Sample records for yellow card scheme

  1. Use of retailer fidelity card schemes in the assessment of food additive intake: Sunset Yellow a case study.

    PubMed

    Sardi, M; Haldemann, Y; Nordmann, H; Bottex, B; Safford, B; Smith, B; Tennant, D; Howlett, J; Jasti, P R

    2010-11-01

    The feasibility of using a retailer fidelity card scheme to estimate food additive intake was investigated using the Swiss retailer MIGROS's Cumulus Card and the example of the food colour Sunset Yellow (E 110). Information held within the card scheme was used to identify a sample of households purchasing foods containing Sunset Yellow over a 15 day period. A sample of 1204 households was selected for interview, of which 830 households were retained in the study following interview. Interviews were conducted to establish household structure, patterns of consumption by different individuals within the household, and the proportion of foods containing Sunset Yellow habitually purchased at the retailer and/or consumed outside the home. Information provided by the retailer on levels of Sunset Yellow in the foods was combined with the information obtained at interview to calculate the per-capita intake of Sunset Yellow by members of participating households. More than 99% of consumers (n = 1902) of foods containing Sunset Yellow were estimated to consume less than 1 mg Sunset Yellow kg(-1) body weight day(-1). The method proved to be a simple and resource-efficient approach to estimate food additive intake on the basis of actual consumer behaviour and thus reports results more closely related to the actual consumption of foods by individuals.

  2. Antimicrobial reduction measures applied in Danish pig herds following the introduction of the "Yellow Card" antimicrobial scheme.

    PubMed

    Dupont, Nana; Diness, Line Hummelmose; Fertner, Mette; Kristensen, Charlotte Sonne; Stege, Helle

    2017-03-01

    Following introduction of the antimicrobial restrictive "Yellow Card Scheme" in summer 2010, a rapid decrease in the Danish national pig antimicrobial consumption was observed. The aims of this study were to (i) investigate which measures had been implemented to reduce the antimicrobial consumption according to farmers and veterinarians and (ii) where possible, investigate if said measures were reflected in the herds' antimicrobial purchase data. Based on national register data from VetStat and the Central Husbandry Register, the study population was selected among Danish pig herds which had decreased their annual antimicrobial consumption with ≥10% following the introduction of the Yellow Card Scheme comparing June 1, 2009-May 31, 2010 to June 1, 2010-May 31, 2011. Subsequently, questionnaire surveys of both farmers and veterinarians were carried out, resulting in responses from 179 farmers accounting for 202 herds (response ratio: 83%) and 58 veterinarians accounting for 140 herds. Prior to the introduction of the Yellow Card Scheme, 24% of the participating herds had an antimicrobial consumption for one or more age groups which exceeded the Yellow Card Scheme threshold values on antimicrobial consumption, while 50% of the herds had an antimicrobial consumption below the national average. The measures most frequently stated as having contributed to the antimicrobial reduction were increased use of vaccines (52% of farmers; 35% of the veterinarians), less use of group medication (44% of the farmers; 58% of the veterinarians) and staff education (22% of the farmers; 26% of the veterinarians). Reduced usage of antimicrobials for oral use accounted for 89% of the total reduction in antimicrobial use. Among the farmers, 13% also stated that change in choice of product had contributed to reducing their antimicrobial consumption. However, when analyzing purchase data, no general trend was seen towards a larger purchase of products with a higher registered dosage per

  3. Evaluation of patient reporting of adverse drug reactions to the UK 'Yellow Card Scheme': literature review, descriptive and qualitative analyses, and questionnaire surveys.

    PubMed

    Avery, A J; Anderson, C; Bond, C M; Fortnum, H; Gifford, A; Hannaford, P C; Hazell, L; Krska, J; Lee, A J; McLernon, D J; Murphy, E; Shakir, S; Watson, M C

    2011-05-01

    The monitoring of adverse drug reactions (ADRs) through pharmacovigilance is vital to patient safety. Spontaneous reporting of ADRs is one method of pharmacovigilance, and in the UK this is undertaken through the Yellow Card Scheme (YCS). Yellow Card reports are submitted to the Medicines and Healthcare products Regulatory Agency (MHRA) by post, telephone or via the internet. The MHRA electronically records and reviews information submitted so that important safety issues can be detected. While previous studies have shown differences between patient and health-care professional (HCP) reports for the types of drugs and reactions reported, relatively little is known about the pharmacovigilance impact of patient reports. There have also been few studies on the views and experiences of patients/consumers on the reporting of suspected ADRs. To evaluate the pharmacovigilance impact of patient reporting of ADRs by analysing reports of suspected ADRs from the UK YCS and comparing reports from patients and HCPs. To elicit the views and experiences of patients and the public about patient reporting of ADRs. (1) Literature review and survey of international experiences of consumer reporting of ADRs; (2) descriptive analysis of Yellow Card reports; (3) signal generation analysis of Yellow Card reports; (4) qualitative analysis of Yellow Card reports; (5) questionnaire survey of patients reporting on Yellow Cards; (6) qualitative analysis of telephone interviews with patient reporters to the scheme; (7) qualitative analysis of focus groups and usability testing of the patient YCS; and (8) national omnibus telephone survey of public awareness of the YCS. Patients (n = 5180) and HCPs (n = 20,949) submitting Yellow Card reports from October 2005 to September 2007. Respondents to questionnaire survey (n = 1362). Participants at focus groups and usability testing sessions (n = 40). National omnibus telephone survey (n = 2028). The literature review included studies in English from

  4. Game management, context effects, and calibration: the case of yellow cards in soccer.

    PubMed

    Unkelbach, Christian; Memmert, Daniel

    2008-02-01

    Referees in German first-league soccer games do not award as many yellow cards in the beginning of a game as should be statistically expected. One explanation for this effect is the concept of game management (Mascarenhas, Collins, & Mortimer, 2002). Alternatively, the consistency model (Haubensak, 1992) explains the effect as a necessity of the judgment situation: Referees need to calibrate a judgment scale, and, to preserve degrees of freedom in that scale, they need to avoid extreme category judgments in the beginning (i.e., yellow cards). Experiment 1 shows that referees who judge scenes in the context of a game award fewer yellow cards than referees who see the same scenes in random order. Experiment 2 shows the combined influence of game management (by explicitly providing information about the game situation) and calibration (early vs. late scenes in the time course of a game). Theoretical implications for expert refereeing and referee training are discussed.

  5. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    NASA Astrophysics Data System (ADS)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  6. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    PubMed

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  7. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    PubMed

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  8. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    PubMed Central

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-01-01

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331

  9. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    PubMed Central

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887

  10. Increased risk of injury following red and yellow cards, injuries and goals in FIFA World Cups.

    PubMed

    Ryynänen, Jaakko; Dvorak, Jiri; Peterson, Lars; Kautiainen, Hannu; Karlsson, Jón; Junge, Astrid; Börjesson, Mats

    2013-10-01

    To study the relationship between potentially game-disrupting incidents (PGDIs; red and yellow cards, goals and injuries) and the injury incidence in football. Prospective injury surveillance during three FIFA World Cups in 2002, 2006 and 2010. Official match statistics were obtained for all the matches played in the three tournaments. 2002, 2006 and 2010 FIFA World Cups. Team physicians at the 2002, 2006 and 2010 FIFA World Cups. Injury incidences and incidence rate ratios (IRRs). The injury incidence was significantly higher during match periods within the minute of, or during a five-minute period following a yellow card, red card, another injury or a goal (PGDIs) than during other match periods (76.7/1000 match hours; 95% CI (66.6 to 87.9) vs 54.0/1000 match hours (46.9 to 61.9), p<0.001). There were significant differences in injury incidence between different match periods, with the highest injury incidence seen in the last 15 min of the first half (p<0.001). The PGDIs (other than injury) had a tendency to increase towards the end of the game and the most frequent PGDI was a yellow card. There was a risk ratio of 1.17 (95% CI 1.08 to 1.26) for injury, per PGDI (other injuries excluded) (p<0.001), and 1.15 (95% CI 1.06 to 1.24) after adjusted match time (p<0.001). The injury incidence is high within the five minutes following a PGDI. For both team management and players, being aware of the increased risk of injury directly after a PGDI may be of clinical relevance, as it may enable them to take precautions in order to prevent injuries. There are significant differences in injury incidence between different match periods and game-related factors, such as PGDIs, appear partly to contribute to this variation.

  11. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    PubMed

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  12. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    PubMed Central

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  13. Unconditionally Secure Credit/Debit Card Chip Scheme and Physical Unclonable Function

    NASA Astrophysics Data System (ADS)

    Kish, Laszlo B.; Entesari, Kamran; Granqvist, Claes-Göran; Kwan, Chiman

    The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).

  14. The Social Meanings of the C-Card Scheme: The Importance of Friends and Peers

    ERIC Educational Resources Information Center

    Cheetham, Mandy

    2014-01-01

    This paper draws on findings from an analysis of interviews with young people aged 14-18 years, to explore the peer influences in young people's informal social networks which can affect their access to sexual health services. The research focuses on the social meanings of a C-Card condom distribution scheme in North East England. Such schemes are…

  15. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  16. Dynamic Virtual Credit Card Numbers

    NASA Astrophysics Data System (ADS)

    Molloy, Ian; Li, Jiangtao; Li, Ninghui

    Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the scheme dynamic because the virtual credit card numbers can be generated without online contact with the credit card issuers. These numbers can be processed without changing any of the infrastructure currently in place; the only changes will be at the end points, namely, the card users and the card issuers. We analyze the security requirements for dynamic virtual credit card numbers, discuss the design space, propose a scheme using HMAC, and prove its security under the assumption the underlying function is a PRF.

  17. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    PubMed

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  18. Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards.

    PubMed

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.'s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes.

  19. Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Yang, Xing; Yang, Yixian

    2015-01-01

    Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful analysis, we find their scheme does not really resist replay attack while failing to provide an efficient password change phase. We further propose an improvement of Mishra et al.’s scheme with the purpose of preventing the security threats of their scheme. We demonstrate the proposed scheme is given to strong authentication against several attacks including attacks shown in the original scheme. In addition, we compare the performance and functionality with other multi-server authenticated key schemes. PMID:25978373

  20. The Hawke's Bay Condom Card Scheme: a qualitative study of the views of service providers on increased, discreet access for youth to free condoms.

    PubMed

    Ryder, Hollie; Aspden, Trudi; Sheridan, Janie

    2015-12-01

    The incidence of sexually transmitted infections and unplanned pregnancies in adolescence is of concern. The Hawke's Bay District Health Board, New Zealand, set up a pilot condom card scheme ('the Scheme') to allow 13- to 24-year-olds, deemed suitable for the Scheme, to access free condoms from pharmacies on presentation of a Condom Card. Our study explored the views of service providers of a pilot Condom Card Scheme. Qualitative interviews were conducted with 17 service providers (nurses, pharmacists, pharmacy staff) between February and April 2013. Our findings showed that the Scheme was viewed positively by service providers, who indicated almost universal support for the Scheme to continue. However, participants noted a perceived lack of advertising, low number of sites for collection of condoms, lack of flexibility of the Scheme's criteria relating to who could access the scheme and issues with some pharmacy service providers, all of which led to a number of recommendations for improving the Scheme. The views of service providers indicate broad support for the continuation of the Scheme. Canvassing young people's suggestions for improving the Scheme is also essential. © 2015 Royal Pharmaceutical Society.

  1. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  2. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack.

  3. What can we learn from parents about enhancing participation in pharmacovigilance?

    PubMed Central

    Arnott, Janine; Hesselgreaves, Hannah; Nunn, Anthony J; Peak, Matthew; Pirmohamed, Munir; Smyth, Rosalind L; Turner, Mark A; Young, Bridget

    2013-01-01

    Aims To investigate parents' views and experiences of direct reporting of a suspected ADR in their child. Methods We audio-recorded semi-structured qualitative interviews with parents of children with suspected ADRs. Our sample included parents with (n = 17) and without (n = 27) previous experience of submitting a Yellow Card. Results Parents in both groups described poor awareness of the Yellow Card Scheme. Parents who had participated in the Yellow Card Scheme were generally happy to report their child's ADR via the Scheme and valued the opportunity to report concerns independently of health practitioners. They expressed motivations for reporting that have not previously been described linked to the parental role, including how registering a concern about a medicine helped to resolve uncomfortable feelings about their child's ADR. Parents who had not previously submitted a Yellow Card expressed uncertainty about the legitimacy of their involvement in reporting and doubts about the value of the information that they could provide. Conclusion Promoting wider participation in pharmacovigilance schemes will depend on raising public awareness. Additionally, our findings point to the need to empower lay people to submitting reports and to reassure them about the value of their reports. PMID:22905902

  4. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.

  5. Contrastive Analysis of Meteorological Element Effect Simulated by parameterization schemes Land Surface Process of Noah and CLM4 over the Yellow River Source Region

    NASA Astrophysics Data System (ADS)

    Zhang, Y.; Wen, X.

    2017-12-01

    The Yellow River source region is situated in the northeast Tibetan Plateau, which is considered as a global climate change hot-spot and one of the most sensitive areas in terms of response to global warming in view of its fragile ecosystem. This region plays an irreplaceable role for downstream water supply of The Yellow River because of its unique topography and variable climate. The water energy cycle processes of the Yellow River source Region from July to September in 2015 were simulated by using the WRF mesoscale numerical model. The two groups respectively used Noah and CLM4 parameterization schemes of land surface process. Based on the observation data of GLDAS data set, ground automatic weather station and Zoige plateau wetland ecosystem research station, the simulated values of near surface meteorological elements and surface energy parameters of two different schemes were compared. The results showed that the daily variations about meteorological factors in Zoige station in September were simulated quite well by the model. The correlation coefficient between the simulated temperature and humidity of the CLM scheme were 0.88 and 0.83, the RMSE were 1.94 ° and 9.97%, and the deviation Bias were 0.04 ° and 3.30%, which was closer to the observation data than the Noah scheme. The correlation coefficients of net radiation, surface heat flux, upward short wave and upward longwave radiation were respectively 0.86, 0.81, 0.84 and 0.88, which corresponded better than the observation data. The sensible heat flux and latent heat flux distribution of the Noah scheme corresponded quite well to GLDAS. the distribution and magnitude of 2m relative humidity and soil moisture were closer to surface observation data because the CLM scheme described the photosynthesis and evapotranspiration of land surface vegetation more rationally. The simulating abilities of precipitation and downward longwave radiation need to be improved. This study provides a theoretical basis for

  6. Impacts of human activities on nutrient transport in the Yellow River: The role of the Water-Sediment Regulation Scheme.

    PubMed

    Li, Xinyu; Chen, Hontao; Jiang, Xueyan; Yu, Zhigang; Yao, Qingzhen

    2017-08-15

    Anthropogenic activities alter the natural states of large rivers and their surrounding environment. The Yellow River is a well-studied case of a large river with heavy human control. An artificial managed water and sediment release system, known as the Water-Sediment Regulation Scheme (WSRS), has been carried out annually in the Yellow River since 2002. Nutrient concentrations and composition display significant time and space variations during the WSRS period. To figure out the anthropogenic impact of nutrient changes and transport in the Yellow River, biogeochemical observations were carried out in both middle reaches and lower reaches of the Yellow River during 2014 WSRS period. WSRS has a direct impact on water oxidation-reduction environment in the middle reaches; concentrations of nitrite (NO 2 - ) and ammonium (NH 4 + ) increased, while nitrate (NO 3 - ) concentration decreased by enhanced denitrification. WSRS changed transport of water and sediment; dissolved silicate (DSi) in the middle reaches was directly controlled by sediments release during the WSRS while in the lower reaches, DSi changed with both sediments and water released from middle reaches. During the WSRS, the differences of nutrient fluxes and concentrations between lower reaches and middle reaches were significant; dissolved inorganic phosphorous (DIP) and dissolved inorganic nitrogen (DIN) were higher in low reaches because of anthropogenic inputs. Human intervention, especially WSRS, can apparently change the natural states of both the mainstream and estuarine environments of the Yellow River within a short time. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. [Effects of Long-term Implementation of the Flow-Sediment Regulation Scheme on Grain and Clay Compositions of Inshore Sediments in the Yellow River Estuary].

    PubMed

    Wang, Miao-miao; Sun, Zhi-gao; Lu, Xiao-ning; Wang, Wei; Wang, Chuan-yuan

    2015-04-01

    Based on the laser particle size and X-ray diffraction (XRD) analysis, 28 sediment samples collected from the inshore region of the Yellow River estuary in October 2013 were determined to discuss the influence of long-term implementation of the flow-sediment regulation scheme (FSRS, initiated in 2002) on the distributions of grain size and clay components (smectite, illite, kaolinite and chlorite) in sediments. Results showed that, after the FSRS was implemented for more than 10 years, although the proportion of sand in inshore sediments of the Yellow River estuary was higher (average value, 23.5%) than those in sediments of the Bohai Sea and the Yellow River, silt was predominated (average value, 59.1%) and clay components were relatively low (average value, 17.4%). The clay components in sediments of the inshore region in the Yellow River estuary were close with those in the Yellow River. The situation was greatly changed due to the implementation of FSRS since 2002, and the clay components were in the order of illite > smectite > chlorite > kaolinite. This study also indicated that, compared to large-scale investigation in Bohai Sea, the local study on the inshore region of the Yellow River estuary was more favorable for revealing the effects of long-term implementation of the FSRS on sedimentation environment of the Yellow River estuary.

  8. Can a Circular Payment Card Format Effectively Elicit Preferences? Evidence From a Survey on a Mandatory Health Insurance Scheme in Tunisia.

    PubMed

    Chanel, Olivier; Makhloufi, Khaled; Abu-Zaineh, Mohammad

    2017-06-01

    The choice of elicitation format is a crucial but tricky aspect of stated preferences surveys. It affects not only the quantity and quality of the information collected on respondents' willingness to pay (WTP) but also the potential errors/biases that prevent their true WTP from being observed. We propose a new elicitation mechanism, the circular payment card (CPC), and show that it helps overcome the drawbacks of the standard payment card (PC) format. It uses a visual pie chart representation without start or end points: respondents spin the circular card in any direction until they find the section that best matches their true WTP. We performed a contingent valuation survey regarding a mandatory health insurance scheme in Tunisia, a middle-income country. Respondents were randomly allocated into one of three subgroups and their WTP was elicited using one of three formats: open-ended (OE), standard PC and the new CPC. We compared the elicited WTP. We found significant differences in unconditional and conditional analyses. Our empirical results consistently indicated that the OE and standard PC formats led to significantly lower WTP than the CPC format. Overall, our results are encouraging and suggest CPC could be an effective alternative format to elicit 'true' WTP.

  9. A more secure anonymous user authentication scheme for the integrated EPR information system.

    PubMed

    Wen, Fengtong

    2014-05-01

    Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.

  10. Robust anonymous authentication scheme for telecare medical information systems.

    PubMed

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  11. In vitro reconstitution of interactions in the CARD9 signalosome

    PubMed Central

    Park, Jin Hee; Choi, Jae Young; Mustafa, Mir Faisal; Park, Hyun Ho

    2017-01-01

    The caspase-associated recruitment domain (CARD)-containing protein 9 (CARD9) signalosome is composed of CARD9, B-cell CLL/lymphoma 10 (BCL10) and mucosa-associated lymphoid tissue lymphoma translocation protein 1 (MALT1). The CARD9 signalosome has been reported to exert critical functions in the immunoreceptor tyrosine-based activation motif-coupled receptor-mediated activation of myeloid cells, through nuclear factor-κB pathways during innate immunity processes. During CARD9 signalosome assembly, BCL10 has been revealed to function as an adaptor protein and to interact with CARD9 via CARD-CARD interactions; BCL10 also interacts with MALT1 via its C-terminal Ser/Thr-rich region and the first immunoglobulin domain of MALT1. The CARD9 signalosome is implicated in critical biological processes; however, its structural and biochemical characteristics have yet to be elucidated. In the present study, CARD9 and BCL10 CARDs were successfully purified and characterized, and their biochemical properties were investigated. In addition, CARD9-BCL10 complexes were reconstituted in vitro under low salt and pH conditions. Furthermore, based on structural modeling data, a scheme was proposed to describe the interactions between CARD9 and BCL10. This provides a further understanding of the mechanism of how the CARD9 signalosome may be assembled. PMID:28765954

  12. Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials

    NASA Astrophysics Data System (ADS)

    Park, Jun-Cheol

    User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.

  13. On the security of two remote user authentication schemes for telecare medical information systems.

    PubMed

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  14. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  15. Attitudes and knowledge of hospital pharmacists to adverse drug reaction reporting

    PubMed Central

    Green, Christopher F; Mottram, David R; Rowe, Philip H; Pirmohamed, Munir

    2001-01-01

    Aims To investigate the attitudes of UK hospital pharmacists towards, and their understanding, of adverse drug reaction (ADR) reporting. Methods A postal questionnaire survey of 600 randomly selected hospital pharmacists was conducted. Results The response rate was 53.7% (n = 322). A total of 217 Yellow Cards had been submitted to the CSM/MCA by 78 (25.6%) of those responding. Half of those responding felt that ADR reporting should be compulsory and over three-quarters felt it was a professional obligation. However, almost half were unclear as to what should be reported, while the time available in clinical practice and time taken to complete forms were deemed to be major deterrents to reporting. Pharmacists were not dissuaded from reporting by the need to consult a medical colleague or by the absence of a fee. Education and training had a significant influence on pharmacists' participation in the Yellow Card Scheme. Conclusions Pharmacists have a reasonable knowledge and are supportive of the Yellow Card spontaneous ADR reporting scheme. However, education and training will be important in maintaining and increasing ADR reports from pharmacists. PMID:11167664

  16. Practical and Secure Recovery of Disk Encryption Key Using Smart Cards

    NASA Astrophysics Data System (ADS)

    Omote, Kazumasa; Kato, Kazuhiko

    In key-recovery methods using smart cards, a user can recover the disk encryption key in cooperation with the system administrator, even if the user has lost the smart card including the disk encryption key. However, the disk encryption key is known to the system administrator in advance in most key-recovery methods. Hence user's disk data may be read by the system administrator. Furthermore, if the disk encryption key is not known to the system administrator in advance, it is difficult to achieve a key authentication. In this paper, we propose a scheme which enables to recover the disk encryption key when the user's smart card is lost. In our scheme, the disk encryption key is not preserved anywhere and then the system administrator cannot know the key before key-recovery phase. Only someone who has a user's smart card and knows the user's password can decrypt that user's disk data. Furthermore, we measured the processing time required for user authentication in an experimental environment using a virtual machine monitor. As a result, we found that this processing time is short enough to be practical.

  17. A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function

    PubMed Central

    Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078

  18. A robust and effective smart-card-based remote user authentication mechanism using hash function.

    PubMed

    Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit

    2014-01-01

    In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.

  19. A security and privacy preserving e-prescription system based on smart cards.

    PubMed

    Hsu, Chien-Lung; Lu, Chung-Fu

    2012-12-01

    In 2002, Ateniese and Medeiros proposed an e-prescription system, in which the patient can store e-prescription and related information using smart card. Latter, Yang et al. proposed a novel smart-card based e-prescription system based on Ateniese and Medeiros's system in 2004. Yang et al. considered the privacy issues of prescription data and adopted the concept of a group signature to provide patient's privacy protection. To make the e-prescription system more realistic, they further applied a proxy signature to allow a patient to delegate his signing capability to other people. This paper proposed a novel security and privacy preserving e-prescription system model based on smart cards. A new role, chemist, is included in the system model for settling the medicine dispute. We further presented a concrete identity-based (ID-based) group signature scheme and an ID-based proxy signature scheme to realize the proposed model. Main property of an ID-based system is that public key is simple user's identity and can be verified without extra public key certificates. Our ID-based group signature scheme can allow doctors to sign e-prescription anonymously. In a case of a medical dispute, identities of the doctors can be identified. The proposed ID-based proxy signature scheme can improve signing delegation and allows a delegation chain. The proposed e-prescription system based on our proposed two cryptographic schemes is more practical and efficient than Yang et al.'s system in terms of security, communication overheads, computational costs, practical considerations.

  20. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    PubMed

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  1. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    PubMed Central

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  2. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.

  3. Eggen Card Project: Progress and Plans (Abstract)

    NASA Astrophysics Data System (ADS)

    Silvis, G.

    2016-12-01

    (Abstract only) The Eggen Card Project has been running since 2009 and has involved 30+ AAVSO staff and volunteers. Let me offer a short review of the project, our progress this year and our plans for the future. Phase 1 of the project has been to index the 108,000 card images, identifying the stars they belong too. We've passed the 75% point on this phase. The next phase is how to use this data. Jack Crast has identified the photometric schemes used by Olin and developed a spreadsheet tool to prepare this data for inclusion into the AAVSO International Database (AID). Anyone want good photometry from 1970? We got it!

  4. MalaCards: an integrated compendium for diseases and their annotation

    PubMed Central

    Rappaport, Noa; Nativ, Noam; Stelzer, Gil; Twik, Michal; Guan-Golan, Yaron; Iny Stein, Tsippi; Bahir, Iris; Belinky, Frida; Morrey, C. Paul; Safran, Marilyn; Lancet, Doron

    2013-01-01

    Comprehensive disease classification, integration and annotation are crucial for biomedical discovery. At present, disease compilation is incomplete, heterogeneous and often lacking systematic inquiry mechanisms. We introduce MalaCards, an integrated database of human maladies and their annotations, modeled on the architecture and strategy of the GeneCards database of human genes. MalaCards mines and merges 44 data sources to generate a computerized card for each of 16 919 human diseases. Each MalaCard contains disease-specific prioritized annotations, as well as inter-disease connections, empowered by the GeneCards relational database, its searches and GeneDecks set analyses. First, we generate a disease list from 15 ranked sources, using disease-name unification heuristics. Next, we use four schemes to populate MalaCards sections: (i) directly interrogating disease resources, to establish integrated disease names, synonyms, summaries, drugs/therapeutics, clinical features, genetic tests and anatomical context; (ii) searching GeneCards for related publications, and for associated genes with corresponding relevance scores; (iii) analyzing disease-associated gene sets in GeneDecks to yield affiliated pathways, phenotypes, compounds and GO terms, sorted by a composite relevance score and presented with GeneCards links; and (iv) searching within MalaCards itself, e.g. for additional related diseases and anatomical context. The latter forms the basis for the construction of a disease network, based on shared MalaCards annotations, embodying associations based on etiology, clinical features and clinical conditions. This broadly disposed network has a power-law degree distribution, suggesting that this might be an inherent property of such networks. Work in progress includes hierarchical malady classification, ontological mapping and disease set analyses, striving to make MalaCards an even more effective tool for biomedical research. Database URL: http

  5. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication

    NASA Astrophysics Data System (ADS)

    Murdoch, Steven J.; Anderson, Ross

    Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.

  6. Biometrics based authentication scheme for session initiation protocol.

    PubMed

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  7. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    PubMed

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.

  8. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  9. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 26 Internal Revenue 18 2012-04-01 2012-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...

  10. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 26 Internal Revenue 18 2011-04-01 2011-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...

  11. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 18 2013-04-01 2013-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...

  12. 26 CFR 301.6311-2 - Payment by credit card and debit card.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 18 2014-04-01 2014-04-01 false Payment by credit card and debit card. 301.6311....6311-2 Payment by credit card and debit card. (a) Authority to receive—(1) Payments by credit card and debit card. Internal revenue taxes may be paid by credit card or debit card as authorized by this...

  13. A fast CT reconstruction scheme for a general multi-core PC.

    PubMed

    Zeng, Kai; Bai, Erwei; Wang, Ge

    2007-01-01

    Expensive computational cost is a severe limitation in CT reconstruction for clinical applications that need real-time feedback. A primary example is bolus-chasing computed tomography (CT) angiography (BCA) that we have been developing for the past several years. To accelerate the reconstruction process using the filtered backprojection (FBP) method, specialized hardware or graphics cards can be used. However, specialized hardware is expensive and not flexible. The graphics processing unit (GPU) in a current graphic card can only reconstruct images in a reduced precision and is not easy to program. In this paper, an acceleration scheme is proposed based on a multi-core PC. In the proposed scheme, several techniques are integrated, including utilization of geometric symmetry, optimization of data structures, single-instruction multiple-data (SIMD) processing, multithreaded computation, and an Intel C++ compilier. Our scheme maintains the original precision and involves no data exchange between the GPU and CPU. The merits of our scheme are demonstrated in numerical experiments against the traditional implementation. Our scheme achieves a speedup of about 40, which can be further improved by several folds using the latest quad-core processors.

  14. A Fast CT Reconstruction Scheme for a General Multi-Core PC

    PubMed Central

    Zeng, Kai; Bai, Erwei; Wang, Ge

    2007-01-01

    Expensive computational cost is a severe limitation in CT reconstruction for clinical applications that need real-time feedback. A primary example is bolus-chasing computed tomography (CT) angiography (BCA) that we have been developing for the past several years. To accelerate the reconstruction process using the filtered backprojection (FBP) method, specialized hardware or graphics cards can be used. However, specialized hardware is expensive and not flexible. The graphics processing unit (GPU) in a current graphic card can only reconstruct images in a reduced precision and is not easy to program. In this paper, an acceleration scheme is proposed based on a multi-core PC. In the proposed scheme, several techniques are integrated, including utilization of geometric symmetry, optimization of data structures, single-instruction multiple-data (SIMD) processing, multithreaded computation, and an Intel C++ compilier. Our scheme maintains the original precision and involves no data exchange between the GPU and CPU. The merits of our scheme are demonstrated in numerical experiments against the traditional implementation. Our scheme achieves a speedup of about 40, which can be further improved by several folds using the latest quad-core processors. PMID:18256731

  15. A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Wen, Fengtong

    2013-12-01

    User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to protect the security. It protects user privacy and is believed to have many abilities to resist a range of network attacks, even if the secret information stored in the smart card is compromised. In this paper, we analyze the security of Das et al.'s scheme, and show that the scheme is in fact insecure against the replay attack, user impersonation attacks and off-line guessing attacks. Then, we also propose a robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. Compared with the existing schemes, our protocol uses a different user authentication mechanism to resist replay attack. We show that our proposed scheme can provide stronger security than previous protocols. Furthermore, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  16. Yellow fever vaccination coverage following massive emergency immunization campaigns in rural Uganda, May 2011: a community cluster survey.

    PubMed

    Bagonza, James; Rutebemberwa, Elizeus; Mugaga, Malimbo; Tumuhamye, Nathan; Makumbi, Issa

    2013-03-07

    Following an outbreak of yellow fever in northern Uganda in December 2010, Ministry of Health conducted a massive emergency vaccination campaign in January 2011. The reported vaccination coverage in Pader District was 75.9%. Administrative coverage though timely, is affected by incorrect population estimates and over or under reporting of vaccination doses administered. This paper presents the validated yellow fever vaccination coverage following massive emergency immunization campaigns in Pader district. A cross sectional cluster survey was carried out in May 2011 among communities in Pader district and 680 respondents were indentified using the modified World Health Organization (WHO) 40 × 17 cluster survey sampling methodology. Respondents were aged nine months and above. Interviewer administered questionnaires were used to collect data on demographic characteristics, vaccination status and reasons for none vaccination. Vaccination status was assessed using self reports and vaccination card evidence. Our main outcomes were measures of yellow fever vaccination coverage in each age-specific stratum, overall, and disaggregated by age and sex, adjusting for the clustered design and the size of the population in each stratum. Of the 680 survey respondents, 654 (96.1%, 95% CI 94.9 - 97.8) reported being vaccinated during the last campaign but only 353 (51.6%, 95% CI 47.2 - 56.1) had valid yellow fever vaccination cards. Of the 280 children below 5 years, 269 (96.1%, 95% CI 93.7 - 98.7) were vaccinated and nearly all males 299 (96.9%, 95% CI 94.3 - 99.5) were vaccinated. The main reasons for none vaccination were; having travelled out of Pader district during the campaign period (40.0%), lack of transport to immunization posts (28.0%) and, sickness at the time of vaccination (16.0%). Our results show that actual yellow fever vaccination coverage was high and satisfactory in Pader district since it was above the desired minimum threshold coverage of 80% according

  17. Yellow fever vaccination coverage following massive emergency immunization campaigns in rural Uganda, May 2011: a community cluster survey

    PubMed Central

    2013-01-01

    Background Following an outbreak of yellow fever in northern Uganda in December 2010, Ministry of Health conducted a massive emergency vaccination campaign in January 2011. The reported vaccination coverage in Pader District was 75.9%. Administrative coverage though timely, is affected by incorrect population estimates and over or under reporting of vaccination doses administered. This paper presents the validated yellow fever vaccination coverage following massive emergency immunization campaigns in Pader district. Methods A cross sectional cluster survey was carried out in May 2011 among communities in Pader district and 680 respondents were indentified using the modified World Health Organization (WHO) 40 × 17 cluster survey sampling methodology. Respondents were aged nine months and above. Interviewer administered questionnaires were used to collect data on demographic characteristics, vaccination status and reasons for none vaccination. Vaccination status was assessed using self reports and vaccination card evidence. Our main outcomes were measures of yellow fever vaccination coverage in each age-specific stratum, overall, and disaggregated by age and sex, adjusting for the clustered design and the size of the population in each stratum. Results Of the 680 survey respondents, 654 (96.1%, 95% CI 94.9 – 97.8) reported being vaccinated during the last campaign but only 353 (51.6%, 95% CI 47.2 – 56.1) had valid yellow fever vaccination cards. Of the 280 children below 5 years, 269 (96.1%, 95% CI 93.7 – 98.7) were vaccinated and nearly all males 299 (96.9%, 95% CI 94.3 – 99.5) were vaccinated. The main reasons for none vaccination were; having travelled out of Pader district during the campaign period (40.0%), lack of transport to immunization posts (28.0%) and, sickness at the time of vaccination (16.0%). Conclusions Our results show that actual yellow fever vaccination coverage was high and satisfactory in Pader district since it was above the

  18. Effect of Trap Color, Height, and Orientation on the Capture of Yellow and Stick Tea Thrips (Thysanoptera: Thripidae) and Nontarget Insects in Tea Gardens.

    PubMed

    Bian, L; Yang, P X; Yao, Y J; Luo, Z X; Cai, X M; Chen, Z M

    2016-02-03

    Two thrips species-the yellow tea thrips (Scirtothrips dorsalis Hood) and the stick tea thrips (Dendrothrips minowai Priesner)-are serious pests affecting tea plants in southern China. Although the stick tea thrips is primarily restricted to southern China, the yellow tea thrips is gradually proliferating worldwide. Colored sticky card traps may be useful for monitoring and capturing these species, but a systematic analysis has not been conducted to identify the most effective trap color, height, and orientation. We performed indoor experiments using an orthogonal experimental design, as well as field tests in tea gardens, to identify the color most attractive to the two thrips species. Field tests were then conducted using color-optimized traps-lawngreen (RGB: 124, 252, 0) for yellow thrips and lime (RGB: 0, 255, 0) for stick tea thrips-to determine the most effective trap height and orientation. The greatest numbers of both yellow and stick tea thrips were captured on traps positioned 0-20 cm above the tea canopy in an east-west orientation. We also evaluated the performance of the color-optimized sticky card traps compared with commercially available yellow ones. Significantly more yellow and stick tea thrips and fewer natural enemies were captured on the color-optimized traps than on commercial ones. Although additional research is needed to explain the responses of the two different species and to increase trap effectiveness, our findings should assist in the control of these harmful insects. © The Authors 2016. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Playing the Smart Card.

    ERIC Educational Resources Information Center

    Zuzack, Christine A.

    1997-01-01

    Enhanced magnetic strip cards and "smart cards" offer varied service options to college students. Enhanced magnetic strip cards serve as cash cards and provide access to services. Smart cards, which resemble credit cards but contain a microchip, can be used as phone cards, bus passes, library cards, admission tickets, point-of-sale debit…

  20. Livermore time-sharing system. Part I. Octopus. Chapter 5. Card reader/card punch. [Description of card reader and formats

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lawrence, J.D.

    1970-03-12

    The Control Data 405 card reader, modified by the Control Data 3649 card read controller, is the primary mechanism for transferring information from a deck of punched cards into the CDC 6600 and CDC 7600 computers of the LLL Octopus system. The card reader operates at a maximum rate of 1200 cards per minute. A description of the card reader and its operation is given. A discussion of formates is included. (RWR)

  1. Yellow Fever

    MedlinePlus

    ... Testing Vaccine Information Testing for Vaccine Adverse Events Yellow fever Vaccine Continuing Education Course Yellow Fever Home Prevention Vaccine Vaccine Recommendations Reactions to Yellow Fever Vacine Yellow Fever Vaccine, Pregnancy, & ... Transmission Symptoms, Diagnosis, & Treatment Maps Africa ...

  2. Nuclear Wallet Cards

    Science.gov Websites

    Index Nuclear Wallet Cards Contents Current Version Radioactive Nuclides (Homeland Security) Nuclear Materials Management & Safeguards System 8th Edition 2011 Nuclear Wallet Cards Resources Search Nuclear Wallet Cards 8th Edition PDF Format 8thEdition, Android Market Download Nuclear Wallet Cards Nuclear

  3. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    PubMed

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  4. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    PubMed Central

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  5. Print a Bed Bug Card - (Single Cards)

    EPA Pesticide Factsheets

    Two sets of business-card-sized lists of tips for recognizing bed bugs and the signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.

  6. Freeze concentration for enrichment of nutrients in yellow water from no-mix toilets.

    PubMed

    Gulyas, H; Bruhn, P; Furmanska, M; Hartrampf, K; Kot, K; Lüttenberg, B; Mahmood, Z; Stelmaszewska, K; Otterpohl, R

    2004-01-01

    Separately collected urine ("yellow water") can be utilized as fertilizer. In order to decrease storage volumes and energy consumption for yellow water transport to fields, enrichment of nutrients in yellow water has to be considered. Laboratory-scale batch freeze concentration of yellow water has been tested in ice-front freezing apparatus: a stirred vessel and a falling film freeze concentrator (coolant temperatures: -6 to -16 degrees C). With progressing enrichment of the liquid concentrate, the frozen ice was increasingly contaminated with yellow water constituents (ammonia, total nitrogen, total phosphorus, TOC, and salts determined as conductivity). The higher the initial salinity of the yellow water and the lower the mechanical agitation of the liquid phase contacting the growing ice front, the more the frozen ice was contaminated. The results indicate, that in ice-front freezing devices multistage processes are necessary, i.e. the melted ice phase has to be purified (and the concentrates must be further enriched) in a second or even in a third stage. Energy consumption of this process is very high. However, technical scale suspension freeze concentration is reasonable in centralized ecological sanitation schemes if the population exceeds 0.5 million and distance of yellow water transportation to fields is more than 80 km.

  7. Turning a Private Label Bank Card into a Multi-function Campus ID Card.

    ERIC Educational Resources Information Center

    James, Thomas G.; Norwood, Bill R.

    1991-01-01

    This article describes the development at Florida State University of the Seminole ACCESS card, which functions simultaneously as a bank automated teller machine card, a student identification card, and a debit card. Explained are the partnership between the university and the bank charge card center, funding system, technologies involved, and…

  8. A microprocessor card software server to support the Quebec health microprocessor card project.

    PubMed

    Durant, P; Bérubé, J; Lavoie, G; Gamache, A; Ardouin, P; Papillon, M J; Fortin, J P

    1995-01-01

    The Quebec Health Smart Card Project is advocating the use of a memory card software server[1] (SCAM) to implement a portable medical record (PMR) on a smart card. The PMR is viewed as an object that can be manipulated by SCAM's services. In fact, we can talk about a pseudo-object-oriented approach. This software architecture provides a flexible and evolutive way to manage and optimize the PMR. SCAM is a generic software server; it can manage smart cards as well as optical (laser) cards or other types of memory cards. But, in the specific case of the Quebec Health Card Project, SCAM is used to provide services between physicians' or pharmacists' software and IBM smart card technology. We propose to expose the concepts and techniques used to provide a generic environment to deal with smart cards (and more generally with memory cards), to obtain a dynamic an evolutive PMR, to raise the system global security level and the data integrity, to optimize significantly the management of the PMR, and to provide statistic information about the use of the PMR.

  9. Low Power Near Field Communication Methods for RFID Applications of SIM Cards.

    PubMed

    Chen, Yicheng; Zheng, Zhaoxia; Gong, Mingyang; Yu, Fengqi

    2017-04-14

    Power consumption and communication distance have become crucial challenges for SIM card RFID (radio frequency identification) applications. The combination of long distance 2.45 GHz radio frequency (RF) technology and low power 2 kHz near distance communication is a workable scheme. In this paper, an ultra-low frequency 2 kHz near field communication (NFC) method suitable for SIM cards is proposed and verified in silicon. The low frequency transmission model based on electromagnetic induction is discussed. Different transmission modes are introduced and compared, which show that the baseband transmit mode has a better performance. The low-pass filter circuit and programmable gain amplifiers are applied for noise reduction and signal amplitude amplification. Digital-to-analog converters and comparators are used to judge the card approach and departure. A novel differential Manchester decoder is proposed to deal with the internal clock drift in range-controlled communication applications. The chip has been fully implemented in 0.18 µm complementary metal-oxide-semiconductor (CMOS) technology, with a 330 µA work current and a 45 µA idle current. The low frequency chip can be integrated into a radio frequency SIM card for near field RFID applications.

  10. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    PubMed

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  11. Secure Biometric E-Voting Scheme

    NASA Astrophysics Data System (ADS)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  12. Trap height and orientation of yellow sticky traps affect capture of Chaetocnema pulicaria (Coleoptera: Chrysomelidae).

    PubMed

    Esker, P D; Obrycki, J; Nutter, F W

    2004-02-01

    Field studies were conducted in Iowa during 2001 and 2002 to determine the optimal sampling height and orientation for using yellow sticky cards to monitor populations of Chaetocnema pulicaria Melsheimer, the vector of the bacterial pathogen Pantoea stewartii subsp, stewartii, the causal organism of Stewart's disease of corn, Zea mays L.. Sticky cards were placed at five different heights (0.15, 0.30, 0.45, 0.60, and 0.90 m) and three orientations (horizontal, vertical, and 30 degree angle) at three locations (Ames, Crawfordsville, and Sutherland) in 2001 and two locations (Crawfordsville and Johnston) in 2002. No statistical differences were observed among the placement combinations for individual sampling periods or for the total number of C. pulicaria captured in 2001. In 2002, the 0.30 m and vertical cards captured significantly (1.1-35 times) more C. pulicaria than any other placement combination during sampling throughout August at both Crawfordsville and Johnston. Also, the cumulative number of C. pulicaria captured by the 0.30 m and vertical cards was significantly higher than all other placement combinations. This information is important in the development of sampling protocols to aid growers in making management decisions. These management decisions include where and when to apply foliar insecticides during the corn growing season to control C. pulicaria populations, thereby reducing the risk for Stewart's disease of corn.

  13. NOD1CARD Might Be Using Multiple Interfaces for RIP2-Mediated CARD-CARD Interaction: Insights from Molecular Dynamics Simulation

    PubMed Central

    Pradhan, Sukanta Kumar; De, Sachinandan

    2017-01-01

    The nucleotide-binding and oligomerization domain (NOD)-containing protein 1 (NOD1) plays the pivotal role in host-pathogen interface of innate immunity and triggers immune signalling pathways for the maturation and release of pro-inflammatory cytokines. Upon the recognition of iE-DAP, NOD1 self-oligomerizes in an ATP-dependent fashion and interacts with adaptor molecule receptor-interacting protein 2 (RIP2) for the propagation of innate immune signalling and initiation of pro-inflammatory immune responses. This interaction (mediated by NOD1 and RIP2) helps in transmitting the downstream signals for the activation of NF-κB signalling pathway, and has been arbitrated by respective caspase-recruitment domains (CARDs). The so-called CARD-CARD interaction still remained contradictory due to inconsistent results. Henceforth, to understand the mode and the nature of the interaction, structural bioinformatics approaches were employed. MD simulation of modelled 1:1 heterodimeric complexes revealed that the type-Ia interface of NOD1CARD and the type-Ib interface of RIP2CARD might be the suitable interfaces for the said interaction. Moreover, we perceived three dynamically stable heterotrimeric complexes with an NOD1:RIP2 ratio of 1:2 (two numbers) and 2:1. Out of which, in the first trimeric complex, a type-I NOD1-RIP2 heterodimer was found interacting with an RIP2CARD using their type-IIa and IIIa interfaces. However, in the second and third heterotrimer, we observed type-I homodimers of NOD1 and RIP2 CARDs were interacting individually with RIP2CARD and NOD1CARD (in type-II and type-III interface), respectively. Overall, this study provides structural and dynamic insights into the NOD1-RIP2 oligomer formation, which will be crucial in understanding the molecular basis of NOD1-mediated CARD-CARD interaction in higher and lower eukaryotes. PMID:28114344

  14. Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits

    NASA Astrophysics Data System (ADS)

    Bußmeyer, Daniel; Gröbert, Felix; Schwenk, Jörg; Wegener, Christoph

    Due to recent attacks on online banking systems and consequent soaring losses through fraud, different methods have been developed to ensure a secure connection between a bank and its customers. One method is the inclusion of smart card readers into these schemes, which come along with different benefits, e.g., convenience and costs, and endangerments, especially on the security side.

  15. Imaging standards for smart cards

    NASA Astrophysics Data System (ADS)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-02-01

    "Smart cards" are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper will review imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper will conclude with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  16. Imaging standards for smart cards

    NASA Astrophysics Data System (ADS)

    Ellson, Richard N.; Ray, Lawrence A.

    1996-01-01

    'Smart cards' are plastic cards the size of credit cards which contain integrated circuits for the storage of digital information. The applications of these cards for image storage has been growing as card data capacities have moved from tens of bytes to thousands of bytes. This has prompted the recommendation of standards by the X3B10 committee of ANSI for inclusion in ISO standards for card image storage of a variety of image data types including digitized signatures and color portrait images. This paper reviews imaging requirements of the smart card industry, challenges of image storage for small memory devices, card image communications, and the present status of standards. The paper concludes with recommendations for the evolution of smart card image standards towards image formats customized to the image content and more optimized for smart card memory constraints.

  17. Print a Bed Bug Card - (Page of Cards)

    EPA Pesticide Factsheets

    For mass distribution: two sets of business-card-sized lists of tips for recognizing bed bugs and signs of an infestation, including a photo of bed bugs to assist identification. One card is for general use around home or office, the other for travelers.

  18. Results From Malaysia's 2016 Report Card on Physical Activity for Children and Adolescents.

    PubMed

    Sharif, Razinah; Chong, Kar Hau; Zakaria, Nur Hadiyani; Ong, Min Li; Reilly, John J; Wong, Jyh Eiin; Saad, Hazizi Abu; Poh, Bee Koon

    2016-11-01

    The 2016 Malaysia Active Healthy Kids Report Card aims to collect, assess, and grade current and comprehensive data on physical activity (PA) and associated factors in Malaysian children and adolescents aged 5 to 17 years. This report card was developed following the Active Healthy Kids Canada Report Card protocol. The Research Working Group identified the core matrices, assessed the key data sources, and evaluated the evidence gathered for grade assignments. A grade was assigned to each indicator by comparing the best available evidence against relevant benchmark using a standardized grading scheme. Overall Physical Activity, Active Transportation, and Sedentary Behavior were assigned the D grade. The lowest grade of F was assigned to Diet, while School and Government Strategies and Investments were graded higher with a B. Five indicators were assigned INC (incomplete) due to a lack of representative data. The report card demonstrates that Malaysian children and adolescents are engaging in low levels of PA and active commuting, high levels of screen time, and have extremely low compliance with dietary recommendations. More efforts are needed to address the root causes of physical inactivity while increasing the opportunities for children and adolescents to be more physically active.

  19. [Yellow fever].

    PubMed

    Sabbatani, Sergio; Fiorino, Sirio

    2007-06-01

    After the discovery of the New World, yellow fever proved to be an important risk factor of morbidity and mortality for Caribbean populations. In the following centuries epidemic risk, expanded by sea trade and travel, progressively reached the settlements in North America and Brazil as well as the Atlantic seaboard of tropical and equatorial Africa. In the eighteenth century and the first half of the nineteenth century epidemics of yellow fever were reported in some coastal towns in the Iberian peninsula, French coast, Great Britain and Italy, where, in 1804 at Leghorn, only one epidemic was documented. Prevention and control programs against yellow fever, developed at the beginning of the twentieth century in Cuba and in Panama, were a major breakthrough in understanding definitively its aetiology and pathogenesis. Subsequently, further advances in knowledge of yellow fever epidemiology were obtained when French scientists, working in West and Central Africa, showed that monkeys were major hosts of the yellow fever virus (the wild yellow fever virus), besides man. In addition, advances in research, contributing to the development of vaccines against the yellow fever virus in the first half of the nineteenth century, are reported in this paper.

  20. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  1. High Order Semi-Lagrangian Advection Scheme

    NASA Astrophysics Data System (ADS)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  2. The SMile Card: a computerised data card for multiple sclerosis patients. SMile Card Scientific Board.

    PubMed

    Mancardi, G L; Uccelli, M M; Sonnati, M; Comi, G; Milanese, C; De Vincentiis, A; Battaglia, M A

    2000-04-01

    The SMile Card was developed as a means for computerising clinical information for the purpose of transferability, accessibility, standardisation and compilation of a national database of demographic and clinical information about multiple sclerosis (MS) patients. In many European countries, centres for MS are organised independently from one another making collaboration, consultation and patient referral complicated. Only the more highly advanced clinical centres, generally located in large urban areas, have had the possibility to utilise technical possibilities for improving the organisation of patient clinical and research information, although independently from other centres. The information system, developed utilising the Visual Basic language for Microsoft Windows 95, stores information via a 'smart card' in a database which is initiated and updated utilising a microprocessor, located at each neurological clinic. The SMile Card, currently being tested in Italy, permits patients to carry with them all relevant medical information without limitations. Neurologists are able to access and update, via the microprocessor, the patient's entire medical history and MS-related information, including the complete neurological examination and laboratory test results. The SMile Card provides MS patients and neurologists with a complete computerised archive of clinical information which is accessible throughout the country. In addition, data from the SMile Card system can be exported to other database programs.

  3. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    PubMed

    Chaudhry, Shehzad Ashraf; Khan, Muhammad Tawab; Khan, Muhammad Khurram; Shon, Taeshik

    2016-11-01

    Recently several authentication schemes are proposed for telecare medicine information system (TMIS). Many of such schemes are proved to have weaknesses against known attacks. Furthermore, numerous such schemes cannot be used in real time scenarios. Because they assume a single server for authentication across the globe. Very recently, Amin et al. (J. Med. Syst. 39(11):180, 2015) designed an authentication scheme for secure communication between a patient and a medical practitioner using a trusted central medical server. They claimed their scheme to extend all security requirements and emphasized the efficiency of their scheme. However, the analysis in this article proves that the scheme designed by Amin et al. is vulnerable to stolen smart card and stolen verifier attacks. Furthermore, their scheme is having scalability issues along with inefficient password change and password recovery phases. Then we propose an improved scheme. The proposed scheme is more practical, secure and lightweight than Amin et al.'s scheme. The security of proposed scheme is proved using the popular automated tool ProVerif.

  4. Thermal transfer structures coupling electronics card(s) to coolant-cooled structure(s)

    DOEpatents

    David, Milnes P; Graybill, David P; Iyengar, Madhusudan K; Kamath, Vinod; Kochuparambil, Bejoy J; Parida, Pritish R; Schmidt, Roger R

    2014-12-16

    Cooling apparatuses and coolant-cooled electronic systems are provided which include thermal transfer structures configured to engage with a spring force one or more electronics cards with docking of the electronics card(s) within a respective socket(s) of the electronic system. A thermal transfer structure of the cooling apparatus includes a thermal spreader having a first thermal conduction surface, and a thermally conductive spring assembly coupled to the conduction surface of the thermal spreader and positioned and configured to reside between and physically couple a first surface of an electronics card to the first surface of the thermal spreader with docking of the electronics card within a socket of the electronic system. The thermal transfer structure is, in one embodiment, metallurgically bonded to a coolant-cooled structure and facilitates transfer of heat from the electronics card to coolant flowing through the coolant-cooled structure.

  5. International images: business cards.

    PubMed

    Gaston, S; Pucci, J

    1991-01-01

    Nursing specialists engage in a variety of international professional activities. Business cards are an important aspect of establishing a professional image. This article presents recommended business card contents, international etiquette, card design and production, and cared innovations.

  6. 19. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., PELLON LAND WORKS, HALIFAX, ENGLAND, SN #M2983 14 (EST. DATE 1940'S+). - Bamberg Cotton Mill, Main Street, Bamberg, Bamberg County, SC

  7. Development of a report card on healthy food environments and nutrition for children in Canada.

    PubMed

    Olstad, Dana Lee; Raine, Kim D; Nykiforuk, Candace I J

    2014-12-01

    The purpose of the Report Card on Healthy Food Environments and Nutrition for Children is to assess how current environments and policies in Canada support or create barriers to improving children's dietary behaviours and body weights. In 2014 we reviewed the literature to identify indicators of the quality of children's food environments and related policies. Scoring systems used to monitor and report on progress on a variety of public health activities were consulted during development of a grading scheme. The Report Card was revised following reviews by an Expert Advisory Committee. The Report Card assigns a grade to policies and actions (42 indicators and benchmarks) within 4 micro-environments (physical, communication, economic, social) and within the political macro-environment. Grade-level scores of A through F are assigned that reflect achievement of, supports for, and monitoring of indicator-specific benchmarks. A Canadian Report Card will be released annually starting in 2015. The Report Card is a novel tool to monitor the state of children's food environments and supportive policies, inform stakeholders of the state of these environments and policies, engage society in a national discussion, and outline a policy-relevant research agenda for further study. Copyright © 2014 Elsevier Inc. All rights reserved.

  8. 20. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. SECOND FLOOR, CARDING MACHINE, BY 'CARDING SPECIALISTS, CO., LTD., PELLON LAND WORKS, HALIFAX, ENGLAND, SN #M2983 14 (EST. DATE 1940'S+), OPPOSITE END - Bamberg Cotton Mill, Main Street, Bamberg, Bamberg County, SC

  9. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    NASA Technical Reports Server (NTRS)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the

  10. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  11. Analysis of an RNA-seq Strand-Specific Library from an East Timorese Cucumber Sample Reveals a Complete Cucurbit aphid-borne yellows virus Genome.

    PubMed

    Maina, Solomon; Edwards, Owain R; de Almeida, Luis; Ximenes, Abel; Jones, Roger A C

    2017-05-11

    Analysis of an RNA-seq library from cucumber leaf RNA extracted from a fast technology for analysis of nucleic acids (FTA) card revealed the first complete genome of Cucurbit aphid-borne yellows virus (CABYV) from East Timor. We compare it with 35 complete CABYV genomes from other world regions. It most resembled the genome of the South Korean isolate HD118. Copyright © 2017 Maina et al.

  12. Analysis of an RNA-seq Strand-Specific Library from an East Timorese Cucumber Sample Reveals a Complete Cucurbit aphid-borne yellows virus Genome

    PubMed Central

    Maina, Solomon; Edwards, Owain R.; de Almeida, Luis; Ximenes, Abel

    2017-01-01

    ABSTRACT Analysis of an RNA-seq library from cucumber leaf RNA extracted from a fast technology for analysis of nucleic acids (FTA) card revealed the first complete genome of Cucurbit aphid-borne yellows virus (CABYV) from East Timor. We compare it with 35 complete CABYV genomes from other world regions. It most resembled the genome of the South Korean isolate HD118. PMID:28495776

  13. A smart-card-enabled privacy preserving E-prescription system.

    PubMed

    Yang, Yanjiang; Han, Xiaoxi; Bao, Feng; Deng, Robert H

    2004-03-01

    Within the overall context of protection of health care information, privacy of prescription data needs special treatment. First, the involvement of diverse parties, especially nonmedical parties in the process of drug prescription complicates the protection of prescription data. Second, both patients and doctors have privacy stakes in prescription, and their privacy should be equally protected. Third, the following facts determine that prescription should not be processed in a truly anonymous manner: certain involved parties conduct useful research on the basis of aggregation of prescription data that are linkable with respect to either the patients or the doctors; prescription data has to be identifiable in some extreme circumstances, e.g., under the court order for inspection and assign liability. In this paper, we propose an e-prescription system to address issues pertaining to the privacy protection in the process of drug prescription. In our system, patients' smart cards play an important role. For one thing, the smart cards are implemented to be portable repositories carrying up-to-date personal medical records and insurance information, providing doctors instant data access crucial to the process of diagnosis and prescription. For the other, with the secret signing key being stored inside, the smart card enables the patient to sign electronically the prescription pad, declaring his acceptance of the prescription. To make the system more realistic, we identify the needs for a patient to delegate his signing capability to other people so as to protect the privacy of information housed on his card. A strong proxy signature scheme achieving technologically mutual agreements on the delegation is proposed to implement the delegation functionality.

  14. Research on the SIM card implementing functions of transport card

    NASA Astrophysics Data System (ADS)

    Li, Yi; Wang, Lin

    2015-12-01

    This paper is based on the analysis for theory and key technologies of contact communication, contactless communication card and STK menu, and proposes complete software and hardware solution for achieving convenience and secure mobile payment system on SIM card.

  15. Computer circuit card puller

    NASA Technical Reports Server (NTRS)

    Sawyer, R. V.; Szuwalski, B. (Inventor)

    1981-01-01

    The invention generally relates to hand tools, and more particularly to an improved device for facilitating removal of printed circuit cards from a card rack characterized by longitudinal side rails arranged in a mutually spaced parallelism and a plurality of printed circuit cards extended between the rails of the rack.

  16. Yellow fever.

    PubMed

    Monath, Thomas P; Vasconcelos, Pedro F C

    2015-03-01

    Yellow fever, a mosquito-borne flavivirus disease occurs in tropical areas of South America and Africa. It is a disease of major historical importance, but remains a threat to travelers to and residents of endemic areas despite the availability of an effective vaccine for nearly 70 years. An important aspect is the receptivity of many non-endemic areas to introduction and spread of yellow fever. This paper reviews the clinical aspects, pathogenesis, and epidemiology of yellow fever, with an emphasis on recent changes in the distribution and incidence of the disease. Recent knowledge about yellow fever 17D vaccine mechanism of action and safety are discussed. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments.

    PubMed

    Guo, Hua; Wang, Pei; Zhang, Xiyong; Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.'s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.'s scheme still has weaknesses. In this paper, we show that Moon et al.'s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient.

  18. Vibration Damping Circuit Card Assembly

    NASA Technical Reports Server (NTRS)

    Hunt, Ronald Allen (Inventor)

    2016-01-01

    A vibration damping circuit card assembly includes a populated circuit card having a mass M. A closed metal container is coupled to a surface of the populated circuit card at approximately a geometric center of the populated circuit card. Tungsten balls fill approximately 90% of the metal container with a collective mass of the tungsten balls being approximately (0.07) M.

  19. Card Access Know-How.

    ERIC Educational Resources Information Center

    College Planning & Management, 2000

    2000-01-01

    Provides tips for expanding a school's card access system and making it more productive for all concerned. Tips include the use of electronic locks for better security; the need for state-of-the-art card reader system to save money in the long run; selecting vendors to one that manufactures, installs, and supports the card system; and having…

  20. An authentication scheme for secure access to healthcare services.

    PubMed

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  1. Rational confederation of genes and diseases: NGS interpretation via GeneCards, MalaCards and VarElect.

    PubMed

    Rappaport, Noa; Fishilevich, Simon; Nudel, Ron; Twik, Michal; Belinky, Frida; Plaschkes, Inbar; Stein, Tsippi Iny; Cohen, Dana; Oz-Levi, Danit; Safran, Marilyn; Lancet, Doron

    2017-08-18

    A key challenge in the realm of human disease research is next generation sequencing (NGS) interpretation, whereby identified filtered variant-harboring genes are associated with a patient's disease phenotypes. This necessitates bioinformatics tools linked to comprehensive knowledgebases. The GeneCards suite databases, which include GeneCards (human genes), MalaCards (human diseases) and PathCards (human pathways) together with additional tools, are presented with the focus on MalaCards utility for NGS interpretation as well as for large scale bioinformatic analyses. VarElect, our NGS interpretation tool, leverages the broad information in the GeneCards suite databases. MalaCards algorithms unify disease-related terms and annotations from 69 sources. Further, MalaCards defines hierarchical relatedness-aliases, disease families, a related diseases network, categories and ontological classifications. GeneCards and MalaCards delineate and share a multi-tiered, scored gene-disease network, with stringency levels, including the definition of elite status-high quality gene-disease pairs, coming from manually curated trustworthy sources, that includes 4500 genes for 8000 diseases. This unique resource is key to NGS interpretation by VarElect. VarElect, a comprehensive search tool that helps infer both direct and indirect links between genes and user-supplied disease/phenotype terms, is robustly strengthened by the information found in MalaCards. The indirect mode benefits from GeneCards' diverse gene-to-gene relationships, including SuperPaths-integrated biological pathways from 12 information sources. We are currently adding an important information layer in the form of "disease SuperPaths", generated from the gene-disease matrix by an algorithm similar to that previously employed for biological pathway unification. This allows the discovery of novel gene-disease and disease-disease relationships. The advent of whole genome sequencing necessitates capacities to go beyond

  2. Authentication techniques for smart cards

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thoroughmore » understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.« less

  3. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    PubMed

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  4. Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme

    PubMed Central

    Li, Huixian; Chen, Xubao; Pang, Liaojun; Shi, Weisong

    2013-01-01

    The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC), which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC) based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ) problem and its unforgeability under the Isomorphism of Polynomials (IP) assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards. PMID:23967037

  5. Unraveling a Card Trick

    NASA Astrophysics Data System (ADS)

    Hoare, Tony; Shankar, Natarajan

    In one version of Gilbreath's card trick, a deck of cards is arranged as a series of quartets, where each quartet contains a card from each suit and all the quartets feature the same ordering of the suits. For example, the deck could be a repeating sequence of spades, hearts, clubs, and diamonds, in that order, as in the deck below.

  6. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments

    PubMed Central

    Huang, Yuanfei; Ma, Fangchao

    2017-01-01

    In order to improve the security in remote authentication systems, numerous biometric-based authentication schemes using smart cards have been proposed. Recently, Moon et al. presented an authentication scheme to remedy the flaws of Lu et al.’s scheme, and claimed that their improved protocol supports the required security properties. Unfortunately, we found that Moon et al.’s scheme still has weaknesses. In this paper, we show that Moon et al.’s scheme is vulnerable to insider attack, server spoofing attack, user impersonation attack and guessing attack. Furthermore, we propose a robust anonymous multi-server authentication scheme using public key encryption to remove the aforementioned problems. From the subsequent formal and informal security analysis, we demonstrate that our proposed scheme provides strong mutual authentication and satisfies the desirable security requirements. The functional and performance analysis shows that the improved scheme has the best secure functionality and is computational efficient. PMID:29121050

  7. Print a Bed Bug Card

    EPA Pesticide Factsheets

    Two sets of business card-sized lists of tips for prevention of bed bug infestations, one for general use around home, the other for travelers. Print a single card or a page of cards for distribution.

  8. Medication safety--reliability of preference cards.

    PubMed

    Dawson, Anthony; Orsini, Michael J; Cooper, Mary R; Wollenburg, Karol

    2005-09-01

    A CLINICAL ANALYSIS of surgeons' preference cards was initiated in one hospital as part of a comprehensive analysis to reduce medication-error risks by standardizing and simplifying the intraoperative medication-use process specific to the sterile field. THE PREFERENCE CARD ANALYSIS involved two subanalyses: a review of the information as it appeared on the cards and a failure mode and effects analysis of the process involved in using and maintaining the cards. THE ANALYSIS FOUND that the preference card system in use at this hospital is outdated. Variations and inconsistencies within the preference card system indicate that the use of preference cards as guides for medication selection for surgical procedures presents an opportunity for medication errors to occur.

  9. Passive microfluidic array card and reader

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dugan, Lawrence Christopher; Coleman, Matthew A

    A microfluidic array card and reader system for analyzing a sample. The microfluidic array card includes a sample loading section for loading the sample onto the microfluidic array card, a multiplicity of array windows, and a transport section or sections for transporting the sample from the sample loading section to the array windows. The microfluidic array card reader includes a housing, a receiving section for receiving the microfluidic array card, a viewing section, and a light source that directs light to the array window of the microfluidic array card and to the viewing section.

  10. A Mechanism for Anonymous Credit Card Systems

    NASA Astrophysics Data System (ADS)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  11. Smart Cards and remote entrusting

    NASA Astrophysics Data System (ADS)

    Aussel, Jean-Daniel; D'Annoville, Jerome; Castillo, Laurent; Durand, Stephane; Fabre, Thierry; Lu, Karen; Ali, Asad

    Smart cards are widely used to provide security in end-to-end communication involving servers and a variety of terminals, including mobile handsets or payment terminals. Sometime, end-to-end server to smart card security is not applicable, and smart cards must communicate directly with an application executing on a terminal, like a personal computer, without communicating with a server. In this case, the smart card must somehow trust the terminal application before performing some secure operation it was designed for. This paper presents a novel method to remotely trust a terminal application from the smart card. For terminals such as personal computers, this method is based on an advanced secure device connected through the USB and consisting of a smart card bundled with flash memory. This device, or USB dongle, can be used in the context of remote untrusting to secure portable applications conveyed in the dongle flash memory. White-box cryptography is used to set the secure channel and a mechanism based on thumbprint is described to provide external authentication when session keys need to be renewed. Although not as secure as end-to-end server to smart card security, remote entrusting with smart cards is easy to deploy for mass-market applications and can provide a reasonable level of security.

  12. Identification of Drosophila melanogaster yellow-f and yellow-f2 proteins as dopachrome-conversion enzymes.

    PubMed Central

    Han, Qian; Fang, Jianmin; Ding, Haizhen; Johnson, Jody K; Christensen, Bruce M; Li, Jianyong

    2002-01-01

    This study describes the identification of Drosophila yellow-f and yellow-f2 as dopachrome-conversion enzymes responsible for catalysing the conversion of dopachrome into 5,6-dihydroxyindole in the melanization pathway. Drosophila yellow -y gene and yellow -b, -c, -f and -f2 genes were expressed in an insect cell/baculovirus expression system and their corresponding recombinant proteins were screened for dopachrome-conversion enzyme activity. Among the yellow and yellow -related genes, the yellow -f and yellow -f2 genes were identified as the genes coding for Drosophila dopachrome-conversion enzyme based on the high activity of their recombinant proteins in catalysing the production of 5,6-dihydroxyindole from dopachrome. Both yellow-f and yellow-f2 are capable of mediating a decarboxylative structural rearrangement of dopachrome, as well as an isomerization/tautomerization of dopamine chrome and dopa methyl ester chrome. Northern hybridization revealed the transcription of yellow -f in larvae and pupae, but a high abundance of mRNA was observed in later larval and early pupal stages. In contrast, yellow-f2 transcripts were present at all stages, but high abundance of its mRNA was observed in later-stage pupae and adults. These data indicate that yellow-f and yellow-f2 complement each other during Drosophila development and that the yellow-f is involved in larval and pupal melanization, and yellow-f2 plays a major role in melanization reactions in Drosophila during later pupal and adult development. Results from this study provide the groundwork towards a better understanding of the physiological roles of the Drosophila yellow gene family. PMID:12164780

  13. 75 FR 10414 - Researcher Identification Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... capturing administrative information on the characteristics of our users. Other forms of identification are... use bar-codes on researcher identification cards in the Washington, DC, area. The plastic cards we... plastic researcher identification cards as part of their security systems, we issue a plastic card to...

  14. The "Negative" Credit Card Effect: Credit Cards as Spending-Limiting Stimuli in New Zealand

    ERIC Educational Resources Information Center

    Lie, Celia; Hunt, Maree; Peters, Heather L.; Veliu, Bahrie; Harper, David

    2010-01-01

    The "credit card effect" describes a finding where greater value is given to consumer items if credit card logos are present. One explanation for the effect is that credit cards elicit spending behavior through associative learning. If this is true, social, economic and historical contexts should alter this effect. In Experiment 1, Year…

  15. Three dimensional identification card and applications

    NASA Astrophysics Data System (ADS)

    Zhou, Changhe; Wang, Shaoqing; Li, Chao; Li, Hao; Liu, Zhao

    2016-10-01

    Three dimensional Identification Card, with its three-dimensional personal image displayed and stored for personal identification, is supposed be the advanced version of the present two-dimensional identification card in the future [1]. Three dimensional Identification Card means that there are three-dimensional optical techniques are used, the personal image on ID card is displayed to be three-dimensional, so we can see three dimensional personal face. The ID card also stores the three-dimensional face information in its inside electronics chip, which might be recorded by using two-channel cameras, and it can be displayed in computer as three-dimensional images for personal identification. Three-dimensional ID card might be one interesting direction to update the present two-dimensional card in the future. Three-dimension ID card might be widely used in airport custom, entrance of hotel, school, university, as passport for on-line banking, registration of on-line game, etc...

  16. Credit Cards. Bulletin No. 721. (Revised.)

    ERIC Educational Resources Information Center

    Fox, Linda Kirk

    This cooperative extension bulletin provides basic information about credit cards and their use. It covers the following topics: types of credit cards (revolving credit, travel and entertainment, and debit); factors to consider when evaluating a credit card (interest rates, grace period, and annual membership fee); other credit card costs (late…

  17. Design of a 3-dimensional visual illusion speed reduction marking scheme.

    PubMed

    Liang, Guohua; Qian, Guomin; Wang, Ye; Yi, Zige; Ru, Xiaolei; Ye, Wei

    2017-03-01

    To determine which graphic and color combination for a 3-dimensional visual illusion speed reduction marking scheme presents the best visual stimulus, five parameters were designed. According to the Balanced Incomplete Blocks-Law of Comparative Judgment, three schemes, which produce strong stereoscopic impressions, were screened from the 25 initial design schemes of different combinations of graphics and colors. Three-dimensional experimental simulation scenes of the three screened schemes were created to evaluate four different effects according to a semantic analysis. The following conclusions were drawn: schemes with a red color are more effective than those without; the combination of red, yellow and blue produces the best visual stimulus; a larger area from the top surface and the front surface should be colored red; and a triangular prism should be painted as the graphic of the marking according to the stereoscopic impression and the coordination of graphics with the road.

  18. [Application of patient card technology to health care].

    PubMed

    Sayag, E; Danon, Y L

    1995-03-15

    The potential benefits of patient card technology in improving management and delivery of health services have been explored. Patient cards can be used for numerous applications and functions: as a means of identification, as a key for an insurance payment system, and as a communication medium. Advanced card technologies allow for the storage of data on the card, creating the possibility of a comprehensive and portable patient record. There are many types of patient cards: paper or plastic cards, microfilm cards, bar-code cards, magnetic-strip cards and integrated circuit smart-cards. Choosing the right card depends on the amount of information to be stored, the degree of security required and the cost of the cards and their supporting infrastructure. Problems with patient cards are related to storage capacity, backup and data consistency, access authorization and ownership and compatibility. We think it is worth evaluating the place of patient card technology in the delivery of health services in Israel.

  19. Follow Up: Credit Card Caution

    ERIC Educational Resources Information Center

    Cahill, Timothy P.

    2007-01-01

    In "Pushing Plastic," ("The New England Journal of Higher Education", Summer 2007), John Humphrey notes that many college administrators justify their credit card solicitations by suggesting that credit card access will help students learn to manage their own finances. Instead, credit card debt will teach thousands of students…

  20. Digitizing Olin Eggen's Card Database

    NASA Astrophysics Data System (ADS)

    Crast, J.; Silvis, G.

    2017-06-01

    The goal of the Eggen Card Database Project is to recover as many of the photometric observations from Olin Eggen's Card Database as possible and preserve these observations, in digital forms that are accessible by anyone. Any observations of interest to the AAVSO will be added to the AAVSO International Database (AID). Given to the AAVSO on long-term loan by the Cerro Tololo Inter-American Observatory, the database is a collection of over 78,000 index cards holding all Eggen's observations made between 1960 and 1990. The cards were electronically scanned and the resulting 108,000 card images have been published as a series of 2,216 PDF files, which are available from the AAVSO web site. The same images are also stored in an AAVSO online database where they are indexed by star name and card content. These images can be viewed using the eggen card portal online tool. Eggen made observations using filter bands from five different photometric systems. He documented these observations using 15 different data recording formats. Each format represents a combination of filter magnitudes and color indexes. These observations are being transcribed onto spreadsheets, from which observations of value to the AAVSO are added to the AID. A total of 506 U, B, V, R, and I observations were added to the AID for the variable stars S Car and l Car. We would like the reader to search through the card database using the eggen card portal for stars of particular interest. If such stars are found and retrieval of the observations is desired, e-mail the authors, and we will be happy to help retrieve those data for the reader.

  1. Citizen empowerment using healthcare and welfare cards.

    PubMed

    Cheshire, Paul

    2006-01-01

    Cards are used in health and welfare to establish the identity of the person presenting the card; to prove their entitlement to a welfare or healthcare service; to store data needed within the care process; and to store data to use in the administration process. There is a desire to empower citizens - to give them greater control over their lives, their health and wellbeing. How can a healthcare and welfare card support this aim? Does having a card empower the citizen? What can a citizen do more easily, reliably, securely or cost-effectively because they have a card? A number of possibilities include: Choice of service provider; Mobility across regional and national boundaries; Privacy; and Anonymity. But in all of these possibilities a card is just one component of a total system and process, and there may be other solutions--technological and manual. There are risks and problems from relying on a card; and issues of Inclusion for people who are unable use a card. The article concludes that: cards need to be viewed in the context of the whole solution; cards are not the only technological mechanism; cards are not the best mechanism in all circumstances; but cards are very convenient method in very many situations.

  2. Early clinical experience with CardioCard - a credit card-sized electronic patient record.

    PubMed

    Bernheim, Alain M; Schaer, Beat A; Kaufmann, Christoph; Brunner-La Rocca, Hanspeter; Moulay-Lakhdar, Nadir; Buser, Peter T; Pfisterer, Matthias E; Osswald, Stefan

    2006-08-19

    CardioCard is a CDROM of credit card size containing medical information on cardiac patients. Patient data acquired during hospital stay are stored in PDF format and secured by a password known to patients only. In a consecutive series of patients, we assessed acceptance and utility of this new information medium. A questionnaire was sent to all patients who had received CardioCard over a one-year period. The questionnaire was returned by 392 patients (73%). 44% of patients had the card with them all the time. The majority of patients (73%) considered the CardioCard useful (8% not useful, 19% no statement) and most (78%) would even agree to bear additional costs. Only 5% worried about data security. In contrast, 44% would be concerned of data transmission via internet. During an observation period of 6 (SD 3) months, data were accessed by 27% of patients and 12% of their physicians. The proportion of card users was lower among older patients: < or = 50 years (y), 39%; 51.60 y, 38%; 61.70 y, 26%; >70 y, 16% and particularly among older women: 61.70 y, 9%; >70 y, 5%. Technical problems during data access occurred in 34%, mostly due to incorrect handling. A majority of patients considered CardioCard as useful and safe. Lack of hardware equipment or insufficient computer knowledge, but not safety issues were the most important limitations. As patients expressed concerns regarding protection of privacy if data were accessible via internet, this would remain a strong limiting factor for online use.

  3. Mammography screening credit card and compliance.

    PubMed

    Schapira, D V; Kumar, N B; Clark, R A; Yag, C

    1992-07-15

    Screening for breast cancer using mammography has been shown to be effective in reducing mortality from breast cancer. The authors attempted to determine if use of a wallet-size plastic screening "credit" card would increase participants' compliance for subsequent mammograms when compared with traditional methods of increasing compliance. Two hundred and twenty consecutive women, ages 40-70 years, undergoing their first screening mammography were recruited and assigned randomly to four groups receiving (1) a reminder plastic credit card (2) reminder credit card with written reminder; (3) appointment card; and (4) verbal recommendation. Return rates of the four groups were determined after 15 months. The return rate for subsequent mammograms was significantly higher for participants (72.4%) using the credit card than for participants (39.8%) exposed to traditional encouragement/reminders (P less than 0.0001). The credit card was designed to show the participant's screening anniversary, and the durability of the card may have been a factor in increasing the return rate. The use of reminder credit cards may increase compliance for periodic screening examinations for other cancers and other chronic diseases.

  4. Holo-Chidi video concentrator card

    NASA Astrophysics Data System (ADS)

    Nwodoh, Thomas A.; Prabhakar, Aditya; Benton, Stephen A.

    2001-12-01

    The Holo-Chidi Video Concentrator Card is a frame buffer for the Holo-Chidi holographic video processing system. Holo- Chidi is designed at the MIT Media Laboratory for real-time computation of computer generated holograms and the subsequent display of the holograms at video frame rates. The Holo-Chidi system is made of two sets of cards - the set of Processor cards and the set of Video Concentrator Cards (VCCs). The Processor cards are used for hologram computation, data archival/retrieval from a host system, and for higher-level control of the VCCs. The VCC formats computed holographic data from multiple hologram computing Processor cards, converting the digital data to analog form to feed the acousto-optic-modulators of the Media lab's Mark-II holographic display system. The Video Concentrator card is made of: a High-Speed I/O (HSIO) interface whence data is transferred from the hologram computing Processor cards, a set of FIFOs and video RAM used as buffer for data for the hololines being displayed, a one-chip integrated microprocessor and peripheral combination that handles communication with other VCCs and furnishes the card with a USB port, a co-processor which controls display data formatting, and D-to-A converters that convert digital fringes to analog form. The co-processor is implemented with an SRAM-based FPGA with over 500,000 gates and controls all the signals needed to format the data from the multiple Processor cards into the format required by Mark-II. A VCC has three HSIO ports through which up to 500 Megabytes of computed holographic data can flow from the Processor Cards to the VCC per second. A Holo-Chidi system with three VCCs has enough frame buffering capacity to hold up to thirty two 36Megabyte hologram frames at a time. Pre-computed holograms may also be loaded into the VCC from a host computer through the low- speed USB port. Both the microprocessor and the co- processor in the VCC can access the main system memory used to store control

  5. Theoretical analysis of geometry and NMR isotope shift in hydrogen-bonding center of photoactive yellow protein by combination of multicomponent quantum mechanics and ONIOM scheme

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kanematsu, Yusuke; Tachikawa, Masanori

    2014-11-14

    Multicomponent quantum mechanical (MC-QM) calculation has been extended with ONIOM (our own N-layered integrated molecular orbital + molecular mechanics) scheme [ONIOM(MC-QM:MM)] to take account of both the nuclear quantum effect and the surrounding environment effect. The authors have demonstrated the first implementation and application of ONIOM(MC-QM:MM) method for the analysis of the geometry and the isotope shift in hydrogen-bonding center of photoactive yellow protein. ONIOM(MC-QM:MM) calculation for a model with deprotonated Arg52 reproduced the elongation of O–H bond of Glu46 observed by neutron diffraction crystallography. Among the unique isotope shifts in different conditions, the model with protonated Arg52 with solventmore » effect reasonably provided the best agreement with the corresponding experimental values from liquid NMR measurement. Our results implied the availability of ONIOM(MC-QM:MM) to distinguish the local environment around hydrogen bonds in a biomolecule.« less

  6. Reminder card helps patients remember OCs.

    PubMed

    1999-11-01

    Organon has developed the Reminder Card to help women patients remember their regular intake of oral contraceptive (OC) pills. About 50% of women take birth control pills as prescribed, 25% miss a pill per month, and 25% miss two or more pills in the same time frame. The plastic card, about the size and shape of a credit card, contains a microchip timer. Reminder cards are available to providers who use the Starter Kits issued by the company for new-start patients on the Mircette OC. When patients begin their first pack of pills, they select the time of day they prefer to have the Reminder Card emit its tiny beep. The time is set into the microchip timer and the card is programmed to sound automatically at the pre-set time each day for the next three months. The direction for using the Reminder Card is outlined.

  7. Comparative Study of the New Colorimetric VITEK 2 Yeast Identification Card versus the Older Fluorometric Card and of CHROMagar Candida as a Source Medium with the New Card

    PubMed Central

    Aubertine, C. L.; Rivera, M.; Rohan, S. M.; Larone, D. H.

    2006-01-01

    The new VITEK 2 colorimetric card was compared to the previous fluorometric card for identification of yeast. API 20C was considered the “gold standard.” The new card consistently performed better than the older card. Isolates from CHROMagar Candida plates were identified equally as well as those from Sabouraud dextrose agar. PMID:16390976

  8. Coupling WRF double-moment 6-class microphysics schemes to RRTMG radiation scheme in weather research forecasting model

    DOE PAGES

    Bae, Soo Ya; Hong, Song -You; Lim, Kyo-Sun Sunny

    2016-01-01

    A method to explicitly calculate the effective radius of hydrometeors in the Weather Research Forecasting (WRF) double-moment 6-class (WDM6) microphysics scheme is designed to tackle the physical inconsistency in cloud properties between the microphysics and radiation processes. At each model time step, the calculated effective radii of hydrometeors from the WDM6 scheme are linked to the Rapid Radiative Transfer Model for GCMs (RRTMG) scheme to consider the cloud effects in radiative flux calculation. This coupling effect of cloud properties between the WDM6 and RRTMG algorithms is examined for a heavy rainfall event in Korea during 25–27 July 2011, and itmore » is compared to the results from the control simulation in which the effective radius is prescribed as a constant value. It is found that the derived radii of hydrometeors in the WDM6 scheme are generally larger than the prescribed values in the RRTMG scheme. Consequently, shortwave fluxes reaching the ground (SWDOWN) are increased over less cloudy regions, showing a better agreement with a satellite image. The overall distribution of the 24-hour accumulated rainfall is not affected but its amount is changed. In conclusion, a spurious rainfall peak over the Yellow Sea is alleviated, whereas the local maximum in the central part of the peninsula is increased.« less

  9. Coupling WRF double-moment 6-class microphysics schemes to RRTMG radiation scheme in weather research forecasting model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bae, Soo Ya; Hong, Song -You; Lim, Kyo-Sun Sunny

    A method to explicitly calculate the effective radius of hydrometeors in the Weather Research Forecasting (WRF) double-moment 6-class (WDM6) microphysics scheme is designed to tackle the physical inconsistency in cloud properties between the microphysics and radiation processes. At each model time step, the calculated effective radii of hydrometeors from the WDM6 scheme are linked to the Rapid Radiative Transfer Model for GCMs (RRTMG) scheme to consider the cloud effects in radiative flux calculation. This coupling effect of cloud properties between the WDM6 and RRTMG algorithms is examined for a heavy rainfall event in Korea during 25–27 July 2011, and itmore » is compared to the results from the control simulation in which the effective radius is prescribed as a constant value. It is found that the derived radii of hydrometeors in the WDM6 scheme are generally larger than the prescribed values in the RRTMG scheme. Consequently, shortwave fluxes reaching the ground (SWDOWN) are increased over less cloudy regions, showing a better agreement with a satellite image. The overall distribution of the 24-hour accumulated rainfall is not affected but its amount is changed. In conclusion, a spurious rainfall peak over the Yellow Sea is alleviated, whereas the local maximum in the central part of the peninsula is increased.« less

  10. Coupling WRF Double-Moment 6-Class Microphysics Schemes to RRTMG Radiation Scheme in Weather Research Forecasting Model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bae, Soo Ya; Hong, Song-You; Lim, Kyo-Sun Sunny

    A method to explicitly calculate the effective radius of hydrometeors in the Weather Research Forecasting (WRF) double-moment 6-class (WDM6) microphysics scheme is designed to tackle the physical inconsistency in cloud properties between the microphysics and radiation processes. At each model time step, the calculated effective radii of hydrometeors from the WDM6 scheme are linked to the Rapid Radiative Transfer Model for GCMs (RRTMG) scheme to consider the cloud effects in radiative flux calculation. This coupling effect of cloud properties between the WDM6 and RRTMG algorithms is examined for a heavy rainfall event in Korea during 25–27 July 2011, and itmore » is compared to the results from the control simulation in which the effective radius is prescribed as a constant value. It is found that the derived radii of hydrometeors in the WDM6 scheme are generally larger than the prescribed values in the RRTMG scheme. Consequently, shortwave fluxes reaching the ground (SWDOWN) are increased over less cloudy regions, showing a better agreement with a satellite image. The overall distribution of the 24-hour accumulated rainfall is not affected but its amount is changed. A spurious rainfall peak over the Yellow Sea is alleviated, whereas the local maximum in the central part of the peninsula is increased.« less

  11. Improvement of a uniqueness-and-anonymity-preserving user authentication scheme for connected health care.

    PubMed

    Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting

    2014-09-01

    Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.

  12. Comparison of Cell Preparations between Commercially Available Filter Cards of the Cytospin with Custom Made Filter Cards.

    PubMed

    Krishnamurthy, Vani; Satish, Suchitha; Doreswamy, Srinivasa Murthy; Vimalambike, Manjunath Gubbanna

    2016-07-01

    Cytological evaluation of body fluids is an important diagnostic technique. Cytocentrifuge has contributed immensely to improve the diagnostic yield of the body fluids. Cytocentrifuge requires a filter card for absorbing the cell free fluid. This is the only consumable which needs to be purchased from the manufacturer at a significant cost. To compare the cell density in cytocentrifuge preparations made from commercially available filter cards with custom made filter cards. This was a prospective analytical study undertaken in department of pathology of a tertiary care centre. A 300 GSM handmade paper with the absorbability similar to the conventional card was obtained and fashioned to suit the filter card slot of the cytospin. Thirty seven body fluids were centrifuged using both conventional and custom made filter card. The cell density was measured as number of cells per 10 high power fields. The median cell density was compared using Mann-Whitney U test. The agreement between the values was analysed using Bland Altman analysis. The median cell count per 10 High power field (HPF) with conventional card was 386 and that with custom made card was 408. The difference was not statistically significant (p = 0.66). There was no significant difference in the cell density and alteration in the morphology between the cell preparations using both the cards. Custom made filter card can be used for cytospin cell preparations of body fluids without loss of cell density or alteration in the cell morphology and at a very low cost.

  13. EduCard. Adult Education Access Card. Policy Option Paper on Strategic Recommendation 4. First Edition.

    ERIC Educational Resources Information Center

    Porter, Dennis

    One recommendation of the 1989 California Strategic Plan for Adult Education is the use of EduCard. EduCard, the Adult Education Access Card, is a means of giving learners access to information about educational opportunities and providing administrators with machine-readable information on learners' prior education and traiing. Three models are:…

  14. Store Security. Credit Card Fraud.

    ERIC Educational Resources Information Center

    Brockway, Jerry

    The manual, intended for use by adults and not in the high school classroom situation, presents material directed toward assisting in the reduction of credit card crime. This teaching guide is organized in three sections which deal with the nature of and major reasons for credit card fraud, the types of hot card runners, and methods of reducing…

  15. The HyperCard Launching Pad.

    ERIC Educational Resources Information Center

    Aufdenspring, Gary; Aufdenspring, Deborah

    1992-01-01

    Describes how HyperCard software can be used to direct students to databases, applications, and explanations in an online environment. The use of HyperCard with other software is discussed; using HyperCard to set up tutorials is explained; and limitations are addressed, including the amount of memory needed and the speed of the hardware. (LRW)

  16. Yellow fever: epidemiology and prevention.

    PubMed

    Barnett, Elizabeth D

    2007-03-15

    Yellow fever continues to occur in regions of Africa and South America, despite the availability of effective vaccines. Recently, some cases of severe neurologic disease and multiorgan system disease have been described in individuals who received yellow fever vaccine. These events have focused attention on the need to define criteria for judicious use of yellow fever vaccine and to describe the spectrum of adverse events that may be associated with yellow fever vaccine. Describing host factors that would increase risk of these events and identifying potential treatment modalities for yellow fever and yellow fever vaccine-associated adverse events are subjects of intense investigation.

  17. Discount medical cards: innovation or illusion?

    PubMed

    Kofman, Mila; Libster, Jennifer; Bangit, Eliza

    2005-03-01

    Discount medical cards have come under increasing scrutiny by regulators and law enforcement officials as a result of mounting consumer-reported problems. For their study, the authors tested five cards available in the Washington, D.C., metro area; interviewed card company representatives, state attorneys general insurance regulators, and insurance agents; and reviewed court and administrative actions. While some cards provide a measure of value, other cards were found to have serious drawbacks, including: high-pressure sales tactics; misleading or inaccurate promotion; exaggerated claims of savings; difficulty finding participating doctors; and providers who failed to give cardholders promised discounts. Some discount card companies are seeking to reform the market through a trade association and voluntary code of conduct. Still, legislative and regulatory interventions will be needed to protect consumers in an unregulated and growing market.

  18. Patron ID Cards Made Easy and Cheap

    ERIC Educational Resources Information Center

    Peischl, Tom

    1978-01-01

    Four major problems of academic library identification cards are expense, distribution, timeliness, and validation. By moving from a commercially produced plastic library card to a locally produced paper IBM-type card, this library solved these four library card problems. (Author)

  19. Impacts of the dam-orientated water-sediment regulation scheme on the lower reaches and delta of the Yellow River (Huanghe): A review

    NASA Astrophysics Data System (ADS)

    Wang, Houjie; Wu, Xiao; Bi, Naishuang; Li, Song; Yuan, Ping; Wang, Aimei; Syvitski, James P. M.; Saito, Yoshiki; Yang, Zuosheng; Liu, Sumei; Nittrouer, Jeffrey

    2017-10-01

    The water-sediment regulation scheme (WSRS), beginning in 2002, is an unprecedented engineering effort to manage the Yellow River with the aims to mitigate the siltation both in the lower river channel and within the Xiaolangdi Reservoir utilizing the dam-regulated flood water. Ten years after its initial implementation, multi-disciplinary indicators allow us to offer a comprehensive review of this human intervention on a river-coastal system. The WSRS generally achieved its objective, including bed erosion in the lower reaches with increasing capacity for flood discharge and the mitigation of reservoir siltation. However, the WSRS presented unexpected disturbances on the delta and coastal system. Increasing grain size of suspended sediment and decreasing suspended sediment concentration at the river mouth resulted in a regime shift of sediment transport patterns that enhanced the disequilibrium of the delta. The WSRS induced an impulse delivery of nutrients and pollutants within a short period ( 20 days), which together with the altered hydrological cycle, impacted the estuarine and coastal ecosystem. We expect that the sediment yield from the loess region in the future will decrease due to soil-conservation practices, and the lower channel erosion will also decrease as the riverbed armors with coarser sediment. These, in combination with uncertain water discharge concomitant with climate change, increasing water demands and delta subsidence, will put the delta and coastal ocean at high environmental risks. In the context of global change, this work depicts a scenario of human impacts in the river basin that were transferred along the hydrological pathway to the coastal system and remotely transformed the different components of coastal environment. The synthesis review of the WSRS indicates that an integrated management of the river-coast continuum is crucially important for the sustainability of the entire river-delta system. The lessons learned from the WSRS in

  20. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography.

    PubMed

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Kumar, Neeraj

    2015-11-01

    In the last few years, numerous remote user authentication and session key agreement schemes have been put forwarded for Telecare Medical Information System, where the patient and medical server exchange medical information using Internet. We have found that most of the schemes are not usable for practical applications due to known security weaknesses. It is also worth to note that unrestricted number of patients login to the single medical server across the globe. Therefore, the computation and maintenance overhead would be high and the server may fail to provide services. In this article, we have designed a medical system architecture and a standard mutual authentication scheme for single medical server, where the patient can securely exchange medical data with the doctor(s) via trusted central medical server over any insecure network. We then explored the security of the scheme with its resilience to attacks. Moreover, we formally validated the proposed scheme through the simulation using Automated Validation of Internet Security Schemes and Applications software whose outcomes confirm that the scheme is protected against active and passive attacks. The performance comparison demonstrated that the proposed scheme has lower communication cost than the existing schemes in literature. In addition, the computation cost of the proposed scheme is nearly equal to the exiting schemes. The proposed scheme not only efficient in terms of different security attacks, but it also provides an efficient login, mutual authentication, session key agreement and verification and password update phases along with password recovery.

  1. Helping Students Design HyperCard Stacks.

    ERIC Educational Resources Information Center

    Dunham, Ken

    1995-01-01

    Discusses how to teach students to design HyperCard stacks. Highlights include introducing HyperCard, developing storyboards, introducing design concepts and scripts, presenting stacks, evaluating storyboards, and continuing projects. A sidebar presents a HyperCard stack evaluation form. (AEF)

  2. Solution structure of Apaf-1 CARD and its interaction with caspase-9 CARD: a structural basis for specific adaptor/caspase interaction.

    PubMed

    Zhou, P; Chou, J; Olea, R S; Yuan, J; Wagner, G

    1999-09-28

    Direct recruitment and activation of caspase-9 by Apaf-1 through the homophilic CARD/CARD (Caspase Recruitment Domain) interaction is critical for the activation of caspases downstream of mitochondrial damage in apoptosis. Here we report the solution structure of the Apaf-1 CARD domain and its surface of interaction with caspase-9 CARD. Apaf-1 CARD consists of six tightly packed amphipathic alpha-helices and is topologically similar to the RAIDD CARD, with the exception of a kink observed in the middle of the N-terminal helix. By using chemical shift perturbation data, the homophilic interaction was mapped to the acidic surface of Apaf-1 CARD centered around helices 2 and 3. Interestingly, a significant portion of the chemically perturbed residues are hydrophobic, indicating that in addition to the electrostatic interactions predicted previously, hydrophobic interaction is also an important driving force underlying the CARD/CARD interaction. On the basis of the identified functional residues of Apaf-1 CARD and the surface charge complementarity, we propose a model of CARD/CARD interaction between Apaf-1 and caspase-9.

  3. Personal medical information system using laser card

    NASA Astrophysics Data System (ADS)

    Cho, Seong H.; Kim, Keun Ho; Choi, Hyung-Sik; Park, Hyun Wook

    1996-04-01

    The well-known hospital information system (HIS) and the picture archiving and communication system (PACS) are typical applications of multimedia to medical area. This paper proposes a personal medical information save-and-carry system using a laser card. This laser card is very useful, especially in emergency situations, because the medical information in the laser card can be read at anytime and anywhere if there exists a laser card reader/writer. The contents of the laser card include the clinical histories of a patient such as clinical chart, exam result, diagnostic reports, images, and so on. The purpose of this system is not a primary diagnosis, but emergency reference of clinical history of the patient. This personal medical information system consists of a personal computer integrated with laser card reader/writer, color frame grabber, color CCD camera and a high resolution image scanner optionally. Window-based graphical user interface was designed for easy use. The laser card has relatively sufficient capacity to store the personal medical information, and has fast access speed to restore and load the data with a portable size as compact as a credit card. Database items of laser card provide the doctors with medical data such as laser card information, patient information, clinical information, and diagnostic result information.

  4. Engineering software development with HyperCard

    NASA Technical Reports Server (NTRS)

    Darko, Robert J.

    1990-01-01

    The successful and unsuccessful techniques used in the development of software using HyperCard are described. The viability of the HyperCard for engineering is evaluated and the future use of HyperCard by this particular group of developers is discussed.

  5. The effect of selected health education schemes on knowledge and attitude of the Kanuri towards certain parasitic diseases.

    PubMed

    Akogun, O B

    1992-12-01

    The effect of 3 types of intervention schemes on the scientific knowledge and attitude of Kanuri towards malaria, diarrhoea and dysentery and intestinal worms was assessed using the Likert scale response type statements. 1383 respondents in our identical Kanuri villages were used in the study. The effect of still pictures and card games (Goramari), drama songs, storytelling and discussions (Yerimari) and a combination of both (Shetimari) on knowledge and attitude was tested. Gotimari was used as the control. Quarterly assessment of changes in knowledge and attitude showed that Goramari was the least effective while Yerimari and Shetimari were the most effective. Women were more influenced than men by health education schemes which involve drama songs and stories while card games and still pictures had very little effect on them (women). The implication of these findings on disease management through health education is discussed.

  6. A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng

    2015-11-01

    To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.

  7. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    PubMed

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.

  8. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  9. Stream processing health card application.

    PubMed

    Polat, Seda; Gündem, Taflan Imre

    2012-10-01

    In this paper, we propose a data stream management system embedded to a smart card for handling and storing user specific summaries of streaming data coming from medical sensor measurements and/or other medical measurements. The data stream management system that we propose for a health card can handle the stream data rates of commonly known medical devices and sensors. It incorporates a type of context awareness feature that acts according to user specific information. The proposed system is cheap and provides security for private data by enhancing the capabilities of smart health cards. The stream data management system is tested on a real smart card using both synthetic and real data.

  10. Coding the Eggen Cards (Poster abstract)

    NASA Astrophysics Data System (ADS)

    Silvis, G.

    2014-06-01

    (Abstract only) A look at the Eggen Portal for accessing the Eggen cards. And a call for volunteers to help code the cards: 100,000 cards must be looked at and their star references identified and coded into the database for this to be a valuable resource.

  11. On Developing HyperCard Stacks for the Study of Chinese Characters: KanjiCard.

    ERIC Educational Resources Information Center

    Nakajima, Kazuko

    1988-01-01

    Describes "KanjiCard," an interactive self-tutorial program for beginning students of Japanese to learn Kanji, Chinese characters used in the Japanese language. The Macintosh-developed approach uses "HyperCard" technology, computer-assisted animation, and voice digitizing to achieve enhanced graphic presentation. (Author/CB)

  12. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards

    PubMed Central

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user’s management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.’s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.’s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.’s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties. PMID:26709702

  13. Health Card: a new reform plan.

    PubMed

    Seidman, L S

    1995-01-01

    Health Card is a new reform plan. Every household, regardless of employment of health status, would receive a government-issued health credit card to use at the doctor's office or hospital like MasterCard. Later, it would be billed a percentage of the provider's charge--a percentage scaled to its last income tax return; its annual burden would never exceed a designated percentage of its income. Health Card would simply and directly achieve universal coverage and equitable patient cost-sharing. Like MasterCard, government would pay bills, not regulate providers. Each household would choose its medical provider (fee-for-service or HMO), bearing a percentage of the charge. Provider competition for cost-sharing consumers would help contain health care costs.

  14. HyperCard--A Science Teaching Tool.

    ERIC Educational Resources Information Center

    Parker, Carol

    1992-01-01

    Discussion of new technological resources available for science instruction focuses on the use of the HyperCard software for the Macintosh to design customized materials. Topics addressed include general features of HyperCard, designing HyperCard stacks, graphics, and designing buttons (i.e., links for moving through the stacks). Several sample…

  15. An acuity cards cookbook.

    PubMed

    Vital-Durand, F

    1996-01-01

    Acuity cards are being more commonly used in clinical and screening practice. The author describes his experience from over 6000 infants tested with the method, using two commercially available sets of cards to provide users with comprehensive guidelines to allow them to get the most out of this useful test.

  16. The yellow x paper birch hybrid--a potential substitute for yellow birch on problem sites

    Treesearch

    Knud E. Clausen

    1977-01-01

    Yellow x paper birch hybrids and yellow birches with common female parents were compared after 5 growing seasons in an open field. Survival of the hybrids was 91 percent compared with 64 percent for the yellow birch trees. The hybrids were from 25 to 32 percent taller than the yellow birches and had 19-40 percent greater diameter. Because this hybrid not only grows...

  17. Shoreline dynamics of the active Yellow River delta since the implementation of Water-Sediment Regulation Scheme: A remote-sensing and statistics-based approach

    NASA Astrophysics Data System (ADS)

    Fan, Yaoshen; Chen, Shenliang; Zhao, Bo; Pan, Shunqi; Jiang, Chao; Ji, Hongyu

    2018-01-01

    The Active Yellow River (Huanghe) Delta (AYRD) is a complex landform in which rapid deposition takes place due to its geologic formation and evolution. Continuous monitoring of shoreline dynamics at high-temporal frequency is crucial for understanding the processes and the driving factors behind this rapidly changing coast. Great efforts have been devoted to map the changing shoreline of the Yellow River delta and explain such changes through remote sensing data. However, the temporal frequency of shoreline in the obtained datasets are generally not fine enough to reflect the detailed or subtly variable processes of shoreline retreat and advance. To overcome these limitations, we continuously monitored the dynamics of this shoreline using time series of Landsat data based on tidal-level calibration model and orthogonal-transect method. The Abrupt Change Value (ACV) results indicated that the retreat-advance patterns had a significant impact regardless of season or year. The Water-Sediment Regulation Scheme (WSRS) plays a dominant role in delivering river sediment discharge to the sea and has an impact on the annual average maximum ACV, especially at the mouth of the river. The positive relationship among the average ACV, runoff and sediment load are relatively obvious; however, we found that the Relative Exposure Index (REI) that measures wave energy was able to explain only approximately 20% of the variation in the data. Based on the abrupt change at the shoreline of the AYRD, river flow and time, we developed a binary regression model to calculate the critical sediment load and water discharge for maintaining the equilibrium of the active delta from 2002 to 2015. These values were approximately 0.48 × 108 t/yr and 144.37 × 108 m3/yr. If the current water and sediment proportions released from the Xiaolangdi Reservoir during the WSRS remain stable, the erosion-accretion patterns of the active delta will shift from rapid accretion to a dynamic balance.

  18. Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems.

    PubMed

    Yau, Wei-Chuen; Phan, Raphael C-W

    2013-12-01

    Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.

  19. HyperCard for Educators. An Introduction.

    ERIC Educational Resources Information Center

    Bull, Glen L.; Harris, Judi

    This guide is designed to provide a quick introduction to the basic elements of HyperCard for teachers who are familiar with other computer applications but may not have worked with hypermedia applications; previous familiarity with HyperCard or with Macintosh computers is not necessary. It is noted that HyperCard is a software construction…

  20. On the security of a dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Lin, Han-Yu

    2013-04-01

    Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.

  1. Grading School Report Cards

    ERIC Educational Resources Information Center

    Jacobson, Rebecca; Saultz, Andrew; Snyder, Jeffrey W.

    2013-01-01

    Recognizing the need for information in public education, Congress mandated in the No Child Left Behind Act (NCLB) that all states create and disseminate annual school performance report cards. A decade after NCLB passed, school report cards are widely available for nearly every school in the country. As the amount of school performance data…

  2. British and American attitudes toward credit cards.

    PubMed

    Yang, Bijou; James, Simon; Lester, David

    2006-04-01

    American university students owned more than twice as many credit cards as British university students. However, scores on a credit card attitude scale predicted the number of cards owned by respondents in both countries.

  3. Flesh color inheritance and gene interactions among canary yellow, pale yellow and red watermelon

    USDA-ARS?s Scientific Manuscript database

    Two loci, C and i-C were previously reported to determine flesh color between canary yellow and red watermelon. Recently LCYB was found as a color determinant gene for canary yellow (C) and co-dominant CAPS marker was developed to identify canary yellow and red alleles. Another report suggested th...

  4. Beet yellow stunt

    USDA-ARS?s Scientific Manuscript database

    Beet yellow stunt virus (BYSV) is a potentially destructive yellows-type virus affecting plants in the family Asteraceae. The virus is a member of the genus Closterovirus, family Closteroviridae, and has been found in California and England. Initial symptoms consist of chlorosis of the older leaves,...

  5. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    PubMed Central

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  6. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    PubMed

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  7. [Yellow fever: nurse counseling on travelers' health at basic health clinics].

    PubMed

    Mallet, Anna Paula; Dall'Agnol, Clarice Maria; Souza, Dirciara Barañano

    2010-06-01

    The objective of this qualitative, exploratory and descriptive study is to investigate the nursing practices related to travelers' health counseling. Data were collected from nursing professionals who work in the immunization sector of three Basic Health Units in Porto Alegre, Rio Grande do Sul, Brazil, using the technique of semi-structured interview. Five categories emerged from content analysis: care profile, health orientation, referrals to exchange the National Immunization Card for the International Certificate of Vaccination, information source and information material. The results signal the beginning of an organization of nursing practices focused on travelers' health, going beyond the focus on yellow fever. Failures in guidelines for acquisition of International Certificate of Vaccination still occur and information materials are missing. It points out to the need of broadening the discussion on travelers' health for a review of strategies for care organization and referrals for the construction of a specific policy.

  8. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR... commercial purchase card. (a) The Government purchase card has far fewer requirements for documentation than other methods of purchasing. However, the same legal restrictions apply to credit card purchases that...

  9. War of the Credit Cards.

    ERIC Educational Resources Information Center

    Nicklin, Julie L.

    1993-01-01

    Increasingly, colleges are offering affinity credit cards with attractive incentives as a marketing tool. Some in academe feel the trend may compromise educational objectives. Institutions may also face taxation on unrelated-business income generated through the cards. (MSE)

  10. 75 FR 55392 - Employment Network Report Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0046] Employment Network Report Card AGENCY... quality assurance, including a ticket consumer Employment Network Report Card. SUMMARY: We are soliciting... this goal by combining a user-friendly EN Report Card, which contains customer satisfaction feedback...

  11. New Medicare-approved prescription drug discount card.

    PubMed

    James, John S

    2004-05-28

    Patients who are on Medicare and have income under 135% of Federal poverty level and are not on Medicaid probably should obtain one of the new Medicare discount cards that became available on June 1, 2004, because all these cards include $600 annual credit for prescription-drug purchases for persons within that income limit. Unfortunately this program is complex, no one yet knows how it will work in practice, and after choosing a card one is locked in and cannot change cards until November 15. The most difficult part of the choice of which card to get may involve how it interacts with other programs, including ADAP, and pharmaceutical company patient assistance programs.

  12. Organocards--Chemical Card Game 2

    ERIC Educational Resources Information Center

    Kristol, D.; Perlmutter, H. D.

    1971-01-01

    Describes the use of the game cards designed to help students master a large number of seemingly diverse yet fundamental reactions of classical organic chemistry. Claims that cards have stimulated students to learn organic reactions more willingly and more independently. (Author/PR)

  13. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Tabulating machine cards. 908.7117 Section 908.7117 Federal Acquisition Regulations System DEPARTMENT OF ENERGY COMPETITION... Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  14. 48 CFR 908.7117 - Tabulating machine cards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Tabulating machine cards. 908.7117 Section 908.7117 Federal Acquisition Regulations System DEPARTMENT OF ENERGY COMPETITION... Tabulating machine cards. DOE offices shall acquire tabulating machine cards in accordance with FPMR 41 CFR...

  15. 12 CFR 1026.12 - Special credit card provisions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Special credit card provisions. 1026.12 Section...-End Credit § 1026.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including business, commercial, or agricultural use, no...

  16. 12 CFR 1026.12 - Special credit card provisions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 9 2014-01-01 2014-01-01 false Special credit card provisions. 1026.12 Section...-End Credit § 1026.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including business, commercial, or agricultural use, no...

  17. 12 CFR 1026.12 - Special credit card provisions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Special credit card provisions. 1026.12 Section...-End Credit § 1026.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including business, commercial, or agricultural use, no...

  18. 12 CFR 226.12 - Special credit card provisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...

  19. 12 CFR 226.12 - Special credit card provisions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 3 2013-01-01 2013-01-01 false Special credit card provisions. 226.12 Section... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used...

  20. 12 CFR 226.12 - Special credit card provisions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 3 2011-01-01 2011-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...

  1. 12 CFR 226.12 - Special credit card provisions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 3 2014-01-01 2014-01-01 false Special credit card provisions. 226.12 Section... SYSTEM (CONTINUED) TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used...

  2. 12 CFR 226.12 - Special credit card provisions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 3 2012-01-01 2012-01-01 false Special credit card provisions. 226.12 Section... SYSTEM TRUTH IN LENDING (REGULATION Z) Open-End Credit § 226.12 Special credit card provisions. (a) Issuance of credit cards. Regardless of the purpose for which a credit card is to be used, including...

  3. Understanding the types of fraud in claims to South African medical schemes.

    PubMed

    Legotlo, T G; Mutezo, A

    2018-03-28

    Medical schemes play a significant role in funding private healthcare in South Africa (SA). However, the sector is negatively affected by the high rate of fraudulent claims. To identify the types of fraudulent activities committed in SA medical scheme claims. A cross-sectional qualitative study was conducted, adopting a case study strategy. A sample of 15 employees was purposively selected from a single medical scheme administration company in SA. Semi-structured interviews were conducted to collect data from study participants. A thematic analysis of the data was done using ATLAS.ti software (ATLAS.ti Scientific Software Development, Germany). The study population comprised the 17 companies that administer medical schemes in SA. Data were collected from 15 study participants, who were selected from the medical scheme administrator chosen as a case study. The study found that medical schemes were defrauded in numerous ways. The perpetrators of this type of fraud include healthcare service providers, medical scheme members, employees, brokers and syndicates. Medical schemes are mostly defrauded by the submission of false claims by service providers and syndicates. Fraud committed by medical scheme members encompasses the sharing of medical scheme benefits with non-members (card farming) and non-disclosure of pre-existing conditions at the application stage. The study concluded that perpetrators of fraud have found several ways of defrauding SA medical schemes regarding claims. Understanding and identifying the types of fraud events facing medical schemes is the initial step towards establishing methods to mitigate this risk. Future studies should examine strategies to manage fraudulent medical scheme claims.

  4. Using Business Cards to Teach Document Design.

    ERIC Educational Resources Information Center

    Nelson, Ronald J.

    1994-01-01

    Argues that business cards, as a key means of initiating business contacts, are worth studying in business writing courses. Shows instructors how to incorporate a unit on business card design into their business communications courses. Suggests the criteria by which business cards can be evaluated. (HB)

  5. Re-Designing Business Card Advertisements.

    ERIC Educational Resources Information Center

    Schaub, Laura

    2001-01-01

    Discusses ways to turn information from a business card into an advertisement to be placed in a student publication. Addresses visual interest, typography, and other design issues. Includes several sample advertisements and a classroom activity involving redesigning a business card into an advertisement. (RS)

  6. Insect enemies of yellow-poplar

    Treesearch

    Denver P. Burns; Denver P. Burns

    1970-01-01

    Yellow-poplar, like the other desirable hardwoods, is attacked by a variety of insects. However, only four species of insects are considered economically important: the tuliptree scale, the yellow-poplar weevil, the root-collar borer, and the Columbian timber beetle. These are native enemies of yellow-poplar (Liriodendvon tzllipifera L.) wherever the tree grows.

  7. Determinants of debit cards acceptance: An empirical investigation

    NASA Astrophysics Data System (ADS)

    Ismail, Shafinar; Bakri, Mohamed Hariri; Zulkepli, Jafri; Adnan, Azimah; Azizi, Amsyar

    2014-12-01

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300 respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.

  8. PREL Pacific Region Language Cards.

    ERIC Educational Resources Information Center

    Pacific Region Educational Lab., Honolulu, HI.

    This collection of 10 cue cards presents English translations of common English words and expressions into 10 Pacific Region languages: Palauan, Samoan, Chamorro, Hawaiian, Carolinian, Chuukese, Pohnpeian, Marshallese, Yapese, and Kosraean. The cards translate the following: hello, good morning, good afternoon, good night, thank you, you're…

  9. Optical smart card using semipassive communication.

    PubMed

    Glaser, I; Green, Shlomo; Dimkov, Ilan

    2006-03-15

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  10. Optical smart card using semipassive communication

    NASA Astrophysics Data System (ADS)

    Glaser, I.; Green, Shlomo; Dimkov, Ilan

    2006-03-01

    An optical secure short-range communication system is presented. The mobile unit (optical smart card) of this system utilizes a retroreflector with an optical modulator, using light from the stationary unit; this mobile unit has very low power consumption and can be as small as a credit card. Such optical smart cards offer better security than RF-based solutions, yet do not require physical contact. Results from a feasibility study model are included.

  11. Health care report cards: what about consumers' perspectives?

    PubMed

    McGee, J; Knutson, D

    1994-10-01

    Though the report card style is seen by many as a way to create better-informed consumers, very little is actually known about how consumers will respond to health care report cards. Report cards are only one of many factors that influence health care decision making. Much consumer-oriented effort and fine-tuning will be required to make report cards effective. Using the approach called "social marketing" as a framework, specific examples are used to outline some ideas for more intensive pursuit of consumers' perspectives in the design and distribution of report cards.

  12. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2015-03-01

    The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.

  13. Cards in the Classroom: Mathematics and Methods.

    ERIC Educational Resources Information Center

    Baker, Robert N.

    This report researches the use of a standard deck of playing cards in entry-level college mathematics classrooms. The study looks at published research on the use of cards, and reviews pedagogic concerns directly related to the implementation of playing cards in the classroom--including the appropriateness of manipulatives, the link to cooperative…

  14. "It's in the Cards": The Contribution of Illustrated Metaphor Cards to Exploring Values Within Narratives.

    PubMed

    Karnieli-Miller, Orit; Nissim, Geffen; Goldberg, Miriam

    2017-01-01

    In this article, we present the use of illustrated metaphorical cards as a technique to enrich the qualitative narrative interview. We examine the advantages of incorporating a projective tool to assist in constructing and understanding personal narratives of people living with severe mental illness. We interviewed 25 participants-staff and members of a clubhouse in Israel (an international community model of rehabilitation in mental health)-and sought to understand their stories focused on personal and organizational values. The findings revealed that, in most cases, the cards contributed to data collection by enhancing the interviewees' ability for expression and by facilitating richer, more comprehensive stories and descriptions. This in turn enhanced the researcher's ability to understand the messages and stories presented. The research conclusions discuss the cards' potential contribution to improving data collection and analysis. The cards became an additional channel for expressing participants' experiences, emotions, and unique voice. © The Author(s) 2015.

  15. Determinants of debit cards acceptance: An empirical investigation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ismail, Shafinar; Adnan, Azimah; Azizi, Amsyar

    These days, most of the Malaysians realize that the consumption of debit card will help them to reduce the household debt. Thus, it is important to analyse the acceptance of debit cards for further enhancement and expanding its market share in Malaysia. In addition, there is lacked of research being conducted on the determinants affecting the acceptance of debit cards among Malaysians. Thus, the study aimed to investigate the factors affecting the acceptance of debit cards. This study focuses on payment methods, consumer attitude, and safety of debit card in acceptance of debit cards. Questionnaires were distributed to the 300more » respondents. The sampling procedure adopted was stratified random sampling. The data obtained were analysed using SPSS 20.0 which involves scale reliability, descriptive and regression analysis. The result indicates that payment methods, consumer attitude and safety are the determinants of debit cards acceptance. Safety is the best predictor as most of the customers are confidents to use debit cards because of the security being developed around these debit card transactions. The analyses presented in this study can be used by policymakers and managers as a guide to promote banking products and services. The findings achieved in this study will be of interest for practitioners and academics concerned with developments of the Malaysian banking industry.« less

  16. Implementing a High-Assurance Smart-Card OS

    NASA Astrophysics Data System (ADS)

    Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.

    Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.

  17. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  18. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  19. It's All in the Cards.

    ERIC Educational Resources Information Center

    Burke, Jim

    2002-01-01

    Describes how the author learned by watching low-achieving students play intricate card games such as "Magic" that they can learn, can remember, and certainly can master information. Realizes that these cards were advanced learning tools, multifaceted texts using color, symbols, images, texts, and metaphor to help create a world of…

  20. Applying a Metrics Report Card

    ERIC Educational Resources Information Center

    Klubeck, Martin; Langthorne, Michael

    2008-01-01

    In this article, the authors suggest that providing a report card enables an IT department to check its progress and overall performance; communicate the department's effectiveness to university leadership, IT membership, and customers; and make any necessary adjustments. A report card will not show how efficiently the IT department functions, but…

  1. Smart cards: a specific application in the hospital.

    PubMed

    Güler, I; Zengin, R M; Sönmez, M

    1998-12-01

    Computers have the ability to process and access tremendous amounts of information in our daily lives. But, now, individuals have this ability by carrying a smart card in their own wallets. These cards provide us the versatility, power, and security of computers. This study begins with a short description of smart cards and their advantages. Then, an electronic circuit that is designed for healthcare application in hospitals is introduced. This circuit functions as a smart card holder identifier, access controller for hospital doors and also can be used as a smart card reader/writer. Design steps of this electronic circuit, operation principles, serial communication with P.C., and the software are examined. Finally a complete access control network for hospital doors that functions with smart cards is discussed.

  2. Smart Cards for Transit : Multi-Use Remotely Interrogated Stored-Data Cards for Fare and Toll Payment

    DOT National Transportation Integrated Search

    1995-04-01

    This project developed relevant information on existing and future, stored readable/writable data card technology for fare and toll payments. The project supports the FTA objective of developing a plan for a common standard card-based fare payment sy...

  3. How much do I save if I use my health insurance card when seeking outpatient care? Evidence from a low-income country.

    PubMed

    Sepehri, Ardeshir

    2014-03-01

    Much of the existing literature on the financial protection of health insurance focuses on the impact of insurance status on total out-of-pocket expenditure on all sorts of care sought, regardless of whether the insured patients use their health insurance cards. Using Vietnam's 2006 Household Living Standard Survey data and an appropriate multivariate regression model, this article assesses the influence of Vietnam's three health insurance schemes on out-of-pocket expenditures with and without controlling for the actual use of the health insurance card when seeking outpatient care. Vietnam's experience suggests that insurance provides some financial protection, provided that insurance benefits are actually accessed. Compared with private fee-paying patients, the use of the insurance card reduces out-of-pocket expenditures, on average, by as much as 50-56%. In contrast, failure to control for the use of the health insurance card reduces the financial protection of insurance to 26-37%. However, the financial protection benefits afforded by Vietnam's insurance schemes are distributed rather inequitably. Insurance reduces out-of-pocket expenditures by as much as 71-75% for contacts at the major state hospitals, as compared with 26-38% for contacts at the community health centres. The overall financial protection provided by insurance is also found to be larger for the higher-income individuals than the middle- and low-income individuals. Efforts to ensure that all enrollees receive equitable and good-quality health services according to the benefits package appear warranted. Improving the quality of care provided by the community health centres-the main access point for medical care for many enrollees with health insurance for the poor coverage-and a more effective referral system may also be a cost-effective way of channelling outpatient service contact to the lower-level health facilities, away from the overcrowded higher-level health facilities.

  4. Correlates of credit card ownership in men and women.

    PubMed

    Yang, Bijou; Lester, David

    2005-06-01

    In a sample of 352 students, correlates of credit card ownership differed by sex. For both men and women, credit card ownership was predicted by their affective attitude toward credit cards. However, whereas for men concern with money as a tactic for gaining power predicted credit card ownership, for women feelings of insecurity about having sufficient money and having a conservative approach to money predicted credit card ownership.

  5. 46 CFR 154.1814 - Cargo information cards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Cargo information cards. 154.1814 Section 154.1814... cards. (a) No person may operate a vessel unless a cargo information card for each cargo being... accessible to the person in charge of the watch. (b) When a vessel is moored at a terminal, the master shall...

  6. An Excel-lent Card Trick

    ERIC Educational Resources Information Center

    Zullo, Holly S.

    2011-01-01

    Card tricks based on mathematical principles can be a great way to get students interested in exploring some important mathematical ideas. In this article, the author discusses a simple spreadsheet implementation that shows students why the card trick works and allows them to explore several variations. As an added bonus, students are introduced…

  7. Yellow fever: an update.

    PubMed

    Monath, T P

    2001-08-01

    Yellow fever, the original viral haemorrhagic fever, was one of the most feared lethal diseases before the development of an effective vaccine. Today the disease still affects as many as 200,000 persons annually in tropical regions of Africa and South America, and poses a significant hazard to unvaccinated travellers to these areas. Yellow fever is transmitted in a cycle involving monkeys and mosquitoes, but human beings can also serve as the viraemic host for mosquito infection. Recent increases in the density and distribution of the urban mosquito vector, Aedes aegypti, as well as the rise in air travel increase the risk of introduction and spread of yellow fever to North and Central America, the Caribbean and Asia. Here I review the clinical features of the disease, its pathogenesis and pathophysiology. The disease mechanisms are poorly understood and have not been the subject of modern clinical research. Since there is no specific treatment, and management of patients with the disease is extremely problematic, the emphasis is on preventative vaccination. As a zoonosis, yellow fever cannot be eradicated, but reduction of the human disease burden is achievable through routine childhood vaccination in endemic countries, with a low cost for the benefits obtained. The biological characteristics, safety, and efficacy of live attenuated, yellow fever 17D vaccine are reviewed. New applications of yellow fever 17D virus as a vector for foreign genes hold considerable promise as a means of developing new vaccines against other viruses, and possibly against cancers.

  8. 48 CFR 413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... purchase card. 413.301 Section 413.301 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE....301 Governmentwide commercial purchase card. USDA policy and procedures on use of the Governmentwide commercial purchase card are established in Departmental Regulation Series 5000. ...

  9. A feasibility study of a data acquisition system for a silicon strip detector with a digital readout scheme

    NASA Astrophysics Data System (ADS)

    Ikeda, Hirokazu; Ikeda, Mitsuo; Inaba, Susumu; Tanaka, Manobu

    1993-06-01

    We describe a prototype data acquisition system for a silicon strip detector, which has been developed in terms of a digital readout scheme. The system consists of a master timing generator, readout controller, and a detector emulator card on which we use custom VLSI shift registers with operating clock frequency of 30 MHz.

  10. 48 CFR 1313.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... purchase card. 1313.301 Section 1313.301 Federal Acquisition Regulations System DEPARTMENT OF COMMERCE....301 Governmentwide commercial purchase card. The Department's procedures for the use and control of the Governmentwide commercial purchase card are set forth in CAM 1313.301. ...

  11. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    PubMed

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  12. An exploration of moral hazard behaviors under the national health insurance scheme in Northern Ghana: a qualitative study.

    PubMed

    Debpuur, Cornelius; Dalaba, Maxwell Ayindenaba; Chatio, Samuel; Adjuik, Martin; Akweongo, Patricia

    2015-10-15

    The government of Ghana introduced the National Health Insurance Scheme (NHIS) in 2003 through an Act of Parliament (Act 650) as a strategy to improve financial access to quality basic health care services. Although attendance at health facilities has increased since the introduction of the NHIS, there have been media reports of widespread abuse of the NHIS by scheme operators, service providers and insured persons. The aim of the study was to document behaviors and practices of service providers and clients of the NHIS in the Kassena-Nankana District (KND) of Ghana that constitute moral hazards (abuse of the scheme) and identify strategies to minimize such behaviors. Qualitative methods through 14 Focused Group Discussions (FGDs) and 5 individual in-depth interviews were conducted between December 2009 and January 2010. Thematic analysis was performed with the aid of QSR NVivo 8 software. Analysis of FGDs and in-depth interviews showed that community members, health providers and NHIS officers are aware of various behaviors and practices that constitute abuse of the scheme. Behaviors such as frequent and 'frivolous' visits to health facilities, impersonation, feigning sickness to collect drugs for non-insured persons, over charging for services provided to clients, charging clients for services not provided and over prescription were identified. Suggestions on how to minimize abuse of the NHIS offered by respondents included: reduction of premiums and registration fees, premium payments by installment, improvement in the picture quality of the membership cards, critical examination and verification of membership cards at health facilities, some ceiling on the number of times one can seek health care within a specified time period, and general education to change behaviors that abuse the scheme. Attention should be focused on addressing the identified moral hazard behaviors and pursue cost containment strategies to ensure the smooth operation of the scheme and

  13. Phylogeny of Yellow Fever Virus, Uganda, 2016.

    PubMed

    Hughes, Holly R; Kayiwa, John; Mossel, Eric C; Lutwama, Julius; Staples, J Erin; Lambert, Amy J

    2018-08-17

    In April 2016, a yellow fever outbreak was detected in Uganda. Removal of contaminating ribosomal RNA in a clinical sample improved the sensitivity of next-generation sequencing. Molecular analyses determined the Uganda yellow fever outbreak was distinct from the concurrent yellow fever outbreak in Angola, improving our understanding of yellow fever epidemiology.

  14. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... other methods of purchasing. However, the same legal restrictions apply to credit card purchases that.../Agency Purchase/Credit Card Program procedures. A number of the more common restrictions which... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR...

  15. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... other methods of purchasing. However, the same legal restrictions apply to credit card purchases that.../Agency Purchase/Credit Card Program procedures. A number of the more common restrictions which... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR...

  16. 48 CFR 2913.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... other methods of purchasing. However, the same legal restrictions apply to credit card purchases that.../Agency Purchase/Credit Card Program procedures. A number of the more common restrictions which... purchase card. 2913.301 Section 2913.301 Federal Acquisition Regulations System DEPARTMENT OF LABOR...

  17. Yellow-poplar seedfall pattern

    Treesearch

    LaMont G. Engle

    1960-01-01

    Knowing the pattern of seedfall can be helpful when trying to regenerate yellow-poplar. This is especially true if the stand contains only scattered yellow-poplar seed trees. Information obtained from seed collections in Indiana shows that most of the seed falls north and northeast of seed trees.

  18. Info card for surgery waiting room improves satisfaction.

    PubMed

    2015-11-01

    A hospital is reporting improved patient satisfaction from providing an information card in the surgery department. The card includes expected wait times. The card is provided by the patient transport team. Telephone numbers are included for more information. Staff update family members hourly during surgery.

  19. Application of an artificial neural network to pump card diagnosis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashenayi, K.; Lea, J.F.; Kemp, F.

    1994-12-01

    Beam pumping is the most frequently used artificial-lift technique for oil production. Downhole pump cards are used to evaluate performance of the pumping unit. Pump cards can be generated from surface dynamometer cards using a 1D wave equation with viscous damping, as suggested by Gibbs and Neely. Pump cards contain significant information describing the behavior of the pump. However, interpretation of these cards is tedious and time-consuming; hence, an automated system capable of interpreting these cards could speed interpretation and warn of pump failures. This work presents the results of a DOS-based computer program capable of correctly classifying pump cards.more » The program uses a hybrid artificial neural network (ANN) to identify significant features of the pump card. The hybrid ANN uses classical and sinusoidal perceptrons. The network is trained using an error-back-propagation technique. The program correctly identified pump problems for more than 180 different training and test pump cards. The ANN takes a total of 80 data points as input. Sixty data points are collected from the pump card perimeter, and the remaining 20 data points represent the slope at selected points on the pump card perimeter. Pump problem conditions are grouped into 11 distinct classes. The network is capable of identifying one or more of these problem conditions for each pump card. Eight examples are presented and discussed.« less

  20. 21 CFR 137.215 - Yellow corn flour.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 2 2011-04-01 2011-04-01 false Yellow corn flour. 137.215 Section 137.215 Food... Flours and Related Products § 137.215 Yellow corn flour. Yellow corn flour conforms to the definition and standard of identity prescribed by § 137.211 for white corn flour except that cleaned yellow corn is used...

  1. 21 CFR 137.275 - Yellow corn meal.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 2 2011-04-01 2011-04-01 false Yellow corn meal. 137.275 Section 137.275 Food and... Related Products § 137.275 Yellow corn meal. Yellow corn meal conforms to the definition and standard of identity prescribed by § 137.250 for white corn meal except that cleaned yellow corn is used instead of...

  2. 21 CFR 137.215 - Yellow corn flour.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Yellow corn flour. 137.215 Section 137.215 Food... Flours and Related Products § 137.215 Yellow corn flour. Yellow corn flour conforms to the definition and standard of identity prescribed by § 137.211 for white corn flour except that cleaned yellow corn is used...

  3. 21 CFR 137.275 - Yellow corn meal.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Yellow corn meal. 137.275 Section 137.275 Food and... Related Products § 137.275 Yellow corn meal. Yellow corn meal conforms to the definition and standard of identity prescribed by § 137.250 for white corn meal except that cleaned yellow corn is used instead of...

  4. Iridovirus CARD Protein Inhibits Apoptosis through Intrinsic and Extrinsic Pathways

    PubMed Central

    Chen, Chien-Wen; Wu, Ming-Shan; Huang, Yi-Jen; Lin, Pei-Wen; Shih, Chueh-Ju; Lin, Fu-Pang; Chang, Chi-Yao

    2015-01-01

    Grouper iridovirus (GIV) belongs to the genus Ranavirus of the family Iridoviridae; the genomes of such viruses contain an anti-apoptotic caspase recruitment domain (CARD) gene. The GIV-CARD gene encodes a protein of 91 amino acids with a molecular mass of 10,505 Daltons, and shows high similarity to other viral CARD genes and human ICEBERG. In this study, we used Northern blot to demonstrate that GIV-CARD transcription begins at 4 h post-infection; furthermore, we report that its transcription is completely inhibited by cycloheximide but not by aphidicolin, indicating that GIV-CARD is an early gene. GIV-CARD-EGFP and GIV-CARD-FLAG recombinant proteins were observed to translocate from the cytoplasm into the nucleus, but no obvious nuclear localization sequence was observed within GIV-CARD. RNA interference-mediated knockdown of GIV-CARD in GK cells infected with GIV inhibited expression of GIV-CARD and five other viral genes during the early stages of infection, and also reduced GIV infection ability. Immunostaining was performed to show that apoptosis was effectively inhibited in cells expressing GIV-CARD. HeLa cells irradiated with UV or treated with anti-Fas antibody will undergo apoptosis through the intrinsic and extrinsic pathways, respectively. However, over-expression of recombinant GIV-CARD protein in HeLa cells inhibited apoptosis induced by mitochondrial and death receptor signaling. Finally, we report that expression of GIV-CARD in HeLa cells significantly reduced the activities of caspase-8 and -9 following apoptosis triggered by anti-Fas antibody. Taken together, these results demonstrate that GIV-CARD inhibits apoptosis through both intrinsic and extrinsic pathways. PMID:26047333

  5. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...

  6. 48 CFR 13.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the current GSA credit card contract. Agency procedures should not limit the use of the Governmentwide... purchase card. 13.301 Section 13.301 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION... Governmentwide commercial purchase card. (a) Except as provided in 32.1108(b)(2), the Governmentwide commercial...

  7. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...

  8. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...

  9. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...

  10. 48 CFR 2413.301 - Governmentwide commercial purchase card.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Commercial Credit Card Program. [60 FR 46155, Sept. 5, 1995. Redesignated at 64 FR 46095, Aug. 23, 1999] ... purchase card. 2413.301 Section 2413.301 Federal Acquisition Regulations System DEPARTMENT OF HOUSING AND... Acquisition Methods 2413.301 Governmentwide commercial purchase card. (c) HUD's procedures concerning the use...

  11. 76 FR 76475 - Employment Network (EN) Report Card

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-07

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0096] Employment Network (EN) Report Card... Work Consumer Employment Network Report Card. SUMMARY: We are soliciting the input of beneficiaries... revised EN Report Card. An EN is a private or public entity that participates in the Ticket to Work (TTW...

  12. State Report Card, 2009-2010

    ERIC Educational Resources Information Center

    Arizona Department of Education, 2010

    2010-01-01

    As part of compliance with with the federal No Child Left Behind Act, this document presents the State Report Card of Arizona for 2009-2010. The report card provides tables relating to percentage of students who passed AIMS in Arizona by subject and grade. The tables shown in this document include: (1) Mathematics Grade 3; (2) Reading Grade 3; (3)…

  13. Materialism and credit card use by college students.

    PubMed

    Pinto, M B; Parente, D H; Palmer, T S

    2000-04-01

    Much has been written in the popular press on credit card use and spending patterns of American college students. The proliferation of credit cards and their ease of acquisition ensure that students today have more opportunities for making more credit purchases than any other generation of college students. Little is known about the relationship between students' attitudes towards materialism and their use of credit cards. A study was conducted at three college campuses in the northeastern part of the United States where a total of 1,022 students were surveyed. Students' attitudes toward use of credit and their credit card balances were evaluated relative to their scores on Richins and Dawson's Materialism Scale (1992). Our findings suggest no significant difference between those individuals scoring high versus low on the Materialism Scale in terms of the number of credit cards owned and the average balance owed. Individuals high on materialism, however, significantly differed in terms of their uses for credit cards and their general attitude toward their use.

  14. Prefrontal system dysfunction and credit card debt.

    PubMed

    Spinella, Marcello; Yang, Bijou; Lester, David

    2004-10-01

    Credit card use often involves a disadvantageous allocation of finances because they allow for spending beyond means and buying on impulse. Accordingly they are associated with increased bankruptcy, anxiety, stress, and health problems. Mounting evidence from functional neuroimaging and clinical studies implicates prefrontal-subcortical systems in processing financial information. This study examined the relationship of credit card debt and executive functions using the Frontal System Behavior Scale (FRSBE). After removing the influences of demographic variables (age, sex, education, and income), credit card debt was associated with the Executive Dysfunction scale, but not the Apathy or Disinhibition scales. This suggests that processes of conceptualizing and organizing finances are most relevant to credit card debt, and implicates dorsolateral prefrontal dysfunction.

  15. Implement an adjustable delay time digital trigger for an NI data acquisition card in a high-speed demodulation system

    NASA Astrophysics Data System (ADS)

    Zhang, Hongtao; Fan, Lingling; Wang, Pengfei; Park, Seong-Wook

    2012-06-01

    A National Instruments (NI) DAQ card PCI 5105 is installed in a high-speed demodulation system based on Fiber Fabry-Pérot Tunable Filter. The instability of the spectra of Fiber Bragg Grating sensors caused by intrinsic drifts of FFP-TF needs an appropriate, flexible trigger. However, the driver of the DAQ card in the current development environment does not provide the functions of analog trigger but digital trigger type. Moreover, the high level of the trigger signal from the tuning voltage of FFP-TF is larger than the maximum input overload voltage of PCI 5105 card. To resolve this incompatibility, a novel converter to change an analog trigger signal into a digital trigger signal has been reported previously. However, the obvious delay time between input and output signals limits the function of demodulation system. Accordingly, we report an improved low-cost, small-size converter with an adjustable delay time. This new scheme can decline the delay time to or close to zero when the frequency of trigger signal is less than 3,000 Hz. This method might be employed to resolve similar problems or to be applied in semiconductor integrated circuits.

  16. 41 CFR 101-26.509 - Tabulating machine cards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 41 Public Contracts and Property Management 2 2011-07-01 2007-07-01 true Tabulating machine cards... PROGRAM 26.5-GSA Procurement Programs § 101-26.509 Tabulating machine cards. Procurement by Federal agencies of tabulating machine cards shall be made in accordance with the provisions of this § 101-26.509...

  17. Exit Cards: Creating a Dialogue for Continuous Evaluation

    ERIC Educational Resources Information Center

    Patka, Mazna; Wallin-Ruschman, Jennifer; Wallace, Tenille; Robbins, Candice

    2016-01-01

    This study explored the use of Exit Cards, which are formative evaluations of student knowledge and instruction undertaken at every class meeting. Its results are based on Exit Card data from two undergraduate research methods courses. Thematic analysis indicated that students used Exit Cards to communicate (1) what they learned, (2) challenges…

  18. 48 CFR 32.1108 - Payment by Governmentwide commercial purchase card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... commercial purchase card. 32.1108 Section 32.1108 Federal Acquisition Regulations System FEDERAL ACQUISITION... Governmentwide commercial purchase card. A Governmentwide commercial purchase card charge authorizes the third party (e.g., financial institution) that issued the purchase card to make immediate payment to the...

  19. Vulnerabilities in First-Generation RFID-enabled Credit Cards

    NASA Astrophysics Data System (ADS)

    Heydt-Benjamin, Thomas S.; Bailey, Daniel V.; Fu, Kevin; Juels, Ari; O'Hare, Tom

    RFID-enabled credit cards are widely deployed in the United States and other countries, but no public study has thoroughly analyzed the mechanisms that provide both security and privacy. Using samples from a variety of RFID-enabled credit cards, our study observes that (1) the cardholder's name and often credit card number and expiration are leaked in plaintext to unauthenticated readers, (2) our homemade device costing around 150 effectively clones one type of skimmed cards thus providing a proof-of-concept implementation for the RF replay attack, (3) information revealed by the RFID transmission cross contaminates the security of RFID and non-RFID payment contexts, and (4) RFID-enabled credit cards are susceptible in various degrees to a range of other traditional RFID attacks such as skimming and relaying.

  20. Experimental demonstration of free-space based 120 Gb/s reconfigurable card-to-card optical interconnects.

    PubMed

    Wang, Ke; Nirmalathas, Ampalavanapillai; Lim, Christina; Skafidas, Efstratios; Alameh, Kamal

    2014-10-01

    In this Letter, we propose and experimentally demonstrate a free-space based reconfigurable card-to-card optical interconnect architecture with 16-carrierless-amplitude-phase modulation. Experimental results show that up to 120 Gb/s (3×40  Gb/s) flexible interconnection can be achieved for up to 30 cm distance with a worst-case receiver sensitivity of -9.70  dBm.

  1. 48 CFR 552.232-77 - Payment By Government Charge Card.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Charge Card. 552.232-77 Section 552.232-77 Federal Acquisition Regulations System GENERAL SERVICES....232-77 Payment By Government Charge Card. As prescribed in 532.7003, insert the following clause: Payment By Government Charge Card (NOV 2009) (a) Definitions. “Governmentwide commercial purchase card...

  2. Credit Card Attitudes and Behaviors of College Students

    ERIC Educational Resources Information Center

    Joo, S.-H.; Grable, J. E.; Bagwell, D. C.

    2005-01-01

    At a southwestern public university, 242 students responded to a questionnaire about their credit-card use and attitudes. The results revealed that about 70 percent of the students held one or more credit cards, and about 10 percent had five or more credit cards. Twenty-two percent never kept copies of their charge slips, and only 49 percent paid…

  3. Cytotoxicity of yellow sand in lung epithelial cells.

    PubMed

    Kim, Y H; Kim, K S; Kwak, N J; Lee, K H; Kweon, S A; Lim, Y

    2003-02-01

    The present study was carried out to observe the cytotoxicity of yellow sand in comparison with silica and titanium dioxide in a rat alveolar type II cell line (RLE-6TN). Yellow sand (China Loess) was obtained from the loess layer in the Gunsu Province of China. The mean particle diameter of yellow sand was about 0.003 +/- 0.001 mm. Major elements of yellow sand were Si(27.7 +/- 0.6%), Al(6.01 +/- 0.17%), and Ca(5.83 +/- 0.23%) in that order. Silica and yellow sand significantly decreased cell viability and increased [Ca2+]i. All three particles increased the generation of H2O2. TiO2 did not change Fenton activity, while silica induced a slight increase of Fenton activity. In contrast, yellow sand induced a significant increase of Fenton activity. Silica, yellow sand and TiO2 induced significant nitrite formations in RLE-6TN cells. Silica showed the highest increase in nitrite formation, while yellow sand induced the least formation of nitrite. Silica and yellow sand increased the release of TNF-a. Based on these results, we suggest that yellow sand can induce cytotoxicity in RLE-6TN cells and reactive oxygen species, Fenton activity and reactive nitrogen species might be involved in this toxicity.

  4. Yellow phosphorus-induced Brugada phenocopy.

    PubMed

    Dharanipradab, Mayakrishnan; Viswanathan, Stalin; Kumar, Gokula Raman; Krishnamurthy, Vijayalatchumy; Stanley, Daphene Divya

    Metallic phosphides (of aluminum and phosphide) and yellow phosphorus are commonly used rodenticide compounds in developing countries. Toxicity of yellow phosphorus mostly pertains to the liver, kidney, heart, pancreas and the brain. Cardiotoxicity with associated Brugada ECG pattern has been reported only in poisoning with metallic phosphides. Brugada phenocopy and hepatic dysfunction were observed in a 29-year-old male following yellow phosphorus consumption. He had both type 1 (day1) and type 2 (day2) Brugada patterns in the electrocardiogram, which resolved spontaneously by the third day without hemodynamic compromise. Toxins such as aluminum and zinc phosphide have been reported to induce Brugada ECG patterns due to the generation of phosphine. We report the first case of yellow phosphorus-related Brugada phenocopy, without hemodynamic compromise or malignant arrhythmia. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. What Are HyperCard? (Part 2).

    ERIC Educational Resources Information Center

    Marcus, Stephen

    1989-01-01

    Presents the second article in a two-part series on HyperCard materials (computer software used to build structures that create patterns and connections) designed for English and language arts classes. Suggests assignments for use with early HyperCard software that can be adapted to a variety of nonverbal "stackware." (MM)

  6. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    PubMed

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-07-24

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

  7. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

    PubMed Central

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-01-01

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged. PMID:23887085

  8. Environmental impact assessments of the Xiaolangdi Reservoir on the most hyperconcentrated laden river, Yellow River, China.

    PubMed

    Kong, Dongxian; Miao, Chiyuan; Wu, Jingwen; Borthwick, Alistair G L; Duan, Qingyun; Zhang, Xiaoming

    2017-02-01

    The Yellow River is the most hyperconcentrated sediment-laden river in the world. Throughout recorded history, the Lower Yellow River (LYR) experienced many catastrophic flood and drought events. To regulate the LYR, a reservoir was constructed at Xiaolangdi that became operational in the early 2000s. An annual water-sediment regulation scheme (WSRS) was then implemented, aimed at flood control, sediment reduction, regulated water supply, and power generation. This study examines the eco-environmental and socioenvironmental impacts of Xiaolangdi Reservoir. In retrospect, it is found that the reservoir construction phase incurred huge financial cost and required large-scale human resettlement. Subsequent reservoir operations affected the local geological environment, downstream riverbed erosion, evolution of the Yellow River delta, water quality, and aquatic biodiversity. Lessons from the impact assessment of the Xiaolangdi Reservoir are summarized as follows: (1) The construction of large reservoirs is not merely an engineering challenge but must also be viewed in terms of resource exploitation, environmental protection, and social development; (2) long-term systems for monitoring large reservoirs should be established, and decision makers involved at national policy and planning levels must be prepared to react quickly to the changing impact of large reservoirs; and (3) the key to solving sedimentation in the LYR is not Xiaolangdi Reservoir but instead soil conservation in the middle reaches of the Yellow River basin. Proper assessment of the impacts of large reservoirs will help promote development strategies that enhance the long-term sustainability of dam projects.

  9. [Vaccination against yellow fever among patients on immunosuppressors with diagnoses of rheumatic diseases].

    PubMed

    Mota, Licia Maria Henrique da; Oliveira, Ana Cristina Vanderley; Lima, Rodrigo Aires Corrêa; Santos-Neto, Leopoldo Luiz dos; Tauil, Pedro Luiz

    2009-01-01

    Yellow fever is endemic in some countries. The anti-yellow fever vaccine is the only effective means of protection but is contraindicated for immunocompromised patients. The aim of this paper was to report on a case series of rheumatological patients who were using immunosuppressors and were vaccinated against this disease. This was a retrospective study by means of a questionnaire applied to these patients, who were vaccinated 60 days before the investigation. Seventy patients of mean age 46 years were evaluated. Most of them were female (90%). There were cases of rheumatoid arthritis (54), systemic lupus erythematosus (11), spondyloarthropathy (5) and systemic sclerosis (2). The therapeutic schemes included methotrexate (42), corticosteroids (22), sulfasalazine (26), leflunomide (18), cyclophosphamide (3) and immunobiological agents (9). Sixteen patients (22.5%) reported some minor adverse effect. Among the eight patients using immunobiological agents, only one presented a mild adverse effect. Among these patients using immunosuppressors, adverse reactions were no more frequent than among immunocompetent individuals. This is the first study on this topic.

  10. Perinatal Yellow Fever: A Case Report.

    PubMed

    Diniz, Lilian Martins Oliveira; Romanelli, Roberta Maia Castro; de Carvalho, Andréa Lucchesi; Teixeira, Daniela Caldas; de Carvalho, Luis Fernando Andrade; Cury, Verônica Ferreira; Filho, Marcelo Pereira Lima; Perígolo, Graciele; Heringer, Tiago Pires

    2018-04-09

    An outbreak of yellow fever in Brazil made it possible to assess different presentations of disease such as perinatal transmission. A pregnant woman was admitted to hospital with yellow fever symptoms. She was submitted to cesarean section and died due to fulminant hepatitis. On the 6th day the newborn developed liver failure and died 13 days later. Yellow fever PCR was positive for both.

  11. Enhancing Students' Learning: Instant Feedback Cards

    ERIC Educational Resources Information Center

    Mohrweis, Lawrence C.; Shinham, Kathe M.

    2015-01-01

    This study illustrates an active learning approach using instant feedback cards in the first course in accounting. The objectives of this study are to (1) describe instant feedback cards and (2) show how this tool, when used in an active learning environment, can enhance learning. We examined whether students exposed to immediate feedback…

  12. An evaluation of yellow-flowering magnolias and magnolia rootstocks

    USDA-ARS?s Scientific Manuscript database

    Yellow-flowering magnolias were evaluated for flower color, bloom duration and growth rate in USDA Hardiness Zone 6b. Of the thirty selections evaluated, all were reported to have yellow blooms; however, tepal color ranged from light pink with some yellow coloration, to creamy yellow to dark yellow....

  13. 12 CFR Rules for Card Issuers That... - by-Transaction Basis

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... THE FEDERAL RESERVE SYSTEM TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card... Subpart B apply if credit cards are issued and the card issuer and the seller are the same or related... creditor have an agreement authorizing the seller to honor the creditor's credit card. 1. Section 226.6(a...

  14. 12 CFR Rules for Card Issuers That... - by-Transaction Basis

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... THE FEDERAL RESERVE SYSTEM TRUTH IN LENDING (REGULATION Z) Special Rules Applicable to Credit Card... Subpart B apply if credit cards are issued and the card issuer and the seller are the same or related... creditor have an agreement authorizing the seller to honor the creditor's credit card. 1. Section 226.6(a...

  15. Family Registration Card as electronic medical carrier in Bosnia and Herzegovina.

    PubMed

    Novo, Ahmed; Masic, Izet; Toromanovic, Selim; Loncarevic, Nedim; Junuzovic, Dzelaludin; Dizdarevic, Jadranka

    2004-01-01

    Medical documentation is a very important part of the medical documentalistics and is occupies a large part of daily work of medical staff working in Primary Health Care. Paper documentation is going to be replaced by electronic cards in Bosnia and Herzegovina and a new Health Care System is under development, based on an Electronic Family Registration Card. Developed countries proceeded from the manual and semiautomatic method of medical data processing to the new method of entering, storage, transferring, searching and protecting data, using electronic equipment. Currently, many European countries have developed a Medical Card Based Electronic Information System. Three types of electronic card are currently in use: a Hybrid Card, a Smart Card and a Laser Card. The dilemma is which card should be used as a data carrier. The Electronic Family Registration Cared is a question of strategic interest for B&H, but also a great investment. We should avoid the errors of other countries that have been developing card-based system. In this article we present all mentioned cards and compare advantages and disadvantages of different technologies.

  16. 12 CFR Rules for Card Issuers That... - by-Transaction Basis

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Credit Card Accounts and Open-End Credit Offered to College Students Reevaluation of rate increases. Pt... provisions of Subpart B apply if credit cards are issued and the card issuer and the seller are the same or... creditor have an agreement authorizing the seller to honor the creditor's credit card. 1. Section 226.6(a...

  17. Fabrication of Cantilever-Bump Type Si Probe Card

    NASA Astrophysics Data System (ADS)

    Park, Jeong-Yong; Lee, Dong-Seok; Kim, Dong-Kwon; Lee, Jong-Hyun

    2000-12-01

    Probe card is most important part in the test system which selects the good or bad chip of integrated circuit (IC) chips. Silicon vertical probe card is able to test multiple semiconductor chips simultaneously. We presented cantilever-bump type vertical probe card. It was fabricated by dry etching using RIE(reactive ion etching) technique and porous silicon micromachining using silicon direct bonded (SDB) wafer. Cantilevers and bumps were fabricated by isotropic etching using RIE@. 3-dimensional structures were formed by porous silicon micromachining technique using SDB wafer. Contact resistance of fabricated probe card was less than 2 Ω and its life time was more than 200,000 turns. The process used in this work is very simple and reproducible, which has good controllability in the tip dimension and spacing. It is expected that the fabricated probe card can reduce testing time, can promote productivity and enables burn-in test.

  18. Introducing Teamwork Challenges in Simulation Using Game Cards.

    PubMed

    Chang, Todd P; Kwan, Karen Y; Liberman, Danica; Song, Eric; Dao, Eugene H; Chung, Dayun; Morton, Inge; Festekjian, Ara

    2015-08-01

    Poor teamwork and communication during resuscitations are linked to patient safety problems and poorer outcomes. We present a novel simulation-based educational intervention using game cards to introduce challenges in teamwork. This intervention uses sets of game cards that designate roles, limitations, or communication challenges designed to introduce common communication or teamwork problems. Game cards are designed to be applicable for any simulation-based scenario and are independent from patient physiology. In our example, participants were pediatric emergency medicine fellows undergoing simulation training for orientation. We describe the use of card sets in different scenarios with increasing teamwork challenge and difficulty. Both postscenario and summative debriefings were facilitated to allow participants to reflect on their performance and discover ways to apply their strategies to real resuscitations. In this article, we present our experience with the novel use of game cards to modify simulation scenarios to improve communication and teamwork skills.

  19. Wiring harnesses documented by punched-card technique

    NASA Technical Reports Server (NTRS)

    Hicks, W. W.; Kloezeman, W. G.

    1970-01-01

    Cards representing a connector are punched, sorted, and then used to printout wiring documentation for that connector. When wiring changes are made, new cards are punched and the wiring documentation is reprinted to reflect the latest configuration.

  20. Low driving voltage blue, green, yellow, red and white organic light-emitting diodes with a simply double light-emitting structure.

    PubMed

    Zhang, Zhensong; Yue, Shouzhen; Wu, Yukun; Yan, Pingrui; Wu, Qingyang; Qu, Dalong; Liu, Shiyong; Zhao, Yi

    2014-01-27

    Low driving voltage blue, green, yellow, red and white phosphorescent organic light-emitting diodes (OLEDs) with a common simply double emitting layer (D-EML) structure are investigated. Our OLEDs without any out-coupling schemes as well as n-doping strategies show low driving voltage, e.g. < 2.4 V for onset and < 3 V for 1000 cd/m2, and high efficiency of 32.5 lm/W (13.3%), 58.8 lm/W (14.3%), 55.1 lm/W (14.6%), 24.9 lm/W (13.7%) and 45.1 lm/W (13.5%) for blue, green, yellow, red and white OLED, respectively. This work demonstrates that the low driving voltages and high efficiencies can be simultaneously realized with a common simply D-EML structure.

  1. 21 CFR 137.285 - Degerminated yellow corn meal.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 2 2011-04-01 2011-04-01 false Degerminated yellow corn meal. 137.285 Section 137... Cereal Flours and Related Products § 137.285 Degerminated yellow corn meal. Degerminated yellow corn meal, degermed yellow corn meal, conforms to the definition and standard of identity prescribed by § 137.265 for...

  2. 21 CFR 137.285 - Degerminated yellow corn meal.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Degerminated yellow corn meal. 137.285 Section 137... Cereal Flours and Related Products § 137.285 Degerminated yellow corn meal. Degerminated yellow corn meal, degermed yellow corn meal, conforms to the definition and standard of identity prescribed by § 137.265 for...

  3. Patient health record on a smart card.

    PubMed

    Naszlady, A; Naszlady, J

    1998-02-01

    A validated health questionnaire has been used for the documentation of a patient's history (826 items) and of the findings from physical examination (591 items) in our clinical ward for 25 years. This computerized patient record has been completed in EUCLIDES code (CEN TC/251) for laboratory tests and an ATC and EAN code listing for the names of the drugs permanently required by the patient. In addition, emergency data were also included on an EEPROM chipcard with a 24 kb capacity. The program is written in FOX-PRO language. A group of 5000 chronically ill in-patients received these cards which contain their health data. For security reasons the contents of the smart card is only accessible by a doctor's PIN coded key card. The personalization of each card was carried out in our health center and the depersonalized alphanumeric data were collected for further statistical evaluation. This information served as a basis for a real need assessment of health care and for the calculation of its cost. Code-combined with an optical card, a completely paperless electronic patient record system has been developed containing all three information carriers in medicine: Texts, Curves and Pictures.

  4. 17DD yellow fever vaccine

    PubMed Central

    Martins, Reinaldo M.; Maia, Maria de Lourdes S.; Farias, Roberto Henrique G.; Camacho, Luiz Antonio B.; Freire, Marcos S.; Galler, Ricardo; Yamamura, Anna Maya Yoshida; Almeida, Luiz Fernando C.; Lima, Sheila Maria B.; Nogueira, Rita Maria R.; Sá, Gloria Regina S.; Hokama, Darcy A.; de Carvalho, Ricardo; Freire, Ricardo Aguiar V.; Filho, Edson Pereira; Leal, Maria da Luz Fernandes; Homma, Akira

    2013-01-01

    Objective: To verify if the Bio-Manguinhos 17DD yellow fever vaccine (17DD-YFV) used in lower doses is as immunogenic and safe as the current formulation. Results: Doses from 27,476 IU to 587 IU induced similar seroconversion rates and neutralizing antibodies geometric mean titers (GMTs). Immunity of those who seroconverted to YF was maintained for 10 mo. Reactogenicity was low for all groups. Methods: Young and healthy adult males (n = 900) were recruited and randomized into 6 groups, to receive de-escalating doses of 17DD-YFV, from 27,476 IU to 31 IU. Blood samples were collected before vaccination (for neutralization tests to yellow fever, serology for dengue and clinical chemistry), 3 to 7 d after vaccination (for viremia and clinical chemistry) and 30 d after vaccination (for new yellow fever serology and clinical chemistry). Adverse events diaries were filled out by volunteers during 10 d after vaccination. Volunteers were retested for yellow fever and dengue antibodies 10 mo later. Seropositivity for dengue was found in 87.6% of volunteers before vaccination, but this had no significant influence on conclusions. Conclusion: In young healthy adults Bio-Manguinhos/Fiocruz yellow fever vaccine can be used in much lower doses than usual. International Register ISRCTN 38082350. PMID:23364472

  5. Designing More Effective Accountability Report Cards

    ERIC Educational Resources Information Center

    Sabbah, Faris M.

    2011-01-01

    The purpose of this study was to identify and design standards and procedures for creating easily interpreted accountability reports cards, consistent with the requirements spelled out in the No Child Left Behind Act of 2001 (NCLB). The use of public report cards was first raised during the debate that took place immediately prior to the passage…

  6. Consensus and conflict cards for metabolic pathway databases.

    PubMed

    Stobbe, Miranda D; Swertz, Morris A; Thiele, Ines; Rengaw, Trebor; van Kampen, Antoine H C; Moerland, Perry D

    2013-06-26

    The metabolic network of H. sapiens and many other organisms is described in multiple pathway databases. The level of agreement between these descriptions, however, has proven to be low. We can use these different descriptions to our advantage by identifying conflicting information and combining their knowledge into a single, more accurate, and more complete description. This task is, however, far from trivial. We introduce the concept of Consensus and Conflict Cards (C₂Cards) to provide concise overviews of what the databases do or do not agree on. Each card is centered at a single gene, EC number or reaction. These three complementary perspectives make it possible to distinguish disagreements on the underlying biology of a metabolic process from differences that can be explained by different decisions on how and in what detail to represent knowledge. As a proof-of-concept, we implemented C₂Cards(Human), as a web application http://www.molgenis.org/c2cards, covering five human pathway databases. C₂Cards can contribute to ongoing reconciliation efforts by simplifying the identification of consensus and conflicts between pathway databases and lowering the threshold for experts to contribute. Several case studies illustrate the potential of the C₂Cards in identifying disagreements on the underlying biology of a metabolic process. The overviews may also point out controversial biological knowledge that should be subject of further research. Finally, the examples provided emphasize the importance of manual curation and the need for a broad community involvement.

  7. 48 CFR 313.301 - Government-wide commercial purchase card.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., Appendix B, “Improving the Management of Government Charge Card Programs;” GSA's SmartPay Program guidance; and HHS Purchase Card program standards. (2) The OPDIVs, through their designated Agency/Organization... training requirements to ensure effective implementation of the HHS purchase card program. (3) OPDIVs shall...

  8. Design and implementation of a smart card based healthcare information system.

    PubMed

    Kardas, Geylani; Tunali, E Turhan

    2006-01-01

    Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in security systems. In this paper, a smart card based healthcare information system is developed. The system uses smart card for personal identification and transfer of health data and provides data communication via a distributed protocol which is particularly developed for this study. Two smart card software modules are implemented that run on patient and healthcare professional smart cards, respectively. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use their own smart cards to be authenticated on the system and to access data on patient cards. Encryption keys and digital signature keys stored on smart cards of the system are used for secure and authenticated data communication between clients and database servers over distributed object protocol. System is developed on Java platform by using object oriented architecture and design patterns.

  9. Credit Card Quiz.

    ERIC Educational Resources Information Center

    Marks, Jeff

    2000-01-01

    Describes an activity in which students design credit cards and discover for themselves the mathematical realities of buying on credit. Employs multiple-intelligence theory to increase the chance that all students will be reached. (YDS)

  10. Biometrics and smart cards combine to offer high security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. Thesemore » Cards will function only when they are being used by the authorized individuals to whom they are issued.« less

  11. The Department of Veterans Affairs Optical Patient Card Workstation.

    PubMed Central

    Gomez, E.; Demetriades, J. E.; Babcock, D.; Peterson, J.

    1991-01-01

    The Department of Veterans Affairs has developed an optical patient card application which will undergo alpha testing in 1991. The optical cards are carried by patients and contain administrative, clinical, and image information. An optical patient card workstation (OPCW) will read/write these cards and pass this information to the VA Decentralized Hospital Computer Program (DHCP), the VA's health care information system. The intent of this work is to study the potential benefits of this technology to the VA's distributed health care network, with a large mobile patient population. It is hoped that the use of optical cards and the OPCW will enhance clinicians ability to work with a timely composite health record, and expedite the administrative workload of the medical center. PMID:1807626

  12. The Department of Veterans Affairs Optical Patient Card Workstation.

    PubMed

    Gomez, E; Demetriades, J E; Babcock, D; Peterson, J

    1991-01-01

    The Department of Veterans Affairs has developed an optical patient card application which will undergo alpha testing in 1991. The optical cards are carried by patients and contain administrative, clinical, and image information. An optical patient card workstation (OPCW) will read/write these cards and pass this information to the VA Decentralized Hospital Computer Program (DHCP), the VA's health care information system. The intent of this work is to study the potential benefits of this technology to the VA's distributed health care network, with a large mobile patient population. It is hoped that the use of optical cards and the OPCW will enhance clinicians ability to work with a timely composite health record, and expedite the administrative workload of the medical center.

  13. Investigating customer racial discrimination in the secondary baseball card market.

    PubMed

    Primm, Eric; Piquero, Nicole Leeper; Piquero, Alex R; Regoli, Robert M

    2011-01-01

    A growing body of literature in a variety of disciplines has appeared over the last 20 years examining customer racial bias in the secondary sports card market; however, consensus on the matter has yet to emerge. In this article, we explore the more subtle ways that a player's race/ethnicity may affect the value of his sports card including a player's skin tone (light- to dark-skinned). Data were obtained for 383 black, Latino, and white baseball players who had received at least one vote for induction into Major League Baseball's Hall of Fame including their career performance statistics, rookie card price, card availability, Hall of Fame status, and skin tone. Findings indicate that card availability is the primary determinant of card value while a player's skin tone has no direct effect. Subsequent analysis demonstrates that a player's race (white/non-white) rather than skin tone did have an effect as it interacts with Hall of Fame status to influence his rookie card price.

  14. A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Chang, Ya-Fen; Yu, Shih-Hui; Shiao, Ding-Rui

    2013-04-01

    Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.

  15. Yellow-Poplar Site Index Curves

    Treesearch

    Donald E. Beck

    1962-01-01

    Yellow-poplar (Liriodendron tulipifera L.) occurs naturally throughout the eastern and central United States from southern New England west to Michigan and south to Florida and Louisiana. Because of its wide occurrence, yellow-poplar grows under a variety of climatic, edaphic, and biotic conditions. Combinations of these different environmental...

  16. Crib Card Use During Tests: Helpful or a Crutch?

    ERIC Educational Resources Information Center

    Funk, Steven C.; Dickson, K. Laurie

    2011-01-01

    The authors experimentally investigated the effect of crib cards on exam performance and student learning. Fifty-one students expected to use their prepared crib cards during an exam. However, they first completed an unexpected pretest without their crib card. Students performed significantly worse on the pretest than on identical questions when…

  17. Instant Feedback for Learner Training: Using Individual Assessment Cards.

    ERIC Educational Resources Information Center

    Lovelock, Clive

    2002-01-01

    Describes individual assessment cards devised by an English-as-a-Foreign-Language teacher in Japan. This system consists of giving each student her own individual assessment card at the beginning of each lesson. The focus of the information recorded on the card relates to the process of learning English. (Author/VWL)

  18. 38 CFR 21.9700 - Yellow Ribbon Program.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2011-07-01 2011-07-01 false Yellow Ribbon Program. 21... Ribbon Program. (a) Establishment. The “Yellow Ribbon G.I. Education Enhancement Program”, known as the “Yellow Ribbon Program,” permits an institution of higher learning (IHL), at the IHL's option, to enter...

  19. 38 CFR 21.9700 - Yellow Ribbon Program.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2013-07-01 2013-07-01 false Yellow Ribbon Program. 21... Ribbon Program. (a) Establishment. The “Yellow Ribbon G.I. Education Enhancement Program”, known as the “Yellow Ribbon Program,” permits an institution of higher learning (IHL), at the IHL's option, to enter...

  20. 38 CFR 21.9700 - Yellow Ribbon Program.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Yellow Ribbon Program. 21... Ribbon Program. (a) Establishment. The “Yellow Ribbon G.I. Education Enhancement Program”, known as the “Yellow Ribbon Program,” permits an institution of higher learning (IHL), at the IHL's option, to enter...

  1. 38 CFR 21.9700 - Yellow Ribbon Program.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2014-07-01 2014-07-01 false Yellow Ribbon Program. 21... Ribbon Program. (a) Establishment. The “Yellow Ribbon G.I. Education Enhancement Program”, known as the “Yellow Ribbon Program,” permits an institution of higher learning (IHL), at the IHL's option, to enter...

  2. 38 CFR 21.9700 - Yellow Ribbon Program.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2012-07-01 2012-07-01 false Yellow Ribbon Program. 21... Ribbon Program. (a) Establishment. The “Yellow Ribbon G.I. Education Enhancement Program”, known as the “Yellow Ribbon Program,” permits an institution of higher learning (IHL), at the IHL's option, to enter...

  3. HyperCLIPS: A HyperCard interface to CLIPS

    NASA Technical Reports Server (NTRS)

    Pickering, Brad; Hill, Randall W., Jr.

    1990-01-01

    HyperCLIPS combines the intuitive, interactive user interface of the Apple Macintosh(TM) with the powerful symbolic computation of an expert system interpreter. HyperCard(TM) is an excellent environment for quickly developing the front end of an application with buttons, dialogs, and pictures, while the CLIPS interpreter provides a powerful inference engine for complex problem solving and analysis. By integrating HyperCard and CLIPS the advantages and uses of both packages are made available for a wide range of uses: rapid prototyping of knowledge-based expert systems, interactive simulations of physical systems, and intelligent control of hypertext processes, to name a few. Interfacing HyperCard and CLIPS is natural. HyperCard was designed to be extended through the use of external commands (XCMDs), and CLIPS was designed to be embedded through the use of the I/O router facilities and callable interface routines. With the exception of some technical difficulties which will be discussed later, HyperCLIPS implements this interface in a straight forward manner, using the facilities provided. An XCMD called 'ClipsX' was added to HyperCard to give access to the CLIPS routines: clear, load, reset, and run. And an I/O router was added to CLIPS to handle the communication of data between CLIPS and HyperCard.

  4. Evolution of optically nondestructive and data-non-intrusive credit card verifiers

    NASA Astrophysics Data System (ADS)

    Sumriddetchkajorn, Sarun; Intaravanne, Yuttana

    2010-04-01

    Since the deployment of the credit card, the number of credit card fraud cases has grown rapidly with a huge amount of loss in millions of US dollars. Instead of asking more information from the credit card's holder or taking risk through payment approval, a nondestructive and data-non-intrusive credit card verifier is highly desirable before transaction begins. In this paper, we review optical techniques that have been proposed and invented in order to make the genuine credit card more distinguishable than the counterfeit credit card. Several optical approaches for the implementation of credit card verifiers are also included. In particular, we highlight our invention on a hyperspectral-imaging based portable credit card verifier structure that offers a very low false error rate of 0.79%. Other key features include low cost, simplicity in design and implementation, no moving part, no need of an additional decoding key, and adaptive learning.

  5. Will hospital report cards make the grade?

    PubMed

    1997-07-01

    Hospital report cards that document patients' medical outcomes are attracting increasing attention for their role in guiding health care decisions by employers, consumers and providers. Significant questions remain, however, regarding the validity and utility of this information. This Issue Brief is based on a seminar held by the Center for Studying Health System Change at which two expert panels discussed whether report cards make the grade. The first panel approached this subject through a Socratic dialogue that focused on the release of a hypothetical community hospital report card. The second panel weighed in on two research presentations related to report cards. The panelists agreed that efforts to collect and report clinical outcomes data are flawed. Even so, release of the data can help improve clinical quality and foster an environment in which health care quality information ultimately has an impact on health care decision making.

  6. Human Factors Assessment of Respiratory Support Pack (RSP) Cue Card

    NASA Technical Reports Server (NTRS)

    Whitmore, Mihriban; Hudy, Cynthia; Smith, Danielle; Byrne, Vicky

    2005-01-01

    The Respiratory Support Pack (RSP) is a medical pack onboard the International Space Station (ISS) that contains much of the necessary equipment for providing aid to a conscious or unconscious crewmember in respiratory distress. Inside the RSP lid pocket is a 5.5 by 11 inch paper cue card, which is used by a Crew Medical Officer as the procedure to set up the equipment and deliver oxygen to a crewmember. In training, crewmembers expressed concerns about the readability and usability of the cue card; consequently, updating the cue card was prioritized as an activity to be completed prior to Space Shuttle return-to-flight. The Usability Testing and Analysis Facility at the Johnson Space Center evaluated the current layout of the cue card, and proposed several new cue card designs based on human factors principals. A series of three studies were performed in order to experimentally compare performance with each of the cue card designs. Nonmedically trained personnel used either a redesigned RSP cue card, or the original card to simulate resuscitation (using a mannequin along with the hardware). Time to completion, errors and subjective ratings were recorded. The addition of pictures, colors, borders, and simplification of the flow of information (making minimal changes to the actual procedure content) elicited great benefits during testing. Time to complete RSP procedures was reduced by as much as three minutes with the final cue card design. Detailed results from these studies, as well as general guidelines for cue card design will be discussed.

  7. Fatal Yellow Fever in Travelers to Brazil, 2018.

    PubMed

    Hamer, Davidson H; Angelo, Kristina; Caumes, Eric; van Genderen, Perry J J; Florescu, Simin A; Popescu, Corneliu P; Perret, Cecilia; McBride, Angela; Checkley, Anna; Ryan, Jenny; Cetron, Martin; Schlagenhauf, Patricia

    2018-03-23

    Yellow fever virus is a mosquito-borne flavivirus that causes yellow fever, an acute infectious disease that occurs in South America and sub-Saharan Africa. Most patients with yellow fever are asymptomatic, but among the 15% who develop severe illness, the case fatality rate is 20%-60%. Effective live-attenuated virus vaccines are available that protect against yellow fever (1). An outbreak of yellow fever began in Brazil in December 2016; since July 2017, cases in both humans and nonhuman primates have been reported from the states of São Paulo, Minas Gerais, and Rio de Janeiro, including cases occurring near large urban centers in these states (2). On January 16, 2018, the World Health Organization updated yellow fever vaccination recommendations for Brazil to include all persons traveling to or living in Espírito Santo, São Paulo, and Rio de Janeiro states, and certain cities in Bahia state, in addition to areas where vaccination had been recommended before the recent outbreak (3). Since January 2018, 10 travel-related cases of yellow fever, including four deaths, have been reported in international travelers returning from Brazil. None of the 10 travelers had received yellow fever vaccination.

  8. English soccer teams' aggressive behavior when playing away from home.

    PubMed

    Thomas, Sion; Reeves, Colin; Smith, Andrew

    2006-04-01

    Speculation about key factors affecting home advantage still exists. The present study investigated aggressive behavior amongst English Football Premiership (soccer) players and its relation to home advantage. The frequency of aggressive behaviour, identified by the award of a penalty or disciplinary card (yellow for caution or red for dismissal) was analysed over 2000-2003. Chi-square analyses assessed whether a greater frequency of aggressive behavior was performed by teams away from home. In decided matches, teams playing away received significantly more cautions (yellow cards) than home teams. A further analysis of tied matches indicated that away teams received significantly more cautions (yellow cards) than home teams. No significant differences between home and away teams were found for dismissals and penalties awarded. Reasons for these findings are considered.

  9. Deep dermatophytosis and inherited CARD9 deficiency.

    PubMed

    Lanternier, Fanny; Pathan, Saad; Vincent, Quentin B; Liu, Luyan; Cypowyj, Sophie; Prando, Carolina; Migaud, Mélanie; Taibi, Lynda; Ammar-Khodja, Aomar; Stambouli, Omar Boudghene; Guellil, Boumediene; Jacobs, Frederique; Goffard, Jean-Christophe; Schepers, Kinda; Del Marmol, Véronique; Boussofara, Lobna; Denguezli, Mohamed; Larif, Molka; Bachelez, Hervé; Michel, Laurence; Lefranc, Gérard; Hay, Rod; Jouvion, Gregory; Chretien, Fabrice; Fraitag, Sylvie; Bougnoux, Marie-Elisabeth; Boudia, Merad; Abel, Laurent; Lortholary, Olivier; Casanova, Jean-Laurent; Picard, Capucine; Grimbacher, Bodo; Puel, Anne

    2013-10-31

    Deep dermatophytosis is a severe and sometimes life-threatening fungal infection caused by dermatophytes. It is characterized by extensive dermal and subcutaneous tissue invasion and by frequent dissemination to the lymph nodes and, occasionally, the central nervous system. The condition is different from common superficial dermatophyte infection and has been reported in patients with no known immunodeficiency. Patients are mostly from North African, consanguineous, multiplex families, which strongly suggests a mendelian genetic cause. We studied the clinical features of deep dermatophytosis in 17 patients with no known immunodeficiency from eight unrelated Tunisian, Algerian, and Moroccan families. Because CARD9 (caspase recruitment domain-containing protein 9) deficiency has been reported in an Iranian family with invasive fungal infections, we also sequenced CARD9 in the patients. Four patients died, at 28, 29, 37, and 39 years of age, with clinically active deep dermatophytosis. No other severe infections, fungal or otherwise, were reported in the surviving patients, who ranged in age from 37 to 75 years. The 15 Algerian and Tunisian patients, from seven unrelated families, had a homozygous Q289X CARD9 allele, due to a founder effect. The 2 Moroccan siblings were homozygous for the R101C CARD9 allele. Both alleles are rare deleterious variants. The familial segregation of these alleles was consistent with autosomal recessive inheritance and complete clinical penetrance. All the patients with deep dermatophytosis had autosomal recessive CARD9 deficiency. Deep dermatophytosis appears to be an important clinical manifestation of CARD9 deficiency. (Funded by Agence Nationale pour la Recherche and others.).

  10. Patients' Awareness, Usage and Impact of Hospital Report Cards in the US.

    PubMed

    Emmert, Martin; Schlesinger, Mark

    2017-12-01

    Little knowledge is available about the importance of hospital report cards in the US from the patients' perspective. It also remains unknown whether specific report cards with a stronger emphasis on clinical measures have a greater impact on hospital choice than general report cards that focus on online-derived ratings. The aim of this study was to determine the awareness and usage of hospital report cards as well as their impact on hospital choice in the US. We conducted a cross-sectional study by surveying a stratified online sample (N = 1332) to ensure representativeness to the US online population (February 2015). Overall, 75% of all respondents (mean age 45.4 years; 54% female) were aware of hospital report cards. Among these, 56% had used a report card to search for a hospital, and 80% of report card users stated having been influenced by a report card. Both the awareness and usage of general report cards were shown to be higher than for specific report cards. No significant differences could be detected regarding the impact between general or specific report cards on hospital choice. Our results indicate that hospital report cards play a considerable role among patients when searching for a hospital in the US; however, patients do not seem to have a preference regarding the type of report cards they use when selecting a hospital.

  11. Prevention of Information Leakage by Photo-Coupling in Smart Card

    NASA Astrophysics Data System (ADS)

    Shen, Sung-Shiou; Chiu, Jung-Hui

    Advances in smart card technology encourages smart card use in more sensitive applications, such as storing important information and securing application. Smart cards are however vulnerable to side channel attacks. Power consumption and electromagnetic radiation of the smart card can leak information about the secret data protected by the smart card. Our paper describes two possible hardware countermeasures that protect against side channel information leakage. We show that power analysis can be prevented by adopting photo-coupling techniques. This method involves the use of LED with photovoltaic cells and photo-couplers on the power, reset, I/O and clock lines of the smart card. This method reduces the risk of internal data bus leakage on the external data lines. Moreover, we also discuss the effectiveness of reducing electromagnetic radiation by using embedded metal plates.

  12. Consensus and conflict cards for metabolic pathway databases

    PubMed Central

    2013-01-01

    Background The metabolic network of H. sapiens and many other organisms is described in multiple pathway databases. The level of agreement between these descriptions, however, has proven to be low. We can use these different descriptions to our advantage by identifying conflicting information and combining their knowledge into a single, more accurate, and more complete description. This task is, however, far from trivial. Results We introduce the concept of Consensus and Conflict Cards (C2Cards) to provide concise overviews of what the databases do or do not agree on. Each card is centered at a single gene, EC number or reaction. These three complementary perspectives make it possible to distinguish disagreements on the underlying biology of a metabolic process from differences that can be explained by different decisions on how and in what detail to represent knowledge. As a proof-of-concept, we implemented C2CardsHuman, as a web application http://www.molgenis.org/c2cards, covering five human pathway databases. Conclusions C2Cards can contribute to ongoing reconciliation efforts by simplifying the identification of consensus and conflicts between pathway databases and lowering the threshold for experts to contribute. Several case studies illustrate the potential of the C2Cards in identifying disagreements on the underlying biology of a metabolic process. The overviews may also point out controversial biological knowledge that should be subject of further research. Finally, the examples provided emphasize the importance of manual curation and the need for a broad community involvement. PMID:23803311

  13. Real Communication through Interview and Conversation Cards

    ERIC Educational Resources Information Center

    Bonin, Therese M.; Birckbichler, Diane W.

    1975-01-01

    A method for use in foreign language teaching which involves the use of conversation cards and interview cards is described. The method is intended to improve the ability of the student to communicate in the language and allow for greater individualization of instruction. (RM)

  14. Mated Fingerprint Card Pairs (Volumes 1-5)

    National Institute of Standards and Technology Data Gateway

    NIST Mated Fingerprint Card Pairs (Volumes 1-5) (Web, free access)   The NIST database of mated fingerprint card pairs (Special Database 9) consists of multiple volumes. Currently five volumes have been released. Each volume will be a 3-disk set with each CD-ROM containing 90 mated card pairs of segmented 8-bit gray scale fingerprint images (900 fingerprint image pairs per CD-ROM). A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

  15. Self-control and credit-card use among college students.

    PubMed

    Mansfield, Phylis M; Pinto, Mary Beth; Parente, Diane H

    2003-06-01

    This study assessed the relationship between self-control and credit-card use with a convenience sample of 165 traditional-age college students of whom 69 (42%) were women. Students' self-control was measured on Grasmick, et al.'s Self-control Scale, which has six subscales, one of which is Impulsivity. Comparisons were made between those students who paid their cards off each month, called convenience users, and those who carried a monthly balance forward on scores on total self-control and impulsivity, and number of credit cards possessed. A significant difference in self-control scores was found between these two groups and also for mean impulsivity scores. Significantly fewer credit cards were possessed by students who paid their cards off each month than by those who carried a monthly balance.

  16. A health plan report card for dentistry.

    PubMed

    Bader, J D; Shugars, D A; Hayden, W J; White, B A

    1996-01-01

    Employers are demanding information about the performance of the health care plans they purchase for their employees. As a result, "report cards" are now beginning to appear that provide standardized, population-based comparison data for managed medical care plans' quality of care, access and member satisfaction, utilization, and financial status. Although report cards for dental care plans have not yet been developed, it is likely that purchasers will soon expect such performance information. A prototype report card for dental managed care plans is proposed in an effort to facilitate the development of a consensus standard for dentistry. The thirty-eight measures proposed for the report card are designed to be obtainable with a realistic level of additional effort in most dental practices. They were selected to provide data on questions of importance to purchasers and to assess processes and outcomes important because there is strong evidence for their effectiveness. The rationale for the measures is discussed, as are the steps required to develop more sophisticated measures. While the responsibility for the procurement of the information needed for dental report cards will die initially with administrators of dental care plans, it is likely in the near future that individual practitioners will be expected to supply this information to both individual patients and potential contractors.

  17. Yield of Unthinned Yellow-Poplar

    Treesearch

    Donald E. Beck; Lino Della-Bianca

    1970-01-01

    Cubic-foot and board-foot yields of unthinned yellow-poplar (Liriodendron Tulipiferi L.) stands are described in relation to stand age, site index, and number of trees per acre. The yield tables are based on analysis of diameter distributions and height-diameter relationships obtained from 141 natural, unthinned yellow-poplar stands in the...

  18. Development Of The Drexler Optical-Card Reader/Writer System

    NASA Astrophysics Data System (ADS)

    Pierce, Gerald A.

    1988-06-01

    An optical-card reader/writer optical and electronic breadboard system, developed by SRI International under contract to Drexler Technology, is described. The optical card, which is the same size as a credit card, can contain more than 2 megabytes of digital user data, which may also include preformatted tracking information and preformatted data. The data layout on the card is similar to that on a floppy disk, with each track containing a header and clocking information. The design of this optical reader/writer system for optical cards is explained. Design of the optical card system entails a number of unique issues: To accommodate both laser-recorded and mass-duplicated information, the system must be compatible with preencoded information, which implies a larger-than-normal spot size (5 gm) and a detection system that can read both types of optical patterns. Cost-reduction considerations led to selection of a birefringent protection layer, which dictated a nonstandard optical system. The non-polarization-sensitive optics use an off-axis approach to detection. An LED illumination system makes it possible to read multiple tracks.

  19. Smart cards--the key to trustworthy health information systems.

    PubMed Central

    Neame, R.

    1997-01-01

    Some 20 years after they were first developed, "smart cards" are set to play a crucial part in healthcare systems. Last year about a billion were supplied, mainly for use in the financial sector, but their special features make them of particular strategic importance for the health sector, where they offer a ready made solution to some key problems of security and confidentiality. This article outlines what smart cards are and why they are so important in managing health information. I discuss some of the unique features of smart cards that are of special importance in the development of secure and trustworthy health information systems. Smart cards would enable individuals' identities to be authenticated and communications to be secured and would provide the mechanisms for implementing strong security, differential access to data, and definitive audit trails. Patient cards can also with complete security carry personal details, data on current health problems and medications, emergency care data, and pointers to where medical records for the patient can be found. Provider cards can in addition carry authorisations and information on computer set up. PMID:9055719

  20. Medicare prescription drug discount cards.

    PubMed

    Bryant, Natasha

    2004-01-01

    With the passage of the Medicare Prescription Drug Improvement and Modernization Act of 2003 came the creation of a Part D drug benefit through Medicare. Until that benefit is implemented, Medicare has established a drug discount card program to help your clients save money on their outpatient prescription drug expenses. In this brief, we discuss the Medicare-approved discount cards--who is eligible, how they work, how your clients can best make important decisions about them, and what help is out there for people with low incomes.

  1. A Simple Homemade Polarised Sunglasses Test Card

    ERIC Educational Resources Information Center

    Bamdad, Farzad

    2016-01-01

    In this article construction of a simple and inexpensive test card which can be used to demonstrate the polarisation ability of sunglasses is described. The card was fabricated simply by using a piece of polariser sheet with one to three layers of cellophane tape fixed on it.

  2. Star Catalogs on Punched Cards and Magnetic Tape

    NASA Technical Reports Server (NTRS)

    Berbert, J. H.

    1961-01-01

    In connection with the calibration of the Minitrack satellite tracking stations, the Goddard Space Flight Center has had the contents of a number of star catalogs put on punched cards and magnetic tape. This report discusses the plate data reduction procedures, briefly describes the information on the punched cards and magnetic tape, and calls attention to other applications of the card and tape star catalogs. The Goddard Space Flight Center has offered to prepare duplicate catalogs for qualified organizations.

  3. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    NASA Astrophysics Data System (ADS)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  4. 25 CFR 11.422 - Unauthorized use of credit cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...

  5. 25 CFR 11.422 - Unauthorized use of credit cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...

  6. 25 CFR 11.422 - Unauthorized use of credit cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...

  7. 25 CFR 11.422 - Unauthorized use of credit cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...

  8. 25 CFR 11.422 - Unauthorized use of credit cards.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Unauthorized use of credit cards. 11.422 Section 11.422... LAW AND ORDER CODE Criminal Offenses § 11.422 Unauthorized use of credit cards. (a) A person commits a misdemeanor if he or she uses a credit card for the purpose of obtaining property or services with knowledge...

  9. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  10. Quantum key distribution using card, base station and trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson

    Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less

  11. The mother's card: a simplified aid for primary health workers.

    PubMed

    Shah, K P; Shah, P M

    1981-02-01

    The Mother's Card and its use are described. The card is filled out by the health worker and provides data on the mother concerning family planning, menstrual cycles, pregnancy period (including whether at risk, state of nutrition, immunization against tetanus, and expected date of birth), and breastfeeding. The card is kept by the mother, and the health worker keeps a copy. Each card has space for 10 years and up to 4 pregnancies. The cards have been used successfully in India since 1976 and in Somalia since early 1980, and were useful in strengthening family planning programs as well as identifying pregnancies at risk for special attention.

  12. High density printed electrical circuit board card connection system

    DOEpatents

    Baumbaugh, Alan E.

    1997-01-01

    A zero insertion/extraction force printed circuit board card connection system comprises a cam-operated locking mechanism disposed along an edge portion of the printed circuit board. The extrusions along the circuit board mate with an extrusion fixed to the card cage having a plurality of electrical connectors. The card connection system allows the connectors to be held away from the circuit board during insertion/extraction and provides a constant mating force once the circuit board is positioned. The card connection system provides a simple solution to the need for a greater number of electrical signal connections.

  13. Signal processing for smart cards

    NASA Astrophysics Data System (ADS)

    Quisquater, Jean-Jacques; Samyde, David

    2003-06-01

    In 1998, Paul Kocher showed that when a smart card computes cryptographic algorithms, for signatures or encryption, its consumption or its radiations leak information. The keys or the secrets hidden in the card can then be recovered using a differential measurement based on the intercorrelation function. A lot of silicon manufacturers use desynchronization countermeasures to defeat power analysis. In this article we detail a new resynchronization technic. This method can be used to facilitate the use of a neural network to do the code recognition. It becomes possible to reverse engineer a software code automatically. Using data and clock separation methods, we show how to optimize the synchronization using signal processing. Then we compare these methods with watermarking methods for 1D and 2D signal. The very last watermarking detection improvements can be applied to signal processing for smart cards with very few modifications. Bayesian processing is one of the best ways to do Differential Power Analysis, and it is possible to extract a PIN code from a smart card in very few samples. So this article shows the need to continue to set up effective countermeasures for cryptographic processors. Although the idea to use advanced signal processing operators has been commonly known for a long time, no publication explains that results can be obtained. The main idea of differential measurement is to use the cross-correlation of two random variables and to repeat consumption measurements on the processor to be analyzed. We use two processors clocked at the same external frequency and computing the same data. The applications of our design are numerous. Two measurements provide the inputs of a central operator. With the most accurate operator we can improve the signal noise ratio, re-synchronize the acquisition clock with the internal one, or remove jitter. The analysis based on consumption or electromagnetic measurements can be improved using our structure. At first sight

  14. Plant Guide: Yellow beeplant (Cleome lutea Hook)

    Treesearch

    Derek Tilley; Jim Cane; Loren St. John; Dan Ogle; Nancy Shaw

    2012-01-01

    Yellow beeplant is a valuable native forage species for bees wasps and butterflies. Over 140 species of native bees have been observed foraging for nectar or pollen on yellow beeplant in southern Utah (Cane, 2008). Yellow beeplant is an annual forb which could provide food to insects in the first growing season of a range seeding (Ogle and others, 2011a). This...

  15. 47 CFR 80.868 - Card of instructions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Card of instructions. 80.868 Section 80.868 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES STATIONS IN THE MARITIME SERVICES Technical Equipment Requirements for Cargo Vessels Not Subject to Subpart W § 80.868 Card...

  16. Deep Dermatophytosis and Inherited CARD9 Deficiency

    PubMed Central

    Vincent, Quentin B.; Liu, Luyan; Cypowyj, Sophie; Prando, Carolina; Migaud, Mélanie; Taibi, Lynda; Ammar-Khodja, Aomar; Stambouli, Omar Boudghene; Guellil, Boumediene; Jacobs, Frederique; Goffard, Jean-Christophe; Schepers, Kinda; del Marmol, Véronique; Boussofara, Lobna; Denguezli, Mohamed; Larif, Molka; Bachelez, Hervé; Michel, Laurence; Lefranc, Gérard; Hay, Rod; Jouvion, Gregory; Chretien, Fabrice; Fraitag, Sylvie; Bougnoux, Marie-Elisabeth; Boudia, Merad

    2014-01-01

    BACKGROUND Deep dermatophytosis is a severe and sometimes life-threatening fungal infection caused by dermatophytes. It is characterized by extensive dermal and subcutaneous tissue invasion and by frequent dissemination to the lymph nodes and, occasionally, the central nervous system. The condition is different from common superficial dermatophyte infection and has been reported in patients with no known immunodeficiency. Patients are mostly from North African, consanguineous, multiplex families, which strongly suggests a mendelian genetic cause. METHODS We studied the clinical features of deep dermatophytosis in 17 patients with no known immunodeficiency from eight unrelated Tunisian, Algerian, and Moroccan families. Because CARD9 (caspase recruitment domain–containing protein 9) deficiency has been reported in an Iranian family with invasive fungal infections, we also sequenced CARD9 in the patients. RESULTS Four patients died, at 28, 29, 37, and 39 years of age, with clinically active deep dermatophytosis. No other severe infections, fungal or otherwise, were reported in the surviving patients, who ranged in age from 37 to 75 years. The 15 Algerian and Tunisian patients, from seven unrelated families, had a homozygous Q289X CARD9 allele, due to a founder effect. The 2 Moroccan siblings were homozygous for the R101C CARD9 allele. Both alleles are rare deleterious variants. The familial segregation of these alleles was consistent with autosomal recessive inheritance and complete clinical penetrance. CONCLUSIONS All the patients with deep dermatophytosis had autosomal recessive CARD9 deficiency. Deep dermatophytosis appears to be an important clinical manifestation of CARD9 deficiency. (Funded by Agence Nationale pour la Recherche and others.) PMID:24131138

  17. Why is my alfalfa yellow?

    USDA-ARS?s Scientific Manuscript database

    In 2016, many parts of the Midwest experienced far wetter than normal summer weather and by August or September, many growers were asking, “Why is my alfalfa yellow?” When all or part of an alfalfa field is yellow, it is a certain sign that something has gone wrong. In this case the problem in most ...

  18. Financial maturity of yellow birch

    Treesearch

    William B. Leak

    1969-01-01

    The methods used to compute financial maturity of yellow birch sawtimber are similar to those used for paper birch sawtimber, except for minor differences in detail. The procedure followed for yellow-birch veneer-log trees was also similar, except that local veneer grades and local veneer-log prices were used as the basis for the financial maturity computations.

  19. Book Catalogs versus Card Catalogs *

    PubMed Central

    Pizer, Irwin H.

    1965-01-01

    The development of the library catalog in book form and its abandonment in favor of the card catalog are briefly traced. The advantages and disadvantages of both types of catalogs are enumerated, and several solutions which tried to combine the best features of both are discussed. The present trend back to the book catalog, made possible by recent advances in computer technology, is analyzed, advantages and disadvantages are compared, current examples are illustrated, and finally the computerized catalog is weighed against both the book and card catalog as to main features and practicality. PMID:14271116

  20. Maxed out: The Relationship between Credit Card Debt, Credit Card Distress and Grade Point Averages for College Students

    ERIC Educational Resources Information Center

    Smith, Temple Day

    2011-01-01

    Few students leave college with a plan for paying off their debt. Starting a career inundated with student loans and credit card debt burdens is a reality many college students face today. In the wake of graduation coming to terms with the consequences of credit card debt is stressful for many students. This dissertation observes the relationship…

  1. College Student Performance and Credit Card Usage.

    ERIC Educational Resources Information Center

    Pinto, Mary Beth; Parente, Diane H.; Palmer, Todd Starr

    2001-01-01

    Examines the relationship between credit card usage, employment, and academic performance among a group of college students with credit cards. Results reveal that the students differed significantly in the level of anxiety felt from carrying debt, perceived need to work, and perceived impact of employment on academic performance. (Contains 57…

  2. Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'.

    PubMed

    Islam, S K Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.

  3. Victorian era esthetic and restorative dentistry: an advertising trade card gallery.

    PubMed

    Croll, Theodore P; Swanson, Ben Z

    2006-01-01

    A chief means of print advertising in the Victorian era was the "trade card." Innumerable products, companies, and services were highlighted on colorful chromolithographic trade cards, and these became desirable collectible objects which were pasted into scrapbooks and enjoyed by many families. Dentistry- and oral health-related subjects were often depicted on Victorian trade cards, and esthetic and restorative dentistry themes were featured. This review describes the history of advertising trade cards and offers a photographic gallery of dentistry-related cards of the era.

  4. "Procurement Cards" Help Colleges Reduce Paperwork and Delays in Purchasing.

    ERIC Educational Resources Information Center

    Mercer, Joye

    1995-01-01

    Increasingly, colleges and universities are using procurement cards, which are credit cards with limited usage, for institutional faculty and staff to make small purchases without going through costly and inefficient purchasing channels. Some concerns include distribution of cards, increased liability, and monitoring of expenditures. (MSE)

  5. Viscerotropic disease following yellow fever vaccination in Peru.

    PubMed

    Whittembury, Alvaro; Ramirez, Gladys; Hernández, Herminio; Ropero, Alba Maria; Waterman, Steve; Ticona, María; Brinton, Margo; Uchuya, Jorge; Gershman, Mark; Toledo, Washington; Staples, Erin; Campos, Clarense; Martínez, Mario; Chang, Gwong-Jen J; Cabezas, Cesar; Lanciotti, Robert; Zaki, Sherif; Montgomery, Joel M; Monath, Thomas; Hayes, Edward

    2009-10-09

    Five suspected cases of yellow fever vaccine-associated viscerotropic disease (YEL-AVD) clustered in space and time following a vaccination campaign in Ica, Peru in 2007. All five people received the same lot of 17DD live attenuated yellow fever vaccine before their illness; four of the five died of confirmed YEL-AVD. The surviving case was classified as probable YEL-AVD. Intensive investigation yielded no abnormalities of the implicated vaccine lot and no common risk factors. This is the first described space-time cluster of yellow fever viscerotropic disease involving more than two cases. Mass yellow fever vaccination should be avoided in areas that present extremely low risk of yellow fever.

  6. [Effect of transparent yellow and orange colored contact lenses on color discrimination in the yellow color range].

    PubMed

    Schürer, M; Walter, A; Brünner, H; Langenbucher, A

    2015-08-01

    Colored transparent filters cause a change in color perception and have an impact on the perceptible amount of different colors and especially on the ability to discriminate between them. Yellow or orange tinted contact lenses worn to enhance contrast vision by reducing or blocking short wavelengths also have an effect on color perception. The impact of the yellow and orange tinted contact lenses Wöhlk SPORT CONTRAST on color discrimination was investigated with the Erlangen colour measurement system in a study with 14 and 16 subjects, respectively. In relation to a yellow reference color located at u' = 0.2487/v' = 0.5433, measurements of color discrimination thresholds were taken in up to 6 different color coordinate axes. Based on these thresholds, color discrimination ellipses were calculated. These results are given in the Derrington, Krauskopf and Lennie (DKL) color system. Both contact lenses caused a shift of the reference color towards higher saturated colors. Color discrimination ability with the yellow and orange colored lenses was significantly enhanced along the blue-yellow axis in comparison to the reference measurements without a tinted filter. Along the red-green axis only the orange lens caused a significant reduction of color discrimination threshold distance to the reference color. Yellow and orange tinted contact lenses enhance the ability of color discrimination. If the transmission spectra and the induced changes are taken into account, these results can also be applied to other filter media, such as blue filter intraocular lenses.

  7. Impact of Report Cards On Employees: A Natural Experiment

    PubMed Central

    Knutson, David J.; Kind, Elizabeth A.; Fowles, Jinnet B.; Adlis, Susan

    1998-01-01

    To determine the effect of survey-based, health plan report cards on employees as they selected their 1995 health plan, the authors surveyed two groups of Minnesota State employees, one of which received the report card and one that did not. Both groups were surveyed before and after their enrollment. The authors looked for report card effects on relative changes in the employees' knowledge of health plan benefits and their ratings of quality and cost attributes, as well as their plan choice, rates of switching plans, and willingness to pay higher premiums. The only report card effect found was an increase in perceived knowledge for employees with single coverage. PMID:10387425

  8. State Exemplars of School Accountability "Report Cards"

    ERIC Educational Resources Information Center

    Christie, Kathy

    2014-01-01

    This report provides profiles of exemplars of school accountability "report cards" from nine states and the District of Columbia. The exemplars were selected by Education Commission of the States (ECS) researchers and a group of 14 parents selected by ECS staff. This report contains: (1) a main "report card" page with school…

  9. 77 FR 75410 - Request for Information Regarding Credit Card Market

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-20

    ... Regarding Credit Card Market AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice and request for information. SUMMARY: Section 502(a) of the Credit Card Accountability Responsibility and Disclosure Act of... review (Review) of the consumer credit card market, within the limits of its existing resources available...

  10. Minimizing yellow-bellied sapsucker damage

    Treesearch

    Gayne G. Erdmann; Ralph M., Jr. Peterson

    1992-01-01

    The yellow-bellied sapsucker is a migratory woodpecker that feeds on a wide variety of orchard, shade, and forest trees. Instead of drilling holes to find insects like other woodpeckers, sapsuckers drill holes in living trees to feed on sap and phloem tissues. Yellow and paper birches are their favorite summer food sources on their nesting grounds in Upper Michigan and...

  11. Silvical Characteristics of Yellow-Poplar

    Treesearch

    David F. Olson

    1969-01-01

    Yellow-poplar (Liriorlentlron tulipifera L.) is also commonly known as tulip poplar, tulip tree, white-poplar, whitewood, and "poplar" (60). It gets its name from the tulip-like flowers which it bears in the late spring. Because of the excellent form and rapid growth of the tree, plus the fine working qualities of the wood, yellow-poplar is one of the most...

  12. Higher-order ice-sheet modelling accelerated by multigrid on graphics cards

    NASA Astrophysics Data System (ADS)

    Brædstrup, Christian; Egholm, David

    2013-04-01

    Higher-order ice flow modelling is a very computer intensive process owing primarily to the nonlinear influence of the horizontal stress coupling. When applied for simulating long-term glacial landscape evolution, the ice-sheet models must consider very long time series, while both high temporal and spatial resolution is needed to resolve small effects. The use of higher-order and full stokes models have therefore seen very limited usage in this field. However, recent advances in graphics card (GPU) technology for high performance computing have proven extremely efficient in accelerating many large-scale scientific computations. The general purpose GPU (GPGPU) technology is cheap, has a low power consumption and fits into a normal desktop computer. It could therefore provide a powerful tool for many glaciologists working on ice flow models. Our current research focuses on utilising the GPU as a tool in ice-sheet and glacier modelling. To this extent we have implemented the Integrated Second-Order Shallow Ice Approximation (iSOSIA) equations on the device using the finite difference method. To accelerate the computations, the GPU solver uses a non-linear Red-Black Gauss-Seidel iterator coupled with a Full Approximation Scheme (FAS) multigrid setup to further aid convergence. The GPU finite difference implementation provides the inherent parallelization that scales from hundreds to several thousands of cores on newer cards. We demonstrate the efficiency of the GPU multigrid solver using benchmark experiments.

  13. Ridership impacts of South Florida's EASY smart card.

    DOT National Transportation Integrated Search

    2013-07-01

    Smart card-based Automated Fare Collection Systems (AFCS) are being increasingly deployed in transit systems across the US. Miami-Dade Transit (MDT) has recently deployed such a system branded as the EASY Card. The South Florida Regional Transportati...

  14. Optical security features for plastic card documents

    NASA Astrophysics Data System (ADS)

    Hossick Schott, Joachim

    1998-04-01

    Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.

  15. Credit Cards: What You Don't Know Can Cost You!

    ERIC Educational Resources Information Center

    Detweiler, Gerri

    1993-01-01

    The role of credit cards in personal finance has increased dramatically over the past two decades. Complex interest computation methods and additional fees often boost the price of credit card loans and help make credit cards the most profitable type of consumer loan for many lenders. (Author/JOW)

  16. Plain and Rolled Images from Paired Fingerprint Cards

    National Institute of Standards and Technology Data Gateway

    NIST Plain and Rolled Images from Paired Fingerprint Cards (Web, free access)   NIST Special Database 29 is being distributed for use in development and testing fingerprint matching systems. The data consist of 216 ten-print fingerprint card pairs with both the rolled and plains (from a bottom of the fingerprint card) scanned at 19.7 pixels per mm. A newer version of the compression/decompression software on the CDROM can be found at the website http://www.nist.gov/itl/iad/ig/nigos.cfm as part of the NBIS package.

  17. High-speed free-space based reconfigurable card-to-card optical interconnects with broadcast capability.

    PubMed

    Wang, Ke; Nirmalathas, Ampalavanapillai; Lim, Christina; Skafidas, Efstratios; Alameh, Kamal

    2013-07-01

    In this paper, we propose and experimentally demonstrate a free-space based high-speed reconfigurable card-to-card optical interconnect architecture with broadcast capability, which is required for control functionalities and efficient parallel computing applications. Experimental results show that 10 Gb/s data can be broadcast to all receiving channels for up to 30 cm with a worst-case receiver sensitivity better than -12.20 dBm. In addition, arbitrary multicasting with the same architecture is also investigated. 10 Gb/s reconfigurable point-to-point link and multicast channels are simultaneously demonstrated with a measured receiver sensitivity power penalty of ~1.3 dB due to crosstalk.

  18. Biometrics and ID Cards — Enablers for Personal Security

    NASA Astrophysics Data System (ADS)

    Reisen, Andreas

    The electronic ID card is a modernization and security project of the German Government. On the one hand, the multifunctional card is intended to boost security and the convenience of e-government and e-business applications. On the other hand, the new biometric ID card should allow citizens to use it as a travel document in the Schengen area and for specific destinations outside the European Union also in the future.

  19. Predicting credit card behavior: a study in neuroeconomics.

    PubMed

    Spinella, Marcello; Lester, David; Yang, Bijou

    2005-06-01

    In a sample of 139 community residents, credit card ownership was associated with age, sex, income, attitudes toward credit cards and toward money, and scores on a verbal measure of prefrontal cortical dysfunction, supporting a neuroeconomic approach to economic decision-making.

  20. A Simulation of Coevolution Using Playing Cards

    ERIC Educational Resources Information Center

    Tatina, Robert

    2007-01-01

    In this article, the author describes a simulation of a coevolutionary "arms race" and introduce a way of teaching it that lets students use the theory of natural selection to explain the outcomes of the simulation. The simulation uses the numerical cards from an UNO[R] playing card deck to represent the speeds of individuals in populations of…

  1. Dermatology Internet Yellow Page advertising.

    PubMed

    Francis, Shayla; Kozak, Katarzyna Z; Heilig, Lauren; Lundahl, Kristy; Bowland, Terri; Hester, Eric; Best, Arthur; Dellavalle, Robert P

    2006-07-01

    Patients may use Internet Yellow Pages to help select a physician. We sought to describe dermatology Internet Yellow Page advertising. Dermatology advertisements in Colorado, California, New York, and Texas at 3 Yellow Page World Wide Web sites were systematically examined. Most advertisements (76%; 223/292) listed only one provider, 56 listed more than one provider, and 13 listed no practitioner names. Five advertisements listed provider names without any credentialing letters, 265 listed at least one doctor of medicine or osteopathy, and 9 listed only providers with other credentials (6 doctors of podiatric medicine and 3 registered nurses). Most advertisements (61%; 179/292) listed a doctor of medicine or osteopathy claiming board certification, 78% (139/179) in dermatology and 22% (40/179) in other medical specialties. Four (1%; 4/292) claims of board certification could not be verified (one each in dermatology, family practice, dermatologic/cosmetologic surgery, and laser surgery). Board certification could be verified for most doctors of medicine and osteopathy not advertising claims of board certification (68%; 41/60; 32 dermatology, 9 other specialties). A total of 50 advertisements (17%) contained unverifiable or no board certification information, and 47 (16%) listed a physician with verifiable board certification in a field other than dermatology. All Internet Yellow Page World Wide Web sites and all US states were not examined. Nonphysicians, physicians board certified in medical specialties other than dermatology, and individuals without verifiable board certification in any medical specialty are advertising in dermatology Internet Yellow Pages. Many board-certified dermatologists are not advertising this certification.

  2. 21 CFR 573.1020 - Yellow prussiate of soda.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) ANIMAL DRUGS, FEEDS, AND RELATED PRODUCTS FOOD ADDITIVES PERMITTED IN FEED AND DRINKING WATER OF ANIMALS Food Additive Listing § 573.1020 Yellow prussiate of soda. Yellow prussiate of soda (sodium... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Yellow prussiate of soda. 573.1020 Section 573...

  3. 21 CFR 573.1020 - Yellow prussiate of soda.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...) ANIMAL DRUGS, FEEDS, AND RELATED PRODUCTS FOOD ADDITIVES PERMITTED IN FEED AND DRINKING WATER OF ANIMALS Food Additive Listing § 573.1020 Yellow prussiate of soda. Yellow prussiate of soda (sodium... 21 Food and Drugs 6 2012-04-01 2012-04-01 false Yellow prussiate of soda. 573.1020 Section 573...

  4. 21 CFR 573.1020 - Yellow prussiate of soda.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...) ANIMAL DRUGS, FEEDS, AND RELATED PRODUCTS FOOD ADDITIVES PERMITTED IN FEED AND DRINKING WATER OF ANIMALS Food Additive Listing § 573.1020 Yellow prussiate of soda. Yellow prussiate of soda (sodium... 21 Food and Drugs 6 2014-04-01 2014-04-01 false Yellow prussiate of soda. 573.1020 Section 573...

  5. 21 CFR 573.1020 - Yellow prussiate of soda.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...) ANIMAL DRUGS, FEEDS, AND RELATED PRODUCTS FOOD ADDITIVES PERMITTED IN FEED AND DRINKING WATER OF ANIMALS Food Additive Listing § 573.1020 Yellow prussiate of soda. Yellow prussiate of soda (sodium... 21 Food and Drugs 6 2013-04-01 2013-04-01 false Yellow prussiate of soda. 573.1020 Section 573...

  6. 21 CFR 573.1020 - Yellow prussiate of soda.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...) ANIMAL DRUGS, FEEDS, AND RELATED PRODUCTS FOOD ADDITIVES PERMITTED IN FEED AND DRINKING WATER OF ANIMALS Food Additive Listing § 573.1020 Yellow prussiate of soda. Yellow prussiate of soda (sodium... 21 Food and Drugs 6 2011-04-01 2011-04-01 false Yellow prussiate of soda. 573.1020 Section 573...

  7. Yellow fever: the recurring plague.

    PubMed

    Tomori, Oyewale

    2004-01-01

    Despite the availability of a safe and efficacious vaccine, yellow fever (YF) remains a disease of significant public health importance, with an estimated 200,000 cases and 30,000 deaths annually. The disease is endemic in tropical regions of Africa and South America; nearly 90% of YF cases and deaths occur in Africa. It is a significant hazard to unvaccinated travelers to these endemic areas. Virus transmission occurs between humans, mosquitoes, and monkeys. The mosquito, the true reservoir of YF, is infected throughout its life, and can transmit the virus transovarially through infected eggs. Man and monkeys, on the other hand, play the role of temporary amplifiers of the virus available for mosquito infection. Recent increases in the density and distribution of the urban mosquito vector, Aedes aegypti, as well as the rise in air travel increase the risk of introduction and spread of yellow fever to North and Central America, the Caribbean, the Middle East, Asia, Australia, and Oceania. It is an acute infectious disease characterized by sudden onset with a two-phase development, separated by a short period of remission. The clinical spectrum of yellow fever varies from very mild, nonspecific, febrile illness to a fulminating, sometimes fatal disease with pathognomic features. In severe cases, jaundice, bleeding diathesis, with hepatorenal involvement are common. The case fatality rate of severe yellow fever is 50% or higher. The pathogenesis and pathophysiology of the disease are poorly understood and have not been the subject of modern clinical research. There is no specific treatment for YF, making the management of YF patients extremely problematic. YF is a zoonotic disease that cannot be eradicated, therefore instituting preventive vaccination through routine childhood vaccination in endemic countries, can significantly reduce the burden of the disease. The distinctive properties of lifelong immunity after a single dose of yellow fever vaccination are the

  8. Development of a TaqMan Array Card for Acute-Febrile-Illness Outbreak Investigation and Surveillance of Emerging Pathogens, Including Ebola Virus.

    PubMed

    Liu, Jie; Ochieng, Caroline; Wiersma, Steve; Ströher, Ute; Towner, Jonathan S; Whitmer, Shannon; Nichol, Stuart T; Moore, Christopher C; Kersh, Gilbert J; Kato, Cecilia; Sexton, Christopher; Petersen, Jeannine; Massung, Robert; Hercik, Christine; Crump, John A; Kibiki, Gibson; Maro, Athanasia; Mujaga, Buliga; Gratz, Jean; Jacob, Shevin T; Banura, Patrick; Scheld, W Michael; Juma, Bonventure; Onyango, Clayton O; Montgomery, Joel M; Houpt, Eric; Fields, Barry

    2016-01-01

    Acute febrile illness (AFI) is associated with substantial morbidity and mortality worldwide, yet an etiologic agent is often not identified. Convalescent-phase serology is impractical, blood culture is slow, and many pathogens are fastidious or impossible to cultivate. We developed a real-time PCR-based TaqMan array card (TAC) that can test six to eight samples within 2.5 h from sample to results and can simultaneously detect 26 AFI-associated organisms, including 15 viruses (chikungunya, Crimean-Congo hemorrhagic fever [CCHF] virus, dengue, Ebola virus, Bundibugyo virus, Sudan virus, hantaviruses [Hantaan and Seoul], hepatitis E, Marburg, Nipah virus, o'nyong-nyong virus, Rift Valley fever virus, West Nile virus, and yellow fever virus), 8 bacteria (Bartonella spp., Brucella spp., Coxiella burnetii, Leptospira spp., Rickettsia spp., Salmonella enterica and Salmonella enterica serovar Typhi, and Yersinia pestis), and 3 protozoa (Leishmania spp., Plasmodium spp., and Trypanosoma brucei). Two extrinsic controls (phocine herpesvirus 1 and bacteriophage MS2) were included to ensure extraction and amplification efficiency. Analytical validation was performed on spiked specimens for linearity, intra-assay precision, interassay precision, limit of detection, and specificity. The performance of the card on clinical specimens was evaluated with 1,050 blood samples by comparison to the individual real-time PCR assays, and the TAC exhibited an overall 88% (278/315; 95% confidence interval [CI], 84% to 92%) sensitivity and a 99% (5,261/5,326, 98% to 99%) specificity. This TaqMan array card can be used in field settings as a rapid screen for outbreak investigation or for the surveillance of pathogens, including Ebola virus. Copyright © 2015, American Society for Microbiology. All Rights Reserved.

  9. Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’

    PubMed Central

    Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401

  10. The adaptor molecule CARD9 is essential for tuberculosis control

    PubMed Central

    Dorhoi, Anca; Desel, Christiane; Yeremeev, Vladimir; Pradl, Lydia; Brinkmann, Volker; Mollenkopf, Hans-Joachim; Hanke, Karin; Gross, Olaf; Ruland, Jürgen

    2010-01-01

    The cross talk between host and pathogen starts with recognition of bacterial signatures through pattern recognition receptors (PRRs), which mobilize downstream signaling cascades. We investigated the role of the cytosolic adaptor caspase recruitment domain family, member 9 (CARD9) in tuberculosis. This adaptor was critical for full activation of innate immunity by converging signals downstream of multiple PRRs. Card9−/− mice succumbed early after aerosol infection, with higher mycobacterial burden, pyogranulomatous pneumonia, accelerated granulocyte recruitment, and higher abundance of proinflammatory cytokines and granulocyte colony-stimulating factor (G-CSF) in serum and lung. Neutralization of G-CSF and neutrophil depletion significantly prolonged survival, indicating that an exacerbated systemic inflammatory disease triggered lethality of Card9−/− mice. CARD9 deficiency had no apparent effect on T cell responses, but a marked impact on the hematopoietic compartment. Card9−/− granulocytes failed to produce IL-10 after Mycobaterium tuberculosis infection, suggesting that an absent antiinflammatory feedback loop accounted for granulocyte-dominated pathology, uncontrolled bacterial replication, and, ultimately, death of infected Card9−/− mice. Our data provide evidence that deregulated innate responses trigger excessive lung inflammation and demonstrate a pivotal role of CARD9 signaling in autonomous innate host defense against tuberculosis. PMID:20351059

  11. Using a Card Trick to Illustrate Fixed Points and Stability

    ERIC Educational Resources Information Center

    Champanerkar, Jyoti; Jani, Mahendra

    2015-01-01

    Mathematical ideas from number theory, group theory, dynamical systems, and computer science have often been used to explain card tricks. Conversely, playing cards have been often used to illustrate the mathematical concepts of probability distributions and group theory. In this paper, we describe how the 21-card trick may be used to illustrate…

  12. Influence of the Yellow Sea Warm Current on phytoplankton community in the central Yellow Sea

    NASA Astrophysics Data System (ADS)

    Liu, Xin; Chiang, Kuo-Ping; Liu, Su-Mei; Wei, Hao; Zhao, Yuan; Huang, Bang-Qin

    2015-12-01

    In early spring, a hydrological front emerges in the central Yellow Sea, resulting from the intrusion of the high temperature and salinity Yellow Sea Warm Current (YSWC). The present study, applying phytoplankton pigments and flow cytometry measurements in March of 2007 and 2009, focuses on the biogeochemical effects of the YSWC. The nutrients fronts were coincident with the hydrological front, and a positive linear relationship between nitrate and salinity was found in the frontal area. This contrast with the common situation of coastal waters where high salinity values usually correlate with poor nutrients. We suggested nutrient concentrations of the YSWC waters might have been enhanced by mixing with the local nutrient-rich waters when it invaded the Yellow Sea from the north of the Changjiang estuary. In addition, our results indicate that the relative abundance of diatoms ranged from 26% to 90%, showing a higher value in the YSCC than in YSWC waters. Similar distributions were found between diatoms and dinoflagellates, however the cyanobacteria and prasinophytes showed an opposite distribution pattern. Good correlations were found between the pigments and flow cytometry observations on the picophytoplankton groups. Prasinophytes might be the major contributor to pico-eukaryotes in the central Yellow Sea as similar distributional patterns and significant correlations between them. It seems that the front separates the YSWC from the coastal water, and different phytoplankton groups are transported in these water masses and follow their movement. These results imply that the YSWC plays important roles in the distribution of nutrients, phytoplankton biomass and also in the community structure of the central Yellow Sea.

  13. 49 CFR 173.188 - White or yellow phosphorus.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false White or yellow phosphorus. 173.188 Section 173... Class 7 § 173.188 White or yellow phosphorus. Phosphorus, white or yellow, when offered for... pound) of phosphorus with screw-top closures; or (2) Steel drums (1A1) not over 250 L (66 gallons...

  14. 49 CFR 173.188 - White or yellow phosphorus.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 2 2011-10-01 2011-10-01 false White or yellow phosphorus. 173.188 Section 173... Class 7 § 173.188 White or yellow phosphorus. Phosphorus, white or yellow, when offered for... pound) of phosphorus with screw-top closures; or (2) Steel drums (1A1) not over 250 L (66 gallons...

  15. A credit card verifier structure using diffraction and spectroscopy concepts

    NASA Astrophysics Data System (ADS)

    Sumriddetchkajorn, Sarun; Intaravanne, Yuttana

    2008-04-01

    We propose and experimentally demonstrate an angle-multiplexing based optical structure for verifying a credit card. Our key idea comes from the fact that the fine detail of the embossed hologram stamped on the credit card is hard to duplicate and therefore its key color features can be used for distinguishing between the real and counterfeit ones. As the embossed hologram is a diffractive optical element, we choose to shine one at a time a number of broadband lightsources, each at different incident angle, on the embossed hologram of the credit card in such a way that different color spectra per incident angle beam is diffracted and separated in space. In this way, the number of pixels of each color plane is investigated. Then we apply a feed forward back propagation neural network configuration to separate the counterfeit credit card from the real one. Our experimental demonstration using two off-the-shelf broadband white light emitting diodes, one digital camera, a 3-layer neural network, and a notebook computer can identify all 69 counterfeit credit cards from eight real credit cards.

  16. The synopsis record card: a stepping stone to the computer

    PubMed Central

    Preece, J.F.; Hearson, J.R.

    1986-01-01

    A synopsis record card has been developed for use in general practice to provide ready reference to the important facts of the patient's record. When such a card is available in the record wallet it is used at 50% of all patient consultations and significantly reduces the time needed to retrieve past data essential to the consultation. The card contains clinical details, and data on medication, drug idiosyncrasies, immunizations, screening procedures, social, occupational and family history and practice research. As synopsis records are particularly important in teaching practices and when referral letters to hospital or personal medical attendant insurance reports are written, provision has been made for the inclusion of data relevant to those functions. So that the card may act as an intermediary for record computerization, all elements needed in the construction of a computer record have been taken into account. The prototype card was circulated to 3000 RCGP members for comment and the majority of replies were favourable. Suggested modifications have been incorporated in the final design of the card. PMID:3668909

  17. Oregon School and District Report Card Policy and Technical Manual

    ERIC Educational Resources Information Center

    Oregon Department of Education, 2012

    2012-01-01

    The school and district report cards were created by the 1999 Oregon Legislature. The legislation requires that the Oregon Department of Education (ODE) produce and issue a report card to all public schools and districts in the state. The report cards are designed to: (1) Communicate the many good things occurring in Oregon's public schools; (2)…

  18. 8. Photograph of post card, 'Cicotte Street Bridge, Logansport, Ind.' ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    8. Photograph of post card, 'Cicotte Street Bridge, Logansport, Ind.' Logansport News Agency, Logansport, Ind., Curteich-Chicago 'C.T. American Art' post card {Reg. U.S. Pat. Off.}, postmarked October 17, 1949. Card in the Cass County photograph file at the Indiana State Library, Indianapolis. - Cicott Street Bridge, Spanning Wabash River at State Road 25, Logansport, Cass County, IN

  19. Consumer responses to health plan report cards in two markets.

    PubMed

    Fowles, J B; Kind, E A; Braun, B L; Knutson, D J

    2000-05-01

    Health plans can compete on quality when consumers have helpful information. Report cards strive to meet this need, but consumer responses have not been measured. The objectives of this study were (1) to compare consumer responses to report cards in 2 markets, (2) to determine how personal characteristics relate to exposure, and (3) to assess the perceived helpfulness of the report cards. A postenrollment survey was used. The study included 784 employees of Monsanto (St Louis, 1996) and 670 employees of a health care purchasing cooperative (Denver, 1997). The dependent measures were (1) exposure, specifically remembering the report card, and intensity of reading it and (2) perceived helpfulness in learning about plan quality and in deciding to stay or switch. Except for remembering seeing the report card (Denver, 47%; St Louis, 55%), the 2 groups did not differ. Forty percent read most or all of the report card; 82% found the report helpful in learning about quality; and 66% found it helpful in deciding to stay or switch. Employees who used patient survey information in their plan decision were more likely to remember seeing the report card (odds ratio [OR], 4.85), to read it intensely (OR, 2.84), and to find it helpful in learning about plan quality (OR, 3.04) and deciding whether to stay or switch plans (OR, 2.64). Although the 2 samples differed markedly, their responses to report cards were similar. Exposure and helpfulness were related more to employee preferences for the type of information than to their health care decision needs.

  20. 12 CFR 334.91 - Duties of card issuers regarding changes of address.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... STATEMENTS OF GENERAL POLICY FAIR CREDIT REPORTING Identity Theft Red Flags § 334.91 Duties of card issuers regarding changes of address. (a) Scope. This section applies to an issuer of a debit or credit card (card... been issued a credit or debit card. (2) Clear and conspicuous means reasonably understandable and...

  1. 12 CFR 571.91 - Duties of card issuers regarding changes of address.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... FAIR CREDIT REPORTING Identity Theft Red Flags § 571.91 Duties of card issuers regarding changes of address. (a) Scope. This section applies to an issuer of a debit or credit card (card issuer) that is a... consumer who has been issued a credit or debit card. (2) Clear and conspicuous means reasonably...

  2. 21 CFR 137.280 - Bolted yellow corn meal.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 2 2011-04-01 2011-04-01 false Bolted yellow corn meal. 137.280 Section 137.280... Flours and Related Products § 137.280 Bolted yellow corn meal. Bolted yellow corn meal conforms to the definition and standard of identity prescribed by § 137.255 for bolted white corn meal except that cleaned...

  3. 21 CFR 137.280 - Bolted yellow corn meal.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Bolted yellow corn meal. 137.280 Section 137.280... Flours and Related Products § 137.280 Bolted yellow corn meal. Bolted yellow corn meal conforms to the definition and standard of identity prescribed by § 137.255 for bolted white corn meal except that cleaned...

  4. CARD games between virus and host get a new player.

    PubMed

    Johnson, Cynthia L; Gale, Michael

    2006-01-01

    A growing family of cellular proteins encoding the caspase activation and recruitment domain (CARD) has a crucial role in immunity by sensing virus infection and signaling antiviral immune defenses. Four independent studies have identified a novel CARD-containing protein, variously called IPS-1, MAVS, VISA and Cardif, which is an essential signaling adaptor of the host defense mediating CARD-CARD interactions with retinoic acid inducible gene-I (RIG-I) and melanoma differentiation-associated gene 5 (MDAS), sensors of virus infection. Disruption of this novel signaling pathway by hepatitis C virus (HCV) might provide a foundation for viral persistence.

  5. Smart Icon Cards

    ERIC Educational Resources Information Center

    Dunbar, Laura

    2015-01-01

    Icons are frequently used in the music classroom to depict concepts in a developmentally appropriate way for students. SmartBoards provide music educators yet another way to share these manipulatives with students. This article provides a step-by-step tutorial to create Smart Icon Cards using the folk song "Lucy Locket."

  6. 12 CFR 41.91 - Duties of card issuers regarding changes of address.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... FAIR CREDIT REPORTING Identity Theft Red Flags § 41.91 Duties of card issuers regarding changes of address. (a) Scope. This section applies to an issuer of a debit or credit card (card issuer) that is a... means a consumer who has been issued a credit or debit card. (2) Clear and conspicuous means reasonably...

  7. 12 CFR 717.91 - Duties of card issuers regarding changes of address.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... AFFECTING CREDIT UNIONS FAIR CREDIT REPORTING Identity Theft Red Flags § 717.91 Duties of card issuers regarding changes of address. (a) Scope. This section applies to an issuer of a debit or credit card (card... means a member who has been issued a credit or debit card. (2) Clear and conspicuous means reasonably...

  8. Procurement Cards Pave the Way to Efficient Purchasing.

    ERIC Educational Resources Information Center

    Enos, Eileen D.

    1999-01-01

    As educators battle restricted budgets, inflation, and enrollment changes, strategic sourcing management is replacing traditional transaction-based procurement. Procurement-card programs, allowing organizations to use credit cards for small purchases or low-value items, save time and enhance controls over merchants, credit limits, issuance limits,…

  9. FTA card utility for PCR detection of Mycobacterium leprae.

    PubMed

    Aye, Khin Saw; Matsuoka, Masanori; Kai, Masanori; Kyaw, Kyaw; Win, Aye Aye; Shwe, Mu Mu; Thein, Min; Htoo, Maung Maung; Htoon, Myo Thet

    2011-01-01

    The suitability of the FTA® elute card for the collection of slit skin smear (SSS) samples for PCR detection of Mycobacterium leprae was evaluated. A total of 192 SSS leprosy samples, of bacillary index (BI) 1 to 5, were collected from patients attending two skin clinics in Myanmar and preserved using both FTA® elute cards and 70% ethanol tubes. To compare the efficacy of PCR detection of DNA from each BI class, PCR was performed to amplify an M. leprae-specific repetitive element. Of the 192 samples, 116 FTA® elute card and 112 70% ethanol samples were PCR positive for M. leprae DNA. When correlated with BI, area under the curve (AUC) values of the respective receiver-operating characteristic curves were similar for the FTA® elute card and ethanol collection methods (AUC=0.6). Taken together, our results indicate that the FTA® elute card, which enables the collection, transport, and archiving of clinical samples, is an attractive alternative to ethanol preservation for the detection of M. leprae DNA.

  10. An Anonymous Credit Card System

    NASA Astrophysics Data System (ADS)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  11. 12 CFR 222.91 - Duties of card issuers regarding changes of address.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... described in § 222.90(a) that issues a debit or credit card (card issuer). (b) Definitions. For purposes of this section: (1) Cardholder means a consumer who has been issued a credit or debit card. (2) Clear and... notification of a change of address for a consumer's debit or credit card account and, within a short period of...

  12. 16 CFR 681.2 - Duties of card issuers regarding changes of address.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... applies to a person described in § 681.1(a) that issues a debit or credit card (card issuer). (b... of address if it receives notification of a change of address for a consumer's debit or credit card... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Duties of card issuers regarding changes of...

  13. Yellow Fever Outbreak, Southern Sudan, 2003

    PubMed Central

    Onyango, Clayton O.; Grobbelaar, Antoinette A.; Gibson, Georgina V.F.; Sang, Rosemary C.; Sow, Abdourahmane; Swanepoel, Robert

    2004-01-01

    In May 2003, an outbreak of fatal hemorrhagic fever, caused by yellow fever virus, occurred in southern Sudan. Phylogenetic analysis showed that the virus belonged to the East African genotype, which supports the contention that yellow fever is endemic in East Africa with the potential to cause large outbreaks in humans. PMID:15498174

  14. Various Measures of the Effectiveness of Yellow Goggles

    DTIC Science & Technology

    1980-10-08

    technique which is widely used r.o improve vision under these conditions is the use of yellow goggles. Skiers commonly don yellow goggles...different laboratory studies are presented. Two of the studies were of depth perception, since skiers believe that yellow goggles help them...selected for measurement because of practical considerations and theoretical implications. EXPERIMENTS ON DEPTH PERCEPTION Background Since skiers

  15. 76 FR 3180 - Market Test of Gift Cards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-19

    ... POSTAL REGULATORY COMMISSION [Docket No. MT2011-2; Order No. 647] Market Test of Gift Cards AGENCY... Service proposal to conduct a 2-year market test involving the sale of gift cards. This document describes the proposed test, addresses procedural aspects of the filing, and invites public comment. DATES...

  16. Modeling intelligent agent beliefs in a card game scenario

    NASA Astrophysics Data System (ADS)

    Gołuński, Marcel; Tomanek, Roman; WÄ siewicz, Piotr

    In this paper we explore the problem of intelligent agent beliefs. We model agent beliefs using multimodal logics of belief, KD45(m) system implemented as a directed graph depicting Kripke semantics, precisely. We present a card game engine application which allows multiple agents to connect to a given game session and play the card game. As an example simplified version of popular Saboteur card game is used. Implementation was done in Java language using following libraries and applications: Apache Mina, LWJGL.

  17. 76 FR 43393 - Debit Card Interchange Fees and Routing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-20

    ... have increased at a faster pace. \\20\\ Card-not-present transactions occur when the card is not...; \\32\\ faster availability of funds; faster check-out at the point-of-sale; increased sales value and...

  18. Impact of Water-Sediment Regulation Scheme on seasonal and spatial variations of biogeochemical factors in the Yellow River estuary

    NASA Astrophysics Data System (ADS)

    Wang, Yujue; Liu, Dongyan; Lee, Kenneth; Dong, Zhijun; Di, Baoping; Wang, Yueqi; Zhang, Jingjing

    2017-11-01

    Seasonal and spatial distributions of nutrients and chlorophyll-a (Chl-a), together with temperature, salinity and total suspended matter (TSM), were investigated in the Yellow River estuary (China) to examine the biogeochemical influence of the ;Water and Sediment Regulation Scheme (WSRS); that is used to manage outflows from the river. Four cruises in April, June (early phase of WSRS), July (late phase of WSRS) and September were conducted in 2013 (WSRS from 19th June to 12th July). The results showed that nutrient species could be divided into two major groups according to their seasonal and spatial distributions. One group included NO3-, dissolved organic nitrogen (DON) and Si(OH)4, primarily from freshwater discharge. NO3- and DON related to anthropogenic sources were also separated from Si(OH)4, which was related to weather. The other group included dissolved inorganic phosphorus (DIP), dissolved organic phosphorus (DOP), NO2-, and NH4+. Along with freshwater inputs, sediment absorption/desorption showed impacts on DIP and DOP concentration and distribution. Nitrification was a dominant factor controlling NO2- concentrations. NH4+ was influenced by both sediment absorption/desorption and nitrification. The WSRS not only shifted the seasonal patterns of nutrients in the estuary, with high concentrations moved from autumn to June and July, but also promoted the nutrient spread to the south central part of the Bohai Sea. Spatial distribution of Chlorophyll-a (Chl-a) was influenced by the WSRS, with high concentrations being found in the river mouth in June and September, flanking the river mouth in July, and in the south central part of the Bohai Sea in September. Although Chl-a concentrations increased in June and July, the seasonal patterns did not change. The highest concentrations were found in September. Nutrient loadings during the WSRS relieved DIP and Si(OH)4 limitation in the estuary and south central Bohai Sea, causing an excess of DIN and disrupting

  19. IR Cards: Inquiry-Based Introduction to Infrared Spectroscopy

    ERIC Educational Resources Information Center

    Bennett, Jacqueline; Forster, Tabetha

    2010-01-01

    As infrared spectroscopy (IR) is frequently used in undergraduate organic chemistry courses, an inductive introduction to IR spectroscopy that uses index cards printed with spectra, structures, and chemical names is described. Groups of students are given an alphabetized deck of these "IR cards" to sort into functional groups. The students then…

  20. 29 CFR 1206.3 - Age of authorization cards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 4 2011-07-01 2011-07-01 false Age of authorization cards. 1206.3 Section 1206.3 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD HANDLING REPRESENTATION DISPUTES UNDER THE RAILWAY LABOR ACT § 1206.3 Age of authorization cards. Authorizations must be signed and dated in the...

  1. 29 CFR 1206.3 - Age of authorization cards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 4 2012-07-01 2012-07-01 false Age of authorization cards. 1206.3 Section 1206.3 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD HANDLING REPRESENTATION DISPUTES UNDER THE RAILWAY LABOR ACT § 1206.3 Age of authorization cards. Authorizations must be signed and dated in the...

  2. 29 CFR 1206.3 - Age of authorization cards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 4 2014-07-01 2014-07-01 false Age of authorization cards. 1206.3 Section 1206.3 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD HANDLING REPRESENTATION DISPUTES UNDER THE RAILWAY LABOR ACT § 1206.3 Age of authorization cards. Authorizations must be signed and dated in the...

  3. 29 CFR 1206.3 - Age of authorization cards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Age of authorization cards. 1206.3 Section 1206.3 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD HANDLING REPRESENTATION DISPUTES UNDER THE RAILWAY LABOR ACT § 1206.3 Age of authorization cards. Authorizations must be signed and dated in the...

  4. 29 CFR 1206.3 - Age of authorization cards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 4 2013-07-01 2013-07-01 false Age of authorization cards. 1206.3 Section 1206.3 Labor Regulations Relating to Labor (Continued) NATIONAL MEDIATION BOARD HANDLING REPRESENTATION DISPUTES UNDER THE RAILWAY LABOR ACT § 1206.3 Age of authorization cards. Authorizations must be signed and dated in the...

  5. Assessment of Grating Acuity in Infants and Toddlers Using an Electronic Acuity Card: The Dobson Card.

    PubMed

    Mohan, Kathleen M; Miller, Joseph M; Harvey, Erin M; Gerhart, Kimberly D; Apple, Howard P; Apple, Deborah; Smith, Jordana M; Davis, Amy L; Leonard-Green, Tina; Campus, Irene; Dennis, Leslie K

    2016-01-01

    To determine if testing binocular visual acuity in infants and toddlers using the Acuity Card Procedure (ACP) with electronic grating stimuli yields clinically useful data. Participants were infants and toddlers ages 5 to 36.7 months referred by pediatricians due to failed automated vision screening. The ACP was used to test binocular grating acuity. Stimuli were presented on the Dobson Card. The Dobson Card consists of a handheld matte-black plexiglass frame with two flush-mounted tablet computers and is similar in size and form to commercially available printed grating acuity testing stimuli (Teller Acuity Cards II [TACII]; Stereo Optical, Inc., Chicago, IL). On each trial, one tablet displayed a square-wave grating and the other displayed a luminance-matched uniform gray patch. Stimuli were roughly equivalent to the stimuli available in the printed TACII stimuli. After acuity testing, each child received a cycloplegic eye examination. Based on cycloplegic retinoscopy, patients were categorized as having high or low refractive error per American Association for Pediatric Ophthalmology and Strabismus vision screening referral criteria. Mean acuities for high and low refractive error groups were compared using analysis of covariance, controlling for age. Mean visual acuity was significantly poorer in children with high refractive error than in those with low refractive error (P = .015). Electronic stimuli presented using the ACP can yield clinically useful measurements of grating acuity in infants and toddlers. Further research is needed to determine the optimal conditions and procedures for obtaining accurate and clinically useful automated measurements of visual acuity in infants and toddlers. Copyright 2016, SLACK Incorporated.

  6. Dimension yields from yellow-poplar lumber

    Treesearch

    R. C. Gilmore; J. D. Danielson

    1984-01-01

    The available supply of yellow poplar (Liriodendron tulipifera L.), its potential for new uses, and its continuing importance to the furniture industry have created a need to accumulate additional information about this species. As an aid to better utilization of this species, charts for determining cutting stock yields from yellow poplar lumber are presented for each...

  7. The complete nucleotide sequence of the Barley yellow dwarf virus-RMV genome reveals it to be a new Polerovirus distantly related to other yellow dwarf viruses

    USDA-ARS?s Scientific Manuscript database

    The yellow dwarf viruses (YDVs) of the Luteoviridae family represent the most widespread group of cereal viruses worldwide. They include the Barley yellow dwarf viruses (BYDVs) of genus Luteovirus, the Cereal yellow dwarf viruses (CYDVs) and Wheat yellow dwarf virus (WYDV) of genus Polerovirus. All ...

  8. 7 CFR 28.441 - Strict Middling Yellow Stained Color.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 2 2014-01-01 2014-01-01 false Strict Middling Yellow Stained Color. 28.441 Section... Strict Middling Yellow Stained Color. Strict Middling Yellow Stained Color is color which is deeper than that of Strict Middling Tinged Color. [57 FR 34498, Aug. 5, 1992] ...

  9. 7 CFR 28.441 - Strict Middling Yellow Stained Color.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 2 2013-01-01 2013-01-01 false Strict Middling Yellow Stained Color. 28.441 Section... Strict Middling Yellow Stained Color. Strict Middling Yellow Stained Color is color which is deeper than that of Strict Middling Tinged Color. [57 FR 34498, Aug. 5, 1992] ...

  10. 7 CFR 28.441 - Strict Middling Yellow Stained Color.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 2 2012-01-01 2012-01-01 false Strict Middling Yellow Stained Color. 28.441 Section... Strict Middling Yellow Stained Color. Strict Middling Yellow Stained Color is color which is deeper than that of Strict Middling Tinged Color. [57 FR 34498, Aug. 5, 1992] ...

  11. 7 CFR 28.441 - Strict Middling Yellow Stained Color.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 2 2011-01-01 2011-01-01 false Strict Middling Yellow Stained Color. 28.441 Section... Strict Middling Yellow Stained Color. Strict Middling Yellow Stained Color is color which is deeper than that of Strict Middling Tinged Color. [57 FR 34498, Aug. 5, 1992] ...

  12. 7 CFR 28.441 - Strict Middling Yellow Stained Color.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Strict Middling Yellow Stained Color. 28.441 Section... Strict Middling Yellow Stained Color. Strict Middling Yellow Stained Color is color which is deeper than that of Strict Middling Tinged Color. [57 FR 34498, Aug. 5, 1992] ...

  13. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

    PubMed

    Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan

    2016-12-01

    Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.

  14. Western North Carolina report card on forest sustainability

    Treesearch

    Susan Fox; Bill Jackson; Sarah Jackson; Gary Kauffmann; Mary Carol Koester; Robert Mera; Terry Seyden; Charles Van Sickle; Sealy Chipley; Jim Fox; Jeff Hicks; Matt Hutchins; Karin Lichtenstein; Kelsie Nolan; Todd Pierce; Beth Porter

    2011-01-01

    Western North Carolina encompasses 4.8 million acres of highly valued temperate forests. To help address future management and conservation decisions surrounding these resources, the report card evaluates environmental, social, and economic conditions in recent decades across an 18 county area. The report card describes the status of indicators of forest sustainability...

  15. 26 CFR 49.4251-4 - Prepaid telephone cards.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...; adding value. (i) After using the card described in Example 2, P arranges with A by telephone to have 30... EXCISE TAXES FACILITIES AND SERVICES EXCISE TAXES Communications § 49.4251-4 Prepaid telephone cards. (a... section provides rules for the application of the section 4251 tax to PTCs. (b) Definitions. The following...

  16. 26 CFR 49.4251-4 - Prepaid telephone cards.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...; adding value. (i) After using the card described in Example 2, P arranges with A by telephone to have 30... EXCISE TAXES FACILITIES AND SERVICES EXCISE TAXES Communications § 49.4251-4 Prepaid telephone cards. (a... section provides rules for the application of the section 4251 tax to PTCs. (b) Definitions. The following...

  17. 26 CFR 49.4251-4 - Prepaid telephone cards.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...; adding value. (i) After using the card described in Example 2, P arranges with A by telephone to have 30... EXCISE TAXES FACILITIES AND SERVICES EXCISE TAXES Communications § 49.4251-4 Prepaid telephone cards. (a... section provides rules for the application of the section 4251 tax to PTCs. (b) Definitions. The following...

  18. Polymorph-Dependent Green, Yellow, and Red Emissions of Organic Crystals for Laser Applications.

    PubMed

    Xu, Zhenzhen; Zhang, Zhiwei; Jin, Xue; Liao, Qing; Fu, Hongbing

    2017-12-05

    Color tuning of organic solid-state luminescent materials remains difficult and time-consuming through conventional chemical synthesis. Herein, we reported highly efficient polymorph-dependent green (P1), yellow (P2), and red (P3) emissions of organic crystals made by the same molecular building blocks of 4-(2-{4-[2-(4-diphenylamino-phenyl)-vinyl]-phenyl}-vinyl)-benzonitrile (DOPVB). Single-crystal X-ray diffraction (XRD) and spectroscopic data reveal that all three polymorphs follow the herringbone packing motif in H-type aggregations. On the one hand, from P1, P2 to P3, the reduced pitch translation along π stacks increases the intermolecular interactions between adjacent molecules, therefore leading to gradually red-shifted emissions from 540, 570 to 614 nm. On the other hand, the edge-to-face arrangement and large roll translations avoid strong π-π overlap, making P1, P2 and P3 highly emissive with record-high solid-state fluorescence quantum yields of 0.60, 0.98, and 0.68, respectively. Furthermore, the optically allowed 0-1 transitions of herringbone H-aggregates of P1, P2 and P3 naturally provide a four-level scheme, enabling green and yellow amplified spontaneous emissions (ASE) with very low thresholds. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  20. DIABCARD a smart card for patients with chronic diseases.

    PubMed

    Engelbrecht, R; Hildebrand, C

    1997-01-01

    Within the European Union-sponsored project DIABCARD, the core of a chip-card-based medical information system for patients with chronic diseases, exemplified on diabetes mellitus, has been developed. The long-term goal of the project is to improve the medical record and the quality of care for patients with chronic diseases. The basic idea is to have a portable electronic medical record on a smart card. This will improve the communication between the different healthcare personnel and between different institutions and, at the same time, promote shared care. The DIABCARD chip-card-based medical information system will offer controlled access to the necessary and up-to-date patient record to everyone involved in the patient's treatment, and it will help reduce the constantly rising healthcare expenditure. The system first was implemented in a small version. The system architecture contains hardware, software, and orgware. It considers especially the memory of the chip card, the processor, the data structure, security functions, the operating system on the chip card, the interface between the chip card and the application, and various application areas. The DIABCARD dataset was defined via an information model, which describes the different communication processes, via acknowledged diabetes datasets and medical scenarios. It includes, among others, emergency data, data for quality assurance, and data for blood glucose self-monitoring. The first prototype has been developed, and a pilot was run for 3 months.

  1. Consumer response to a report card comparing healthcare systems.

    PubMed

    Braun, Barbara L; Kind, Elizabeth A; Fowles, Jinnet B; Suarez, Walter G

    2002-06-01

    Report cards to date have focused on quality of care in health plans rather than within healthcare delivery systems. The purpose of this study was to evaluate consumer response to the first healthcare system-level report card. Qualitative assessment of consumer response. We conducted 5 focus groups of community members to evaluate consumer response to the report card; 2 included community club members, 3 included community-dwelling retired persons. Discussions were audiotaped and transcribed; comments were categorized by topic area from the script, and common themes identified. Focus group participants, in general, were unaware of the current emphasis on medical quality improvement initiatives. However, they believed that the opinion that the descriptive clinic information and patient survey data contained in the report card would be most useful mainly for choosing a healthcare system if they were dissatisfied with current medical care, if their healthcare options changed, or if they were in poor health. Personal experience was considered a more trustworthy measure of healthcare quality than were patient survey results. Trustworthiness was perceived to be higher if the report card sponsor was not affiliated with the healthcare systems being evaluated. Participants also believed care system administrators should use the data to enact positive clinic-level and physician-level changes. Healthcare consumers appreciated the attention to patient experiences and supported healthcare quality improvement initiatives. Report cards were considered important for choosing a healthcare system in certain circumstances and for guiding quality improvement efforts at all levels.

  2. 11 CFR 100.140 - Slate cards and sample ballots.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... incurred by such committee with respect to a printed slate card, sample ballot, palm card, or other printed... advertising such as billboards. But see 11 CFR 100.24, 104.17(a), and part 300, subpart B for exempt...

  3. 41 CFR 101-26.502 - U.S. Government National Credit Card.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...

  4. 41 CFR 101-26.502 - U.S. Government National Credit Card.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...

  5. 41 CFR 101-26.502 - U.S. Government National Credit Card.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...

  6. 41 CFR 101-26.502 - U.S. Government National Credit Card.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...

  7. 41 CFR 101-26.502 - U.S. Government National Credit Card.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Credit Card. 101-26.502 Section 101-26.502 Public Contracts and Property Management Federal Property... SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.502 U.S. Government National Credit Card. A... Standard Form 149, U.S. Government National Credit Card. [60 FR 19674, Apr. 20, 1995] ...

  8. Results from Kenya's 2014 Report Card on the Physical Activity and Body Weight of Children and Youth.

    PubMed

    Wachira L, Joy M; Muthuri, Stella K; Tremblay, Mark S; Onywera, Vincent O

    2014-05-01

    The report card presents available evidence on the physical activity (PA) and body weight status of Kenyan children and youth. It highlights areas where Kenya is succeeding and those in which more action is needed. Comprehensive review and analysis of available data on core indicators for Kenyan children and youth 5-17 years were conducted. The grading system used was based on a set of specific criteria and existing grading schemes from similar report cards in other countries. Of the 10 core indicators discussed, body composition was favorable (grade B) while overall PA levels, organized sport participation, and active play were assigned grades of C. Active transportation and sedentary behaviors were also favorable (grade B). Family/peers, school, governmental and nongovernmental strategies were graded C. The majority of Kenyan children and youth have healthy body composition levels and acceptable sedentary time, but are not doing as well in attaining the World Health Organization (WHO) recommendation on PA. Although Kenya seems to be doing well in most indicators compared with some developed countries, there is a need for action to address existing trends toward unhealthy lifestyles. More robust and representative data for all indicators are required.

  9. THE TRANSMISSION OF YELLOW FEVER

    PubMed Central

    Davis, Nelson C.

    1930-01-01

    1. Saimiri sciureus has been infected with yellow fever virus, both by the inoculation of infectious blood and by the bites of infective mosquitoes. Some of the monkeys have died, showing lesions, including hepatic necrosis, suggesting yellow fever as seen in human beings and in rhesus monkeys. Virus has been transferred back to M. rhesus from infected Saimiri both by blood inoculation and by mosquito bites. The virus undoubtedly has been maintained through four direct passages in Saimiri. Reinoculations of infectious material into recovered monkeys have not given rise to invasion of the blood stream by virus. Sera from recovered animals have protected M. rhesus against the inoculation of virus. 2. It has been possible to pass the virus to and from Ateleus ater by the injection of blood or liver and by the bites of mosquitoes. The livers from two infected animals have shown no necrosis. The serum from one recovered monkey proved to be protective for M. rhesus. 3. Only three out of twelve Lagothrix lagotricha have reacted to yellow fever virus by a rise in temperature. Probably none have died as a result of the infection. In only one instance has the virus been transferred back to M. rhesus. The sera of recovered animals have had a protective action against yellow fever virus. PMID:19869721

  10. HyperCard and Other Macintosh Applications in Astronomy Education

    NASA Astrophysics Data System (ADS)

    Meisel, D.

    1992-12-01

    For the past six years, Macintosh computers have been used in introductory astronomy classes and laboratories with HyperCard and other commercial Macintosh software. I will review some of the available software that has been found particularly useful in undergraduate situations. The review will start with HyperCard (a programmable "index card" system) since it is a mature multimedia platform for the Macintosh. Experiences with the Voyager, the TS-24, MathCad, NIH Image, and other programs as used by the author and George Mumford (Tufts University) in courses and workshops will be described.

  11. 11 CFR 100.80 - Slate cards and sample ballots.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... incurred by such committee with respect to a printed slate card, sample ballot, palm card, or other printed... advertising such as billboards. But see 11 CFR 100.24, 104.17(a) and part 300, subpart B for exempt activities...

  12. 26 CFR 49.4251-4 - Prepaid telephone cards.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...), the face amount of the PTC is treated as an amount paid for communications services and that amount is... amount of communications services as the PTC to which it is being compared. Dollar card means a PTC the...) means a card or similar arrangement that permits its holder to obtain a fixed amount of communications...

  13. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... or pleasure without a visa and passport, must apply to the DOS on Form DS-156, Visitor Visa... border crossing card (or similar stamp in a passport). (i) A Canadian citizen or other person sharing... crossing card (or similar stamp in a passport) issued by the DOS prior to April 1, 1998, that does not...

  14. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... or pleasure without a visa and passport, must apply to the DOS on Form DS-156, Visitor Visa... border crossing card (or similar stamp in a passport). (i) A Canadian citizen or other person sharing... crossing card (or similar stamp in a passport) issued by the DOS prior to April 1, 1998, that does not...

  15. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... or pleasure without a visa and passport, must apply to the DOS on Form DS-156, Visitor Visa... border crossing card (or similar stamp in a passport). (i) A Canadian citizen or other person sharing... crossing card (or similar stamp in a passport) issued by the DOS prior to April 1, 1998, that does not...

  16. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... or pleasure without a visa and passport, must apply to the DOS on Form DS-156, Visitor Visa... border crossing card (or similar stamp in a passport). (i) A Canadian citizen or other person sharing... crossing card (or similar stamp in a passport) issued by the DOS prior to April 1, 1998, that does not...

  17. 8 CFR 212.6 - Border crossing identification cards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... or pleasure without a visa and passport, must apply to the DOS on Form DS-156, Visitor Visa... border crossing card (or similar stamp in a passport). (i) A Canadian citizen or other person sharing... crossing card (or similar stamp in a passport) issued by the DOS prior to April 1, 1998, that does not...

  18. Idea Cards for Water Flow. Elementary Science Study.

    ERIC Educational Resources Information Center

    Elementary Science Study, Newton, MA.

    Presented are 29 activity cards designed for use with the Elementary Science Study (ESS) program. Each card describes an experiment on one aspect of water flow such as siphoning, methods of removing water from a container, aspirators, floats, and water behavior in various tubing linkups. Activities are intended for individual or small group study;…

  19. Using Cue Cards throughout the K-12 Curriculum

    ERIC Educational Resources Information Center

    Conderman, Greg; Hedin, Laura R.

    2015-01-01

    As a flexible instructional tool, cue cards offer support for students with and without disabilities. By providing different amounts of support, they also can be used to differentiate instruction in a variety of subject areas and grade levels. This article describes various strategies for using cue cards and includes examples from K-12 classrooms.

  20. Neural fraud detection in credit card operations.

    PubMed

    Dorronsoro, J R; Ginel, F; Sgnchez, C; Cruz, C S

    1997-01-01

    This paper presents an online system for fraud detection of credit card operations based on a neural classifier. Since it is installed in a transactional hub for operation distribution, and not on a card-issuing institution, it acts solely on the information of the operation to be rated and of its immediate previous history, and not on historic databases of past cardholder activities. Among the main characteristics of credit card traffic are the great imbalance between proper and fraudulent operations, and a great degree of mixing between both. To ensure proper model construction, a nonlinear version of Fisher's discriminant analysis, which adequately separates a good proportion of fraudulent operations away from other closer to normal traffic, has been used. The system is fully operational and currently handles more than 12 million operations per year with very satisfactory results.

  1. A direct evidence of allocating yellow luminescence band in undoped GaN by two-wavelength excited photoluminescence

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Julkarnain, M., E-mail: s13ds053@mail.saitama-u.ac.jp, E-mail: jnain.apee@ru.ac.bd; Department of Applied Physics and Electronic Engineering, University of Rajshahi, Rajshahi 6205; Fukuda, T.

    2015-11-23

    The behavior of below-gap luminescence of undoped GaN grown by MOCVD has been studied by the scheme of two-wavelength-excited photoluminescence. The emission intensity of shallow donor to valence band transition (I{sub OX}) increased while intensities of donor-acceptor pair transition and the Yellow Luminescence band (YLB) decreased after the irradiation of a below-gap excitation source of 1.17 eV. The conventional energy schemes and recombination models have been considered to explain our experimental result but only one model in which YLB is the transition of a shallow donor to a deep state placed at ∼1 eV above the valence band maximum satisfies our result.more » The defect related parameters that give a qualitative insight in the samples have been evaluated by systematically solving the rate equations and fitting the result with the experiment.« less

  2. Measuring Up 2004: The State Report Card on Higher Education. Vermont

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2004

    2004-01-01

    This state report card is derived from "Measuring Up 2004," the national report card for higher education. Its purpose is to provide the public and policymakers with information to assess and improve postsecondary education in each state. "Measuring Up 2004" is the third in a series of biennial report cards. The report card…

  3. Médicarte software developed for the Quebec microprocessor health card project.

    PubMed

    Lavoie, G; Tremblay, L; Durant, P; Papillon, M J; Bérubé, J; Fortin, J P

    1995-01-01

    The Quebec Patient Smart Card Project is a Provincial Government initiative under the responsibility of the Rgie de l'assurance-maladie du Québec (Quebec Health Insurance Board). Development, implementation, and assessment duties were assigned to a team from Université Laval, which in turn joined a group from the Direction de la santé publique du Bas-St-Laurent in Rimouski, where the experiment is taking place. The pilot project seeks to evaluate the use and acceptance of a microprocessor card as a way to improve the exchange of clinical information between card users and various health professionals. The card can be best described as a résumé containing information pertinent to an individual's health history. It is not a complete medical file; rather, it is a summary to be used as a starting point for a discussion between health professionals and patients. The target population is composed of persons 60 years and over, pregnant women, infants under 18 months, and the residents of a small town located in the target area, St-Fabien, regardless of age. The health professionals involved are general practitioners, specialists, pharmacists, nurses, and ambulance personnel. Participation in the project is on a voluntary basis. Each health care provider participating in the project has a personal identification number (PIN) and must use both an access card and a user card to access information. This prevents unauthorized access to a patient's card and allows the staff to sign and date information entered onto the patient card. To test the microprocessor card, we developed software based on a problem-oriented approach integrating diagnosis, investigations, treatments, and referrals. This software is not an expert system that constrains the clinician to a particular decisional algorithm. Instead, the software supports the physician in decision making. The software was developed with a graphical interface (Windows 3.1) to maximize its user friendliness. A version of the

  4. Changes in alcohol consumption patterns following the introduction of credit cards in Ontario liquor stores.

    PubMed

    Macdonald, S A; Wells, S L; Giesbrecht, N; West, P M

    1999-05-01

    In 1994, regulatory changes were introduced in Ontario, Canada, permitting the purchase of alcoholic beverages with credit cards at government-operated liquor stores. Two objectives of this study were: (1) to compare the characteristics of credit card shoppers with non credit card shoppers at liquor stores, and (2) to assess whether changes occurred in alcohol consumption patterns among shoppers following the introduction of credit cards. Random digit dialing was used to interview 2,039 telephone participants prior to the introduction of credit cards (Time 1); 1,401 of these subjects were contacted 1 year later (Time 2). Independent sample t tests were used to compare credit card shoppers with shoppers not using credit cards, and paired t tests were performed to assess whether drinking behaviors changed from Time 1 to Time 2. The credit card shoppers were more likely than the non credit card shoppers to be highly educated (p < .001) and to have high incomes (p < .05). Credit card shoppers drank an average of 6.3 drinks over the previous week compared with 4.0 drinks among non credit card shoppers (p < .01). Although the overall amount of alcohol consumed among credit card shoppers dropped from 6.7 drinks at Time 1 to 6.3 at Time 2 (NS), credit card shoppers reported drinking significantly more often after credit cards were introduced (p < .05). The results suggest that credit cards may not present public health problems since significant increases in alcohol consumption among credit card shoppers were not found.

  5. Yellow Fever Vaccine

    MedlinePlus

    ... way to prevent yellow fever is to avoid mosquito bites by:staying in well-screened or air-conditioned areas, wearing clothes that cover most of your body, using an effective insect repellent, such as those containing DEET.

  6. Long-Distance Dispersal Potential for Onion Thrips (Thysanoptera: Thripidae) and Iris yellow spot virus (Bunyaviridae: Tospovirus) in an Onion Ecosystem.

    PubMed

    Smith, Erik A; Fuchs, M; Shields, E J; Nault, B A

    2015-08-01

    Onion thrips, Thrips tabaci Lindeman, is a worldwide pest of onion whose feeding damage and transmission of Iris yellow spot virus (IYSV) may reduce onion yields. Little is known about the seasonal dynamics of T. tabaci dispersal, the distance of dispersal, or the movement of thrips infected with IYSV during the onion-growing season. To address these questions, T. tabaci adults were collected using transparent sticky card traps in commercial onion fields three times during the onion-growing season (June, July, and late August) at varying heights above the canopy (0.5-6 m above soil surface) and with trap-equipped unmanned aircraft (UAVs) flying 50-60 m above onion fields during August sampling periods in 2012 and 2013. Randomly selected subsamples of captured T. tabaci were tested for IYSV using RT-PCR. Most T. tabaci adults were captured in late August and near the onion canopy (<2 m) throughout the season. However, 4% of T. tabaci adults captured on sticky cards were at altitudes ≥2 m, and T. tabaci were also captured on UAV-mounted traps. These data strongly suggest that long-distance dispersal occurs. More T. tabaci captured on sticky cards tested positive for IYSV in August (53.6%) than earlier in the season (2.3 to 21.5% in June and July, respectively), and 20 and 15% of T. tabaci captured on UAV-mounted traps tested positive for IYSV in 2012 and 2013, respectively. Our results indicate that T. tabaci adults, including viruliferous individuals, engage in long-distance dispersal late in the season and likely contribute to the spread of IYSV. © The Authors 2015. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. What Do School Report Cards Really Tell Us? (An Analysis of the Relationships among Factors Commonly Reported in School District Report Cards).

    ERIC Educational Resources Information Center

    Bobbett, Gordon C.; And Others

    The relationships among factors reported on school district (SD) report cards were studied for 121 Tennessee SDs. The report cards provided data on student outcomes (achievement test scores) and SD characteristics. Relationships were studied through linear regression, Pearson product moment correlation, and Guttman's partial correlation. Six…

  8. Principles for Instructional Stack Development in HyperCard.

    ERIC Educational Resources Information Center

    McEneaney, John E.

    The purpose of this paper is to provide information about obtaining and using HyperCard stacks that introduce users to principles of stack development. The HyperCard stacks described are available for downloading free of charge from a server at Indiana University South Bend. Specific directions are given for stack use, with advice for beginners. A…

  9. 78 FR 39020 - Market Test on Gift Cards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-28

    ... POSTAL REGULATORY COMMISSION [Docket No. MT2011-2; Order No. 1755] Market Test on Gift Cards... Service filing requesting a temporary extension of a market test on gift cards. This notice informs the... market test under 39 U.S.C. 3641(d).\\1\\ The market test is set to expire June 27, 2013. Motion at 1. The...

  10. Using Playing Cards to Simulate a Molecular Clock

    ERIC Educational Resources Information Center

    Westerling, Karin E.

    2008-01-01

    Changes in DNA base-repair may serve as an indicator of the time elapsed since divergence from a common ancestor. DNA sequences can now be analyzed. The simulation presented in this article allows students to observe the accumulation of changes in a randomly mutating sequence of playing cards. The cards are analogous to DNA nucleotide or protein…

  11. California: The State of Our Children. Report Card '95 [and] Supplement.

    ERIC Educational Resources Information Center

    Children Now, Oakland, CA.

    This report card and its supplement summarize the Kids Count data book for 1995, which profiled statewide trends in the well-being of California's children. The report card findings indicate that California ranks at the bottom among the 50 states in fostering the healthy development of children. The report card proposes the passage of the…

  12. Measuring Up 2006: The State Report Card on Higher Education. Georgia

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2006

    2006-01-01

    The purpose of this state report card is to provide the general public and policymakers with information they can use to assess and improve postsecondary education in each state. "Measuring Up 2006" is the fourth in a series of biennial report cards. The report card grades states in six overall performance categories: (1) Preparation:…

  13. Measuring Up 2006: The State Report Card on Higher Education. Nevada

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2006

    2006-01-01

    The purpose of this state report card is to provide the general public and policymakers with information they can use to assess and improve postsecondary education in each state. "Measuring Up 2006" is the fourth in a series of biennial report cards. The report card grades states in six overall performance categories: (1) Preparation:…

  14. Measuring Up 2006: The State Report Card on Higher Education. Idaho

    ERIC Educational Resources Information Center

    National Center for Public Policy and Higher Education, 2006

    2006-01-01

    The purpose of this state report card is to provide the general public and policymakers with information they can use to assess and improve postsecondary education in each state. "Measuring Up 2006" is the fourth in a series of biennial report cards. The report card grades states in six overall performance categories: (1) Preparation:…

  15. Yellow fever cases in Asia: primed for an epidemic.

    PubMed

    Wasserman, Sean; Tambyah, Paul Anantharajah; Lim, Poh Lian

    2016-07-01

    There is currently an emerging outbreak of yellow fever in Angola. Cases in infected travellers have been reported in a number of other African countries, as well as in China, representing the first ever documented cases of yellow fever in Asia. There is a large Chinese workforce in Angola, many of whom may be unvaccinated, increasing the risk of ongoing importation of yellow fever into Asia via busy commercial airline routes. Large parts of the region are hyperendemic for the related Flavivirus dengue and are widely infested by Aedes aegypti, the primary mosquito vector of urban yellow fever transmission. The combination of sustained introduction of viraemic travellers, an ecology conducive to local transmission, and an unimmunized population raises the possibility of a yellow fever epidemic in Asia. This represents a major global health threat, particularly in the context of a depleted emergency vaccine stockpile and untested surveillance systems in the region. In this review, the potential for a yellow fever outbreak in Asia is discussed with reference to the ecological and historical forces that have shaped global yellow fever epidemiology. The limitations of surveillance and vector control in the region are highlighted, and priorities for outbreak preparedness and response are suggested. Copyright © 2016 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  16. Biology and biological control of Dalmatian and yellow toadflax

    Treesearch

    Sharlene E. Sing; Rosemarie De Clerck-Floate; Richard W. Hansen; Hal Pearce; Carol Bell Randall; Ivo Tosevski; Sarah M. Ward

    2016-01-01

    Dalmatian toadflax, Linaria dalmatica (L.) Mill., and yellow toadflax, Linaria vulgaris Mill., are exotic weeds of rangeland, grassland, forests, and cropland. Both Dalmatian and yellow toadflax are short-lived perennial forbs that are easily recognized by their yellow snapdragon- like flowers (Figure 1a, 1b). Both species propagate by seed and vegetatively...

  17. Health smart cards: differing perceptions of emergency department patients and staff.

    PubMed

    Mohd Rosli, Reizal; Taylor, David McD; Knott, Jonathan C; Das, Atandrila; Dent, Andrew W

    2009-02-01

    An analytical, cross-sectional survey of 270 emergency department patients and 92 staff undertaken in three tertiary referral hospital emergency departments was completed to compare the perceptions of patients and staff regarding the use of health smart cards containing patient medical records. The study recorded data on a range of health smart card issues including awareness, privacy, confidentiality, security, advantages and disadvantages, and willingness to use. A significantly higher proportion of staff had heard of the card. The perceived disadvantages reported by patients and staff were, overall, significantly different, with the staff reporting more disadvantages. A significantly higher proportion of patients believed that they should choose what information is on the card and who should have access to the information. Patients were more conservative regarding what information should be included, but staff were more conservative regarding who should have access to the information. Significantly fewer staff believed that patients could reliably handle the cards. Overall, however, the cards were considered acceptable and useful, and their introduction would be supported.

  18. The implementation of psychiatric advance directives: experiences from a Dutch crisis card initiative.

    PubMed

    van der Ham, Alida J; Voskes, Yolande; van Kempen, Nel; Broerse, Jacqueline E W; Widdershoven, Guy A M

    2013-06-01

    The crisis card is a specific form of psychiatric advance directive, documenting mental clients' treatment preferences in advance of a potential psychiatric crisis. In this paper, we aim to provide insight into implementation issues surrounding the crisis card. A Dutch crisis-card project formed the scope of this study. Data were collected through interviews with 15 participants from six stakeholder groups. Identified implementation issues are: (a) The role of the crisis-card counselor, (b) lack of distribution and familiarity, (c) care professionals' routines, and (d) client readiness. The crisis-card counselor appears to play a key role in fostering benefits of the crisis card by supporting clients' perspectives. More structural integration of the crisis card in care processes may enhance its impact, but should be carefully explored. (PsycINFO Database Record (c) 2013 APA, all rights reserved).

  19. Telematics and smart cards in integrated health information system.

    PubMed

    Sicurello, F; Nicolosi, A

    1997-01-01

    Telematics and information technology are the base on which it will be possible to build an integrated health information system to support population and improve their quality of life. This system should be based on record linkage of all data based on the interactions of the patients with the health structures, such as general practitioners, specialists, health institutes and hospitals, pharmacies, etc. The record linkage can provide the connection and integration of various records, thanks to the use of telematic technology (either urban or geographical local networks, such as the Internet) and electronic data cards. Particular emphasis should be placed on the introduction of smart cards, such as portable health cards, which will contain a standardized data set and will be sufficient to access different databases found in various health services. The inter-operability of the social-health records (including multimedia types) and the smart cards (which are one of the most important prerequisites for the homogenization and wide diffusion of these cards at an European level) should be strongly taken into consideration. In this framework a project is going to be developed aiming towards the integration of various data bases distributed territorially, from the reading of the software and the updating of the smart cards to the complete management of the patients' evaluation records, to the quality of the services offered and to the health planning. The applications developed will support epidemiological investigation software and data analysis. The inter-connection of all the databases of the various structures involved will take place through a coordination center, the most important system of which we will call "record linkage" or "integrated database". Smart cards will be distributed to a sample group of possible users and the necessary smart card management tools will be installed in all the structures involved. All the final users (the patients) in the whole

  20. 33 CFR 117.225 - Yellow Mill Channel.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Yellow Mill Channel. 117.225 Section 117.225 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Connecticut § 117.225 Yellow Mill Channel. The...

  1. Using Credit Cards To Pay Bus Fares in Phoenix

    DOT National Transportation Integrated Search

    1996-01-01

    In 1991 the City of Phoenix Public Transit System, first in the nation to install magnetic card readers on the electronic fareboxes in its buses, implemented a program known as Bus Card Plus, which billed employers for trips made by employees using e...

  2. Factors Determining Availability, Utilization and Retention of Child Health Card in Western Nepal.

    PubMed

    Paudel, K P; Bajracharya, D C; Karki, K; K C, A

    2016-05-01

    The immunization card is revised with addition of general information about child health and is later called as child health card. This card is a tool used by Health Management Information System in Nepal. It is important for tracking the records of immunization. Aim is to identify the factors determining the availability, utilization and retention of the child health card in Western Nepal. A cross sectional study was conducted among mothers having children < 24 months old from Gorkha (Western Hill) and Nawalparasi (Western Terai) districts. The sample size for the study was 600 and systematic random sampling was used to select the mothers having less than 24 months old children. Data entry and analysis was done by using SPSS. Qualitative data was analyzed by making matrix. The average age of respondents was 24 years. The majority of respondents have gained higher level education. Retention of the card was found to be 82.2%. 90.3% retention was seen among 0-12 months children age group whereas it was 74 % among12 to 24 months age group. The reasons for less retention were torn by the child/played by child (54.6%) followed by lack of proper place,unaware about importance and poor quality of card.The new child health cards were insufficient, compelling use of both new and old cards which created problem in consistency. Regarding utilization of child health card, it was found to be used for birth registration and for further studies in abroad. The areas of utilization of child health card should be broadened so that the retention of card can be increased. The main reasons for less retention of the card are torn by children and lack of the proper place.

  3. Color Coded Cards for Student Behavior Management in Higher Education Environments

    ERIC Educational Resources Information Center

    Alhalabi, Wadee; Alhalabi, Mobeen

    2017-01-01

    The Color Coded Cards system as a possibly effective class management tool is the focus of this research. The Color Coded Cards system involves each student being given a card with a specific color based on his or her behavior. The main objective of the research is to find out whether this system effectively improves students' behavior, thus…

  4. Picture This: How to Establish an Effective School ID Card Program

    ERIC Educational Resources Information Center

    Finkelstein, David

    2013-01-01

    Most school districts do not have an ID card policy that everyone knows and follows, yet. many school districts are implementing ID card programs to address concerns about safety, efficiency, and convenience. A well-thought-out ID card program leads to greater security and smoother operations throughout the school and should thus be a priority.…

  5. Two Types of Perseveration in the Dimension Change Card Sort Task

    ERIC Educational Resources Information Center

    Hanania, Rima

    2010-01-01

    In the Dimension Change Card Sort (DCCS) task, 3-year-olds can sort cards well by one dimension but have difficulty in switching to sort the same cards by another dimension when asked; that is, they perseverate on the first relevant information. What is the information that children perseverate on? Using a new version of the DCCS, the experiments…

  6. International travel between global urban centres vulnerable to yellow fever transmission.

    PubMed

    Brent, Shannon E; Watts, Alexander; Cetron, Martin; German, Matthew; Kraemer, Moritz Ug; Bogoch, Isaac I; Brady, Oliver J; Hay, Simon I; Creatore, Maria I; Khan, Kamran

    2018-05-01

    To examine the potential for international travel to spread yellow fever virus to cities around the world. We obtained data on the international flight itineraries of travellers who departed yellow fever-endemic areas of the world in 2016 for cities either where yellow fever was endemic or which were suitable for viral transmission. Using a global ecological model of dengue virus transmission, we predicted the suitability of cities in non-endemic areas for yellow fever transmission. We obtained information on national entry requirements for yellow fever vaccination at travellers' destination cities. In 2016, 45.2 million international air travellers departed from yellow fever-endemic areas of the world. Of 11.7 million travellers with destinations in 472 cities where yellow fever was not endemic but which were suitable for virus transmission, 7.7 million (65.7%) were not required to provide proof of vaccination upon arrival. Brazil, China, India, Mexico, Peru and the United States of America had the highest volumes of travellers arriving from yellow fever-endemic areas and the largest populations living in cities suitable for yellow fever transmission. Each year millions of travellers depart from yellow fever-endemic areas of the world for cities in non-endemic areas that appear suitable for viral transmission without having to provide proof of vaccination. Rapid global changes in human mobility and urbanization make it vital for countries to re-examine their vaccination policies and practices to prevent urban yellow fever epidemics.

  7. The prognostic value of kidney transplant center report cards.

    PubMed

    Schold, J D; Buccini, L D; Heaphy, E L G; Goldfarb, D A; Sehgal, A R; Fung, J; Poggio, E D; Kattan, M W

    2013-07-01

    SRTR report cards provide the basis for quality measurement of US transplant centers. There is limited data evaluating the prognostic value of report cards, informing whether they are predictive of prospective patient outcomes. Using national SRTR data, we simulated report cards and calculated standardized mortality ratios (SMR) for kidney transplant centers over five distinct eras. We ranked centers based on SMR and evaluated outcomes for patients transplanted the year following reports. Recipients transplanted at the 50th, 100th and 200th ranked centers had 18% (AHR = 1.18, 1.13-1.22), 38% (AHR = 1.38, 1.28-1.49) and 91% (AHR = 1.91, 1.64-2.21) increased hazard for 1-year mortality relative to recipients at the top-ranked center. Risks were attenuated but remained significant for long-term outcomes. Patients transplanted at centers meeting low-performance criteria in the prior period had 40% (AHR = 1.40, 1.22-1.68) elevated hazard for 1-year mortality in the prospective period. Centers' SMR from the report card was highly predictive (c-statistics > 0.77) for prospective center SMRs and there was significant correlation between centers' SMR from the report card period and the year following (ρ = 0.57, p < 0.001). Although results do not mitigate potential biases of report cards for measuring quality, they do indicate strong prognostic value for future outcomes. Findings also highlight that outcomes are associated with center ranking across a continuum rather than solely at performance margins. © Copyright 2013 The American Society of Transplantation and the American Society of Transplant Surgeons.

  8. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  9. High density electrical card connector system

    DOEpatents

    Haggard, J. Eric; Trotter, Garrett R.

    2000-01-01

    An electrical circuit board card connection system is disclosed which comprises a wedge-operated locking mechanism disposed along an edge portion of the printed circuit board. An extrusion along the edge of the circuit board mates with an extrusion fixed to the card cage having a plurality of electrical connectors. The connection system allows the connectors to be held away from the circuit board during insertion/extraction and provides a constant mating force once the circuit board is positioned and the wedge inserted. The disclosed connection system is a simple solution to the need for a greater number of electrical signal connections.

  10. Lost trust: a yellow fever patient response.

    PubMed

    Runge, John S

    2013-12-13

    In the 19th century, yellow fever thrived in the tropical, urban trade centers along the American Gulf Coast. Industrializing and populated, New Orleans and Memphis made excellent habitats for the yellow fever-carrying Aedes aegypti mosquitoes and the virulence they imparted on their victims. Known for its jaundice and black, blood-filled vomit, the malady terrorized the region for decades, sometimes claiming tens of thousands of lives during the near annual summertime outbreaks. In response to the failing medical community, a small, pronounced population of sick and healthy laypeople openly criticized the efforts to rid the Gulf region of yellow jack. Utilizing newspapers and cartoons to vocalize their opinions, these critics doubted and mocked the medical community, contributing to the regional and seasonal dilemma yellow fever posed for the American South. These sentient expressions prove to be an early example of patient distrust toward caregivers, a current problem in clinical heath care.

  11. Lost Trust: A Yellow Fever Patient Response

    PubMed Central

    Runge, John S.

    2013-01-01

    In the 19th century, yellow fever thrived in the tropical, urban trade centers along the American Gulf Coast. Industrializing and populated, New Orleans and Memphis made excellent habitats for the yellow fever-carrying Aedes aegypti mosquitoes and the virulence they imparted on their victims. Known for its jaundice and black, blood-filled vomit, the malady terrorized the region for decades, sometimes claiming tens of thousands of lives during the near annual summertime outbreaks. In response to the failing medical community, a small, pronounced population of sick and healthy laypeople openly criticized the efforts to rid the Gulf region of yellow jack. Utilizing newspapers and cartoons to vocalize their opinions, these critics doubted and mocked the medical community, contributing to the regional and seasonal dilemma yellow fever posed for the American South. These sentient expressions prove to be an early example of patient distrust toward caregivers, a current problem in clinical heath care. PMID:24348220

  12. Determinants affecting consumer adoption of contactless credit card: an empirical study.

    PubMed

    Wang, Yu-Min

    2008-12-01

    The contactless credit card is one of the most promising technological innovations in the field of electronic payments. It provides consumers with greater control of payments, convenience, and transaction speed. However, contactless credit cards have yet to gain significant rates of adoption in the marketplace. Thus, effort must be made to identify factors affecting consumer adoption of contactless credit cards. Based on the technology acceptance model, innovation diffusion theory, and the relevant literature, seven variables (perceived usefulness, perceived ease of use, compatibility, perceived risk, trust, consumer involvement, availability of infrastructure) are proposed to help predict consumer adoption of contactless credit cards. Data collected from 312 respondents in Taiwan is tested against the proposed prediction model using the logistic regression approach. The results and implications of our study contribute to an expanded understanding of the factors that affect consumer adoption of contactless credit cards.

  13. 21 CFR 137.290 - Self-rising yellow corn meal.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 2 2011-04-01 2011-04-01 false Self-rising yellow corn meal. 137.290 Section 137... Cereal Flours and Related Products § 137.290 Self-rising yellow corn meal. Self-rising yellow corn meal conforms to the definition and standard of identity prescribed by § 137.270 for self-rising white corn meal...

  14. 21 CFR 137.290 - Self-rising yellow corn meal.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Self-rising yellow corn meal. 137.290 Section 137... Cereal Flours and Related Products § 137.290 Self-rising yellow corn meal. Self-rising yellow corn meal conforms to the definition and standard of identity prescribed by § 137.270 for self-rising white corn meal...

  15. Cooled electronic system with thermal spreaders coupling electronics cards to cold rails

    DOEpatents

    Chainer, Timothy J; Gaynes, Michael A; Graybill, David P; Iyengar, Madhusudan K; Kamath, Vinod; Kochuparambil, Bejoy J; Schmidt, Roger R; Schultz, Mark D; Simco, Daniel P; Steinke, Mark E

    2013-07-23

    Liquid-cooled electronic systems are provided which include an electronic assembly having an electronics card and a socket with a latch at one end. The latch facilitates securing of the card within the socket or removal of the card from the socket. A liquid-cooled cold rail is disposed at the one end of the socket, and a thermal spreader couples the electronics card to the cold rail. The thermal spreader includes first and second thermal transfer plates coupled to first and second surfaces on opposite sides of the card, and thermally conductive extensions extending from end edges of the plates, which couple the respective transfer plates to the liquid-cooled cold rail. The thermally conductive extensions are disposed to the sides of the latch, and the card is securable within or removable from the socket using the latch without removing the cold rail or the thermal spreader.

  16. Competition between nonindigenous ruffe and native yellow perch in laboratory studies

    USGS Publications Warehouse

    Savino, Jacqueline F.; Kolar, Cynthia S.

    1996-01-01

    The ruffe Gymnocephalus cernuus is a European percid that was accidently introduced in Duluth Harbor, Lake Superior. This nonindigenous species is closely related to yellow perch Perca flavescens, and because the two species have similar diets and habitat requirements, they are potential competitors. Laboratory studies in aquaria and pools were conducted to determine whether ruffe can compete with yellow perch for food. Ruffe had capture rates similar to those of yellow perch when food was unlimited. Ruffe spent more time than yellow perch over a feeding container before leaving it and searching again, and they also required less time to ingest (or handle) prey. However, the presence of yellow perch shortened the time ruffe spent over foraging areas when food was more limited. In addition, yellow perch were more active than ruffe, as indicated by their more frequent visits to a feeding container. Hence, the outcome of exploitative competition was not conclusive; ruffe appear to have the advantage in some behaviors, yellow perch in others. Ruffe were much more aggressive than yellow perch, and interference competition may be important in the interactions between these species. Our results indicate that ruffe might compete with native yellow perch.

  17. Design of a motion JPEG (M/JPEG) adapter card

    NASA Astrophysics Data System (ADS)

    Lee, D. H.; Sudharsanan, Subramania I.

    1994-05-01

    In this paper we describe a design of a high performance JPEG (Joint Photographic Experts Group) Micro Channel adapter card. The card, tested on a range of PS/2 platforms (models 50 to 95), can complete JPEG operations on a 640 by 240 pixel image within 1/60 of a second, thus enabling real-time capture and display of high quality digital video. The card accepts digital pixels for either a YUV 4:2:2 or an RGB 4:4:4 pixel bus and has been shown to handle up to 2.05 MBytes/second of compressed data. The compressed data is transmitted to a host memory area by Direct Memory Access operations. The card uses a single C-Cube's CL550 JPEG processor that complies with the baseline JPEG. We give broad descriptions of the hardware that controls the video interface, CL550, and the system interface. Some critical design points that enhance the overall performance of the M/JPEG systems are pointed out. The control of the adapter card is achieved by an interrupt driven software that runs under DOS. The software performs a variety of tasks that include change of color space (RGB or YUV), change of quantization and Huffman tables, odd and even field control and some diagnostic operations.

  18. Adoption of smart cards in the medical sector: the Canadian experience.

    PubMed

    Auber, B A; Hamel, G

    2001-10-01

    This research evaluates the factors influencing the adoption of smart cards in the medical sector (a smart card has a micro-processor containing information about the patient: identification, emergency data (allergies, blood type, etc.), vaccination, drugs used, and the general medical record). This research was conducted after a pilot study designed to evaluate the use of such smart cards. Two hundred and ninety-nine professionals, along with 7248 clients, used the smart card for a year. The targeted population included mostly elderly people, infants, and pregnant women (the most intensive users of health care services). Following this pilot study, two surveys were conducted, together with numerous interviews, to assess the factors influencing adoption of the technology. A general picture emerged. indicating that although the new card is well-perceived by individuals, tangible benefits must be available to motivate professionals and clients to adopt the technology. Results show that the fundamental dimension that needs to be assessed before massive diffusion is the relative advantage to the professional. The system must provide a direct benefit to its user. The relative advantage of the system for the professional is directly linked to the obligation for the client to use the card. The system is beneficial for the professional only if the information on the card is complete. Technical adequacy is a necessary but not sufficient condition for adoption.

  19. Disease duration and age influence CARD15 expression in Crohn's disease.

    PubMed

    Poniewierka, Elżbieta; Neubauer, Katarzyna; Kempiński, Radosław; Sadakierska-Chudy, Anna

    2016-01-05

    One of the susceptibility genes in Crohn's disease (CD) is CARD15. Our study examined the relationship between peripheral CARD15 expression and phenotype and duration of CD, treatment methods and inflammatory indices. Sixty patients with CD and 30 healthy volunteers as controls were enrolled in the study. Total RNA was isolated from peripheral blood mononuclear cells (PBMCs) with E.Z.N.A. Total RNA Kit (Omega Bio-tek) then quantitative real-time PCR was performed on the ABI Prism 7900 HT Real-Time PCR System. CARD15 gene expression in PBMCs in CD was significantly higher than in the control group. The highest level of gene expression was found in CD patients in the fourth decade of life. The mRNA level of the CARD15 gene was higher in patients with disease duration between 12 and 60 months. A positive correlation was found between erythrocyte sedimentation rate (ESR) and gene expression level. Gene expression increased with increasing level of C-reactive protein and ESR, but it was not statistically significant. CARD15 expression significantly decreased in CD patients treated with anti-TNFα agents compared to azathioprine or steroid treatment groups. Expression of the CARD15 gene in Crohn›s disease is higher than in healthy individuals. Disease duration and age of patients seem to be the most important factors influencing CARD15 expression.

  20. Influence of Background Genome on Enzymatic Characteristics of Yellow (Ay/-, Avy/-) Mice

    PubMed Central

    Wolff, George L.; Pitot, Henry C.

    1973-01-01

    Identification of the fundamental polypeptide difference between yellow (Ay/-, Avy/-) and non-yellow mice is important for biomedical research because of the influence of the yellow genotype on normal and neoplastic growth and obesity. The complexity of the "yellow mouse syndrome" makes attainment of this objective dependent on the separation of those pleiotropic enzyme differences which are secondary, and depend on the background genome, from those which are primary, and depend primarily on the agouti locus genotype.—Four of nine hepatic enzyme activities assayed simultaneously differed between eight-week-old yellow (Ay/-, Avy/-) and non-yellow (A/-, a/a) male inbred and F1 hybrid mice. Among these four, only cytoplasmic malic enzyme activity was elevated in all yellow mice, as compared with the non-yellow sibs, regardless of background genome. Glucokinase, serine dehydratase, and tyrosine α-ketoglutarate transaminase activities were also changed in yellow mice, but these alterations depended on the background genome.—The ratio of malic enzyme activity to citrate-cleavage enzyme activity, possibly related to the altered fat metabolism of yellow mice, was influenced by background genome as well as by the yellow genotype.——Significant deviations of enzyme activities from mid-parent values among F1 hybrids were associated with particular background genomes; the number of such deviations was larger among yellow mice than among non-yellows and this difference was greater among C3H F1 hybrids than among C57BL/6 F1 hybrids. PMID:4405752

  1. Variables Influencing Credit Card Balances of Students at a Midwestern University

    ERIC Educational Resources Information Center

    Mattson, Lucretia; Sahlhoff, Kathleen; Blackstone, Judith; Peden, Blaine; Nahm, Abraham Y.

    2004-01-01

    This research used a Web-based survey of students at a Midwest regional university to measure the extent of credit card use by first-year students and seniors. The results indicate that the variables influencing credit card use and the carrying of a balance from one month to the next include the number of cards held by the student, the student's…

  2. Age verification cards fail to fully prevent minors from accessing tobacco products.

    PubMed

    Kanda, Hideyuki; Osaki, Yoneatsu; Ohida, Takashi; Kaneita, Yoshitaka; Munezawa, Takeshi

    2011-03-01

    Proper age verification can prevent minors from accessing tobacco products. For this reason, electronic locking devices based on a proof-of age system utilising cards were installed in almost every tobacco vending machine across Japan and Germany to restrict sales to minors. We aimed to clarify the associations between amount smoked by high school students and the usage of age verification cards by conducting a nationwide cross-sectional survey of students in Japan. This survey was conducted in 2008. We asked high school students, aged 13-18 years, in Japan about their smoking behaviour, where they purchase cigarettes, if or if not they have used age verification cards, and if yes, how they obtained this card. As the amount smoked increased, the prevalence of purchasing cigarettes from vending machines also rose for both males and females. The percentage of those with experience of using an age verification card was also higher among those who smoked more. Somebody outside of family was the top source of obtaining cards. Surprisingly, around 5% of males and females belonging to the group with highest smoking levels applied for cards themselves. Age verification cards cannot fully prevent minors from accessing tobacco products. These findings suggest that a total ban of tobacco vending machines, not an age verification system, is needed to prevent sales to minors.

  3. The use of FTA cards for preserving unfixed cytological material for high-throughput molecular analysis.

    PubMed

    Saieg, Mauro Ajaj; Geddie, William R; Boerner, Scott L; Liu, Ni; Tsao, Ming; Zhang, Tong; Kamel-Reid, Suzanne; da Cunha Santos, Gilda

    2012-06-25

    Novel high-throughput molecular technologies have made the collection and storage of cells and small tissue specimens a critical issue. The FTA card provides an alternative to cryopreservation for biobanking fresh unfixed cells. The current study compared the quality and integrity of the DNA obtained from 2 types of FTA cards (Classic and Elute) using 2 different extraction protocols ("Classic" and "Elute") and assessed the feasibility of performing multiplex mutational screening using fine-needle aspiration (FNA) biopsy samples. Residual material from 42 FNA biopsies was collected in the cards (21 Classic and 21 Elute cards). DNA was extracted using the Classic protocol for Classic cards and both protocols for Elute cards. Polymerase chain reaction for p53 (1.5 kilobase) and CARD11 (500 base pair) was performed to assess DNA integrity. Successful p53 amplification was achieved in 95.2% of the samples from the Classic cards and in 80.9% of the samples from the Elute cards using the Classic protocol and 28.5% using the Elute protocol (P = .001). All samples (both cards) could be amplified for CARD11. There was no significant difference in the DNA concentration or 260/280 purity ratio when the 2 types of cards were compared. Five samples were also successfully analyzed by multiplex MassARRAY spectrometry, with a mutation in KRAS found in 1 case. High molecular weight DNA was extracted from the cards in sufficient amounts and quality to perform high-throughput multiplex mutation assays. The results of the current study also suggest that FTA Classic cards preserve better DNA integrity for molecular applications compared with the FTA Elute cards. Copyright © 2012 American Cancer Society.

  4. Ethics pocket cards: an educational tool for busy clinicians.

    PubMed

    Volpe, Rebecca L; Levi, Benjamin H; Blackhall, George F; Green, Michael J

    2014-01-01

    The adage "an ounce of prevention is worth a pound of cure" is widely used in healthcare settings and can be applied to the work of institutional clinical ethics committees. The model of clinical ethics consultation, however, is inherently reactive: a crisis or question emerges, and ethics experts are called to help. In an effort to employ a proactive component to the model of clinical ethics consultation (as well as to standardize our educational interventions), we developed ethics pocket cards. The purpose of this article is to: (1) describe the rationale for using ethics pocket cards, (2) provide examples of our cards, and (3) begin a dialogue about the potential uses of ethics pocket cards. In doing so, we hope to explore how such portable, economical devices can advance the goals of ethics consultation as well as the educational aims of ethics committees. Copyright 2014 The Journal of Clinical Ethics. All rights reserved.

  5. Buccal DNA collection: comparison of buccal swabs with FTA cards.

    PubMed

    Milne, Elizabeth; van Bockxmeer, Frank M; Robertson, Laila; Brisbane, Joanna M; Ashton, Lesley J; Scott, Rodney J; Armstrong, Bruce K

    2006-04-01

    Collection and analysis of DNA, most commonly from blood or buccal cells, is becoming more common in epidemiologic studies. Buccal samples, which are painless to take and relatively easily collected, are often the preferred source. There are several buccal cell collection methods: swabs, brushes, mouthwash, and treated cards, such as FTA or IsoCode cards. Few studies have systematically compared methods of buccal cell collection with respect to DNA yield and amplification success under similar conditions. We compared buccal DNA collection and amplification using buccal swabs and FTA cards in 122 control subjects from our Australian case-control study of childhood acute lymphoblastic leukaemia. Buccal DNA was quantified using a real-time PCR for beta-actin and genotyped at the loci of three polymorphisms (MTHFR 677C>T, ACE I/D, and XPD 1012G>A). PCR was successful with DNA from buccal swabs for 62% to 89% of subjects and from FTA cards for 83% to 100% of subjects, depending on the locus. The matched pair odds ratios (95% confidence interval) comparing success of FTA cards with buccal swabs are as follows: MTHFR 677C>T using PCR-RFLP, 12.5 (11.6-13.5) and using real-time PCR, 130.0 (113.1-152.8); ACE I/D using PCR-amplified fragment length polymorphism, 3.36 (3.2-3.5); XPD 1012G>A using real-time PCR, 150.0 (132.7-172.3). FTA cards are a robust DNA collection method and generally produce DNA suitable for PCR more reliably than buccal swabs. There are, however, technical challenges in handling discs punched from FTA cards that intending users should be aware of.

  6. International travel between global urban centres vulnerable to yellow fever transmission

    PubMed Central

    Brent, Shannon E; Watts, Alexander; Cetron, Martin; German, Matthew; Kraemer, Moritz UG; Bogoch, Isaac I; Brady, Oliver J; Hay, Simon I; Creatore, Maria I

    2018-01-01

    Abstract Objective To examine the potential for international travel to spread yellow fever virus to cities around the world. Methods We obtained data on the international flight itineraries of travellers who departed yellow fever-endemic areas of the world in 2016 for cities either where yellow fever was endemic or which were suitable for viral transmission. Using a global ecological model of dengue virus transmission, we predicted the suitability of cities in non-endemic areas for yellow fever transmission. We obtained information on national entry requirements for yellow fever vaccination at travellers’ destination cities. Findings In 2016, 45.2 million international air travellers departed from yellow fever-endemic areas of the world. Of 11.7 million travellers with destinations in 472 cities where yellow fever was not endemic but which were suitable for virus transmission, 7.7 million (65.7%) were not required to provide proof of vaccination upon arrival. Brazil, China, India, Mexico, Peru and the United States of America had the highest volumes of travellers arriving from yellow fever-endemic areas and the largest populations living in cities suitable for yellow fever transmission. Conclusion Each year millions of travellers depart from yellow fever-endemic areas of the world for cities in non-endemic areas that appear suitable for viral transmission without having to provide proof of vaccination. Rapid global changes in human mobility and urbanization make it vital for countries to re-examine their vaccination policies and practices to prevent urban yellow fever epidemics. PMID:29875519

  7. YELLOW SUPERGIANTS IN THE ANDROMEDA GALAXY (M31)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Drout, Maria R.; Massey, Philip; Meynet, Georges

    2009-09-20

    The yellow supergiant content of nearby galaxies can provide a critical test of stellar evolution theory, bridging the gap between the hot, massive stars and the cool red supergiants. But, this region of the color-magnitude diagram is dominated by foreground contamination, requiring membership to somehow be determined. Fortunately, the large negative systemic velocity of M31, coupled to its high rotation rate, provides the means for separating the contaminating foreground dwarfs from the bona fide yellow supergiants within M31. We obtained radial velocities of {approx}2900 individual targets within the correct color-magnitude range corresponding to masses of 12 M{sub sun} and higher.more » A comparison of these velocities to those expected from M31's rotation curve reveals 54 rank-1 (near certain) and 66 rank-2 (probable) yellow supergiant members, indicating a foreground contamination >= 96%. We expect some modest contamination from Milky Way halo giants among the remainder, particularly for the rank-2 candidates, and indeed follow-up spectroscopy of a small sample eliminates four rank 2's while confirming five others. We find excellent agreement between the location of yellow supergiants in the H-R diagram and that predicted by the latest Geneva evolutionary tracks that include rotation. However, the relative number of yellow supergiants seen as a function of mass varies from that predicted by the models by a factor of >10, in the sense that more high-mass yellow supergiants are predicted than those are actually observed. Comparing the total number (16) of >20 M{sub sun} yellow supergiants with the estimated number (24,800) of unevolved O stars indicates that the duration of the yellow supergiant phase is {approx}3000 years. This is consistent with what the 12 M{sub sun} and 15 M{sub sun} evolutionary tracks predict, but disagrees with the 20,000-80,000 year timescales predicted by the models for higher masses.« less

  8. Genic insights from integrated human proteomics in GeneCards.

    PubMed

    Fishilevich, Simon; Zimmerman, Shahar; Kohn, Asher; Iny Stein, Tsippi; Olender, Tsviya; Kolker, Eugene; Safran, Marilyn; Lancet, Doron

    2016-01-01

    GeneCards is a one-stop shop for searchable human gene annotations (http://www.genecards.org/). Data are automatically mined from ∼120 sources and presented in an integrated web card for every human gene. We report the application of recent advances in proteomics to enhance gene annotation and classification in GeneCards. First, we constructed the Human Integrated Protein Expression Database (HIPED), a unified database of protein abundance in human tissues, based on the publically available mass spectrometry (MS)-based proteomics sources ProteomicsDB, Multi-Omics Profiling Expression Database, Protein Abundance Across Organisms and The MaxQuant DataBase. The integrated database, residing within GeneCards, compares favourably with its individual sources, covering nearly 90% of human protein-coding genes. For gene annotation and comparisons, we first defined a protein expression vector for each gene, based on normalized abundances in 69 normal human tissues. This vector is portrayed in the GeneCards expression section as a bar graph, allowing visual inspection and comparison. These data are juxtaposed with transcriptome bar graphs. Using the protein expression vectors, we further defined a pairwise metric that helps assess expression-based pairwise proximity. This new metric for finding functional partners complements eight others, including sharing of pathways, gene ontology (GO) terms and domains, implemented in the GeneCards Suite. In parallel, we calculated proteome-based differential expression, highlighting a subset of tissues that overexpress a gene and subserving gene classification. This textual annotation allows users of VarElect, the suite's next-generation phenotyper, to more effectively discover causative disease variants. Finally, we define the protein-RNA expression ratio and correlation as yet another attribute of every gene in each tissue, adding further annotative information. The results constitute a significant enhancement of several GeneCards

  9. Laser Card For Compact Optical Data Storage Systems

    NASA Astrophysics Data System (ADS)

    Drexler, Jerome

    1982-05-01

    The principal thrust of the optical data storage industry to date has been the 10 billion bit optical disc system. Mass memory has been the primary objective. Another objective that is beginning to demand recognition is compact memory of 1 million to 40 million bits--on a wallet-size, laser recordable card. Drexler Technology has addressed this opportunity and has succeeded in demonstrating laser writing and readback using a 16 mm by 85 mm recording stripe mounted on a card. The write/read apparatus was developed by SRI International. With this unit, 5 micron holes have been recorded using a 10 milliwatt, 830 nanometer semiconductor-diode laser. Data is entered on an Apple II keyboard using the ASCII code. The recorded reflective surface is scanned with the same laser at lower power to generate a reflected bit stream which is converted into alphanumerics and which appear on the monitor. We are pleased to report that the combination of the DREXONTM laser recordable card ("Laser Card"), the semiconductor-diode laser, arrays of large recorded holes, and human interactive data rates are all mutually compatible and point the way forward to economically feasible, compact, data-storage systems.

  10. Inexpensive Data Acquisition with a Sound Card

    NASA Astrophysics Data System (ADS)

    Hassan, Umer; Pervaiz, Saad; Anwar, Muhammad Sabieh

    2011-12-01

    Signal generators, oscilloscopes, and data acquisition (DAQ) systems are standard components of the modern experimental physics laboratory. The sound card, a built-in component in the ubiquitous personal computer, can be utilized for all three of these tasks1,2 and offers an attractive option for labs in developing countries such as ours—Pakistan—where affordability is always of prime concern. In this paper, we describe in a recipe fashion how the sound card is used for DAQ and signal generation.

  11. Design of transnational mobile e-payment application based on SIM card

    NASA Astrophysics Data System (ADS)

    Qian, Tang; Zhen, Li

    2018-05-01

    Facing the stronger demands of transnational mobile communications and internet-based mobile wireless value-added services, the interconnection and interworking of multiple communication operators and their win-win cooperations become a crucial target in the new round of mobile economic development. Previous researches showed that mobile communications and value-add services are not only technical problems, but also more economic problems.we design a general oncard operating system based on SIM card that could be responsible for coordinating and distributing card hardware and software resources. These applications such as transnational mobile payment, consumption management and many other supplemented functions share the API interfaces, hardware and software resources provided by the operation system, although they are independent of each other. The layer structure of SIM card design not only greatly reduces the complexity of COS development, but also saves the most tense card resources and extends SIM cards applications.

  12. 12 CFR 235.7 - Limitations on payment card restrictions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Section 235.7 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL... restrictions. (a) Prohibition on network exclusivity—(1) In general. An issuer or payment card network shall not directly or through any agent, processor, or licensed member of a payment card network, by...

  13. 12 CFR 235.7 - Limitations on payment card restrictions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Section 235.7 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL... restrictions. (a) Prohibition on network exclusivity—(1) In general. An issuer or payment card network shall not directly or through any agent, processor, or licensed member of a payment card network, by...

  14. 12 CFR 235.7 - Limitations on payment card restrictions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Section 235.7 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL... restrictions. (a) Prohibition on network exclusivity—(1) In general. An issuer or payment card network shall not directly or through any agent, processor, or licensed member of a payment card network, by...

  15. 22 CFR 41.32 - Nonresident alien Mexican border crossing identification cards; combined border crossing...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. 41.32 Section 41.32 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF NONIMMIGRANTS UNDER THE... crossing identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. (a...

  16. 22 CFR 41.32 - Nonresident alien Mexican border crossing identification cards; combined border crossing...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. 41.32 Section 41.32 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF NONIMMIGRANTS UNDER THE... crossing identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. (a...

  17. 22 CFR 41.32 - Nonresident alien Mexican border crossing identification cards; combined border crossing...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. 41.32 Section 41.32 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF NONIMMIGRANTS UNDER THE... crossing identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. (a...

  18. 22 CFR 41.32 - Nonresident alien Mexican border crossing identification cards; combined border crossing...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. 41.32 Section 41.32 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF NONIMMIGRANTS UNDER THE... crossing identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. (a...

  19. 22 CFR 41.32 - Nonresident alien Mexican border crossing identification cards; combined border crossing...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. 41.32 Section 41.32 Foreign Relations DEPARTMENT OF STATE VISAS VISAS: DOCUMENTATION OF NONIMMIGRANTS UNDER THE... crossing identification cards; combined border crossing identification cards and B-1/B-2 visitor visas. (a...

  20. Factors associated to adherence to different treatment schemes with meglumine antimoniate in a clinical trial for cutaneous leishmaniasis.

    PubMed

    Ribeiro, Madelon Novato; Pimentel, Maria Inês Fernandes; Schubach, Armando de Oliveira; Oliveira, Raquel de Vasconcellos Carvalhães de; Teixeira, José Liporage; Leite, Madson Pedro da Silva; Fonseca, Monique; Santos, Ginelza Peres Lima dos; Salgueiro, Mariza Matos; Ferreira e Vasconcellos, Erica de Camargo; Lyra, Marcelo Rosandiski; Saheki, Mauricio Naoto; Valete-Rosalino, Claudia Maria

    2014-01-01

    The favorable outcome of the treatment of a disease is influenced by the adherence to therapy. Our objective was to assess factors associated with adherence to treatment of patients included in a clinical trial of equivalence between the standard and alternative treatment schemes with meglumine antimoniate (MA) in the treatment of cutaneous leishmaniasis (CL), in the state of Rio de Janeiro. Between 2008 and 2011, 57 patients with CL were interviewed using a questionnaire to collect socioeconomic data. The following methods were used for adherence monitoring: counting of vial surplus, monitoring card, Morisky test and modified Morisky test (without the question regarding the schedule); we observed 82.1% (vial return), 86.0% (monitoring card), 66.7% (Morisky test) and 86.0% (modified Morisky test) adherence. There was a strong correlation between the method of vial counting and the monitoring card and modified Morisky test. A significant association was observed between greater adherence to treatment and low dose of MA, as well as with a lower number of people sleeping in the same room. We recommend the use of the modified Morisky test to assess adherence to treatment of CL with MA, because it is a simple method and with a good performance, when compared to other methods.

  1. A Cognitive Analysis of Credit Card Acquisition and College Student Financial Development.

    ERIC Educational Resources Information Center

    Kidwell, Blair; Turrisi, Robert

    2000-01-01

    Examines cognitions relevant to credit card decision making in college-aged participants (N=304). Assesses measures of beliefs, attitudes, and behavioral alternatives toward acquiring a credit card. Identifies a multivariate model predicting college student financial development of the attitudes and behavioral tendencies of acquiring a new card.…

  2. The developing stages of the Martian yellow storm of 1971

    NASA Technical Reports Server (NTRS)

    Capen, C. F.; Martin, L. J.

    1971-01-01

    A history of the yellow storm on Mars which occurred in 1971 is presented. It is compared to the Great 1956 Yellow Cloud, and possible yellow storms are predicted for 1973. Photographs of the stages of evolution and the path of the storm are included.

  3. The Watershed Report Card.

    ERIC Educational Resources Information Center

    Kelly, Allyson

    1996-01-01

    Outlines the history and development of the Watershed Report Card, an integrated program that educates Ontario participants about the holistic nature of a watershed and fosters community stewardship of the local ecosystem. The program consists of the inventory level, assessment and monitoring level, and remediation level. Emphasizes partnerships…

  4. Unclaimed Prize Information Biases Perceptions of Winning in Scratch Card Gambling.

    PubMed

    Walker, Alexander C; Stange, Madison; Fugelsang, Jonathan A; Koehler, Derek J; Dixon, Mike J

    2018-03-29

    Unclaimed prize information (i.e., the number of prizes still available to be won) is information commonly provided to scratch card gamblers. However, unless the number of tickets remaining to be purchased is also provided, this information is uninformative. Despite its lack of utility in assisting gamblers in choosing the most favourable type of scratch card to play, we hypothesized that unclaimed prize information would bias participants' judgments within a scratch card gambling context. In Experiment 1 (N = 201), we showed that participants are influenced by this information such that they felt more likely to win, were more excited to play, and preferred to hypothetically purchase more of the scratch card with the greatest number of unclaimed prizes. In Experiment 2 (N = 201), we attempted to ameliorate this bias by providing participants with the number of tickets remaining to be purchased and equating the payback percentages of all three games. The bias, although attenuated, still persisted in these conditions. Finally, in Experiment 3 (N = 200), we manipulated the hypothetical scratch cards such that games with the highest number of unclaimed prizes were the least favourable, and vice versa. As in Experiment 2, participants still favoured cards with greater numbers of unclaimed prizes. Possible mechanisms underlying this bias are discussed. In conclusion, across three experiments, we demonstrate that salient unclaimed prize information is capable of exerting a strong effect over judgments related to scratch card games.

  5. Notification: Management of Travel Cards

    EPA Pesticide Factsheets

    Project #OA-FY15-0156, April 20, 2015. The U.S. Environmental Protection Agency (EPA), Office of Inspector General (OIG), plans to begin preliminary research for an audit of the management of travel cards.

  6. Accelerators for society: succession of European infrastructural projects: CARE, EuCARD, TIARA, EuCARD2

    NASA Astrophysics Data System (ADS)

    Romaniuk, Ryszard S.

    2013-10-01

    Accelerator science and technology is one of a key enablers of the developments in the particle physic, photon physics and also applications in medicine and industry. The paper presents a digest of the research results in the domain of accelerator science and technology in Europe, shown during the realization of CARE (Coordinated Accelerator R&D), EuCARD (European Coordination of Accelerator R&D) and during the national annual review meeting of the TIARA - Test Infrastructure of European Research Area in Accelerator R&D. The European projects on accelerator technology started in 2003 with CARE. TIARA is an European Collaboration of Accelerator Technology, which by running research projects, technical, networks and infrastructural has a duty to integrate the research and technical communities and infrastructures in the global scale of Europe. The Collaboration gathers all research centers with large accelerator infrastructures. Other ones, like universities, are affiliated as associate members. TIARA-PP (preparatory phase) is an European infrastructural project run by this Consortium and realized inside EU-FP7. The paper presents a general overview of CARE, EuCARD and especially TIARA activities, with an introduction containing a portrait of contemporary accelerator technology and a digest of its applications in modern society. CARE, EuCARD and TIARA activities integrated the European accelerator community in a very effective way. These projects are expected very much to be continued.

  7. An Alternative Medium of Social Education--The "Horrors of War" Picture Cards.

    ERIC Educational Resources Information Center

    Nelson, Murry R.

    1997-01-01

    Explores the production, distribution, and content of the, "Horrors of War," a series of trading cards produced between 1938 and 1942. Created by a Baptist advertising executive the cards used graphic images to communicate an antiwar message to young adolescents. Discusses possible learning activities used in conjunction with the cards.…

  8. Ceres' Yellow Spots - Observations with Dawn Framing Camera

    NASA Astrophysics Data System (ADS)

    Schäfer, Michael; Schäfer, Tanja; Cloutis, Edward A.; Izawa, Matthew R. M.; Platz, Thomas; Castillo-Rogez, Julie C.; Hoffmann, Martin; Thangjam, Guneshwar S.; Kneissl, Thomas; Nathues, Andreas; Mengel, Kurt; Williams, David A.; Kallisch, Jan; Ripken, Joachim; Russell, Christopher T.

    2016-04-01

    The Framing Camera (FC) onboard the Dawn spacecraft acquired several spectral data sets of (1) Ceres with increasing spatial resolution (up to 135 m/pixel with nearly global coverage). The FC is equipped with seven color filters (0.4-1.0 μm) plus one panchromatic ('clear') filter [1]. We produced spectral mosaics using photometrically corrected FC color filter images as described in [2]. Even early FC color mosaics obtained during Dawn's approach unexpectedly exhibited quite a diversity of surface materials on Ceres. Besides the ordinary cerean surface material, potentially composed of ammoniated phyllosilicates [3] or some other alteration product of carbonaceous chondrites [4], a large number of bright spots were found on Ceres [5]. These spots are substantially brighter than the average surface (exceeding its triple standard deviation), with the spots within Occator crater being the brightest and most prominent examples (reflectance more than 10 times the average of Ceres). We observed bright spots which are different by their obvious yellow color. This yellow color appears both in a 'true color' RGB display (R=0.65, G=0.55, B=0.44 μm) as well as in a false color display (R=0.97, G=0.75, B=0.44 μm) using a linear 2% stretch. Their spectra show a steep red slope between 0.44 and 0.55 μm (UV drop-off). On the contrary to these yellow spots, the vast majority of bright spots appears white in the aforementioned color displays and exhibit blue sloped spectra, except for a shallow UV drop-off. Thus, yellow spots are easily distinguishable from white spots and the remaining cerean surface by their high values in the ratio 0.55/0.44 μm. We found 8 occurrences of yellow spots on Ceres. Most of them (>70 individual spots) occur both inside and outside crater Dantu, where white spots are also found in the immediate vicinity. Besides Dantu, further occurrences with only a few yellow spots were found at craters Ikapati and Gaue. Less definite occurrences are found at 97

  9. Increasing Opportunities for Student Responding: Response Cards in the Classroom

    ERIC Educational Resources Information Center

    Helf, Shawnna

    2015-01-01

    Response cards are designed to encourage active student engagement during instruction. In this article, the use of response cards is described, along with ways teachers can use the information to inform their work and considerations for implementation.

  10. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  11. Cascade reservoir flood control operation based on risk grading and warning in the Upper Yellow River

    NASA Astrophysics Data System (ADS)

    Xuejiao, M.; Chang, J.; Wang, Y.

    2017-12-01

    Flood risk reduction with non-engineering measures has become the main idea for flood management. It is more effective for flood risk management to take various non-engineering measures. In this paper, a flood control operation model for cascade reservoirs in the Upper Yellow River was proposed to lower the flood risk of the water system with multi-reservoir by combining the reservoir flood control operation (RFCO) and flood early warning together. Specifically, a discharge control chart was employed to build the joint RFCO simulation model for cascade reservoirs in the Upper Yellow River. And entropy-weighted fuzzy comprehensive evaluation method was adopted to establish a multi-factorial risk assessment model for flood warning grade. Furthermore, after determining the implementing mode of countermeasures with future inflow, an intelligent optimization algorithm was used to solve the optimization model for applicable water release scheme. In addition, another model without any countermeasure was set to be a comparative experiment. The results show that the model developed in this paper can further decrease the flood risk of water system with cascade reservoirs. It provides a new approach to flood risk management by coupling flood control operation and flood early warning of cascade reservoirs.

  12. 41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    .... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...

  13. 31 CFR 598.409 - Credit extended and cards issued by U.S. financial institutions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... NARCOTICS KINGPIN SANCTIONS REGULATIONS Interpretations § 598.409 Credit extended and cards issued by U.S... existing credit agreements, including, but not limited to, charge cards, debit cards, or other credit...

  14. 31 CFR 536.409 - Credit extended and cards issued by U.S. financial institutions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Credit extended and cards issued by U... NARCOTICS TRAFFICKING SANCTIONS REGULATIONS Interpretations § 536.409 Credit extended and cards issued by U... any existing credit agreements, including, but not limited to, charge cards, debit cards, or other...

  15. 41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...

  16. 41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...

  17. 41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    .... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...

  18. 41 CFR 109-38.801 - Obtaining SF 149, U.S. Government National Credit Card.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... Government National Credit Card. 109-38.801 Section 109-38.801 Public Contracts and Property Management..., U.S. Government National Credit Card § 109-38.801 Obtaining SF 149, U.S. Government National Credit Card. DOE offices electing to use national credit cards shall request the assignment of billing address...

  19. Improving computer security by health smart card.

    PubMed

    Nisand, Gabriel; Allaert, François-André; Brézillon, Régine; Isphording, Wilhem; Roeslin, Norbert

    2003-01-01

    The University hospitals of Strasbourg have worked for several years on the computer security of the medical data and have of this fact be the first to use the Health Care Professional Smart Card (CPS). This new tool must provide security to the information processing systems and especially to the medical data exchanges between the partners who collaborate to the care of the Beyond the purely data-processing aspects of the functions of safety offered by the CPS, safety depends above all on the practices on the users, their knowledge concerning the legislation, the risks and the stakes, of their adhesion to the procedures and protections installations. The aim of this study is to evaluate this level of knowledge, the practices and the feelings of the users concerning the computer security of the medical data, to check the relevance of the step taken, and if required, to try to improve it. The survey by questionnaires involved 648 users. The practices of users in terms of data security are clearly improved by the implementation of the security server and the use of the CPS system, but security breaches due to bad practices are not however completely eliminated. That confirms that is illusory to believe that data security is first and foremost a technical issue. Technical measures are of course indispensable, but the greatest efforts are required after their implementation and consist in making the key players [2], i.e. users, aware and responsible. However, it must be stressed that the user-friendliness of the security interface has a major effect on the results observed. For instance, it is highly probable that the bad practices continued or introduced upon the implementation of the security server and CPS scheme are due to the complicated nature or functional defects of the proposed solution, which must therefore be improved. Besides, this is only the pilot phase and card holders can be expected to become more responsible as time goes by, along with the gradual

  20. Availability of yellow pine sawtimber in Alabama

    Treesearch

    William H. McWilliams

    1991-01-01

    Alabama's timberland supports 76.2 billion board feet of sawtimber (International 1/4-inch Rule), of which 55 percent is contributed by yellow pine species. Currently, yellow pine sawtimber volume totals 41.8 billion board feet. The recent inventory conducted by the USDA-Forest Service, Southern Forest Experiment Station, Forest Inventory and Analysis Unit (SO-...