Tesis sobre el tema "CARDS"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "CARDS".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Au, Po-ling Lisa. "Smart card business strategy in Hong Kong /". Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19876178.
Texto completoYildiz, Afsina. "Recherche cards : live it through the Recherche DVD cards". Virtual Press, 2007. http://liblink.bsu.edu/uhtbin/catkey/1371680.
Texto completoDepartment of Telecommunications
Edsbäcker, Peter. "SIM cards for cellular networks : An introduction to SIM card application development". Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-13989.
Texto completoKononenko, I. "Credit cards for children". Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/25995.
Texto completoIslam, Md Kamrul. "Effective use of smart cards : A case study of smart cards in Sweden". Thesis, Umeå universitet, Institutionen för informatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-66300.
Texto completoHo, Kam-wah Patrick. "An analysis of the Hong Kong credit card industry : the competition and future development /". Hong Kong : University of Hong Kong, 1995. http://sunzi.lib.hku.hk/hkuto/record.jsp?B14038997.
Texto completoBerglund, Daniel. "Gene-EnvironmentInteraction Analysis UsingGraphic Cards". Thesis, KTH, High Performance Computing and Visualization (HPCViz), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-163215.
Texto completoDurbin, Daniel A. "IBM PC Voice Mail Cards". International Foundation for Telemetering, 1989. http://hdl.handle.net/10150/614731.
Texto completoThe Voice Main Card (VMC) functions as an enhanced telephone answering machine and is designed as a plug-in card for the IBM PC and compatibles. In addition to standard answering machine functions, the VMC features programmable outgoing message selection, message routing, response to caller's touch tone signals, and remote programming ability. The VMC will answer incoming telephone calls, deliver outgoing messages which are Programmably selectable from as many as 16 digitized audio messages stored on the PC's hard disk, record incoming messages to the hard disk or optionally to an external tape recorder, route messages to a specified receiver, respond to a caller's touch tone signals, and enter a remote programming mode as a result of a special code sent by the caller. Audio messages are processed digitally via A/D and D/A converters which receive and send 8-bit data to and from the IBM PC through a selectable port address. The A/D conversion is implemented with the ADC0802 which is operated at a clock rate of 512 kHz. The D/A conversion is implemented with the DAC0830. Interface with the telephone line is accomplished with the speech circuit TP5700 coupled through opto-couplers. Messages are recorded using an external 600-ohm dynamic microphone and played back through an external 8-ohm speaker. A full-featured, pull-down menu program is provided with the VMC and implements all programmable functions. Data In/Out (I/O) with the card is interrupt-driven to allow apparent simultaneous disk I/O.
Sokur, A. A. "Credit cards of the future". Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/25997.
Texto completoKarayew, D. "The history of credit cards". Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/25992.
Texto completoSayeva, K. V. "Next generation of credit cards". Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/28791.
Texto completoGaskell, Gary Ian. "Integrating smart cards into Kerberos". Thesis, Queensland University of Technology, 1999. https://eprints.qut.edu.au/36848/1/36848_Gaskell_2000.pdf.
Texto completoJonsson, Jerry y Lina Tonegran. "Designing Cards as a Polymorphic Resource for Online Free to Play Trading Card Games". Thesis, Högskolan på Gotland, Institutionen för speldesign, teknik och lärande, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-1914.
Texto completoJerry Jonsson går speldesign och programmering och Lina Tonegran går speldesign och grafik.
Goodrich, Gwendolyn Lea. "Identity theft awareness in north central West Virginia". Huntington, WV : [Marshall University Libraries], 2003. http://www.marshall.edu/etd/descript.asp?ref=218.
Texto completoFrank, Mari J. "Identity theft prevention and survival /". [Laguna Niguel, Calif.] : M.J. Frank and Associates, 1999. http://www.identitytheft.org.
Texto completoTitle from opening screen, December 28, 1999.
Scholz, Robert. "Behavior Cards - ett programmeringsverktyg för barn". Thesis, Linköping University, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-66.
Texto completoThis thesis presents the work of developing and testing a programming tool specially designed for children. The purpose of this tool is to make children capable of creating visual simulations and games that consist of actors interacting in a virtual world. The name of the programming tool is Behavior Cards, which comes from the fact that actors are programmed by giving them cards representing different kinds of behaviors. Behaviors are to some extent pre-programmed and can include general events specifying how the actors should act in different situations, in contrast to specifying every possible situation that can occur. The idea is that Behavior Cards should be easier to use than a more traditional text based programming tool, but it should also be expressive within the domain of visual games. These goals can be accomplished by using different types of representations – such as icons, symbols and text – combined with an interaction technique based on direct manipulation of objects. Two versions of Behavior Cards have been developed and tested together with 11-year-old children. The results show that behaviors were useful for programming relatively advanced visual programs in a quick and effective manner, and that the children were able to learn and use the concept for creating simple programs. Further studies are needed to examine if children also can analyze and solve more complex programming problems.
Arbetet som den här uppsatsen beskriver omfattar utveckling och testning av ett programmeringsverktyg för barn. Syftet med verktyget är att barn ska kunna skapa visuella simulationer och spel genom att programmera aktörer som agerar och interagerar med varandra i en värld. Programmeringsverktygets namn är Behavior Cards, vilket kommer av att aktörernas agerande programmeras genom att tilldela dem kort som representerar olika typer av beteenden. Beteenden är till viss del förprogrammerade och kan innehålla generella händelser för hur aktörer ska agera i olika situationer, i motsats till att definiera varje tänkbar situation som kan uppkomma. Tanken är att programmerandet ska vara enklare än med traditionella, textbaserade, programmeringsspråk, men samtidigt kraftfullt inom den specifika domänen. Detta kan åstadkommas genom att använda olika typer av representationer – såsom ikoner, symboler och text – i kombination med en interaktionsteknik baserad på direktmanipulation av objekt. Två prototyper av programmeringsverktyget har utvecklats och testats på barn i 11-årsåldern. Resultaten visar att beteenden är tillämpbart för att programmera relativt avancerade visuella program på ett snabbt och effektivt sätt, och att barnen kunde lära sig och använda konceptet för att skapa enkla program. Det krävs dock fördjupade studier för att ta reda på om barn kan analysera samt lösa mer komplexa programmeringsproblem.
SKATTMAN, AGNES. "Predicting Redemption Probability of Gift Cards". Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-138296.
Texto completoThekkekunnel, Roshan G. "Low power communication for 802.11x cards". Diss., Connect to online resource, 2005. http://wwwlib.umi.com/cr/colorado/fullcit?p1430200.
Texto completoWorthington, Steve. "Affinity credit cards and relationship marketing". Thesis, Staffordshire University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.402436.
Texto completoChu, Xiqing. "Relay attacks of NFC smart cards". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-25890.
Texto completoMarkantonakis, Constantinos. "Secure logging mechanisms for smart cards". Thesis, Royal Holloway, University of London, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.343904.
Texto completoKrishnamurthy, Ashwin 1979. "CARDS : Conjoint Adaptive Retroactive Database System". Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87255.
Texto completoIncludes bibliographical references (leaves 61-62).
by Ashwin Krishnamurthy.
M.Eng.
Seghezzo, Anna. "SCHIZOPHRENIA: THE HOUSE OF CARDS DISORDER". Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/613600.
Texto completoPELILLI, DAVID. "Perspectives on Italian prepaid cards market". Doctoral thesis, Università degli Studi di Roma "Tor Vergata", 2009. http://hdl.handle.net/2108/938.
Texto completoSlater, Richard S. "An analysis of credit card use as a method for making small purchases in the United States Marine Corps". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA297054.
Texto completo"December 1994." Thesis advisor(s): David V. Lamm, Louis G. Kalmar. Includes bibliographical references ( p. 119-121). Also available online.
Kubát, Martin. "Využití platebních karet v maloobchodě". Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-86054.
Texto completoChow, Wo-lap. "Promotional strategy for visa credit card in Hong Kong with respect to customers' choice criteria". [Hong Kong] : University of Hong Kong, 1992. http://sunzi.lib.hku.hk/hkuto/record.jsp?B13302322.
Texto completoBong, Kui-mein Maria. "Characteristics of active & inactive credit cardholders : a case study /". [Hong Kong : University of Hong Kong], 1985. http://sunzi.lib.hku.hk/hkuto/record.jsp?B12315126.
Texto completoVangli, Marcus Andre. "Combining graphics and video using graphics cards". Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10127.
Texto completoThis report contains an introduction to graphics and video technology. Furthermore the game Avatars-Online, which is a massive multiplayer online game is presented. Avatars-Online introduces a new concept of handling player-to-player interaction, which involves 3D-sound. The report contains the answers to the tasks presented in the assignment and which was carried out successfully. Furthermore the work of this report has lead to two interesting ideas that should be further explored: Interactive meeting rooms using graphics and 3D sound Rapid construction of high quality 3D models
Duchaine, Ellen L. "Effect of Response Cards on Academic Outcomes". Digital Archive @ GSU, 2011. http://digitalarchive.gsu.edu/epse_diss/75.
Texto completoRodriÌguez, Reyes Luis RauÌl. "Three studies on credit cards and money". Thesis, University of Essex, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.415946.
Texto completoCogan, Fabio A. Cuello. "Application of Smart Cards in the Colombian Navy Personnel Management System". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA366819.
Texto completo"June 1999". Thesis advisor(s): William J. Haga, Mark E. Nissen. Includes bibliographical references (p. 57-58). Also avaliable online.
Konečný, Jakub. "Silná kryptografie na čipových kartách". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317023.
Texto completoSvěcený, Lukáš. "Analýza nástrojů elektronického platebního styku". Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-19071.
Texto completoSilva, Marcos Vinicius Maciel da. "Securetrade: a secure protocol based on transferable E-cash for exchanging cards in P2P trading card games". Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-22092016-113539/.
Texto completoJogos de cartas colecionáveis (TCG, do inglês Trading Card Game) diferem de jogos de cartas tradicionais principalmente porque as cartas não são compartilhadas em uma partida. Especificamente, os jogadores usam suas próprias cartas (obtidas, e.g., por meio de compra ou troca com outros jogadores), as quais correspondem a um subconjunto de todas as cartas criadas pelo produtor do jogo. Embora a maioria dos TCGs digitais atuais dependam de um terceiro confiável (TTP, do ingês Trusted Third-Party) para prevenir trapaças durante trocas, permitir que os jogadores troquem cartas de maneira segura sem tal entidade, como é o caso em um cenário peer-to-peer (P2P), ainda é uma tarefa desafiadora. Possíveis soluções para esse desafio podem ser baseadas em protocolos de moeda eletrônica, mas não sem adaptações decorrentes dos requisitos diferentes de cada cenário: por exemplo, TCGs devem permitir que usuários joguem com as suas cartas, não apenas que passem-nas adiante como ocorre com moedas eletrônicas. Neste trabalho, são apresentados e discutidos os principais requisitos de segurança para trocas de cartas TCGs e como eles se relacionam com moedas eletrônicas. Também é proposto um protocolo eficiente que permite trocas de cartas sem a necessidade de um TTP e com suporte a privacidade. A construção usa como base um protocolo seguro de moeda eletrônica e um protocolo de assinatura-P adaptado para utilizar emparelhamentos assimétricos, mais seguros que os simétricos. De acordo com os experimentos realizados, o protocolo proposto é bastante eficiente para uso na prática: são necessários apenas 5 MB para armazenar um baralho inteiro, enquanto a preparação do mesmo leva apenas alguns segundos; a verificação das cartas, por sua vez, é mais rápida que a duração comum de uma partida e pode ser executada em plano de fundo, durante a própria partida.
Hartley, Mary. "Reward cards and customer loyalty in UK supermarkets". Thesis, University of Nottingham, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243763.
Texto completoFeudjo, Tepie Maurille Aime. "Modelling daily diary cards in asthma clinical trials". Thesis, London School of Hygiene and Tropical Medicine (University of London), 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.408447.
Texto completoSchoellner, Teresa Marie. "The effects of credit cards on money demand". Connect to resource, 2002. http://rave.ohiolink.edu/etdc/view.cgi?acc%5Fnum=osu1261242820.
Texto completoTeng, Po-Yuan y 鄧博元. "Simulating National Healthcare Cards by Java Cards". Thesis, 2003. http://ndltd.ncl.edu.tw/handle/03018968365900072420.
Texto completo國立成功大學
工程科學系碩博士班
91
This paper focuses on the functions of the Taiwan HealthCare IC Card , and part functions of the Secure Access Module. We examine the integrity of the Taiwan Health Card Specification by simulating the authentication between Health Card and Secure Access Module, and the data flows between these two entities by Java Cards.
Ho, Chia-Chun y 何嘉峻. "Design and Implementation of a Java-based Card Reader for IC Cards". Thesis, 2000. http://ndltd.ncl.edu.tw/handle/54398469372897101617.
Texto completo國立成功大學
工程科學系
88
This dissertation has three goals. The first goal is construction of a prototype Java Card Reader which is able to access an ISO7816 IC Card. The second is to design and implement a mechanism for dynamically replacing Java Card Reader Application(AP) , which includes security, upgrade and compatibility issues. The third is the JVM (Java Virtual Machine), which is developed by our lab., into an embedded system,such as the Card Reader.This Java Card Reader is competing with commercial Card Reader almost.As we know,this is the first prototype Card Reader designed and developed in Taiwan.
Huang, We-Ming y 黃維明. "The Market Segmentation of Credit Cards Applied To IC Card''s Promotion". Thesis, 1996. http://ndltd.ncl.edu.tw/handle/57499817763671366840.
Texto completoChan, Julia. "Alphabet cards a screenplay /". 2002. http://wwwlib.umi.com/cr/yorku/fullcit?pMQ71571.
Texto completoTypescript. Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://wwwlib.umi.com/cr/yorku/fullcit?pMQ71571.
Wan-Jhen, HUANG y 黃琬臻. "Security of ATM Cards". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/43156697900592168461.
Texto completo明新科技大學
資訊管理研究所
98
ATM cards have become an indispensable payment instrument in daily life, which offer functions such as account inquiry, cash withdrawal, payment of tax, and account transfer. However, since it involves the transfer of money, it tends to be used in criminal conducts. Since it is easy to record and replicate magnetic stripe cards, fraudulent withdrawals occur frequently. At present, magnetic stripe cards’ function of cross-bank transactions has been fully terminated in Taiwan and magnetic stripe cards are replaced by chip ATM cards. Besides the functions of magnetic stripe cards, chip ATM cards also offer functions such as web ATM payment and payment at real stores. Chip ATM cards make it possible to distinguish the bogus cards from the authentic ones and verify the user password offline, which greatly enhance the safety of ATM cards. This study investigates the characteristics, evolution, and ATM card fraud incidents, and analyzes the security mechanisms and problems of magnetic stripe cards, chip ATM cards. Finally, an improved solution is proposed. We hope that this paper can be a reference for domestic financial industry and cardholders.
"A comparative study on the credit card business in Hong Kong and People's Republic of China". Chinese University of Hong Kong, 1991. http://library.cuhk.edu.hk/record=b5886670.
Texto completoThesis (M.B.A.)--Chinese University of Hong Kong, 1991
Includes bibliographical references.
EXECUTIVE SUMMARY
ACKNOWLEDGEMENT
CHAPTER
Chapter I: --- INTRODUCTION
Operation of Credit Card System
Role of Visa and MasterCard International Inc.
Chapter II: --- BUSINESS REVIEW
Historical Development of VISA and MasterCard
Development of Credit Card Business in Hong Kong
Development of Credit Card Business in China
Chapter III: --- OBJECTIVES AND METHODOLOGY
Hypothesis
Objectives
Methodology
Chapter IV: --- RESEARCH FINDINGS AND ANALYSIS
Marketing Strategies on Credit Card Products Employed by Banks in Hong Kong and China
Product Strategy
Pricing Strategy
Promotion Strategy
Distribution Strategy-
Operating System of Credit Card Business in Hong Kong and China
Credit Approval
Authorisation
Settlement
Credit and Security Control
SWOT Analysis
SWOT Analysis of Card Business in China
SWOT Analysis of Card Business in Hong Kong
Chapter V: --- COMPARISON BASED ON MCGUIGAN MODEL
McGuigan's Conceptual Market Performance Model
Market and Environmental Conditions
Market Structure
Market Conduct
Market Performance
Chapter VI: --- CONCLUSION AND FUTURE DEVELOPMENT
APPENDICES
Chapter Appendix I: --- Historical Development of VISA and MasterCard
Chapter Appendix II : --- Development of Credit Card Business in Hong Kong
Chapter Appendix III : --- Development of Credit Card Business in China
Chapter Appendix IV : --- Questionnaire Design (English and Chinese Version)
Chapter Appendix V : --- Background Information of Interviewees
Chapter Appendix VI : --- Interview Question Lists
Chapter Appendix VII : --- Different Credit Cards in Hong Kong
Chapter Appendix VIII : --- Different Credit Cards in China
BIBLIOGRAPHY
Shiu, Chun-Wei y 許俊偉. "Discussion of Financial Institution's Bad Debt Regarding to Credit Cards and Cash Cards". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/57465396609739362856.
Texto completo亞洲大學
國際企業學系碩士班
94
In recent years, consuming finance has become one of the major profit sources of banks. Among them, small credit loan, credit card and cash card have become the main products to be promoted. By doing so, banks hope to obtain more business opportunities, and the growth of cash cards is far more fast. In addition, the cash card extremely similar to goods quality of the credit card and has complementarity, make every bank introduce the business of credit cards and cash cards. the card bank is in order to open up the business, it is strict to verify incompletely, Cause a person to have many cards , the holder does not know how to weigh one's own financial situation and adjust Speed expanded of the personal credit, cause oneself debt. bad debt of the bank to be too much, have formed the debt storm of the card . this research use unobtrusive measures to probe into the relevant card debt question in four respects that the debt consultation mechanism, circulation interest rate of the bank, individual reorganization, asset management corporation and propose solving the suggestion of the debt problem of the card. The results : (1)It is comparatively rational for the circulation interest rate of the bank of our country to compare with various countries, if adjust and lower the interest rate, not only can not solve the debt problem of the card but also cause influence on the economy and society of our country. (2)The debt consultation mechanism can not solve the problem of the high debt group, and this mechanism regulation is too loose, it is apt to be abused by the speculator. (3)Observing America and Japan can solve the financial crisis and bankrupt too much problem of personal credit smoothly, establishment of the debt consultation mechanism and individual reorganization is all very key factors. (4)This research is thought to solve the problem of the card debt, need to establish the debt consultation mechanism with independent character rapidly, manage company's fund sufficiently, can receive debts of the hign debt group, and because have independent character, will be more efficient.
Αντωνόπουλος, Νικόλαος. "Έξυπνες κάρτες". 2008. http://nemertes.lis.upatras.gr/jspui/handle/10889/1307.
Texto completoIn the present diploma thesis we study the smart cards in addition to the technologies that are related with them. Particular accent is given in the Java Card technology which we use in order to develop a demo application of a patient’s smart card. In the first chapter we set out general characteristics of smart cards. We make a short historical retrospection and we study some particular fields in which they are applicable, presenting their advantages. In the second chapter we refer to the architecture and hardware of smart cards. After we present the variety of the existing smart cards we overhaul the hardware of smart cards, for example CPU, memory etc. In the third chapter we examine the software of smart cards. We set out the way of communication with the card, in the existing operating systems for smart cards as well as in the models that have dominated. Closing the chapter we make a short reference in smart card’s cryptography. In the fourth chapter we make a more detailed reference to Java Card technology. We study the architecture and the components of this technology which are the virtual machine and the executing environment. We also refer to various subjects relevant with this technology. In the fifth and last chapter we deal with the development of a demo application. It is a smart card that is used widely in many hospitals around the world. It is used by these hospitals’ patients. After we show the functional and technical specifications we refer to designing issues of this application and finally we demonstrate their way of operation.
Yeh, Shu-Wan y 葉淑婉. "Risk Bearing in Credit Card Fraud -- The Case of Lost or Stolen Cards". Thesis, 2003. http://ndltd.ncl.edu.tw/handle/04439772527526539175.
Texto completo逢甲大學
會計與財稅所
91
Abstract The money loss due to credit card fraud in Taiwan is more than three billion NT dollars from 2000.06 to 2001.06. These years the number of suits about credit card fraud also skyrockets. Risk bearing is about the key issue in these suits. We discuss risk bearing in credit card fraud and focus on the case of lost or stolen cards. The liability in credit card fraud, likes product liability, located on the border between contract and tort. Here we use economic theories of contract and tort analyzing efficient risk bearing in credit card fraud. That means the way we allocate risk should give both the credit card holders and issuers the incentive to take all efficient precautions. In Taiwan, the risk bearer of lost or stolen credit card was first the credit card holders but now card issuers. We find that the evolution of standard form contract of credit card responded to the verdicts of the court. However, the card holders now have no incentive to prevent the credit card fraud. We suggest that the rule of risk bearing in credit card fraud should be “Strict Liability with Contributory Negligence”, where the card issuers bear the risk unless the card holders are proved negligent.
WU, Sea Rey y 巫喜瑞. "A Study on the Marketing Strategy of Credit Cards-Affinity Cards As an Example". Thesis, 1995. http://ndltd.ncl.edu.tw/handle/47358444910363792335.
Texto completoKHENG, KER SOR y 郭素馨. "Using Smart Cards for Implementing". Thesis, 2000. http://ndltd.ncl.edu.tw/handle/45239951220128928539.
Texto completo國立交通大學
資訊管理所
88
The objective of this thesis is to design a vehicle for conveying authentication and access control information. Smart cards are the vehicle that stores credentials of their owners in the format defined in the X.509 certificate. Two types of certificates are defined. One is used to store individual information for the authentication purpose; the other is used to convey role assignments. The author designs procedures for the enrollment of these certificates and then implements these procedures in the platform of Windows 2000. Finally, a case study is conducted, showing how the certificates are used in a process of requesting for leave in organizations.
Chiou, Yaw-Huei y 邱耀輝. "Recognition of Chinese Business Cards". Thesis, 1996. http://ndltd.ncl.edu.tw/handle/19356148937561385049.
Texto completo國立交通大學
資訊工程學系
84
Business cards include many kinds of information such as name, address, andtelephone number. In order to use the information effectively, it is necessaryto extract the information from the cards automatically to build a data base. The goal of this thesis is to extract and recognize characters from color business cards. The styles of business cards varies greatly. Some marks andlines may appear on the cards, and some cards are color. These problems will make the recognition of business cards difficult.To separate the foreground from the background, we assign all pixels into eight color types: black, white, red, green, blue, yellow, cyan, and magenta. Then we calculate a dynamic threshold using the color information to extract the foreground. Next, we extract the characters by four main modules: connected component extraction, local thresholding, mark, line and noise deletion and character grouping. Connected components are found to represent character candidates and local thresholding is used to improve the image quality. Marks,noise and lines are finally deleted from the components extracted using some size information we collect from training business cards. Character grouping isused to group the related characters and correct the character blocks by using the groups. Finally, we send the characters to statistic-based Chinese and English character recognition systems. We show the top ten candidates recognized in a user-friendly Windows-based interface. Users can use a mouse to select correct candidates to replace wrong results. We store the final results in the database.We test 30 business cards, which have Chinese characters, English characters, numerals and punctuation marks. The extraction rate and accuracy rate for our system are 96.97% and 95.43% respectively. The recognition rate for Chinese characters is 88.78% and the average recognition rate for English characters, numerals and punctuation marks can reach 97.58%.