نتایج جستجو برای: cards model

تعداد نتایج: 2113502  

2001
Haiying Grunenwald

Dried blood spots collected on Specimen Collection Cards, commonly called “Guthrie cards” (Figure 1), have been used widely as valuable resources for genetic studies, such as, determination of hereditary diseases like phenylketonuria and congenital hypothyroidism. The ease of storage and transportation of these cards with blood spots also lends them to a variety of large field studies, especial...

2011
Michael H. Albert Andrés Cordón-Franco Hans van Ditmarsch David Fernández-Duque Joost J. Joosten Fernando Soler-Toscano

Given an interpreted system, we investigate ways for two agents to communicate secrets by public announcements. For card deals, the problem to keep all of your cards a secret (i) can be distinguished from the problem to keep some of your cards a secret (ii). For (i): we characterize a novel class of protocols consisting of two announcements, for the case where two agents both hold n cards and t...

2002
Shinichi Hirai Masamitsu Ukai Ken Yamada Koji Sugita

A new approach to the separation of multiple stacked cards is presented. Separation of multiple stacked cards is a key operation in many mechatronic devices such as copy machines and cash dispensers. Separation must be performed in small operation area despite of water and oil on the cards. In this article, we will develop a new system to separate multiple stacked cards using an array of absorp...

2006
Adam Joinson

• An Identity Card issued alongside a passport without an opt-out is seen as significantly more compulsory than an opt-out system. • Providing an opt-out to the Identity (ID) Card process during application increases support for ID Cards, but not significantly, and reduces the certainty of those opposed to ID Cards. • Distrust in the UK Government, alongside the perceived privacy threat of ID C...

1994
Audun Josang

There is a need for assessing the security of smart cards by an independent third party, specially if multi-application smart cards become reality. Intuitively, the methods to obtain this could be derived from the computer industry where security evaluation already is commonplace, but because of the special properties of smart cards, this seems very diicult. The article discusses the problems r...

Journal: :CoRR 2011
Othman Ahmad

Matlab version 7.1 had been used to detect playing cards on a Casino table and the suits and ranks of these cards had been identified. The process gives an example of an application of computer vision to a problem where rectangular objects are to be detected and the information content of the objects are extracted out. In the case of playing cards, it is the suit and rank of each card. The imag...

2016
Daniel Gooch

Christmas is the time of year when people reaffirm social connections through the medium of Christmas cards. Although much communication in the modern age is conducted via electronic means, many people continue to send and receive paper-based cards during the festive season. With a view to understanding practices surrounding the use of digital and paperbased media, this paper explores the use o...

2003
Franklin J. Eppig John A. Poisal

Drug, Improvement and Modernization Act of 2003, authorizes the implementation of the Medicare-Approved Drug Discount Card Program. This program is designed to help people in Medicare with the cost of prescription drugs. In the past several years as prescription drugs have increased, a number of Medicare beneficiaries have begun to use drug discount cards for outof-pocket expenditures. In the l...

2017
ESTEBAN LANDERRECHE

In the Russian Cards problem, Alice wants to communicate her hand from a deck of cards to Bob through one public announcement such that Cath does not learn her hand. In zero-error source coding, Alice’s goal is to communicate her information to Bob with the least amount of bits. Both problems share the goal of Bob learning Alice’s information in one announcement. However, they have additional o...

2015
Divya Singh Rakesh Pandit

As in present scenario the credit cards or netbanking is very popular and most preferred mode of transaction.The security of these transaction is also a major issue.In this paper we have given the theory to use three key factors of check on any transaction which is firstly trained by the HMM.This is to make the transactions more secure than the previously given theories.We firstly create the be...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید