نتایج جستجو برای: ژن card

تعداد نتایج: 40692  

Journal: :Journal of clinical microbiology 1983
E A Hambie S A Larsen M W Perryman D E Pettit R L Mullally W Whittington

The rapid plasma reagin (RPR) card test manufactured by Beckman Instruments, Inc., was compared, qualitatively and quantitatively, with the Venereal Disease Research Laboratory (VDRL) slide test and the standard RPR 18-mm circle card tests for the serodiagnosis of syphilis. Sera from 638 individuals were used in this study. Two pilot lots and two production lots of antigen were submitted by Bec...

Journal: :CoRR 2012
Ikuesan R. Adeyemi Norafida Ithnin

Radio frequency identification (RFID) is a technology that employs basic identifier of an object embedded in a chip, transmitted via radio wave, for identification. An RFID Card responds to query/interrogation irrespective of ‘Who’ holds the Card; like a key to a door. Since an attacker can possess the card, access to such object can therefore be easily compromised. This security breach is clas...

Journal: :Electronic Commerce Research and Applications 2005
Yingjiu Li Xinwen Zhang

Traditional credit card payment is not secure against credit card frauds because an attacker can easily know a semisecret credit card number that is repetitively used. Recently one-time transaction number has been proposed by some researchers and credit card companies to enhance the security in credit card payment. Following this idea, we present a practical security enhancement scheme for one-...

Single unit recording has been used as a well-known technique to study the electrical behavior of neurons. In this respect, the classical methods are rather expensive. In this study a simple and inexpensive method for single unit recording studies has been introduced. Computer sound card was used for data acquisition. Neural responses were saved via simple sound applicable packages and then ana...

2011
Chia-Chi Lee Tyrone T. Lin Yi-Ting Chen

This paper constructs a multiple regression model to evaluate the overdue risk of credit card holders. The results can identify the factors influencing the credit card holders’ overdue risk behavior in order to provide card issuing banks a decision-making reference in the investigation of credit card holders’ related characteristics and the relationship quality between the credit card holders a...

2007
Ian Molloy Jiangtao Li Ninghui Li

Theft of stored credit card information is an increasing threat to e-commerce. We propose a dynamic virtual credit card number scheme that reduces the damage caused by stolen credit card numbers. A user can use an existing credit card account to generate multiple virtual credit card numbers that are either usable for a single transaction or are tied with a particular merchant. We call the schem...

2015
Santhosh Baboo

Credit card is one of the convenient way of payment in online shopping. In this on line shopping, payment is made by giving information like card no, security code , expiration date of the Credit card etc . To rectify the risk factors of using the credit card, every card holder’s spending method is modeled by using HMM. By using this authenticated security check the information of transaction i...

Journal: :مدیریت توسعه و تحول 0
فرزین رضایی استادیار دانشکده مدیریت و حسابداری، دانشگاه آزاد اسلامی، قزوین، ایران (عهده¬دار مکاتبات) زهرا احمدی دانشجوی کارشناسی ارشد دانشکده مدیریت و حسابداری، دانشگاه آزاد اسلامی، قزوین، ایران

performance evaluation of different organizations, is considered as a very important issue in the present literature. among the organizations, insurance companies, as part of protective services and with compensating roles in the economy of each country, have been studied extensively. it is maintained that successful operation of these industries will motivate other industries as well. in order...

2003
Tommaso Cucinotta Marco Di Natale David Corcoran

This paper presents an open protocol for interoperability across multi-vendor programmable smart cards. It allows exposition of on-card storage and cryptographic services to host applications in a unified, card-independent way. Its design, inspired by the standardization of on-card Java language and cryptographic API, has been kept as generic and modular as possible. The protocol security model...

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Bruno Emerson Gurgel Gomes Anamaria Martins Moreira David Déharbe

This work proposes a methodology for the rigorous development of Java Card smart card applications, using the B Method. Its main feature is to abstract the particularities of Java Card and smart card aware applications from the specifier as much as possible. In the proposed approach, the specification of the aplication logic needs not be preoccupied with the specific aspects of the Java Card pl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید