To see the other types of publications on this topic, follow the link: CARDS.

Dissertations / Theses on the topic 'CARDS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'CARDS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Au, Po-ling Lisa. "Smart card business strategy in Hong Kong /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19876178.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yildiz, Afsina. "Recherche cards : live it through the Recherche DVD cards." Virtual Press, 2007. http://liblink.bsu.edu/uhtbin/catkey/1371680.

Full text
Abstract:
The purpose of this creative thesis project is to complete video greetings for the business "Recherche Cards," expected to be launched by late August 2007. Recherche DVD cards is a relatively new concept in the greetings industry, and will offer various video and 2D/3D animated greetings. The greetings can be sent online as they are or can be personalized with the client's videos and be mailed on a DVD format. For the clients looking for something exclusive, they can order a custom made card designed just for them. The ordering will take online only at www.recherchecards.com. The following proposal will discuss how it was conceived and brought to completion.
Department of Telecommunications
APA, Harvard, Vancouver, ISO, and other styles
3

Edsbäcker, Peter. "SIM cards for cellular networks : An introduction to SIM card application development." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-13989.

Full text
Abstract:
A SIM, Subscriber Identity Module, is the removable circuit board found in a modern cellular phone. It carries the network identity information and is a type of smart card which can also be found on payment cards (EMV), ID cards and so on. A smart card is basically a small computer, providing a safe and controlled execution environment. Historically smart card software was very hardware dependent and mostly developed by the manufacturers themselves. With the introduction of the open Java Card standard created by Sun Microsystems (Oracle) this was meant to change. However, information still remains scattered and is hard to obtain. This paper is meant to serve both as an introduction to the field and also as a good foundation for future studies. It begins with a theoretical discussion about smart card hardware and software architectures, network standards in the context of SIM cards, typical applications, coming trends and technologies and ends off with an overview of the Java Card standard. The following section discusses the supplied example SIM card application coupled with an introduction how to use the Gemalto Developer Suite for application development and testing. The paper ends with an extensive appendix section going in depth about some of the more important subjects.
APA, Harvard, Vancouver, ISO, and other styles
4

Kononenko, I. "Credit cards for children." Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/25995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Islam, Md Kamrul. "Effective use of smart cards : A case study of smart cards in Sweden." Thesis, Umeå universitet, Institutionen för informatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-66300.

Full text
Abstract:
Information technology plays a vital role for the development of smart cards. Smart cardscan change the form of the delivery of services and goods, through the automatedidentification and verification of customers, resulting in significant efficiency gains andultimately lower costs for consumers. People from different jobs of life extract informationfrom these smart cards. Smart cards have the potential benefit to people with the, - right ofprivacy and give users confidence in the trustworthiness of commercial organizations andstate institutions. It can also provide different kinds of facilities to users and as well asorganizations such as access and control. In this paper I have tried to identify the wayssmart card users are facilitated in accessing the control and services of differentorganizations in a better way. I have used different methods for collecting data to identifythe problems associated with smart cards. Then I tried to find out which factors are affectingthe interaction between users and different organizations and creating main problems. In theend, I have given some suggestions for the improvement of interaction between users anddifferent organizations to facilitate them for better control and services as well as accessinginformation.
APA, Harvard, Vancouver, ISO, and other styles
6

Ho, Kam-wah Patrick. "An analysis of the Hong Kong credit card industry : the competition and future development /." Hong Kong : University of Hong Kong, 1995. http://sunzi.lib.hku.hk/hkuto/record.jsp?B14038997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Berglund, Daniel. "Gene-EnvironmentInteraction Analysis UsingGraphic Cards." Thesis, KTH, High Performance Computing and Visualization (HPCViz), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-163215.

Full text
Abstract:
Genome-wide association studies(GWAS) are used to find associations betweengenetic markers and diseases. One part of GWAS is to study interactions be-tween markers which can play an important role in the risk for the disease. Thesearch for interactions can be computationally intensive. The aim of this thesiswas to improve the performance of software used for gene-environment interac-tion by using parallel programming techniques on graphical processors. A studyof the new programs performance, speedup and efficiency was made using mul-tiple simulated datasets. The program shows significantly better performancecompared with the older program.
APA, Harvard, Vancouver, ISO, and other styles
8

Durbin, Daniel A. "IBM PC Voice Mail Cards." International Foundation for Telemetering, 1989. http://hdl.handle.net/10150/614731.

Full text
Abstract:
International Telemetering Conference Proceedings / October 30-November 02, 1989 / Town & Country Hotel & Convention Center, San Diego, California
The Voice Main Card (VMC) functions as an enhanced telephone answering machine and is designed as a plug-in card for the IBM PC and compatibles. In addition to standard answering machine functions, the VMC features programmable outgoing message selection, message routing, response to caller's touch tone signals, and remote programming ability. The VMC will answer incoming telephone calls, deliver outgoing messages which are Programmably selectable from as many as 16 digitized audio messages stored on the PC's hard disk, record incoming messages to the hard disk or optionally to an external tape recorder, route messages to a specified receiver, respond to a caller's touch tone signals, and enter a remote programming mode as a result of a special code sent by the caller. Audio messages are processed digitally via A/D and D/A converters which receive and send 8-bit data to and from the IBM PC through a selectable port address. The A/D conversion is implemented with the ADC0802 which is operated at a clock rate of 512 kHz. The D/A conversion is implemented with the DAC0830. Interface with the telephone line is accomplished with the speech circuit TP5700 coupled through opto-couplers. Messages are recorded using an external 600-ohm dynamic microphone and played back through an external 8-ohm speaker. A full-featured, pull-down menu program is provided with the VMC and implements all programmable functions. Data In/Out (I/O) with the card is interrupt-driven to allow apparent simultaneous disk I/O.
APA, Harvard, Vancouver, ISO, and other styles
9

Sokur, A. A. "Credit cards of the future." Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/25997.

Full text
Abstract:
Credit Cards are an important part of our lives - they help to transfer, carry and exchange money safely and easily. But let’s face it - most credit cards are limited in features. They are completely useless without a compatible machine such as an ATM. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/25997
APA, Harvard, Vancouver, ISO, and other styles
10

Karayew, D. "The history of credit cards." Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/25992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Sayeva, K. V. "Next generation of credit cards." Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/28791.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Gaskell, Gary Ian. "Integrating smart cards into Kerberos." Thesis, Queensland University of Technology, 1999. https://eprints.qut.edu.au/36848/1/36848_Gaskell_2000.pdf.

Full text
Abstract:
The aim of this thesis is to identify alternatives for the integration of smart cards into a classic Kerberos system. Some researchers have proposed specific solutions. Each proposal appeared to be limited and, hence, there was a need to identify what other approaches were available. It was identified that smart cards can be added to each of the interfaces of Kerberos (user to authentication server, user to ticket granting server and user to application server). It appears most appropriate to use smart cards in the user to Authentication Server interface. The user's workstation is trusted with application data and so it will be usually appropriate for the application session keys to also be trusted to the user's workstation. The smart card can be integrated into the user to Authentication Server mes­saging implementation so that the user's authentication information is never ex­posed to the workstation. Six options have been identified for the integration in this interface. Some of the concepts developed were prototyped in order to identify the prac­ticality of the suggestions. An early beta release of Kerberos from Massachusetts Institute of Technology was used as the base for prototyping. It was found that complex protocols, such as Zero Knowledge Protocols, can­not be implemented on today's smart cards without special customisations by the smart card vendors. However, protocols that only required the use of com­mon cryptographic functions such as DES (Data Encryption Standard) and RSA (Rivest, Shamir and Adleman) can be implemented.
APA, Harvard, Vancouver, ISO, and other styles
13

Jonsson, Jerry, and Lina Tonegran. "Designing Cards as a Polymorphic Resource for Online Free to Play Trading Card Games." Thesis, Högskolan på Gotland, Institutionen för speldesign, teknik och lärande, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-1914.

Full text
Abstract:
Seasoned players of free to play trading card games or players that invest large amount of money in digital or physical trading card games, end up having superfluous cards that hold no value to them. The purpose of this thesis is to create designs that would counter this problem. We analysed a selection of popular games on the market to get a better understanding about the depth of the problem and existing designs and mechanics to counter said problem. With the knowledge gained from the research, we intended design several systems that would give cards a polymorphic value. To validate those designs we decided to conduct qualitative interviews with highly experienced players of the genre. We discovered from our research and interviews that the problem with superfluous cards was larger than we had anticipated, and few games had taken steps to counter the problem. The systems we designed gave cards a polymorphic value, and the designs were proven successful through our validation. Our research and interviews suggest that by implementing polymorphic attributes to cards it could lessen or even remove the problem of superfluous cards, and at the same time increase the sales figures on booster packs.

Jerry Jonsson går speldesign och programmering och Lina Tonegran går speldesign och grafik.

APA, Harvard, Vancouver, ISO, and other styles
14

Goodrich, Gwendolyn Lea. "Identity theft awareness in north central West Virginia." Huntington, WV : [Marshall University Libraries], 2003. http://www.marshall.edu/etd/descript.asp?ref=218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Frank, Mari J. "Identity theft prevention and survival /." [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.

Full text
Abstract:
ID-theft survival kit -- Book From victim to victor -- ID theft FAQ -- Audiocassettes -- Identity theft resources -- Testimonials -- ID theft action letters -- About the author -- Media appearances -- Identity theft laws -- Theft Deterrence Act.
Title from opening screen, December 28, 1999.
APA, Harvard, Vancouver, ISO, and other styles
16

Scholz, Robert. "Behavior Cards - ett programmeringsverktyg för barn." Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-66.

Full text
Abstract:

This thesis presents the work of developing and testing a programming tool specially designed for children. The purpose of this tool is to make children capable of creating visual simulations and games that consist of actors interacting in a virtual world. The name of the programming tool is Behavior Cards, which comes from the fact that actors are programmed by giving them cards representing different kinds of behaviors. Behaviors are to some extent pre-programmed and can include general events specifying how the actors should act in different situations, in contrast to specifying every possible situation that can occur. The idea is that Behavior Cards should be easier to use than a more traditional text based programming tool, but it should also be expressive within the domain of visual games. These goals can be accomplished by using different types of representations – such as icons, symbols and text – combined with an interaction technique based on direct manipulation of objects. Two versions of Behavior Cards have been developed and tested together with 11-year-old children. The results show that behaviors were useful for programming relatively advanced visual programs in a quick and effective manner, and that the children were able to learn and use the concept for creating simple programs. Further studies are needed to examine if children also can analyze and solve more complex programming problems.


Arbetet som den här uppsatsen beskriver omfattar utveckling och testning av ett programmeringsverktyg för barn. Syftet med verktyget är att barn ska kunna skapa visuella simulationer och spel genom att programmera aktörer som agerar och interagerar med varandra i en värld. Programmeringsverktygets namn är Behavior Cards, vilket kommer av att aktörernas agerande programmeras genom att tilldela dem kort som representerar olika typer av beteenden. Beteenden är till viss del förprogrammerade och kan innehålla generella händelser för hur aktörer ska agera i olika situationer, i motsats till att definiera varje tänkbar situation som kan uppkomma. Tanken är att programmerandet ska vara enklare än med traditionella, textbaserade, programmeringsspråk, men samtidigt kraftfullt inom den specifika domänen. Detta kan åstadkommas genom att använda olika typer av representationer – såsom ikoner, symboler och text – i kombination med en interaktionsteknik baserad på direktmanipulation av objekt. Två prototyper av programmeringsverktyget har utvecklats och testats på barn i 11-årsåldern. Resultaten visar att beteenden är tillämpbart för att programmera relativt avancerade visuella program på ett snabbt och effektivt sätt, och att barnen kunde lära sig och använda konceptet för att skapa enkla program. Det krävs dock fördjupade studier för att ta reda på om barn kan analysera samt lösa mer komplexa programmeringsproblem.

APA, Harvard, Vancouver, ISO, and other styles
17

SKATTMAN, AGNES. "Predicting Redemption Probability of Gift Cards." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-138296.

Full text
Abstract:
Recommender systems try to facilitate the decision making process of users, by recommending products such as movies, music and news articles. This work uses a user based recommender system to predict redemption probabilities of different gift cards. That is, the probability that a user redeems a gift card in a store, given that he or she receives it. This work is a base for ranking gift cards in the future. Two collaborative filtering algorithms are evaluated, both based on neighbour recommender methods. The data are provided by the digital gift giving company Wrapp. The nearest neighbours are chosen by similarity, based on the rating of gift cards and the demographic data of the users. The result shows that it is possible to predict redemption probabilities of gift cards with this data. It also shows that it is important to include certain user behaviors when predicting the redemption probabilities. One such example is if a user tends to redeem more or less gift cards than other users. This work does not explicitly show that demographic data are improving the result, compared to a rating data approach, even though the results with demographic data seem promising.
APA, Harvard, Vancouver, ISO, and other styles
18

Thekkekunnel, Roshan G. "Low power communication for 802.11x cards." Diss., Connect to online resource, 2005. http://wwwlib.umi.com/cr/colorado/fullcit?p1430200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Worthington, Steve. "Affinity credit cards and relationship marketing." Thesis, Staffordshire University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.402436.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chu, Xiqing. "Relay attacks of NFC smart cards." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-25890.

Full text
Abstract:
Near Field Communication (NFC) is a set of standards, which allows two devices to transfer messages over a short range of distance of 10 cm. NFC based smart cards and applications are widely used for public transportation, ticketing system and security critical identity cards. NFC contains mainly two proximity smart card specifications ISO 14443 and ISO 18092 for lower level data exchange. However, none of the specifications above provides security mechanism to protect communication between smart card and reader device.Regardless the variety of different application protocols that developers implement on both smart card and reader side, the communication in between is vulnerable and easy to be tempered. With available commodity smart card readers, mobile phone with NFC read/write functionalities. Attacker can monitor and relay messages between card and reader without the actual present of the real smart card. In this scenario, the card holder won't be noticed that his/her card has been used already. This thesis would study and understand a public transportation ticketing system based on DESFire cards. Student would investigate whether replay attack using two proxy devices is possible or not. After establishment of attack, student observes what would be the consequences of the replay attack on public transportation system and the valuable assets attackers can profit on during the attack. Student would develop Android programs on NFC based phones to perform research. Testing environment would be built on legacy Java and C code. Possible attacks experiment would be carried on real public ticketing system. Bases on the findings from research, student will try to recommend solutions to improve the ticket protocol that this system is unaffected by the relay attack or at least minimize the profit that attacker can get.
APA, Harvard, Vancouver, ISO, and other styles
21

Markantonakis, Constantinos. "Secure logging mechanisms for smart cards." Thesis, Royal Holloway, University of London, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.343904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Krishnamurthy, Ashwin 1979. "CARDS : Conjoint Adaptive Retroactive Database System." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87255.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Includes bibliographical references (leaves 61-62).
by Ashwin Krishnamurthy.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
23

Seghezzo, Anna. "SCHIZOPHRENIA: THE HOUSE OF CARDS DISORDER." Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/613600.

Full text
Abstract:
Schizophrenia is a highly heritable disease with 200,000 cases per year in the US and a cost of $62.7 billion. It is a neurological disorder that produces positive, negative and cognitive symptoms. The papers used in this literature review include the most recent studies of schizophrenia. This review covers the still largely elusive genetic causes and neurological pathologies, diagnostic criteria, and the current treatments for schizophrenia.
APA, Harvard, Vancouver, ISO, and other styles
24

PELILLI, DAVID. "Perspectives on Italian prepaid cards market." Doctoral thesis, Università degli Studi di Roma "Tor Vergata", 2009. http://hdl.handle.net/2108/938.

Full text
Abstract:
Negli ultimi anni il mercato italiano delle carte di pagamento ha suscitato l’interesse sia degli accademici che degli operatori, a causa degli elevati tassi di crescita che ha fatto registrare (in termini di numero di carte per abitante) successivamente alla massiccia introduzione di schemi di pagamento prepagati (carte prepagate), accessibili anche ai segmenti dei non bancarizzati e degli underbanked. Proprio perché la componente principale di questa crescita può essere attribuita all’introduzione delle carte prepagate, il lavoro di tesi si è focalizzato su questo mercato, considerando congiuntamente tre aspetti complementari: l’offerta, il relativo contesto normativo, nazionale e comunitario nel quale si sviluppa questo business e le caratteristiche principali della domanda. Nella prima parte del lavoro sono state analizzate le caratteristiche comuni e differenzianti di 39 carte prepagate emesse da altrettanti player domestici: dall’analisi emerge che, a causa dell’evolversi del processo di saturazione in atto, per coloro che non hanno un rete distributiva estesa (come il leader di mercato) l’unica alternativa rimane quella di veicolare servizi di pagamento innovativi (mobile payments), diversificando opportunamente i target di clientela serviti (minorenni, studenti, migrants) Nella seconda parte sono stati identificati sia i rischi che le opportunità nascenti dall’attuale revisione della normativa in tema di emissione di moneta elettronica. Le eccessive pressioni dal lato dei costi (identificazione della clientela) necessari per il rispetto della normativa sull’antiriciclaggio e la potenziale entrata degli operatori TLC, potrebbero infatti minare fortemente il business delle prepagate, tipicamente basato sui volumi e sull’ampiezza della rete distributiva, costosa da realizzare e mantenere. Infine si è voluto analizzare la domanda di mercato delle carte di pagamento (carte di credito, carte di debito e prepagate) attraverso la somministrazione a 624 studenti universitari di un questionario che consentisse di individuare i fattori in grado di spiegarne l’utilizzo. Dall’analisi emerge come l’attitudine personale e di accettazione della tecnologia siano, insieme ai livelli di bancarizzazione, le variabili più rilevanti nell’uso delle carte di pagamento.
APA, Harvard, Vancouver, ISO, and other styles
25

Slater, Richard S. "An analysis of credit card use as a method for making small purchases in the United States Marine Corps." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA297054.

Full text
Abstract:
Thesis (M.S. in Management) Naval Postgraduate School, December 1994.
"December 1994." Thesis advisor(s): David V. Lamm, Louis G. Kalmar. Includes bibliographical references ( p. 119-121). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
26

Kubát, Martin. "Využití platebních karet v maloobchodě." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-86054.

Full text
Abstract:
The aim of the diploma thesis The Use of payment cards at the czech retail market is the analysis of benefits for card holders and the retailers. The theoretical part describes the history of payment cards, their types, variability of their use and supporting services and defines the relationship among holders of payment cards, banks and retailers. The practical part is focused on the research motives for using payment cards by their holders and the retailers.
APA, Harvard, Vancouver, ISO, and other styles
27

Chow, Wo-lap. "Promotional strategy for visa credit card in Hong Kong with respect to customers' choice criteria." [Hong Kong] : University of Hong Kong, 1992. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13302322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Bong, Kui-mein Maria. "Characteristics of active & inactive credit cardholders : a case study /." [Hong Kong : University of Hong Kong], 1985. http://sunzi.lib.hku.hk/hkuto/record.jsp?B12315126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Vangli, Marcus Andre. "Combining graphics and video using graphics cards." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10127.

Full text
Abstract:

This report contains an introduction to graphics and video technology. Furthermore the game Avatars-Online, which is a massive multiplayer online game is presented. Avatars-Online introduces a new concept of handling player-to-player interaction, which involves 3D-sound. The report contains the answers to the tasks presented in the assignment and which was carried out successfully. Furthermore the work of this report has lead to two interesting ideas that should be further explored: • Interactive meeting rooms using graphics and 3D sound • Rapid construction of high quality 3D models

APA, Harvard, Vancouver, ISO, and other styles
30

Duchaine, Ellen L. "Effect of Response Cards on Academic Outcomes." Digital Archive @ GSU, 2011. http://digitalarchive.gsu.edu/epse_diss/75.

Full text
Abstract:
ABSTRACT EFFECT OF RESPONSE CARDS ON ACADEMIC OUTCOMES FOR HIGH SCHOOL STUDENTS WITHOUT DISABILITIES AND HIGH SCHOOL STUDENTS WITH DISABILITIES WHO EXHIBIT CHALLENGING BEHAVIORS by Ellen L. Duchaine Response cards (RC) support effective teaching strategies such as maintaining a brisk pace of instruction, increased opportunities to respond, immediate and frequent corrective feedback, and high rates of behavior specific praise statements; all of which have been effective in increasing student engagement for students with and without emotional and behavioral disorders (E/BD) (Emmer & Stough, 2001; Simonsen et al., 2008; Sutherland, Wehby, & Copeland, 2000). RC during academic instruction are successful in decreasing disruptive behavior, increasing student participation, and increasing academic achievement from the elementary school level to the university level. This study examined teacher implementation of RC at the high school level for students without disabilities and students with disabilities with a history of challenging behaviors (i.e., students with a disability and a behavior intervention plan) in general education classes required for high school graduation. The purpose of this study was to evaluate the effect of RC compared to hand raising (HR) in inclusive general education classrooms. An alternating treatment design was implemented to examine the potential functional relation between the use of RC, student engagement, and academic achievement. RC (i.e., 8” x 11” laminated write -on cards) were randomly alternated with the more traditional method of HR which allows one student to respond to each question asked by the teacher. Intervals of time on-task, attempted responses, next day quiz scores, and bi-weekly probe scores were measured and analyzed for target students without disabilities and target students with disabilities. In addition, individual scores of all students in the class were calculated to provide a class mean, allowing further analysis. All sessions were conducted by classroom teachers during daily reviews of academic content. The findings from this study support prior research indicating RC increases student engagement by increasing intervals of time on-task and attempted responses for the majority of students. In one class, three of four target students increased daily quiz scores by 10% or more using RC; and in the second class the mean for daily quiz scores was higher using RC. Although results on next-day quizzes were inconsistent, bi-weekly probes indicate RC increased retention of material learned over time.
APA, Harvard, Vancouver, ISO, and other styles
31

Rodríguez, Reyes Luis Raúl. "Three studies on credit cards and money." Thesis, University of Essex, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.415946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Cogan, Fabio A. Cuello. "Application of Smart Cards in the Colombian Navy Personnel Management System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366819.

Full text
Abstract:
Thesis (M.S. in International Resource Planning and Management) Naval Postgraduate School, June 1999.
"June 1999". Thesis advisor(s): William J. Haga, Mark E. Nissen. Includes bibliographical references (p. 57-58). Also avaliable online.
APA, Harvard, Vancouver, ISO, and other styles
33

Konečný, Jakub. "Silná kryptografie na čipových kartách." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317023.

Full text
Abstract:
The diploma thesis is focused on cryptography with smart cards. It describes smart cards from hardware and software side. The thesis compares well known operating systems used on smart cards. Specified operating systems are widely analyzed. There is introduction to password authenticated key establishment protocols. PACE protocol is described in details together with implementation proposal. The implementation on the Basic card platform follows. In the end there is the time analysis of the implementation and further improvements are suggested.
APA, Harvard, Vancouver, ISO, and other styles
34

Svěcený, Lukáš. "Analýza nástrojů elektronického platebního styku." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-19071.

Full text
Abstract:
The objective of my thesis is to describe overall technological concept and organizational scheme od payment cards and outline trends and development in the near future. There has been a big effort for industry standardization (e.g. security standards). It describes also advantages and disadvantages of payment cards and means of authorization. The infomation mentioned here will be used in later part, in case studies. My 3-years working experience as a project manager at Wincor Nixdorf helped to further investigate these scenarios. This company is one of the market leaders and key players in banking and retail industry. Since the cost related issues are very importnant (especially in the time of crisis), I analysed and compared several scenarios of payment system installation in retail.
APA, Harvard, Vancouver, ISO, and other styles
35

Silva, Marcos Vinicius Maciel da. "Securetrade: a secure protocol based on transferable E-cash for exchanging cards in P2P trading card games." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-22092016-113539/.

Full text
Abstract:
Trading card games (TCG) are distinct from traditional card games mainly because, in the former, the cards are not shared among players in a match. Instead, users play with the cards they own (e.g., that have been purchased or traded with other players), which correspond to a subset of all cards produced by the game provider. Even though most computer-based TCGs rely on a trusted third-party (TTP) for preventing cheating during trades, allowing them to securely do so in the absence of such entity, as in a Peer-to-Peer (P2P) scenario, remains a challenging task. Potential solutions for this challenge can be based on e-cash protocols, but not without adaptations, as those scenarios display different requirements: for example, TCGs should allow users to play with the cards under their possession, not only to be able to pass those cards over as with digital coins. In this work, we present and discuss the security requirements for allowing cards to be traded in TCGs and how they relate to e-cash. We then propose a concrete and efficient TTP-free protocol for trading cards in a privacy-preserving manner. The construction is based on a secure transferable e-cash protocol and on a P-signature scheme converted to the asymmetric pairing setting. According to our experimental results, the proposed protocol is quite efficient for use in practice: an entire deck is stored in less than 5 MB, while it takes a few seconds to be prepared for a match; the verification of the cards, on its turn, takes less time than an usual match, and can be performed in background while the game is played.
Jogos de cartas colecionáveis (TCG, do inglês Trading Card Game) diferem de jogos de cartas tradicionais principalmente porque as cartas não são compartilhadas em uma partida. Especificamente, os jogadores usam suas próprias cartas (obtidas, e.g., por meio de compra ou troca com outros jogadores), as quais correspondem a um subconjunto de todas as cartas criadas pelo produtor do jogo. Embora a maioria dos TCGs digitais atuais dependam de um terceiro confiável (TTP, do ingês Trusted Third-Party) para prevenir trapaças durante trocas, permitir que os jogadores troquem cartas de maneira segura sem tal entidade, como é o caso em um cenário peer-to-peer (P2P), ainda é uma tarefa desafiadora. Possíveis soluções para esse desafio podem ser baseadas em protocolos de moeda eletrônica, mas não sem adaptações decorrentes dos requisitos diferentes de cada cenário: por exemplo, TCGs devem permitir que usuários joguem com as suas cartas, não apenas que passem-nas adiante como ocorre com moedas eletrônicas. Neste trabalho, são apresentados e discutidos os principais requisitos de segurança para trocas de cartas TCGs e como eles se relacionam com moedas eletrônicas. Também é proposto um protocolo eficiente que permite trocas de cartas sem a necessidade de um TTP e com suporte a privacidade. A construção usa como base um protocolo seguro de moeda eletrônica e um protocolo de assinatura-P adaptado para utilizar emparelhamentos assimétricos, mais seguros que os simétricos. De acordo com os experimentos realizados, o protocolo proposto é bastante eficiente para uso na prática: são necessários apenas 5 MB para armazenar um baralho inteiro, enquanto a preparação do mesmo leva apenas alguns segundos; a verificação das cartas, por sua vez, é mais rápida que a duração comum de uma partida e pode ser executada em plano de fundo, durante a própria partida.
APA, Harvard, Vancouver, ISO, and other styles
36

Hartley, Mary. "Reward cards and customer loyalty in UK supermarkets." Thesis, University of Nottingham, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Feudjo, Tepie Maurille Aime. "Modelling daily diary cards in asthma clinical trials." Thesis, London School of Hygiene and Tropical Medicine (University of London), 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.408447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Schoellner, Teresa Marie. "The effects of credit cards on money demand." Connect to resource, 2002. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1261242820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Teng, Po-Yuan, and 鄧博元. "Simulating National Healthcare Cards by Java Cards." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/03018968365900072420.

Full text
Abstract:
碩士
國立成功大學
工程科學系碩博士班
91
This paper focuses on the functions of the Taiwan HealthCare IC Card , and part functions of the Secure Access Module. We examine the integrity of the Taiwan Health Card Specification by simulating the authentication between Health Card and Secure Access Module, and the data flows between these two entities by Java Cards.
APA, Harvard, Vancouver, ISO, and other styles
40

Ho, Chia-Chun, and 何嘉峻. "Design and Implementation of a Java-based Card Reader for IC Cards." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/54398469372897101617.

Full text
Abstract:
碩士
國立成功大學
工程科學系
88
This dissertation has three goals. The first goal is construction of a prototype Java Card Reader which is able to access an ISO7816 IC Card. The second is to design and implement a mechanism for dynamically replacing Java Card Reader Application(AP) , which includes security, upgrade and compatibility issues. The third is the JVM (Java Virtual Machine), which is developed by our lab., into an embedded system,such as the Card Reader.This Java Card Reader is competing with commercial Card Reader almost.As we know,this is the first prototype Card Reader designed and developed in Taiwan.
APA, Harvard, Vancouver, ISO, and other styles
41

Huang, We-Ming, and 黃維明. "The Market Segmentation of Credit Cards Applied To IC Card''s Promotion." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/57499817763671366840.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Chan, Julia. "Alphabet cards a screenplay /." 2002. http://wwwlib.umi.com/cr/yorku/fullcit?pMQ71571.

Full text
Abstract:
Thesis (M.F.A.)--York University, 2002. Graduate Program in Film and Video.
Typescript. Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://wwwlib.umi.com/cr/yorku/fullcit?pMQ71571.
APA, Harvard, Vancouver, ISO, and other styles
43

Wan-Jhen, HUANG, and 黃琬臻. "Security of ATM Cards." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/43156697900592168461.

Full text
Abstract:
碩士
明新科技大學
資訊管理研究所
98
ATM cards have become an indispensable payment instrument in daily life, which offer functions such as account inquiry, cash withdrawal, payment of tax, and account transfer. However, since it involves the transfer of money, it tends to be used in criminal conducts. Since it is easy to record and replicate magnetic stripe cards, fraudulent withdrawals occur frequently. At present, magnetic stripe cards’ function of cross-bank transactions has been fully terminated in Taiwan and magnetic stripe cards are replaced by chip ATM cards. Besides the functions of magnetic stripe cards, chip ATM cards also offer functions such as web ATM payment and payment at real stores. Chip ATM cards make it possible to distinguish the bogus cards from the authentic ones and verify the user password offline, which greatly enhance the safety of ATM cards. This study investigates the characteristics, evolution, and ATM card fraud incidents, and analyzes the security mechanisms and problems of magnetic stripe cards, chip ATM cards. Finally, an improved solution is proposed. We hope that this paper can be a reference for domestic financial industry and cardholders.
APA, Harvard, Vancouver, ISO, and other styles
44

"A comparative study on the credit card business in Hong Kong and People's Republic of China." Chinese University of Hong Kong, 1991. http://library.cuhk.edu.hk/record=b5886670.

Full text
Abstract:
by Mui Yuet-sheung.
Thesis (M.B.A.)--Chinese University of Hong Kong, 1991
Includes bibliographical references.
EXECUTIVE SUMMARY
ACKNOWLEDGEMENT
CHAPTER
Chapter I: --- INTRODUCTION
Operation of Credit Card System
Role of Visa and MasterCard International Inc.
Chapter II: --- BUSINESS REVIEW
Historical Development of VISA and MasterCard
Development of Credit Card Business in Hong Kong
Development of Credit Card Business in China
Chapter III: --- OBJECTIVES AND METHODOLOGY
Hypothesis
Objectives
Methodology
Chapter IV: --- RESEARCH FINDINGS AND ANALYSIS
Marketing Strategies on Credit Card Products Employed by Banks in Hong Kong and China
Product Strategy
Pricing Strategy
Promotion Strategy
Distribution Strategy-
Operating System of Credit Card Business in Hong Kong and China
Credit Approval
Authorisation
Settlement
Credit and Security Control
SWOT Analysis
SWOT Analysis of Card Business in China
SWOT Analysis of Card Business in Hong Kong
Chapter V: --- COMPARISON BASED ON MCGUIGAN MODEL
McGuigan's Conceptual Market Performance Model
Market and Environmental Conditions
Market Structure
Market Conduct
Market Performance
Chapter VI: --- CONCLUSION AND FUTURE DEVELOPMENT
APPENDICES
Chapter Appendix I: --- Historical Development of VISA and MasterCard
Chapter Appendix II : --- Development of Credit Card Business in Hong Kong
Chapter Appendix III : --- Development of Credit Card Business in China
Chapter Appendix IV : --- Questionnaire Design (English and Chinese Version)
Chapter Appendix V : --- Background Information of Interviewees
Chapter Appendix VI : --- Interview Question Lists
Chapter Appendix VII : --- Different Credit Cards in Hong Kong
Chapter Appendix VIII : --- Different Credit Cards in China
BIBLIOGRAPHY
APA, Harvard, Vancouver, ISO, and other styles
45

Shiu, Chun-Wei, and 許俊偉. "Discussion of Financial Institution's Bad Debt Regarding to Credit Cards and Cash Cards." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/57465396609739362856.

Full text
Abstract:
碩士
亞洲大學
國際企業學系碩士班
94
In recent years, consuming finance has become one of the major profit sources of banks. Among them, small credit loan, credit card and cash card have become the main products to be promoted. By doing so, banks hope to obtain more business opportunities, and the growth of cash cards is far more fast. In addition, the cash card extremely similar to goods quality of the credit card and has complementarity, make every bank introduce the business of credit cards and cash cards. the card bank is in order to open up the business, it is strict to verify incompletely, Cause a person to have many cards , the holder does not know how to weigh one's own financial situation and adjust Speed expanded of the personal credit, cause oneself debt. bad debt of the bank to be too much, have formed the debt storm of the card . this research use unobtrusive measures to probe into the relevant card debt question in four respects that the debt consultation mechanism, circulation interest rate of the bank, individual reorganization, asset management corporation and propose solving the suggestion of the debt problem of the card. The results : (1)It is comparatively rational for the circulation interest rate of the bank of our country to compare with various countries, if adjust and lower the interest rate, not only can not solve the debt problem of the card but also cause influence on the economy and society of our country. (2)The debt consultation mechanism can not solve the problem of the high debt group, and this mechanism regulation is too loose, it is apt to be abused by the speculator. (3)Observing America and Japan can solve the financial crisis and bankrupt too much problem of personal credit smoothly, establishment of the debt consultation mechanism and individual reorganization is all very key factors. (4)This research is thought to solve the problem of the card debt, need to establish the debt consultation mechanism with independent character rapidly, manage company's fund sufficiently, can receive debts of the hign debt group, and because have independent character, will be more efficient.
APA, Harvard, Vancouver, ISO, and other styles
46

Αντωνόπουλος, Νικόλαος. "Έξυπνες κάρτες." 2008. http://nemertes.lis.upatras.gr/jspui/handle/10889/1307.

Full text
Abstract:
Στην παρούσα διπλωματική εργασία μελετάμε τις έξυπνες κάρτες καθώς και τις τεχνολογίες που σχετίζονται με αυτές. Ιδιαίτερη έμφαση δίνεται στην τεχνολογία Java Card την οποία άλλωστε χρησιμοποιούμε για την ανάπτυξη μιας πιλοτικής εφαρμογής έξυπνης κάρτας ασθενούς. Στο πρώτο κεφάλαιο αναφερόμαστε γενικά στις έξυπνες κάρτες. Πραγματοποιούμε μια σύντομη ιστορική αναδρομή και μελετάμε τους τομείς εκείνους στους οποίους βρίσκουν εφαρμογή, παρουσιάζοντας έτσι μερικά από τα πλεονεκτήματα τους. Στο δεύτερο κεφάλαιο αναφερόμαστε στην αρχιτεκτονική και στο υλικό των έξυπνων καρτών. Αφού παρουσιάσουμε τα διαφορετικά είδη καρτών που υπάρχουν αναφερόμαστε σε κάθε σύστημα υλικού μίας έξυπνης κάρτας όπως για παράδειγμα στον επεξεργαστή, στην μνήμη κ.α. Στο τρίτο κεφάλαιο μελετάμε το λογισμικό των έξυπνων καρτών. Αναφερόμαστε στον τρόπο επικοινωνίας με την κάρτα, στα υπάρχοντα λειτουργικά συστήματα για έξυπνες κάρτες καθώς και στα πρότυπα που έχουν κυριαρχήσει. Κλείνοντας το κεφάλαιο πραγματοποιούμε μια σύντομη εισαγωγή στην κρυπτογραφία. Στο τέταρτο κεφάλαιο αναφερόμαστε λεπτομερώς στην τεχνολογία Java Card. Μελετάμε τόσο την αρχιτεκτονική όσο και τα συστατικά της τεχνολογίας αυτής όπως είναι η εικονική μηχανή και το περιβάλλον εκτέλεσης. Αναφερόμαστε ακόμα σε διάφορα θέματα συναφή με την τεχνολογία αυτή. Στο πέμπτο και τελευταίο κεφάλαιο ασχολούμαστε με την υλοποίηση μιας πιλοτικής εφαρμογής έξυπνης κάρτας ασθενούς. Αφού περιγράψουμε τις λειτουργικές και τις τεχνικές προδιαγραφές αναφερόμαστε σε θέματα σχεδιασμού της εφαρμογής και τέλος δείχνουμε αναλυτικά τον τρόπο λειτουργίας της.
In the present diploma thesis we study the smart cards in addition to the technologies that are related with them. Particular accent is given in the Java Card technology which we use in order to develop a demo application of a patient’s smart card. In the first chapter we set out general characteristics of smart cards. We make a short historical retrospection and we study some particular fields in which they are applicable, presenting their advantages. In the second chapter we refer to the architecture and hardware of smart cards. After we present the variety of the existing smart cards we overhaul the hardware of smart cards, for example CPU, memory etc. In the third chapter we examine the software of smart cards. We set out the way of communication with the card, in the existing operating systems for smart cards as well as in the models that have dominated. Closing the chapter we make a short reference in smart card’s cryptography. In the fourth chapter we make a more detailed reference to Java Card technology. We study the architecture and the components of this technology which are the virtual machine and the executing environment. We also refer to various subjects relevant with this technology. In the fifth and last chapter we deal with the development of a demo application. It is a smart card that is used widely in many hospitals around the world. It is used by these hospitals’ patients. After we show the functional and technical specifications we refer to designing issues of this application and finally we demonstrate their way of operation.
APA, Harvard, Vancouver, ISO, and other styles
47

