, the technology, the EU regulation, the EU roadmap and the implementations.
Cryptanalysis of SFLASH with Slightly Modified Parameters
NASA Astrophysics Data System (ADS)
Dubois, Vivien; Fouque, Pierre-Alain; Stern, Jacques
SFLASH is a signature scheme which belongs to a family of multivariate schemes proposed by Patarin et al. in 1998 [9]. The SFLASH scheme itself has been designed in 2001 [8] and has been selected in 2003 by the NESSIE European Consortium [6] as the best known solution for implementation on low cost smart cards. In this paper, we show that slight modifications of the parameters of SFLASH within the general family initially proposed renders the scheme insecure. The attack uses simple linear algebra, and allows to forge a signature for an arbitrary message in a question of minutes for practical parameters, using only the public key. Although SFLASH itself is not amenable to our attack, it is worrying to observe that no rationale was ever offered for this "lucky" choice of parameters.
Using Smart Pumps to Understand and Evaluate Clinician Practice Patterns to Ensure Patient Safety
Mansfield, Jennifer; Jarrett, Steven
2013-01-01
Background: Safety software installed on intravenous (IV) infusion pumps has been shown to positively impact the quality of patient care through avoidance of medication errors. The data derived from the use of smart pumps are often overlooked, although these data provide helpful insight into the delivery of quality patient care. Objective: The objectives of this report are to describe the value of implementing IV infusion safety software and analyzing the data and reports generated by this system. Case study: Based on experience at the Carolinas HealthCare System (CHS), executive score cards provide an aggregate view of compliance rate, number of alerts, overrides, and edits. The report of serious errors averted (ie, critical catches) supplies the location, date, and time of the critical catch, thereby enabling management to pinpoint the end-user for educational purposes. By examining the number of critical catches, a return on investment may be calculated. Assuming 3,328 of these events each year, an estimated cost avoidance would be $29,120,000 per year for CHS. Other reports allow benchmarking between institutions. Conclusion: A review of the data about medication safety across CHS has helped garner support for a medication safety officer position with the goal of ultimately creating a safer environment for the patient. PMID:24474836
Wolpin, Seth E; Nguyen, Juliet K; Parks, Jason J; Lam, Annie Y; Morisky, Donald E; Fernando, Lara; Chu, Adeline; Berry, Donna L
2016-01-01
Pictographs (or pictograms) have been widely utilized to convey medication related messages and to address nonadherence among patients with low health literacy. Yet, patients do not always interpret the intended messages on commonly used pictographs correctly and there are questions how they may be delivered on mobile devices. Our objectives are to refine a set of pictographs to use as medication reminders and to establish preliminary steps for delivery via smart phones. Card sorting was used to identify existing pictographs that focus group members found "not easy" to understand. Participants then explored improvements to these pictographs while iterations were sketched in real-time by a graphic artist. Feedback was also solicited on how selected pictographs might be delivered via smart phones in a sequential reminder message. The study was conducted at a community learning center that provides literacy services to underserved populations in Seattle, WA. Participants aged 18 years and older who met the criteria for low health literacy using S-TOFHLA were recruited. Among the 45 participants screened for health literacy, 29 were eligible and consented to participate. Across four focus group sessions, participants examined 91 commonly used pictographs, 20 of these were ultimately refined to improve comprehensibility using participatory design approaches. All participants in the fifth focus group owned and used cell phones and provided feedback on preferred sequencing of pictographs to represent medication messages. Low literacy adults found a substantial number of common medication label pictographs difficult to understand. Participative design processes helped generate new pictographs, as well as feedback on the sequencing of messages on cell phones, that may be evaluated in future research.
Ball, Kylie; McNaughton, Sarah A; Le, Ha; Andrianopoulos, Nick; Inglis, Victoria; McNeilly, Briohny; Lichomets, Irene; Granados, Alba; Crawford, David
2013-05-14
There is a need for evidence on the most effective and cost-effective approaches for promoting healthy eating among groups that do not meet dietary recommendations for good health, such as those with low incomes or experiencing socioeconomic disadvantage. This paper describes the ShopSmart 4 Health study, a randomised controlled trial conducted by Deakin University, Coles Supermarkets and the Heart Foundation, to investigate the effectiveness and cost-effectiveness of a skill-building intervention for promoting increased purchasing and consumption of fruits and vegetables amongst women of low socioeconomic position (SEP). ShopSmart 4 Health employed a randomised controlled trial design. Women aged 18-60 years, holding a Coles store loyalty card, who shopped at Coles stores within socioeconomically disadvantaged neighbourhoods and met low-income eligibility criteria were invited to participate. Consenting women completed a baseline survey assessing food shopping and eating habits and food-related behaviours and attitudes. On receipt of their completed survey, women were randomised to either a skill-building intervention or a wait-list control condition. Intervention effects will be evaluated via self-completion surveys and using supermarket transaction sales data, collected at pre- and post-intervention and 6-month follow-up. An economic evaluation from a societal perspective using a cost-consequences approach will compare the costs and outcomes between intervention and control groups. Process evaluation will be undertaken to identify perceived value and effects of intervention components. This study will provide data to address the currently limited evidence base regarding the effectiveness and cost-effectiveness of skill-building intervention strategies aimed at increasing fruit and vegetable consumption among socioeconomically disadvantaged women, a target group at high risk of poor diets. Current Controlled Trials ISRCTN48771770.
Pizzuti, A; Baralis, G; Bassignana, A; Antonielli, E; Di Leo, M
1997-01-01
The MS200 Cardioscope, from MRT Micro as., Norway, is a 12 channel ECG card to be directly inserted into a standard personal computer (PC). The standard ISA Bus compatible half length card comes with a set of 10 cables with electrodes and the software for recording, displaying and saving ECG signals. The system is supplied with DOS or Windows software. The goal of the present work was to evaluate the affordability and usability of the MS200 in a clinical setting. We tested the 1.5 DOS version of the software. In 30 patients with various cardiac diseases the ECG signal has been recorded with MS200 and with standard Hellige CardioSmart equipment. The saved ECGs were recalled and printed using an Epson Stylus 800 ink-jet printer. Two cardiologists reviewed the recordings for a looking at output quality, amplitude and speed precision, artifacts, etc. 1) Installation: the card has proven to be totally compatible with the hardware; no changes in default settings had to be made. 2) Usage: the screens are clear; the commands and menus are intuitive and easy to use. Due to the boot-strap and software loading procedures and, most important, off-line printing, the time needed to obtain a complete ECG printout has been longer than that of the reference machine. 3) Archiving and retrieval of ECG: the ECG curves can be saved in original or compressed form: selecting the latter, the noise and non-ECG information is filtered away and the space consumption on disk is reduced: on average, 20 Kb are needed for 10 seconds of signal. The MS200 can be run on a Local Area Network and is prepared for integrating with an existing informative system: we are currently testing the system in this scenery. 4) MS200 includes options for on-line diagnosis, a technology we have not tested in the present work. 5) The only setting allowed for printing full pages is letter size (A4): the quality of printouts is good, with a resolution of 180 DPI. In conclusion, the MS200 system seems reliable and safe. In the configuration we tested, it cannot substitute a dedicated ECG equipment: from this point of view, a smaller PCMCIA-type card with a battery-operated notebook PC will be more suitable for clinical uses. Nevertheless, the possibility to log and track ECG records, integrated into the department informative system, may provide a valuable tool for improving access to medical information.
Szarka, Mate; Guttman, Andras
2017-10-17
We present the application of a smartphone anatomy based technology in the field of liquid phase bioseparations, particularly in capillary electrophoresis. A simple capillary electrophoresis system was built with LED induced fluorescence detection and a credit card sized minicomputer to prove the concept of real time fluorescent imaging (zone adjustable time-lapse fluorescence image processor) and separation controller. The system was evaluated by analyzing under- and overloaded aminopyrenetrisulfonate (APTS)-labeled oligosaccharide samples. The open source software based image processing tool allowed undistorted signal modulation (reprocessing) if the signal was inappropriate for the actual detection system settings (too low or too high). The novel smart detection tool for fluorescently labeled biomolecules greatly expands dynamic range and enables retrospective correction for injections with unsuitable signal levels without the necessity to repeat the analysis.
Karampelas, Vasilios; Pallikarakis, Nicholas; Mantas, John
2013-01-01
The healthcare researchers', academics' and practitioners' interest concerning the development of Healthcare Information Systems has been on a steady rise for the last decades. Fueling this steady rise has been the healthcare professional need of quality information, in every healthcare provision incident, whenever and wherever this incident may take place. In order to address this need a truly mobile health care system is required, one that will be able to provide a healthcare provider with accurate patient-related information regardless of the time and place that healthcare is provided. In order to fulfill this role the present study proposes the architecture for a Healthcare Smartcard system, which provides authenticated healthcare professionals with remote mobile access to a Patient's Healthcare Record, through their Smartphone. Furthermore the research proceeds to develop a working prototype system.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng
2015-11-01
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.
Lin, Han-Yu
2013-04-01
Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.
Mobile-PKI Service Model for Ubiquitous Environment
NASA Astrophysics Data System (ADS)
Jeun, Inkyung; Chun, Kilsoo
One of the most important things in PKI(Public Key Infrastructure) is the private key management issue. The private key must be deal with safely for secure PKI service. Even though PKI service is usually used for identification and authentication of user in e-commerce, PKI service has many inconvenient factors. Especially, the fact that storage media of private key for PKI service is limited to PC hard disk drive or smart card users must always carry, gives an inconvenience to user and is not suitable in ubiquitous network. This paper suggests the digital signature service using a mobile phone(m-PKI service) which is suitable in future network. A mobile phone is the most widely used for personal communication means and has a characteristic of high movability. We can use the PKI service anytime and anywhere using m-PKI.
FreeWalker: a smart insole for longitudinal gait analysis.
Wang, Baitong; Rajput, Kuldeep Singh; Tam, Wing-Kin; Tung, Anthony K H; Yang, Zhi
2015-08-01
Gait analysis is an important diagnostic measure to investigate the pattern of walking. Traditional gait analysis is generally carried out in a gait lab, with equipped force and body tracking sensors, which needs a trained medical professional to interpret the results. This procedure is tedious, expensive, and unreliable and makes it difficult to track the progress across multiple visits. In this paper, we present a smart insole called FreeWalker, which provides quantitative gait analysis outside the confinement of traditional lab, at low- cost. The insole consists of eight pressure sensors and two motion tracking sensors, i.e. 3-axis accelerometer and 3-axis gyroscope. This enables measurement of under-foot pressure distribution and motion sequences in real-time. The insole is enabled with onboard SD card as well as wireless data transmission, which help in continuous gait-cycle analysis. The data is then sent to a gateway, for analysis and interpretation of data, using a user interface where gait features are graphically displayed. We also present validation result of a subject's left foot, who was asked to perform a specific task. Experiment results show that we could achieve a data-sampling rate of over 1 KHz, transmitting data up to a distance of 20 meter and maintain a battery life of around 24 hours. Taking advantage of these features, FreeWalker can be used in various applications, like medical diagnosis, rehabilitation, sports and entertainment.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2013-07-24
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi
2013-01-01
Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged. PMID:23887085
Breadboard Amplifier: Building and Using Simple Electrophysiology Equipment.
Crisp, Kevin M; Lin, Hunter; Prosper, Issa
2016-01-01
Electrophysiology is a valuable skill for the neuroscientist, but the learning curve for students can be steep. Here we describe a very simple electromyography (EMG) amplifier that can be built from scratch by students with no electronics experience in about 30 minutes, making it ideal for incorporating into a laboratory activity. With few parts and no adjustments except the gain, students can begin physiology experiments quickly while having the satisfaction of having built the equipment themselves. Because the output of the circuit goes to a computer sound card, students can listen to electrophysiological activity as they see it on the computer screen, a feature many of our students greatly appreciated. Various applications are discussed, including dual channel recording, using streaming media platforms with remote lab partners and acquiring data in the field on a smart phone. Our students reported that they enjoyed being able to build a working device and using it to record from their own muscles.
Representation of Cultural Role-Play for Training
NASA Technical Reports Server (NTRS)
Santarelli, Thomas; Pepe, Aaron; Rosenzweiz, Larry; Paulus, John; Yi, Ahn Na
2010-01-01
The Department of Defense (000) has successfully applied a number of methods for cultural familiarization training ranging from stand-up classroom training, to face-to-face live role-play, to so-called smart-cards. Recent interest has turned to the use of single and mUlti-player gaming technologies to augment these traditional methods of cultural familiarization. One such system, termed CulturePad, has been designed as a game-based role-play environment suitable for use in training and experimentation involving cultural roleplay scenarios. This paper describes the initial CulturePad effort focused on a literature review regarding the use of role-play for cultural training and a feasibility assessment of using a game-mediated environment for role-play. A small-scale pilot involving cultural experts was conducted to collect qualitative behavioral data comparing live role-play to game-mediated role-play in a multiplayer gaming engine.
Packaging strategy for maximizing the performance of a screen printed piezoelectric energy harvester
NASA Astrophysics Data System (ADS)
Zhang, Z.; Zhu, D.; Tudor, M. J.; Beeby, S. P.
2013-12-01
This paper reports the extended design and simulation of a screen printed piezoelectric energy harvester. The proposed design was based on a previous credit card sized smart tag sensor node, and packages the power conditioning circuit in the free space above the tungsten proof mass layer. This approach enables electronic components to be mounted onto the cantilever beam, which provides additional weight at the tip of the cantilever structure. The design structure contains a T-shape cantilever beam with size of 47 mm × 30 mm × 0.85 mm which is fabricated using screen printing. ANSYS simulation results predict the revised architecture can generate 421.9 μW approximately twice of the RMS power produced by the original design along with a higher open-circuit RMS Voltage of 8.0 V while the resonant frequency is dropped to 53.4 Hz.
[Telematics in the health system and data protection].
Müller, J H
2005-06-01
In the health system, telematics are to be used for the benefit of patients and to make it possible for them to receive better medical care. Telematics must be employed in accordance with the guidelines of data protection and this means in particular that the patient must remain the master of his data. Therefore, he must be able to decide in which situation and to whom he wants to reveal his medical data. For this reason, the exact implementation of the introduction of the electronic medical smart card envisaged by the law requires detailed access authorisations and limitations, which must be reinforced by ample technical security measures. These measures must be transmitted to the patients through co-operation of doctors and health insurance companies in such a transparent way that they recognise the advantages of the new technology. The higher the acceptance is on the patients' side, the more they will be willing to participate voluntarily in telematic projects.
The Case for a Smoker's License
Chapman, Simon
2012-01-01
Background to the debate Tobacco continues to kill millions of people around the world each year and its use is increasing in some countries, which makes the need for new, creative, and radical efforts to achieve the tobacco control endgame vitally important. One such effort is discussed in this PLOS Medicine Debate, where Simon Chapman presents his proposal for a “smoker's license” and Jeff Collin argues against. Chapman sets out a case for introducing a smart card license for smokers designed to limit access to tobacco products and encourage cessation. Key elements of the smoker's license include smokers setting daily limits, financial incentives for permanent license surrender, and a test of health risk knowledge for commencing smokers. Collin argues against the proposal, saying that it would shift focus away from the real vector of the epidemic—the tobacco industry—and that by focusing on individuals it would censure victims, increase stigmatization of smokers, and marginalize the poor. PMID:23152726
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments
Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050
A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.
Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao
2017-01-01
In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.
Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest
NASA Astrophysics Data System (ADS)
Tanaka, Hidema
It is well known that there is relationship between electromagnetic emanation and processing information in IT devices such as personal computers and smart cards. By analyzing such electromagnetic emanation, eavesdropper will be able to get some information, so it becomes a real threat of information security. In this paper, we show how to estimate amount of information that is leaked as electromagnetic emanation. We assume the space between the IT device and the receiver is a communication channel, and we define the amount of information leakage via electromagnetic emanations by its channel capacity. By some experimental results of Tempest, we show example estimations of amount of information leakage. Using the value of channel capacity, we can calculate the amount of information per pixel in the reconstructed image. And we evaluate the effectiveness of Tempest fonts generated by Gaussian method and its threshold of security.
2013-01-01
Background There is a need for evidence on the most effective and cost-effective approaches for promoting healthy eating among groups that do not meet dietary recommendations for good health, such as those with low incomes or experiencing socioeconomic disadvantage. This paper describes the ShopSmart 4 Health study, a randomised controlled trial conducted by Deakin University, Coles Supermarkets and the Heart Foundation, to investigate the effectiveness and cost-effectiveness of a skill-building intervention for promoting increased purchasing and consumption of fruits and vegetables amongst women of low socioeconomic position (SEP). Methods/design ShopSmart 4 Health employed a randomised controlled trial design. Women aged 18–60 years, holding a Coles store loyalty card, who shopped at Coles stores within socioeconomically disadvantaged neighbourhoods and met low-income eligibility criteria were invited to participate. Consenting women completed a baseline survey assessing food shopping and eating habits and food-related behaviours and attitudes. On receipt of their completed survey, women were randomised to either a skill-building intervention or a wait-list control condition. Intervention effects will be evaluated via self-completion surveys and using supermarket transaction sales data, collected at pre- and post-intervention and 6-month follow-up. An economic evaluation from a societal perspective using a cost-consequences approach will compare the costs and outcomes between intervention and control groups. Process evaluation will be undertaken to identify perceived value and effects of intervention components. Discussion This study will provide data to address the currently limited evidence base regarding the effectiveness and cost-effectiveness of skill-building intervention strategies aimed at increasing fruit and vegetable consumption among socioeconomically disadvantaged women, a target group at high risk of poor diets. Trial registration Current Controlled Trials ISRCTN48771770 PMID:23668896
26 CFR 301.6311-2 - Payment by credit card and debit card.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 26 Internal Revenue 18 2012-04-01 2012-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...
26 CFR 301.6311-2 - Payment by credit card and debit card.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 18 2011-04-01 2011-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...
26 CFR 301.6311-2 - Payment by credit card and debit card.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 26 Internal Revenue 18 2013-04-01 2013-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...
26 CFR 301.6311-2 - Payment by credit card and debit card.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 26 Internal Revenue 18 2014-04-01 2014-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...
Critical capacity, travel time delays and travel time distribution of rapid mass transit systems
NASA Astrophysics Data System (ADS)
Legara, Erika Fille; Monterola, Christopher; Lee, Kee Khoon; Hung, Gih Guang
2014-07-01
We set up a mechanistic agent-based model of a rapid mass transit system. Using empirical data from Singapore's unidentifiable smart fare card, we validate our model by reconstructing actual travel demand and duration of travel statistics. We subsequently use this model to investigate two phenomena that are known to significantly affect the dynamics within the RTS: (1) overloading in trains and (2) overcrowding in the RTS platform. We demonstrate that by varying the loading capacity of trains, a tipping point emerges at which an exponential increase in the duration of travel time delays is observed. We also probe the impact on the rail system dynamics of three types of passenger growth distribution across stations: (i) Dirac delta, (ii) uniform and (iii) geometric, which is reminiscent of the effect of land use on transport. Under the assumption of a fixed loading capacity, we demonstrate the dependence of a given origin-destination (OD) pair on the flow volume of commuters in station platforms.
Development and design of a late-model fitness test instrument based on LabView
NASA Astrophysics Data System (ADS)
Xie, Ying; Wu, Feiqing
2010-12-01
Undergraduates are pioneers of China's modernization program and undertake the historic mission of rejuvenating our nation in the 21st century, whose physical fitness is vital. A smart fitness test system can well help them understand their fitness and health conditions, thus they can choose more suitable approaches and make practical plans for exercising according to their own situation. following the future trends, a Late-model fitness test Instrument based on LabView has been designed to remedy defects of today's instruments. The system hardware consists of fives types of sensors with their peripheral circuits, an acquisition card of NI USB-6251 and a computer, while the system software, on the basis of LabView, includes modules of user register, data acquisition, data process and display, and data storage. The system, featured by modularization and an open structure, is able to be revised according to actual needs. Tests results have verified the system's stability and reliability.
Architecture for distributed actuation and sensing using smart piezoelectric elements
NASA Astrophysics Data System (ADS)
Etienne-Cummings, Ralph; Pourboghrat, Farzad; Maruboyina, Hari K.; Abrate, Serge; Dhali, Shirshak K.
1998-07-01
We discuss vibration control of a cantilevered plate with multiple sensors and actuators. An architecture is chosen to minimize the number of control and sensing wires required. A custom VLSI chip, integrated with the sensor/actuator elements, controls the local behavior of the plate. All the actuators are addressed in parallel; local decode logic selects which actuator is stimulated. Downloaded binary data controls the applied voltage and modulation frequency for each actuator, and High Voltage MOSFETs are used to activate them. The sensors, which are independent adjacent piezoelectric ceramic elements, can be accessed in a random or sequential manner. An A/D card and GPIB interconnected test equipment allow a PC to read the sensors' outputs and dictate the actuation procedure. A visual programming environment is used to integrate the sensors, controller and actuators. Based on the constitutive relations for the piezoelectric material, simple models for the sensors and actuators are derived. A two level hierarchical robust controller is derived for motion control and for damping of vibrations.
INVITED PAPER: Low power cryptography
NASA Astrophysics Data System (ADS)
Kitsos, P.; Koufopavlou, O.; Selimis, G.; Sklavos, N.
2005-01-01
Today more and more sensitive data is stored digitally. Bank accounts, medical records and personal emails are some categories that data must keep secure. The science of cryptography tries to encounter the lack of security. Data confidentiality, authentication, non-reputation and data integrity are some of the main parts of cryptography. The evolution of cryptography drove in very complex cryptographic models which they could not be implemented before some years. The use of systems with increasing complexity, which usually are more secure, has as result low throughput rate and more energy consumption. However the evolution of cipher has no practical impact, if it has only theoretical background. Every encryption algorithm should exploit as much as possible the conditions of the specific system without omitting the physical, area and timing limitations. This fact requires new ways in design architectures for secure and reliable crypto systems. A main issue in the design of crypto systems is the reduction of power consumption, especially for portable systems as smart cards.
Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho
2014-04-09
User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.
A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
Chaudhry, Shehzad Ashraf; Khan, Muhammad Tawab; Khan, Muhammad Khurram; Shon, Taeshik
2016-11-01
Recently several authentication schemes are proposed for telecare medicine information system (TMIS). Many of such schemes are proved to have weaknesses against known attacks. Furthermore, numerous such schemes cannot be used in real time scenarios. Because they assume a single server for authentication across the globe. Very recently, Amin et al. (J. Med. Syst. 39(11):180, 2015) designed an authentication scheme for secure communication between a patient and a medical practitioner using a trusted central medical server. They claimed their scheme to extend all security requirements and emphasized the efficiency of their scheme. However, the analysis in this article proves that the scheme designed by Amin et al. is vulnerable to stolen smart card and stolen verifier attacks. Furthermore, their scheme is having scalability issues along with inefficient password change and password recovery phases. Then we propose an improved scheme. The proposed scheme is more practical, secure and lightweight than Amin et al.'s scheme. The security of proposed scheme is proved using the popular automated tool ProVerif.
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.
Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho
2014-01-01
User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes. PMID:24721764
Revealing Spatial Variation and Correlation of Urban Travels from Big Trajectory Data
NASA Astrophysics Data System (ADS)
Li, X.; Tu, W.; Shen, S.; Yue, Y.; Luo, N.; Li, Q.
2017-09-01
With the development of information and communication technology, spatial-temporal data that contain rich human mobility information are growing rapidly. However, the consistency of multi-mode human travel behind multi-source spatial-temporal data is not clear. To this aim, we utilized a week of taxies' and buses' GPS trajectory data and smart card data in Shenzhen, China to extract city-wide travel information of taxi, bus and metro and tested the correlation of multi-mode travel characteristics. Both the global correlation and local correlation of typical travel indicator were examined. The results show that: (1) Significant differences exist in of urban multi-mode travels. The correlation between bus travels and taxi travels, metro travel and taxi travels are globally low but locally high. (2) There are spatial differences of the correlation relationship between bus, metro and taxi travel. These findings help us understanding urban travels deeply therefore facilitate both the transport policy making and human-space interaction research.
Breadboard Amplifier: Building and Using Simple Electrophysiology Equipment
Crisp, Kevin M.; Lin, Hunter; Prosper, Issa
2016-01-01
Electrophysiology is a valuable skill for the neuroscientist, but the learning curve for students can be steep. Here we describe a very simple electromyography (EMG) amplifier that can be built from scratch by students with no electronics experience in about 30 minutes, making it ideal for incorporating into a laboratory activity. With few parts and no adjustments except the gain, students can begin physiology experiments quickly while having the satisfaction of having built the equipment themselves. Because the output of the circuit goes to a computer sound card, students can listen to electrophysiological activity as they see it on the computer screen, a feature many of our students greatly appreciated. Various applications are discussed, including dual channel recording, using streaming media platforms with remote lab partners and acquiring data in the field on a smart phone. Our students reported that they enjoyed being able to build a working device and using it to record from their own muscles. PMID:27385921
A Tamper-Resistant and Portable Healthcare Folder
Anciaux, Nicolas; Berthelot, Morgane; Braconnier, Laurent; Bouganim, Luc; De la Blache, Martine; Gardarin, Georges; Kesmarszky, Philippe; Lartigue, Sophie; Navarre, Jean-François; Pucheral, Philippe; Vandewalle, Jean-Jacques; Zeitouni, Karine
2008-01-01
Electronic health record (EHR) projects have been launched in most developed countries to increase the quality of healthcare while decreasing its cost. The benefits provided by centralizing the healthcare information in database systems are unquestionable in terms of information quality, availability, and protection against failure. Yet, patients are reluctant to give to a distant server the control over highly sensitive data (e.g., data revealing a severe or shameful disease). This paper capitalizes on a new hardware portable device, associating the security of a smart card to the storage capacity of a USB key, to give back to the patient the control over his medical data. This paper shows how this device can complement a traditional EHR server to (1) protect and share highly sensitive data among trusted parties and (2) provide a seamless access to the data even in disconnected mode. The proposed architecture is experimented in the context of a medicosocial network providing medical care and social services at home for elderly people. PMID:18615200
Bio-inspired Autonomic Structures: a middleware for Telecommunications Ecosystems
NASA Astrophysics Data System (ADS)
Manzalini, Antonio; Minerva, Roberto; Moiso, Corrado
Today, people are making use of several devices for communications, for accessing multi-media content services, for data/information retrieving, for processing, computing, etc.: examples are laptops, PDAs, mobile phones, digital cameras, mp3 players, smart cards and smart appliances. One of the most attracting service scenarios for future Telecommunications and Internet is the one where people will be able to browse any object in the environment they live: communications, sensing and processing of data and services will be highly pervasive. In this vision, people, machines, artifacts and the surrounding space will create a kind of computational environment and, at the same time, the interfaces to the network resources. A challenging technological issue will be interconnection and management of heterogeneous systems and a huge amount of small devices tied together in networks of networks. Moreover, future network and service infrastructures should be able to provide Users and Application Developers (at different levels, e.g., residential Users but also SMEs, LEs, ASPs/Web2.0 Service roviders, ISPs, Content Providers, etc.) with the most appropriate "environment" according to their context and specific needs. Operators must be ready to manage such level of complication enabling their latforms with technological advanced allowing network and services self-supervision and self-adaptation capabilities. Autonomic software solutions, enhanced with innovative bio-inspired mechanisms and algorithms, are promising areas of long term research to face such challenges. This chapter proposes a bio-inspired autonomic middleware capable of leveraging the assets of the underlying network infrastructure whilst, at the same time, supporting the development of future Telecommunications and Internet Ecosystems.
Mechanization of Cataloging Procedures *
Kilgour, Frederick G.
1965-01-01
The Columbia-Harvard-Yale Medical Libraries Computerization Project has put into operation its mechanized procedure for the production of catalog cards. Cards produced are in final form ready to be filed into a card catalog. Catalogers prepare copy on a worksheet from which punched cards are punched. An IBM 1401 computer processes the decklets of punched cards on magnetic tape to produce the expanded decklets of punched cards needed to print the various packs of catalog cards required to go into different catalogs. Next, the computer punches the expanded decklets of cards to operate an 870 Document Writer, which types out the catalog cards in final form. Cost of cards ready to file is 12.5 cents per card. Images PMID:14271110
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lawrence, J.D.
1970-03-12
The Control Data 405 card reader, modified by the Control Data 3649 card read controller, is the primary mechanism for transferring information from a deck of punched cards into the CDC 6600 and CDC 7600 computers of the LLL Octopus system. The card reader operates at a maximum rate of 1200 cards per minute. A description of the card reader and its operation is given. A discussion of formates is included. (RWR)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Avramova, Maria; Blyth, Taylor S.; Salko, Robert K.
This document describes how to make a CTF input deck. A CTF input deck is organized into Card Groups and Cards. A Card Group is a collection of Cards. A Card is defined as a line of input. Each Card may contain multiple data. A Card is terminated by making a new line.
A Mechanism for Anonymous Credit Card Systems
NASA Astrophysics Data System (ADS)
Tamura, Shinsuke; Yanase, Tatsuro
This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.
Turning a Private Label Bank Card into a Multi-function Campus ID Card.
ERIC Educational Resources Information Center
James, Thomas G.; Norwood, Bill R.
1991-01-01
This article describes the development at Florida State University of the Seminole ACCESS card, which functions simultaneously as a bank automated teller machine card, a student identification card, and a debit card. Explained are the partnership between the university and the bank charge card center, funding system, technologies involved, and…
Zhou, P; Chou, J; Olea, R S; Yuan, J; Wagner, G
1999-09-28
Direct recruitment and activation of caspase-9 by Apaf-1 through the homophilic CARD/CARD (Caspase Recruitment Domain) interaction is critical for the activation of caspases downstream of mitochondrial damage in apoptosis. Here we report the solution structure of the Apaf-1 CARD domain and its surface of interaction with caspase-9 CARD. Apaf-1 CARD consists of six tightly packed amphipathic alpha-helices and is topologically similar to the RAIDD CARD, with the exception of a kink observed in the middle of the N-terminal helix. By using chemical shift perturbation data, the homophilic interaction was mapped to the acidic surface of Apaf-1 CARD centered around helices 2 and 3. Interestingly, a significant portion of the chemically perturbed residues are hydrophobic, indicating that in addition to the electrostatic interactions predicted previously, hydrophobic interaction is also an important driving force underlying the CARD/CARD interaction. On the basis of the identified functional residues of Apaf-1 CARD and the surface charge complementarity, we propose a model of CARD/CARD interaction between Apaf-1 and caspase-9.
Experimental Determination of Bed Conditions in Concentrated Pyroclastic Density Currents
NASA Astrophysics Data System (ADS)
Winner, A.; Ferrier, K.; Dufek, J.
2016-12-01
Pyroclastic density currents (PDCs) are ground-hugging mixtures of hot gas and rock that can reach temperatures > 800 oC and speeds of 200 m/s. These flows are capable of eroding and entraining the underlying bed material into the flow, which can strongly influence flow momentum, runout distance, and hazards associated with PDCs. However, the mechanism of erosion remains poorly constrained, with proposed mechanisms including under-pressure following the head of the fluidized current, force chain enhanced stresses at the bed, and discrete particle impacts and friction. The interactions between PDCs and the bed have been difficult to observe in the field, as their infrequent occurrence, opacity, and hostile environment make real-time measurement difficult. This study is aimed at obtaining a better understanding of the interactions between PDCs and the bed through a quantitative analysis of bed forces. Our experimental apparatus consists of a rotating cylindrical flume of radius 22 cm, within which gas-rich granular material flows along the interior of the cylinder as it rotates. By using a rotating cylinder, we are able to simulate long-duration flows, allowing us to observe impact forces at the bed over timescales comparable to the flow duration of natural PDCs. To measure the distribution and evolution of forces imparted by the flow on the bed, we constructed a cylindrical insert with a non-erodible bed in which we embedded force sensor arrays parallel and perpendicular to the direction of flow. To measure the forces felt by the particles in the flow, we added "smart particles" 25 to 50 mm in diameter to the flow. Each smart particle contains a three-axis accelerometer and a micro SD card enclosed in a spherical plastic casing, and possesses a density similar to that of the pumice in the experimental flow. Each smart particle also contains a three-axis magnetometer which permits its location to be tracked by means of a unique applied magnetic field. Ultimately, data from these experiments will provide a robust basis for describing the distribution of basal forces given a set of macroscopic flow properties such as grain size, particle concentration, shear rate, and particle elasticity.
In vitro reconstitution of interactions in the CARD9 signalosome
Park, Jin Hee; Choi, Jae Young; Mustafa, Mir Faisal; Park, Hyun Ho
2017-01-01
The caspase-associated recruitment domain (CARD)-containing protein 9 (CARD9) signalosome is composed of CARD9, B-cell CLL/lymphoma 10 (BCL10) and mucosa-associated lymphoid tissue lymphoma translocation protein 1 (MALT1). The CARD9 signalosome has been reported to exert critical functions in the immunoreceptor tyrosine-based activation motif-coupled receptor-mediated activation of myeloid cells, through nuclear factor-κB pathways during innate immunity processes. During CARD9 signalosome assembly, BCL10 has been revealed to function as an adaptor protein and to interact with CARD9 via CARD-CARD interactions; BCL10 also interacts with MALT1 via its C-terminal Ser/Thr-rich region and the first immunoglobulin domain of MALT1. The CARD9 signalosome is implicated in critical biological processes; however, its structural and biochemical characteristics have yet to be elucidated. In the present study, CARD9 and BCL10 CARDs were successfully purified and characterized, and their biochemical properties were investigated. In addition, CARD9-BCL10 complexes were reconstituted in vitro under low salt and pH conditions. Furthermore, based on structural modeling data, a scheme was proposed to describe the interactions between CARD9 and BCL10. This provides a further understanding of the mechanism of how the CARD9 signalosome may be assembled. PMID:28765954
Macdonald, S A; Wells, S L; Giesbrecht, N; West, P M
1999-05-01
In 1994, regulatory changes were introduced in Ontario, Canada, permitting the purchase of alcoholic beverages with credit cards at government-operated liquor stores. Two objectives of this study were: (1) to compare the characteristics of credit card shoppers with non credit card shoppers at liquor stores, and (2) to assess whether changes occurred in alcohol consumption patterns among shoppers following the introduction of credit cards. Random digit dialing was used to interview 2,039 telephone participants prior to the introduction of credit cards (Time 1); 1,401 of these subjects were contacted 1 year later (Time 2). Independent sample t tests were used to compare credit card shoppers with shoppers not using credit cards, and paired t tests were performed to assess whether drinking behaviors changed from Time 1 to Time 2. The credit card shoppers were more likely than the non credit card shoppers to be highly educated (p < .001) and to have high incomes (p < .05). Credit card shoppers drank an average of 6.3 drinks over the previous week compared with 4.0 drinks among non credit card shoppers (p < .01). Although the overall amount of alcohol consumed among credit card shoppers dropped from 6.7 drinks at Time 1 to 6.3 at Time 2 (NS), credit card shoppers reported drinking significantly more often after credit cards were introduced (p < .05). The results suggest that credit cards may not present public health problems since significant increases in alcohol consumption among credit card shoppers were not found.
36 CFR 1254.84 - How may I use a debit card for copiers in the Washington, DC, area?
Code of Federal Regulations, 2010 CFR
2010-07-01
..., money order, debit card, or credit card. Your researcher identification card number as encoded on the... 1253 of this chapter, you may use cash or credit card to purchase a debit card from the vending... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false How may I use a debit card...
Dynamic Virtual Credit Card Numbers
NASA Astrophysics Data System (ADS)
Molloy, Ian; Li, Jiangtao; Li, Ninghui
Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.
The research of data acquisition system for Raman spectrometer
NASA Astrophysics Data System (ADS)
Cui, Xiao; Guo, Pan; Zhang, Yinchao; Chen, Siying; Chen, He; Chen, Wenbo
2011-11-01
Raman spectrometer has been widely used as an identification tool for analyzing material structure and composition in many fields. However, Raman scattering echo signal is very weak, about dozens of photons at most in one laser plus signal. Therefore, it is a great challenge to design a Raman spectrum data acquisition system which could accurately receive the weak echo signal. The system designed in this paper receives optical signals with the principle of photon counter and could detect single photon. The whole system consists of a photoelectric conversion module H7421-40 and a photo counting card including a field programmable gate array (FPGA) chip and a PCI9054 chip. The module H7421-40 including a PMT, an amplifier and a discriminator has high sensitivity on wavelength from 300nm to 720nm. The Center Wavelength is 580nm which is close to the excitation wavelength (532nm), QE 40% at peak wavelength, Count Sensitivity is 7.8*105(S-1PW-1) and Count Linearity is 1.5MHZ. In FPGA chip, the functions are divided into three parts: parameter setting module, controlling module, data collection and storage module. All the commands, parameters and data are transmitted between FPGA and computer by PCI9054 chip through the PCI interface. The result of experiment shows that the Raman spectrum data acquisition system is reasonable and efficient. There are three primary advantages of the data acquisition system: the first one is the high sensitivity with single photon detection capability; the second one is the high integrated level which means all the operation could be done by the photo counting card; and the last one is the high expansion ability because of the smart reconfigurability of FPGA chip.
Citizen empowerment using healthcare and welfare cards.
Cheshire, Paul
2006-01-01
Cards are used in health and welfare to establish the identity of the person presenting the card; to prove their entitlement to a welfare or healthcare service; to store data needed within the care process; and to store data to use in the administration process. There is a desire to empower citizens - to give them greater control over their lives, their health and wellbeing. How can a healthcare and welfare card support this aim? Does having a card empower the citizen? What can a citizen do more easily, reliably, securely or cost-effectively because they have a card? A number of possibilities include: Choice of service provider; Mobility across regional and national boundaries; Privacy; and Anonymity. But in all of these possibilities a card is just one component of a total system and process, and there may be other solutions--technological and manual. There are risks and problems from relying on a card; and issues of Inclusion for people who are unable use a card. The article concludes that: cards need to be viewed in the context of the whole solution; cards are not the only technological mechanism; cards are not the best mechanism in all circumstances; but cards are very convenient method in very many situations.
Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.
2006-01-01
The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar. PMID:16390976
DOE Office of Scientific and Technical Information (OSTI.GOV)
Avramova, Maria; Toptan, Aysenur; Porter, Nathan
This document describes how to make a CTF input deck. A CTF input deck is organized into Card Groups and Cards. A Card Group is a collection of Cards. A Card is de ned as a line of input. Each Card may contain multiple data. A Card is terminated by making a new line. This document has been organized so that each Card Group is discussed in its own dedicated chapter. Each card is discused in its own dedicated section. Each data in the card is discussed in its own block. The block gives information about the data, including themore » number of the input, the title, a description of the meaning of the data, units, data type, and so on. An example block is shown below to discuss the meaning of each entry in the block.« less
Patients' Awareness, Usage and Impact of Hospital Report Cards in the US.
Emmert, Martin; Schlesinger, Mark
2017-12-01
Little knowledge is available about the importance of hospital report cards in the US from the patients' perspective. It also remains unknown whether specific report cards with a stronger emphasis on clinical measures have a greater impact on hospital choice than general report cards that focus on online-derived ratings. The aim of this study was to determine the awareness and usage of hospital report cards as well as their impact on hospital choice in the US. We conducted a cross-sectional study by surveying a stratified online sample (N = 1332) to ensure representativeness to the US online population (February 2015). Overall, 75% of all respondents (mean age 45.4 years; 54% female) were aware of hospital report cards. Among these, 56% had used a report card to search for a hospital, and 80% of report card users stated having been influenced by a report card. Both the awareness and usage of general report cards were shown to be higher than for specific report cards. No significant differences could be detected regarding the impact between general or specific report cards on hospital choice. Our results indicate that hospital report cards play a considerable role among patients when searching for a hospital in the US; however, patients do not seem to have a preference regarding the type of report cards they use when selecting a hospital.
Saieg, Mauro Ajaj; Geddie, William R; Boerner, Scott L; Liu, Ni; Tsao, Ming; Zhang, Tong; Kamel-Reid, Suzanne; da Cunha Santos, Gilda
2012-06-25
Novel high-throughput molecular technologies have made the collection and storage of cells and small tissue specimens a critical issue. The FTA card provides an alternative to cryopreservation for biobanking fresh unfixed cells. The current study compared the quality and integrity of the DNA obtained from 2 types of FTA cards (Classic and Elute) using 2 different extraction protocols ("Classic" and "Elute") and assessed the feasibility of performing multiplex mutational screening using fine-needle aspiration (FNA) biopsy samples. Residual material from 42 FNA biopsies was collected in the cards (21 Classic and 21 Elute cards). DNA was extracted using the Classic protocol for Classic cards and both protocols for Elute cards. Polymerase chain reaction for p53 (1.5 kilobase) and CARD11 (500 base pair) was performed to assess DNA integrity. Successful p53 amplification was achieved in 95.2% of the samples from the Classic cards and in 80.9% of the samples from the Elute cards using the Classic protocol and 28.5% using the Elute protocol (P = .001). All samples (both cards) could be amplified for CARD11. There was no significant difference in the DNA concentration or 260/280 purity ratio when the 2 types of cards were compared. Five samples were also successfully analyzed by multiplex MassARRAY spectrometry, with a mutation in KRAS found in 1 case. High molecular weight DNA was extracted from the cards in sufficient amounts and quality to perform high-throughput multiplex mutation assays. The results of the current study also suggest that FTA Classic cards preserve better DNA integrity for molecular applications compared with the FTA Elute cards. Copyright © 2012 American Cancer Society.
Maurer, Kathryn; Luo, Hongxue; Shen, Zhiyong; Wang, Guixiang; Du, Hui; Wang, Chun; Liu, Xiaobo; Wang, Xiamen; Qu, Xinfeng; Wu, Ruifang; Belinson, Jerome
2016-03-01
Solid media transport can be used to design adaptable cervical cancer screening programs but currently is limited by one card with published data. To develop and evaluate a solid media transport card for use in high-risk human papillomavirus detection (HR-HPV). The Preventative Oncology International (POI) card was constructed using PK 226 paper(®) treated with cell-lysing solution and indicating dye. Vaginal samples were applied to the POI card and the indicating FTA (iFTA) elute card. A cervical sample was placed in liquid media. All specimens were tested for HR-HPV. Color change was assessed at sample application and at card processing. Stability of the POI card and iFTA elute card was tested at humidity. 319 women were enrolled. Twelve women had at least one insufficient sample with no difference between media (p=0.36). Compared to liquid samples, there was good agreement for HR-HPV detection with kappa of 0.81 (95% CI 0.74-0.88) and 0.71 (95% CI 0.62-0.79) for the POI and iFTA elute card respectively. Sensitivity for ≥CIN2 was 100% (CI 100-100%), 95.1% (CI 92.7-97.6%), and 93.5% (CI 90.7-96.3%) for the HR-HPV test from the liquid media, POI card, and iFTA elute card respectively. There was no color change of the POI card noted in humidity but the iFTA elute card changed color at 90% humidity. The POI card is suitable for DNA transport and HR-HPV testing. This card has the potential to make cervical cancer screening programs more affordable worldwide. Copyright © 2015 Elsevier B.V. All rights reserved.
Iridovirus CARD Protein Inhibits Apoptosis through Intrinsic and Extrinsic Pathways
Chen, Chien-Wen; Wu, Ming-Shan; Huang, Yi-Jen; Lin, Pei-Wen; Shih, Chueh-Ju; Lin, Fu-Pang; Chang, Chi-Yao
2015-01-01
Grouper iridovirus (GIV) belongs to the genus Ranavirus of the family Iridoviridae; the genomes of such viruses contain an anti-apoptotic caspase recruitment domain (CARD) gene. The GIV-CARD gene encodes a protein of 91 amino acids with a molecular mass of 10,505 Daltons, and shows high similarity to other viral CARD genes and human ICEBERG. In this study, we used Northern blot to demonstrate that GIV-CARD transcription begins at 4 h post-infection; furthermore, we report that its transcription is completely inhibited by cycloheximide but not by aphidicolin, indicating that GIV-CARD is an early gene. GIV-CARD-EGFP and GIV-CARD-FLAG recombinant proteins were observed to translocate from the cytoplasm into the nucleus, but no obvious nuclear localization sequence was observed within GIV-CARD. RNA interference-mediated knockdown of GIV-CARD in GK cells infected with GIV inhibited expression of GIV-CARD and five other viral genes during the early stages of infection, and also reduced GIV infection ability. Immunostaining was performed to show that apoptosis was effectively inhibited in cells expressing GIV-CARD. HeLa cells irradiated with UV or treated with anti-Fas antibody will undergo apoptosis through the intrinsic and extrinsic pathways, respectively. However, over-expression of recombinant GIV-CARD protein in HeLa cells inhibited apoptosis induced by mitochondrial and death receptor signaling. Finally, we report that expression of GIV-CARD in HeLa cells significantly reduced the activities of caspase-8 and -9 following apoptosis triggered by anti-Fas antibody. Taken together, these results demonstrate that GIV-CARD inhibits apoptosis through both intrinsic and extrinsic pathways. PMID:26047333
Patron ID Cards Made Easy and Cheap
ERIC Educational Resources Information Center
Peischl, Tom
1978-01-01
Four major problems of academic library identification cards are expense, distribution, timeliness, and validation. By moving from a commercially produced plastic library card to a locally produced paper IBM-type card, this library solved these four library card problems. (Author)
A Low-Cost, Efficient, Machine-Assisted Manual Circulation System
ERIC Educational Resources Information Center
Stangl, Peter
1975-01-01
A circulation system uses plastic embossed user cards, an addressograph electric imprinter, a copy of the catalog card as a book card, and a pocket imprinted by the user's card and holding the book card during circulation. (LS)
Gas cooled traction drive inverter
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chinthavali, Madhu Sudhan
The present invention provides a modular circuit card configuration for distributing heat among a plurality of circuit cards. Each circuit card includes a housing adapted to dissipate heat in response to gas flow over the housing. In one aspect, a gas-cooled inverter includes a plurality of inverter circuit cards, and a plurality of circuit card housings, each of which encloses one of the plurality of inverter cards.
Gas cooled traction drive inverter
Chinthavali, Madhu Sudhan
2013-10-08
The present invention provides a modular circuit card configuration for distributing heat among a plurality of circuit cards. Each circuit card includes a housing adapted to dissipate heat in response to gas flow over the housing. In one aspect, a gas-cooled inverter includes a plurality of inverter circuit cards, and a plurality of circuit card housings, each of which encloses one of the plurality of inverter cards.
Application of an artificial neural network to pump card diagnosis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashenayi, K.; Lea, J.F.; Kemp, F.
1994-12-01
Beam pumping is the most frequently used artificial-lift technique for oil production. Downhole pump cards are used to evaluate performance of the pumping unit. Pump cards can be generated from surface dynamometer cards using a 1D wave equation with viscous damping, as suggested by Gibbs and Neely. Pump cards contain significant information describing the behavior of the pump. However, interpretation of these cards is tedious and time-consuming; hence, an automated system capable of interpreting these cards could speed interpretation and warn of pump failures. This work presents the results of a DOS-based computer program capable of correctly classifying pump cards.more » The program uses a hybrid artificial neural network (ANN) to identify significant features of the pump card. The hybrid ANN uses classical and sinusoidal perceptrons. The network is trained using an error-back-propagation technique. The program correctly identified pump problems for more than 180 different training and test pump cards. The ANN takes a total of 80 data points as input. Sixty data points are collected from the pump card perimeter, and the remaining 20 data points represent the slope at selected points on the pump card perimeter. Pump problem conditions are grouped into 11 distinct classes. The network is capable of identifying one or more of these problem conditions for each pump card. Eight examples are presented and discussed.« less
Passive microfluidic array card and reader
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dugan, Lawrence Christopher; Coleman, Matthew A
A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.
Medication safety--reliability of preference cards.
Dawson, Anthony; Orsini, Michael J; Cooper, Mary R; Wollenburg, Karol
2005-09-01
A CLINICAL ANALYSIS of surgeons' preference cards was initiated in one hospital as part of a comprehensive analysis to reduce medication-error risks by standardizing and simplifying the intraoperative medication-use process specific to the sterile field. THE PREFERENCE CARD ANALYSIS involved two subanalyses: a review of the information as it appeared on the cards and a failure mode and effects analysis of the process involved in using and maintaining the cards. THE ANALYSIS FOUND that the preference card system in use at this hospital is outdated. Variations and inconsistencies within the preference card system indicate that the use of preference cards as guides for medication selection for surgical procedures presents an opportunity for medication errors to occur.
Qin, Juan-Juan; Mao, Wenzhe; Wang, Xiaozhan; Sun, Peng; Cheng, Daqing; Tian, Song; Zhu, Xue-Yong; Yang, Ling; Huang, Zan; Li, Hongliang
2018-06-26
The comprehensive interplay in sterile inflammation and liver cell death predominantly determines hepatic injury caused by ischemia/reperfusion (I/R) insult. Caspase recruitment domain family member 6 (CARD6) was initially shown to play important roles in NF-κB activation. In our preliminary studies, CARD6 downregulation was closely related to hepatic I/R injury in liver transplantation patients and mouse models. Thus, we hypothesized that CARD6 protects against hepatic I/R injury and investigated the underlying molecular mechanisms. A partial hepatic I/R operation was performed in hepatocyte-specific Card6 knockout mice (HKO), Card6 transgenic mice with CARD6 overexpression specifically in hepatocytes (HTG), and the corresponding control mice. Hepatic histology, serum aminotransferase, inflammatory cytokines/chemokines, cell death, and inflammatory signaling were examined to assess liver damage. The molecular mechanisms of CARD6 function were explored in vivo and in vitro. Card6-HTG mice alleviated liver injury compared with control mice as shown by decreased cell death, lower serum transaminase levels, and reduced inflammation and infiltration, whereas Card6-HKO mice had the opposite phenotype. Mechanistically, phosphorylation of ASK1 and its downstream effectors JNK and p38 were increased in the livers of Card6-HKO mice but repressed in those of Card6-HTG mice. Furthermore, ASK1 knockdown normalized the effect of CARD6 deficiency on the activation of NF-κB, JNK and p38, while ASK1 overexpression abrogated the suppressive effect of CARD6. Finally, CARD6 interacted with Ask1. Mutant CARD6 that lacked the ability to interact with ASK1 could not inhibit ASK1 and failed to protect against hepatic I/R injury. CARD6 is a novel protective factor of hepatic I/R injury that suppresses inflammation and liver cell death by inhibiting the ASK1 signaling pathway. CARD6 participate and play an important role during the process of liver blood flow restriction followed by restoring. Through suppressing the activity of ASK1, CARD6 can protect against hepatocytes injury. Targeting CARD6 can be a strategy for precaution and treatment of this disease. Copyright © 2018 European Association for the Study of the Liver. Published by Elsevier B.V. All rights reserved.
48 CFR 32.1108 - Payment by Governmentwide commercial purchase card.
Code of Federal Regulations, 2010 CFR
2010-10-01
... commercial purchase card. 32.1108 Section 32.1108 Federal Acquisition Regulations System FEDERAL ACQUISITION... Governmentwide commercial purchase card. A Governmentwide commercial purchase card charge authorizes the third party (e.g., financial institution) that issued the purchase card to make immediate payment to the...
75 FR 10414 - Researcher Identification Card
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...
48 CFR 2913.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2010 CFR
2010-10-01
... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR... commercial purchase card. (a) The Government purchase card has far fewer requirements for documentation than other methods of purchasing. However, the same legal restrictions apply to credit card purchases that...
You Can Teach an Old Magician New Tricks
ERIC Educational Resources Information Center
Bonomo, John P.
2008-01-01
Mathematics forms the basis for many types of card tricks. One of the best-known works as follows: Take any 15 cards out of a deck and ask a volunteer to select one of the cards and place it back in the deck. After shuffling the cards, you deal out three piles of cards and ask the volunteer which pile his or her card is in. You collect up the…
Correlates of credit card ownership in men and women.
Yang, Bijou; Lester, David
2005-06-01
In a sample of 352 students, correlates of credit card ownership differed by sex. For both men and women, credit card ownership was predicted by their affective attitude toward credit cards. However, whereas for men concern with money as a tactic for gaining power predicted credit card ownership, for women feelings of insecurity about having sufficient money and having a conservative approach to money predicted credit card ownership.
Renna, Tania Di; Crooks, Simone; Pigford, Ashlee-Ann; Clarkin, Chantalle; Fraser, Amy B; Bunting, Alexandra C; Bould, M Dylan; Boet, Sylvain
2016-09-01
This study aimed to assess the perceived value of the Cognitive Aids for Role Definition (CARD) protocol for simulated intraoperative cardiac arrests. Sixteen interprofessional operating room teams completed three consecutive simulated intraoperative cardiac arrest scenarios: current standard, no CARD; CARD, no CARD teaching; and CARD, didactic teaching. Each team participated in a focus group interview immediately following the third scenario; data were transcribed verbatim and qualitatively analysed. After 6 months, participants formed eight new teams randomised to two groups (CARD or no CARD) and completed a retention intraoperative cardiac arrest simulation scenario. All simulation sessions were video recorded and expert raters assessed team performance. Qualitative analysis of the 16 focus group interviews revealed 3 thematic dimensions: role definition in crisis management; logistical issues; and the "real life" applicability of CARD. Members of the interprofessional team perceived CARD very positively. Exploratory quantitative analysis found no significant differences in team performance with or without CARD (p > 0.05). In conclusion, qualitative data suggest that the CARD protocol clarifies roles and team coordination during interprofessional crisis management and has the potential to improve the team performance. The concept of a self-organising team with defined roles is promising for patient safety.
Evolution of a Novel Antiviral Immune-Signaling Interaction by Partial-Gene Duplication
Korithoski, Bryan; Kolaczkowski, Oralia; Mukherjee, Krishanu; Kola, Reema; Earl, Chandra; Kolaczkowski, Bryan
2015-01-01
The RIG-like receptors (RLRs) are related proteins that identify viral RNA in the cytoplasm and activate cellular immune responses, primarily through direct protein-protein interactions with the signal transducer, IPS1. Although it has been well established that the RLRs, RIG-I and MDA5, activate IPS1 through binding between the twin caspase activation and recruitment domains (CARDs) on the RLR and a homologous CARD on IPS1, it is less clear which specific RLR CARD(s) are required for this interaction, and almost nothing is known about how the RLR-IPS1 interaction evolved. In contrast to what has been observed in the presence of immune-modulating K63-linked polyubiquitin, here we show that—in the absence of ubiquitin—it is the first CARD domain of human RIG-I and MDA5 (CARD1) that binds directly to IPS1 CARD, and not the second (CARD2). Although the RLRs originated in the earliest animals, both the IPS1 gene and the twin-CARD domain architecture of RIG-I and MDA5 arose much later in the deuterostome lineage, probably through a series of tandem partial-gene duplication events facilitated by tight clustering of RLRs and IPS1 in the ancestral deuterostome genome. Functional differentiation of RIG-I CARD1 and CARD2 appears to have occurred early during this proliferation of RLR and related CARDs, potentially driven by adaptive coevolution between RIG-I CARD domains and IPS1 CARD. However, functional differentiation of MDA5 CARD1 and CARD2 occurred later. These results fit a general model in which duplications of protein-protein interaction domains into novel gene contexts could facilitate the expansion of signaling networks and suggest a potentially important role for functionally-linked gene clusters in generating novel immune-signaling pathways. PMID:26356745
48 CFR 552.232-77 - Payment By Government Charge Card.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Charge Card. 552.232-77 Section 552.232-77 Federal Acquisition Regulations System GENERAL SERVICES....232-77 Payment By Government Charge Card. As prescribed in 532.7003, insert the following clause: Payment By Government Charge Card (NOV 2009) (a) Definitions. “Governmentwide commercial purchase card...
Near-infrared diffuse reflection systems for chlorophyll content of tomato leaves measurement
NASA Astrophysics Data System (ADS)
Jiang, Huanyu; Ying, Yibin; Lu, Huishan
2006-10-01
In this study, two measuring systems for chlorophyll content of tomato leaves were developed based on near-infrared spectral techniques. The systems mainly consists of a FT-IR spectrum analyzer, optic fiber diffuses reflection accessories and data card. Diffuse reflectance of intact tomato leaves was measured by an optics fiber optic fiber diffuses reflection accessory and a smart diffuses reflection accessory. Calibration models were developed from spectral and constituent measurements. 90 samples served as the calibration sets and 30 samples served as the validation sets. Partial least squares (PLS) and principal component regression (PCR) technique were used to develop the prediction models by different data preprocessing. The best model for chlorophyll content had a high correlation efficient of 0.9348 and a low standard error of prediction RMSEP of 4.79 when we select full range (12500-4000 cm -1), MSC path length correction method by the log(1/R). The results of this study suggest that FT-NIR method can be feasible to detect chlorophyll content of tomato leaves rapidly and nondestructively.
Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo
2012-12-01
The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.
A half millimeter thick coplanar flexible battery with wireless recharging capability.
Kim, Joo-Seong; Ko, Dongah; Yoo, Dong-Joo; Jung, Dae Soo; Yavuz, Cafer T; Kim, Nam-In; Choi, In-Suk; Song, Jae Yong; Choi, Jang Wook
2015-04-08
Most of the existing flexible lithium ion batteries (LIBs) adopt the conventional cofacial cell configuration where anode, separator, and cathode are sequentially stacked and so have difficulty in the integration with emerging thin LIB applications, such as smart cards and medical patches. In order to overcome this shortcoming, herein, we report a coplanar cell structure in which anodes and cathodes are interdigitatedly positioned on the same plane. The coplanar electrode design brings advantages of enhanced bending tolerance and capability of increasing the cell voltage by in series-connection of multiple single-cells in addition to its suitability for the thickness reduction. On the basis of these structural benefits, we develop a coplanar flexible LIB that delivers 7.4 V with an entire cell thickness below 0.5 mm while preserving stable electrochemical performance throughout 5000 (un)bending cycles (bending radius = 5 mm). Also, even the pouch case serves as barriers between anodes and cathodes to prevent Li dendrite growth and short-circuit formation while saving the thickness. Furthermore, for convenient practical use wireless charging via inductive electromagnetic energy transfer and solar cell integration is demonstrated.
Robust Face Recognition via Multi-Scale Patch-Based Matrix Regression.
Gao, Guangwei; Yang, Jian; Jing, Xiaoyuan; Huang, Pu; Hua, Juliang; Yue, Dong
2016-01-01
In many real-world applications such as smart card solutions, law enforcement, surveillance and access control, the limited training sample size is the most fundamental problem. By making use of the low-rank structural information of the reconstructed error image, the so-called nuclear norm-based matrix regression has been demonstrated to be effective for robust face recognition with continuous occlusions. However, the recognition performance of nuclear norm-based matrix regression degrades greatly in the face of the small sample size problem. An alternative solution to tackle this problem is performing matrix regression on each patch and then integrating the outputs from all patches. However, it is difficult to set an optimal patch size across different databases. To fully utilize the complementary information from different patch scales for the final decision, we propose a multi-scale patch-based matrix regression scheme based on which the ensemble of multi-scale outputs can be achieved optimally. Extensive experiments on benchmark face databases validate the effectiveness and robustness of our method, which outperforms several state-of-the-art patch-based face recognition algorithms.
Authentication Without Secrets
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pierson, Lyndon G.; Robertson, Perry J.
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integritymore » of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.« less
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-01-01
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012
Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho
2014-06-10
Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.
Park, YoHan; Park, YoungHo
2016-12-14
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.
Islam, S K Hafizul; Khan, Muhammad Khurram; Li, Xiong
2015-01-01
Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.
Study on the weighing system based on optical fiber Bragg grating
NASA Astrophysics Data System (ADS)
Wang, Xiaona; Yu, Qingxu; Li, Yefang
2010-10-01
The optical fiber sensor based on wavelength demodulation such as fiber Bragg grating(FBG), with merits of immunity to electromagnetic interference, low drift and high precision, has been widely used in many areas, such as structural health monitoring and smart materials, and the wavelength demodulation system was also studied widely. In the paper, a weighing system based on FBG was studied. The optical source is broadband Erbium-doped fiber ring laser with a spectral range of 1500~1600nm and optical power of 2mW; A Fabry-Perot Etalon with orientation precision of 1pm was adopted as real-time wavelength calibration for the swept laser; and multichannel high resolution simultaneous sampling card was used in the system to acquire sensing signals simultaneously, thus high-resolution and real-time calibration of sweep-wavelength can be achieved. The FBG was adhered to a cantilever beam and the Bragg wavelength was demodulated with the system. The weighing system was done after calibrated with standard weight. Experimental results show that the resolution of the weighing system is 0.5 g with a full scale of 2Kg.
wHospital: a web-based application with digital signature for drugs dispensing management.
Rossi, Lorenzo; Margola, Lorenzo; Manzelli, Vacia; Bandera, Alessandra
2006-01-01
wHospital is the result of an information technology research project, based on the utilization of a web based application for managing the hospital drugs dispensing. Part of wHospital back bone and its key distinguishing characteristic is the adoption of the digital signature system,initially deployed by the Government of Lombardia, a Northern Italy Region, throughout the distribution of smart cards to all the healthcare and hospital staffs. The developed system is a web-based application with a proposed Health Records Digital Signature (HReDS) handshake to comply with the national law and with the Joint Commission International Standards. The prototype application, for a single hospital Operative Unit (OU), has focused on data and process management, related to drug therapy. Following a multi-faceted selection process, the Infective Disease OU of the Hospital in Busto Arsizio, Lombardia, was chosen for the development and prototype implementation. The project lead time, from user requirement analysis to training and deployment was approximately 8 months. This paper highlights the applied project methodology, the system architecture, and the achieved preliminary results.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-06-08
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian
2016-01-01
WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382
Yau, Wei-Chuen; Phan, Raphael C-W
2013-12-01
Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
Park, YoHan; Park, YoungHo
2016-01-01
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616
Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho
2015-01-01
In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702
Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong
2015-01-01
Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401
RUASN: a robust user authentication framework for wireless sensor networks.
Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae
2011-01-01
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.
Credit Cards. Bulletin No. 721. (Revised.)
ERIC Educational Resources Information Center
Fox, Linda Kirk
This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... credit card relationships, servicing assets, intangible assets (other than purchased credit card...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card...
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... credit card relationships, servicing assets, intangible assets (other than purchased credit card...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-25
... savings associations). The OCC requires independent credit card banks and independent credit card Federal... by the bank or Federal savings association. Independent credit card banks and independent credit card... credit card operations and are not affiliated with a full service national bank or Federal savings...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... credit card relationships, servicing assets, intangible assets (other than purchased credit card...
Index Nuclear Wallet Cards Contents Current Version Radioactive Nuclides (Homeland Security) Nuclear Materials Management & Safeguards System 8th Edition 2011 Nuclear Wallet Cards Resources Search Nuclear Wallet Cards 8th Edition PDF Format 8thEdition, Android Market Download Nuclear Wallet Cards Nuclear
Evolution of optically nondestructive and data-non-intrusive credit card verifiers
NASA Astrophysics Data System (ADS)
Sumriddetchkajorn, Sarun; Intaravanne, Yuttana
2010-04-01
Since the deployment of the credit card, the number of credit card fraud cases has grown rapidly with a huge amount of loss in millions of US dollars. Instead of asking more information from the credit card's holder or taking risk through payment approval, a nondestructive and data-non-intrusive credit card verifier is highly desirable before transaction begins. In this paper, we review optical techniques that have been proposed and invented in order to make the genuine credit card more distinguishable than the counterfeit credit card. Several optical approaches for the implementation of credit card verifiers are also included. In particular, we highlight our invention on a hyperspectral-imaging based portable credit card verifier structure that offers a very low false error rate of 0.79%. Other key features include low cost, simplicity in design and implementation, no moving part, no need of an additional decoding key, and adaptive learning.
Three dimensional identification card and applications
NASA Astrophysics Data System (ADS)
Zhou, Changhe; Wang, Shaoqing; Li, Chao; Li, Hao; Liu, Zhao
2016-10-01
Three dimensional Identification Card, with its three-dimensional personal image displayed and stored for personal identification, is supposed be the advanced version of the present two-dimensional identification card in the future [1]. Three dimensional Identification Card means that there are three-dimensional optical techniques are used, the personal image on ID card is displayed to be three-dimensional, so we can see three dimensional personal face. The ID card also stores the three-dimensional face information in its inside electronics chip, which might be recorded by using two-channel cameras, and it can be displayed in computer as three-dimensional images for personal identification. Three-dimensional ID card might be one interesting direction to update the present two-dimensional card in the future. Three-dimension ID card might be widely used in airport custom, entrance of hotel, school, university, as passport for on-line banking, registration of on-line game, etc...
Qin, Haihong; Jin, Jiang; Fischer, Heinz; Mildner, Michael; Gschwandtner, Maria; Mlitz, Veronika; Eckhart, Leopold; Tschachler, Erwin
2017-08-01
CARD18 contains a caspase recruitment domain (CARD) via which it binds to caspase-1 and thereby inhibits caspase-1-mediated activation of the pro-inflammatory cytokine interleukin (IL)-1β. To determine the expression profile and the role of CARD18 during differentiation of keratinocytes and to compare the expression of CARD18 in normal skin and in inflammatory skin diseases. Human keratinocytes were induced to differentiate in monolayer and in 3D skin equivalent cultures. In some experiments, CARD18-specific siRNAs were used to knock down expression of CARD18. CARD18 mRNA levels were determined by quantitative real-time PCR, and CARD18 protein was detected by Western blot and immunofluorescence analyses. In situ expression was analyzed in skin biopsies obtained from healthy donors and patients with psoriasis and lichen planus. CARD18 mRNA was expressed in the epidermis at more than 100-fold higher levels than in any other human tissue. Within the epidermis, CARD18 was specifically expressed in the granular layer. In vitro CARD18 was strongly upregulated at both mRNA and protein levels in keratinocytes undergoing terminal differentiation. In skin equivalent cultures the expression of CARD18 was efficiently suppressed by siRNAs without impairing stratum corneum formation. Epidermal expression of CARD18 was increased after ultraviolet (UV)B irradiation of skin explants. In skin biopsies of patients with psoriasis no consistent regulation of CARD18 expression was observed, however, in lesional epidermis of patients with lichen planus, CARD18 expression was either greatly diminished or entirely absent whereas in non-lesional areas expression was comparable to normal skin. Our results identify CARD18 as a differentiation-associated keratinocyte protein that is altered in abundance by UV stress. Its downregulation in lichen planus indicates a potential role in inflammatory reactions of the epidermis in this disease. Copyright © 2017 Japanese Society for Investigative Dermatology. Published by Elsevier B.V. All rights reserved.
12 CFR 226.12 - Special credit card provisions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...
37 CFR 1.23 - Methods of payment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... made by credit card, except for replenishing a deposit account. Payment of a fee by credit card must specify the amount to be charged to the credit card and such other information as is necessary to process... authorization to charge fees to a credit card. If credit card information is provided on a form or document...
12 CFR 226.12 - Special credit card provisions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 3 2013-01-01 2013-01-01 false Special credit card provisions. 226.12 Section... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used...
37 CFR 1.23 - Methods of payment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... made by credit card, except for replenishing a deposit account. Payment of a fee by credit card must specify the amount to be charged to the credit card and such other information as is necessary to process... authorization to charge fees to a credit card. If credit card information is provided on a form or document...
12 CFR 1026.12 - Special credit card provisions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Special credit card provisions. 1026.12 Section...-End Credit § 1026.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including business, commercial, or agricultural use, no...
37 CFR 1.23 - Methods of payment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... made by credit card, except for replenishing a deposit account. Payment of a fee by credit card must specify the amount to be charged to the credit card and such other information as is necessary to process... authorization to charge fees to a credit card. If credit card information is provided on a form or document...
12 CFR Rules for Card Issuers That... - by-Transaction Basis
Code of Federal Regulations, 2011 CFR
2011-01-01
... THE FEDERAL RESERVE SYSTEM TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card... Subpart B apply if credit cards are issued and the card issuer and the seller are the same or related... creditor have an agreement authorizing the seller to honor the creditor's credit card. 1. Section 226.6(a...
12 CFR 1026.12 - Special credit card provisions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 9 2014-01-01 2014-01-01 false Special credit card provisions. 1026.12 Section...-End Credit § 1026.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including business, commercial, or agricultural use, no...
12 CFR Rules for Card Issuers That... - by-Transaction Basis
Code of Federal Regulations, 2012 CFR
2012-01-01
... THE FEDERAL RESERVE SYSTEM TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card... Subpart B apply if credit cards are issued and the card issuer and the seller are the same or related... creditor have an agreement authorizing the seller to honor the creditor's credit card. 1. Section 226.6(a...
12 CFR 226.12 - Special credit card provisions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 3 2011-01-01 2011-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...
12 CFR 226.12 - Special credit card provisions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 3 2014-01-01 2014-01-01 false Special credit card provisions. 226.12 Section... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used...
12 CFR 226.12 - Special credit card provisions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 3 2012-01-01 2012-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...
37 CFR 1.23 - Methods of payment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... made by credit card, except for replenishing a deposit account. Payment of a fee by credit card must specify the amount to be charged to the credit card and such other information as is necessary to process... authorization to charge fees to a credit card. If credit card information is provided on a form or document...
12 CFR 1026.12 - Special credit card provisions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Special credit card provisions. 1026.12 Section...-End Credit § 1026.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including business, commercial, or agricultural use, no...
Code of Federal Regulations, 2014 CFR
2014-04-01
... identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. 41.32 Section 41.32 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF NONIMMIGRANTS UNDER THE... crossing identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. (a...
Code of Federal Regulations, 2010 CFR
2010-04-01
... identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. 41.32 Section 41.32 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF NONIMMIGRANTS UNDER THE... crossing identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. (a...
Code of Federal Regulations, 2013 CFR
2013-04-01
... identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. 41.32 Section 41.32 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF NONIMMIGRANTS UNDER THE... crossing identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. (a...
Code of Federal Regulations, 2011 CFR
2011-04-01
... identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. 41.32 Section 41.32 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF NONIMMIGRANTS UNDER THE... crossing identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. (a...
Code of Federal Regulations, 2012 CFR
2012-04-01
... identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. 41.32 Section 41.32 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF NONIMMIGRANTS UNDER THE... crossing identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. (a...
Leshchiner, Elizaveta S; Rush, Jason S; Durney, Michael A; Cao, Zhifang; Dančík, Vlado; Chittick, Benjamin; Wu, Huixian; Petrone, Adam; Bittker, Joshua A; Phillips, Andrew; Perez, Jose R; Shamji, Alykhan F; Kaushik, Virendar K; Daly, Mark J; Graham, Daniel B; Schreiber, Stuart L; Xavier, Ramnik J
2017-10-24
Advances in human genetics have dramatically expanded our understanding of complex heritable diseases. Genome-wide association studies have identified an allelic series of CARD9 variants associated with increased risk of or protection from inflammatory bowel disease (IBD). The predisposing variant of CARD9 is associated with increased NF-κB-mediated cytokine production. Conversely, the protective variant lacks a functional C-terminal domain and is unable to recruit the E3 ubiquitin ligase TRIM62. Here, we used biochemical insights into CARD9 variant proteins to create a blueprint for IBD therapeutics and recapitulated the mechanism of the CARD9 protective variant using small molecules. We developed a multiplexed bead-based technology to screen compounds for disruption of the CARD9-TRIM62 interaction. We identified compounds that directly and selectively bind CARD9, disrupt TRIM62 recruitment, inhibit TRIM62-mediated ubiquitinylation of CARD9, and demonstrate cellular activity and selectivity in CARD9-dependent pathways. Taken together, small molecules targeting CARD9 illustrate a path toward improved IBD therapeutics. Published under the PNAS license.
Rappaport, Noa; Fishilevich, Simon; Nudel, Ron; Twik, Michal; Belinky, Frida; Plaschkes, Inbar; Stein, Tsippi Iny; Cohen, Dana; Oz-Levi, Danit; Safran, Marilyn; Lancet, Doron
2017-08-18
A key challenge in the realm of human disease research is next generation sequencing (NGS) interpretation, whereby identified filtered variant-harboring genes are associated with a patient's disease phenotypes. This necessitates bioinformatics tools linked to comprehensive knowledgebases. The GeneCards suite databases, which include GeneCards (human genes), MalaCards (human diseases) and PathCards (human pathways) together with additional tools, are presented with the focus on MalaCards utility for NGS interpretation as well as for large scale bioinformatic analyses. VarElect, our NGS interpretation tool, leverages the broad information in the GeneCards suite databases. MalaCards algorithms unify disease-related terms and annotations from 69 sources. Further, MalaCards defines hierarchical relatedness-aliases, disease families, a related diseases network, categories and ontological classifications. GeneCards and MalaCards delineate and share a multi-tiered, scored gene-disease network, with stringency levels, including the definition of elite status-high quality gene-disease pairs, coming from manually curated trustworthy sources, that includes 4500 genes for 8000 diseases. This unique resource is key to NGS interpretation by VarElect. VarElect, a comprehensive search tool that helps infer both direct and indirect links between genes and user-supplied disease/phenotype terms, is robustly strengthened by the information found in MalaCards. The indirect mode benefits from GeneCards' diverse gene-to-gene relationships, including SuperPaths-integrated biological pathways from 12 information sources. We are currently adding an important information layer in the form of "disease SuperPaths", generated from the gene-disease matrix by an algorithm similar to that previously employed for biological pathway unification. This allows the discovery of novel gene-disease and disease-disease relationships. The advent of whole genome sequencing necessitates capacities to go beyond protein coding genes. GeneCards is highly useful in this respect, as it also addresses 101,976 non-protein-coding RNA genes. In a more recent development, we are currently adding an inclusive map of regulatory elements and their inferred target genes, generated by integration from 4 resources. MalaCards provides a rich big-data scaffold for in silico biomedical discovery within the gene-disease universe. VarElect, which depends significantly on both GeneCards and MalaCards power, is a potent tool for supporting the interpretation of wet-lab experiments, notably NGS analyses of disease. The GeneCards suite has thus transcended its 2-decade role in biomedical research, maturing into a key player in clinical investigation.
Sex of respondent and credit attitudes as predictors of credit card use and debt payment.
McCall, Michael; Eckrich, Donald W
2006-06-01
Researchers have suggested there may be sex differences in attitudes towards credit card possession and use. Undergraduates, 41 men and 41 women, completed a survey regarding their attitudes towards credit, credit card use, and repayment. Analysis indicated sex played a significant moderating role between number of credit cards used and the importance of paying off monthly balances. Women possessed more credit cards than men and engaged in more frequent shopping. Number of credit cards increased with paying off of monthly balances. Data are discussed in terms of the importance of managing credit card debt in an increasingly cashless society.
Victorian era esthetic and restorative dentistry: an advertising trade card gallery.
Croll, Theodore P; Swanson, Ben Z
2006-01-01
A chief means of print advertising in the Victorian era was the "trade card." Innumerable products, companies, and services were highlighted on colorful chromolithographic trade cards, and these became desirable collectible objects which were pasted into scrapbooks and enjoyed by many families. Dentistry- and oral health-related subjects were often depicted on Victorian trade cards, and esthetic and restorative dentistry themes were featured. This review describes the history of advertising trade cards and offers a photographic gallery of dentistry-related cards of the era.
Harvey, R; Foulds, L; Housden, T; Bennett, K A; Falzon, D; McNarry, A F; Graham, C
2017-03-01
Significant benefits have been demonstrated with the use of peri-operative checklists. We assessed whether a read-aloud didactic action card would improve performance of cannula cricothyroidotomy in a simulated 'can't intubate, can't oxygenate' scenario. A 17-step action card was devised by an expert panel. Participants in their first 4 years of anaesthetic training were randomly assigned into 'no-card' or 'card' groups. Scenarios were video-recorded for analysis. Fifty-three participants (27 no-card and 26 card) completed the scenario. The number of steps omitted was mean (SD) 6.7 (2.0) in the no-card group vs. 0.3 (0.5); p < 0.001 in the card group, but the no-card group was faster to oxygenation by mean (95% CI) 35.4 (6.6-64.2) s. The Kappa statistic was 0.84 (0.73-0.95). Our study demonstrated that action cards are beneficial in achieving successful front-of-neck access using a cannula cricothyroidotomy technique. Further investigation is required to determine this tool's effectiveness in other front-of-neck access situations, and its role in teaching or clinical management. © 2016 The Association of Anaesthetists of Great Britain and Ireland.
Personal medical information system using laser card
NASA Astrophysics Data System (ADS)
Cho, Seong H.; Kim, Keun Ho; Choi, Hyung-Sik; Park, Hyun Wook
1996-04-01
The well-known hospital information system (HIS) and the picture archiving and communication system (PACS) are typical applications of multimedia to medical area. This paper proposes a personal medical information save-and-carry system using a laser card. This laser card is very useful, especially in emergency situations, because the medical information in the laser card can be read at anytime and anywhere if there exists a laser card reader/writer. The contents of the laser card include the clinical histories of a patient such as clinical chart, exam result, diagnostic reports, images, and so on. The purpose of this system is not a primary diagnosis, but emergency reference of clinical history of the patient. This personal medical information system consists of a personal computer integrated with laser card reader/writer, color frame grabber, color CCD camera and a high resolution image scanner optionally. Window-based graphical user interface was designed for easy use. The laser card has relatively sufficient capacity to store the personal medical information, and has fast access speed to restore and load the data with a portable size as compact as a credit card. Database items of laser card provide the doctors with medical data such as laser card information, patient information, clinical information, and diagnostic result information.
12 CFR 334.91 - Duties of card issuers regarding changes of address.
Code of Federal Regulations, 2010 CFR
2010-01-01
... STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.91 Duties of card issuers regarding changes of address. (a) Scope. This section applies to an issuer of a debit or credit card (card... been issued a credit or debit card. (2) Clear and conspicuous means reasonably understandable and...
12 CFR 41.91 - Duties of card issuers regarding changes of address.
Code of Federal Regulations, 2010 CFR
2010-01-01
... FAIR CREDIT REPORTING Identity Theft Red Flags § 41.91 Duties of card issuers regarding changes of address. (a) Scope. This section applies to an issuer of a debit or credit card (card issuer) that is a... means a consumer who has been issued a credit or debit card. (2) Clear and conspicuous means reasonably...
31 CFR 548.409 - Credit extended and cards issued by U.S. financial institutions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... SANCTIONS REGULATIONS Interpretations § 548.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...
41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.
Code of Federal Regulations, 2010 CFR
2010-07-01
.... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...
31 CFR 588.409 - Credit extended and cards issued by U.S. financial institutions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... BALKANS STABILIZATION REGULATIONS Interpretations § 588.409 Credit extended and cards issued by U.S... not limited to, charge cards, debit cards, or other credit facilities issued by a U.S. financial...
31 CFR 598.409 - Credit extended and cards issued by U.S. financial institutions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... NARCOTICS KINGPIN SANCTIONS REGULATIONS Interpretations § 598.409 Credit extended and cards issued by U.S... existing credit agreements, including, but not limited to, charge cards, debit cards, or other credit...
31 CFR 593.409 - Credit extended and cards issued by U.S. financial institutions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... LIBERIAN REGIME OF CHARLES TAYLOR SANCTIONS REGULATIONS Interpretations § 593.409 Credit extended and cards..., including, but not limited to, charge cards, debit cards, or other credit facilities issued by a U.S...
37 CFR 2.207 - Methods of payment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... credit card, except for replenishing a deposit account. Payment of a fee by credit card must specify the amount to be charged to the credit card and such other information as is necessary to process the charge... fees to a credit card. If credit card information is provided on a form or document other than a form...
12 CFR 717.91 - Duties of card issuers regarding changes of address.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.91 Duties of card issuers regarding changes of address. (a) Scope. This section applies to an issuer of a debit or credit card (card... means a member who has been issued a credit or debit card. (2) Clear and conspicuous means reasonably...
31 CFR 594.410 - Credit extended and cards issued by U.S. financial institutions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... TERRORISM SANCTIONS REGULATIONS Interpretations § 594.410 Credit extended and cards issued by U.S. financial... agreements, including, but not limited to, charge cards, debit cards, or other credit facilities issued by a...
31 CFR 542.409 - Credit extended and cards issued by U.S. financial institutions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... SANCTIONS REGULATIONS Interpretations § 542.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...
12 CFR 571.91 - Duties of card issuers regarding changes of address.
Code of Federal Regulations, 2010 CFR
2010-01-01
... FAIR CREDIT REPORTING Identity Theft Red Flags § 571.91 Duties of card issuers regarding changes of address. (a) Scope. This section applies to an issuer of a debit or credit card (card issuer) that is a... consumer who has been issued a credit or debit card. (2) Clear and conspicuous means reasonably...
31 CFR 547.409 - Credit extended and cards issued by U.S. financial institutions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... DEMOCRATIC REPUBLIC OF THE CONGO SANCTIONS REGULATIONS Interpretations § 547.409 Credit extended and cards..., including, but not limited to, charge cards, debit cards, or other credit facilities issued by a U.S...
31 CFR 536.409 - Credit extended and cards issued by U.S. financial institutions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... NARCOTICS TRAFFICKING SANCTIONS REGULATIONS Interpretations § 536.409 Credit extended and cards issued by U... any existing credit agreements, including, but not limited to, charge cards, debit cards, or other...
The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand
ERIC Educational Resources Information Center
Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David
2010-01-01
The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year…
Vibration Damping Circuit Card Assembly
NASA Technical Reports Server (NTRS)
Hunt, Ronald Allen (Inventor)
2016-01-01
A vibration damping circuit card assembly includes a populated circuit card having a mass M. A closed metal container is coupled to a surface of the populated circuit card at approximately a geometric center of the populated circuit card. Tungsten balls fill approximately 90% of the metal container with a collective mass of the tungsten balls being approximately (0.07) M.
37 CFR 2.207 - Methods of payment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... credit card, except for replenishing a deposit account. Payment of a fee by credit card must specify the amount to be charged to the credit card and such other information as is necessary to process the charge... fees to a credit card. If credit card information is provided on a form or document other than a form...
41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.
Code of Federal Regulations, 2011 CFR
2011-01-01
.... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...
41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.
Code of Federal Regulations, 2012 CFR
2012-01-01
.... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...
41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.
Code of Federal Regulations, 2013 CFR
2013-07-01
.... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...
12 CFR Rules for Card Issuers That... - by-Transaction Basis
Code of Federal Regulations, 2013 CFR
2013-01-01
... Credit Card Accounts and Open-End Credit Offered to College Students Reevaluation of rate increases. Pt... provisions of Subpart B apply if credit cards are issued and the card issuer and the seller are the same or... creditor have an agreement authorizing the seller to honor the creditor's credit card. 1. Section 226.6(a...
41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.
Code of Federal Regulations, 2014 CFR
2014-01-01
.... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...
37 CFR 2.207 - Methods of payment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... credit card, except for replenishing a deposit account. Payment of a fee by credit card must specify the amount to be charged to the credit card and such other information as is necessary to process the charge... fees to a credit card. If credit card information is provided on a form or document other than a form...
37 CFR 2.207 - Methods of payment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... credit card, except for replenishing a deposit account. Payment of a fee by credit card must specify the amount to be charged to the credit card and such other information as is necessary to process the charge... fees to a credit card. If credit card information is provided on a form or document other than a form...
Swamydas, Muthulekha; Rodriguez, Carlos A.; Lim, Jean K.; Mendez, Laura M.; Fink, Danielle L.; Hsu, Amy P.; Zhai, Bing; Karauzum, Hatice; Mikelis, Constantinos M.; Rose, Stacey R.; Ferre, Elise M. N.; Yockey, Lynne; Lemberg, Kimberly; Kuehn, Hye Sun; Rosenzweig, Sergio D.; Lin, Xin; Chittiboina, Prashant; Datta, Sandip K.; Belhorn, Thomas H.; Weimer, Eric T.; Hernandez, Michelle L.; Hohl, Tobias M.; Kuhns, Douglas B.; Lionakis, Michail S.
2015-01-01
Candida is the most common human fungal pathogen and causes systemic infections that require neutrophils for effective host defense. Humans deficient in the C-type lectin pathway adaptor protein CARD9 develop spontaneous fungal disease that targets the central nervous system (CNS). However, how CARD9 promotes protective antifungal immunity in the CNS remains unclear. Here, we show that a patient with CARD9 deficiency had impaired neutrophil accumulation and induction of neutrophil-recruiting CXC chemokines in the cerebrospinal fluid despite uncontrolled CNS Candida infection. We phenocopied the human susceptibility in Card9 -/- mice, which develop uncontrolled brain candidiasis with diminished neutrophil accumulation. The induction of neutrophil-recruiting CXC chemokines is significantly impaired in infected Card9 -/- brains, from both myeloid and resident glial cellular sources, whereas cell-intrinsic neutrophil chemotaxis is Card9-independent. Taken together, our data highlight the critical role of CARD9-dependent neutrophil trafficking into the CNS and provide novel insight into the CNS fungal susceptibility of CARD9-deficient humans. PMID:26679537
Two sets of business card-sized lists of tips for prevention of bed bug infestations, one for general use around home, the other for travelers. Print a single card or a page of cards for distribution.
International images: business cards.
Gaston, S; Pucci, J
1991-01-01
Nursing specialists engage in a variety of international professional activities. Business cards are an important aspect of establishing a professional image. This article presents recommended business card contents, international etiquette, card design and production, and cared innovations.
British and American attitudes toward credit cards.
Yang, Bijou; James, Simon; Lester, David
2006-04-01
American university students owned more than twice as many credit cards as British university students. However, scores on a credit card attitude scale predicted the number of cards owned by respondents in both countries.
van der Ham, Alida J; Voskes, Yolande; van Kempen, Nel; Broerse, Jacqueline E W; Widdershoven, Guy A M
2013-06-01
The crisis card is a specific form of psychiatric advance directive, documenting mental clients' treatment preferences in advance of a potential psychiatric crisis. In this paper, we aim to provide insight into implementation issues surrounding the crisis card. A Dutch crisis-card project formed the scope of this study. Data were collected through interviews with 15 participants from six stakeholder groups. Identified implementation issues are: (a) The role of the crisis-card counselor, (b) lack of distribution and familiarity, (c) care professionals' routines, and (d) client readiness. The crisis-card counselor appears to play a key role in fostering benefits of the crisis card by supporting clients' perspectives. More structural integration of the crisis card in care processes may enhance its impact, but should be carefully explored. (PsycINFO Database Record (c) 2013 APA, all rights reserved).
Mitsunaga, Erin M
2006-05-01
During the Korean War, International Business Machines (IBM) punch cards were created for every individual involved in military combat. Each card contained all pertinent personal information about the individual and was utilized to keep track of all soldiers involved. However, at present, all of the information known about these punch cards reveals only their format and their significance; there is little to no information on how these cards were created or how to interpret the information contained without the aid of the computer system used during the war. Today, it is believed there is no one available to explain this computerized system, nor do the original computers exist. This decode strategy is the result of an attempt to decipher the information on these cards through the use of all available medical and dental records for each individual examined. By cross-referencing the relevant personal information with the known format of the cards, a basic guess-and-check method was utilized. After examining hundreds of IBM punch cards, however, it has become clear that the punch card method of recording information was not infallible. In some cases, there are gaps of information on cards where there are data recorded on personal records; in others, information is punched incorrectly onto the cards, perhaps as the result of a transcription error. Taken all together, it is clear that the information contained on each individual's card should be taken solely as another form of personal documentation.
ERIC Educational Resources Information Center
Porter, Dennis
One recommendation of the 1989 California Strategic Plan for Adult Education is the use of EduCard. EduCard, the Adult Education Access Card, is a means of giving learners access to information about educational opportunities and providing administrators with machine-readable information on learners' prior education and traiing. Three models are:…
Jeu de cartes or Jeu Descartes: Business Cards in a French Course for the Professions.
ERIC Educational Resources Information Center
Gegerias, Mary
This paper discusses the use of French business cards in a college-level French language and culture course for professionals. Among other assignments, students were each given a different card and asked to speak about the design of their card, the business represented, idiomatic expressions and historical allusions on the card, and the use of…
31 CFR 543.409 - Credit extended and cards issued by U.S. financial institutions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U...'IVOIRE SANCTIONS REGULATIONS Interpretations § 543.409 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...
12 CFR 222.91 - Duties of card issuers regarding changes of address.
Code of Federal Regulations, 2010 CFR
2010-01-01
... described in § 222.90(a) that issues a debit or credit card (card issuer). (b) Definitions. For purposes of this section: (1) Cardholder means a consumer who has been issued a credit or debit card. (2) Clear and... notification of a change of address for a consumer's debit or credit card account and, within a short period of...
31 CFR 541.408 - Credit extended and cards issued by U.S. financial institutions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... ZIMBABWE SANCTIONS REGULATIONS Interpretations § 541.408 Credit extended and cards issued by U.S. financial..., charge cards, debit cards, or other credit facilities issued by a U.S. financial institution to a person...
16 CFR 681.2 - Duties of card issuers regarding changes of address.
Code of Federal Regulations, 2010 CFR
2010-01-01
... applies to a person described in § 681.1(a) that issues a debit or credit card (card issuer). (b... of address if it receives notification of a change of address for a consumer's debit or credit card... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Duties of card issuers regarding changes of...
49 CFR 375.221 - May I use a charge or credit card plan for payments?
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 5 2010-10-01 2010-10-01 false May I use a charge or credit card plan for... card plan for payments? (a) You may provide in your tariff for the acceptance of charge or credit cards for the payment of freight charges. Accepting charge or credit card payments is different than...
49 CFR 375.221 - May I use a charge or credit card plan for payments?
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 5 2013-10-01 2013-10-01 false May I use a charge or credit card plan for... card plan for payments? (a) You may provide in your tariff for the acceptance of charge or credit cards for the payment of freight charges. Accepting charge or credit card payments is different than...
49 CFR 375.221 - May I use a charge or credit card plan for payments?
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 5 2012-10-01 2012-10-01 false May I use a charge or credit card plan for... card plan for payments? (a) You may provide in your tariff for the acceptance of charge or credit cards for the payment of freight charges. Accepting charge or credit card payments is different than...
49 CFR 375.221 - May I use a charge or credit card plan for payments?
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 5 2014-10-01 2014-10-01 false May I use a charge or credit card plan for... card plan for payments? (a) You may provide in your tariff for the acceptance of charge or credit cards for the payment of freight charges. Accepting charge or credit card payments is different than...
49 CFR 375.221 - May I use a charge or credit card plan for payments?
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 5 2011-10-01 2011-10-01 false May I use a charge or credit card plan for... card plan for payments? (a) You may provide in your tariff for the acceptance of charge or credit cards for the payment of freight charges. Accepting charge or credit card payments is different than...
MalaCards: an integrated compendium for diseases and their annotation
Rappaport, Noa; Nativ, Noam; Stelzer, Gil; Twik, Michal; Guan-Golan, Yaron; Iny Stein, Tsippi; Bahir, Iris; Belinky, Frida; Morrey, C. Paul; Safran, Marilyn; Lancet, Doron
2013-01-01
Comprehensive disease classification, integration and annotation are crucial for biomedical discovery. At present, disease compilation is incomplete, heterogeneous and often lacking systematic inquiry mechanisms. We introduce MalaCards, an integrated database of human maladies and their annotations, modeled on the architecture and strategy of the GeneCards database of human genes. MalaCards mines and merges 44 data sources to generate a computerized card for each of 16 919 human diseases. Each MalaCard contains disease-specific prioritized annotations, as well as inter-disease connections, empowered by the GeneCards relational database, its searches and GeneDecks set analyses. First, we generate a disease list from 15 ranked sources, using disease-name unification heuristics. Next, we use four schemes to populate MalaCards sections: (i) directly interrogating disease resources, to establish integrated disease names, synonyms, summaries, drugs/therapeutics, clinical features, genetic tests and anatomical context; (ii) searching GeneCards for related publications, and for associated genes with corresponding relevance scores; (iii) analyzing disease-associated gene sets in GeneDecks to yield affiliated pathways, phenotypes, compounds and GO terms, sorted by a composite relevance score and presented with GeneCards links; and (iv) searching within MalaCards itself, e.g. for additional related diseases and anatomical context. The latter forms the basis for the construction of a disease network, based on shared MalaCards annotations, embodying associations based on etiology, clinical features and clinical conditions. This broadly disposed network has a power-law degree distribution, suggesting that this might be an inherent property of such networks. Work in progress includes hierarchical malady classification, ontological mapping and disease set analyses, striving to make MalaCards an even more effective tool for biomedical research. Database URL: http://www.malacards.org/ PMID:23584832
Factors Determining Availability, Utilization and Retention of Child Health Card in Western Nepal.
Paudel, K P; Bajracharya, D C; Karki, K; K C, A
2016-05-01
The immunization card is revised with addition of general information about child health and is later called as child health card. This card is a tool used by Health Management Information System in Nepal. It is important for tracking the records of immunization. Aim is to identify the factors determining the availability, utilization and retention of the child health card in Western Nepal. A cross sectional study was conducted among mothers having children < 24 months old from Gorkha (Western Hill) and Nawalparasi (Western Terai) districts. The sample size for the study was 600 and systematic random sampling was used to select the mothers having less than 24 months old children. Data entry and analysis was done by using SPSS. Qualitative data was analyzed by making matrix. The average age of respondents was 24 years. The majority of respondents have gained higher level education. Retention of the card was found to be 82.2%. 90.3% retention was seen among 0-12 months children age group whereas it was 74 % among12 to 24 months age group. The reasons for less retention were torn by the child/played by child (54.6%) followed by lack of proper place,unaware about importance and poor quality of card.The new child health cards were insufficient, compelling use of both new and old cards which created problem in consistency. Regarding utilization of child health card, it was found to be used for birth registration and for further studies in abroad. The areas of utilization of child health card should be broadened so that the retention of card can be increased. The main reasons for less retention of the card are torn by children and lack of the proper place.
19. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., ...
19. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., PELLON LAND WORKS, HALIFAX, ENGLAND, SN #M2983 14 (EST. DATE 1940'S+). - Bamberg Cotton Mill, Main Street, Bamberg, Bamberg County, SC
High-density, fail-in-place switches for computer and data networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coteus, Paul W.; Doany, Fuad E.; Hall, Shawn A.
A structure for a network switch. The network switch may include a plurality of spine chips arranged on a plurality of spine cards, where one or more spine chips are located on each spine card; and a plurality of leaf chips arranged on a plurality of leaf cards, wherein one or more leaf chips are located on each leaf card, where each spine card is connected to every leaf chip and the plurality of spine chips are surrounded on at least two sides by leaf cards.
Health care report cards: what about consumers' perspectives?
McGee, J; Knutson, D
1994-10-01
Though the report card style is seen by many as a way to create better-informed consumers, very little is actually known about how consumers will respond to health care report cards. Report cards are only one of many factors that influence health care decision making. Much consumer-oriented effort and fine-tuning will be required to make report cards effective. Using the approach called "social marketing" as a framework, specific examples are used to outline some ideas for more intensive pursuit of consumers' perspectives in the design and distribution of report cards.
Pradhan, Sukanta Kumar; De, Sachinandan
2017-01-01
The nucleotide-binding and oligomerization domain (NOD)-containing protein 1 (NOD1) plays the pivotal role in host-pathogen interface of innate immunity and triggers immune signalling pathways for the maturation and release of pro-inflammatory cytokines. Upon the recognition of iE-DAP, NOD1 self-oligomerizes in an ATP-dependent fashion and interacts with adaptor molecule receptor-interacting protein 2 (RIP2) for the propagation of innate immune signalling and initiation of pro-inflammatory immune responses. This interaction (mediated by NOD1 and RIP2) helps in transmitting the downstream signals for the activation of NF-κB signalling pathway, and has been arbitrated by respective caspase-recruitment domains (CARDs). The so-called CARD-CARD interaction still remained contradictory due to inconsistent results. Henceforth, to understand the mode and the nature of the interaction, structural bioinformatics approaches were employed. MD simulation of modelled 1:1 heterodimeric complexes revealed that the type-Ia interface of NOD1CARD and the type-Ib interface of RIP2CARD might be the suitable interfaces for the said interaction. Moreover, we perceived three dynamically stable heterotrimeric complexes with an NOD1:RIP2 ratio of 1:2 (two numbers) and 2:1. Out of which, in the first trimeric complex, a type-I NOD1-RIP2 heterodimer was found interacting with an RIP2CARD using their type-IIa and IIIa interfaces. However, in the second and third heterotrimer, we observed type-I homodimers of NOD1 and RIP2 CARDs were interacting individually with RIP2CARD and NOD1CARD (in type-II and type-III interface), respectively. Overall, this study provides structural and dynamic insights into the NOD1-RIP2 oligomer formation, which will be crucial in understanding the molecular basis of NOD1-mediated CARD-CARD interaction in higher and lower eukaryotes. PMID:28114344
Helping Students Design HyperCard Stacks.
ERIC Educational Resources Information Center
Dunham, Ken
1995-01-01
Discusses how to teach students to design HyperCard stacks. Highlights include introducing HyperCard, developing storyboards, introducing design concepts and scripts, presenting stacks, evaluating storyboards, and continuing projects. A sidebar presents a HyperCard stack evaluation form. (AEF)
20. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., ...
20. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., PELLON LAND WORKS, HALIFAX, ENGLAND, SN #M2983 14 (EST. DATE 1940'S+), OPPOSITE END - Bamberg Cotton Mill, Main Street, Bamberg, Bamberg County, SC
Thermal transfer structures coupling electronics card(s) to coolant-cooled structure(s)
David, Milnes P; Graybill, David P; Iyengar, Madhusudan K; Kamath, Vinod; Kochuparambil, Bejoy J; Parida, Pritish R; Schmidt, Roger R
2014-12-16
Cooling apparatuses and coolant-cooled electronic systems are provided which include thermal transfer structures configured to engage with a spring force one or more electronics cards with docking of the electronics card(s) within a respective socket(s) of the electronic system. A thermal transfer structure of the cooling apparatus includes a thermal spreader having a first thermal conduction surface, and a thermally conductive spring assembly coupled to the conduction surface of the thermal spreader and positioned and configured to reside between and physically couple a first surface of an electronics card to the first surface of the thermal spreader with docking of the electronics card within a socket of the electronic system. The thermal transfer structure is, in one embodiment, metallurgically bonded to a coolant-cooled structure and facilitates transfer of heat from the electronics card to coolant flowing through the coolant-cooled structure.
Klemic, Gladys [Naperville, IL; Bailey, Paul [Chicago, IL; Breheny, Cecilia [Yonkers, NY
2008-09-02
The present invention relates to a citizen's dosimeter. More specifically, the invention relates to a small, portable, personal dosimetry device designed to be used in the wake of a event involving a Radiological Dispersal Device (RDD), Improvised Nuclear Device (IND), or other event resulting in the contamination of large area with radioactive material or where on site personal dosimetry is required. The card sized dosimeter generally comprises: a lower card layer, the lower card body having an inner and outer side; a upper card layer, the layer card having an inner and outer side; an optically stimulated luminescent material (OSLM), wherein the OSLM is sandwiched between the inner side of the lower card layer and the inner side of the upper card layer during dosimeter radiation recording, a shutter means for exposing at least one side of the OSLM for dosimeter readout; and an energy compensation filter attached to the outer sides of the lower and upper card layers.
Wada, Kazushige; Nittono, Hiroshi
2004-06-01
The reasoning process in the Wason selection task was examined by measuring card inspection times in the letter-number and drinking-age problems. 24 students were asked to solve the problems presented on a computer screen. Only the card touched with a mouse pointer was visible, and the total exposure time of each card was measured. Participants were allowed to cancel their previous selections at any time. Although rethinking was encouraged, the cards once selected were rarely cancelled (10% of the total selections). Moreover, most of the cancelled cards were reselected (89% of the total cancellations). Consistent with previous findings, inspection times were longer for selected cards than for nonselected cards. These results suggest that card selections are determined largely by initial heuristic processes and rarely reversed by subsequent analytic processes. The present study gives further support for the heuristic-analytic dual process theory.
Reminder card helps patients remember OCs.
1999-11-01
Organon has developed the Reminder Card to help women patients remember their regular intake of oral contraceptive (OC) pills. About 50% of women take birth control pills as prescribed, 25% miss a pill per month, and 25% miss two or more pills in the same time frame. The plastic card, about the size and shape of a credit card, contains a microchip timer. Reminder cards are available to providers who use the Starter Kits issued by the company for new-start patients on the Mircette OC. When patients begin their first pack of pills, they select the time of day they prefer to have the Reminder Card emit its tiny beep. The time is set into the microchip timer and the card is programmed to sound automatically at the pre-set time each day for the next three months. The direction for using the Reminder Card is outlined.
Easy robot programming for beginners and kids using augmented reality environments
NASA Astrophysics Data System (ADS)
Sakamoto, Kunio; Nishiguchi, Masahiro
2010-11-01
The authors have developed the mobile robot which can be programmed by command and instruction cards. All you have to do is to arrange cards on a table and to shot the programming stage by a camera. Our card programming system recognizes instruction cards and translates icon commands into the motor driver program. This card programming environment also provides low-level structure programming.
Code of Federal Regulations, 2010 CFR
2010-01-01
... provisions of Subpart B apply if credit cards are issued and (1) the card issuer and the seller are the same... 226.10. Section 226.11. This section applies when a card issuer receives a payment or other credit... Bill on a Transaction-by-Transaction Basis The following provisions of Subpart B apply if credit cards...
Launch Pad Coatings for Smart Corrosion Control
NASA Technical Reports Server (NTRS)
Calle, Luz M.; Hintze, Paul E.; Bucherl, Cori N.; Li, Wenyan; Buhrow, Jerry W.; Curran, Jerome P.; Whitten, Mary C.
2010-01-01
Corrosion is the degradation of a material as a result of its interaction with the environment. The environment at the KSC launch pads has been documented by ASM International (formerly American Society for Metals) as the most corrosive in the US. The 70 tons of highly corrosive hydrochloric acid that are generated by the solid rocket boosters during a launch exacerbate the corrosiveness of the environment at the pads. Numerous failures at the pads are caused by the pitting of stainless steels, rebar corrosion, and the degradation of concrete. Corrosion control of launch pad structures relies on the use of coatings selected from the qualified products list (QPL) of the NASA Standard 5008A for Protective Coating of Carbon Steel, Stainless Steel, and Aluminum on Launch Structures, Facilities, and Ground Support Equipment. This standard was developed to establish uniform engineering practices and methods and to ensure the inclusion of essential criteria in the coating of ground support equipment (GSE) and facilities used by or for NASA. This standard is applicable to GSE and facilities that support space vehicle or payload programs or projects and to critical facilities at all NASA locations worldwide. Environmental regulation changes have dramatically reduced the production, handling, use, and availability of conventional protective coatings for application to KSC launch structures and ground support equipment. Current attrition rate of qualified KSC coatings will drastically limit the number of commercial off the shelf (COTS) products available for the Constellation Program (CxP) ground operations (GO). CxP GO identified corrosion detection and control technologies as a critical, initial capability technology need for ground processing of Ares I and Ares V to meet Constellation Architecture Requirements Document (CARD) CxP 70000 operability requirements for reduced ground processing complexity, streamlined integrated testing, and operations phase affordability. Researchers at NASA's Corrosion Technology Laboratory at KSC are developing a smart, environmentally friendly coating system for early corrosion detection, inhibition, and self healing of mechanical damage without external intervention. This smart coating will detect and respond actively to corrosion and mechanical damage such as abrasion and scratches, in a functional and predictable manner, and will be capable of adapting its properties dynamically. This coating is being developed using corrosion sensitive microcapsules that deliver the contents of their core (corrosion inhibiting compounds, corrosion indicators, and self healing agents) on demand when corrosion or mechanical damage to the coating occurs.
Krishnamurthy, Vani; Satish, Suchitha; Doreswamy, Srinivasa Murthy; Vimalambike, Manjunath Gubbanna
2016-07-01
Cytological evaluation of body fluids is an important diagnostic technique. Cytocentrifuge has contributed immensely to improve the diagnostic yield of the body fluids. Cytocentrifuge requires a filter card for absorbing the cell free fluid. This is the only consumable which needs to be purchased from the manufacturer at a significant cost. To compare the cell density in cytocentrifuge preparations made from commercially available filter cards with custom made filter cards. This was a prospective analytical study undertaken in department of pathology of a tertiary care centre. A 300 GSM handmade paper with the absorbability similar to the conventional card was obtained and fashioned to suit the filter card slot of the cytospin. Thirty seven body fluids were centrifuged using both conventional and custom made filter card. The cell density was measured as number of cells per 10 high power fields. The median cell density was compared using Mann-Whitney U test. The agreement between the values was analysed using Bland Altman analysis. The median cell count per 10 High power field (HPF) with conventional card was 386 and that with custom made card was 408. The difference was not statistically significant (p = 0.66). There was no significant difference in the cell density and alteration in the morphology between the cell preparations using both the cards. Custom made filter card can be used for cytospin cell preparations of body fluids without loss of cell density or alteration in the cell morphology and at a very low cost.
48 CFR 413.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2010 CFR
2010-10-01
... purchase card. 413.301 Section 413.301 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE....301 Governmentwide commercial purchase card. USDA policy and procedures on use of the Governmentwide commercial purchase card are established in Departmental Regulation Series 5000. ...
Engineering software development with HyperCard
NASA Technical Reports Server (NTRS)
Darko, Robert J.
1990-01-01
The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.
Mammography screening credit card and compliance.
Schapira, D V; Kumar, N B; Clark, R A; Yag, C
1992-07-15
Screening for breast cancer using mammography has been shown to be effective in reducing mortality from breast cancer. The authors attempted to determine if use of a wallet-size plastic screening "credit" card would increase participants' compliance for subsequent mammograms when compared with traditional methods of increasing compliance. Two hundred and twenty consecutive women, ages 40-70 years, undergoing their first screening mammography were recruited and assigned randomly to four groups receiving (1) a reminder plastic credit card (2) reminder credit card with written reminder; (3) appointment card; and (4) verbal recommendation. Return rates of the four groups were determined after 15 months. The return rate for subsequent mammograms was significantly higher for participants (72.4%) using the credit card than for participants (39.8%) exposed to traditional encouragement/reminders (P less than 0.0001). The credit card was designed to show the participant's screening anniversary, and the durability of the card may have been a factor in increasing the return rate. The use of reminder credit cards may increase compliance for periodic screening examinations for other cancers and other chronic diseases.
Making a Smart Campus in Saudi Arabia
ERIC Educational Resources Information Center
Abuelyaman, Eltayab Salih
2008-01-01
Prince Sultan University (PSU) in Riyadh, Saudi Arabia, has conceptualized what it means to be a smart campus after surveying similar notions worldwide. A "smart" campus requires smart teachers, smart technology, and smart pedagogical centers. It deploys smart teachers and gives them smart tools and ongoing support to do their jobs…
Research on the SIM card implementing functions of transport card
NASA Astrophysics Data System (ADS)
Li, Yi; Wang, Lin
2015-12-01
This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.
48 CFR 1313.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2010 CFR
2010-10-01
... purchase card. 1313.301 Section 1313.301 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE....301 Governmentwide commercial purchase card. The Department's procedures for the use and control of the Governmentwide commercial purchase card are set forth in CAM 1313.301. ...
Print a Bed Bug Card - (Single Cards)
Two sets of business-card-sized lists of tips for recognizing bed bugs and the signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.
75 FR 55392 - Employment Network Report Card
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-10
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0046] Employment Network Report Card AGENCY... quality assurance, including a ticket consumer Employment Network Report Card. SUMMARY: We are soliciting... this goal by combining a user-friendly EN Report Card, which contains customer satisfaction feedback...
12 CFR Appendix E - Rules for Card Issuers That Bill on a Transaction-by-Transaction Basis
Code of Federal Regulations, 2014 CFR
2014-01-01
... to Credit Card Accounts and Open-End Credit Offered to College Students Reevaluation of rate... The following provisions of Subpart B apply if credit cards are issued and the card issuer and the... credit card. 1. Section 226.6(a)(5) or § 226.6(b)(5)(iii). 2. Section 226.6(a)(2) or § 226.6(b)(3)(ii)(B...
Reconstruction of Sea State One
1988-02-01
this section only a general overview of the wave computer system will be offered. A more comprehensive treatment of this subject is available in Appendix...1) Sync Strip and Threshold Processing Card (2) Pulse Generation Logic Card (3) X Vector Logic Card (4) Y Vector Logic Card (5) Blanking Interval...output by this comparator when the threshold is crossed, which shall be referred to as threshold crossing (THC). (2) PULSE GENERATION LOGIC CARD Turning
Determinants of debit cards acceptance: An empirical investigation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar
These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300more » respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.« less
Determinants of debit cards acceptance: An empirical investigation
NASA Astrophysics Data System (ADS)
Ismail, Shafinar; Bakri, Mohamed Hariri; Zulkepli, Jafri; Adnan, Azimah; Azizi, Amsyar
2014-12-01
These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.
de Diego, Rebeca Pérez; Sánchez-Ramón, Silvia; López-Collazo, Eduardo; Martínez-Barricarte, Rubén; Cubillos-Zapata, Carolina; Cerdán, Antonio Ferreira; Casanova, Jean-Laurent; Puel, Anne
2016-01-01
Three members of the caspase recruitment domain (CARD) family of adaptors (CARD9, CARD10, and CARD11) are known to form heterotrimers with B-cell lymphoma 10 (BCL10) and mucosa-associated lymphoid tissue lymphoma-translocation gene 1 (MALT1). These three CARD-BCL10-MALT1 (CBM) complexes activate NF-κB in both the innate and adaptive arms of immunity. Human inherited defects of the three components of the CBM complex, including the two adaptors CARD9 and CARD11 and the two core components BCL10 and MALT1, have recently been reported. Bi-allelic loss-of-function (LOF) mutant alleles underlie several different immunological and clinical phenotypes, which can be assigned to two distinct categories. Isolated invasive fungal infections, of unclear cellular basis, are associated with CARD9 deficiency, whereas a broad range of clinical manifestations, including those characteristic of T- and B-lymphocyte defects, are associated with CARD11, MALT1 and BCL10 deficiencies. Interestingly, humans with these mutations have some features in common with the corresponding knockout mice, but other features are different between humans and mice. Moreover, germline and somatic gain-of-function (GOF) mutations of MALT1, BCL10 and CARD11 have also been found in other patients with lymphoproliferative disorders. This broad range of germline and somatic CBM lesions, including LOF and GOF mutations, highlights the contribution of each of the components of the CBM to human immunity. PMID:26277595
Human Factors Assessment of Respiratory Support Pack (RSP) Cue Card
NASA Technical Reports Server (NTRS)
Whitmore, Mihriban; Hudy, Cynthia; Smith, Danielle; Byrne, Vicky
2005-01-01
The Respiratory Support Pack (RSP) is a medical pack onboard the International Space Station (ISS) that contains much of the necessary equipment for providing aid to a conscious or unconscious crewmember in respiratory distress. Inside the RSP lid pocket is a 5.5 by 11 inch paper cue card, which is used by a Crew Medical Officer as the procedure to set up the equipment and deliver oxygen to a crewmember. In training, crewmembers expressed concerns about the readability and usability of the cue card; consequently, updating the cue card was prioritized as an activity to be completed prior to Space Shuttle return-to-flight. The Usability Testing and Analysis Facility at the Johnson Space Center evaluated the current layout of the cue card, and proposed several new cue card designs based on human factors principals. A series of three studies were performed in order to experimentally compare performance with each of the cue card designs. Nonmedically trained personnel used either a redesigned RSP cue card, or the original card to simulate resuscitation (using a mannequin along with the hardware). Time to completion, errors and subjective ratings were recorded. The addition of pictures, colors, borders, and simplification of the flow of information (making minimal changes to the actual procedure content) elicited great benefits during testing. Time to complete RSP procedures was reduced by as much as three minutes with the final cue card design. Detailed results from these studies, as well as general guidelines for cue card design will be discussed.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-09
... application of section 3402(t) to payments by debit cards, credit cards, stored value cards, and other payment cards. Proposed regulations under sections 3402(t), 3406, 6011, 6051, 6071, and 6302 of the Code were...
Code of Federal Regulations, 2012 CFR
2012-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS Reports Required To Be Made by Operators of Credit Card Systems § 1028.300 General. Operators of credit card systems are... contained in that subpart which apply to operators of credit card systems. ...
48 CFR 2913.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2013 CFR
2013-10-01
... other methods of purchasing. However, the same legal restrictions apply to credit card purchases that.../Agency Purchase/Credit Card Program procedures. A number of the more common restrictions which... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR...
Code of Federal Regulations, 2011 CFR
2011-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS Reports Required To Be Made by Operators of Credit Card Systems § 1028.300 General. Operators of credit card systems are... contained in that subpart which apply to operators of credit card systems. ...
48 CFR 2913.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2014 CFR
2014-10-01
... other methods of purchasing. However, the same legal restrictions apply to credit card purchases that.../Agency Purchase/Credit Card Program procedures. A number of the more common restrictions which... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR...
48 CFR 2913.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2011 CFR
2011-10-01
... other methods of purchasing. However, the same legal restrictions apply to credit card purchases that.../Agency Purchase/Credit Card Program procedures. A number of the more common restrictions which... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR...
Discount medical cards: innovation or illusion?
Kofman, Mila; Libster, Jennifer; Bangit, Eliza
2005-03-01
Discount medical cards have come under increasing scrutiny by regulators and law enforcement officials as a result of mounting consumer-reported problems. For their study, the authors tested five cards available in the Washington, D.C., metro area; interviewed card company representatives, state attorneys general insurance regulators, and insurance agents; and reviewed court and administrative actions. While some cards provide a measure of value, other cards were found to have serious drawbacks, including: high-pressure sales tactics; misleading or inaccurate promotion; exaggerated claims of savings; difficulty finding participating doctors; and providers who failed to give cardholders promised discounts. Some discount card companies are seeking to reform the market through a trade association and voluntary code of conduct. Still, legislative and regulatory interventions will be needed to protect consumers in an unregulated and growing market.
Stange, Madison; Graydon, Candice; Dixon, Mike J
2017-09-01
Previous research into scratch card gambling has highlighted the effects of these games on players' arousal and affective states. Specifically, near-miss outcomes in scratch cards (uncovering 2 of 3 needed jackpot symbols) have been associated with high levels of physiological and subjective arousal and negative emotional evaluations, including increased frustration. We sought to extend this research by examining whether near-misses prompted increases in gambling urge, and the subsequent purchasing of additional scratch cards. Participants played two scratch cards with varying outcomes with half of the sample experiencing a near-miss for the jackpot prize, and the other half experiencing a regular loss. Players rated their urge to continue gambling after each game outcome, and following the initial playing phase, were then able to use their winnings to purchase additional cards. Our results indicated that near-misses increased the urge to gamble significantly more than regular losses, and urge to gamble in the near-miss group was significantly correlated with purchasing at least one additional card. Although some players in the loss group purchased another card, there was no correlation between urge to gamble and purchasing in this group. Additionally, participants in the near-miss group who purchased additional cards reported higher levels of urge than those who did not purchase more cards. This was not true for the loss group: participants who experienced solely losing outcomes reported similar levels of urge regardless of whether or not they purchased more scratch cards. Despite near-misses' objective status as monetary losses, the increased urge that follows near-miss outcomes may translate into further scratch card gambling for a subset of individuals .
Gack, Michaela U.; Kirchhofer, Axel; Shin, Young C.; Inn, Kyung-Soo; Liang, Chengyu; Cui, Sheng; Myong, Sua; Ha, Taekjip; Hopfner, Karl-Peter; Jung, Jae U.
2008-01-01
The caspase recruitment domain (CARD) of intracellular adaptors and sensors plays a critical role in the assembly of signaling complexes involved in innate host defense against pathogens and in the regulation of inflammatory responses. The cytosolic receptor retinoic acid-inducible gene-I (RIG-I) recognizes viral RNA in a 5′-triphosphate-dependent manner and initiates an antiviral signaling cascade. Upon viral infection, the N-terminal CARDs of RIG-I undergo the K63-linked ubiquitination induced by tripartite motif protein 25 (TRIM25), critical for the interaction of RIG-I with its downstream signaling partner MAVS/VISA/IPS-1/Cardif. Here, we demonstrate the distinct roles of RIG-I first and second CARD in TRIM25-mediated RIG-I ubiquitination: TRIM25 binds the RIG-I first CARD and subsequently ubiquitinates its second CARD. The T55I mutation in RIG-I first CARD abolishes TRIM25 interaction, whereas the K172R mutation in the second CARD eliminates polyubiquitin attachment. The necessity of the intact tandem CARD for RIG-I function is further evidenced by a RIG-I splice variant (SV) whose expression is robustly up-regulated upon viral infection. The RIG-I SV carries a short deletion (amino acids 36–80) within the first CARD and thereby loses TRIM25 binding, CARD ubiquitination, and downstream signaling ability. Furthermore, because of its robust inhibition of virus-induced RIG-I multimerization and RIG-I-MAVS signaling complex formation, this SV effectively suppresses the RIG-I-mediated IFN-β production. This study not only elucidates the vital role of the intact tandem CARD for TRIM25-mediated RIG-I activation but also identifies the RIG-I SV as an off-switch regulator of its own signaling pathway. PMID:18948594
Gack, Michaela U; Kirchhofer, Axel; Shin, Young C; Inn, Kyung-Soo; Liang, Chengyu; Cui, Sheng; Myong, Sua; Ha, Taekjip; Hopfner, Karl-Peter; Jung, Jae U
2008-10-28
The caspase recruitment domain (CARD) of intracellular adaptors and sensors plays a critical role in the assembly of signaling complexes involved in innate host defense against pathogens and in the regulation of inflammatory responses. The cytosolic receptor retinoic acid-inducible gene-I (RIG-I) recognizes viral RNA in a 5'-triphosphate-dependent manner and initiates an antiviral signaling cascade. Upon viral infection, the N-terminal CARDs of RIG-I undergo the K(63)-linked ubiquitination induced by tripartite motif protein 25 (TRIM25), critical for the interaction of RIG-I with its downstream signaling partner MAVS/VISA/IPS-1/Cardif. Here, we demonstrate the distinct roles of RIG-I first and second CARD in TRIM25-mediated RIG-I ubiquitination: TRIM25 binds the RIG-I first CARD and subsequently ubiquitinates its second CARD. The T(55)I mutation in RIG-I first CARD abolishes TRIM25 interaction, whereas the K(172)R mutation in the second CARD eliminates polyubiquitin attachment. The necessity of the intact tandem CARD for RIG-I function is further evidenced by a RIG-I splice variant (SV) whose expression is robustly up-regulated upon viral infection. The RIG-I SV carries a short deletion (amino acids 36-80) within the first CARD and thereby loses TRIM25 binding, CARD ubiquitination, and downstream signaling ability. Furthermore, because of its robust inhibition of virus-induced RIG-I multimerization and RIG-I-MAVS signaling complex formation, this SV effectively suppresses the RIG-I-mediated IFN-beta production. This study not only elucidates the vital role of the intact tandem CARD for TRIM25-mediated RIG-I activation but also identifies the RIG-I SV as an off-switch regulator of its own signaling pathway.
Lamas, Bruno; Michel, Marie-Laure; Waldschmitt, Nadine; Pham, Hang-Phuong; Zacharioudaki, Vassiliki; Dupraz, Louise; Delacre, Myriam; Natividad, Jane M; Costa, Gregory Da; Planchais, Julien; Sovran, Bruno; Bridonneau, Chantal; Six, Adrien; Langella, Philippe; Richard, Mathias L; Chamaillard, Mathias; Sokol, Harry
2017-08-08
In association with innate and adaptive immunity, the microbiota controls the colonisation resistance against intestinal pathogens. Caspase recruitment domain 9 ( CARD9 ), a key innate immunity gene, is required to shape a normal gut microbiota. Card9 -/- mice are more susceptible to the enteric mouse pathogen Citrobacter rodentium that mimics human infections with enteropathogenic and enterohaemorrhagic Escherichia coli . Here, we examined how CARD9 controls C. rodentium infection susceptibility through microbiota-dependent and microbiota-independent mechanisms. C. rodentium infection was assessed in conventional and germ-free (GF) wild-type (WT) and Card9 -/- mice. To explore the impact of Card9 -/- microbiota in infection susceptibility, GF WT mice were colonised with WT (WT→GF) or Card9 -/- ( Card9 -/- →GF) microbiota before C. rodentium infection. Microbiota composition was determined by 16S rDNA gene sequencing. Inflammation severity was determined by histology score and lipocalin level. Microbiota-host immune system interactions were assessed by quantitative PCR analysis. CARD9 controls pathogen virulence in a microbiota-independent manner by supporting a specific humoral response. Higher susceptibility to C. rodentium -induced colitis was observed in Card9 -/- →GF mice. The microbiota of Card9 -/- mice failed to outcompete the monosaccharide-consuming C. rodentium , worsening the infection severity. A polysaccharide-enriched diet counteracted the ecological advantage of C. rodentium and the defective pathogen-specific antibody response in Card9 -/- mice. CARD9 modulates the susceptibility to intestinal infection by controlling the pathogen virulence in a microbiota-dependent and microbiota-independent manner. Genetic susceptibility to intestinal pathogens can be overridden by diet intervention that restores humoural immunity and a competing microbiota. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Using Business Cards to Teach Document Design.
ERIC Educational Resources Information Center
Nelson, Ronald J.
1994-01-01
Argues that business cards, as a key means of initiating business contacts, are worth studying in business writing courses. Shows instructors how to incorporate a unit on business card design into their business communications courses. Suggests the criteria by which business cards can be evaluated. (HB)
Info card for surgery waiting room improves satisfaction.
2015-11-01
A hospital is reporting improved patient satisfaction from providing an information card in the surgery department. The card includes expected wait times. The card is provided by the patient transport team. Telephone numbers are included for more information. Staff update family members hourly during surgery.
Follow Up: Credit Card Caution
ERIC Educational Resources Information Center
Cahill, Timothy P.
2007-01-01
In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students…
Print a Bed Bug Card - (Page of Cards)
For mass distribution: two sets of business-card-sized lists of tips for recognizing bed bugs and signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.
Coding the Eggen Cards (Poster abstract)
NASA Astrophysics Data System (ADS)
Silvis, G.
2014-06-01
(Abstract only) A look at the Eggen Portal for accessing the Eggen cards. And a call for volunteers to help code the cards: 100,000 cards must be looked at and their star references identified and coded into the database for this to be a valuable resource.
48 CFR 908.7117 - Tabulating machine cards.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Tabulating machine cards. 908.7117 Section 908.7117 Federal Acquisition Regulations System DEPARTMENT OF ENERGY COMPETITION... Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...
48 CFR 908.7117 - Tabulating machine cards.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Tabulating machine cards. 908.7117 Section 908.7117 Federal Acquisition Regulations System DEPARTMENT OF ENERGY COMPETITION... Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...
Investigating customer racial discrimination in the secondary baseball card market.
Primm, Eric; Piquero, Nicole Leeper; Piquero, Alex R; Regoli, Robert M
2011-01-01
A growing body of literature in a variety of disciplines has appeared over the last 20 years examining customer racial bias in the secondary sports card market; however, consensus on the matter has yet to emerge. In this article, we explore the more subtle ways that a player's race/ethnicity may affect the value of his sports card including a player's skin tone (light- to dark-skinned). Data were obtained for 383 black, Latino, and white baseball players who had received at least one vote for induction into Major League Baseball's Hall of Fame including their career performance statistics, rookie card price, card availability, Hall of Fame status, and skin tone. Findings indicate that card availability is the primary determinant of card value while a player's skin tone has no direct effect. Subsequent analysis demonstrates that a player's race (white/non-white) rather than skin tone did have an effect as it interacts with Hall of Fame status to influence his rookie card price.
Crystal structure of human IPS-1/MAVS/VISA/Cardif caspase activation recruitment domain.
Potter, Jane A; Randall, Richard E; Taylor, Garry L
2008-02-28
IPS-1/MAVS/VISA/Cardif is an adaptor protein that plays a crucial role in the induction of interferons in response to viral infection. In the initial stage of the intracellular antiviral response two RNA helicases, retinoic acid inducible gene-I (RIG-I) and melanoma differentiation-association gene 5 (MDA5), are independently able to bind viral RNA in the cytoplasm. The 62 kDa protein IPS-1/MAVS/VISA/Cardif contains an N-terminal caspase activation and recruitment (CARD) domain that associates with the CARD regions of RIG-I and MDA5, ultimately leading to the induction of type I interferons. As a first step towards understanding the molecular basis of this important adaptor protein we have undertaken structural studies of the IPS-1 MAVS/VISA/Cardif CARD region. The crystal structure of human IPS-1/MAVS/VISA/Cardif CARD has been determined to 2.1A resolution. The protein was expressed and crystallized as a maltose-binding protein (MBP) fusion protein. The MBP and IPS-1 components each form a distinct domain within the structure. IPS-1/MAVS/VISA/Cardif CARD adopts a characteristic six-helix bundle with a Greek-key topology and, in common with a number of other known CARD structures, contains two major polar surfaces on opposite sides of the molecule. One face has a surface-exposed, disordered tryptophan residue that may explain the poor solubility of untagged expression constructs. The IPS-1/MAVS/VISA/Cardif CARD domain adopts the classic CARD fold with an asymmetric surface charge distribution that is typical of CARD domains involved in homotypic protein-protein interactions. The location of the two polar areas on IPS-1/MAVS/VISA/Cardif CARD suggest possible types of associations that this domain makes with the two CARD domains of MDA5 or RIG-I. The N-terminal CARD domains of RIG-I and MDA5 share greatest sequence similarity with IPS-1/MAVS/VISA/Cardif CARD and this has allowed modelling of their structures. These models show a very different charge profile for the equivalent surfaces compared to IPS-1/MAVS/VISA/Cardif CARD.
The mother's card: a simplified aid for primary health workers.
Shah, K P; Shah, P M
1981-02-01
The Mother's Card and its use are described. The card is filled out by the health worker and provides data on the mother concerning family planning, menstrual cycles, pregnancy period (including whether at risk, state of nutrition, immunization against tetanus, and expected date of birth), and breastfeeding. The card is kept by the mother, and the health worker keeps a copy. Each card has space for 10 years and up to 4 pregnancies. The cards have been used successfully in India since 1976 and in Somalia since early 1980, and were useful in strengthening family planning programs as well as identifying pregnancies at risk for special attention.
Code of Federal Regulations, 2012 CFR
2012-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Records Required To Be Maintained By Casinos and Card Clubs § 1021.400 General. Casinos and card clubs are subject to the recordkeeping requirements set forth and cross referenced in this subpart. Casinos and card clubs should also...
Code of Federal Regulations, 2014 CFR
2014-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Records Required To Be Maintained By Casinos and Card Clubs § 1021.400 General. Casinos and card clubs are subject to the recordkeeping requirements set forth and cross referenced in this subpart. Casinos and card clubs should also...
Code of Federal Regulations, 2011 CFR
2011-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Records Required To Be Maintained By Casinos and Card Clubs § 1021.400 General. Casinos and card clubs are subject to the recordkeeping requirements set forth and cross referenced in this subpart. Casinos and card clubs should also...
Code of Federal Regulations, 2013 CFR
2013-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Records Required To Be Maintained By Casinos and Card Clubs § 1021.400 General. Casinos and card clubs are subject to the recordkeeping requirements set forth and cross referenced in this subpart. Casinos and card clubs should also...
"Procurement Cards" Help Colleges Reduce Paperwork and Delays in Purchasing.
ERIC Educational Resources Information Center
Mercer, Joye
1995-01-01
Increasingly, colleges and universities are using procurement cards, which are credit cards with limited usage, for institutional faculty and staff to make small purchases without going through costly and inefficient purchasing channels. Some concerns include distribution of cards, increased liability, and monitoring of expenditures. (MSE)
48 CFR 2413.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...
31 CFR 103.28 - Identification required.
Code of Federal Regulations, 2010 CFR
2010-07-01
... cashing checks for nondepositors (e.g., a drivers license or credit card). A bank signature card may be... specific identifying information (i.e., the account number of the credit card, the driver's license number... the United States must be made by passport, alien identification card, or other official document...
48 CFR 13.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the current GSA credit card contract. Agency procedures should not limit the use of the Governmentwide... purchase card. 13.301 Section 13.301 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION... Governmentwide commercial purchase card. (a) Except as provided in 32.1108(b)(2), the Governmentwide commercial...
Code of Federal Regulations, 2013 CFR
2013-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS Records Required To Be Maintained By Operators of Credit Card Systems § 1028.400 General. Operators of credit card.... Operators of credit card systems should also refer to Subpart D of Part 1010 of this Chapter for...
48 CFR 2413.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...
Code of Federal Regulations, 2012 CFR
2012-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS Records Required To Be Maintained By Operators of Credit Card Systems § 1028.400 General. Operators of credit card.... Operators of credit card systems should also refer to Subpart D of Part 1010 of this Chapter for...
Code of Federal Regulations, 2011 CFR
2011-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS Records Required To Be Maintained By Operators of Credit Card Systems § 1028.400 General. Operators of credit card.... Operators of credit card systems should also refer to Subpart D of Part 1010 of this Chapter for...
Code of Federal Regulations, 2014 CFR
2014-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS Records Required To Be Maintained By Operators of Credit Card Systems § 1028.400 General. Operators of credit card.... Operators of credit card systems should also refer to Subpart D of Part 1010 of this Chapter for...
48 CFR 2413.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...
48 CFR 2413.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...
48 CFR 2413.301 - Governmentwide commercial purchase card.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...
NASA Technical Reports Server (NTRS)
Sawyer, R. V.; Szuwalski, B. (Inventor)
1981-01-01
The invention generally relates to hand tools, and more particularly to an improved device for facilitating removal of printed circuit cards from a card rack characterized by longitudinal side rails arranged in a mutually spaced parallelism and a plurality of printed circuit cards extended between the rails of the rack.
76 FR 76475 - Employment Network (EN) Report Card
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-07
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0096] Employment Network (EN) Report Card... Work Consumer Employment Network Report Card. SUMMARY: We are soliciting the input of beneficiaries... revised EN Report Card. An EN is a private or public entity that participates in the Ticket to Work (TTW...
Neo, Shu Hui; Chung, Ka Yan; Quek, Jia Min; Too, Heng-Phon
2017-11-30
The preservation of nucleic acids from clinical samples is critical to facilitate accurate molecular diagnosis. The use of a paper matrix, Flinders Technology Associates (FTA) Elute cards, to archive DNA and viral RNA is well-documented. However, the feasibility of FTA Elute cards for archiving serum and serum exosomal microRNAs (miRNAs) remains unclear. Here, we performed a comprehensive evaluation of FTA Elute cards for miRNA storage and recovery in different pre-analytical conditions. The recovery of serum miRNA dry-spotted on FTA Elute cards by direct elution with water at high temperature was poor. However, serum miRNAs dry-spotted on the cards were isolated with about 40% yield when using QIAzol lysis reagent and recovery was improved remarkably (>80%) upon extraction from cards pre-treated with trehalose. miRNAs stored on the cards remained stable at room temperature and can be kept for prolonged periods. Furthermore, miRNAs could be similarly recovered from serum exosomes dry-spotted on the cards. Importantly, when using sera from gastric cancer (GC) patients, the miRNAs were efficiently recovered from trehalose pre-treated cards without affecting their representation. Collectively, we have demonstrated the potential of FTA Elute cards to archive serum and serum exosomal miRNAs, making it useful for biomarker discovery and diagnostics.
Study of Smart Campus Development Using Internet of Things Technology
NASA Astrophysics Data System (ADS)
Widya Sari, Marti; Wahyu Ciptadi, Prahenusa; Hafid Hardyanto, R.
2017-04-01
This paper describes the development of smart campus using Internet of Things (IoT) technology. Through smart campus, it is possible that a campus is connected via online by the outside entity, so that the teaching approach based on technology can be conducted in real time. This research was conducted in smart education, smart parking and smart room. Observation and literature studies were applied as the research method with the related theme for the sake of system design of smart campus. The result of this research is the design of smart campus system that includes smart education development, smart parking and smart room with the sake of Universitas PGRI Yogyakarta as the case study.
On Developing HyperCard Stacks for the Study of Chinese Characters: KanjiCard.
ERIC Educational Resources Information Center
Nakajima, Kazuko
1988-01-01
Describes "KanjiCard," an interactive self-tutorial program for beginning students of Japanese to learn Kanji, Chinese characters used in the Japanese language. The Macintosh-developed approach uses "HyperCard" technology, computer-assisted animation, and voice digitizing to achieve enhanced graphic presentation. (Author/CB)
HyperCard--A Science Teaching Tool.
ERIC Educational Resources Information Center
Parker, Carol
1992-01-01
Discussion of new technological resources available for science instruction focuses on the use of the HyperCard software for the Macintosh to design customized materials. Topics addressed include general features of HyperCard, designing HyperCard stacks, graphics, and designing buttons (i.e., links for moving through the stacks). Several sample…
Code of Federal Regulations, 2014 CFR
2014-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Reports Required To Be Made By Casinos and Card Clubs § 1021.300 General. Casinos and card clubs are subject to the reporting requirements set forth and cross referenced in this subpart. Casinos and card clubs should also refer to...
Code of Federal Regulations, 2011 CFR
2011-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Reports Required To Be Made By Casinos and Card Clubs § 1021.300 General. Casinos and card clubs are subject to the reporting requirements set forth and cross referenced in this subpart. Casinos and card clubs should also refer to...
Code of Federal Regulations, 2012 CFR
2012-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Reports Required To Be Made By Casinos and Card Clubs § 1021.300 General. Casinos and card clubs are subject to the reporting requirements set forth and cross referenced in this subpart. Casinos and card clubs should also refer to...
Code of Federal Regulations, 2013 CFR
2013-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR CASINOS AND CARD CLUBS Reports Required To Be Made By Casinos and Card Clubs § 1021.300 General. Casinos and card clubs are subject to the reporting requirements set forth and cross referenced in this subpart. Casinos and card clubs should also refer to...
Credit Cards: What You Don't Know Can Cost You!
ERIC Educational Resources Information Center
Detweiler, Gerri
1993-01-01
The role of credit cards in personal finance has increased dramatically over the past two decades. Complex interest computation methods and additional fees often boost the price of credit card loans and help make credit cards the most profitable type of consumer loan for many lenders. (Author/JOW)
Code of Federal Regulations, 2010 CFR
2010-10-01
... specified EFT mechanisms. Governmentwide commercial purchase card means a card that is similar in nature to a commercial credit card that is used to make financing and delivery payments for supplies and services. The purchase card is an EFT method and it may be used as a means to meet the requirement to pay...
77 FR 75410 - Request for Information Regarding Credit Card Market
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-20
... Regarding Credit Card Market AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice and request for information. SUMMARY: Section 502(a) of the Credit Card Accountability Responsibility and Disclosure Act of... review (Review) of the consumer credit card market, within the limits of its existing resources available...
12 CFR 226.51 - Ability to Pay.
Code of Federal Regulations, 2014 CFR
2014-01-01
...) TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card Accounts and Open-End Credit... pay. A card issuer must not open a credit card account for a consumer under an open-end (not home-secured) consumer credit plan, or increase any credit limit applicable to such account, unless the card...
Code of Federal Regulations, 2013 CFR
2013-01-01
... credit card loans, bona fide overdraft loans, and other loans that the State savings association has... card is any card, plate, coupon book, or other single credit device that may be used from time to time to obtain credit. Credit card account is a credit account established in conjunction with the...
Code of Federal Regulations, 2014 CFR
2014-01-01
... credit card loans, bona fide overdraft loans, and other loans that the State savings association has... card is any card, plate, coupon book, or other single credit device that may be used from time to time to obtain credit. Credit card account is a credit account established in conjunction with the...
31 CFR 1028.100 - Definitions.
Code of Federal Regulations, 2014 CFR
2014-07-01
... ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR OPERATORS OF CREDIT CARD SYSTEMS Definitions § 1028... institution means a person authorized by the operator of a credit card system to contract, directly or... operator's credit card. (b) Credit card has the same meaning as in 15 U.S.C. 1602(k). It includes charge...
Code of Federal Regulations, 2014 CFR
2014-01-01
... organization that operates or licenses a credit card system to authorize merchants to accept, transmit, or process payment by credit card through the credit card system for money, goods or services, or anything... means any data that enables any person to access a customer's or donor's account, such as a credit card...
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Purchased credit card relationships, servicing assets, intangible assets (other than purchased credit card relationships and servicing assets), credit... THE OFFICE OF THRIFT SUPERVISION Capital § 390.471 Purchased credit card relationships, servicing...