Yeh, Shu-Wan, and 葉淑婉. "Risk Bearing in Credit Card Fraud -- The Case of Lost or Stolen Cards." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/04439772527526539175.

Full text
Abstract:
碩士
逢甲大學
會計與財稅所
91
Abstract The money loss due to credit card fraud in Taiwan is more than three billion NT dollars from 2000.06 to 2001.06. These years the number of suits about credit card fraud also skyrockets. Risk bearing is about the key issue in these suits. We discuss risk bearing in credit card fraud and focus on the case of lost or stolen cards. The liability in credit card fraud, likes product liability, located on the border between contract and tort. Here we use economic theories of contract and tort analyzing efficient risk bearing in credit card fraud. That means the way we allocate risk should give both the credit card holders and issuers the incentive to take all efficient precautions. In Taiwan, the risk bearer of lost or stolen credit card was first the credit card holders but now card issuers. We find that the evolution of standard form contract of credit card responded to the verdicts of the court. However, the card holders now have no incentive to prevent the credit card fraud. We suggest that the rule of risk bearing in credit card fraud should be “Strict Liability with Contributory Negligence”, where the card issuers bear the risk unless the card holders are proved negligent.
APA, Harvard, Vancouver, ISO, and other styles
48

WU, Sea Rey, and 巫喜瑞. "A Study on the Marketing Strategy of Credit Cards-Affinity Cards As an Example." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/47358444910363792335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

KHENG, KER SOR, and 郭素馨. "Using Smart Cards for Implementing." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/45239951220128928539.

Full text
Abstract:
碩士
國立交通大學
資訊管理所
88
The objective of this thesis is to design a vehicle for conveying authentication and access control information. Smart cards are the vehicle that stores credentials of their owners in the format defined in the X.509 certificate. Two types of certificates are defined. One is used to store individual information for the authentication purpose; the other is used to convey role assignments. The author designs procedures for the enrollment of these certificates and then implements these procedures in the platform of Windows 2000. Finally, a case study is conducted, showing how the certificates are used in a process of requesting for leave in organizations.
APA, Harvard, Vancouver, ISO, and other styles
50

Chiou, Yaw-Huei, and 邱耀輝. "Recognition of Chinese Business Cards." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/19356148937561385049.

Full text
Abstract:
碩士
國立交通大學
資訊工程學系
84
Business cards include many kinds of information such as name, address, andtelephone number. In order to use the information effectively, it is necessaryto extract the information from the cards automatically to build a data base. The goal of this thesis is to extract and recognize characters from color business cards. The styles of business cards varies greatly. Some marks andlines may appear on the cards, and some cards are color. These problems will make the recognition of business cards difficult.To separate the foreground from the background, we assign all pixels into eight color types: black, white, red, green, blue, yellow, cyan, and magenta. Then we calculate a dynamic threshold using the color information to extract the foreground. Next, we extract the characters by four main modules: connected component extraction, local thresholding, mark, line and noise deletion and character grouping. Connected components are found to represent character candidates and local thresholding is used to improve the image quality. Marks,noise and lines are finally deleted from the components extracted using some size information we collect from training business cards. Character grouping isused to group the related characters and correct the character blocks by using the groups. Finally, we send the characters to statistic-based Chinese and English character recognition systems. We show the top ten candidates recognized in a user-friendly Windows-based interface. Users can use a mouse to select correct candidates to replace wrong results. We store the final results in the database.We test 30 business cards, which have Chinese characters, English characters, numerals and punctuation marks. The extraction rate and accuracy rate for our system are 96.97% and 95.43% respectively. The recognition rate for Chinese characters is 88.78% and the average recognition rate for English characters, numerals and punctuation marks can reach 97.58%.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography