WorldWideScience

Sample records for digital steganography focusing

  1. Steganography and Steganalysis in Digital Images

    Science.gov (United States)

    2012-01-01

    REPORT Steganography and Steganalysis in Digital Images 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Steganography (from the Greek for "covered writing...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Least Significant Bit ( LSB ), steganography , steganalysis, stegogramme. Dr. Jeff Duffany...Z39.18 - Steganography and Steganalysis in Digital Images Report Title ABSTRACT Steganography (from the Greek for "covered writing") is the secret

  2. Digital watermarking and steganography fundamentals and techniques

    CERN Document Server

    Shih, Frank Y

    2007-01-01

    Introduction Digital Watermarking Digital Steganography Differences between Watermarking and Steganography A Brief History Appendix: Selected List of Books on Watermarking and Steganography Classification in Digital Watermarking Classification Based on Characteristics Classification Based on Applications Mathematical Preliminaries  Least-Significant-Bit Substitution Discrete Fourier Transform (DFT) Discrete Cosine Transform Discrete Wavelet Transform Random Sequence Generation  The Chaotic M

  3. COMPARISON OF DIGITAL IMAGE STEGANOGRAPHY METHODS

    Directory of Open Access Journals (Sweden)

    S. A. Seyyedi

    2013-01-01

    Full Text Available Steganography is a method of hiding information in other information of different format (container. There are many steganography techniques with various types of container. In the Internet, digital images are the most popular and frequently used containers. We consider main image steganography techniques and their advantages and disadvantages. We also identify the requirements of a good steganography algorithm and compare various such algorithms.

  4. DIGITAL DATA PROTECTION USING STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    R. Rejani

    2016-03-01

    Full Text Available In today’s digital world applications from a computer or a mobile device consistently used to get every kind of work done for professional as well as entertainment purpose. However, one of the major issue that a software publisher will face is the issue of piracy. Throughout the last couple of decades, almost all-major or minor software has been pirated and freely circulated across the internet. The impact of the rampant software piracy has been huge and runs into billions of dollars every year. For an independent developer or a programmer, the impact of piracy will be huge. Huge companies that make specialized software often employ complex hardware methods such as usage of dongles to avoid software piracy. However, this is not possible to do for a normal independent programmer of a small company. As part of the research, a new method of software protection that does not need proprietary hardware and other complex methods are proposed in this paper. This method uses a combination of inbuilt hardware features as well as steganography and encryption to protect the software against piracy. The properties or methods used include uniqueness of hardware, steganography, strong encryption like AES and geographic location. To avoid hacking the proposed framework also makes use of self-checks in a random manner. The process is quite simple to implement for any developer and is usable on both traditional PCs as well as mobile environments.

  5. Survey Report – State Of The Art In Digital Steganography Focusing ASCII Text Documents

    OpenAIRE

    Khan Farhan Rafat; Muhammad Sher

    2010-01-01

    Digitization of analogue signals has opened up new avenues for information hiding and the recent advancements in the telecommunication field has taken up this desire even further. From copper wire to fiber optics, technology has evolved and so are ways of covert channel communication. By “Covert” we mean “anything not meant for the purpose for which it is being used”. Investigation and detection of existence of such cover channel communication has always remained a serious concern of informat...

  6. State Of The Art In Digital Steganography Focusing ASCII Text Documents

    OpenAIRE

    Rafat, Khan Farhan; Sher, Muhammad

    2010-01-01

    Digitization of analogue signals has opened up new avenues for information hiding and the recent advancements in the telecommunication field has taken up this desire even further. From copper wire to fiber optics, technology has evolved and so are ways of covert channel communication. By "Covert" we mean "anything not meant for the purpose for which it is being used". Investigation and detection of existence of such cover channel communication has always remained a serious concern of informat...

  7. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  8. Focus: Digital

    DEFF Research Database (Denmark)

    Technology has been an all-important and defining element within the arts throughout the 20th century, and it has fundamentally changed the ways in which we produce and consume music. With this Focus we investigate the latest developments in the digital domain – and their pervasiveness and rapid...... production and reception of contemporary music and sound art. With ‘Digital’ we present four composers' very different answers to how technology impact their work. To Juliana Hodkinson it has become an integral part of her sonic writing. Rudiger Meyer analyses the relationships between art and design and how...

  9. Investigator's guide to steganography

    CERN Document Server

    Kipper, Gregory

    2003-01-01

    The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its earliest beginnings to its most modern uses. The book begins by exploring the past, providing valuable insight into how this method of communication began and evolved from ancient times to the present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and a review of companies who are providing cutting edge steganography and watermarking services. The third section builds on the first two by outlining and discussing real world uses of steganography from the business and entertainment to national security and terrorism. The book concludes by reviewing steganography detection methods and what can be expected in the future

  10. Spread spectrum image steganography.

    Science.gov (United States)

    Marvel, L M; Boncelet, C R; Retter, C T

    1999-01-01

    In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

  11. Multimedia security watermarking, steganography, and forensics

    CERN Document Server

    Shih, Frank Y

    2012-01-01

    Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications rapidly evolve, this book presents a wealth of everyday protection application examples in fields including multimedia mining and classification, digital watermarking, steganography, and digital forensics. Giving readers an in-depth overview of different asp

  12. An Analysis of Perturbed Quantization Steganography in the Spatial Domain

    Science.gov (United States)

    2005-03-01

    Transform Domain While LSB steganography hides data in the least significant areas of image pixels, this data is not robust against lossy digital...introduced a technique for detecting least significant bit ( LSB ) steganography in digital images called RS Steganalysis. RS Steganalysis produces a...the function has the effect of additive noise similar to that introduced by pixel based LSB steganography . In clean cover images , the flipping

  13. Wireless steganography

    Science.gov (United States)

    Agaian, Sos S.; Akopian, David; D'Souza, Sunil

    2006-02-01

    Modern mobile devices are some of the most technologically advanced devices that people use on a daily basis and the current trends in mobile phone technology indicate that tasks achievable by mobile devices will soon exceed our imagination. This paper undertakes a case study of the development and implementation of one of the first known steganography (data hiding) applications on a mobile device. Steganography is traditionally accomplished using the high processing speeds of desktop or notebook computers. With the introduction of mobile platform operating systems, there arises an opportunity for the users to develop and embed their own applications. We take advantage of this opportunity with the introduction of wireless steganographic algorithms. Thus we demonstrates that custom applications, popular with security establishments, can be developed also on mobile systems independent of both the mobile device manufacturer and mobile service provider. For example, this might be a very important feature if the communication is to be controlled exclusively by authorized personnel. The paper begins by reviewing the technological capabilities of modern mobile devices. Then we address a suitable development platform which is based on Symbian TM/Series60 TM architecture. Finally, two data hiding applications developed for Symbian TM/Series60 TM mobile phones are presented.

  14. Steganography: LSB Methodology

    Science.gov (United States)

    2012-08-02

    of LSB steganography in grayscale and color images . In J. Dittmann, K. Nahrstedt, and P. Wohlmacher, editors, Proceedings of the ACM, Special...Fridrich, M. Gojan and R. Du paper titled “Reliable detection of LSB steganography in grayscale and color images ”. From a general perspective Figure 2...REPORT Steganography : LSB Methodology (Progress Report) 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: In computer science, steganography is the science

  15. Forensic analysis of video steganography tools

    Directory of Open Access Journals (Sweden)

    Thomas Sloan

    2015-05-01

    Full Text Available Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities. In this work, we examine the embedding algorithms and other security characteristics of several video steganography tools. We show how all feature basic and severe security weaknesses. This is potentially a very serious threat to the security, privacy and anonymity of their users. It is important to highlight that most steganography users have perfectly legal and ethical reasons to employ it. Some common scenarios would include citizens in oppressive regimes whose freedom of speech is compromised, people trying to avoid massive surveillance or censorship, political activists, whistle blowers, journalists, etc. As a result of our findings, we strongly recommend ceasing any use of these tools, and to remove any contents that may have been hidden, and any carriers stored, exchanged and/or uploaded online. For many of these tools, carrier files will be trivial to detect, potentially compromising any hidden data and the parties involved in the communication. We finish this work by presenting our steganalytic results, that highlight a very poor current state of the art in practical video steganography tools. There is unfortunately a complete lack of secure and publicly available tools, and even commercial tools offer very poor security. We therefore encourage the steganography community to work towards the development of more secure and accessible video steganography tools, and make them available for the general public. The results presented in this work can also be seen as a useful

  16. Adaptive steganography

    Science.gov (United States)

    Chandramouli, Rajarathnam; Li, Grace; Memon, Nasir D.

    2002-04-01

    Steganalysis techniques attempt to differentiate between stego-objects and cover-objects. In recent work we developed an explicit analytic upper bound for the steganographic capacity of LSB based steganographic techniques for a given false probability of detection. In this paper we look at adaptive steganographic techniques. Adaptive steganographic techniques take explicit steps to escape detection. We explore different techniques that can be used to adapt message embedding to the image content or to a known steganalysis technique. We investigate the advantages of adaptive steganography within an analytical framework. We also give experimental results with a state-of-the-art steganalysis technique demonstrating that adaptive embedding results in a significant number of bits embedded without detection.

  17. Comparison of Video Steganography Methods for Watermark Embedding

    Directory of Open Access Journals (Sweden)

    Griberman David

    2016-05-01

    Full Text Available The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.

  18. Multi-Class Classification for Identifying JPEG Steganography Embedding Methods

    Science.gov (United States)

    2008-09-01

    digital pictures on Web sites or sending them through email (Astrowsky, 2000). Steganography may also be used to allow communication between affiliates...B.H. (2000). STEGANOGRAPHY: Hidden Images, A New Challenge in the Fight Against Child Porn . UPDATE, Volume 13, Number 2, pp. 1-4, Retrieved June 3

  19. Steganography and Cryptography Inspired Enhancement of Introductory Programming Courses

    Science.gov (United States)

    Kortsarts, Yana; Kempner, Yulia

    2015-01-01

    Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…

  20. Preserving privacy of online digital physiological signals using blind and reversible steganography.

    Science.gov (United States)

    Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; Lei, Chin-Laung

    2017-11-01

    Physiological signals such as electrocardiograms (ECG) and electromyograms (EMG) are widely used to diagnose diseases. Presently, the Internet offers numerous cloud storage services which enable digital physiological signals to be uploaded for convenient access and use. Numerous online databases of medical signals have been built. The data in them must be processed in a manner that preserves patients' confidentiality. A reversible error-correcting-coding strategy will be adopted to transform digital physiological signals into a new bit-stream that uses a matrix in which is embedded the Hamming code to pass secret messages or private information. The shared keys are the matrix and the version of the Hamming code. An online open database, the MIT-BIH arrhythmia database, was used to test the proposed algorithms. The time-complexity, capacity and robustness are evaluated. Comparisons of several evaluations subject to related work are also proposed. This work proposes a reversible, low-payload steganographic scheme for preserving the privacy of physiological signals. An (n,  m)-hamming code is used to insert (n - m) secret bits into n bits of a cover signal. The number of embedded bits per modification is higher than in comparable methods, and the computational power is efficient and the scheme is secure. Unlike other Hamming-code based schemes, the proposed scheme is both reversible and blind. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. Towards Statistically Undetectable Steganography

    Science.gov (United States)

    2011-06-30

    payload size. Middle, payload proportional to y/N. Right, proportional to N. LSB replacement steganography in never-compressed cover images , detected... Images for Applications in Steganography ," IEEE Trans, on Info. Forensics and Security, vol. 3(2), pp. 247-258, 2008. Conference papers. (1) T. Filler...SPLE, Electronic Imaging , Security, Forensics, Steganography , and Watermarking of Mul- timedia Contents X, San Jose, CA, January 26-31, pp. 11-1-11-13

  2. New methods to improve the pixel domain steganography, steganalysis, and simplify the assessment of steganalysis tools

    OpenAIRE

    Khalind, Omed Saleem

    2015-01-01

    Unlike other security methods, steganography hides the very existence of secret messages rather than their content only. Both steganography and steganalysis are strongly related to each other, the new steganographic methods should be evaluated with current steganalysis methods and vice-versa. Since steganography is considered broken when the stego object is recognised, undetectability would be the most important property of any steganographic system. Digital image files are excellent media fo...

  3. Steganography Detection Using Entropy Measures

    Science.gov (United States)

    2012-11-16

    latter leads to the level of compression of the image . 3.3. Least Significant Bit ( LSB ) The object of steganography is to prevent suspicion upon the...6 2.3. Different kinds of steganography . . . . . . . . . . . . . . . . . . . . . 6 II. Steganography 8 3. Images and Significance of...9 3.3. Least Significant Bit ( LSB ) . . . . . . . . . . . . . . . . . . . . . . . . 9 3.4. Significant Bit Image Depiction

  4. Quantum steganography using prior entanglement

    International Nuclear Information System (INIS)

    Mihara, Takashi

    2015-01-01

    Steganography is the hiding of secret information within innocent-looking information (e.g., text, audio, image, video, etc.). A quantum version of steganography is a method based on quantum physics. In this paper, we propose quantum steganography by combining quantum error-correcting codes with prior entanglement. In many steganographic techniques, embedding secret messages in error-correcting codes may cause damage to them if the embedded part is corrupted. However, our proposed steganography can separately create secret messages and the content of cover messages. The intrinsic form of the cover message does not have to be modified for embedding secret messages. - Highlights: • Our steganography combines quantum error-correcting codes with prior entanglement. • Our steganography can separately create secret messages and the content of cover messages. • Errors in cover messages do not have affect the recovery of secret messages. • We embed a secret message in the Steane code as an example of our steganography

  5. Quantum steganography using prior entanglement

    Energy Technology Data Exchange (ETDEWEB)

    Mihara, Takashi, E-mail: mihara@toyo.jp

    2015-06-05

    Steganography is the hiding of secret information within innocent-looking information (e.g., text, audio, image, video, etc.). A quantum version of steganography is a method based on quantum physics. In this paper, we propose quantum steganography by combining quantum error-correcting codes with prior entanglement. In many steganographic techniques, embedding secret messages in error-correcting codes may cause damage to them if the embedded part is corrupted. However, our proposed steganography can separately create secret messages and the content of cover messages. The intrinsic form of the cover message does not have to be modified for embedding secret messages. - Highlights: • Our steganography combines quantum error-correcting codes with prior entanglement. • Our steganography can separately create secret messages and the content of cover messages. • Errors in cover messages do not have affect the recovery of secret messages. • We embed a secret message in the Steane code as an example of our steganography.

  6. Quantum red-green-blue image steganography

    Science.gov (United States)

    Heidari, Shahrokh; Pourarian, Mohammad Rasoul; Gheibi, Reza; Naseri, Mosayeb; Houshmand, Monireh

    One of the most considering matters in the field of quantum information processing is quantum data hiding including quantum steganography and quantum watermarking. This field is an efficient tool for protecting any kind of digital data. In this paper, three quantum color images steganography algorithms are investigated based on Least Significant Bit (LSB). The first algorithm employs only one of the image’s channels to cover secret data. The second procedure is based on LSB XORing technique, and the last algorithm utilizes two channels to cover the color image for hiding secret quantum data. The performances of the proposed schemes are analyzed by using software simulations in MATLAB environment. The analysis of PSNR, BER and Histogram graphs indicate that the presented schemes exhibit acceptable performances and also theoretical analysis demonstrates that the networks complexity of the approaches scales squarely.

  7. Secure Image Steganography Algorithm Based on DCT with OTP Encryption

    Directory of Open Access Journals (Sweden)

    De Rosal Ignatius Moses Setiadi

    2017-04-01

    Full Text Available Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR and ormalize cross Correlation (NCC to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT, One Time Pad, Vernam, Chiper, Image Cryptography

  8. Noiseless Steganography The Key to Covert Communications

    CERN Document Server

    Desoky, Abdelrahman

    2012-01-01

    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise b

  9. Detection of Steganography-Producing Software Artifacts on Crime-Related Seized Computers

    Directory of Open Access Journals (Sweden)

    Asawaree Kulkarni

    2009-06-01

    Full Text Available Steganography is the art and science of hiding information within information so that an observer does not know that communication is taking place. Bad actors passing information using steganography are of concern to the national security establishment and law enforcement. An attempt was made to determine if steganography was being used by criminals to communicate information. Web crawling technology was used and images were downloaded from Web sites that were considered as likely candidates for containing information hidden using steganographic techniques. A detection tool was used to analyze these images. The research failed to demonstrate that steganography was prevalent on the public Internet. The probable reasons included the growth and availability of large number of steganography-producing tools and the limited capacity of the detection tools to cope with them. Thus, a redirection was introduced in the methodology and the detection focus was shifted from the analysis of the ‘product’ of the steganography-producing software; viz. the images, to the 'artifacts’ left by the steganography-producing software while it is being used to generate steganographic images. This approach was based on the concept of ‘Stego-Usage Timeline’. As a proof of concept, a sample set of criminal computers was scanned for the remnants of steganography-producing software. The results demonstrated that the problem of ‘the detection of the usage of steganography’ could be addressed by the approach adopted after the research redirection and that certain steganographic software was popular among the criminals. Thus, the contribution of the research was in demonstrating that the limitations of the tools based on the signature detection of steganographically altered images can be overcome by focusing the detection effort on detecting the artifacts of the steganography-producing tools.

  10. Secured Data Transmission Using Wavelet Based Steganography and cryptography

    OpenAIRE

    K.Ravindra Reddy; Ms Shaik Taj Mahaboob

    2014-01-01

    Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. Another technology, the digital watermarking is the process of embedding information into a digital (image) signal. Before embedding the plain text into the image, the plain text is encrypted by using Data Encryption Standard (DES) algorithm. The encrypted text is embedded into the LL sub band of the wavelet decomposed image using Le...

  11. A Survey on different techniques of steganography

    Directory of Open Access Journals (Sweden)

    Kaur Harpreet

    2016-01-01

    Full Text Available Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is the technology that attempts to ruin the Steganography by detecting the hidden information and extracting.Steganography is the process of Data embedding in the images, text/documented, audio and video files. The paper also highlights the security improved by applying various techniques of video steganography.

  12. New quantization matrices for JPEG steganography

    Science.gov (United States)

    Yildiz, Yesna O.; Panetta, Karen; Agaian, Sos

    2007-04-01

    Modern steganography is a secure communication of information by embedding a secret-message within a "cover" digital multimedia without any perceptual distortion to the cover media, so the presence of the hidden message is indiscernible. Recently, the Joint Photographic Experts Group (JPEG) format attracted the attention of researchers as the main steganographic format due to the following reasons: It is the most common format for storing images, JPEG images are very abundant on the Internet bulletin boards and public Internet sites, and they are almost solely used for storing natural images. Well-known JPEG steganographic algorithms such as F5 and Model-based Steganography provide high message capacity with reasonable security. In this paper, we present a method to increase security using JPEG images as the cover medium. The key element of the method is using a new parametric key-dependent quantization matrix. This new quantization table has practically the same performance as the JPEG table as far as compression ratio and image statistics. The resulting image is indiscernible from an image that was created using the JPEG compression algorithm. This paper presents the key-dependent quantization table algorithm and then analyzes the new table performance.

  13. Secure steganography designed for mobile platforms

    Science.gov (United States)

    Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.

    2006-05-01

    Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.

  14. EFFICIENT ADAPTIVE STEGANOGRAPHY FOR COLOR IMAGESBASED ON LSBMR ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. Sharmila

    2012-02-01

    Full Text Available Steganography is the art of hiding the fact that communication is taking place, by hiding information in other medium. Many different carrier file formats can be used, but digital images are the most popular because of their frequent use on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques. The Least Significant Bit (LSB based approach is a simplest type of steganographic algorithm. In all the existing approaches, the decision of choosing the region within a cover image is performed without considering the relationship between image content and the size of secret message. Thus, the plain regions in the cover will be ruin after data hiding even at a low data rate. Hence choosing the edge region for data hiding will be a solution. Many algorithms are deal with edges in images for data hiding. The Paper 'Edge adaptive image steganography based on LSBMR algorithm' is a LSB steganography presented the results of algorithms on gray-scale images only. This paper presents the results of analyzing the performance of edge adaptive steganography for colored images (JPEG. The algorithms have been slightly modified for colored image implementation and are compared on the basis of evaluation parameters like peak signal noise ratio (PSNR and mean square error (MSE. This method can select the edge region depending on the length of secret message and difference between two consecutive bits in the cover image. For length of message is short, only small edge regions are utilized while on leaving other region as such. When the data rate increases, more regions can be used adaptively for data hiding by adjusting the parameters. Besides this, the message is encrypted using efficient cryptographic algorithm which further increases the security.

  15. PIXEL PATTERN BASED STEGANOGRAPHY ON IMAGES

    Directory of Open Access Journals (Sweden)

    R. Rejani

    2015-02-01

    Full Text Available One of the drawback of most of the existing steganography methods is that it alters the bits used for storing color information. Some of the examples include LSB or MSB based steganography. There are also various existing methods like Dynamic RGB Intensity Based Steganography Scheme, Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm etc that can be used to find out the steganography method used and break it. Another drawback of the existing methods is that it adds noise to the image which makes the image look dull or grainy making it suspicious for a person about existence of a hidden message within the image. To overcome these shortcomings we have come up with a pixel pattern based steganography which involved hiding the message within in image by using the existing RGB values whenever possible at pixel level or with minimum changes. Along with the image a key will also be used to decrypt the message stored at pixel levels. For further protection, both the message stored as well as the key file will be in encrypted format which can have same or different keys or decryption. Hence we call it as a RGB pixel pattern based steganography.

  16. Robust Steganography Using LSB-XOR and Image Sharing

    OpenAIRE

    Adak, Chandranath

    2013-01-01

    Hiding and securing the secret digital information and data that are transmitted over the internet is of widespread and most challenging interest. This paper presents a new idea of robust steganography using bitwise-XOR operation between stego-key-image-pixel LSB (Least Significant Bit) value and secret message-character ASCII-binary value (or, secret image-pixel value). The stego-key-image is shared in dual-layer using odd-even position of each pixel to make the system robust. Due to image s...

  17. Random linear codes in steganography

    Directory of Open Access Journals (Sweden)

    Kamil Kaczyński

    2016-12-01

    Full Text Available Syndrome coding using linear codes is a technique that allows improvement in the steganographic algorithms parameters. The use of random linear codes gives a great flexibility in choosing the parameters of the linear code. In parallel, it offers easy generation of parity check matrix. In this paper, the modification of LSB algorithm is presented. A random linear code [8, 2] was used as a base for algorithm modification. The implementation of the proposed algorithm, along with practical evaluation of algorithms’ parameters based on the test images was made.[b]Keywords:[/b] steganography, random linear codes, RLC, LSB

  18. Diffie-Hellman Key Exchange through Steganographied Images

    Directory of Open Access Journals (Sweden)

    Amine Khaldi

    2018-05-01

    Full Text Available Purpose – In a private key system, the major problem is the exchange of the key between the two parties. Diffie and Hellman have set up a way to share the key. However, this technique is not protected against a man-in-the-middle attack as the settings are not authenticated. The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. So, we will not need a digital signature or creating a secure channel to do our key exchange since only the two concerned parts are aware of this exchange. Findings – We generate a symmetric 128-bit key between two users without use of digital signature or secure channel. However, it works only on bitmap images, heavy images and sensitive to compression.

  19. New Encrypted Steganography Approach

    Directory of Open Access Journals (Sweden)

    Saba Mohammed Husain‎

    2017-12-01

    Full Text Available The proposed research Provides an approach for hiding an encrypted text in side a digital image. Where the text is encrypted in a complex manner used method of PlayFair to encrypt clear text and to increase security put lettering ciphertext on the geometric shape clockwise and then we write the ciphertext output in the form of lines, taken new ciphertext and converted to Ascii code and then to binary and hidden text in bits least importance in the picture. The results were good by PNSR scale

  20. Steganography based on pixel intensity value decomposition

    Science.gov (United States)

    Abdulla, Alan Anwar; Sellahewa, Harin; Jassim, Sabah A.

    2014-05-01

    This paper focuses on steganography based on pixel intensity value decomposition. A number of existing schemes such as binary, Fibonacci, Prime, Natural, Lucas, and Catalan-Fibonacci (CF) are evaluated in terms of payload capacity and stego quality. A new technique based on a specific representation is proposed to decompose pixel intensity values into 16 (virtual) bit-planes suitable for embedding purposes. The proposed decomposition has a desirable property whereby the sum of all bit-planes does not exceed the maximum pixel intensity value, i.e. 255. Experimental results demonstrate that the proposed technique offers an effective compromise between payload capacity and stego quality of existing embedding techniques based on pixel intensity value decomposition. Its capacity is equal to that of binary and Lucas, while it offers a higher capacity than Fibonacci, Prime, Natural, and CF when the secret bits are embedded in 1st Least Significant Bit (LSB). When the secret bits are embedded in higher bit-planes, i.e., 2nd LSB to 8th Most Significant Bit (MSB), the proposed scheme has more capacity than Natural numbers based embedding. However, from the 6th bit-plane onwards, the proposed scheme offers better stego quality. In general, the proposed decomposition scheme has less effect in terms of quality on pixel value when compared to most existing pixel intensity value decomposition techniques when embedding messages in higher bit-planes.

  1. A Novel Steganography Technique for SDTV-H.264/AVC Encoded Video

    Directory of Open Access Journals (Sweden)

    Christian Di Laura

    2016-01-01

    Full Text Available Today, eavesdropping is becoming a common issue in the rapidly growing digital network and has foreseen the need for secret communication channels embedded in digital media. In this paper, a novel steganography technique designed for Standard Definition Digital Television (SDTV H.264/AVC encoded video sequences is presented. The algorithm introduced here makes use of the compression properties of the Context Adaptive Variable Length Coding (CAVLC entropy encoder to achieve a low complexity and real-time inserting method. The chosen scheme hides the private message directly in the H.264/AVC bit stream by modifying the AC frequency quantized residual luminance coefficients of intrapredicted I-frames. In order to avoid error propagation in adjacent blocks, an interlaced embedding strategy is applied. Likewise, the steganography technique proposed allows self-detection of the hidden message at the target destination. The code source was implemented by mixing MATLAB 2010 b and Java development environments. Finally, experimental results have been assessed through objective and subjective quality measures and reveal that less visible artifacts are produced with the technique proposed by reaching PSNR values above 40.0 dB and an embedding bit rate average per secret communication channel of 425 bits/sec. This exemplifies that steganography is affordable in digital television.

  2. A New Paradigm Hidden in Steganography

    Science.gov (United States)

    2000-01-01

    the n least signi cant bits ( LSB ) of each pixel in the cov- erimage, with the n most signi cant bits (MSB) from the corresponding pixel of the image to...e.g., 2 LSB are (0,0) ) to 3 (e.g., 2 LSB are (1,1) ), it is visually impossible for Eve to detect the steganography . Of course, if Eve has knowl...cryptographic security when the steganography has failed. Simply encrypt the embedded bits so that the 2 LSB in the stegoimage appear as white noise

  3. Fast focus estimation using frequency analysis in digital holography.

    Science.gov (United States)

    Oh, Seungtaik; Hwang, Chi-Young; Jeong, Il Kwon; Lee, Sung-Keun; Park, Jae-Hyeung

    2014-11-17

    A novel fast frequency-based method to estimate the focus distance of digital hologram for a single object is proposed. The focus distance is computed by analyzing the distribution of intersections of smoothed-rays. The smoothed-rays are determined by the directions of energy flow which are computed from local spatial frequency spectrum based on the windowed Fourier transform. So our method uses only the intrinsic frequency information of the optical field on the hologram and therefore does not require any sequential numerical reconstructions and focus detection techniques of conventional photography, both of which are the essential parts in previous methods. To show the effectiveness of our method, numerical results and analysis are presented as well.

  4. On LSB Spatial Domain Steganography and Channel Capacity

    Science.gov (United States)

    2008-03-21

    reveal the hidden information should not be taken as proof that the image is now clean. The survivability of LSB type spatial domain steganography ...the mindset that JPEG compressing an image is sufficient to destroy the steganography for spatial domain LSB type stego. We agree that JPEGing...modeling of 2 bit LSB steganography shows that theoretically there is non-zero stego payload possible even though the image has been JPEGed. We wish to

  5. Implementation of IMAGE STEGANOGRAPHY Based on Random LSB

    OpenAIRE

    Ashish kumari; Shyama Sharma; Navdeep Bohra

    2012-01-01

    Steganography is the technique of hiding a private message within a file in such a manner that third party cannot know the existence of matter or the hidden information. The purpose of Steganography is to create secrete communication between the sender and the receiver byreplacing the least significant bits (LSB)of the cover image with the data bits. And in this paper we have shown that how image steganography (random and sequential LSB) works and practical understanding of what image Stegano...

  6. Researcher’s Perspective of Substitution Method on Text Steganography

    Science.gov (United States)

    Zamir Mansor, Fawwaz; Mustapha, Aida; Azah Samsudin, Noor

    2017-08-01

    The linguistic steganography studies are still in the stage of development and empowerment practices. This paper will present several text steganography on substitution methods based on the researcher’s perspective, all scholar paper will analyse and compared. The objective of this paper is to give basic information in the substitution method of text domain steganography that has been applied by previous researchers. The typical ways of this method also will be identified in this paper to reveal the most effective method in text domain steganography. Finally, the advantage of the characteristic and drawback on these techniques in generally also presented in this paper.

  7. LSB Based Quantum Image Steganography Algorithm

    Science.gov (United States)

    Jiang, Nan; Zhao, Na; Wang, Luo

    2016-01-01

    Quantum steganography is the technique which hides a secret message into quantum covers such as quantum images. In this paper, two blind LSB steganography algorithms in the form of quantum circuits are proposed based on the novel enhanced quantum representation (NEQR) for quantum images. One algorithm is plain LSB which uses the message bits to substitute for the pixels' LSB directly. The other is block LSB which embeds a message bit into a number of pixels that belong to one image block. The extracting circuits can regain the secret message only according to the stego cover. Analysis and simulation-based experimental results demonstrate that the invisibility is good, and the balance between the capacity and the robustness can be adjusted according to the needs of applications.

  8. DWT Steganography with Usage of Scrambling

    Directory of Open Access Journals (Sweden)

    Jakub Oravec

    2016-07-01

    Full Text Available This article describes image steganography technique, which uses Discrete Wavelet Transform and Standard map for storage of secret data in form of binary image. Modifications, which are done on cover image depend on its scrambled and decomposed version. To avoid unnecessary amount of changes, proposed approach marks location of altered DWT coefficients. The paper ends with illustration of yielded results and presents some possible topics for future work.

  9. STEGANOGRAPHY USAGE TO CONTROL MULTIMEDIA STREAM

    Directory of Open Access Journals (Sweden)

    Grzegorz Koziel

    2014-03-01

    Full Text Available In the paper, a proposal of new application for steganography is presented. It is possible to use steganographic techniques to control multimedia stream playback. Special control markers can be included in the sound signal and the player can detect markers and modify the playback parameters according to the hidden instructions. This solution allows for remembering user preferences within the audio track as well as allowing for preparation of various versions of the same content at the production level.

  10. Survey of the Use of Steganography over the Internet

    Directory of Open Access Journals (Sweden)

    Lavinia Mihaela DINCA

    2011-01-01

    Full Text Available This paper addressesthe use of Steganography over the Internet by terrorists. There were ru-mors in the newspapers that Steganography is being used to covert communication between terrorists, without presenting any scientific proof. Niels Provos and Peter Honeyman conducted an extensive Internet search where they analyzed over 2 million images and didn’t find a single hidden image. After this study the scientific community was divided: some believed that Niels Provos and Peter Honeyman was conclusive enough other did not. This paper describes what Steganography is and what can be used for, various Steganography techniques and also presents the studies made regarding the use of Steganography on the Internet.

  11. DigitalHub: A Repository Focused on the Future.

    Science.gov (United States)

    Ilik, Violeta; Hebal, Piotr; Olson, Anton; Wishnetsky, Susan; Pastva, Joelen; Kubilius, Ramune; Shank, Jonathan; Gutzman, Karen; Chung, Margarita; Holmes, Kristi

    2018-01-01

    The DigitalHub scholarly repository was developed and launched at the Galter Health Sciences Library for the Feinberg School of Medicine and the greater Northwestern Medicine community. The repository was designed to allow scholars the ability to create, share, and preserve a range of citable digital outputs. This article traces the evolution of DigitalHub's development and engagement activities, highlighting project challenges, innovations, success stories, and the team-based approach that was employed to successfully achieve project goals.

  12. The Design Process and User Focused Digital Spaces

    OpenAIRE

    Keating, Elaine M.

    2004-01-01

    This thesis presents a qualitative inquiry into how the graphic design process is being reconfigured within the new digital media landscape. The literature review looks at the historical relationship between graphic design and technology from the invention of the printing press to the personal computer and reviews how this relationship is again affected by the emergence of the computer as a medium for communication. The products of digital design are no longer static and fixed but are dynamic...

  13. Progressive Exponential Clustering-Based Steganography

    Directory of Open Access Journals (Sweden)

    Li Yue

    2010-01-01

    Full Text Available Cluster indexing-based steganography is an important branch of data-hiding techniques. Such schemes normally achieve good balance between high embedding capacity and low embedding distortion. However, most cluster indexing-based steganographic schemes utilise less efficient clustering algorithms for embedding data, which causes redundancy and leaves room for increasing the embedding capacity further. In this paper, a new clustering algorithm, called progressive exponential clustering (PEC, is applied to increase the embedding capacity by avoiding redundancy. Meanwhile, a cluster expansion algorithm is also developed in order to further increase the capacity without sacrificing imperceptibility.

  14. One improved LSB steganography algorithm

    Science.gov (United States)

    Song, Bing; Zhang, Zhi-hong

    2013-03-01

    It is easy to be detected by X2 and RS steganalysis with high accuracy that using LSB algorithm to hide information in digital image. We started by selecting information embedded location and modifying the information embedded method, combined with sub-affine transformation and matrix coding method, improved the LSB algorithm and a new LSB algorithm was proposed. Experimental results show that the improved one can resist the X2 and RS steganalysis effectively.

  15. New LSB-based colour image steganography method to enhance ...

    Indian Academy of Sciences (India)

    Mustafa Cem kasapbaşi

    2018-04-27

    Apr 27, 2018 ... evaluate the proposed method, comparative performance tests are carried out against different spatial image ... image steganography applications based on LSB are ..... worst case scenario could occur when having highest.

  16. The Impact of Hard Disk Firmware Steganography on Computer Forensics

    Directory of Open Access Journals (Sweden)

    Iain Sutherland

    2009-06-01

    Full Text Available The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation. The majority of available software tools and literature relating to the investigation of the structure and content contained within a hard disk drive concerns the extraction and analysis of evidence from the various file systems which can reside in the user accessible area of the disk. It is known that there are other areas of the hard disk drive which could be used to conceal information, such as the Host Protected Area and the Device Configuration Overlay. There are recommended methods for the detection and forensic analysis of these areas using appropriate tools and techniques. However, there are additional areas of a disk that have currently been overlooked.  The Service Area or Platter Resident Firmware Area is used to store code and control structures responsible for the functionality of the drive and for logging failing or failed sectors.This paper provides an introduction into initial research into the investigation and identification of issues relating to the analysis of the Platter Resident Firmware Area. In particular, the possibility that the Platter Resident Firmware Area could be manipulated and exploited to facilitate a form of steganography, enabling information to be concealed by a user and potentially from a digital forensic investigator.

  17. Steganography and Prospects of Its Application in Protection of Printing Documents

    Directory of Open Access Journals (Sweden)

    M. O. Zhmakin

    2010-09-01

    Full Text Available In the article the principle of steganography reveals. Three modern directions of concealment of the information are presented. Application classical steganography in printing prints is described.

  18. CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Cemal Kocak

    2017-03-01

    Full Text Available Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio and SSIM (Structural Similarity Index. In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD method, Simulated Annealing (SA Algorithm and Mix column transform based on irreducible polynomial mathematics methods.

  19. Quantum color image watermarking based on Arnold transformation and LSB steganography

    Science.gov (United States)

    Zhou, Ri-Gui; Hu, Wenwen; Fan, Ping; Luo, Gaofeng

    In this paper, a quantum color image watermarking scheme is proposed through twice-scrambling of Arnold transformations and steganography of least significant bit (LSB). Both carrier image and watermark images are represented by the novel quantum representation of color digital images model (NCQI). The image sizes for carrier and watermark are assumed to be 2n×2n and 2n‑1×2n‑1, respectively. At first, the watermark is scrambled into a disordered form through image preprocessing technique of exchanging the image pixel position and altering the color information based on Arnold transforms, simultaneously. Then, the scrambled watermark with 2n‑1×2n‑1 image size and 24-qubit grayscale is further expanded to an image with size 2n×2n and 6-qubit grayscale using the nearest-neighbor interpolation method. Finally, the scrambled and expanded watermark is embedded into the carrier by steganography of LSB scheme, and a key image with 2n×2n size and 3-qubit information is generated at the meantime, which only can use the key image to retrieve the original watermark. The extraction of watermark is the reverse process of embedding, which is achieved by applying a sequence of operations in the reverse order. Simulation-based experimental results involving different carrier and watermark images (i.e. conventional or non-quantum) are simulated based on the classical computer’s MATLAB 2014b software, which illustrates that the present method has a good performance in terms of three items: visual quality, robustness and steganography capacity.

  20. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  1. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    Science.gov (United States)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  2. Online Voting System Based on Image Steganography and Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Biju Issac

    2017-01-01

    Full Text Available This paper discusses the implementation of an online voting system based on image steganography and visual cryptography. The system was implemented in Java EE on a web-based interface, with MySQL database server and Glassfish application server as the backend. After considering the requirements of an online voting system, current technologies on electronic voting schemes in published literature were examined. Next, the cryptographic and steganography techniques best suited for the requirements of the voting system were chosen, and the software was implemented. We have incorporated in our system techniques like the password hashed based scheme, visual cryptography, F5 image steganography and threshold decryption cryptosystem. The analysis, design and implementation phase of the software development of the voting system is discussed in detail. We have also used a questionnaire survey and did the user acceptance testing of the system.

  3. Re-Imagining the Nature of (Student-Focused) Learning through Digital Technology

    Science.gov (United States)

    Hood, Nina

    2018-01-01

    Digital technology is frequently positioned as being central to the establishment of a 'future focused' education system that provides high quality student-focused learning opportunities and re-envisioned educational outcomes. While recognising the potential of technology, this paper explores some of the questions about its role in education and…

  4. Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

    Science.gov (United States)

    Yu, Lifang; Zhao, Yao; Ni, Rongrong; Li, Ting

    2010-12-01

    We propose a novel steganographic method in JPEG images with high performance. Firstly, we propose improved adaptive LSB steganography, which can achieve high capacity while preserving the first-order statistics. Secondly, in order to minimize visual degradation of the stego image, we shuffle bits-order of the message based on chaos whose parameters are selected by the genetic algorithm. Shuffling message's bits-order provides us with a new way to improve the performance of steganography. Experimental results show that our method outperforms classical steganographic methods in image quality, while preserving characteristics of histogram and providing high capacity.

  5. A novel quantum steganography scheme for color images

    Science.gov (United States)

    Li, Panchi; Liu, Xiande

    In quantum image steganography, embedding capacity and security are two important issues. This paper presents a novel quantum steganography scheme using color images as cover images. First, the secret information is divided into 3-bit segments, and then each 3-bit segment is embedded into the LSB of one color pixel in the cover image according to its own value and using Gray code mapping rules. Extraction is the inverse of embedding. We designed the quantum circuits that implement the embedding and extracting process. The simulation results on a classical computer show that the proposed scheme outperforms several other existing schemes in terms of embedding capacity and security.

  6. Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Yu Lifang

    2010-01-01

    Full Text Available We propose a novel steganographic method in JPEG images with high performance. Firstly, we propose improved adaptive LSB steganography, which can achieve high capacity while preserving the first-order statistics. Secondly, in order to minimize visual degradation of the stego image, we shuffle bits-order of the message based on chaos whose parameters are selected by the genetic algorithm. Shuffling message's bits-order provides us with a new way to improve the performance of steganography. Experimental results show that our method outperforms classical steganographic methods in image quality, while preserving characteristics of histogram and providing high capacity.

  7. Quantum steganography with noisy quantum channels

    International Nuclear Information System (INIS)

    Shaw, Bilal A.; Brun, Todd A.

    2011-01-01

    Steganography is the technique of hiding secret information by embedding it in a seemingly ''innocent'' message. We present protocols for hiding quantum information by disguising it as noise in a codeword of a quantum error-correcting code. The sender (Alice) swaps quantum information into the codeword and applies a random choice of unitary operation, drawing on a secret random key she shares with the receiver (Bob). Using the key, Bob can retrieve the information, but an eavesdropper (Eve) with the power to monitor the channel, but without the secret key, cannot distinguish the message from channel noise. We consider two types of protocols: one in which the hidden quantum information is stored locally in the codeword, and another in which it is embedded in the space of error syndromes. We analyze how difficult it is for Eve to detect the presence of secret messages, and estimate rates of steganographic communication and secret key consumption for specific protocols and examples of error channels. We consider both the case where there is no actual noise in the channel (so that all errors in the codeword result from the deliberate actions of Alice), and the case where the channel is noisy and not controlled by Alice and Bob.

  8. SCOPES: steganography with compression using permutation search

    Science.gov (United States)

    Boorboor, Sahar; Zolfaghari, Behrouz; Mozafari, Saadat Pour

    2011-10-01

    LSB (Least Significant Bit) is a widely used method for image steganography, which hides the secret message as a bit stream in LSBs of pixel bytes in the cover image. This paper proposes a variant of LSB named SCOPES that encodes and compresses the secret message while being hidden through storing addresses instead of message bytes. Reducing the length of the stored message improves the storage capacity and makes the stego image visually less suspicious to the third party. The main idea behind the SCOPES approach is dividing the message into 3-character segments, seeking each segment in the cover image and storing the address of the position containing the segment instead of the segment itself. In this approach, every permutation of the 3 bytes (if found) can be stored along with some extra bits indicating the permutation. In some rare cases the segment may not be found in the image and this can cause the message to be expanded by some overhead bits2 instead of being compressed. But experimental results show that SCOPES performs overlay better than traditional LSB even in the worst cases.

  9. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Fadhil Mahmood

    2013-04-01

    Full Text Available     Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.        In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.      This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secures data transmission applications

  10. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Mahmood

    2014-04-01

    Full Text Available Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.  In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.  This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secure data transmission applications

  11. COMPARATIVE STUDY OF EDGE BASED LSB MATCHING STEGANOGRAPHY FOR COLOR IMAGES

    Directory of Open Access Journals (Sweden)

    A.J. Umbarkar

    2016-02-01

    Full Text Available Steganography is a very pivotal technique mainly used for covert transfer of information over a covert communication channel. This paper proposes a significant comparative study of the spatial LSB domain technique that focuses on sharper edges of the color as well as gray scale images for the purpose of data hiding and hides secret message first in sharper edge regions and then in smooth regions of the image. Message embedding depends on content of the image and message size. The experimental results illustrate that, for low embedding rate the method hides the message in sharp edges of cover image to get better stego image visualization quality. For high embedding rate, smooth regions and edges of the cover image are used for the purpose of data hiding. In this steganography method, color image and textured kind of image preserves better visual quality of stego image. The novelty of the comparative study is that, it helps to analyze the efficiency and performance of the method as it gives better results because it directly works on color images instead of converting to gray scale image.

  12. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  13. Deformation of digital holograms for full control of focus and for extending the depth of field

    Energy Technology Data Exchange (ETDEWEB)

    Paturzo, M; Memmolo, P; Finizio, A; Ferraro, P, E-mail: pietro.ferraro@inoa.i [CNR-Istituto Nazionale di Ottica Applicata and Istituto di Cibernetica, via Campi Flegrei 34, 80078 Pozzuoli (Italy)

    2010-02-01

    We present a new method to manage the depth of focus in holograms numerical reconstructions through an adaptive deformation of the digital holograms. We demonstrate that this technique can be applied both to Fourier and Fresnel holograms. The experimental results, in agreement with the theoretical model, are shown and commented for both these configurations.

  14. Exploring How Usage-Focused Business Models Enable Circular Economy through Digital Technologies

    Directory of Open Access Journals (Sweden)

    Gianmarco Bressanelli

    2018-02-01

    Full Text Available Recent studies advocate that digital technologies are key enabling factors for the introduction of servitized business models. At the same time, these technologies support the implementation of the circular economy (CE paradigm into businesses. Despite this general agreement, the literature still overlooks how digital technologies enable such a CE transition. To fill the gap, this paper develops a conceptual framework, based on the literature and a case study of a company implementing a usage-focused servitized business model in the household appliance industry. This study focuses on the Internet of Things (IoT, Big Data, and analytics, and identifies eight specific functionalities enabled by such technologies (improving product design, attracting target customers, monitoring and tracking product activity, providing technical support, providing preventive and predictive maintenance, optimizing the product usage, upgrading the product, enhancing renovation and end-of-life activities. By investigating how these functionalities affect three CE value drivers (increasing resource efficiency, extending lifespan, and closing the loop, the conceptual framework developed in this paper advances knowledge about the role of digital technologies as an enabler of the CE within usage-focused business models. Finally, this study shows how digital technologies help overcome the drawback of usage-focused business models for the adoption of CE pointed out by previous literature.

  15. "It is always a lot of fun!" : exploring dimensions of digital game experience using focus group methodology

    NARCIS (Netherlands)

    Poels, K.; Kort, de Y.A.W.; IJsselsteijn, W.A.

    2007-01-01

    This paper focuses on digital game experience: the feelings and experiences people have when they play digital games. Digital game experience is not a one-dimensional concept. Great variety exists in game genres and game players, and game experiences will differ accordingly. To date, game experience

  16. The use of low cost compact cameras with focus stacking functionality in entomological digitization projects

    Directory of Open Access Journals (Sweden)

    Jan Mertens

    2017-10-01

    Full Text Available Digitization of specimen collections has become a key priority of many natural history museums. The camera systems built for this purpose are expensive, providing a barrier in institutes with limited funding, and therefore hampering progress. An assessment is made on whether a low cost compact camera with image stacking functionality can help expedite the digitization process in large museums or provide smaller institutes and amateur entomologists with the means to digitize their collections. Images of a professional setup were compared with the Olympus Stylus TG-4 Tough, a low-cost compact camera with internal focus stacking functions. Parameters considered include image quality, digitization speed, price, and ease-of-use. The compact camera’s image quality, although inferior to the professional setup, is exceptional considering its fourfold lower price point. Producing the image slices in the compact camera is a matter of seconds and when optimal image quality is less of a priority, the internal stacking function omits the need for dedicated stacking software altogether, further decreasing the cost and speeding up the process. In general, it is found that, aware of its limitations, this compact camera is capable of digitizing entomological collections with sufficient quality. As technology advances, more institutes and amateur entomologists will be able to easily and affordably catalogue their specimens.

  17. Automatic focusing in digital holography and its application to stretched holograms.

    Science.gov (United States)

    Memmolo, P; Distante, C; Paturzo, M; Finizio, A; Ferraro, P; Javidi, B

    2011-05-15

    The searching and recovering of the correct reconstruction distance in digital holography (DH) can be a cumbersome and subjective procedure. Here we report on an algorithm for automatically estimating the in-focus image and recovering the correct reconstruction distance for speckle holograms. We have tested the approach in determining the reconstruction distances of stretched digital holograms. Stretching a hologram with a variable elongation parameter makes it possible to change the in-focus distance of the reconstructed image. In this way, the proposed algorithm can be verified at different distances by dispensing the recording of different holograms. Experimental results are shown with the aim of demonstrating the usefulness of the proposed method, and a comparative analysis has been performed with respect to other existing algorithms developed for DH. © 2011 Optical Society of America

  18. Improved chaos-based video steganography using DNA alphabets

    Directory of Open Access Journals (Sweden)

    Nirmalya Kar

    2018-03-01

    Full Text Available DNA based steganography plays a vital role in the field of privacy and secure communication. Here, we propose a DNA properties-based mechanism to send data hidden inside a video file. Initially, the video file is converted into image frames. Random frames are then selected and data is hidden in these at random locations by using the Least Significant Bit substitution method. We analyze the proposed architecture in terms of peak signal-to-noise ratio as well as mean squared error measured between the original and steganographic files averaged over all video frames. The results show minimal degradation of the steganographic video file. Keywords: Chaotic map, DNA, Linear congruential generator, Video steganography, Least significant bit

  19. Quantum watermarking scheme through Arnold scrambling and LSB steganography

    Science.gov (United States)

    Zhou, Ri-Gui; Hu, Wenwen; Fan, Ping

    2017-09-01

    Based on the NEQR of quantum images, a new quantum gray-scale image watermarking scheme is proposed through Arnold scrambling and least significant bit (LSB) steganography. The sizes of the carrier image and the watermark image are assumed to be 2n× 2n and n× n, respectively. Firstly, a classical n× n sized watermark image with 8-bit gray scale is expanded to a 2n× 2n sized image with 2-bit gray scale. Secondly, through the module of PA-MOD N, the expanded watermark image is scrambled to a meaningless image by the Arnold transform. Then, the expanded scrambled image is embedded into the carrier image by the steganography method of LSB. Finally, the time complexity analysis is given. The simulation experiment results show that our quantum circuit has lower time complexity, and the proposed watermarking scheme is superior to others.

  20. Quantum Steganography via Greenberger-Horne-Zeilinger GHZ4 State

    International Nuclear Information System (INIS)

    El Allati, A.; Hassouni, Y.; Medeni, M.B. Ould

    2012-01-01

    A quantum steganography communication scheme via Greenberger-Horne-Zeilinger GHZ 4 state is constructed to investigate the possibility of remotely transferred hidden information. Moreover, the multipartite entangled states are become a hectic topic due to its important applications and deep effects on aspects of quantum information. Then, the scheme consists of sharing the correlation of four particle GHZ 4 states between the legitimate users. After insuring the security of the quantum channel, they begin to hide the secret information in the cover of message. Comparing the scheme with the previous quantum steganographies, capacity and imperceptibility of hidden message are good. The security of the present scheme against many attacks is also discussed. (general)

  1. Video steganography based on bit-plane decomposition of wavelet-transformed video

    Science.gov (United States)

    Noda, Hideki; Furuta, Tomofumi; Niimi, Michiharu; Kawaguchi, Eiji

    2004-06-01

    This paper presents a steganography method using lossy compressed video which provides a natural way to send a large amount of secret data. The proposed method is based on wavelet compression for video data and bit-plane complexity segmentation (BPCS) steganography. BPCS steganography makes use of bit-plane decomposition and the characteristics of the human vision system, where noise-like regions in bit-planes of a dummy image are replaced with secret data without deteriorating image quality. In wavelet-based video compression methods such as 3-D set partitioning in hierarchical trees (SPIHT) algorithm and Motion-JPEG2000, wavelet coefficients in discrete wavelet transformed video are quantized into a bit-plane structure and therefore BPCS steganography can be applied in the wavelet domain. 3-D SPIHT-BPCS steganography and Motion-JPEG2000-BPCS steganography are presented and tested, which are the integration of 3-D SPIHT video coding and BPCS steganography, and that of Motion-JPEG2000 and BPCS, respectively. Experimental results show that 3-D SPIHT-BPCS is superior to Motion-JPEG2000-BPCS with regard to embedding performance. In 3-D SPIHT-BPCS steganography, embedding rates of around 28% of the compressed video size are achieved for twelve bit representation of wavelet coefficients with no noticeable degradation in video quality.

  2. Combination Base64 Algorithm and EOF Technique for Steganography

    Science.gov (United States)

    Rahim, Robbi; Nurdiyanto, Heri; Hidayat, Rahmat; Saleh Ahmar, Ansari; Siregar, Dodi; Putera Utama Siahaan, Andysah; Faisal, Ilham; Rahman, Sayuti; Suita, Diana; Zamsuri, Ahmad; Abdullah, Dahlan; Napitupulu, Darmawan; Ikhsan Setiawan, Muhammad; Sriadhi, S.

    2018-04-01

    The steganography process combines mathematics and computer science. Steganography consists of a set of methods and techniques to embed the data into another media so that the contents are unreadable to anyone who does not have the authority to read these data. The main objective of the use of base64 method is to convert any file in order to achieve privacy. This paper discusses a steganography and encoding method using base64, which is a set of encoding schemes that convert the same binary data to the form of a series of ASCII code. Also, the EoF technique is used to embed encoding text performed by Base64. As an example, for the mechanisms a file is used to represent the texts, and by using the two methods together will increase the security level for protecting the data, this research aims to secure many types of files in a particular media with a good security and not to damage the stored files and coverage media that used.

  3. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  4. SFM TECHNIQUE AND FOCUS STACKING FOR DIGITAL DOCUMENTATION OF ARCHAEOLOGICAL ARTIFACTS

    Directory of Open Access Journals (Sweden)

    P. Clini

    2016-06-01

    Full Text Available Digital documentation and high-quality 3D representation are always more requested in many disciplines and areas due to the large amount of technologies and data available for fast, detailed and quick documentation. This work aims to investigate the area of medium and small sized artefacts and presents a fast and low cost acquisition system that guarantees the creation of 3D models with an high level of detail, making the digitalization of cultural heritage a simply and fast procedure. The 3D models of the artefacts are created with the photogrammetric technique Structure From Motion that makes it possible to obtain, in addition to three-dimensional models, high-definition images for a deepened study and understanding of the artefacts. For the survey of small objects (only few centimetres it is used a macro lens and the focus stacking, a photographic technique that consists in capturing a stack of images at different focus planes for each camera pose so that is possible to obtain a final image with a higher depth of field. The acquisition with focus stacking technique has been finally validated with an acquisition with laser triangulation scanner Minolta that demonstrates the validity compatible with the allowable error in relation to the expected precision.

  5. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography

    Science.gov (United States)

    Pevný, Tomáš; Filler, Tomáš; Bas, Patrick

    This paper presents a complete methodology for designing practical and highly-undetectable stegosystems for real digital media. The main design principle is to minimize a suitably-defined distortion by means of efficient coding algorithm. The distortion is defined as a weighted difference of extended state-of-the-art feature vectors already used in steganalysis. This allows us to "preserve" the model used by steganalyst and thus be undetectable even for large payloads. This framework can be efficiently implemented even when the dimensionality of the feature set used by the embedder is larger than 107. The high dimensional model is necessary to avoid known security weaknesses. Although high-dimensional models might be problem in steganalysis, we explain, why they are acceptable in steganography. As an example, we introduce HUGO, a new embedding algorithm for spatial-domain digital images and we contrast its performance with LSB matching. On the BOWS2 image database and in contrast with LSB matching, HUGO allows the embedder to hide 7× longer message with the same level of security level.

  6. LSB steganography with improved embedding efficiency and undetectability

    OpenAIRE

    Khalind, Omed; Aziz, Benjamin Yowell Yousif

    2015-01-01

    In this paper, we propose a new method of non-adapt ive LSB steganography in still images to improve the embedding efficiency from 2 to 8/3 rand om bits per one embedding change even for the embedding rate of 1 bit per pixel. The method t akes 2-bits of the secret message at a time and compares them to the LSBs of the two chosen pix el values for embedding, it always assumes a single mismatch between the two and uses the seco nd LSB o...

  7. Single-mismatch 2LSB embedding method of steganography

    OpenAIRE

    Khalind, Omed; Aziz, Benjamin

    2013-01-01

    This paper proposes a new method of 2LSB embedding steganography in still images. The proposed method considers a single mismatch in each 2LSB embedding between the 2LSB of the pixel value and the 2-bits of the secret message, while the 2LSB replacement overwrites the 2LSB of the image’s pixel value with 2-bits of the secret message. The number of bit-changes needed for the proposed method is 0.375 bits from the 2LSBs of the cover image, and is much less than the 2LSB replacement which is 0.5...

  8. Throughput increase of the covert communication channel organized by the stable steganography algorithm using spatial domain of the image

    Directory of Open Access Journals (Sweden)

    O.V. Kostyrka

    2016-09-01

    Full Text Available At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed steganography message, significant throughput of a steganography communication channel. Aim: The aim of this research is to modify the steganography method, developed by the author earlier, which will allow to increase the throughput of the corresponding covert communication channel when saving resistance to attacks against the built-in message and perception reliability of the created steganography message, inherent to developed method. Materials and Methods: Modifications of a steganography method that is steady against attacks against the built-in message which is carrying out the inclusion and decoding of the sent (additional information in spatial domain of the image allowing to increase the throughput of the organized communication channel are offered. Use of spatial domain of the image allows to avoid accumulation of an additional computational error during the inclusion/decoding of additional information due to “transitions” from spatial domain of the image to the area of conversion and back that positively affects the efficiency of decoding. Such methods are considered as attacks against the built-in message: imposing of different noise on a steganography message, filtering, lossy compression of a ste-ganography message where the JPEG and JPEG2000 formats with different quality coefficients for saving of a steganography message are used. Results: It is shown that algorithmic implementations of the offered methods modifications remain steady against the perturbing influences, including considerable, provide reliability of perception of the created steganography message, increase the throughput of the created steganography communication channel in comparison with the algorithm implementing

  9. An Improvement on LSB Matching and LSB Matching Revisited Steganography Methods

    OpenAIRE

    Qazanfari, Kazem; Safabakhsh, Reza

    2017-01-01

    The aim of the steganography methods is to communicate securely in a completely undetectable manner. LSB Matching and LSB Matching Revisited steganography methods are two general and esiest methods to achieve this aim. Being secured against first order steganalysis methods is the most important feature of these methods. On the other hand, these methods don't consider inter pixel dependency. Therefore, recently, several steganalysis methods are proposed that by using co-occurrence matrix detec...

  10. A Learning-Based Steganalytic Method against LSB Matching Steganography

    Directory of Open Access Journals (Sweden)

    Z. Xia

    2011-04-01

    Full Text Available This paper considers the detection of spatial domain least significant bit (LSB matching steganography in gray images. Natural images hold some inherent properties, such as histogram, dependence between neighboring pixels, and dependence among pixels that are not adjacent to each other. These properties are likely to be disturbed by LSB matching. Firstly, histogram will become smoother after LSB matching. Secondly, the two kinds of dependence will be weakened by the message embedding. Accordingly, three features, which are respectively based on image histogram, neighborhood degree histogram and run-length histogram, are extracted at first. Then, support vector machine is utilized to learn and discriminate the difference of features between cover and stego images. Experimental results prove that the proposed method possesses reliable detection ability and outperforms the two previous state-of-the-art methods. Further more, the conclusions are drawn by analyzing the individual performance of three features and their fused feature.

  11. A Novel Quantum Image Steganography Scheme Based on LSB

    Science.gov (United States)

    Zhou, Ri-Gui; Luo, Jia; Liu, XingAo; Zhu, Changming; Wei, Lai; Zhang, Xiafen

    2018-06-01

    Based on the NEQR representation of quantum images and least significant bit (LSB) scheme, a novel quantum image steganography scheme is proposed. The sizes of the cover image and the original information image are assumed to be 4 n × 4 n and n × n, respectively. Firstly, the bit-plane scrambling method is used to scramble the original information image. Then the scrambled information image is expanded to the same size of the cover image by using the key only known to the operator. The expanded image is scrambled to be a meaningless image with the Arnold scrambling. The embedding procedure and extracting procedure are carried out by K 1 and K 2 which are under control of the operator. For validation of the presented scheme, the peak-signal-to-noise ratio (PSNR), the capacity, the security of the images and the circuit complexity are analyzed.

  12. Increasing Security for Cloud Computing By Steganography in Image Edges

    Directory of Open Access Journals (Sweden)

    Hassan Hadi Saleh

    2017-03-01

    Full Text Available The security of data storage in “cloud” is big challenge because the data keep within resources that may be accessed by particular machines. The managing of these data and services may not be high reliable. Therefore, the security of data is highly challenging. To increase the security of data in data center of cloud, we have introduced good method to ensure data security in “cloud computing” by methods of data hiding using color images which is called steganography. The fundamental objective of this paper is to prevent "Data Access” by unauthorized or opponent users. This scheme stores data at data centers within edges of color images and retrieves data from it when it is wanted.

  13. A Practical Guide for Building a Digital Library: User-Focused Collection

    Science.gov (United States)

    Zhu, Qin; Guevara, Sophia

    2009-01-01

    With changing user expectations, many libraries are moving toward digital content. Accessible from anywhere at any time, digital content provides users with efficient, on-demand information experiences. Accordingly, librarians are presented with challenges and opportunities to build, manage, and implement outreach strategies that promote their…

  14. Passive auto-focus for digital still cameras and camera phones: Filter-switching and low-light techniques

    Science.gov (United States)

    Gamadia, Mark Noel

    In order to gain valuable market share in the growing consumer digital still camera and camera phone market, camera manufacturers have to continually add and improve existing features to their latest product offerings. Auto-focus (AF) is one such feature, whose aim is to enable consumers to quickly take sharply focused pictures with little or no manual intervention in adjusting the camera's focus lens. While AF has been a standard feature in digital still and cell-phone cameras, consumers often complain about their cameras' slow AF performance, which may lead to missed photographic opportunities, rendering valuable moments and events with undesired out-of-focus pictures. This dissertation addresses this critical issue to advance the state-of-the-art in the digital band-pass filter, passive AF method. This method is widely used to realize AF in the camera industry, where a focus actuator is adjusted via a search algorithm to locate the in-focus position by maximizing a sharpness measure extracted from a particular frequency band of the incoming image of the scene. There are no known systematic methods for automatically deriving the parameters such as the digital pass-bands or the search step-size increments used in existing passive AF schemes. Conventional methods require time consuming experimentation and tuning in order to arrive at a set of parameters which balance AF performance in terms of speed and accuracy ultimately causing a delay in product time-to-market. This dissertation presents a new framework for determining an optimal set of passive AF parameters, named Filter- Switching AF, providing an automatic approach to achieve superior AF performance, both in good and low lighting conditions based on the following performance measures (metrics): speed (total number of iterations), accuracy (offset from truth), power consumption (total distance moved), and user experience (in-focus position overrun). Performance results using three different prototype cameras

  15. A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE

    Directory of Open Access Journals (Sweden)

    MELAD J. SAEED

    2013-10-01

    Full Text Available Image steganography is the art of hiding information into a cover image. This paper presents a new technique based on chaotic steganography and encryption text in DCT domain for color image, where DCT is used to transform original image (cover image from spatial domain to frequency domain. This technique used chaotic function in two phases; firstly; for encryption secret message, second; for embedding in DCT cover image. With this new technique, good results are obtained through satisfying the important properties of steganography such as: imperceptibility; improved by having mean square error (MSE, peak signal to noise ratio (PSNR and normalized correlation (NC, to phase and capacity; improved by encoding the secret message characters with variable length codes and embedding the secret message in one level of color image only.

  16. A novel JPEG steganography method based on modulus function with histogram analysis

    Directory of Open Access Journals (Sweden)

    V. Banoci

    2012-06-01

    Full Text Available In this paper, we present a novel steganographic method for embedding of secret data in still grayscale JPEG image. In order to provide large capacity of the proposed method while maintaining good visual quality of stego-image, the embedding process is performed in quantized transform coefficients of Discrete Cosine transform (DCT by modifying coefficients according to modulo function, what gives to the steganography system blind extraction predisposition. After-embedding histogram of proposed Modulo Histogram Fitting (MHF method is analyzed to secure steganography system against steganalysis attacks. In addition, AES ciphering was implemented to increase security and improve histogram after-embedding characteristics of proposed steganography system as experimental results show.

  17. Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems

    Directory of Open Access Journals (Sweden)

    Jude Hemanth Duraisamy

    2016-01-01

    Full Text Available Image steganography is one of the ever growing computational approaches which has found its application in many fields. The frequency domain techniques are highly preferred for image steganography applications. However, there are significant drawbacks associated with these techniques. In transform based approaches, the secret data is embedded in random manner in the transform coefficients of the cover image. These transform coefficients may not be optimal in terms of the stego image quality and embedding capacity. In this work, the application of Genetic Algorithm (GA and Particle Swarm Optimization (PSO have been explored in the context of determining the optimal coefficients in these transforms. Frequency domain transforms such as Bandelet Transform (BT and Finite Ridgelet Transform (FRIT are used in combination with GA and PSO to improve the efficiency of the image steganography system.

  18. AUDIO CRYPTANALYSIS- AN APPLICATION OF SYMMETRIC KEY CRYPTOGRAPHY AND AUDIO STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Smita Paira

    2016-09-01

    Full Text Available In the recent trend of network and technology, “Cryptography” and “Steganography” have emerged out as the essential elements of providing network security. Although Cryptography plays a major role in the fabrication and modification of the secret message into an encrypted version yet it has certain drawbacks. Steganography is the art that meets one of the basic limitations of Cryptography. In this paper, a new algorithm has been proposed based on both Symmetric Key Cryptography and Audio Steganography. The combination of a randomly generated Symmetric Key along with LSB technique of Audio Steganography sends a secret message unrecognizable through an insecure medium. The Stego File generated is almost lossless giving a 100 percent recovery of the original message. This paper also presents a detailed experimental analysis of the algorithm with a brief comparison with other existing algorithms and a future scope. The experimental verification and security issues are promising.

  19. CRYPTO-STEG: A Hybrid Cryptology - Steganography Approach for Improved Data Security

    Directory of Open Access Journals (Sweden)

    Atif Bin Mansoor

    2012-04-01

    Full Text Available Internet is a widely used medium for transfer of information due to its reach and ease of availability. However, internet is an insecure medium and any information might be easily intercepted and viewed during its transfer. Different mechanisms like cryptology and steganography are adopted to secure the data communication over an inherently insecure medium like internet. Cryptology scrambles the information in a manner that an unintended recipient cannot easily extract the information, while steganography hides the information in a cover object so that it is transferred unnoticed in the cover. Encrypted data may not be extracted easily but causes a direct suspicion to any observer, while data hidden using steganographic techniques go inconspicuous. Cryptanalysis is the process of attacking the encrypted text to extract the information, while steganalysis is the process of detecting the disguised messages. In literature, both cryptology and steganography are treated separately. In this paper, we present our research on an improved data security paradigm, where data is first encrypted using AES (Advanced Encryption Standard and DES (Data Encryption Standard cryptology algorithms. Both plain and encrypted data is hidden in the images using Model Based and F5 steganographic techniques. Features are extracted in DWT (Discrete Wavelet Transform and DCT (Discrete Cosine Transform domains using higher order statistics for steganalysis, and subsequently used to train a FLD (Fisher Linear Discriminant classifier which is employed to categorize a separate set of images as clean or stego (containing hidden messages. Experimental results demonstrate improved data security using proposed CRYPTO-STEG approach compared to plain text steganography. Results also demonstrate that the Model Based steganography is more secure than the F5 steganography.

  20. Motion-free hybrid design laser beam propagation analyzer using a digital micromirror device and a variable focus liquid lens.

    Science.gov (United States)

    Sheikh, Mumtaz; Riza, Nabeel A

    2010-06-01

    To the best of our knowledge, we propose the first motion-free laser beam propagation analyzer with a hybrid design using a digital micromirror device (DMD) and a liquid electronically controlled variable focus lens (ECVFL). Unlike prior analyzers that require profiling the beam at multiple locations along the light propagation axis, the proposed analyzer profiles the beam at the same plane for multiple values of the ECVFL focal length, thus eliminating beam profiler assembly motion. In addition to measuring standard Gaussian beam parameters, the analyzer can also be used to measure the M(2) beam propagation parameter of a multimode beam. Proof-of-concept beam parameter measurements with the proposed analyzer are successfully conducted for a 633 nm laser beam. Given the all-digital nature of the DMD-based profiling and all-analog motion-free nature of the ECVFL beam focus control, the proposed analyzer versus prior art promises better repeatability, speed, and reliability.

  1. A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography

    Science.gov (United States)

    Islam, Muhammad F.; Islam, Mohammed N.

    2012-04-01

    The objective of this paper is to develop a novel approach for encryption and compression of biometric information utilizing orthogonal coding and steganography techniques. Multiple biometric signatures are encrypted individually using orthogonal codes and then multiplexed together to form a single image, which is then embedded in a cover image using the proposed steganography technique. The proposed technique employs three least significant bits for this purpose and a secret key is developed to choose one from among these bits to be replaced by the corresponding bit of the biometric image. The proposed technique offers secure transmission of multiple biometric signatures in an identification document which will be protected from unauthorized steganalysis attempt.

  2. A novel hash based least significant bit (2-3-3) image steganography in spatial domain

    OpenAIRE

    Manjula, G. R.; Danti, Ajit

    2015-01-01

    This paper presents a novel 2-3-3 LSB insertion method. The image steganography takes the advantage of human eye limitation. It uses color image as cover media for embedding secret message.The important quality of a steganographic system is to be less distortive while increasing the size of the secret message. In this paper a method is proposed to embed a color secret image into a color cover image. A 2-3-3 LSB insertion method has been used for image steganography. Experimental results show ...

  3. Minimizing embedding impact in steganography using trellis-coded quantization

    Science.gov (United States)

    Filler, Tomáš; Judas, Jan; Fridrich, Jessica

    2010-01-01

    In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance with bounds derived from appropriate rate-distortion bounds. We assume that each cover element can be assigned a positive scalar expressing the impact of making an embedding change at that element (single-letter distortion). The problem is to embed a given payload with minimal possible average embedding impact. This task, which can be viewed as a generalization of matrix embedding or writing on wet paper, has been approached using heuristic and suboptimal tools in the past. Here, we propose a fast and very versatile solution to this problem that can theoretically achieve performance arbitrarily close to the bound. It is based on syndrome coding using linear convolutional codes with the optimal binary quantizer implemented using the Viterbi algorithm run in the dual domain. The complexity and memory requirements of the embedding algorithm are linear w.r.t. the number of cover elements. For practitioners, we include detailed algorithms for finding good codes and their implementation. Finally, we report extensive experimental results for a large set of relative payloads and for different distortion profiles, including the wet paper channel.

  4. LSB-Based Steganography Using Reflected Gray Code

    Science.gov (United States)

    Chen, Chang-Chu; Chang, Chin-Chen

    Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to be detected. The LSB-based data hiding is one of the steganographic methods, used to embed the secret data into the least significant bits of the pixel values in a cover image. In this paper, we propose an LSB-based scheme using reflected-Gray code, which can be applied to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always equal to the secret bits and the experiment shows that the differences are up to almost 50%. According to the mathematical deduction and experimental results, the proposed scheme has the same image quality and payload as the simple LSB substitution scheme. In fact, our proposed data hiding scheme in the case of G1 (one bit Gray code) system is equivalent to the simple LSB substitution scheme.

  5. Effective ASCII-HEX steganography for secure cloud

    International Nuclear Information System (INIS)

    Afghan, S.

    2015-01-01

    There are many reasons of cloud computing popularity some of the most important are; backup and rescue, cost effective, nearly limitless storage, automatic software amalgamation, easy access to information and many more. Pay-as-you-go model is followed to provide everything as a service. Data is secured by using standard security policies available at cloud end. In spite of its many benefits, as mentioned above, cloud computing has also some security issues. Provider as well as customer has to provide and collect data in a secure manner. Both of these issues plus efficient transmitting of data over cloud are very critical issues and needed to be resolved. There is need of security during the travel time of sensitive data over the network that can be processed or stored by the customer. Security to the customer's data at the provider end can be provided by using current security algorithms, which are not known by the customer. There is reliability problem due to existence of multiple boundaries in the cloud resource access. ASCII and HEX security with steganography is used to propose an algorithm that stores the encrypted data/cipher text in an image file which will be then sent to the cloud end. This is done by using CDM (Common Deployment Model). In future, an algorithm should be proposed and implemented for the security of virtual images in the cloud computing. (author)

  6. Digitization

    DEFF Research Database (Denmark)

    Finnemann, Niels Ole

    2014-01-01

    what a concept of digital media might add to the understanding of processes of mediatization and what the concept of mediatization might add to the understanding of digital media. It is argued that digital media open an array of new trajectories in human communication, trajectories which were...

  7. Focus measure method based on the modulus of the gradient of the color planes for digital microscopy

    Science.gov (United States)

    Hurtado-Pérez, Román; Toxqui-Quitl, Carina; Padilla-Vivanco, Alfonso; Aguilar-Valdez, J. Félix; Ortega-Mendoza, Gabriel

    2018-02-01

    The modulus of the gradient of the color planes (MGC) is implemented to transform multichannel information to a grayscale image. This digital technique is used in two applications: (a) focus measurements during autofocusing (AF) process and (b) extending the depth of field (EDoF) by means of multifocus image fusion. In the first case, the MGC procedure is based on an edge detection technique and is implemented in over 15 focus metrics that are typically handled in digital microscopy. The MGC approach is tested on color images of histological sections for the selection of in-focus images. An appealing attribute of all the AF metrics working in the MGC space is their monotonic behavior even up to a magnification of 100×. An advantage of the MGC method is its computational simplicity and inherent parallelism. In the second application, a multifocus image fusion algorithm based on the MGC approach has been implemented on graphics processing units (GPUs). The resulting fused images are evaluated using a nonreference image quality metric. The proposed fusion method reveals a high-quality image independently of faulty illumination during the image acquisition. Finally, the three-dimensional visualization of the in-focus image is shown.

  8. Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss

    Directory of Open Access Journals (Sweden)

    Avinash Srinivasan

    2015-08-01

    Full Text Available Information hiding techniques, especially steganography, have been extensively researched for over two decades. Nonetheless, steganography on smartphones over cellular carrier networks is yet to be fully explored. Today, smartphones, which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. In this paper, we propose Android-Stego - a framework for steganography employing smart-phones. Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers' communication networks such as Verizon and Sprint. A key contribution of our research presented in this paper is the benchmark results we have provided by analyzing real world cellular carriers network restrictions on MMS message size. We have also analyzed the actions the carriers take - such as compression and/or format conversion - on MMS messages that fall outside the established MMS communication norm, which varies for each service provider. Finally, We have used these benchmark results in implementing Android-Stego such that it is sensitive to carrier restrictions and robust to message loss.

  9. LSB-based Steganography Using Reflected Gray Code for Color Quantum Images

    Science.gov (United States)

    Li, Panchi; Lu, Aiping

    2018-02-01

    At present, the classical least-significant-bit (LSB) based image steganography has been extended to quantum image processing. For the existing LSB-based quantum image steganography schemes, the embedding capacity is no more than 3 bits per pixel. Therefore, it is meaningful to study how to improve the embedding capacity of quantum image steganography. This work presents a novel LSB-based steganography using reflected Gray code for colored quantum images, and the embedding capacity of this scheme is up to 4 bits per pixel. In proposed scheme, the secret qubit sequence is considered as a sequence of 4-bit segments. For the four bits in each segment, the first bit is embedded in the second LSB of B channel of the cover image, and and the remaining three bits are embedded in LSB of RGB channels of each color pixel simultaneously using reflected-Gray code to determine the embedded bit from secret information. Following the transforming rule, the LSB of stego-image are not always same as the secret bits and the differences are up to almost 50%. Experimental results confirm that the proposed scheme shows good performance and outperforms the previous ones currently found in the literature in terms of embedding capacity.

  10. A Novel AMR-WB Speech Steganography Based on Diameter-Neighbor Codebook Partition

    Directory of Open Access Journals (Sweden)

    Junhui He

    2018-01-01

    Full Text Available Steganography is a means of covert communication without revealing the occurrence and the real purpose of communication. The adaptive multirate wideband (AMR-WB is a widely adapted format in mobile handsets and is also the recommended speech codec for VoLTE. In this paper, a novel AMR-WB speech steganography is proposed based on diameter-neighbor codebook partition algorithm. Different embedding capacity may be achieved by adjusting the iterative parameters during codebook division. The experimental results prove that the presented AMR-WB steganography may provide higher and flexible embedding capacity without inducing perceptible distortion compared with the state-of-the-art methods. With 48 iterations of cluster merging, twice the embedding capacity of complementary-neighbor-vertices-based embedding method may be obtained with a decrease of only around 2% in speech quality and much the same undetectability. Moreover, both the quality of stego speech and the security regarding statistical steganalysis are better than the recent speech steganography based on neighbor-index-division codebook partition.

  11. Comparative analysis of the modified enclosed energy metric for self-focusing holograms from digital lensless holographic microscopy.

    Science.gov (United States)

    Trujillo, Carlos; Garcia-Sucerquia, Jorge

    2015-06-01

    A comparative analysis of the performance of the modified enclosed energy (MEE) method for self-focusing holograms recorded with digital lensless holographic microscopy is presented. Notwithstanding the MEE analysis previously published, no extended analysis of its performance has been reported. We have tested the MEE in terms of the minimum axial distance allowed between the set of reconstructed holograms to search for the focal plane and the elapsed time to obtain the focused image. These parameters have been compared with those for some of the already reported methods in the literature. The MEE achieves better results in terms of self-focusing quality but at a higher computational cost. Despite its longer processing time, the method remains within a time frame to be technologically attractive. Modeled and experimental holograms have been utilized in this work to perform the comparative study.

  12. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  13. Rotational scanning and multiple-spot focusing through a multimode fiber based on digital optical phase conjugation

    Science.gov (United States)

    Ma, Chaojie; Di, Jianglei; Li, Ying; Xiao, Fajun; Zhang, Jiwei; Liu, Kaihui; Bai, Xuedong; Zhao, Jianlin

    2018-06-01

    We demonstrate, for the first time, the rotational memory effect of a multimode fiber (MMF) based on digital optical phase conjugation (DOPC) to achieve multiple-spot focusing. An implementation interferometer is used to address the challenging alignments in DOPC. By rotating the acquired phase conjugate pattern, rotational scanning through a MMF could be achieved by recording a single off-axis hologram. The generation of two focal spots through a MMF is also demonstrated by combining the rotational memory effect with the superposition principle. The results may be useful for ultrafast scanning imaging and optical manipulation of multiple objects through a MMF.

  14. The Future of Digital Music Services in Three Stereotypes; How Focus Groups of End Users See the New Business Models

    OpenAIRE

    Bookholt, Erik; Spil, Antonius A.M.; Katsma, Christiaan

    2013-01-01

    “I am just a stereotype” sang Terry Hall in 1980. Ariola records took them in and made the band The Specials a world success. How will that process go in 2014? Will they put it on You Tube for free? Do they need a record company? Will they have less or more fans, earn less or more money? Focus group interviews with 90 people between the ages of 15 and 25 were successfully employed to create 20 new business models for the digital music industry. Analysis with grounded theory revealed that a ne...

  15. Introduction to focus issue: intrinsic and designed computation: information processing in dynamical systems--beyond the digital hegemony.

    Science.gov (United States)

    Crutchfield, James P; Ditto, William L; Sinha, Sudeshna

    2010-09-01

    How dynamical systems store and process information is a fundamental question that touches a remarkably wide set of contemporary issues: from the breakdown of Moore's scaling laws--that predicted the inexorable improvement in digital circuitry--to basic philosophical problems of pattern in the natural world. It is a question that also returns one to the earliest days of the foundations of dynamical systems theory, probability theory, mathematical logic, communication theory, and theoretical computer science. We introduce the broad and rather eclectic set of articles in this Focus Issue that highlights a range of current challenges in computing and dynamical systems.

  16. A Design of Real-time Automatic Focusing System for Digital Still Camera Using the Passive Sensor Error Minimization

    Energy Technology Data Exchange (ETDEWEB)

    Kim, K.S. [Samsung Techwin Co., Ltd., Seoul (Korea); Kim, D.Y. [Bucheon College, Bucheon (Korea); Kim, S.H. [University of Seoul, Seoul (Korea)

    2002-05-01

    In this paper, the implementation of a new AF(Automatic Focusing) system for a digital still camera is introduced. The proposed system operates in real-time while adjusting focus after the measurement of distance to an object using a passive sensor, which is different from a typical method. In addition, measurement errors were minimized by using the data acquired empirically, and the optimal measuring time was obtained using EV(Exposure Value) which is calculated from CCD luminance signal. Moreover, this system adopted an auxiliary light source for focusing in absolute dark conditions, which is very hard for CCD image processing. Since this is an open-loop system adjusting focus immediately after the distance measurement, it guarantees real-time operation. The performance of this new AF system was verified by comparing the focusing value curve obtained from AF experiment with the one from the measurement by MF(Manual-Focusing). In both case, edge detector was used for various objects and backgrounds. (author). 9 refs., 11 figs., 5 tabs.

  17. Digital Technologies in Mathematics Classrooms: Barriers, Lessons and Focus on Teachers

    Science.gov (United States)

    Sacristán, Ana Isabel

    2017-01-01

    In this paper, drawing from data from several experiences and studies in which I have been involved in Mexico, I reflect on the constraints and inertia of classroom cultures, and the barriers to successful, meaningful and transformative technology integration in mathematics classroom. I focus on teachers as key players for this integration,…

  18. Employing the Gini coefficient to measure participation inequality in treatment-focused Digital Health Social Networks.

    Science.gov (United States)

    van Mierlo, Trevor; Hyatt, Douglas; Ching, Andrew T

    2016-01-01

    Digital Health Social Networks (DHSNs) are common; however, there are few metrics that can be used to identify participation inequality. The objective of this study was to investigate whether the Gini coefficient, an economic measure of statistical dispersion traditionally used to measure income inequality, could be employed to measure DHSN inequality. Quarterly Gini coefficients were derived from four long-standing DHSNs. The combined data set included 625,736 posts that were generated from 15,181 actors over 18,671 days. The range of actors (8-2323), posts (29-28,684), and Gini coefficients (0.15-0.37) varied. Pearson correlations indicated statistically significant associations between number of actors and number of posts (0.527-0.835, p  addiction networks (0.619 and 0.276, p  networks ( t  = -4.305 and -5.934, p  network engagement. Further, mixed-methods research investigating quantitative performance metrics is required.

  19. DIGITAL

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — The Digital Flood Insurance Rate Map (DFIRM) Database depicts flood risk information and supporting data used to develop the risk data. The primary risk...

  20. A novel quantum LSB-based steganography method using the Gray code for colored quantum images

    Science.gov (United States)

    Heidari, Shahrokh; Farzadnia, Ehsan

    2017-10-01

    As one of the prevalent data-hiding techniques, steganography is defined as the act of concealing secret information in a cover multimedia encompassing text, image, video and audio, imperceptibly, in order to perform interaction between the sender and the receiver in which nobody except the receiver can figure out the secret data. In this approach a quantum LSB-based steganography method utilizing the Gray code for quantum RGB images is investigated. This method uses the Gray code to accommodate two secret qubits in 3 LSBs of each pixel simultaneously according to reference tables. Experimental consequences which are analyzed in MATLAB environment, exhibit that the present schema shows good performance and also it is more secure and applicable than the previous one currently found in the literature.

  1. StegNet: Mega Image Steganography Capacity with Deep Convolutional Network

    Directory of Open Access Journals (Sweden)

    Pin Wu

    2018-06-01

    Full Text Available Traditional image steganography often leans interests towards safely embedding hidden information into cover images with payload capacity almost neglected. This paper combines recent deep convolutional neural network methods with image-into-image steganography. It successfully hides the same size images with a decoding rate of 98.2% or bpp (bits per pixel of 23.57 by changing only 0.76% of the cover image on average. Our method directly learns end-to-end mappings between the cover image and the embedded image and between the hidden image and the decoded image. We further show that our embedded image, while with mega payload capacity, is still robust to statistical analysis.

  2. Confidentiality Enhancement of Highly Sensitive Nuclear Data Using Steganography with Chaotic Encryption over OFDM Channel

    International Nuclear Information System (INIS)

    Mahmoud, S.; Ayad, N.; Elsayed, F.; Elbendary, M.

    2016-01-01

    Full text: Due to the widespread usage of the internet and other wired and wireless communication methods, the security of the transmitted data has become a major requirement. Nuclear knowledge is mainly built upon the exchange of nuclear information which is considered highly sensitive information, so its security has to be enhanced by using high level security mechanisms. Data confidentiality is concerned with the achievement of higher protection for confidential information from unauthorized disclosure or access. Cryptography and steganography are famous and widely used techniques that process information in order to achieve its confidentiality, but sometimes, when used individually, they don’t satisfy a required level of security for highly sensitive data. In this paper, cryptography is accompanied with steganography for constituting a multilayer security techniques that can strengthen the level of security of highly confidential nuclear data that are archived or transmitted through different channel types and noise conditions. (author)

  3. Improved diagonal queue medical image steganography using Chaos theory, LFSR, and Rabin cryptosystem.

    Science.gov (United States)

    Jain, Mamta; Kumar, Anil; Choudhary, Rishabh Charan

    2017-06-01

    In this article, we have proposed an improved diagonal queue medical image steganography for patient secret medical data transmission using chaotic standard map, linear feedback shift register, and Rabin cryptosystem, for improvement of previous technique (Jain and Lenka in Springer Brain Inform 3:39-51, 2016). The proposed algorithm comprises four stages, generation of pseudo-random sequences (pseudo-random sequences are generated by linear feedback shift register and standard chaotic map), permutation and XORing using pseudo-random sequences, encryption using Rabin cryptosystem, and steganography using the improved diagonal queues. Security analysis has been carried out. Performance analysis is observed using MSE, PSNR, maximum embedding capacity, as well as by histogram analysis between various Brain disease stego and cover images.

  4. Steganalysis of LSB Image Steganography using Multiple Regression and Auto Regressive (AR) Model

    OpenAIRE

    Souvik Bhattacharyya; Gautam Sanyal

    2011-01-01

    The staggering growth in communication technologyand usage of public domain channels (i.e. Internet) has greatly facilitated transfer of data. However, such open communication channelshave greater vulnerability to security threats causing unauthorizedin- formation access. Traditionally, encryption is used to realizethen communication security. However, important information is notprotected once decoded. Steganography is the art and science of communicating in a way which hides the existence o...

  5. Detection of LSB+/-1 steganography based on co-occurrence matrix and bit plane clipping

    Science.gov (United States)

    Abolghasemi, Mojtaba; Aghaeinia, Hassan; Faez, Karim; Mehrabi, Mohammad Ali

    2010-01-01

    Spatial LSB+/-1 steganography changes smooth characteristics between adjoining pixels of the raw image. We present a novel steganalysis method for LSB+/-1 steganography based on feature vectors derived from the co-occurrence matrix in the spatial domain. We investigate how LSB+/-1 steganography affects the bit planes of an image and show that it changes more least significant bit (LSB) planes of it. The co-occurrence matrix is derived from an image in which some of its most significant bit planes are clipped. By this preprocessing, in addition to reducing the dimensions of the feature vector, the effects of embedding were also preserved. We compute the co-occurrence matrix in different directions and with different dependency and use the elements of the resulting co-occurrence matrix as features. This method is sensitive to the data embedding process. We use a Fisher linear discrimination (FLD) classifier and test our algorithm on different databases and embedding rates. We compare our scheme with the current LSB+/-1 steganalysis methods. It is shown that the proposed scheme outperforms the state-of-the-art methods in detecting the LSB+/-1 steganographic method for grayscale images.

  6. Extreme learning machine based optimal embedding location finder for image steganography.

    Directory of Open Access Journals (Sweden)

    Hayfaa Abdulzahra Atee

    Full Text Available In image steganography, determining the optimum location for embedding the secret message precisely with minimum distortion of the host medium remains a challenging issue. Yet, an effective approach for the selection of the best embedding location with least deformation is far from being achieved. To attain this goal, we propose a novel approach for image steganography with high-performance, where extreme learning machine (ELM algorithm is modified to create a supervised mathematical model. This ELM is first trained on a part of an image or any host medium before being tested in the regression mode. This allowed us to choose the optimal location for embedding the message with best values of the predicted evaluation metrics. Contrast, homogeneity, and other texture features are used for training on a new metric. Furthermore, the developed ELM is exploited for counter over-fitting while training. The performance of the proposed steganography approach is evaluated by computing the correlation, structural similarity (SSIM index, fusion matrices, and mean square error (MSE. The modified ELM is found to outperform the existing approaches in terms of imperceptibility. Excellent features of the experimental results demonstrate that the proposed steganographic approach is greatly proficient for preserving the visual information of an image. An improvement in the imperceptibility as much as 28% is achieved compared to the existing state of the art methods.

  7. Focus sul digital marketing

    OpenAIRE

    S. Vianello; G. Randisi

    2011-01-01

    Il marketing impatta o meno sulle performance aziendali? L’investimento in competenze di Marketing & Sales genera ritorni per le imprese? La risposta che emerge da questo volume è certa. Il marketing conta davvero, perché guida le scelte strategiche delle imprese e perché impatta direttamente sui loro indicatori economico-finanziari, attraverso competenze e metriche adeguate.

  8. IMAGE STEGANOGRAPHY DENGAN METODE LEAST SIGNIFICANT BIT (LSB

    Directory of Open Access Journals (Sweden)

    M. Miftakul Amin

    2014-02-01

    Full Text Available Security in delivering a secret message is an important factor in the spread of information in cyberspace. Protecting that message to be delivered to the party entitled to, should be made a message concealment mechanism. The purpose of this study was to hide a secret text message into digital images in true color 24 bit RGB format. The method used to insert a secret message using the LSB (Least Significant Bit by replacing the last bit or 8th bit in each RGB color component. RGB image file types option considering that messages can be inserted capacity greater than if use a grayscale image, this is because in one pixel can be inserted 3 bits message. Tests provide results that are hidden messages into a digital image does not reduce significantly the quality of the digital image, and the message has been hidden can be extracted again, so that messages can be delivered to the recipient safely.

  9. A situated practice of ethics for participatory visual and digital methods in public health research and practice: a focus on digital storytelling.

    Science.gov (United States)

    Gubrium, Aline C; Hill, Amy L; Flicker, Sarah

    2014-09-01

    This article explores ethical considerations related to participatory visual and digital methods for public health research and practice, through the lens of an approach known as "digital storytelling." We begin by briefly describing the digital storytelling process and its applications to public health research and practice. Next, we explore 6 common challenges: fuzzy boundaries, recruitment and consent to participate, power of shaping, representation and harm, confidentiality, and release of materials. We discuss their complexities and offer some considerations for ethical practice. We hope this article serves as a catalyst for expanded dialogue about the need for high standards of integrity and a situated practice of ethics wherein researchers and practitioners reflexively consider ethical decision-making as part of the ongoing work of public health.

  10. Digital video steganalysis using motion vector recovery-based features.

    Science.gov (United States)

    Deng, Yu; Wu, Yunjie; Zhou, Linna

    2012-07-10

    As a novel digital video steganography, the motion vector (MV)-based steganographic algorithm leverages the MVs as the information carriers to hide the secret messages. The existing steganalyzers based on the statistical characteristics of the spatial/frequency coefficients of the video frames cannot attack the MV-based steganography. In order to detect the presence of information hidden in the MVs of video streams, we design a novel MV recovery algorithm and propose the calibration distance histogram-based statistical features for steganalysis. The support vector machine (SVM) is trained with the proposed features and used as the steganalyzer. Experimental results demonstrate that the proposed steganalyzer can effectively detect the presence of hidden messages and outperform others by the significant improvements in detection accuracy even with low embedding rates.

  11. Software usage in unsupervised digital doorway computing environments in disadvantaged South African communities: Focusing on youthful users

    CSIR Research Space (South Africa)

    Gush, K

    2011-01-01

    Full Text Available Digital Doorways provide computing infrastructure in low-income communities in South Africa. The unsupervised DD terminals offer various software applications, from entertainment through educational resources to research material, encouraging...

  12. Building a Steganography Program Including How to Load, Process, and Save JPEG and PNG Files in Java

    Science.gov (United States)

    Courtney, Mary F.; Stix, Allen

    2006-01-01

    Instructors teaching beginning programming classes are often interested in exercises that involve processing photographs (i.e., files stored as .jpeg). They may wish to offer activities such as color inversion, the color manipulation effects archived with pixel thresholding, or steganography, all of which Stevenson et al. [4] assert are sought by…

  13. Bit Plane Coding based Steganography Technique for JPEG2000 Images and Videos

    Directory of Open Access Journals (Sweden)

    Geeta Kasana

    2016-02-01

    Full Text Available In this paper, a Bit Plane Coding (BPC based steganography technique for JPEG2000 images and Motion JPEG2000 video is proposed. Embedding in this technique is performed in the lowest significant bit planes of the wavelet coefficients of a cover image. In JPEG2000 standard, the number of bit planes of wavelet coefficients to be used in encoding is dependent on the compression rate and are used in Tier-2 process of JPEG2000. In the proposed technique, Tier-1 and Tier-2 processes of JPEG2000 and Motion JPEG2000 are executed twice on the encoder side to collect the information about the lowest bit planes of all code blocks of a cover image, which is utilized in embedding and transmitted to the decoder. After embedding secret data, Optimal Pixel Adjustment Process (OPAP is applied on stego images to enhance its visual quality. Experimental results show that proposed technique provides large embedding capacity and better visual quality of stego images than existing steganography techniques for JPEG2000 compressed images and videos. Extracted secret image is similar to the original secret image.

  14. A Novel Quantum Video Steganography Protocol with Large Payload Based on MCQI Quantum Video

    Science.gov (United States)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai

    2017-11-01

    As one of important multimedia forms in quantum network, quantum video attracts more and more attention of experts and scholars in the world. A secure quantum video steganography protocol with large payload based on the video strip encoding method called as MCQI (Multi-Channel Quantum Images) is proposed in this paper. The new protocol randomly embeds the secret information with the form of quantum video into quantum carrier video on the basis of unique features of video frames. It exploits to embed quantum video as secret information for covert communication. As a result, its capacity are greatly expanded compared with the previous quantum steganography achievements. Meanwhile, the new protocol also achieves good security and imperceptibility by virtue of the randomization of embedding positions and efficient use of redundant frames. Furthermore, the receiver enables to extract secret information from stego video without retaining the original carrier video, and restore the original quantum video as a follow. The simulation and experiment results prove that the algorithm not only has good imperceptibility, high security, but also has large payload.

  15. Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery

    Directory of Open Access Journals (Sweden)

    Afany Zeinata Firdaus

    2013-12-01

    Full Text Available In today's era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding the secret message is shorter than the average computation time making phase (extracting the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB . Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.

  16. Steganalysis and improvement of a quantum steganography protocol via a GHZ4 state

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2013-01-01

    Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, El Allati et al. proposed a new quantum steganography using the GHZ 4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ 4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ 4 state, we give another 8 groups of unitary transformations that can change the GHZ 4 state into 8 different quantum states. Due to the symmetry of the GHZ 4 state, all the possible 16 groups of unitary transformations change the GHZ 4 state into 8 different quantum states, so the improved protocol achieves a high efficiency

  17. Embedded FPGA Design for Optimal Pixel Adjustment Process of Image Steganography

    Directory of Open Access Journals (Sweden)

    Chiung-Wei Huang

    2018-01-01

    Full Text Available We propose a prototype of field programmable gate array (FPGA implementation for optimal pixel adjustment process (OPAP algorithm of image steganography. In the proposed scheme, the cover image and the secret message are transmitted from a personal computer (PC to an FPGA board using RS232 interface for hardware processing. We firstly embed k-bit secret message into each pixel of the cover image by the last-significant-bit (LSB substitution method, followed by executing associated OPAP calculations to construct a stego pixel. After all pixels of the cover image have been embedded, a stego image is created and transmitted from FPGA back to the PC and stored in the PC. Moreover, we have extended the basic pixel-wise structure to a parallel structure which can fully use the hardware devices to speed up the embedding process and embed several bits of secret message at the same time. Through parallel mechanism of the hardware based design, the data hiding process can be completed in few clock cycles to produce steganography outcome. Experimental results show the effectiveness and correctness of the proposed scheme.

  18. Digital Tectonics

    DEFF Research Database (Denmark)

    Christiansen, Karl; Borup, Ruben; Søndergaard, Asbjørn

    2014-01-01

    Digital Tectonics treats the architectonical possibilities in digital generation of form and production. The publication is the first volume of a series, in which aspects of the strategic focus areas of the Aarhus School of Architecture will be disseminated.......Digital Tectonics treats the architectonical possibilities in digital generation of form and production. The publication is the first volume of a series, in which aspects of the strategic focus areas of the Aarhus School of Architecture will be disseminated....

  19. Practical steganalysis of digital images: state of the art

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav

    2002-04-01

    Steganography is the art of hiding the very presence of communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a great deal of attention both from law enforcement and the media. In our paper, we classify and review current stego-detection algorithms that can be used to trace popular steganographic products. We recognize several qualitatively different approaches to practical steganalysis - visual detection, detection based on first order statistics (histogram analysis), dual statistics methods that use spatial correlations in images and higher-order statistics (RS steganalysis), universal blind detection schemes, and special cases, such as JPEG compatibility steganalysis. We also present some new results regarding our previously proposed detection of LSB embedding using sensitive dual statistics. The recent steganalytic methods indicate that the most common paradigm in image steganography - the bit-replacement or bit substitution - is inherently insecure with safe capacities far smaller than previously thought.

  20. Measurement of residual stress by using focused ion beam and digital image correlation method in thin-sized wires used for steel cords

    International Nuclear Information System (INIS)

    Yang, Y S; Park, C G; Bae, J G

    2008-01-01

    Residual stress in the axial direction of the steel wires has been measured by using a method based on the combination of the focused ion beam (FIB) milling and digital image correlation software. That is, the residual stress was calculated from the measured displacement field before and after the introduction of a slot along the steel wires. The displacement was obtained by the digital correlation analysis of high-resolution scanning electron micrographs, while the slot was introduced by FIB milling with low energy beam. The fitting of the experimental results to an analytical model with the independent Young's modulus determined allows us to find the residual stress. The complete experimental procedures are described and its feasibilities are also evaluated for the thin-sized steel wires

  1. A Novel Image Steganography Technique for Secured Online Transaction Using DWT and Visual Cryptography

    Science.gov (United States)

    Anitha Devi, M. D.; ShivaKumar, K. B.

    2017-08-01

    Online payment eco system is the main target especially for cyber frauds. Therefore end to end encryption is very much needed in order to maintain the integrity of secret information related to transactions carried online. With access to payment related sensitive information, which enables lot of money transactions every day, the payment infrastructure is a major target for hackers. The proposed system highlights, an ideal approach for secure online transaction for fund transfer with a unique combination of visual cryptography and Haar based discrete wavelet transform steganography technique. This combination of data hiding technique reduces the amount of information shared between consumer and online merchant needed for successful online transaction along with providing enhanced security to customer’s account details and thereby increasing customer’s confidence preventing “Identity theft” and “Phishing”. To evaluate the effectiveness of proposed algorithm Root mean square error, Peak signal to noise ratio have been used as evaluation parameters

  2. An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution

    Science.gov (United States)

    Chadha, Ankit; Satam, Neha; Sood, Rakshak; Bade, Dattatray

    2013-09-01

    In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) both are used. All the results displayed prove to be time-efficient and effective. Also the algorithm is tested for various numbers of bits. For those values of bits, Mean Square Error (MSE) and Peak-Signal-to-Noise-Ratio (PSNR) are calculated and plotted. Experimental results show that the stego-image is visually indistinguishable from the original cover-image when nsteganography process does not reveal presence of any hidden message, thus qualifying the criteria of imperceptible message.

  3. A high capacity text steganography scheme based on LZW compression and color coding

    Directory of Open Access Journals (Sweden)

    Aruna Malik

    2017-02-01

    Full Text Available In this paper, capacity and security issues of text steganography have been considered by employing LZW compression technique and color coding based approach. The proposed technique uses the forward mail platform to hide the secret data. This algorithm first compresses secret data and then hides the compressed secret data into the email addresses and also in the cover message of the email. The secret data bits are embedded in the message (or cover text by making it colored using a color coding table. Experimental results show that the proposed method not only produces a high embedding capacity but also reduces computational complexity. Moreover, the security of the proposed method is significantly improved by employing stego keys. The superiority of the proposed method has been experimentally verified by comparing with recently developed existing techniques.

  4. On Max-Plus Algebra and Its Application on Image Steganography

    Directory of Open Access Journals (Sweden)

    Kiswara Agung Santoso

    2018-01-01

    Full Text Available We propose a new steganography method to hide an image into another image using matrix multiplication operations on max-plus algebra. This is especially interesting because the matrix used in encoding or information disguises generally has an inverse, whereas matrix multiplication operations in max-plus algebra do not have an inverse. The advantages of this method are the size of the image that can be hidden into the cover image, larger than the previous method. The proposed method has been tested on many secret images, and the results are satisfactory which have a high level of strength and a high level of security and can be used in various operating systems.

  5. Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

    Directory of Open Access Journals (Sweden)

    Michael J. Pelosi

    2018-04-01

    Full Text Available In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp. Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs. In this extended reprint, we introduce additional application and discussion regarding cold storage of crypto-currency account and password information, as well as applications for secure transfer in hostile or insecure network circumstances.

  6. Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication

    Directory of Open Access Journals (Sweden)

    Jung-oh Park

    2015-01-01

    Full Text Available Recently, as the utilization of CCTV (closed circuit television is emerging as an issue, the studies on CCTV are receiving much attention. Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure, SN (serial number, and R value (random number attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. This paper should be appropriate for utilization of user infringement-related CCTV where user information protection-related technology is not applied for CCTV in the future.

  7. Quantum steganography with a large payload based on dense coding and entanglement swapping of Greenberger—Horne—Zeilinger states

    International Nuclear Information System (INIS)

    Ye Tian-Yu; Jiang Li-Zhen

    2013-01-01

    A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger—Horne—Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable. (general)

  8. Generating 3D and 3D-like animations of strongly uneven surface microareas of bloodstains from small series of partially out-of-focus digital SEM micrographs.

    Science.gov (United States)

    Hortolà, Policarp

    2010-01-01

    When dealing with microscopic still images of some kinds of samples, the out-of-focus problem represents a particularly serious limiting factor for the subsequent generation of fully sharp 3D animations. In order to produce fully-focused 3D animations of strongly uneven surface microareas, a vertical stack of six digital secondary-electron SEM micrographs of a human bloodstain microarea was acquired. Afterwards, single combined images were generated using a macrophotography and light microscope image post-processing software. Subsequently, 3D animations of texture and topography were obtained in different formats using a combination of software tools. Finally, a 3D-like animation of a texture-topography composite was obtained in different formats using another combination of software tools. By one hand, results indicate that the use of image post-processing software not concerned primarily with electron micrographs allows to obtain, in an easy way, fully-focused images of strongly uneven surface microareas of bloodstains from small series of partially out-of-focus digital SEM micrographs. On the other hand, results also indicate that such small series of electron micrographs can be utilized for generating 3D and 3D-like animations that can subsequently be converted into different formats, by using certain user-friendly software facilities not originally designed for use in SEM, that are easily available from Internet. Although the focus of this study was on bloodstains, the methods used in it well probably are also of relevance for studying the surface microstructures of other organic or inorganic materials whose sharp displaying is difficult of obtaining from a single SEM micrograph.

  9. General Principles of Integrity Checking of Digital Images and Application for Steganalysis

    Directory of Open Access Journals (Sweden)

    Kobozeva Alla A.

    2016-06-01

    Full Text Available The new common approach for integrity checking of digital images is developed. The new features of formal parameters defining image are revealed, theoretically grounded and practically tested. The characteristics of the mutual arrangement of left and right singular vectors corresponding to the largest singular value of the image’s matrix (block of matrix and the vector composed of singular numbers is obtained. Formal parameters are obtained using normal singular decomposition of matrix (block of matrix which is uniquely determined. It is shown that for most blocks of original image (no matter lossy or lossless the angle between the left (right mentioned singular vector and vector composed of singular numbers is defined by the angle between the n-optimal vector and the vector of standard basis of the range corresponding dimension. It is shown that the determined feature brakes for the mentioned formal parameters in a non-original image. This shows the integrity violation of the image, i.e. the existence of the additional information embedded using steganography algorithms. So this can be used as a basis for development of new universal steganography methods and algorithms, and one example of the realization is proposed. The efficiency of the proposed algorithm won’t depend on the details of steganography method used for embedding. All the obtained results can be easily adapted for the digital video and audio analysis.

  10. Game of Words: Prototype of a Digital Game Focusing on Oral Production (and Comprehension) through Asynchronous Interaction

    Science.gov (United States)

    Loiseau, Mathieu; Hallal, Racha; Ballot, Pauline; Gazidedja, Ada

    2016-01-01

    In this paper, we present a learning game designed according to a strategy focusing on favouring the learners' "playful attitude". The game's modalities pertain to what we might call "guessing games". The chosen avatar of such guessing games both exists as learning and Commercial Off The Shelf (COTS) board games. We explain in…

  11. The Future of Digital Music Services in Three Stereotypes; How Focus Groups of End Users See the New Business Models

    NARCIS (Netherlands)

    Bookholt, Erik; Spil, Antonius A.M.; Katsma, Christiaan

    2013-01-01

    “I am just a stereotype” sang Terry Hall in 1980. Ariola records took them in and made the band The Specials a world success. How will that process go in 2014? Will they put it on You Tube for free? Do they need a record company? Will they have less or more fans, earn less or more money? Focus group

  12. BEATING ISIS IN THE DIGITAL SPACE: FOCUS TESTING ISIS DEFECTOR COUNTER-NARRATIVE VIDEOS WITH AMERICAN COLLEGE STUDENTS

    Directory of Open Access Journals (Sweden)

    Allision McDowell-Smith

    2017-03-01

    Full Text Available ISIS recruits on a 24/7 basis in over 21 languages over the Internet using videos, memes, tweets and other social media postings and swarming in on anyone that retweets, likes or endorses their materials to try to seduce them into the group. Their unprecedented social media drive has resulted in over 30,000 foreign fighters from more than 100 countries migrating to Syria and Iraq. ISIS recruitment in the U.S. is for the most part Internet based and has resulted in the actual and attempted recruitment of over 100 individuals residing in the U.S. with over 200 Americans traveling to Syria to join terrorist groups. To date very little counter-narrative material exists and most of it is cognitive versus emotionally impactful. The International Center for the Study of Violent Extremism (ICSVE Breaking the ISIS Brand – the ISIS Defectors Interviews Project has managed to collect 43 ISIS defector interviews and thus far produce two video clips of ISIS defectors denouncing the group which were focus tested in this research in a small normative college student sample of 75 undergraduate students. The results demonstrate that American college students find the videos authentic, disturbing and turn them away from ISIS, fulfilling the goals that the project is aiming for in producing counter-narrative materials.

  13. A novel fuzzy logic-based image steganography method to ensure medical data security.

    Science.gov (United States)

    Karakış, R; Güler, I; Çapraz, I; Bilir, E

    2015-12-01

    This study aims to secure medical data by combining them into one file format using steganographic methods. The electroencephalogram (EEG) is selected as hidden data, and magnetic resonance (MR) images are also used as the cover image. In addition to the EEG, the message is composed of the doctor׳s comments and patient information in the file header of images. Two new image steganography methods that are based on fuzzy-logic and similarity are proposed to select the non-sequential least significant bits (LSB) of image pixels. The similarity values of the gray levels in the pixels are used to hide the message. The message is secured to prevent attacks by using lossless compression and symmetric encryption algorithms. The performance of stego image quality is measured by mean square of error (MSE), peak signal-to-noise ratio (PSNR), structural similarity measure (SSIM), universal quality index (UQI), and correlation coefficient (R). According to the obtained result, the proposed method ensures the confidentiality of the patient information, and increases data repository and transmission capacity of both MR images and EEG signals. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  15. Image Steganography of Multiple File Types with Encryption and Compression Algorithms

    Directory of Open Access Journals (Sweden)

    Ernest Andreigh C. Centina

    2017-05-01

    Full Text Available The goals of this study were to develop a system intended for securing files through the technique of image steganography integrated with cryptography by utilizing ZLIB Algorithm for compressing and decompressing secret files, DES Algorithm for encryption and decryption, and Least Significant Bit Algorithm for file embedding and extraction to avoid compromise on highly confidential files from exploits of unauthorized persons. Ensuing to this, the system is in acc ordance with ISO 9126 international quality standards. Every quality criteria of the system was evaluated by 10 Information Technology professionals, and the arithmetic Mean and Standard Deviation of the survey were computed. The result exhibits that m ost of them strongly agreed that the system is excellently effective based on Functionality, Reliability, Usability, Efficiency, Maintainability and Portability conformance to ISO 9126 standards. The system was found to be a useful tool for both governmen t agencies and private institutions for it could keep not only the message secret but also the existence of that particular message or file et maintaining the privacy of highly confidential and sensitive files from unauthorized access.

  16. Rate-distortion analysis of steganography for conveying stereovision disparity maps

    Science.gov (United States)

    Umeda, Toshiyuki; Batolomeu, Ana B. D. T.; Francob, Filipe A. L.; Delannay, Damien; Macq, Benoit M. M.

    2004-06-01

    3-D images transmission in a way which is compliant with traditional 2-D representations can be done through the embedding of disparity maps within the 2-D signal. This approach enables the transmission of stereoscopic video sequences or images on traditional analogue TV channels (PAL or NTSC) or printed photographic images. The aim of this work is to study the achievable performances of such a technique. The embedding of disparity maps has to be seen as a global rate-distortion problem. The embedding capacity through steganography is determined by the transmission channel noise and by the bearable distortion on the watermarked image. The distortion of the 3-D image displayed as two stereo views depends on the rate allocated to the complementary information required to build those two views from one reference 2-D image. Results from the works on the scalar Costa scheme are used to optimize the embedding of the disparity map compressed bit stream into the reference image. A method for computing the optimal trade off between the disparity map distortion and embedding distortion as a function of the channel impairments is proposed. The goal is to get a similar distortion on the left (the reference image) and the right (the disparity compensated image) images. We show that in typical situations the embedding of 2 bits/pixels in the left image, while the disparity map is compressed at 1 bit per pixel leads to a good trade-off. The disparity map is encoded with a strong error correcting code, including synchronisation bits.

  17. Effect of using different cover image quality to obtain robust selective embedding in steganography

    Science.gov (United States)

    Abdullah, Karwan Asaad; Al-Jawad, Naseer; Abdulla, Alan Anwer

    2014-05-01

    One of the common types of steganography is to conceal an image as a secret message in another image which normally called a cover image; the resulting image is called a stego image. The aim of this paper is to investigate the effect of using different cover image quality, and also analyse the use of different bit-plane in term of robustness against well-known active attacks such as gamma, statistical filters, and linear spatial filters. The secret messages are embedded in higher bit-plane, i.e. in other than Least Significant Bit (LSB), in order to resist active attacks. The embedding process is performed in three major steps: First, the embedding algorithm is selectively identifying useful areas (blocks) for embedding based on its lighting condition. Second, is to nominate the most useful blocks for embedding based on their entropy and average. Third, is to select the right bit-plane for embedding. This kind of block selection made the embedding process scatters the secret message(s) randomly around the cover image. Different tests have been performed for selecting a proper block size and this is related to the nature of the used cover image. Our proposed method suggests a suitable embedding bit-plane as well as the right blocks for the embedding. Experimental results demonstrate that different image quality used for the cover images will have an effect when the stego image is attacked by different active attacks. Although the secret messages are embedded in higher bit-plane, but they cannot be recognised visually within the stegos image.

  18. Web Resources and Tools for Slovenian with a Focus on the Slovenian-English Language Infrastructure: Dictionaries in the Digital Age

    Directory of Open Access Journals (Sweden)

    Mojca Šorli

    2017-12-01

    Full Text Available The article begins with a presentation of a selection of electronic monolingual and bi/multilingual lexicographic resources and corpora available today to contemporary users of Slovene. The focus is on works combined with English and designed for translation purposes which provide information on the meaning of words and wider lexical units, i.e., e-dictionaries, lexical databases, web translation tools and various corpora. In a separate sub-section the most common translation technologies are presented, together with an evaluation of their role in the modern translation process. Sections 2 and 3 provide a brief outline of the changes that have affected classical dictionary planning, compilation and use in the new digital environment, as well as of the relationship between dictionaries and related resources, such as lexical databases. Some stereotypes regarding dictionary use are identified and, in conclusion, the existing corpus-based databases for the Slovenian-English pair are presented, with a view to determining priorities for the future interlingual infrastructure action plans in Slovenia.

  19. Forensic Analysis of Digital Image Tampering

    Science.gov (United States)

    2004-12-01

    analysis of when each method fails, which Chapter 4 discusses. Finally, a test image containing an invisible watermark using LSB steganography is...2.2 – Example of invisible watermark using Steganography Software F5 ............. 8 Figure 2.3 – Example of copy-move image forgery [12...used to embed the hidden watermark is Steganography Software F5 version 11+ discussed in Section 2.2. Original JPEG Image – 580 x 435 – 17.4

  20. H. Sapiens Digital: From Digital Immigrants and Digital Natives to Digital Wisdom

    Science.gov (United States)

    Prensky, Marc

    2009-01-01

    As we move further into the 21st century, the digital native/digital immigrant paradigm created by Marc Prensky in 2001 is becoming less relevant. In this article, Prensky suggests that we should focus instead on the development of what he calls "digital wisdom." Arguing that digital technology can make us not just smarter but truly wiser, Prensky…

  1. An Economic Perspective : The Future of Digital vs. Print Media with a focus on the cultural products of books and music

    OpenAIRE

    Lakhani, Imtiaz

    2011-01-01

    Digital media has introduced the market to the quickest form of content distribution man has ever seen. Many businesses have tried to adapt their business models to the digital world to maximize their value and influence. Internet has impacted many businesses worldwide giving them an opportunity to evolve and bring innovation to their business direction and economic model so they can offer a balanced value proposition to the consumer and gain competitive advantage in the market. There is a ge...

  2. Comparative Study between Digital Tomosynthesis and Endoscopic Retrograde Cholangio pancreatography for the Evaluation of Common Bile Duct Stones: Focus on Detection and Stone Conspicuity

    International Nuclear Information System (INIS)

    Huh, Ji Mi; Baek, Seung Yon; Hwang, Yun Mi; Lee, Jeong Kyong; Kim, Yoo Kyung; Yi, Sun Young

    2011-01-01

    To compare digital tomosynthesis with endoscopic retrograde cholangiopancreatography (ERCP) for the evaluation of common bile duct (CBD) stones as a complementary diagnostic tool. Ninety six consecutive patients clinically suspected of having CBD stones underwent ERCP and digital tomosynthesis over 22 months, from December, 2008 to May, 2010. Fourteen patients were excluded. Therefore 82 patients were included in this study. The images were retrospectively reviewed to compare the results with the final analysis based on the consensus of two abdominal radiologists. An evaluation of the presence of CBD stones was followed by a determination of the margins for the stones, scored with a five-point conspicuity scale. Among the 82 patients, 54 collectively had 89 CBD stones and 28 had no stones. The sensitivity and specificity for the detection of CBD stones were 91.0% and 80.6% for ERCP, 92.1% and 93.5% for digital tomosynthesis, respectively. The average score was 3.29 for ERCP and 3.89 for digital tomosynthesis in 77 similar detected stones. Digital tomosynthesis demonstrated significantly better conspicuity than ERCP (p = 0.001). Digital tomosynthesis is an effective and complementary diagnostic method for the evaluation of CBD stones.

  3. A review on "A Novel Technique for Image Steganography Based on Block-DCT and Huffman Encoding"

    Science.gov (United States)

    Das, Rig; Tuithung, Themrichon

    2013-03-01

    This paper reviews the embedding and extraction algorithm proposed by "A. Nag, S. Biswas, D. Sarkar and P. P. Sarkar" on "A Novel Technique for Image Steganography based on Block-DCT and Huffman Encoding" in "International Journal of Computer Science and Information Technology, Volume 2, Number 3, June 2010" [3] and shows that the Extraction of Secret Image is Not Possible for the algorithm proposed in [3]. 8 bit Cover Image of size is divided into non joint blocks and a two dimensional Discrete Cosine Transformation (2-D DCT) is performed on each of the blocks. Huffman Encoding is performed on an 8 bit Secret Image of size and each bit of the Huffman Encoded Bit Stream is embedded in the frequency domain by altering the LSB of the DCT coefficients of Cover Image blocks. The Huffman Encoded Bit Stream and Huffman Table

  4. Audre's daughter: Black lesbian steganography in Dee Rees' Pariah and Audre Lorde's Zami: A New Spelling of My Name.

    Science.gov (United States)

    Kang, Nancy

    2016-01-01

    This article argues that African-American director Dee Rees' critically acclaimed debut Pariah (2011) is a rewriting of lesbian poet-activist Audre Lorde's iconic "bio-mythography" Zami: A New Spelling of My Name (1982). The article examines how Rees' work creatively and subtly re-envisions Lorde's Zami by way of deeply rooted and often cleverly camouflaged patterns, resonances, and contrasts. Shared topics include naming, mother-daughter bonds, the role of clothing in identity formation, domestic abuse, queer time, and lesbian, gay, bisexual, and transgender legacy discourse construction. What emerges between the visual and written texts is a hidden language of connection--what may be termed Black lesbian steganography--which proves thought-provoking to viewers and readers alike.

  5. Klasifikasi Bit-Plane Noise untuk Penyisipan Pesan pada Teknik Steganography BPCS Menggunakan Fuzzy Inference Sistem Mamdani

    Directory of Open Access Journals (Sweden)

    Rahmad Hidayat

    2015-04-01

    Full Text Available Bit-Plane Complexity Segmentation (BPCS is a fairly new steganography technique. The most important process in BPCS is the calculation of complexity value of a bit-plane. The bit-plane complexity is calculated by looking at the amount of bit changes contained in a bit-plane. If a bit-plane has a high complexity, the bi-plane is categorized as a noise bit-plane that does not contain valuable information on the image. Classification of the bit-plane using the set cripst set (noise/not is not fair, where a little difference of the value will significantly change the status of the bit-plane. The purpose of this study is to apply the principles of fuzzy sets to classify the bit-plane into three sets that are informative, partly informative, and the noise region. Classification of the bit-plane into a fuzzy set is expected to classify the bit-plane in a more objective approach and ultimately message capacity of the images can be improved by using the Mamdani fuzzy inference to take decisions which bit-plane will be replaced with a message based on the classification of bit-plane and the size of the message that will be inserted. This research is able to increase the capability of BPCS steganography techniques to insert a message in bit-pane with more precise so that the container image quality would be better. It can be seen that the PSNR value of original image and stego-image is only slightly different.

  6. Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital

    Directory of Open Access Journals (Sweden)

    Alim Muadzani

    2016-08-01

    Full Text Available Information has now become an  important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to  hide the information before sending it and the receiver can recover the hidden data. Digital steganography using computer can use a variety of digital file, digital image file is one of them. With the infomation being hidden inside the image-carrier, the others will not aware about the hidden information. Application created using C# programming leanguage and the steganoraphy method using Least Significant Bit Insertion (LSBI. Microsoft Visual Studio used as Integrated Development Environtment (IDE to code and design the user interface. Software develpment model using Extreme Programming, and the testing using black box method. Application designed to hide text or image inside an image-carrier and the hidden text or image can be recovered. The result of this research are an application that can hide text or image into  image-carrier, and the hidden text or image can be recovered. Based on the testing application can run as expected and fulfill all the requirements.

  7. digital natives and digital immigrants

    OpenAIRE

    Cardina, Bruno; Francisco, Jerónimo; Reis, Pedro; trad. Silva, Fátima

    2011-01-01

    This article focuses on the generational gaps in school learning. Initially, we have tried to provide the framework in relation to the term digital native in order to understand the key aspects of the generation born after the advent and the global use of the Internet. They were found to be “multitasking” people, linked to technology and connectivity, as opposed to digital immigrants, born in an earlier period and seeking to adapt to the technological world. We also present some r...

  8. Pedagogical Praxis Surrounding the Integration of Photography, Visual Literacy, Digital Literacy, and Educational Technology into Business Education Classrooms: A Focus Group Study

    Science.gov (United States)

    Schlosser, Peter Allen

    2010-01-01

    This paper reports on an investigation into how Marketing and Business Education Teachers utilize and integrate educational technology into curriculum through the use of photography. The ontology of this visual, technological, and language interface is explored with an eye toward visual literacy, digital literacy, and pedagogical praxis, focusing…

  9. A multilevel analysis of Swedish and Norwegian students’ overall and digital reading performance with a focus on equity aspects of education

    Directory of Open Access Journals (Sweden)

    Maria A. Rasmusson

    2016-02-01

    Full Text Available Abstract Background Influence of external factors in general, and socioeconomic background factors in particular, on traditional reading performance has been extensively researched and debated. While traditional reading is well investigated in this respect, there is a lack of studies on equity aspects related to digital reading achievement, in spite of the fact that time spent on reading from digital devices such as computers, tablets, and smart phones without doubt is increasing all over the world. In the hope of contributing to an area that up until now to a great extent has been left unresearched, the present study aims at investigating to what degree external factors, such as cultural and economic capital, parental pressure, and school choice, are related to 15-year-old students’ achievement in digital reading and in overall reading on both the student level and the school level in Norway and Sweden. Methods To conduct the analysis, multilevel structural modeling techniques have been used on PISA data from the two countries. Results The results for the Norwegian as well as for the Swedish sample showed that overall reading achievement was related to cultural capital in both countries, as expected, and in line with previous research. An identified digital reading factor, representing the unique aspects of digital reading achievement when overall reading was controlled for, was less influenced by the external factors of cultural and economic capital, and by parental pressure and school type, compared to performance in overall reading. Interestingly, on the school level, it was found that the external factors, school choice, and parental pressure related to overall reading achievement differently in the Norwegian and Swedish samples. School choice influenced overall reading in the Swedish data but not in the Norwegian data, and the opposite pattern was found for parental pressure. Conclusion In conclusion, it is suggested that the results

  10. Cognitive Hacking and Digital Government: Digital Identity

    OpenAIRE

    Paul Thompson

    2004-01-01

    Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation syst...

  11. Final focus nomenclature

    International Nuclear Information System (INIS)

    Erickson, R.

    1986-01-01

    The formal names and common names for all devices in the final focus system of the SLC are listed. The formal names consist of a device type designator, microprocessor designator, and a four-digit unit number

  12. Final focus nomenclature

    Energy Technology Data Exchange (ETDEWEB)

    Erickson, R.

    1986-08-08

    The formal names and common names for all devices in the final focus system of the SLC are listed. The formal names consist of a device type designator, microprocessor designator, and a four-digit unit number. (LEW)

  13. Development of Stand Alone Application Tool for Processing and Quality Measurement of Weld Imperfection Image Captured by μ-Focused Digital Radiography Using MATLAB- Based Graphical User Interface

    Directory of Open Access Journals (Sweden)

    PZ Nadila

    2012-12-01

    Full Text Available Digital radiography incresingly is being applied in the fabrication industry. Compared to film- based radiography, digitally radiographed images can be acquired with less time and fewer exposures. However, noises can simply occur on the digital image resulting in a low-quality result. Due to this and the system’s complexity, parameters’ sensitivity, and environmental effects, the results can be difficult to interpret, even for a radiographer. Therefore, the need of an application tool to improve and evaluate the image is becoming urgent. In this research, a user-friendly tool for image processing and image quality measurement was developed. The resulting tool contains important components needed by radiograph inspectors in analyzing defects and recording the results. This tool was written by using image processing and the graphical user interface development environment and compiler (GUIDE toolbox available in Matrix Laboratory (MATLAB R2008a. In image processing methods, contrast adjustment, and noise removal, edge detection was applied. In image quality measurement methods, mean square error (MSE, peak signal-to-noise ratio (PSNR, modulation transfer function (MTF, normalized signal-to-noise ratio (SNRnorm, sensitivity and unsharpness were used to measure the image quality. The graphical user interface (GUI wass then compiled to build a Windows, stand-alone application that enables this tool to be executed independently without the installation of MATLAB.

  14. HIDING TEXT IN DIGITAL IMAGES USING PERMUTATION ORDERING AND COMPACT KEY BASED DICTIONARY

    Directory of Open Access Journals (Sweden)

    Nagalinga Rajan

    2017-05-01

    Full Text Available Digital image steganography is an emerging technique in secure communication for the modern connected world. It protects the content of the message without arousing suspicion in a passive observer. A novel steganography method is presented to hide text in digital images. A compact dictionary is designed to efficiently communicate all types of secret messages. The sorting order of pixels in image blocks are chosen as the carrier of embedded information. The high correlation in image pixel values means reordering within image blocks do not cause high distortion. The image is divided into blocks and perturbed to create non repeating sequences of intensity values. These values are then sorted according to the message. At the receiver end, the message is read from the sorting order of the pixels in image blocks. Only those image blocks with standard deviation lesser than a given threshold are chosen for embedding to alleviate visual distortion. Information Security is provided by shuffling the dictionary according to a shared key. Experimental Results and Analysis show that the method is capable of hiding text with more than 4000 words in a 512×512 grayscale image with a peak signal to noise ratio above 40 decibels.

  15. Digital filters

    CERN Document Server

    Hamming, Richard W

    1997-01-01

    Digital signals occur in an increasing number of applications: in telephone communications; in radio, television, and stereo sound systems; and in spacecraft transmissions, to name just a few. This introductory text examines digital filtering, the processes of smoothing, predicting, differentiating, integrating, and separating signals, as well as the removal of noise from a signal. The processes bear particular relevance to computer applications, one of the focuses of this book.Readers will find Hamming's analysis accessible and engaging, in recognition of the fact that many people with the s

  16. Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods

    Science.gov (United States)

    Rojali, Salman, Afan Galih; George

    2017-08-01

    Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or image quality that is approaching very good.

  17. Focus stacking: Comparing commercial top-end set-ups with a semi-automatic low budget approach. A possible solution for mass digitization of type specimens.

    Science.gov (United States)

    Brecko, Jonathan; Mathys, Aurore; Dekoninck, Wouter; Leponce, Maurice; VandenSpiegel, Didier; Semal, Patrick

    2014-01-01

    In this manuscript we present a focus stacking system, composed of commercial photographic equipment. The system is inexpensive compared to high-end commercial focus stacking solutions. We tested this system and compared the results with several different software packages (CombineZP, Auto-Montage, Helicon Focus and Zerene Stacker). We tested our final stacked picture with a picture obtained from two high-end focus stacking solutions: a Leica MZ16A with DFC500 and a Leica Z6APO with DFC290. Zerene Stacker and Helicon Focus both provided satisfactory results. However, Zerene Stacker gives the user more possibilities in terms of control of the software, batch processing and retouching. The outcome of the test on high-end solutions demonstrates that our approach performs better in several ways. The resolution of the tested extended focus pictures is much higher than those from the Leica systems. The flash lighting inside the Ikea closet creates an evenly illuminated picture, without struggling with filters, diffusers, etc. The largest benefit is the price of the set-up which is approximately € 3,000, which is 8 and 10 times less than the LeicaZ6APO and LeicaMZ16A set-up respectively. Overall, this enables institutions to purchase multiple solutions or to start digitising the type collection on a large scale even with a small budget.

  18. Focus stacking: Comparing commercial top-end set-ups with a semi-automatic low budget approach. A possible solution for mass digitization of type specimens

    Directory of Open Access Journals (Sweden)

    Jonathan Brecko

    2014-12-01

    Full Text Available In this manuscript we present a focus stacking system, composed of commercial photographic equipment. The system is inexpensive compared to high-end commercial focus stacking solutions. We tested this system and compared the results with several different software packages (CombineZP, Auto-Montage, Helicon Focus and Zerene Stacker. We tested our final stacked picture with a picture obtained from two high-end focus stacking solutions: a Leica MZ16A with DFC500 and a Leica Z6APO with DFC290. Zerene Stacker and Helicon Focus both provided satisfactory results. However, Zerene Stacker gives the user more possibilities in terms of control of the software, batch processing and retouching. The outcome of the test on high-end solutions demonstrates that our approach performs better in several ways. The resolution of the tested extended focus pictures is much higher than those from the Leica systems. The flash lighting inside the Ikea closet creates an evenly illuminated picture, without struggling with filters, diffusers, etc. The largest benefit is the price of the set-up which is approximately € 3,000, which is 8 and 10 times less than the LeicaZ6APO and LeicaMZ16A set-up respectively. Overall, this enables institutions to purchase multiple solutions or to start digitising the type collection on a large scale even with a small budget.

  19. Digital Creativity

    DEFF Research Database (Denmark)

    Petersson Brooks, Eva; Brooks, Anthony Lewis

    2014-01-01

    This paper reports on a study exploring the outcomes from children’s play with technology in early childhood learning practices. The paper addresses questions related to how digital technology can foster creativity in early childhood learning environments. It consists of an analysis of children......’s interaction with the KidSmart furniture focusing on digital creativity potentials and play values suggested by the technology. The study applied a qualitative approach and included125 children (aged three to five), 10 pedagogues, and two librarians. The results suggests that educators should sensitively...... consider intervening when children are interacting with technology, and rather put emphasize into the integration of the technology into the environment and to the curriculum in order to shape playful structures for children’s digital creativity....

  20. Digital broadcasting

    International Nuclear Information System (INIS)

    Park, Ji Hyeong

    1999-06-01

    This book contains twelve chapters, which deals with digitization of broadcast signal such as digital open, digitization of video signal and sound signal digitization of broadcasting equipment like DTPP and digital VTR, digitization of equipment to transmit such as digital STL, digital FPU and digital SNG, digitization of transmit about digital TV transmit and radio transmit, digital broadcasting system on necessity and advantage, digital broadcasting system abroad and Korea, digital broadcasting of outline, advantage of digital TV, ripple effect of digital broadcasting and consideration of digital broadcasting, ground wave digital broadcasting of DVB-T in Europe DTV in U.S.A and ISDB-T in Japan, HDTV broadcasting, satellite broadcasting, digital TV broadcasting in Korea, digital radio broadcasting and new broadcasting service.

  1. The digital computer

    CERN Document Server

    Parton, K C

    2014-01-01

    The Digital Computer focuses on the principles, methodologies, and applications of the digital computer. The publication takes a look at the basic concepts involved in using a digital computer, simple autocode examples, and examples of working advanced design programs. Discussions focus on transformer design synthesis program, machine design analysis program, solution of standard quadratic equations, harmonic analysis, elementary wage calculation, and scientific calculations. The manuscript then examines commercial and automatic programming, how computers work, and the components of a computer

  2. Focus on focusing

    International Nuclear Information System (INIS)

    Anon.

    1985-01-01

    The discovery and impact of the principle of strong focusing was celebrated at a history Symposium at Stanford on 25 July in the course of the 1985 US Summer School on Particle Accelerators. Burt Richter, Stanford Linac Director, who introduced all the speakers with well chosen reminders about their various contributions related to the theme of the symposium, remarked that it was an appropriate time to be lauding the great contributions of accelerator physicists following the Nobel Prize award to Simon van der Meer for outstanding achievements in accelerator physics

  3. Focus on focusing

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1985-10-15

    The discovery and impact of the principle of strong focusing was celebrated at a history Symposium at Stanford on 25 July in the course of the 1985 US Summer School on Particle Accelerators. Burt Richter, Stanford Linac Director, who introduced all the speakers with well chosen reminders about their various contributions related to the theme of the symposium, remarked that it was an appropriate time to be lauding the great contributions of accelerator physicists following the Nobel Prize award to Simon van der Meer for outstanding achievements in accelerator physics.

  4. Digital academia: How higher education is affected by digital technology

    OpenAIRE

    Eriksmo, Anton; Sundberg, Johan

    2016-01-01

    Digital technology in higher education is constantly evolving. Understanding the effects of digital technology is important for higher education institutions in order to make good investments of digital technology. Previous research has focused on learning, teaching or the organization and the relation between one of these aspects and digital technology, thereby missing a broader understanding of how materiality in digital technology affects higher education. In this study themed interviews w...

  5. Digital Textile Printing

    OpenAIRE

    Moltchanova, Julia

    2011-01-01

    Rapidly evolving technology of digital printing opens new opportunities on many markets. One of them is the printed fabric market where printing companies as well as clients benefit from new printing methods. This thesis focuses on the digital textile printing technology and its implementation for fabric-on-demand printing service in Finland. The purpose of this project was to study the technology behind digital textile printing, areas of application of this technology, the requirements ...

  6. Beyond Digital Citizenship

    Science.gov (United States)

    Mitchell, Lynn

    2016-01-01

    Conversations in middle school about digital citizenship tend to focus on the responsibilities of citizenship and the issues of surveillance, safety, cyberbullying, and internet etiquette. While these are important and essential conversations, digital citizenship education needs to consider youth political identity and democratic participation in…

  7. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  8. Digitally-Driven Architecture

    Directory of Open Access Journals (Sweden)

    Henriette Bier

    2014-07-01

    Full Text Available The shift from mechanical to digital forces architects to reposition themselves: Architects generate digital information, which can be used not only in designing and fabricating building components but also in embedding behaviours into buildings. This implies that, similar to the way that industrial design and fabrication with its concepts of standardisation and serial production influenced modernist architecture, digital design and fabrication influences contemporary architecture. While standardisation focused on processes of rationalisation of form, mass-customisation as a new paradigm that replaces mass-production, addresses non-standard, complex, and flexible designs. Furthermore, knowledge about the designed object can be encoded in digital data pertaining not just to the geometry of a design but also to its physical or other behaviours within an environment. Digitally-driven architecture implies, therefore, not only digitally-designed and fabricated architecture, it also implies architecture – built form – that can be controlled, actuated, and animated by digital means.In this context, this sixth Footprint issue examines the influence of digital means as pragmatic and conceptual instruments for actuating architecture. The focus is not so much on computer-based systems for the development of architectural designs, but on architecture incorporating digital control, sens­ing, actuating, or other mechanisms that enable buildings to inter­act with their users and surroundings in real time in the real world through physical or sensory change and variation.

  9. Digitally-Driven Architecture

    Directory of Open Access Journals (Sweden)

    Henriette Bier

    2010-06-01

    Full Text Available The shift from mechanical to digital forces architects to reposition themselves: Architects generate digital information, which can be used not only in designing and fabricating building components but also in embedding behaviours into buildings. This implies that, similar to the way that industrial design and fabrication with its concepts of standardisation and serial production influenced modernist architecture, digital design and fabrication influences contemporary architecture. While standardisa­tion focused on processes of rationalisation of form, mass-customisation as a new paradigm that replaces mass-production, addresses non-standard, complex, and flexible designs. Furthermore, knowledge about the designed object can be encoded in digital data pertaining not just to the geometry of a design but also to its physical or other behaviours within an environment. Digitally-driven architecture implies, therefore, not only digitally-designed and fabricated architecture, it also implies architecture – built form – that can be controlled, actuated, and animated by digital means. In this context, this sixth Footprint issue examines the influence of digital means as prag­matic and conceptual instruments for actuating architecture. The focus is not so much on computer-based systems for the development of architectural designs, but on architecture incorporating digital control, sens­ing, actuating, or other mechanisms that enable buildings to inter­act with their users and surroundings in real time in the real world through physical or sensory change and variation.

  10. Theory of Digital Automata

    CERN Document Server

    Borowik, Bohdan; Lahno, Valery; Petrov, Oleksandr

    2013-01-01

    This book serves a dual purpose: firstly to combine the treatment of circuits and digital electronics, and secondly, to establish a strong connection with the contemporary world of digital systems. The need for this approach arises from the observation that introducing digital electronics through a course in traditional circuit analysis is fast becoming obsolete. Our world has gone digital. Automata theory helps with the design of digital circuits such as parts of computers, telephone systems and control systems. A complete perspective is emphasized, because even the most elegant computer architecture will not function without adequate supporting circuits. The focus is on explaining the real-world implementation of complete digital systems. In doing so, the reader is prepared to immediately begin design and implementation work. This work serves as a bridge to take readers from the theoretical world to the everyday design world where solutions must be complete to be successful.

  11. Digital citizenship and neoliberalization: governing digital citizens in Denmark

    DEFF Research Database (Denmark)

    Schou, Jannick; Hjelholt, Morten

    2018-01-01

    Digital citizenship is becoming increasingly normalized within advanced democratic states. As society and governmental institutions become reliant on digital technologies, citizens are expected to be and act digitally. This article examines the governance of digital citizens through a case study...... this case study, the article contributes to current critical perspectives on the digital citizen as a new political figure. It adds new insights into digital citizenship by connecting this figure to wider processes of neoliberalization and state restructuring, pushing for a more pronounced focus...... of digitalization efforts in Denmark. Drawing on multiple forms of data, the article showcases how digital citizens are governed through a combination of discursive, legal and institutional means. The article highlights the political, but also institutional work that goes into making citizens digital. Providing...

  12. Introduction to digital communication systems

    CERN Document Server

    Wesolowski, Krzysztof

    2009-01-01

    Combining theoretical knowledge and practical applications, this advanced-level textbook covers the most important aspects of contemporary digital communication systems. Introduction to Digital Communication Systems focuses on the rules of functioning digital communication system blocks, starting with the performance limits set by the information theory. Drawing on information relating to turbo codes and LDPC codes, the text presents the basic methods of error correction and detection, followed by baseband transmission methods, and single- and multi-carrier digital modulations. The basi

  13. Cognitive Hacking and Digital Government: Digital Identity

    Directory of Open Access Journals (Sweden)

    Paul Thompson

    2004-04-01

    Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.

  14. Digital Technology Entrepreneurship

    DEFF Research Database (Denmark)

    Giones, Ferran; Brem, Alexander

    2017-01-01

    Technology entrepreneurship is an established concept in academia. However, recent developments in the context of digital entrepreneurship call for revision and advance- ment. The multiple possible combinations of technology and entrepreneurship have res- ulted in a diversity of phenomena...... with significantly different characteristics and socio-economic impact. This article is focused on the identification and description of technology entrepreneurship in times of digitization. Based on current examples, we identify and describe characterizations of technology entrepreneurship, digital techno- logy...... entrepreneurship, and digital entrepreneurship. With this new delineation of terms, we would like to foster discussion between researchers, entrepreneurs, and policy makers on the impact of digitization on entrepreneurship, and set a future research agenda....

  15. Focusing ethnography

    DEFF Research Database (Denmark)

    Woermann, Niklas

    2018-01-01

    underpinnings of focusing ethnographic research by comparing different schools of thought and suggesting a practice theory-based approach. It argues that many research projects are focused but do not reflect on the process of focusing, describes how to identify focal settings or practices, and introduces......Building theory with ethnography and filmic research increasingly requires focussing on key practices or settings, instead of painting a broad panorama of a culture. But few authors discuss why and how to focus. This article provides a systematic discussion of the theoretical and methodological...

  16. Digital radiography

    International Nuclear Information System (INIS)

    Brody, W.R.

    1984-01-01

    Digital Radiography begins with an orderly introduction to the fundamental concepts of digital imaging. The entire X-ray digital imagining system is described, from an overall characterization of image quality to specific components required for a digital radiographic system. Because subtraction is central to digital radiographic systems, the author details the use of various subtraction methods for image enhancement. Complex concepts are illustrated with numerous examples and presented in terms that can readily be understood by physicians without an advanced mathematics background. The second part of the book discusses implementations and applications of digital imagining systems based on area and scanned detector technologies. This section includes thorough coverage of digital fluoroscopy, scanned projection radiography, and film-based digital imaging systems, and features a state-of-the-art synopsis of the applications of digital subtraction angiography. The book concludes with a timely assessment of anticipated technological advances

  17. Steganography using RTP packets

    OpenAIRE

    Pontón Loaiza, Melina Marcela

    2014-01-01

    En tiempos actuales, donde la mayoría de las comunicaciones se realizan a través de medios digitales, la privacidad y seguridad al transmitir información pueden ser fácilmente vulnerables. La esteganografía, siendo la ciencia de ocultar comunicaciones secretas en medios aparentemente inocentes, nos puede ayudar a alcanzar este propósito. El objetivo del presente trabajo es el de actualizar y mejorar la herramienta esteganográfica stegan RTP, además de analizar las diferentes maneras en que la...

  18. Advanced digital optical communications

    CERN Document Server

    Binh, Le Nguyen

    2015-01-01

    This book provides a fundamental understanding of digital communication applications in optical communication technologies. Emphasizing operation principles versus mathematical analysis, the Second Edition includes new coverage of superchannel optical transmission systems, metropolitan and long-haul optical systems and networks, and Nyquist pulse shaping and high spectral efficiency of optical transmission systems, as well as new homework problems and examples. Featuring theoretical foundations as well as practical case studies, the text focuses on enhancements to digital technologies that are

  19. Focused Ethnography

    Directory of Open Access Journals (Sweden)

    Hubert Knoblauch

    2005-09-01

    Full Text Available In this paper I focus on a distinctive kind of sociological ethnography which is particularly, though not exclusively, adopted in applied research. It has been proposed that this branch of ethno­graphy be referred to as focused ethnography. Focused ethnography shall be delineated within the context of other common conceptions of what may be called conventional ethnography. However, rather than being opposed to it, focused ethno­graphy is rather complementary to conventional ethnography, particularly in fields that are charac­teristic of socially and functionally differentiated contemporary society. The paper outlines the back­ground as well as the major methodological features of focused ethnography, such as short-term field visits, data intensity and time intensity, so as to provide a background for future studies in this area. URN: urn:nbn:de:0114-fqs0503440

  20. Digital Culture and Digital Library

    Directory of Open Access Journals (Sweden)

    Yalçın Yalçınkaya

    2016-12-01

    Full Text Available In this study; digital culture and digital library which have a vital connection with each other are examined together. The content of the research consists of the interaction of culture, information, digital culture, intellectual technologies, and digital library concepts. The study is an entry work to integrity of digital culture and digital library theories and aims to expand the symmetry. The purpose of the study is to emphasize the relation between the digital culture and digital library theories acting intersection of the subjects that are examined. Also the perspective of the study is based on examining the literature and analytical evaluation in both studies (digital culture and digital library. Within this context, the methodology of the study is essentially descriptive and has an attribute for the transmission and synthesis of distributed findings produced in the field of the research. According to the findings of the study results, digital culture is an inclusive term that describes the effects of intellectual technologies in the field of information and communication. Information becomes energy and the spectrum of the information is expanding in the vertical rise through the digital culture. In this context, the digital library appears as a new living space of a new environment. In essence, the digital library is information-oriented; has intellectual technology support and digital platform; is in a digital format; combines information resources and tools in relationship/communication/cooperation by connectedness, and also it is the dynamic face of the digital culture in time and space independence. Resolved with the study is that the digital libraries are active and effective in the formation of global knowing and/or mass wisdom in the process of digital culture.

  1. Advanced Digital Preservation

    CERN Document Server

    Giaretta, David

    2011-01-01

    There is growing recognition of the need to address the fragility of digital information, on which our society heavily depends for smooth operation in all aspects of daily life. This has been discussed in many books and articles on digital preservation, so why is there a need for yet one more? Because, for the most part, those other publications focus on documents, images and webpages -- objects that are normally rendered to be simply displayed by software to a human viewer. Yet there are clearly many more types of digital objects that may need to be preserved, such as databases, scientific da

  2. Digitization in Maritime Industry

    DEFF Research Database (Denmark)

    Constantiou, Ioanna; Shollo, Arisa; Kreiner, Kristian

    2017-01-01

    Digitization in the maritime industry is expected to transform businesses. The recently introduced mobile technologies in inter-organizational processes is an example of digitization in an industry which moves very slowly towards digital transformation. We focus on the influence of mobile...... technologies on control practices in inter-organizational processes related to coping with an engine failure. We collected qualitative data from in depth interviews with representatives of the involved parties. We identify organizational and behavioural challenges hindering information sharing during problem...... technologies increase information sharing and thus the efficiency of inter-organizational processes when coping with an engine failure....

  3. Digital gaming expertise

    DEFF Research Database (Denmark)

    Toft-Nielsen, Claus

    In a digitally saturated environment digital media users of all kinds, engaged in different areas of activity, are increasingly categorized in terms of their ability to appropriate and use digital media – they are regarded as non-users, experts, natives, or literates for instance. Within communic......In a digitally saturated environment digital media users of all kinds, engaged in different areas of activity, are increasingly categorized in terms of their ability to appropriate and use digital media – they are regarded as non-users, experts, natives, or literates for instance. Within...... communication and game studies there are multiple understandings of how digital expertise is expressed and performed, and subsequently how these expressions and performances can be valued, understood and theorized within the research community. Among other things expertise with and within digital games has......-of-game (Schrøder, 2003) in a three-year-long study of men and women (couples and singles) playing the largest Massively Multiplayer Online Role-Playing Game to date, World of Warcraft. In focusing on how different aspects of gaming expertise are articulated, negotiated, and performed, I aim to illustrate how...

  4. Digital mammography; Mamografia digital

    Energy Technology Data Exchange (ETDEWEB)

    Chevalier, M.; Torres, R.

    2010-07-01

    Mammography represents one of the most demanding radiographic applications, simultaneously requiring excellent contrast sensitivity, high spatial resolution, and wide dynamic range. Film/screen is the most widely extended image receptor in mammography due to both its high spatial resolution and contrast. The film/screen limitations are related with its narrow latitude, structural noise and that is at the same time the medium for the image acquisition, storage and presentation. Several digital detector made with different technologies can overcome these difficulties. Here, these technologies as well as their main advantages and disadvantages are analyzed. Also it is discussed its impact on the mammography examinations, mainly on the breast screening programs. (Author).

  5. Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA

    Directory of Open Access Journals (Sweden)

    Antonius Erick Handoyo

    2018-02-01

    Full Text Available This study proposed a combination of steganography and cryptography techniques using LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to digital imagery. Digital image pixel values range from 0 to 255, making the keys used in RSA limited enough and less secure. So in this study, it is proposed to convert pixel image value to 16 bits so that the key used can be more varied. Experimental results proved that there was a steady increase in security and imperceptibility. This was shown by the results of PSNR 57.2258dB and MSE 0.1232dB. This method was also resistant to salt and pepper attacks. Penelitian ini mengusulkan kombinasi teknik steganografi dan kriptografi menggunakan metode LSB – RSA. RSA merupakan teknik kriptografi yang populer dapat diterapkan pada citra digital. Nilai piksel citra digital hanya berkisar 0 sampai 255. Hal ini membuat kunci yang digunakan dalam RSA cukup terbatas sehingga kurang aman. Dalam penelitian ini diusulkan untuk mengkonversi nilai piksel citra menjadi 16 bit sehingga kunci yang digunakan dapat lebih bervariasi. Hasil eksperimen membuktikan adanya peningkatan keamanan serta nilai imperceptibility yang tetap terjaga. Hal ini dibuktikan dengan hasil PSNR 57.2258dB, MSE 0.1232dB. Metode ini juga tahan terhadap serangan salt and pepper.

  6. Digital squares

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Kim, Chul E

    1988-01-01

    Digital squares are defined and their geometric properties characterized. A linear time algorithm is presented that considers a convex digital region and determines whether or not it is a digital square. The algorithm also determines the range of the values of the parameter set of its preimages....... The analysis involves transforming the boundary of a digital region into parameter space of slope and y-intercept...

  7. Digital skrivedidaktik

    DEFF Research Database (Denmark)

    Digital skrivedidaktik består af to dele. Første del præsenterer teori om skrivekompetence og digital skrivning. Digital skrivning er karakteriseret ved at tekster skrives på computer og med digitale værktøjer, hvilket ændrer skrivningens traditionelle praksis, produkt og processer. Hvad er digital...... om elevens skriveproces) og Blogskrivning (der styrker eleverne i at bruge blogs i undervisningen)....

  8. Digital Citizenship

    Science.gov (United States)

    Isman, Aytekin; Canan Gungoren, Ozlem

    2014-01-01

    Era in which we live is known and referred as digital age.In this age technology is rapidly changed and developed. In light of these technological advances in 21st century, schools have the responsibility of training "digital citizen" as well as a good citizen. Digital citizens must have extensive skills, knowledge, Internet and …

  9. Black Men and the Digital Divide

    Science.gov (United States)

    Conceição, Simone C. O.; Martin, Larry G.

    2016-01-01

    This chapter focuses on the role adult educators can play in assisting Black men to overcome the challenges faced in accessing and using digital technology and acquiring appropriate skills in a digital society.

  10. First Year Digital Marketing Plan : Case: Arctos

    OpenAIRE

    Järvelin, Reetta

    2016-01-01

    Digital marketing is becoming increasingly important, as communication through digital chan-nels develops and some aspects of traditional marketing become irrelevant. Digital marketing focuses on current and relevant methods of reaching audiences, making it a valuable marketing asset for businesses. This thesis is a study into the field of digital marketing, including common tools and best practices. The thesis is a project-based thesis, which aims to create a complete digital marketing p...

  11. Digital subtraktion

    DEFF Research Database (Denmark)

    Mussmann, Bo Redder

    2004-01-01

    Digital subtraktion er en metode til at fjerne uønskede oplysninger i et røntgenbillede. Subtraktionsteknikken bruges primært i forbindelse med angiografi hvor man kun er interesseret i at se selve karret. Derfor er digital subtraktion i daglig tale synonymt med DSA eller DVI – hhv. Digital...... Subtraction Angiography eller Digital Vascular Imaging. Benævnelserne er to røntgenfirmaers navn for den samme teknik. Digital subtraktion kræver speciel software, samt at apparaturet kan eksponere i serier....

  12. Digital preservation

    CERN Document Server

    Deegan, Marilyn

    2013-01-01

    Digital preservation is an issue of huge importance to the library and information profession right now. With the widescale adoption of the internet and the rise of the world wide web, the world has been overwhelmed by digital information. Digital data is being produced on a massive scale by individuals and institutions: some of it is born, lives and dies only in digital form, and it is the potential death of this data, with its impact on the preservation of culture, that is the concern of this book. So how can information professionals try to remedy this? Digital preservation is a complex iss

  13. Digital Natives or Digital Tribes?

    Science.gov (United States)

    Watson, Ian Robert

    2013-01-01

    This research builds upon the discourse surrounding digital natives. A literature review into the digital native phenomena was undertaken and found that researchers are beginning to identify the digital native as not one cohesive group but of individuals influenced by other factors. Primary research by means of questionnaire survey of technologies…

  14. Without 'Focus'

    Directory of Open Access Journals (Sweden)

    Aldo Sevi

    2010-12-01

    Full Text Available It is widely accepted that a notion of 'focus', more or less as conceived of in Jackendoff (1972, must be incorporated into our theory of grammar, as a means of accounting for certain observed correlations between prosodic facts and semantic/pragmatic facts. In this paper, we put forth the somewhat radical idea that the time has come to give up this customary view, and eliminate 'focus' from our theory of grammar. We argue that such a move is both economical and fruitful.Research over the years has revealed that the correlations between prosody, 'focus', and the alleged semantic/pragmatic effects of focus are much less clear and systematic than we may have initially hoped. First we argue that this state of affairs detracts significantly from the utility of our notion of 'focus', to the point of calling into question the very motivation for including it in the grammar. Then we look at some of the central data, and show how they might be analyzed without recourse to a notion of 'focus'. We concentrate on (i the effect of pitch accent placement on discourse congruence, and (ii the choice of 'associate' for the so-called 'focus sensitive' adverb only. We argue that our focus-free approach to the data improves empirical coverage, and begins to reveal patterns that have previously been obscured by preconceptions about 'focus'.ReferencesBeaver, D. & Clark, B. 2008. Sense and Sensitivity: How Focus Determines Meaning. Blackwell.Beaver, D., Clark, B., Flemming, E., Jaeger, T. F. & Wolters, M. 2007. ‘When semantics meets phonetics: Acoustical studies of second occurrence focus’. Language 83.2: 245–76.http://dx.doi.org/10.1353/lan.2007.0053Beckman, M. & Hirschberg, J. 1994. ‘The ToBI Annotation Conventions’. Ms.,http://www.cs.columbia.edu/~julia/files/conv.pdf.Bolinger, D. 1972. ‘Accent is predictable (if you are a mind-reader’. Language 48.3: 633–44.http://dx.doi.org/10.2307/412039Büring, D. 2006. ‘Focus projection and default

  15. Conceptualizing Digital Literacies and Digital Ethics for Sustainability Education

    Science.gov (United States)

    Brown, Susan A.

    2014-01-01

    Purpose: The purpose of this paper is to discuss the need for integrating a focus on digital literacies and digital ethics into sustainability education, proposing a conceptualization of these for sustainability education. Design/methodology/approach: The paper draws on relevant literature in the field of sustainability education and in the field…

  16. Material focus

    DEFF Research Database (Denmark)

    Sokoler, Tomas; Vallgårda, Anna K. A.

    2009-01-01

    In this paper we build on the notion of computational composites, which hold a material perspective on computational technology. We argue that a focus on the material aspects of the technology could be a fruitful approach to achieve new expressions and to gain a new view on the technology's role...... in design. We study two of the computer's material properties: computed causality and connectability and through developing two computational composites that utilize these properties we begin to explore their potential expressions....

  17. On Digital Crossings in Europe

    NARCIS (Netherlands)

    Ponzanesi, S.|info:eu-repo/dai/nl/182984257; Leurs, K.H.A.|info:eu-repo/dai/nl/343295334

    2014-01-01

    ‘On Digital Crossings in Europe’ explores the entanglements of digital media and migration beyond the national and mono-ethnic focus. We argue how borders, identity and affectivity have been destabilized and reconfigured through medium-specific technological affordances, opting for a comparative and

  18. Emergent Principles for Digital Documentary

    NARCIS (Netherlands)

    Lachman, Richard

    2016-01-01

    textabstractDigital Documentaries are an area of rapid invention and experimentation at all levels, including creative content, production techniques, and business models.  As with many forms of digital storytelling, a focus on technologies can be distracting; platforms change rapidly, and are

  19. Digital Media Stories for Persuasion

    Science.gov (United States)

    Leopold, Lisa

    2010-01-01

    Digital media story-telling (which enhances traditional oral story-telling with images, music, and text) has been a focus of recent scholarship for its potential to produce numerous educational benefits. Through digital media storytelling, students' imagination, creativity, critical thinking, writing, public speaking, and organizational or…

  20. Digital Social Science Lab

    DEFF Research Database (Denmark)

    Svendsen, Michael; Lauersen, Christian Ulrich

    2015-01-01

    At the Faculty Library of Social Sciences (part of Copenhagen University Library) we are currently working intensely towards the establishment of a Digital Social Science Lab (DSSL). The purpose of the lab is to connect research, education and learning processes with the use of digital tools...... at the Faculty of Social Sciences. DSSL will host and facilitate an 80 m2 large mobile and intelligent study- and learning environment with a focus on academic events, teaching and collaboration. Besides the physical settings DSSL has two primary functions: 1. To implement relevant social scientific software...... and hardware at the disposal for students and staff at The Faculty of Social Sciences along with instruction and teaching in the different types of software, e.g. Stata, Nvivo, Atlas.ti, R Studio, Zotero and GIS-software. 2. To facilitate academic events focusing on use of digital tools and analytic software...

  1. Digital mammography

    International Nuclear Information System (INIS)

    Bick, Ulrich; Diekmann, Felix

    2010-01-01

    This state-of-the-art reference book provides in-depth coverage of all aspects of digital mammography, including detector technology, image processing, computer-aided diagnosis, soft-copy reading, digital workflow, and PACS. Specific advantages and disadvantages of digital mammography in comparison to screen-film mammography are thoroughly discussed. By including authors from both North America and Europe, the book is able to outline variations in the use, acceptance, and quality assurance of digital mammography between the different countries and screening programs. Advanced imaging techniques and future developments such as contrast mammography and digital breast tomosynthesis are also covered in detail. All of the chapters are written by internationally recognized experts and contain numerous high-quality illustrations. This book will be of great interest both to clinicians who already use or are transitioning to digital mammography and to basic scientists working in the field. (orig.)

  2. Digital Insights

    DEFF Research Database (Denmark)

    Knudsen, Gry Høngsmark

    , by incorporating media as both channel, frame, and apparatus for advertising response, the dissertation brings into attention that more aspects than the text-reader relationship influence ad response. Finally, the dissertation proposes the assemblage approach for exploring big data in consumer culture research...... and practices with digital media, when they meet and interpret advertising. Through studies of advertising response on YouTube and experiments with consumers’ response to digitally manipulated images, the dissertation shows how digital media practices facilitate polysemic and socially embedded advertising......This dissertation forwards the theory of digital consumer-response as a perspective to examine how digital media practices influence consumers’ response to advertising. Digital consumer-response is a development of advertising theory that encompasses how consumers employ their knowledge...

  3. Digital Signage

    OpenAIRE

    Fischer, Karl Peter

    2011-01-01

    Digital Signage for in-store advertising at gas stations/retail stores in Germany: A field study Digital Signage networks provide a novel means of advertising with the advantage of easily changeable and highly customizable animated content. Despite the potential and increasing use of these media empirical research is scarce. In a field study at 8 gas stations (with integrated convenience stores) we studied the effect of digital signage advertising on sales for different products and servi...

  4. Sports Digitalization

    DEFF Research Database (Denmark)

    Xiao, Xiao; Hedman, Jonas; Tan, Felix Ter Chian

    2017-01-01

    evolution, as digital technologies are increasingly entrenched in a wide range of sporting activities and for applications beyond mere performance enhancement. Despite such trends, research on sports digitalization in the IS discipline is surprisingly still nascent. This paper aims at establishing...... a discourse on sports digitalization within the discipline. Toward this, we first provide an understanding of the institutional characteristics of the sports industry, establishing its theoretical importance and relevance in our discipline; second, we reveal the latest trends of digitalization in the sports...

  5. Digital printing

    Science.gov (United States)

    Sobotka, Werner K.

    1997-02-01

    Digital printing is described as a tool to replace conventional printing machines completely. Still this goal was not reached until now with any of the digital printing technologies to be described in the paper. Productivity and costs are still the main parameters and are not really solved until now. Quality in digital printing is no problem anymore. Definition of digital printing is to transfer digital datas directly on the paper surface. This step can be carried out directly or with the use of an intermediate image carrier. Keywords in digital printing are: computer- to-press; erasable image carrier; image carrier with memory. Digital printing is also the logical development of the new digital area as it is pointed out in Nicholas Negropotes book 'Being Digital' and also the answer to networking and Internet technologies. Creating images text and color in one country and publishing the datas in another country or continent is the main advantage. Printing on demand another big advantage and last but not least personalization the last big advantage. Costs and being able to coop with this new world of prepress technology is the biggest disadvantage. Therefore the very optimistic growth rates for the next few years are really nonexistent. The development of complete new markets is too slow and the replacing of old markets is too small.

  6. Plasma Focus

    International Nuclear Information System (INIS)

    Bernard, Alain; Jolas, Alain; Garconnet, J.-P.; Mascureau, J. de; Nazet, Christian; Coudeville, Alain; Bekiarian, Andre.

    1977-01-01

    The present report is the edition of the lectures given in a conference on the Focus experiment held at the Centre d'etudes de Limeil, on Oct. 1975. After a survey of the early laboratories one will find the main results obtained in Limeil concerning interferometry, laser scattering, electric and magnetic-measurements, X-ray and neutron emission and also the possible use of explosive current generators instead of capacitor banks at high energy levels. The principal lines of future research are given in the conclusion [fr

  7. Cost Model for Digital Preservation: Cost of Digital Migration

    DEFF Research Database (Denmark)

    Kejser, Ulla Bøgvad; Nielsen, Anders Bo; Thirifays, Alex

    2011-01-01

    The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis...... for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS) Reference Model. Within this framework, which we denote the Cost Model for Digital...... Preservation (CMDP), the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been...

  8. Focusing horn

    CERN Multimedia

    1980-01-01

    This was the first magnetic horn developed by Simon Van der Meer to collect antiprotons in the AD complex. It was used for the AA (antiproton accumulator). Making an antiproton beam took a lot of time and effort. Firstly, protons were accelerated to an energy of 26 GeV/c (protons at 26GeV/c, antiprotons at 3.6GeV/c) in the PS and ejected onto a metal target. From the spray of emerging particles, a magnetic horn picked out 3.6 GeV antiprotons for injection into the AA through a wide-aperture focusing quadrupole magnet. For a million protons hitting the target, just one antiproton was captured, 'cooled' and accumulated. It took 3 days to make a beam of 3 x 10^11 -, three hundred thousand million - antiprotons. The development of this technology was a key step to the functioning of CERN's Super Proton Synchrotron as a proton - antiproton collider.

  9. Digital information culture the individual and society in the digital age

    CERN Document Server

    Tredinnick, Luke

    2008-01-01

    Digital Information Culture is an introduction to the cultural, social and political impact of digital information and digital resources. The book is organised around themes, rather than theories and is arranged into three sections: culture, society and the individual. Each explores key elements of the social, cultural and political impact of digital information. The culture section outlines the origins of cyber culture in fifties pulp-fiction through to the modern day. It explores the issues of information overload, the threat of a digital dark age, and the criminal underbelly of digital culture. Section two, society, explores the economic and social impact of digital information, outlining key theories of the Information Age. Section three explores the impact of digital information and digital resources on the individual, exploring the changing nature of identity in a digital world. Written by a leading author in the field Focuses on digital information and its social, cultural and political impact is uniqu...

  10. Digital Audiobooks

    DEFF Research Database (Denmark)

    Have, Iben; Pedersen, Birgitte Stougaard

    Audiobooks are rapidly gaining popularity with widely accessible digital downloading and streaming services. The paper is framing how the digital audiobook expands and changes the target groups for book publications and how it as an everyday activity is creating new reading experiences, places...

  11. Digital TMI

    Science.gov (United States)

    Rios, Joseph

    2012-01-01

    Presenting the current status of the Digital TMI project to visiting members of the FAA Command Center. Digital TMI is an effort to store national-level traffic management initiatives in a standards-compliant manner. Work is funded by the FAA.

  12. Architectural Optimization of Digital Libraries

    Science.gov (United States)

    Biser, Aileen O.

    1998-01-01

    This work investigates performance and scaling issues relevant to large scale distributed digital libraries. Presently, performance and scaling studies focus on specific implementations of production or prototype digital libraries. Although useful information is gained to aid these designers and other researchers with insights to performance and scaling issues, the broader issues relevant to very large scale distributed libraries are not addressed. Specifically, no current studies look at the extreme or worst case possibilities in digital library implementations. A survey of digital library research issues is presented. Scaling and performance issues are mentioned frequently in the digital library literature but are generally not the focus of much of the current research. In this thesis a model for a Generic Distributed Digital Library (GDDL) and nine cases of typical user activities are defined. This model is used to facilitate some basic analysis of scaling issues. Specifically, the calculation of Internet traffic generated for different configurations of the study parameters and an estimate of the future bandwidth needed for a large scale distributed digital library implementation. This analysis demonstrates the potential impact a future distributed digital library implementation would have on the Internet traffic load and raises questions concerning the architecture decisions being made for future distributed digital library designs.

  13. Digital Humanities: What Can Libraries Offer?

    Science.gov (United States)

    Wong, Shun Han Rebekah

    2016-01-01

    The collaborative aspect of digital humanities is one of the core values of the field. Specialists and organizations involved in digital humanities partnerships may include individual scholars focusing on a particular area, multiple scholars across disciplines, computer scientists, or digital humanities centers. Through a quantitative analysis of…

  14. Preparing Teachers to Teach Digital Citizenship

    NARCIS (Netherlands)

    Searson, Michael; Voogt, Joke; Whittier, David; Plants, Robert; Gibson, David; Sutton, Bonnie; Ochoa, Marilyn; Sutton, Vic; McBride, Ron; Searson, Michael

    2013-01-01

    A team of SITE leaders was awarded a highly competitive “Digital Citizenship Award” from Facebook to explore the role of digital citizenship in teacher education. The focus of the SITE “Preparing Teachers to Teach Digital Citizenship” project is the development of a college based course, available

  15. Age differences in associations with digital gaming

    NARCIS (Netherlands)

    Nap, H.H.; IJsselsteijn, W.A.; Kort, de Y.A.W.; Atkins, B.; Kennedy, H.

    2009-01-01

    Seniors are an underrepresented group as digital gamers, but also as a focus of study in digital gaming research. We know relatively little about senior gamers, in particular about their needs and motivations to engage in digital gaming. The current explorative study used a free association

  16. Digital displacements

    DEFF Research Database (Denmark)

    Pors, Anja Svejgaard

    2014-01-01

    In recent years digital reforms are being introduced in the municipal landscape of Denmark. The reforms address the interaction between citizen and local authority. The aim is, that by 2015 at least 80 per cent of all correspondence between citizens and public authority will be transmitted through...... digital interface. However, the transformation of citizen services from traditional face-to-face interaction to digital self-service gives rise to new practices; some citizens need support to be able to manage self-service through digital tools. A mixture of support and teaching, named co......-service, is a new task in public administration, where street level bureaucrats assist citizens in using the new digital solutions. The paper is based on a case study conducted primarily in a citizen service centre in Copenhagen, Denmark. Based on ethnography the paper gives an empirical account of the ongoing...

  17. Digitized mammograms

    International Nuclear Information System (INIS)

    Bruneton, J.N.; Balu-Maestro, C.; Rogopoulos, A.; Chauvel, C.; Geoffray, A.

    1988-01-01

    Two observers conducted a blind evaluation of 100 mammography files, including 47 malignant cases. Films were read both before and after image digitization at 50 μm and 100 μm with the FilmDRSII. Digitization permitted better analysis of the normal anatomic structures and moderately improved diagnostic sensitivity. Searches for microcalcifications before and after digitization at 100 μm and 50 μm showed better analysis of anatomic structures after digitization (especially for solitary microcalcifications). The diagnostic benefit, with discovery of clustered microcalcifications, was more limited (one case at 100 μm, nine cases at 50 μm). Recognition of microcalcifications was clearly improved in dense breasts, which can benefit from reinterpretation after digitization at 50 μm rather 100μm

  18. Emergent Principles for Digital Documentary

    Directory of Open Access Journals (Sweden)

    Richard Lachman

    2016-12-01

    Full Text Available Digital Documentaries are an area of rapid invention and experimentation at all levels, including creative content, production techniques, and business models.  As with many forms of digital storytelling, a focus on technologies can be distracting; platforms change rapidly, and are dependent on external commercial forces rather than creative potential.  This article presents several design strategies for driving experimentation in digital documentary above and beyond the specific of platform and technology. The core focus is on treating digital docs as experiences, with an expanded range of designable moments, as well as a strategic approach to designing interactions for their unique set of challenges.  The discussion is not intended to fully define digital documentary design factors, but rather, defines a useful subset of methods that can lead emerging practitioners to new innovations in their approach.

  19. Linguistics and the digital humanities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    2014-01-01

    Corpus linguistics has been closely intertwined with digital technology since the introduction of university computer mainframes in the 1960s. Making use of both digitized data in the form of the language corpus and computational methods of analysis involving concordancers and statistics software......, corpus linguistics arguably has a place in the digital humanities. Still, it remains obscure and figures only sporadically in the literature on the digital humanities. This article provides an overview of the main principles of corpus linguistics and the role of computer technology in relation to data...... and method and also offers a bird's-eye view of the history of corpus linguistics with a focus on its intimate relationship with digital technology and how digital technology has impacted the very core of corpus linguistics and shaped the identity of the corpus linguist. Ultimately, the article is oriented...

  20. Digital Ethics/Going Digital.

    Science.gov (United States)

    Wilson, Bradley

    1996-01-01

    Finds that the recent National Press Photographers Association code of ethics can serve as a model for any photography staff. Discusses how digital imaging is becoming commonplace in classrooms, due to decreasing costs and easier software. Explains digital terminology. Concludes that time saved in the darkroom and at the printer is now spent on…

  1. Digital radiography

    International Nuclear Information System (INIS)

    Coulomb, M.; Dal Soglio, S.; Pittet-Barbier, L.; Ranchoup, Y.; Thony, F.; Ferretti, G.; Robert, F.

    1992-01-01

    Digital projection radiography may replace conventional radiography some day, provided it can meet several requirements: equal or better diagnostic effectiveness of the screen-film systems; reasonable image cost; real improvement in the productivity of the Departments of Imaging. All digital radiographic systems include an X-ray source, an image acquisition and formatting sub-system, a display and manipulation sub-system, and archiving subsystem and a laser editing system, preferably shared by other sources of digital images. Three digitization processes are available: digitization of the radiographic film, digital fluorography and phospholuminescent detectors with memory. The advantages of digital fluoroscopy are appealing: real-time image acquisition, suppression of cassettes; but its disadvantages are far from negligible: it cannot be applied to bedside radiography, the field of examination is limited, and the wide-field spatial resolution is poor. Phospholuminescent detectors with memory have great advantages: they can be used for bedside radiographs and on all the common radiographic systems; spatial resolution is satisfactory; its current disadvantages are considerable. These two systems, have common properties making up the entire philosophy of digital radiology and specific features that must guide our choice according to the application. Digital fluorography is best applied in pediatric radiology. However, evaluation works have showed that it was applicable with sufficient quality to many indications of general radiology in which a fluoroscopic control and fast acquisition of the images are essential; the time gained on the examination may be considerable, as well as the savings on film. Detectors with memory are required for bedside radiographs, in osteoarticular and thoracic radiology, in all cases of traumatic emergency and in the resuscitation and intensive care departments

  2. Digital Marketing and the Pillars of Shopper Experience

    OpenAIRE

    NEGRICEA, Costel Iliuta; PURCAREA, Ioan Matei

    2014-01-01

    We already live in a world of digital empowered intelligent customers, of digital products, of digital business operations and digital competitors. The fierce competition forces firms to exploit digital technologies, to have profound knowledge, to focus on market imperatives and to demonstrate a deep commitment to these digital empowered intelligent customers that disrupts every industry. Advantaged are the companies that master relevant data flow and improve the performance of employees who ...

  3. Digital Labour in Chinese Internet Industries

    OpenAIRE

    Bingqing Xia

    2014-01-01

    Digital labour has been the subject of considerable research in recent years (Van Dijck 2009, Manzerolle 2010, Dyer-Witheford 2010). But relatively little research has considered professional workers in digital media. This research addresses this gap by focusing on professional workers in the Chinese Internet industries. This paper asks: How are these digital labourers involved in the digital media production? To what extent should we criticise this involvement? Based on detailed empirica...

  4. Strategies in the digital printing value system

    OpenAIRE

    Mejtoft, Thomas

    2006-01-01

    The research objective of this thesis is to identify corporate strategies and strategic decisions in the digital printing business and to analyze how these have evolved due to the introduction of digital printing. This thesis comprises three separate studies, all based on qualitative case methodology. The first study is focused on digital printing houses and how their business strategies have changed due to their investment in digital printing production equipment. The second study concentrat...

  5. Becoming digital

    DEFF Research Database (Denmark)

    Pors, Anja Svejgaard

    2015-01-01

    . An ethnographic account of how digital reforms are implemented in practice shows how street-level bureaucrat’s classic tasks such as specialized casework are being reconfigured into educational tasks that promote the idea of “becoming digital”. In the paper, the author argues that the work of “becoming digital....... Originality/value: The study contributes to ethnographic research in public administration by combining two separate subfields, e-government and street-level bureaucracy, to discern recent transformations in public service delivery. In the digital era, tasks, control and equality are distributed in ways...

  6. Digital Humanities

    DEFF Research Database (Denmark)

    Brügger, Niels

    2016-01-01

    , and preserving material to study, as an object of study in its own right, as an analytical tool, or for collaborating, and for disseminating results. The term "digital humanities" was coined around 2001, and gained currency within academia in the following years. However, computers had been used within......Digital humanities is an umbrella term for theories, methodologies, and practices related to humanities scholarship that use the digital computer as an integrated and essential part of its research and teaching activities. The computer can be used for establishing, finding, collecting...

  7. Digital Snaps

    DEFF Research Database (Denmark)

    Sandbye, Mette; Larsen, Jonas

    . Distance as the New Punctum / Mikko Villi -- pt. II. FAMILY ALBUMS IN TRANSITION -- ch. 4. How Digital Technologies Do Family Snaps, Only Better / Gillian Rose -- ch. 5. Friendship Photography: Memory, Mobility and Social Networking / Joanne Garde-Hansen -- ch. 6. Play, Process and Materiality in Japanese...... -- ch. 9. Retouch Yourself: The Pleasures and Politics of Digital Cosmetic Surgery / Tanya Sheehan -- ch. 10. Virtual Selves: Art and Digital Autobiography / Louise Wolthers -- ch. 11. Mobile-Media Photography: New Modes of Engagement / Michael Shanks and Connie Svabo....

  8. Digital electronics

    CERN Document Server

    Morris, John

    2013-01-01

    An essential companion to John C Morris's 'Analogue Electronics', this clear and accessible text is designed for electronics students, teachers and enthusiasts who already have a basic understanding of electronics, and who wish to develop their knowledge of digital techniques and applications. Employing a discovery-based approach, the author covers fundamental theory before going on to develop an appreciation of logic networks, integrated circuit applications and analogue-digital conversion. A section on digital fault finding and useful ic data sheets completes th

  9. Digital Leadership

    DEFF Research Database (Denmark)

    Zupancic, Tadeja; Verbeke, Johan; Achten, Henri

    2016-01-01

    Leadership is an important quality in organisations. Leadership is needed to introduce change and innovation. In our opinion, in architectural and design practices, the role of leadership has not yet been sufficiently studied, especially when it comes to the role of digital tools and media....... With this paper we intend to initiate a discussion in the eCAADe community to reflect and develop ideas in order to develop digital leadership skills amongst the membership. This paper introduces some important aspects, which may be valuable to look into when developing digital leadership skills....

  10. Digital radiography

    International Nuclear Information System (INIS)

    Zani, M.L.

    2002-01-01

    X-ray radiography is a very common technique used to check the homogeneity of a material or the inside of a mechanical part. Generally the radiation that goes through the material to check, produced an image on a sensitized film. This method requires time because the film needs to be developed, digital radiography has no longer this inconvenient. In digital radiography the film is replaced by digital data and can be processed as any computer file. This new technique is promising but its main inconvenient is that today its resolution is not so good as that of film radiography. (A.C.)

  11. Digital radiography

    International Nuclear Information System (INIS)

    Kusano, Shoichi

    1993-01-01

    Firstly, from an historic point of view, fundamental concepts on digital imaging were reviewed to provide a foundation for discussion of digital radiography. Secondly, this review summarized the results of ongoing research in computed radiography that replaces the conventional film-screen system with a photo-stimulable phosphor plate; and thirdly, image quality, radiation protection, and image processing techniques were discussed with emphasis on picture archiving and communication system environment as our final goal. Finally, future expansion of digital radiography was described based on the present utilization of computed tomography at the National Defense Medical College Hospital. (author) 60 refs

  12. Digital fabrication

    CERN Document Server

    2012-01-01

    The Winter 2012 (vol. 14 no. 3) issue of the Nexus Network Journal features seven original papers dedicated to the theme “Digital Fabrication”. Digital fabrication is changing architecture in fundamental ways in every phase, from concept to artifact. Projects growing out of research in digital fabrication are dependent on software that is entirely surface-oriented in its underlying mathematics. Decisions made during design, prototyping, fabrication and assembly rely on codes, scripts, parameters, operating systems and software, creating the need for teams with multidisciplinary expertise and different skills, from IT to architecture, design, material engineering, and mathematics, among others The papers grew out of a Lisbon symposium hosted by the ISCTE-Instituto Universitario de Lisboa entitled “Digital Fabrication – A State of the Art”. The issue is completed with four other research papers which address different mathematical instruments applied to architecture, including geometric tracing system...

  13. Digital Relationships

    DEFF Research Database (Denmark)

    Ledborg Hansen, Richard

    -­rich information and highly interesting communication are sky-­high and rising. With a continuous increase in digitized communication follows a decrease in face-­to-­face encounters and our ability to engage in inter-­personal relationships are suffering for it (Davis, 2013). The behavior described in this paper......-­‐Jones, 2011) for increases in effectiveness and efficiency we indiscriminately embrace digital communication and digitized information dissemination with enthusiasm – at the risk of ignoring the potentially dark side of technology. However, technology also holds a promise for better understanding precisely...... for the same reasons – that the growing amount of digitized communication “out there” represents data waiting to be sifted, analyzed and decoded. In this paper “Facebook behavior” refers to a particular behavior characterized by presenting your self and representations of selected self in the hope of getting...

  14. Digital Discretion

    DEFF Research Database (Denmark)

    Busch, Peter Andre; Zinner Henriksen, Helle

    2018-01-01

    discretion is suggested to reduce this footprint by influencing or replacing their discretionary practices using ICT. What is less researched is whether digital discretion can cause changes in public policy outcomes, and under what conditions such changes can occur. Using the concept of public service values......This study reviews 44 peer-reviewed articles on digital discretion published in the period from 1998 to January 2017. Street-level bureaucrats have traditionally had a wide ability to exercise discretion stirring debate since they can add their personal footprint on public policies. Digital......, we suggest that digital discretion can strengthen ethical and democratic values but weaken professional and relational values. Furthermore, we conclude that contextual factors such as considerations made by policy makers on the macro-level and the degree of professionalization of street...

  15. Achievement report for fiscal 1998 on area consortium research and development business. Area consortium for venture business development by building base for small business (abuse double protected next generation card system based on steganography); 1998 nendo venture kigyo ikuseigata chiiki consortium kenkyu kaihatsu (chusho kigyo sozo kibangata). Steganography gijutsu wo riyoshita jisedaigata fusei shiyo taju boshi guard system no kenkyu kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    A card system is developed using BPCS (Business Planning and Control System) steganography, with electronic data imbedded in the card. Under the system, the visual recognition of the user and the mechanical verification of the card are carried out simultaneously, with the card rejecting any abuse. In fiscal 1998, a system was built by way of trial, constituted of technologies of encoding, decoding, and packaging data into an IC (integrated circuit) card. A photograph of the user's face is attached to the card, the card carries an 8KB IC memory device, and the device stores data of the photograph of the user's face etc. A password has to be inputted before any data may be taken out. A customized key is required to display the imbedded personal data and, for the restoration of the key data, the personal key known only to the owner and the company key that is kept by the card managing company need to be collated with each other. Multiple checking is available for the prevention of abuse, which include the collation of face photographs, collation with display by inputting the password, and request for the customized key to confirm the presence of authority to read the imbedded personal data. (NEDO)

  16. Illustration Watermarking for Digital Images: An Investigation of Hierarchical Signal Inheritances for Nested Object-based Embedding

    Science.gov (United States)

    2007-02-23

    approach for signal-level watermark inheritance. 15. SUBJECT TERMS EOARD, Steganography , Image Fusion, Data Mining, Image ...189, Geneva, Switzerland, 2006 [V Block-Luminance and Blue Channel LSB Wet Paper Code Image Watermarking, accepte publication in: Proceedings of...SPIE Electronic Imaging , Security, Steganography , and Wa- termarking of Multimedia Contents IX, 2007 Interaction with a project from German Science

  17. Digital imaging in dentistry.

    Science.gov (United States)

    Essen, S Donovan

    2011-01-01

    Information technology is vital to operations, marketing, accounting, finance and administration. One of the most exciting and quickly evolving technologies in the modern dental office is digital applications. The dentist is often the business manager, information technology officer and strategic planning chief for his small business. The information systems triangle applies directly to this critical manager supported by properly trained ancillary staff and good equipment. With emerging technology driving all medical disciplines and the rapid pace at which it emerges, it is vital for the contemporary practitioner to keep abreast of the newest information technology developments. This article compares the strategic and operational advantages of digital applications, specifically imaging. The focus of this paper will be on digital radiography (DR), 3D computerized tomography, digital photography and digitally-driven CAD/CAM to what are now considered obsolescing modalities and contemplates what may arrive in the future. It is the purpose of this essay to succinctly evaluate the decisions involved in the role, application and implications of employing this tool in the dental environment

  18. Digital Collections, Digital Libraries & the Digitization of Cultural Heritage Information.

    Science.gov (United States)

    Lynch, Clifford

    2002-01-01

    Discusses digital collections and digital libraries. Topics include broadband availability; digital rights protection; content, both non-profit and commercial; digitization of cultural content; sustainability; metadata harvesting protocol; infrastructure; authorship; linking multiple resources; data mining; digitization of reference works;…

  19. SUSTAINABILITY OF DIGITAL PUBLIC SPACES

    Directory of Open Access Journals (Sweden)

    Matej Hudák

    2015-07-01

    Full Text Available Purpose: Modern digital public spaces are evolving from being mostly the provider of ICT and internet connection to institutions that provide complex range of services and support for the community. With this shift in their focus new challenges are emerging, among others their sustainability.Methodology/Approach: We build on and extend the methodology of Digital Cooperatives project. Within this project, survey on 59 digital public spaces from 12 EU countries was conducted. These digital public spaces were examined in 21 areas, some of them relating to their sustainability. We further analyse the sustainability issue of these digital public spaces.Findings: We identified three main issues affecting sustainability of digital public spaces – budgeting, services and community. Digital public spaces mostly rely on public funding and have limited diversification of their funds, which increases a risk when one source of funding drops out. They also have to build a strong community of users, supporters, which will make use of their capacities and helps co-create new services and thus strengthen and improve the community itself.Originality/Value of paper: Research in this paper is based on the collection of best practices from various EU countries in the field of digital public spaces. Recommendations based on these practices could help the creation of new, and in current digital public spaces.

  20. Legal Deposit of Digital Materials

    Directory of Open Access Journals (Sweden)

    Erik Oltmans

    2003-09-01

    Full Text Available Digital publishing is causing a real paradigm shift for research institutions and publishers, as well as for libraries. As a consequence these institutions have to develop new policies, new business models and new infrastructures and techniques. A major problem is that, at the same rate at which our world is becoming digital, the digital information is threatened. New types of hardware, computer applications and file formats supersede each other, making our recorded digital information inaccessible in the long-term. In the past years libraries and archives have undertaken several actions and studies on digital preservation issues. For instance the Koninklijke Bibliotheek (KB has jointly with IBM developed a standard-based deposit system: Digital Information Archiving System ( DIAS. Using DIAS the KB realised in 2002 an electronic deposit (the e-Depot and signed archiving agreements with major science publishers for permanent keeping of their digital materials. In this paper I will discuss the fully operational e-Depot at the KB. I will focus on the data flow of processing the digital publications, and I will address the issue of digital preservation in detail.

  1. Are "Digital Natives" Really Digitally Competent?--A Study on Chinese Teenagers

    Science.gov (United States)

    Li, Yan; Ranieri, Maria

    2010-01-01

    Literature review has found that despite the considerable attention focused on "digital natives", few studies have carefully investigated the characteristics of this group. The purpose of this study is to contribute to the debate on digital natives by providing a "piece of evidence" on the digital competence status of a group…

  2. Digital evidence

    Directory of Open Access Journals (Sweden)

    Lukić Tatjana

    2012-01-01

    Full Text Available Although computer makes human activities faster and easier, innovating and creating new forms of work and other kinds of activities, it also influenced the criminal activity. The development of information technology directly affects the development of computer forensics without which, it can not even imagine the discovering and proving the computer offences and apprehending the perpetrator. Information technology and computer forensic allows us to detect and prove the crimes committed by computer and capture the perpetrators. Computer forensics is a type of forensics which can be defined as a process of collecting, preserving, analyzing and presenting digital evidence in court proceedings. Bearing in mind, that combat against crime, in which computers appear as an asset or object of the offense, requires knowledge of digital evidence as well as specific rules and procedures, the author in this article specifically addresses the issues of digital evidence, forensic (computer investigation, specific rules and procedures for detecting, fixing and collecting digital evidence and use of this type of evidence in criminal proceedings. The author also delas with international standards regarding digital evidence and cyber-space investigation.

  3. Digital watermark

    Directory of Open Access Journals (Sweden)

    Jasna Maver

    2000-01-01

    Full Text Available The huge amount of multimedia contents available on the World-Wide-Web is beginning to raise the question of their protection. Digital watermarking is a technique which can serve various purposes, including intellectual property protection, authentication and integrity verification, as well as visible or invisible content labelling of multimedia content. Due to the diversity of digital watermarking applicability, there are many different techniques, which can be categorised according to different criteria. A digital watermark can be categorised as visible or invisible and as robust or fragile. In contrast to the visible watermark where a visible pattern or image is embedded into the original image, the invisible watermark does not change the visual appearance of the image. The existence of such a watermark can be determined only through a watermark ex¬traction or detection algorithm. The robust watermark is used for copyright protection, while the fragile watermark is designed for authentication and integrity verification of multimedia content. A watermark must be detectable or extractable to be useful. In some watermarking schemes, a watermark can be extracted in its exact form, in other cases, we can detect only whether a specific given watermarking signal is present in an image. Digital libraries, through which cultural institutions will make multimedia contents available, should support a wide range of service models for intellectual property protection, where digital watermarking may play an important role.

  4. CEA SMAD 2016 Digitizer Evaluation.

    Energy Technology Data Exchange (ETDEWEB)

    Merchant, Bion J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Sandia National Laboratories has tested and evaluated an updated SMAD digitizer, developed by the French Alternative Energies and Atomic Energy Commission (CEA). The SMAD digitizers are intended to record sensor output for seismic and infrasound monitoring applications. The purpose of this digitizer evaluation is to measure the performance characteristics in such areas as power consumption, input impedance, sensitivity, full scale, self-noise, dynamic range, system noise, response, passband, and timing. The SMAD digitizers have been updated since their last evaluation by Sandia to improve their performance when recording at a sample rate of 20 Hz for infrasound applications and 100 Hz for hydro-acoustic seismic stations. This evaluation focuses primarily on the 20 Hz and 100 Hz sample rates. The SMAD digitizers are being evaluated for potential use in the International Monitoring System (IMS) of the Comprehensive Nuclear Test- Ban-Treaty Organization (CTBTO).

  5. From Cards To Digital Games

    DEFF Research Database (Denmark)

    Valente, Andrea; Marchetti, Emanuela

    2017-01-01

    This study is based on an iterative, participatory design investigation that we are conducting in order to create digital games that could be flexibly re-designed by players, without requiring programming knowledge. In particular we focus on digital game development, both design and implementation......, for primary school pupils and their teachers. We propose a scenario where digital game development is mediated by tinkering with paper prototypes similar to board games. We address the problems of making sense and expressing rules of a digital game without programming. Analysis of our latest participatory...... workshop offers evidence that a board game can work as a tangible model of the computation happening in a digital game. Children understand the practice of designing games mainly as manipulation of features and behaviors of the visual elements of a game. We attempt at looking beyond visual programming...

  6. An overview of digital radiography

    International Nuclear Information System (INIS)

    Aweligiba, S. A.

    2013-04-01

    The medical application of radiography has gained wider study since diagnostic radiology plays a very important role in modern medicine for fast diagnosis and therapy. Digital radiography is a relatively new technology that promises greater accuracy, lesser dose and better manipulation of patient radiology images in hospitals. In this study, a general discussion on digital radiography has been presented. The presentation focuses on the optimisation of doses to patients in the medical application of digital radiography, quality control and quality assurance. A brief presentation on performance indicators in digital radiography has also been presented. The advantages of digital radiography over the conventional film/screen system have been elaborated and its limitations are also outlined. (author)

  7. Digital radiography

    International Nuclear Information System (INIS)

    Rath, M.; Lissner, J.; Rienmueller, R.; Haendle, J.; Siemens A.G., Erlangen

    1984-01-01

    Using a prototype of an electronic, universal examination unit equipped with a special X-ray TV installation, spotfilm exposures and digital angiographies with high spatial resolution and wide-range contrast could be made in the clinic for the first time. With transvenous contrast medium injection, the clinical results of digital angiography show excellent image quality in the region of the carotids and renal arteries as well as the arteries of the extremities. The electronic series exposures have an image quality almost comparable to the quality obtained with cutfilm changers in conventional angiography. There are certain limitations due to the input field of 25 cm X-ray image intensified used. In respect of the digital angiography imaging technique, the electronic universal unit is fully suitable for clinical application. (orig.) [de

  8. Digital photogrammetry

    CERN Document Server

    Egels, Yves

    2003-01-01

    Photogrammetry is the use of photography for surveying primarily and is used for the production of maps from aerial photographs. Along with remote sensing, it represents the primary means of generating data for Geographic Information Systems (GIS). As technology develops, it is becoming easier to gain access to it. The cost of digital photogrammetric workstations are falling quickly and these new tools are therefore becoming accessible to more and more users. Digital Photogrammetry is particularly useful as a text for graduate students in geomantic and is also suitable for people with a good basic scientific knowledge who need to understand photogrammetry, and who wish to use the book as a reference.

  9. Digital Marketing

    OpenAIRE

    Jerry Wind; Vijay Mahajan

    2002-01-01

    The digital revolution has shaken marketing to its core with consumers being offered greater price transparency and often even the chance to dictate the price. What does pricing mean in a world in which customers propose their own prices (as at priceline.com) or buyers and sellers haggle independently in auctions (as at e-Bay)? The most significant changes in the digital marketing show the emergence of 'cyber consumers', the cyber business-to-business world and the changing reality of an incr...

  10. Digital "X"

    DEFF Research Database (Denmark)

    Baiyere, Abayomi; Grover, Varun; Gupta, Alok

    2017-01-01

    Interest in using digital before existing research concepts seem to be on the rise in the IS field. This panel is positioned to explore what value lies in labelling our research as digital “x” as opposed to the well established IT “x” (where “x” can be strategy, infrastructure, innovation, artifa...... between this stream of research and existing research. Central among the expected output of the panel is the advancement of suggestions for future research and the critical pitfalls to avoid in doing so....

  11. Digital Radiography

    Science.gov (United States)

    1986-01-01

    System One, a digital radiography system, incorporates a reusable image medium (RIM) which retains an image. No film is needed; the RIM is read with a laser scanner, and the information is used to produce a digital image on an image processor. The image is stored on an optical disc. System allows the radiologist to "dial away" unwanted images to compare views on three screens. It is compatible with existing equipment and cost efficient. It was commercialized by a Stanford researcher from energy selective technology developed under a NASA grant.

  12. Digital voltmeter

    International Nuclear Information System (INIS)

    Yohannes Kamadi; Soekarno.

    1976-01-01

    The electrical voltage measuring equipment with digital display has been made. This equipment uses four digits display with single polarity measurement and integrating system. Pulses from the oscillator will be counted and converted to the staircase voltages, and compared to the voltage measured. When the balance is already achieved, the pulse will appear at the comparator circuit. This pulse will be used to trigger univibrator circuit. The univibrator output is used as signal for stopping the counting, and when reading time T already stops, the counting system will be reset. (authors)

  13. Digital communication

    CERN Document Server

    Das, Apurba

    2010-01-01

    ""Digital Communications"" presents the theory and application of the philosophy of Digital Communication systems in a unique but lucid form. This book inserts equal importance to the theory and application aspect of the subject whereby the authors selected a wide class of problems. The Salient features of the book are: the foundation of Fourier series, Transform and wavelets are introduces in a unique way but in lucid language; the application area is rich and resemblance to the present trend of research, as we are attached with those areas professionally; a CD is included which contains code

  14. Digital literacies

    CERN Document Server

    Hockly, Nicky; Pegrum, Mark

    2014-01-01

    Dramatic shifts in our communication landscape have made it crucial for language teaching to go beyond print literacy and encompass the digital literacies which are increasingly central to learners' personal, social, educational and professional lives. By situating these digital literacies within a clear theoretical framework, this book provides educators and students alike with not just the background for a deeper understanding of these key 21st-century skills, but also the rationale for integrating these skills into classroom practice. This is the first methodology book to address not jus

  15. Design Thinking for Digital Fabrication in Education

    DEFF Research Database (Denmark)

    Smith, Rachel Charlotte; Iversen, Ole Sejer; Hjorth, Mikkel

    2015-01-01

    In this paper, we argue that digital fabrication in education may benefit from design thinking, to foster a more profound understanding of digital fabrication processes among students. Two related studies of digital fabrication in education are presented in the paper. In an observational study we...... found that students (eleven to fifteen) lacked an understanding of the complexity of the digital fabrication process impeding on the potentials of digital fabrication in education. In a second explorative research through design study, we investigated how a focus on design thinking affected the students...

  16. Digital delicacies

    OpenAIRE

    Holley, Rose

    2001-01-01

    This presentation outlines the purpose and work of the newly appointed Digital Projects Librarian at the University of Auckland. It gives a brief overview of what digitisation is, the benefits, the stages of a digitisation project and also samples of interesting international digitisation projects and new University of Auckland Library Digitisation projects.

  17. Digital Forensics

    Science.gov (United States)

    Harron, Jason; Langdon, John; Gonzalez, Jennifer; Cater, Scott

    2017-01-01

    The term forensic science may evoke thoughts of blood-spatter analysis, DNA testing, and identifying molds, spores, and larvae. A growing part of this field, however, is that of digital forensics, involving techniques with clear connections to math and physics. This article describes a five-part project involving smartphones and the investigation…

  18. Digital Disruption

    DEFF Research Database (Denmark)

    Rosenstand, Claus Andreas Foss

    det digitale domæne ud over det niveau, der kendetegner den nuværende debat, så præsenteres der ny viden om digital disruption. Som noget nyt udlægges Clayton Christens teori om disruptiv innovation med et særligt fokus på små organisationers mulighed for eksponentiel vækst. Specielt udfoldes...... forholdet mellem disruption og den stadig accelererende digitale udvikling i konturerne til ny teoridannelse om digital disruption. Bogens undertitel ”faretruende og fascinerende forandringer” peger på, at der er behov for en nuanceret debat om digital disruption i modsætning til den tone, der er slået an i...... videre kalder et ”disruption-råd”. Faktisk er rådet skrevet ind i 2016 regeringsgrundlaget for VLK-regeringen. Disruption af organisationer er ikke et nyt fænomen; men hastigheden, hvormed det sker, er stadig accelererende. Årsagen er den globale mega-trend: Digitalisering. Og derfor er specielt digital...

  19. Digital books.

    Science.gov (United States)

    Wink, Diane M

    2011-01-01

    In this bimonthly series, the author examines how nurse educators can use the Internet and Web-based computer technologies such as search, communication, and collaborative writing tools; social networking and social bookmarking sites; virtual worlds; and Web-based teaching and learning programs. This article describes digital books.

  20. Digital forvaltning

    DEFF Research Database (Denmark)

    Remmen, Arne; Larsen, Torben; Mosgaard, Mette

    2004-01-01

    Større effektivitet, bedre service og mere demokrai er blot nogle af forventningerne til indførelse af digital forveltning i kommunerne. Kapitlet giver bland andet svar på spørgsmålene : Hvordan lever kommunerne op hertil i dagligdagen? hvilke virkemidler anvender de? Hvilke barrierer har der været...

  1. Digital Methods

    NARCIS (Netherlands)

    Rogers, R.

    2013-01-01

    In Digital Methods, Richard Rogers proposes a methodological outlook for social and cultural scholarly research on the Web that seeks to move Internet research beyond the study of online culture. It is not a toolkit for Internet research, or operating instructions for a software package; it deals

  2. Desk games digitalization using radon transformation and color ...

    African Journals Online (AJOL)

    Desk games digitalization using radon transformation and color segmentation. M Horacek, L Beran, L Rejfek. Abstract. The research is focused on real-time digitalization of board games. ... AJOL African Journals Online. HOW TO USE AJOL.

  3. Digital Humanities and networked digital media

    DEFF Research Database (Denmark)

    Finnemann, Niels Ole

    2014-01-01

    This article discusses digital humanities and the growing diversity of digital media, digital materials and digital methods. The first section describes the humanities computing tradition formed around the interpretation of computation as a rule-based process connected to a concept of digital...... materials centred on the digitisation of non-digital, finite works, corpora and oeuvres. The second section discusses “the big tent” of contemporary digital humanities. It is argued that there can be no unifying interpretation of digital humanities above the level of studying digital materials with the help...... of software-supported methods. This is so, in part, because of the complexity of the world and, in part, because digital media remain open to the projection of new epistemologies onto the functional architecture of these media. The third section discusses the heterogeneous character of digital materials...

  4. Digital Materia

    OpenAIRE

    Lindgren, Marcus; Richey, Emma

    2014-01-01

    Med tankar från pedagogen Montessori och filosoferna Platon och Baudrillard har detta arbete behandlat frågor om datorn och dess betydelse för en grafiker. Frågeställningen formulerades efter hand och lydde tillslut: ”Hur kan materia te sig i digital form?” Forskningen resulterade i en hypotes för hur digital materia skulle födas i datorn: genom att blanda två uppsättningar av data, såsom två genuppsättningar tillsammans skapar en ny organism. Under produktionen utvecklades därmed en metod fö...

  5. Becoming digital

    DEFF Research Database (Denmark)

    Pors, Anja Svejgaard

    2015-01-01

    government, and draws on empirical material generated through observations, field notes, interviews and policy documents. The material is documenting how service is performed by frontline agents in the ‘bureaucratic encounter’ with citizens, who needs assistance to use digital self-service in order to apply...... online for a public benefit. Findings: The paper shows that e-government technology changes the mode of professionalism in citizen service from service to support. The paper gives an empirical account of recent Danish digital reforms and shows how the reforms both enable and constrain the work...... of ‘becoming digital’ by frontline agents. Overall the street-level bureaucrat’s classical tasks such as specialized casework are being displaced into promoting and educational tasks. An implication of this is blurred distinctions between professional skills and personal competences of the frontline agent...

  6. Digital resources

    Directory of Open Access Journals (Sweden)

    Redazione Reti Medievali (a cura di

    2005-12-01

    Full Text Available Bibliotheca Latinitatis Mediaevalis (circa VII sec. - XIV sec. IntraText Digital Library [01/06] Corpus Scriptorum Latinorum. A digital library of Latin literature by David Camden [01/06] Fonti disponibili online concernenti la vita religiosa medievale Rete Vitae Religiosae Mediaevalis Studia Conectens [01/06] Fuentes del Medievo Hispanico Instituto de Historia, Consejo Superior de Investigaciones Científicas [01/06] Latin Literature Forum Romanum [01/06] Ludovico Antonio Muratori, Dissertazioni sopra le antichità italiane, 1751 Biblioteca dei Classici Italiani di Giuseppe Bonghi [01/06] Medieval Latin The Latin Library [01/06] Médiévales Presses Universitaires de Vincennes - Revues.org [01/06] Regesta imperii Deutsche Kommission für die Bearbeitung der Regesta Imperii e.V. [01/06] Suda On Line Byzantine Lexicography [01/06

  7. Digital teenagers

    Directory of Open Access Journals (Sweden)

    Rafael Conde Melguizo

    2011-12-01

    Full Text Available Espín, Manuel (Coord.(2011 Adolescentes Digitales.  Revista Estudios de Juventud, Nº 92. Marzo 2011. INJUVE, Madrid."Adolescentes digitales" se nos muestra como una obra que pretende explorar desde distintos puntos de vista la realidad de la generación conocida como “nativos digitales” (Prensky, la generación actual de adolescentes que ha crecido con internet y el mundo digital como su entorno normal de socialización.

  8. Digital Flora

    OpenAIRE

    Bunnell, Katie

    2007-01-01

    This research is concerned with developing a new business model for flexible small scale ceramic production that exploits the customisation capabilities of digital manufacturing technologies and the market potential and global connectivity of the world wide web. It is arguably of particular relevance to regional economic development in remote areas (Amin, Tomaney, Sabel) such as Cornwall where there is a culture of high quality small scale production, limited market and manufacturing opportun...

  9. Rhizomatic, digital habitat

    DEFF Research Database (Denmark)

    Kjærgaard, Thomas; Sorensen, Elsebeth Korsgaard

    2014-01-01

    are social in a connected rhizomatic network then information sharing, knowledge production and technology embody a strong synergetic entity. The study suggests that technologies used to create ’digital habitats’ are likely to enhance learning and motivation and allow new creative ways of working......’Homo conexus’ is used as a metaphor for the alleged next evolution of homo sapiens, an evolution that prepares us for knowledge production in the technology rich ‘network society’. This paper describes an experiment with network learning utilizing collaborative web technologies in a cooperative...... learning environment in college education. The pedagogic design focuses on the individual learner’s role in the group and on the group as a part of a larger digital, learning cooperative. The authors use the notion of the rhizome as a metaphor for learning in ’the postmodern state’ of information sharing...

  10. Digital optical computer II

    Science.gov (United States)

    Guilfoyle, Peter S.; Stone, Richard V.

    1991-12-01

    OptiComp is currently completing a 32-bit, fully programmable digital optical computer (DOC II) that is designed to operate in a UNIX environment running RISC microcode. OptiComp's DOC II architecture is focused toward parallel microcode implementation where data is input in a dual rail format. By exploiting the physical principals inherent to optics (speed and low power consumption), an architectural balance of optical interconnects and software code efficiency can be achieved including high fan-in and fan-out. OptiComp's DOC II program is jointly sponsored by the Office of Naval Research (ONR), the Strategic Defense Initiative Office (SDIO), NASA space station group and Rome Laboratory (USAF). This paper not only describes the motivational basis behind DOC II but also provides an optical overview and architectural summary of the device that allows the emulation of any digital instruction set.

  11. Implementation of Digital Watermarking Using MATLAB Software

    OpenAIRE

    Karnpriya Vyas; Kirti Sethiya; Sonu Jain

    2012-01-01

    Digital watermarking holds significant promise as one of the keys to protecting proprietary digital content in the coming years. It focuses on embedding information inside a digital object such that the embedded information is in separable bound to the object. The proposed scheme has been implemented on MATLAB, as it is a high level technical computing language and interactive environment for algorithm development, data visualization, data analysis, and numerical computation. We w...

  12. Digital Storytelling and Multimodal Literacy in Education

    OpenAIRE

    Gregori-Signes, Carmen

    2014-01-01

    This article argues in favour of using digital storytelling to encourage a critical socio-educational focus in education and include multimodal explicit teaching in the curriculum.The analysis of fifty digital stories indicates that the students developed a certain awareness of the issue chosen for their story (e.g. violence, racism, war) since the final product transmits a critical perspective on the topic itself. Further work, however, needs to be invested in the development of the digital ...

  13. Bridging the Digital Divide Creating Digital Dividend - The Investigation in Guizhou Province and the Analysis of GZNW

    Directory of Open Access Journals (Sweden)

    Linbo Jing

    2007-12-01

    Full Text Available This article begins with attention to the digital divide. It gives a brief overview of the digital divide on a global basis and analyzes specific aspects of the digital divide in our country. It also introduces the informationization construction of Guizhou Province and points out problems with the digital divide in that province. Then it focuses on the practice of Guizhou Province to bridge the digital divide ---- the practice and experience of GZNW. The final section gives a series of policy recommendations on how to bridge the digital divide, realize digital dividends, and how to build a new socialist countryside.

  14. Digital citizens Digital nations: the next agenda

    NARCIS (Netherlands)

    A.W. (Bert) Mulder; M.W. (Martijn) Hartog

    2015-01-01

    DIGITAL CITIZENS CREATE A DIGITAL NATION Citizens will play the lead role as they – in the next phase of the information society – collectively create a digital nation. Personal adoption of information and communication technology will create a digital infrastructure that supports individual and

  15. Digital Amsterdam : Digital Art and Public Space in Amsterdam

    NARCIS (Netherlands)

    Cnossen, Boukje; Franssen, Thomas; De Wilde, Mandy

    2015-01-01

    In this report we explore digital art interventions in public space in Amsterdam as part of the ‘participatory public space’ project lead by the University of Melbourne. We focus specifically on artistic interventions in public space, rather than on the more general ways in which public space is

  16. Beyond digitization: access and preservation | Gbaje | Information ...

    African Journals Online (AJOL)

    This paper is a desk study that examines issues around and beyond digitization within the context of Nigeria. The paper focuses on access and preservation as some of the main objectives of digitization. It indentifies Institutional Repositories (IR) as panacea to achieving these aims. The enabling technologies and ...

  17. MARIAN: Flexible Interoperability for Federated Digital Libraries

    OpenAIRE

    Goncalves, Marcos A.; France, Robert K.; Fox, Edward A.; Hilf, Eberhard R.; Zimmermann, Kerstin; Severiens, Thomas

    2001-01-01

    Federated digital libraries are composed of distributed autonomous (heterogeneous) information services but provide users with a transparent, integrated view of collected information respecting different information sources' autonomy. In this paper we discuss a federated system for the Networked Digital Library of Theses and Dissertations (NDLTD), an international consortium of universities, libraries, and other supporting institutions focused on electronic theses and dissertations (ETDs). Th...

  18. User studies for digital library development

    CERN Document Server

    Dobreva, Milena; Feliciati, Pierluigi

    2012-01-01

    As the information environment becomes increasingly electronic, digital libraries have proliferated, but the focus has often been on innovations in technology and not the user. This title provides a clear overview of the user studies domain and user issues in digital libraries.

  19. Digital fluorimeter

    International Nuclear Information System (INIS)

    Mello, H.A. de.

    1980-11-01

    The specifications of a digital fluorimeter. That with adequated analytical techniques permits to determine trace amounts of fluorescents materials in samples, are described. The fluorimeter is of the reflection type, and uses fluorescents lamps for the excitation and an optical system which is connected to a photomultiplyer machine and permits the measurement of the light intensity. In the case of IEN (Instituto de Engenharia Nuclear) the equipment is used for to determine the uranium content in sample materials to be exported. The precision of the instrument is about + - 1% in the scale of 0.1 which is the normally one used in the current researchs. (E.G.) [pt

  20. Digital entrepreneurship

    DEFF Research Database (Denmark)

    Brem, Alexander; Richter, Chris; Kraus, Sascha

    2017-01-01

    comprising guided interviews with 14 companies from Germany, Austria and Switzerland provides detailed insights into different aspects of the sharing economy phenomenon. Our results make a direct contribution to sharing economy research, especially regarding the new business models of start-ups. Here, we...... find a clear difference between the relevance of economic and social orientation. The latter appears to be in higher demand among customers than entrepreneurs. The increasingly digitalized environment has led to a changed living situation characterized by urbanity, openness to new solutions, changed...

  1. Exploring eHealth Ethics and Multi-Morbidity: Protocol for an Interview and Focus Group Study of Patient and Health Care Provider Views and Experiences of Using Digital Media for Health Purposes.

    Science.gov (United States)

    Townsend, Anne; Adam, Paul; Li, Linda C; McDonald, Michael; Backman, Catherine L

    2013-10-17

    eHealth is a broad term referring to the application of information and communication technologies in the health sector, ranging from health records to medical consultations (telemedicine) and multiple forms of health education, support, and tools. By providing increased and anytime access to information, opportunities to exchange experiences with others, and self-management support, eHealth has been heralded as transformational. It has the potential to accelerate the shift from traditional "passive patient" to an informed, engaged, and empowered "patient as partner," equipped to take part in shared decision-making, and take personal responsibility for self-managing their illness. The objective of our study is to examine how people with chronic illness use eHealth in their daily lives, how it affects patient-provider relationships, and the ethical and practical ramifications for patients, providers, and service delivery. This two-phase qualitative study is ongoing. We will purposively sample 60-70 participants in British Columbia, Canada. To be eligible, patient participants have to have arthritis and at least one other chronic health condition; health care providers (HCPs) need a caseload of patients with multi-morbidity (>25%). To date we have recruited 36 participants (18 patients, 18 HCPs). The participants attended 7 focus groups (FGs), 4 with patients and 3 with rehabilitation professionals and physicians. We interviewed 4 HCPs who were unable to attend a FG. In phase 2, we will build on FG findings and conduct 20-24 interviews with equal numbers of patients and HCPs (rehabilitation professionals and physicians). As in the FGs conducted in phase I, the interviews will use a semistructured, but flexible, discussion guide. All discussions are being audiotaped and transcribed verbatim. Constant comparisons and a narrative approach guides the analyses. A relational ethics conceptual lens is being applied to the data to identify emergent ethical issues. This study

  2. Reading in a Digital Age

    Science.gov (United States)

    Baron, Naomi S.

    2017-01-01

    The many advantages of reading digitally also bring with them implications for how we learn differently when we read differently. The author suggests that new contemporary technologies are changing the very notion of what it means to read. Even millennials acknowledge that their attention is more focused when they read print rather than online.…

  3. Digital Preservation of Cultural Heritage

    NARCIS (Netherlands)

    Peters, Nonja; Marinova, Dora; van Faassen, M.; Stasiuk, Glen; Zacher, L.W.

    2017-01-01

    The focus of this chapter is the state of the art of digitisation of cultural heritage in Australian archives and libraries from a comparative perspective. Globalisation, mobility and the new techniques that spin off from the digital age bring about new possibilities that stimulate and enhance our

  4. Stop Calling It "Digital Humanities"

    Science.gov (United States)

    Pannapacker, William

    2013-01-01

    A persistent criticism of the digital-humanities movement is that it is elitist and exclusive because it requires the resources of a major university (faculty, infrastructure, money), and is thus more suited to campuses with a research focus. Academics and administrators at small liberal-arts colleges may read about DH and, however exciting it…

  5. Digital Humanities

    DEFF Research Database (Denmark)

    Nielsen, Hans Jørn

    2015-01-01

    overgangen fra trykkekultur til digital kultur. For det første problemstillingen omkring digitalisering af litterær kulturarv med fokus på kodning og tagging af teksten samt organisering i hypertekststrukturer. For det andet reorganiseringen af det digitale dokument i dataelementer og database. For det......Artiklen præsenterer først nogle generelle problemstillinger omkring Digital Humanities (DH) med det formål at undersøge dem nærmere i relation til konkrete eksempler på forskellige digitaliseringsmåder og ændringer i dokumentproduktion. I en nærmere afgrænsning vælger artiklen den tendens i DH......, der betragter DH som forbundet med "making" og "building" af digitale objekter og former. Dette kan også karakteriseres som DH som praktisk-produktiv vending. Artiklen har valgt tre typer af digitalisering. De er valgt ud fra, at de skal repræsentere forskellige måder at håndtere digitaliseringen på...

  6. Storm Clouds on the Digital Education Horizon.

    Science.gov (United States)

    Reeves, Thomas C.

    2003-01-01

    Focuses on five unresolved challenges of digital education in higher education: faculty workload, continued dominance of traditional pedagogy, the state of assessment, flaws in the accreditation process, and the state of educational research in the area. (EV)

  7. Practical Challenges for Digital Watermarking Applications

    Directory of Open Access Journals (Sweden)

    Sharma Ravi K

    2002-01-01

    Full Text Available The field of digital watermarking has recently seen numerous articles covering novel techniques, theoretical studies, attacks, and analysis. In this paper, we focus on an emerging application to highlight practical challenges for digital watermarking applications. Challenges include design considerations, requirements analysis, choice of watermarking techniques, speed, robustness, and the tradeoffs involved. We describe common attributes of watermarking systems and discuss the challenges in developing real world applications. Our application uses digital watermarking to connect ordinary toys to the digital world. The application captures important aspects of watermarking systems and illustrates some of the design issues faced.

  8. Accessible Geoscience - Digital Fieldwork

    Science.gov (United States)

    Meara, Rhian

    2017-04-01

    Accessible Geoscience is a developing field of pedagogic research aimed at widening participation in Geography, Earth and Environmental Science (GEES) subjects. These subjects are often less commonly associated with disabilities, ethnic minorities, low income socio-economic groups and females. While advancements and improvements have been made in the inclusivity of these subject areas in recent years, access and participation of disabled students remains low. While universities are legally obligated to provide reasonable adjustments to ensure accessibility, the assumed incompatibility of GEES subjects and disability often deters students from applying to study these courses at a university level. Instead of making reasonable adjustments if and when they are needed, universities should be aiming to develop teaching materials, spaces and opportunities which are accessible to all, which in turn will allow all groups to participate in the GEES subjects. With this in mind, the Swansea Geography Department wish to enhance the accessibility of our undergraduate degree by developing digital field work opportunities. In the first instance, we intend to digitise three afternoon excursions which are run as part of a 1st year undergraduate module. Each of the field trips will be digitized into English- and Welsh-medium formats. In addition, each field trip will be digitized into British Sign Language (BSL) to allow for accessibility for D/deaf and hard of hearing students. Subtitles will also be made available in each version. While the main focus of this work is to provide accessible fieldwork opportunities for students with disabilities, this work also has additional benefits. Students within the Geography Department will be able to revisit the field trips, to revise and complete associated coursework. The use of digitized field work should not replace opportunities for real field work, but its use by the full cohort of students will begin to "normalize" accessible field

  9. Video Error Correction Using Steganography

    Science.gov (United States)

    Robie, David L.; Mersereau, Russell M.

    2002-12-01

    The transmission of any data is always subject to corruption due to errors, but video transmission, because of its real time nature must deal with these errors without retransmission of the corrupted data. The error can be handled using forward error correction in the encoder or error concealment techniques in the decoder. This MPEG-2 compliant codec uses data hiding to transmit error correction information and several error concealment techniques in the decoder. The decoder resynchronizes more quickly with fewer errors than traditional resynchronization techniques. It also allows for perfect recovery of differentially encoded DCT-DC components and motion vectors. This provides for a much higher quality picture in an error-prone environment while creating an almost imperceptible degradation of the picture in an error-free environment.

  10. Limited distortion in LSB steganography

    Science.gov (United States)

    Kim, Younhee; Duric, Zoran; Richards, Dana

    2006-02-01

    It is well known that all information hiding methods that modify the least significant bits introduce distortions into the cover objects. Those distortions have been utilized by steganalysis algorithms to detect that the objects had been modified. It has been proposed that only coefficients whose modification does not introduce large distortions should be used for embedding. In this paper we propose an effcient algorithm for information hiding in the LSBs of JPEG coefficients. Our algorithm uses parity coding to choose the coefficients whose modifications introduce minimal additional distortion. We derive the expected value of the additional distortion as a function of the message length and the probability distribution of the JPEG quantization errors of cover images. Our experiments show close agreement between the theoretical prediction and the actual additional distortion.

  11. Video Error Correction Using Steganography

    Directory of Open Access Journals (Sweden)

    Robie David L

    2002-01-01

    Full Text Available The transmission of any data is always subject to corruption due to errors, but video transmission, because of its real time nature must deal with these errors without retransmission of the corrupted data. The error can be handled using forward error correction in the encoder or error concealment techniques in the decoder. This MPEG-2 compliant codec uses data hiding to transmit error correction information and several error concealment techniques in the decoder. The decoder resynchronizes more quickly with fewer errors than traditional resynchronization techniques. It also allows for perfect recovery of differentially encoded DCT-DC components and motion vectors. This provides for a much higher quality picture in an error-prone environment while creating an almost imperceptible degradation of the picture in an error-free environment.

  12. The Apparatus of Digital Archaeology

    Directory of Open Access Journals (Sweden)

    Jeremy Huggett

    2017-06-01

    Full Text Available Digital Archaeology is predicated upon an ever-changing set of apparatuses – technological, methodological, software, hardware, material, immaterial – which in their own ways and to varying degrees shape the nature of Digital Archaeology. Our attention, however, is perhaps inevitably more closely focused on research questions, choice of data, and the kinds of analyses and outputs. In the process we tend to overlook the effects the tools themselves have on the archaeology we do beyond the immediate consequences of the digital. This article introduces cognitive artefacts as a means of addressing the apparatus more directly within the context of the developing archaeological digital ecosystem. It argues that a critical appreciation of our computational cognitive artefacts is key to understanding their effects on both our own cognition and on the creation of archaeological knowledge. In the process, it defines a form of cognitive digital archaeology in terms of four distinct methods for extracting cognition from the digital apparatus layer by layer.

  13. Digital radiography

    DEFF Research Database (Denmark)

    Precht, H; Gerke, O; Rosendahl, K

    2012-01-01

    BACKGROUND: New developments in processing of digital radiographs (DR), including multi-frequency processing (MFP), allow optimization of image quality and radiation dose. This is particularly promising in children as they are believed to be more sensitive to ionizing radiation than adults....... OBJECTIVE: To examine whether the use of MFP software reduces the radiation dose without compromising quality at DR of the femur in 5-year-old-equivalent anthropomorphic and technical phantoms. MATERIALS AND METHODS: A total of 110 images of an anthropomorphic phantom were imaged on a DR system (Canon DR...... with CXDI-50 C detector and MLT[S] software) and analyzed by three pediatric radiologists using Visual Grading Analysis. In addition, 3,500 images taken of a technical contrast-detail phantom (CDRAD 2.0) provide an objective image-quality assessment. RESULTS: Optimal image-quality was maintained at a dose...

  14. Fokus: Digital

    DEFF Research Database (Denmark)

    2014-01-01

    i det digitale domæne – udviklinger, der foregår hastigt og er gennemgribende, og som derfor kræver et nærmere blik på forholdet mellem kunsten og teknologien. Komponistens forståelse af sin metier udfordres – samtidig med at befæstede ideer om kunstværket møder modstand fra nye mediemæssige...... sammenhænge og fra forandrede distributionsformer. Dette betyder ændrede betingelser for både produktion og reception af kunstmusik og lydkunst. Med Digital tager vi udgangspunkt i fire komponisters meget forskellige bud på hvordan teknologien spiller en rolle i arbejdet. Juliana Hodkinson beskriver hvordan...

  15. Remediating a Design Tool: Implications of Digitizing Sticky Notes

    DEFF Research Database (Denmark)

    Jensen, Mads Møller; Rädle, Roman; Klokmose, Clemens Nylandsted

    2018-01-01

    digital sticky notes setup. The paper contributes with a nuanced understanding of what happens when remediating a physical design tool into digital space, by emphasizing focus shifts and breakdowns caused by the technology, but also benefits and promises inherent in the digital media. Despite users...... their use and understanding, yielding new concerns regarding cross-device transfer and collaboration....

  16. Data compression systems for home-use digital video recording

    NARCIS (Netherlands)

    With, de P.H.N.; Breeuwer, M.; van Grinsven, P.A.M.

    1992-01-01

    The authors focus on image data compression techniques for digital recording. Image coding for storage equipment covers a large variety of systems because the applications differ considerably in nature. Video coding systems suitable for digital TV and HDTV recording and digital electronic still

  17. Smart cities, smart lights. Digital signane and the city experience

    OpenAIRE

    Fiori, Giovanni

    2012-01-01

    This article is about the experience of light in the smart and digital city or, in other words, the existing and widening use of visual digital signane in the urban environment, open air and in public places. This research focuses on where in towns this digital "contamination" is more visible and accessible, i.e. in shopping districts.

  18. What is 'Post-digital?' : typewriters vs. imageboard memes

    NARCIS (Netherlands)

    F. Cramer

    2014-01-01

    The term "post-digital" was coined in 2000 for electronic music, but reflecting on larger developments in technology and culture, to describe a perspective on digital information technology that is no longer focused on technical innovation or improvement. In the meantime, "post-digital" has acquired

  19. Digital work in a digitally challenged organization

    NARCIS (Netherlands)

    Davison, R.M.; Ou, Carol

    Digitally literate employees are accustomed to having free access to digital media technologies. However, some organizations enact information technology (IT) governance structures that explicitly proscribe access to these technologies, resulting in considerable tension between employees and the

  20. Research challenges in digital education.

    Science.gov (United States)

    Norman, Geoff

    2014-09-01

    Simulation and other forms of digital learning will occupy a place of increasing prominence in medical education in the future. However, to maximally use the potential of these media, we must go beyond a research agenda dictated by a 'Does it work?' question to one driven by careful analysis of the nature of the task to be learned and its relation to the characteristics of the technology. Secondly, we must change the focus from the characteristics of individual devices to a broader approach to design of a digital curriculum based on current understanding of the nature of human learning.

  1. USNA DIGITAL FORENSICS LAB

    Data.gov (United States)

    Federal Laboratory Consortium — To enable Digital Forensics and Computer Security research and educational opportunities across majors and departments. Lab MissionEstablish and maintain a Digital...

  2. Can We Teach Digital Natives Digital Literacy?

    Science.gov (United States)

    Ng, Wan

    2012-01-01

    In recent years, there has been much debate about the concept of digital natives, in particular the differences between the digital natives' knowledge and adoption of digital technologies in informal versus formal educational contexts. This paper investigates the knowledge about educational technologies of a group of undergraduate students…

  3. Effectiveness of Digital Marketing in the Challenging Age: An Empirical Study

    OpenAIRE

    Afrina Yasmin; Sadia Tasneem; Kaniz Fatema

    2015-01-01

    Marketers are faced with new challenges and opportunities within this digital age. Digital marketing is the utilization of electronic media by the marketers to promote the products or services into the market. The main objective of digital marketing is attracting customers and allowing them to interact with the brand through digital media. This article focuses on the importance of digital marketing for both marketers and consumers. We examine the effect of digital marketing on the firms’ sa...

  4. Digital produktion

    DEFF Research Database (Denmark)

    Bogen sætter fokus på digital produktion, som er en stærk læringsform, der faciliterer elevernes læreprocesser og kvalificerer elevernes faglige læringsresultater. Det sker når lærerne udarbejder didaktiske rammedesign, hvor eleverne arbejder selvstændigt inden for dette rammedesign, og hvor mål og...... procesevaluering stilladserer elevernes faglige proces. I digitale produktionsprocesser arbejder eleverne iterativt, de udvikler ejerskab til produktionen og fastholder selv deres læreprocesser. It’s multimodalitet, elevernes kollaborative tilgange, videndeling mellem eleverne og elevernes uformelle lege- og...... elevernes digitale produktion er lærernes didaktiske rammesætning og stilladserende tilgange. Her lægger lærerne op til, at eleverne som didaktiske designere i relation til rammesætningen skal organisere og planlægge deres læreprocesser, inddrages i målsætning, evaluering og valg af digitale ressourcer...

  5. Digital dannelse

    DEFF Research Database (Denmark)

    Bundsgaard, Jeppe

    2012-01-01

    I al vores iver efter at få presset nogle flere digitale dimser ind i skolen, er vi i fare for at glemme hvad det er vi skal med disse dimser. Der er store forventninger til at de kan gøre det lettere at være lærer (og dermed billigere), og det kan det måske. Men der er jo også et dannelsesspørgs......I al vores iver efter at få presset nogle flere digitale dimser ind i skolen, er vi i fare for at glemme hvad det er vi skal med disse dimser. Der er store forventninger til at de kan gøre det lettere at være lærer (og dermed billigere), og det kan det måske. Men der er jo også et...... dannelsesspørgsmål knyttet til it. Hvad er egentlig digital dannelse? Og hvad betyder det for danskfaget?...

  6. Digital forensics digital evidence in criminal investigations

    CERN Document Server

    Marshall, Angus McKenzie

    2009-01-01

    The vast majority of modern criminal investigations involve some element of digital evidence, from mobile phones, computers, CCTV and other devices. Digital Forensics: Digital Evidence in Criminal Investigations provides the reader with a better understanding of how digital evidence complements "traditional" scientific evidence and examines how it can be used more effectively and efficiently in a range of investigations. Taking a new approach to the topic, this book presents digital evidence as an adjunct to other types of evidence and discusses how it can be deployed effectively in s

  7. Digital margins: Social and digital exclusion of Gypsy-Travelers in the Netherlands

    NARCIS (Netherlands)

    Salemink, Koen

    2016-01-01

    Research on digital inclusion increasingly focuses on vulnerable groups, with the prevailing idea that social exclusion leads to digital exclusion. The role of the socio-spatial context is often faded into the background due to user-centric (individual) approaches. This article explores how a

  8. Digital divide across borders : A cross-national study of adolescents’ use of digital technologies

    NARCIS (Netherlands)

    Notten, N.; Peter, J.; Kraaykamp, G.; Valkenburg, P.M.

    2009-01-01

    In this study, we analyse digital divides in terms of social inequality in digital access and use patterns from a hierarchical perspective. Using data from the Programme for International Student Assessment (PISA) 2003 in 30 nations, we focus on social cleavages in mid-adolescents’ access and use of

  9. Český trh digitálních agentur: Případová studie Nydrle Digital

    OpenAIRE

    Vondráková, Tereza

    2013-01-01

    The master thesis focuses on description of the market of digital advertising agencies that create digital, online and mobile campaigns for their clients. The first part of the thesis addresses the advertising market and its role in the marketing mix. The author gives the summary of the evolution of digital marketing and its tools in the digital and creative procedure of preparing advertising concept. One of the chapters presents changes in media spends towards online and changes of marketing...

  10. Digital platforms as enablers for digital transformation

    DEFF Research Database (Denmark)

    Hossain, Mokter; Lassen, Astrid Heidemann

    transformation is crucial. This study aims at exploring how organizations are driven towards transformation in various ways to embrace digital platforms for ideas, technologies, and knowledge. It shows the opportunities and challenges digital platforms bring in organizations. It also highlights underlying......Digital platforms offer new ways for organizations to collaborate with the external environment for ideas, technologies, and knowledge. They provide new possibilities and competence but they also bring new challenges for organizations. Understanding the role of these platforms in digital...... mechanisms and potential outcomes of various digital platforms. The contribution of the submission is valuable for scholars to understand and further explore this area. It provides insight for practitioners to capture value through digital platforms and accelerate the pace of organizations’ digital...

  11. Dual beam vidicon digitizer

    International Nuclear Information System (INIS)

    Evans, T.L.

    1976-01-01

    A vidicon waveform digitizer which can simultaneously digitize two independent signals has been developed. Either transient or repetitive waveforms can be digitized with this system. A dual beam oscilloscope is used as the signal input device. The light from the oscilloscope traces is optically coupled to a television camera, where the signals are temporarily stored prior to digitizing

  12. Enabling Digital Literacy

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Georgsen, Marianne

    2010-01-01

    There are some tensions between high-level policy definitions of “digital literacy” and actual teaching practice. We need to find workable definitions of digital literacy; obtain a better understanding of what digital literacy might look like in practice; and identify pedagogical approaches, which...... support teachers in designing digital literacy learning. We suggest that frameworks such as Problem Based Learning (PBL) are approaches that enable digital literacy learning because they provide good settings for engaging with digital literacy. We illustrate this through analysis of a case. Furthermore......, these operate on a meso-level mediating between high-level concepts of digital literacy and classroom practice....

  13. Progress in digital radiography

    International Nuclear Information System (INIS)

    Cappelle, A.

    2016-01-01

    Because of its practical aspect digital radiography is more and more used in the industrial sector. There are 2 kinds of digital radiography. First, the 'computed radiography' that uses a photon-stimulated screen, and after radiation exposure this screen must be read by an analyser to get a digit image. The second type is the 'direct radiography' that allows one to get a digit radiograph of the object directly. Digital radiography uses the same radioactive nuclides as radiography with silver films: cobalt, iridium or selenium. The spatial resolution of digital radiography is less good than with classical silver film radiography but digital radiography offers a better visual contrast. (A.C.)

  14. Smartphone adapters for digital photomicrography.

    Science.gov (United States)

    Roy, Somak; Pantanowitz, Liron; Amin, Milon; Seethala, Raja R; Ishtiaque, Ahmed; Yousem, Samuel A; Parwani, Anil V; Cucoranu, Ioan; Hartman, Douglas J

    2014-01-01

    Photomicrographs in Anatomic Pathology provide a means of quickly sharing information from a glass slide for consultation, education, documentation and publication. While static image acquisition historically involved the use of a permanently mounted camera unit on a microscope, such cameras may be expensive, need to be connected to a computer, and often require proprietary software to acquire and process images. Another novel approach for capturing digital microscopic images is to use smartphones coupled with the eyepiece of a microscope. Recently, several smartphone adapters have emerged that allow users to attach mobile phones to the microscope. The aim of this study was to test the utility of these various smartphone adapters. We surveyed the market for adapters to attach smartphones to the ocular lens of a conventional light microscope. Three adapters (Magnifi, Skylight and Snapzoom) were tested. We assessed the designs of these adapters and their effectiveness at acquiring static microscopic digital images. All adapters facilitated the acquisition of digital microscopic images with a smartphone. The optimal adapter was dependent on the type of phone used. The Magnifi adapters for iPhone were incompatible when using a protective case. The Snapzoom adapter was easiest to use with iPhones and other smartphones even with protective cases. Smartphone adapters are inexpensive and easy to use for acquiring digital microscopic images. However, they require some adjustment by the user in order to optimize focus and obtain good quality images. Smartphone microscope adapters provide an economically feasible method of acquiring and sharing digital pathology photomicrographs.

  15. Ageing adults and digital games

    DEFF Research Database (Denmark)

    Iversen, Sara Mosberg

    On the basis of Foucauldian notions of power, discipline and discourse it is here examined how ageing adults are constituted in relation to digital games within the existing research. Reviewing the available literature with a focus on justifications for research, aims and the portrayal of the eld......On the basis of Foucauldian notions of power, discipline and discourse it is here examined how ageing adults are constituted in relation to digital games within the existing research. Reviewing the available literature with a focus on justifications for research, aims and the portrayal...... of the elderly, three dominant discourses are identified. These are concerned with a generational digital divide, maintenance of health and general wellbeing as well as the ageing adults as an attractive marked. Notions of economical productivity inform most of the available work, often explicitly and at other...... times more implicitly. On this basis, the analysed research tends to offer digital games as disciplinary means to maintain, correct or tame the aging citizens. Either as technologies of the self, used in the individual’s self shaping, or as ways to contain and maintain the “disobedient” bodies and minds...

  16. Digital Sensor Technology

    Energy Technology Data Exchange (ETDEWEB)

    Ted Quinn; Jerry Mauck; Richard Bockhorst; Ken Thomas

    2013-07-01

    The nuclear industry has been slow to incorporate digital sensor technology into nuclear plant designs due to concerns with digital qualification issues. However, the benefits of digital sensor technology for nuclear plant instrumentation are substantial in terms of accuracy, reliability, availability, and maintainability. This report demonstrates these benefits in direct comparisons of digital and analog sensor applications. It also addresses the qualification issues that must be addressed in the application of digital sensor technology.

  17. Digital preservation for heritages

    CERN Document Server

    Lu, Dongming

    2011-01-01

    ""Digital Preservation for Heritages: Technologies and Applications"" provides a comprehensive and up-to-date coverage of digital technologies in the area of cultural heritage preservation, including digitalization, research aiding, conservation aiding, digital exhibition, and digital utilization. Processes, technical frameworks, key technologies, as well as typical systems and applications are discussed in the book. It is intended for researchers and students in the fields of computer science and technology, museology, and archaeology. Dr. Dongming Lu is a professor at College of Computer Sci

  18. [Challenges of Digital Medicine].

    Science.gov (United States)

    Blaser, Jürg

    2018-06-01

    Challenges of Digital Medicine Abstract. Digitization is increasingly covering more and more sectors, including medicine. To ensure medical operation 365 × 24 hours, progressively more human and financial resources are necessary. The transformation of patient histories from paper into electronic patient records focused initially on documentation. Today, hospital information systems are increasingly used as a platform for the communication of all professionals involved in the patient process - in Switzerland, however, so far without providing patients direct access to their data. Digititizing processes intend to increase efficiency, but also to enhance clinical and administrative decision support and quality assurance. The introduction of the electronic patient record in Switzerland in 2020 is expected to provide cross-company, more complete documentation of patient care. Multimorbid patients, often treated in different institutions and by different specialists, should benefit from this in particular. Advances in artificial intelligence offer new opportunities in medicine. Challenges include ensuring reliable data protection, and better interoperability of the systems involved. Semantically structured, machine-readable data exchange is a necessity for both networked services and internationally competitive research.

  19. Extending the Classroom: Digital Micro-Narratives for Novice Language Learners

    Science.gov (United States)

    Kronenberg, Felix A.

    2014-01-01

    Digital Storytelling offers many advantages for language learning, especially within a project-based framework. In this article, the use of Digital Micro-Narratives is proposed as particularly useful for second language learners at the novice level. As a sub-genre of Digital Storytelling, Digital Micro-Narratives focus more on frequently updated…

  20. Development of Youth Digital Citizenship Scale and Implication for Educational Setting

    Science.gov (United States)

    Kim, Minjeong; Choi, Dongyeon

    2018-01-01

    Digital citizens need comprehensive knowledge and technological accessibility to the internet and digital world and teachers have a responsibility to lead them to become digital citizens. However, existing Digital Citizenship Scales contain too broad ranges and do not precisely focus on the target students, so teachers do not have clear criteria…

  1. Digital Heritage Experiences

    DEFF Research Database (Denmark)

    Munar, Ana Maria; Ooi, Can-Seng

    ) and netnography (Kozinets, 2002). The social media platform analysed is TripAdvisor, which is the largest networking site focusing on tourism and travel. Study findings indicate that while heritage sites tend to promote their uniqueness and the cultural value of their products, tourists are just as concerned...... about sensory impressions, imagination, practical issues and personal comfort in the immediate moment as they are about historical and cultural details. Social media provide the technological tools and platforms to communicate and share tourism imaginations, feelings and practical tips. The analysis......The evolution of the Web and the expansion of social media are transforming our heritage experiences. Social media offer an innovative element to personal travel reflections by providing digital global platforms on which tourists can create and publish their travel stories. Social media transform...

  2. The New Frontier of Digital Inequality. The Participatory Divide

    Directory of Open Access Journals (Sweden)

    José M. Robles Morales

    2016-01-01

    Full Text Available This article focuses on the relationship between digital participation and the digital participation divide. The first concept refers to the use of the Internet to produce cultural goods that are subsequently shared on a global scale; the latter, refers to the inequalities generated by the uneven distribution of these creative uses of the Internet in a given population. Empirically, our work focuses on the role of digital skills and sociopolitical attitudes toward the Internet in explaining the digital participation divide, as they are considered precursors of digital participation. Results suggest that the same mechanisms that previously sustained digital divide are now fostering digital participation divide; however, we argue that the negative social consequences of this divide exceed those of its predecessor.

  3. Handbook of digital forensics of multimedia data and devices

    CERN Document Server

    Li, Shujun

    2015-01-01

    Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras. This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializ ng in diverse topics such as forensic aut...

  4. Digital Materialisms: Frameworks for Digital Media Studies

    OpenAIRE

    Casemajor, Nathalie

    2015-01-01

    Since the 1980s, digital materialism has received increasing interest in the field of media studies. Materialism as a theoretical paradigm assumes that all things in the world are tied to physical processes and matter. Yet within digital media studies, the understanding of what should be the core object of a materialist analysis is debated. This paper proposes to untangle some of the principal theoretical propositions that compose the field of digital materialism. It outlines six frameworks t...

  5. Impediments for Digital Fabrication in Education

    DEFF Research Database (Denmark)

    Smith, Rachel Charlotte; Iversen, Ole Sejer; Veerasawmy, Rune

    2016-01-01

    with eight primary and lower secondary teachers, the findings point to four central impediments for integrating digital fabrication and design into school environments. The findings extend current perceptions of digital technology in education towards exploratory processes of investigation in which......Digital fabrication technologies are increasingly integrated across subjects in primary and secondary education. Focus on the potentials of these technologies has mainly been on the support to STEM oriented learning goals, while emphasis on teachers' roles with the new learning processes...... of technology and design is largely absent. The paper addresses the experiences and challenges that digital fabrication technology present for teachers in educational environments, and the impediments that are linked to the teachers' roles in design processes of digital fabrication. Based on a research study...

  6. Digital/Commercial (In)visibility

    DEFF Research Database (Denmark)

    Leander, Anna

    2017-01-01

    an argument demonstrating specifically how digital and commercial logics characterize the aesthetic, circulatory, and infrastructuring practices re-producing the regime of (in)visibility. It shows that digital/commercial logics are at the heart of the combinatorial marketing of multiple, contradictory images......This article explores one aspect of digital politics, the politics of videos and more spe- cifically of DAESH recruitment videos. It proposes a practice theoretical approach to the politics of DAESH recruitment videos focused on the re-production of regimes of (in)visibility. The article develops...... on the internet. The theoretical and political cost of overlooking these digital and commercial characteristics of DAESH visibility practices are high. It perpetuates misconceptions of how the videos work and what their politics are and it reinforces the digital Orientalism/Occidentalism in which...

  7. Principles of digital image synthesis

    CERN Document Server

    Glassner, Andrew S

    1995-01-01

    Image synthesis, or rendering, is a field of transformation: it changesgeometry and physics into meaningful images. Because the most popularalgorithms frequently change, it is increasingly important for researchersand implementors to have a basic understanding of the principles of imagesynthesis. Focusing on theory, Andrew Glassner provides a comprehensiveexplanation of the three core fields of study that come together to formdigital image synthesis: the human visual system, digital signalprocessing, and the interaction of matter and light. Assuming no more thana basic background in calculus,

  8. DIGITALIZATION AND NEW MEDIA LANDSCAPE

    OpenAIRE

    Tadej Praprotnik

    2016-01-01

    The article presents the phenomena of new communication technologies. It exposes the role of social media (Web 2.0) and sketches some global trends within the field of new media. It further outlines basic characteristics of traditional mass communication and consumption of media products, and as a counter-part presents interactive nature of a new media and the phenomena of user-generated media contents. The main focus of the article is the process of digitalization and its influence on import...

  9. Digital Kildebeskyttelse. Udfordringer. Idealer. Dilemmaer.

    OpenAIRE

    Eggers, Camilla Høj

    2015-01-01

    In journalism, the challenges concerning the protection of confidential sources have grown alongside the increase in surveillance. Almost every individual lays out a digital track by using a cell phone, browsing the Internet and sending e-mails, and this track can be used to hunt down and expose sources. Through qualitative interviews with a focus on everyday practices this thesis examines how ten investigative journalists from five of the largest national media outlets attempt to protect the...

  10. Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks

    Directory of Open Access Journals (Sweden)

    Donghui Hu

    2017-01-01

    Full Text Available Digital image steganalysis is the art of detecting the presence of information hiding in carrier images. When detecting recently developed adaptive image steganography methods, state-of-art steganalysis methods cannot achieve satisfactory detection accuracy, because the adaptive steganography methods can adaptively embed information into regions with rich textures via the guidance of distortion function and thus make the effective steganalysis features hard to be extracted. Inspired by the promising success which convolutional neural network (CNN has achieved in the fields of digital image analysis, increasing researchers are devoted to designing CNN based steganalysis methods. But as for detecting adaptive steganography methods, the results achieved by CNN based methods are still far from expected. In this paper, we propose a hybrid approach by designing a region selection method and a new CNN framework. In order to make the CNN focus on the regions with complex textures, we design a region selection method by finding a region with the maximal sum of the embedding probabilities. To evolve more diverse and effective steganalysis features, we design a new CNN framework consisting of three separate subnets with independent structure and configuration parameters and then merge and split the three subnets repeatedly. Experimental results indicate that our approach can lead to performance improvement in detecting adaptive steganography.

  11. Online Tribes and Digital Authority: What Can Social Theory Bring to Digital Archaeology?

    Directory of Open Access Journals (Sweden)

    Richardson Lorna-Jane

    2017-01-01

    Full Text Available From early discussions of the disruptive potential of computer technologies for archaeological applications, to the present era of digital archaeology as the technical underpinning of modern archaeological practice, we have continued to debate the potential impacts of digital communication and digital capture and storage on our knowledge, profession and communications. The increased use of digital tools and methods for archaeological research and dissemination, as well as what Roosevelt (2015 has referred to as the shift to the digital paradigm within archaeological practice, leads us to suggest that the impact of this paradigm shift requires careful and critical examination. This article will examine the edges of the disciplines of archaeology and sociology, where we aim to advance our understanding of the relationship between digital technologies and archaeological knowledge from a uniquely social perspective, using the theoretical approaches of both classic and modern sociologists. The application of this lens of sociology to digital archaeology equips us to understand how archaeology and archaeological practice is situated in a social world, which is especially relevant in the Global West, where digital technology is ubiquitous. Through a critical consideration of the complexity of use of digital technologies within digital archaeology, we can begin to shift our focus away from the character and method of tools and workflow, to the background of intellectual power and influence.

  12. Digital multilayer tomography

    International Nuclear Information System (INIS)

    Dueber, C.; Klose, K.J.; Thelen, M.

    1991-01-01

    With digital multilayer tomography a sequence of projection images is recorded by an image intensifier television system and stored as digital data during a linear run of a layer sequence. Using this data record, tomograms of the examined body region can be computed for any layer thickness by shifts and superimposition of the single projections later at a digital workstation. The qualities of digital and conventional tomograms are basically comparable. A drawback of digital tomography is its lower local resolution (512 x 512 image matrix), advantages are a lower radiation exposure, a shorter patient examination time, and the facilities of digital image processing (later processing, archive setup, transmission). (orig.) [de

  13. Experience with digital mammography

    Directory of Open Access Journals (Sweden)

    G. P. Korzhenkova

    2011-01-01

    Full Text Available The use of digital techniques in mammography has become a last step for completing the process of digitization in diagnostic imaging. It is assumed that such a spatial decision will be required for digital mammography, as well as for high-resolution intensifying screen-film systems used in conventional mammography and that the digital techniques will be limited by the digitizer pixel size on detecting minor structures, such as microcalcifications. The introduction of digital technologies in mammography involves a tight control over an image and assures its high quality.

  14. Logic of the digital

    CERN Document Server

    Evens, Aden

    2015-01-01

    Building a foundational understanding of the digital, Logic of the Digital reveals a unique digital ontology. Beginning from formal and technical characteristics, especially the binary code at the core of all digital technologies, Aden Evens traces the pathways along which the digital domain of abstract logic encounters the material, human world. How does a code using only 0s and 1s give rise to the vast range of applications and information that constitutes a great and growing portion of our world? Evens' analysis shows how any encounter between the actual and the digital must cross an ontolo

  15. Branding Strategies for Digital Tv Channels

    OpenAIRE

    M. Pagani

    2011-01-01

    This chapter analyses the impact of digitalization on TV marketing strategies focusing on the role of brand as a loyalty-based resource, available to digital television networks to create a sustainable competitive advantage. We analyze the cognitive process adopted by a viewer in the selection process of a TV channel and provide managerial implications for branding strategy and the tools that a television network and an iTV portal need to adopt to communicate values connected with their brand...

  16. Experimental OAI-Based Digital Library Systems

    Science.gov (United States)

    Nelson, Michael L. (Editor); Maly, Kurt (Editor); Zubair, Mohammad (Editor); Rusch-Feja, Diann (Editor)

    2002-01-01

    The objective of Open Archives Initiative (OAI) is to develop a simple, lightweight framework to facilitate the discovery of content in distributed archives (http://www.openarchives.org). The focus of the workshop held at the 5th European Conference on Research and Advanced Technology for Digital Libraries (ECDL 2001) was to bring researchers in the area of digital libraries who are building OAI based systems so as to share their experiences, problems they are facing, and approaches they are taking to address them. The workshop consisted of invited talks from well-established researchers working in building OAI based digital library system along with short paper presentations.

  17. Idea Hubs as Nexus of Collective Creativity in Digital Innovation

    DEFF Research Database (Denmark)

    Ciriello, Raffaele; Richter, Alexander

    2015-01-01

    Digital innovation radically transforms the nature of corporate innovation practices, implying a growing need for deeper understanding its origins and outcomes. In this paper, we conceptualize the focal points of social networking in digital innovation as idea hubs. We focus our analysis...... on instances of idea hubs in two multinational European software companies, where we conducted a case study over a two-year period, and collected data in form of interviews, digital documents, and participant observations. In doing so, we identify a set of social networking practices in which idea hubs serve...... of digital artifacts individuals can choose from, offline interaction still plays a major role in facilitating digital innovation....

  18. Empowering Indonesian women through building digital media literacy

    Directory of Open Access Journals (Sweden)

    Fiona Suwana

    2017-09-01

    Full Text Available There is still a gender digital divide in Indonesia. Indonesian women need digital media literacy skills to effectively use the Internet and to raise their quality of life. Empowering literacy abilities includes the skills of using digital media to access, search, analyze, reflect, share, and create. In this qualitative research study, founders, leaders, and participants from IWITA (Indonesian Women Information Technology Awareness and FemaleDev (Female Developer were interviewed because these organizations focus on developing digital literacy for women. The findings indicated that digital media literacy remains low because of inadequate education, lack of opportunities and the patriarchal system in Indonesia.

  19. Digital nativity’: a definitional framework

    Directory of Open Access Journals (Sweden)

    Timoty Teo

    2013-12-01

    Full Text Available Since the term, ‘Digital Native’ has been coined; a plethora of research has followed. But, researchers have yet to reach a consensus on what the real digital native is like. There are several traits of digital native; such as their age who has born in or after 1980 and technology skills. The notion of age as a defining criterion for digital nativity has come under criticisms in recent years. Some studies found that, despite being born at the time period proposed for digital natives, students were ill- prepared to work with technology. This paper focuses four attributes of digital nativity which alluded to digital natives. These are: grow up with technology, comfortable with multitasking, reliant on graphics for communication, and thrive on instant gratifications and rewards. From the growing volume of research on digital nativity, several implications for teaching and learning could be drawn. Future teachers should be equipped to teach and learn with technologies at their training stage. They should be exposed to and gain mastery in many new and emerging technologies with potentials for instructional purposes.

  20. Cost Model for Digital Preservation: Cost of Digital Migration

    Directory of Open Access Journals (Sweden)

    Ulla Bøgvad Kejser

    2011-03-01

    Full Text Available The Danish Ministry of Culture has funded a project to set up a model for costing preservation of digital materials held by national cultural heritage institutions. The overall objective of the project was to increase cost effectiveness of digital preservation activities and to provide a basis for comparing and estimating future cost requirements for digital preservation. In this study we describe an activity-based costing methodology for digital preservation based on the Open Archice Information System (OAIS Reference Model. Within this framework, which we denote the Cost Model for Digital Preservation (CMDP, the focus is on costing the functional entity Preservation Planning from the OAIS and digital migration activities. In order to estimate these costs we have identified cost-critical activities by analysing the functions in the OAIS model and the flows between them. The analysis has been supplemented with findings from the literature, and our own knowledge and experience. The identified cost-critical activities have subsequently been deconstructed into measurable components, cost dependencies have been examined, and the resulting equations expressed in a spreadsheet. Currently the model can calculate the cost of different migration scenarios for a series of preservation formats for text, images, sound, video, geodata, and spreadsheets. In order to verify the model it has been tested on cost data from two different migration projects at the Danish National Archives (DNA. The study found that the OAIS model provides a sound overall framework for the cost breakdown, but that some functions need additional detailing in order to cost activities accurately. Running the two sets of empirical data showed among other things that the model underestimates the cost of manpower-intensive migration projects, while it reinstates an often underestimated cost, which is the cost of developing migration software. The model has proven useful for estimating the

  1. Plasma focus breeder

    International Nuclear Information System (INIS)

    Ikuta, Kazunari.

    1981-09-01

    Instead of using linear accelerators, it is possible to breed fissile fuels with the help of high current plasma focus device. A mechanism of accelerating proton beam in plasma focus device to high energy would be a change of inductance in plasma column because of rapid growth of plasma instability. A possible scheme of plasma focus breeder is also proposed. (author)

  2. Coastal California Digital Imagery

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This digital ortho-imagery dataset is a survey of coastal California. The project area consists of approximately 3774 square miles. The project design of the digital...

  3. Digital rectal exam

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/007069.htm Digital rectal exam To use the sharing features on this page, please enable JavaScript. A digital rectal exam is an examination of the lower ...

  4. Digital dannelse til gymnasieeleverne

    DEFF Research Database (Denmark)

    Kaarsted, Thomas; Holch Andersen, Knud

    2012-01-01

    Søsætningen af en ny tænketank skal udstikke nye digital retningslinjer for gymnasiekolerne. Baggrunden er en erkendelse af, at it-infrastruktur og digital teknologi ikke gør de alene.......Søsætningen af en ny tænketank skal udstikke nye digital retningslinjer for gymnasiekolerne. Baggrunden er en erkendelse af, at it-infrastruktur og digital teknologi ikke gør de alene....

  5. Basic digital signal processing

    CERN Document Server

    Lockhart, Gordon B

    1985-01-01

    Basic Digital Signal Processing describes the principles of digital signal processing and experiments with BASIC programs involving the fast Fourier theorem (FFT). The book reviews the fundamentals of the BASIC program, continuous and discrete time signals including analog signals, Fourier analysis, discrete Fourier transform, signal energy, power. The text also explains digital signal processing involving digital filters, linear time-variant systems, discrete time unit impulse, discrete-time convolution, and the alternative structure for second order infinite impulse response (IIR) sections.

  6. Digital asset management.

    Science.gov (United States)

    Humphrey, Clinton D; Tollefson, Travis T; Kriet, J David

    2010-05-01

    Facial plastic surgeons are accumulating massive digital image databases with the evolution of photodocumentation and widespread adoption of digital photography. Managing and maximizing the utility of these vast data repositories, or digital asset management (DAM), is a persistent challenge. Developing a DAM workflow that incorporates a file naming algorithm and metadata assignment will increase the utility of a surgeon's digital images. Copyright 2010 Elsevier Inc. All rights reserved.

  7. Digital Inkjet Textile Printing

    OpenAIRE

    Wang, Meichun

    2017-01-01

    Digital inkjet textile printing is an emerging technology developed with the rise of the digital world. It offers a possibility to print high-resolution images with unlimited color selection on fabrics. Digital inkjet printing brings a revolutionary chance for the textile printing industry. The history of textile printing shows the law how new technology replaces the traditional way of printing. This indicates the future of digital inkjet textile printing is relatively positive. Differen...

  8. Broadband direct RF digitization receivers

    CERN Document Server

    Jamin, Olivier

    2014-01-01

    This book discusses the trade-offs involved in designing direct RF digitization receivers for the radio frequency and digital signal processing domains.  A system-level framework is developed, quantifying the relevant impairments of the signal processing chain, through a comprehensive system-level analysis.  Special focus is given to noise analysis (thermal noise, quantization noise, saturation noise, signal-dependent noise), broadband non-linear distortion analysis, including the impact of the sampling strategy (low-pass, band-pass), analysis of time-interleaved ADC channel mismatches, sampling clock purity and digital channel selection. The system-level framework described is applied to the design of a cable multi-channel RF direct digitization receiver. An optimum RF signal conditioning, and some algorithms (automatic gain control loop, RF front-end amplitude equalization control loop) are used to relax the requirements of a 2.7GHz 11-bit ADC. A two-chip implementation is presented, using BiCMOS and 65nm...

  9. Digital Language Death

    Science.gov (United States)

    Kornai, András

    2013-01-01

    Of the approximately 7,000 languages spoken today, some 2,500 are generally considered endangered. Here we argue that this consensus figure vastly underestimates the danger of digital language death, in that less than 5% of all languages can still ascend to the digital realm. We present evidence of a massive die-off caused by the digital divide. PMID:24167559

  10. Digital language death.

    Directory of Open Access Journals (Sweden)

    András Kornai

    Full Text Available Of the approximately 7,000 languages spoken today, some 2,500 are generally considered endangered. Here we argue that this consensus figure vastly underestimates the danger of digital language death, in that less than 5% of all languages can still ascend to the digital realm. We present evidence of a massive die-off caused by the digital divide.

  11. Digital Imaging. Chapter 16

    Energy Technology Data Exchange (ETDEWEB)

    Clunie, D. [CoreLab Partners, Princeton (United States)

    2014-09-15

    The original means of recording X ray images was a photographic plate. Nowadays, all medical imaging modalities provide for digital acquisition, though globally, the use of radiographic film is still widespread. Many modalities are fundamentally digital in that they require image reconstruction from quantified digital signals, such as computed tomography (CT) and magnetic resonance imaging (MRI)

  12. Preparing collections for digitization

    CERN Document Server

    Bulow, Anna E

    2010-01-01

    Most libraries, archives and museums are confronting the challenges of providing digital access to their collections. This guide offers guidance covering the end-to-end process of digitizing collections, from selecting records for digitization to choosing suppliers and equipment and dealing with documents that present individual problems.

  13. Digital voltage discriminator

    International Nuclear Information System (INIS)

    Zhou Zhicheng

    1992-01-01

    A digital voltage discriminator is described, which is synthesized by digital comparator and ADC. The threshold is program controllable with high stability. Digital region of confusion is approximately equal to 1.5 LSB. This discriminator has a single channel analyzer function model with channel width of 1.5 LSB

  14. Playtesting the Digital Playground

    DEFF Research Database (Denmark)

    Majgaard, G.; Jessen, Carsten

    2009-01-01

    Being able to be absorbed in play in the digital playground is motivating for children who are used digital computer games. The children can play and exercise outdoors while using the same literacy as in indoor digital games. This paper presents a new playground product where an outdoor playgroun...

  15. How Digital Are the Digital Humanities? An Analysis of Two Scholarly Blogging Platforms

    Science.gov (United States)

    Puschmann, Cornelius; Bastos, Marco

    2015-01-01

    In this paper we compare two academic networking platforms, HASTAC and Hypotheses, to show the distinct ways in which they serve specific communities in the Digital Humanities (DH) in different national and disciplinary contexts. After providing background information on both platforms, we apply co-word analysis and topic modeling to show thematic similarities and differences between the two sites, focusing particularly on how they frame DH as a new paradigm in humanities research. We encounter a much higher ratio of posts using humanities-related terms compared to their digital counterparts, suggesting a one-way dependency of digital humanities-related terms on the corresponding unprefixed labels. The results also show that the terms digital archive, digital literacy, and digital pedagogy are relatively independent from the respective unprefixed terms, and that digital publishing, digital libraries, and digital media show considerable cross-pollination between the specialization and the general noun. The topic modeling reproduces these findings and reveals further differences between the two platforms. Our findings also indicate local differences in how the emerging field of DH is conceptualized and show dynamic topical shifts inside these respective contexts. PMID:25675441

  16. Fuzzy topological digital space and digital fuzzy spline of electroencephalography during epileptic seizures

    Science.gov (United States)

    Shah, Mazlina Muzafar; Wahab, Abdul Fatah

    2017-08-01

    Epilepsy disease occurs because of there is a temporary electrical disturbance in a group of brain cells (nurons). The recording of electrical signals come from the human brain which can be collected from the scalp of the head is called Electroencephalography (EEG). EEG then considered in digital format and in fuzzy form makes it a fuzzy digital space data form. The purpose of research is to identify the area (curve and surface) in fuzzy digital space affected by inside epilepsy seizure in epileptic patient's brain. The main focus for this research is to generalize fuzzy topological digital space, definition and basic operation also the properties by using digital fuzzy set and the operations. By using fuzzy digital space, the theory of digital fuzzy spline can be introduced to replace grid data that has been use previously to get better result. As a result, the flat of EEG can be fuzzy topological digital space and this type of data can be use to interpolate the digital fuzzy spline.

  17. Materials Testing - Digital Ecology

    Directory of Open Access Journals (Sweden)

    Seth Wiley

    2013-03-01

    Full Text Available Access to credible building product performance information throughout the design and construction process is critical to enable project development, vet product selections, ensure as-built quality, and successfully complete construction. This is common knowledge and part of common practice for nearly all parties involved in design and construction. The sources of such information can range from vernacular to formal – from common practice to special reference. The focus of this paper is one of the more formal or specialized information sources, performance testing, as well as how such performance testing information can be better used. This paper’s goals are to familiarize the reader with performance testing and to depict a new kind of valuable informational tool (digital ecology. Reference to pertinent nomenclature, description of a real world example, and detailed description of such an informational tool’s values will be provided.The major content of this paper was developed during project-based work and firm-funded internal research at point b design, ltd. over approximately the previous 4 years. The phrase ‘digital ecology’ as herein used is a new concept proposed by the author. The analysis contained in this paper could be applied to the field of operations and maintenance as it is herein applied to design and construction; however, operations and maintenance is beyond the scope of this paper and may be addressed in future papers. It is my hope that this paper will contribute to tangible and real improvements of the built environment via continued, positive development within academic and professional practice.

  18. Digital Architecture Planning Model

    International Nuclear Information System (INIS)

    Oxstrand, Johanna Helene; Al Rashdan, Ahmad Yahya Mohammad; Bly, Aaron Douglas; Rice, Brandon Charles; Fitzgerald, Kirk; Wilson, Keith Leon

    2016-01-01

    As part of the U.S. Department of Energy's Light Water Reactor Sustainability Program, the Digital Architecture (DA) Project focuses on providing a model that nuclear utilities can refer to when planning deployment of advanced technologies. The digital architecture planning model (DAPM) is the methodology for mapping power plant operational and support activities into a DA that unifies all data sources needed by the utilities to operate their plants. The DA is defined as a collection of information technology capabilities needed to support and integrate a wide spectrum of real-time digital capabilities for performance improvements of nuclear power plants. DA can be thought of as integration of the separate instrumentation and control and information systems already in place in nuclear power plants, which are brought together for the purpose of creating new levels of automation in plant work activities. A major objective in DAPM development was to survey all key areas that needed to be reviewed in order for a utility to make knowledgeable decisions regarding needs and plans to implement a DA at the plant. The development was done in two steps. First, researchers surveyed the nuclear industry in order to learn their near-term plans for adopting new advanced capabilities and implementing a network (i.e., wireless and wire) infrastructure throughout the plant, including the power block. Secondly, a literature review covering regulatory documents, industry standards, and technical research reports and articles was conducted. The objective of the review was to identify key areas to be covered by the DAPM, which included the following: 1. The need for a DA and its benefits to the plant 2. Resources required to implement the DA 3. Challenges that need to be addressed and resolved to implement the DA 4. Roles and responsibilities of the DA implementation plan. The DAPM was developed based on results from the survey and the literature review. Model development

  19. Digital Architecture Planning Model

    Energy Technology Data Exchange (ETDEWEB)

    Oxstrand, Johanna Helene [Idaho National Lab. (INL), Idaho Falls, ID (United States). Light Water Reactor Sustainability Program (LWRS); Al Rashdan, Ahmad Yahya Mohammad [Idaho National Lab. (INL), Idaho Falls, ID (United States). Light Water Reactor Sustainability Program (LWRS); Bly, Aaron Douglas [Idaho National Lab. (INL), Idaho Falls, ID (United States). Light Water Reactor Sustainability Program (LWRS); Rice, Brandon Charles [Idaho National Lab. (INL), Idaho Falls, ID (United States). Light Water Reactor Sustainability Program (LWRS); Fitzgerald, Kirk [Idaho National Lab. (INL), Idaho Falls, ID (United States). Light Water Reactor Sustainability Program (LWRS); Wilson, Keith Leon [Idaho National Lab. (INL), Idaho Falls, ID (United States). Light Water Reactor Sustainability Program (LWRS)

    2016-03-01

    As part of the U.S. Department of Energy’s Light Water Reactor Sustainability Program, the Digital Architecture (DA) Project focuses on providing a model that nuclear utilities can refer to when planning deployment of advanced technologies. The digital architecture planning model (DAPM) is the methodology for mapping power plant operational and support activities into a DA that unifies all data sources needed by the utilities to operate their plants. The DA is defined as a collection of information technology capabilities needed to support and integrate a wide spectrum of real-time digital capabilities for performance improvements of nuclear power plants. DA can be thought of as integration of the separate instrumentation and control and information systems already in place in nuclear power plants, which are brought together for the purpose of creating new levels of automation in plant work activities. A major objective in DAPM development was to survey all key areas that needed to be reviewed in order for a utility to make knowledgeable decisions regarding needs and plans to implement a DA at the plant. The development was done in two steps. First, researchers surveyed the nuclear industry in order to learn their near-term plans for adopting new advanced capabilities and implementing a network (i.e., wireless and wire) infrastructure throughout the plant, including the power block. Secondly, a literature review covering regulatory documents, industry standards, and technical research reports and articles was conducted. The objective of the review was to identify key areas to be covered by the DAPM, which included the following: 1. The need for a DA and its benefits to the plant 2. Resources required to implement the DA 3. Challenges that need to be addressed and resolved to implement the DA 4. Roles and responsibilities of the DA implementation plan. The DAPM was developed based on results from the survey and the literature review. Model development, including

  20. Space Matters: Physical-Digital and Physical-Virtual Codesign in inSpace

    DEFF Research Database (Denmark)

    Reilly, D.; Voida, S.; McKeon, M.

    2010-01-01

    The physical and social cues on which we rely during collaboration can vanish in the digital realm. inSpace focuses on physical-digital codesign, leveraging an approach grounded in social behavior patterns.......The physical and social cues on which we rely during collaboration can vanish in the digital realm. inSpace focuses on physical-digital codesign, leveraging an approach grounded in social behavior patterns....

  1. Digital disruption ?syndromes.

    Science.gov (United States)

    Sullivan, Clair; Staib, Andrew

    2017-05-18

    The digital transformation of hospitals in Australia is occurring rapidly in order to facilitate innovation and improve efficiency. Rapid transformation can cause temporary disruption of hospital workflows and staff as processes are adapted to the new digital workflows. The aim of this paper is to outline various types of digital disruption and some strategies for effective management. A large tertiary university hospital recently underwent a rapid, successful roll-out of an integrated electronic medical record (EMR). We observed this transformation and propose several digital disruption "syndromes" to assist with understanding and management during digital transformation: digital deceleration, digital transparency, digital hypervigilance, data discordance, digital churn and post-digital 'depression'. These 'syndromes' are defined and discussed in detail. Successful management of this temporary digital disruption is important to ensure a successful transition to a digital platform. What is known about this topic? Digital disruption is defined as the changes facilitated by digital technologies that occur at a pace and magnitude that disrupt established ways of value creation, social interactions, doing business and more generally our thinking. Increasing numbers of Australian hospitals are implementing digital solutions to replace traditional paper-based systems for patient care in order to create opportunities for improved care and efficiencies. Such large scale change has the potential to create transient disruption to workflows and staff. Managing this temporary disruption effectively is an important factor in the successful implementation of an EMR. What does this paper add? A large tertiary university hospital recently underwent a successful rapid roll-out of an integrated electronic medical record (EMR) to become Australia's largest digital hospital over a 3-week period. We observed and assisted with the management of several cultural, behavioural and

  2. Ageing and digital games

    DEFF Research Database (Denmark)

    Iversen, Sara Mosberg

    Digital games are still to a great degree considered a medium mainly for young boys. However, available statistics on Western media use show that this is far from the case. Increasingly, people of all ages and genders play digital games, also older adults in their early 60s and beyond. The aim...... of the book is to examine, analyse and discuss: 1) What older adults do with digital games and what meanings the use of digital games take on in the everyday life of older adults; 2) How older adults are perceived by society in relation to digital games; 3) How play and games can be used both...

  3. Digital Living at Home

    DEFF Research Database (Denmark)

    Andersen, Pernille Viktoria Kathja; Christiansen, Ellen Tove

    2013-01-01

    of these user voices has directed us towards a ‘home-keeping’ design discourse, which opens new horizons for design of digital home control systems by allowing users to perform as self-determined controllers and groomers of their habitat. The paper concludes by outlining the implications of a ‘home......Does living with digital technology inevitably lead to digital living? Users talking about a digital home control system, they have had in their homes for eight years, indicate that there is more to living with digital technology than a functional-operational grip on regulation. Our analysis......-keeping’ design discourse....

  4. Digital positron annihilation spectrometer

    International Nuclear Information System (INIS)

    Cheng Bin; Weng Huimin; Han Rongdian; Ye Bangjiao

    2010-01-01

    With the high speed development of digital signal process, the technique of the digitization and processing of signals was applied in the domain of a broad class of nuclear technique. The development of digital positron lifetime spectrometer (DPLS) is more promising than the conventional positron lifetime spectrometer equipped with nuclear instrument modules. And digital lifetime spectrometer has many advantages, such as low noise, long term stability, flexible online or offline digital processing, simple setup, low expense, easy to setting, and more physical information. Digital constant fraction discrimination is for timing. And a new method of optimizing energy windows setting for digital positron lifetime spectrometer is also developed employing the simulated annealing for the convenient use. The time resolution is 220ps and the count rate is 200cps. (authors)

  5. Why Map Issues? On Controversy Analysis as a Digital Method.

    Science.gov (United States)

    Marres, Noortje

    2015-09-01

    This article takes stock of recent efforts to implement controversy analysis as a digital method in the study of science, technology, and society (STS) and beyond and outlines a distinctive approach to address the problem of digital bias. Digital media technologies exert significant influence on the enactment of controversy in online settings, and this risks undermining the substantive focus of controversy analysis conducted by digital means. To address this problem, I propose a shift in thematic focus from controversy analysis to issue mapping. The article begins by distinguishing between three broad frameworks that currently guide the development of controversy analysis as a digital method, namely, demarcationist, discursive, and empiricist. Each has been adopted in STS, but only the last one offers a digital "move beyond impartiality." I demonstrate this approach by analyzing issues of Internet governance with the aid of the social media platform Twitter.

  6. Transforming students into digital academics

    DEFF Research Database (Denmark)

    Thorell, Maria; Fridorff-Jens, Peter Kindt; Lassen, Pia

    2015-01-01

    BACKGROUND: Little is known of students' Information and Communication Technology (ICT) readiness in a learning context. Information about students' capabilities and resources is an important prerequisite for designing meaningful teaching and learning activities that engage and motivate students....... To learn about health science students' usage of digital equipment, familiarity with software, online behavior and communication with the university, we have conducted a survey focusing on these areas. METHODS: A digital questionnaire was sent to 9134 health science students, of whom 1165 responded (12...... of chat users was 23.8 (Standard deviation 3.7) years, SMS users, 25 (Standard deviation 4.2) years and email users, 27.9 (Standard deviation 6.5) years. Over half of the students (53.4%) found that the degree of ICT incorporated in the teaching and learning activities was insufficient to provide them...

  7. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...... is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection....

  8. Analog-to-digital conversion

    CERN Document Server

    Pelgrom, Marcel

    2017-01-01

    This textbook is appropriate for use in graduate-level curricula in analog-to-digital conversion, as well as for practicing engineers in need of a state-of-the-art reference on data converters. It discusses various analog-to-digital conversion principles, including sampling, quantization, reference generation, nyquist architectures and sigma-delta modulation. This book presents an overview of the state of the art in this field and focuses on issues of optimizing accuracy and speed, while reducing the power level. This new, third edition emphasizes novel calibration concepts, the specific requirements of new systems, the consequences of 22-nm technology and the need for a more statistical approach to accuracy. Pedagogical enhancements to this edition include additional, new exercises, solved examples to introduce all key, new concepts and warnings, remarks and hints, from a practitioner’s perspective, wherever appropriate. Considerable background information and practical tips, from designing a PCB, to lay-o...

  9. Children as digital rights agents

    DEFF Research Database (Denmark)

    Stald, Gitte Bang

    2016-01-01

    This paper looks at children’s involvement and contribution to internet safety policy. In many respects, the research perspective on children and young people has also seen a shift towards the child as agent, as citizen (Livingstone 2002, 2009; Dahlgren 2007). With increasing attention given...... to children’s communication rights there is an acknowledgement that children’s voices should be heard in all matters that affect them (Hamelink 2008). We still, however, primarily discuss how adults could and should take responsibility in guarding children and young people from risk and harm, and what...... the role of the “adult world” is. We need to focus more on the active role that children and adolescents play, according to age, skills and various capacities, in identifying, reflecting upon and acting according to opportunities and challenges in relation to digital media and digital rights (Hartman et al...

  10. Digital Banking: Risks of Financial Digitalization

    Directory of Open Access Journals (Sweden)

    Kornіvska Valerіa O.

    2017-09-01

    Full Text Available The paper demonstrates the results of the research into development of the digital economy in the global financial space, shows the contradictions of these processes in the context of the growth of financial inclusion of households, identifies the risks of active introduction of digital banking in poor countries of the world. The characteristics of the processes of growth of the influence of banking institutions on the operational activity and daily life of households are given, and it is proved that under conditions of digital banking, without having any other alternative ways of economic activity in terms of money circulation than non-cash turnover, clients are forced to agree to unlimited presence of financial operators in social systems. It is substantiated that in Ukraine the global risk of digitalization of the society is gradually developing as a result of the creation of unified information systems for the control of global financial flows.

  11. Digital rights management for digital cinema

    Science.gov (United States)

    Kirovski, Darko; Peinado, Marcus; Petitcolas, Fabien A. P.

    2001-12-01

    There is a wide consensus among the feature film production studios that the Internet era brings a new paradigm for film distribution to cinemas worldwide. The benefits of digital cinema to both producers and cinemas are numerous: significantly lower distribution and maintenance costs, immediate access to film libraries, higher presentation quality, and strong potential for developing new business models. Despite these advantages, the studios are still reluctant to jump into the digital age. The main showstopper for digital cinema is the danger of widespread piracy. Piracy already costs Hollywood an estimated two billion dollars annually and digital cinema without proper copyright enforcement could increase this number. In this paper, we present a copyright management system that aims at providing the set of necessary security tools: standard cryptographic primitives and copyright protection mechanisms that enable a reliable and secure feature film delivery system.

  12. Searching for Digital Citizenship: Fighting Corruption in Banten, Indonesia

    Directory of Open Access Journals (Sweden)

    Muhammad Zamzam Fauzanafi

    2016-12-01

    Full Text Available The expansion of digital technologies and social media in Indonesia shifts practices of citizenship from a formal institutional level toward a more informal digital space. This paper presents the emerging results of research on digital citizenship in Banten, Indonesia, focusing on how new forms of citizenship are brought into being through digital acts that are defined as speech acts uttered through the use of social media. The paper follows digital acts of citizens in anti-corruption campaigns against the patrimonial and clientelistic regime of Banten’s political dynasty that are predominantly staged on Facebook and other online platforms. These digital acts produce and intensify affective publics through which forms of digital citizenship are enacted in opposition to the corrupt dynasty.

  13. The Physical-Digital Divide: Exploring the Social Gap Between Digital Natives and Physical Natives.

    Science.gov (United States)

    Ball, Christopher; Francis, Jessica; Huang, Kuo-Ting; Kadylak, Travis; Cotten, Shelia R; Rikard, R V

    2017-09-01

    Older adults are the most digitally divided demographic group. The present study explores how older adults perceive the physical use of information and communication technologies (ICTs), particularly across generations and contexts. Data for the present study come from nine focus groups. Seniors acknowledge that ICTs help them connect with geographically distant social ties, but that they lead to feelings of disconnection with geographically close social ties. We label this phenomenon the "physical-digital divide," which exists when a group feels ostracized or offended when those around them engage with ICTs while they themselves are not or cannot engage with ICTs. Younger generations are often referred to as "digital natives" and older generations as "digital immigrants." A more apt label for older adults may be "physical natives," as their preferred method of communication involves physical face-to-face interactions and traditional codes of etiquette. Suggestions are made for reducing the physical-digital divide.

  14. Focused ultrasound in ophthalmology

    Directory of Open Access Journals (Sweden)

    Silverman RH

    2016-09-01

    Full Text Available Ronald H Silverman1,2 1Department of Ophthalmology, Columbia University Medical Center, 2F.L. Lizzi Center for Biomedical Engineering, Riverside Research, New York, NY, USA Abstract: The use of focused ultrasound to obtain diagnostically significant information about the eye goes back to the 1950s. This review describes the historical and technological development of ophthalmic ultrasound and its clinical application and impact. Ultrasound, like light, can be focused, which is crucial for formation of high-resolution, diagnostically useful images. Focused, single-element, mechanically scanned transducers are most common in ophthalmology. Specially designed transducers have been used to generate focused, high-intensity ultrasound that through thermal effects has been used to treat glaucoma (via cilio-destruction, tumors, and other pathologies. Linear and annular transducer arrays offer synthetic focusing in which precise timing of the excitation of independently addressable array elements allows formation of a converging wavefront to create a focus at one or more programmable depths. Most recently, linear array-based plane-wave ultrasound, in which the array emits an unfocused wavefront and focusing is performed solely on received data, has been demonstrated for imaging ocular anatomy and blood flow. While the history of ophthalmic ultrasound extends back over half-a-century, new and powerful technologic advances continue to be made, offering the prospect of novel diagnostic capabilities. Keywords: ophthalmic ultrasound, ultrasound biomicroscopy (UBM, high-intensity focused ultrasound (HIFU, ultrafast imaging, Doppler imaging 

  15. Space Focus Lead Report

    Energy Technology Data Exchange (ETDEWEB)

    Reeves, Geoffrey D. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-08-10

    The Space Focus team is tasked with the definition of the Space Focused Science Topics, and with the review and ranking of the CSES proposals received in all the program areas. This is achieved by dedicated meetings or a series of informal discussions and/or e-mail reviews.

  16. BrightFocus Foundation

    Science.gov (United States)

    ... About BrightFocus Foundation Featured Content BrightFocus: Investing in Science to Save Mind and Sight We're here to help. Explore ... recognition is very important. Monday, November 6, 2017 New Diagnosis? Managing a mind and sight disease is a journey. And you’ ...

  17. Digital Collections, Digital Libraries and the Digitization of Cultural Heritage Information.

    Science.gov (United States)

    Lynch, Clifford

    2002-01-01

    Discusses the development of digital collections and digital libraries. Topics include digitization of cultural heritage information; broadband issues; lack of compelling content; training issues; types of materials being digitized; sustainability; digital preservation; infrastructure; digital images; data mining; and future possibilities for…

  18. Collaborative learning model inquiring based on digital game

    Science.gov (United States)

    Yuan, Jiugen; Xing, Ruonan

    2012-04-01

    With the development of computer education software, digital educational game has become an important part in our life, entertainment and education. Therefore how to make full use of digital game's teaching functions and educate through entertainment has become the focus of current research. The thesis make a connection between educational game and collaborative learning, the current popular teaching model, and concludes digital game-based collaborative learning model combined with teaching practice.

  19. The Adoption of Digital Marketing in Financial Services under Crisis

    Directory of Open Access Journals (Sweden)

    Daj A.

    2009-12-01

    Full Text Available Led by social media, online search, consumer generated content, virtual communities, and considering the increased focus on digital technologies, the longer-term prospects for digital marketing and the global online medium continue to be bright. Given the recent decline of the financial markets and the economic fallout, financial institutions have to implement new digital marketing techniques both for cost optimization and for dealing with the crisis of confidence.

  20. Digital Technologies In The Early Primary School Classroom

    OpenAIRE

    Sinclair, Nathalie; Baccaglini-Frank, Anna

    2016-01-01

    Papert's (1980) work with Turtle Geometry offered an early and provocative vision of how digital technologies could be used with young learners. Since then, research on digital technology use has focused on the middle and high school levels. Given the increasing diversity of digital technologies, and their varied underlying pedagogical goals and design choices, Clements' (2002) claim that there is no single effect of the computer on mathematics achievement is as true now as it was a decade ag...

  1. Tribodynamic Modeling of Digital Fluid Power Motors

    DEFF Research Database (Denmark)

    Johansen, Per

    . In fluid power motoring and pumping units, a significant problem is that loss mechanisms do not scale down with diminishing power throughput. Although machines can reach peak efficiencies above 95%, the actual efficiency during operation, which includes part-load situations, is much lower. The invention...... of digital fluid power displacement units has been able to address this problem. The main idea of the digital fluid power displacement technology is to disable individual chambers, by use of electrical actuated valves. A displacement chamber is disabled by keeping the valve, between the chamber and the low...... design methods and tools are important to the development of digital fluid power machines. The work presented in this dissertation is part of a research program focusing on the development of digital fluid power MW-motors for use in hydraulic drive train in wind turbines. As part of this development...

  2. A Paradigmatic Analysis of Digital Application Marketplaces

    DEFF Research Database (Denmark)

    Ghazawneh, Ahmad; Henfridsson, Ola

    2015-01-01

    This paper offers a paradigmatic analysis of digital application marketplaces for advancing information systems research on digital platforms and ecosystems. We refer to the notion of digital application marketplace, colloquially called ‘appstores,’ as a platform component that offers a venue...... for exchanging applications between developers and end users belonging to a single or multiple ecosystems. Such marketplaces exhibit diversity in features and assumptions, and we propose that examining this diversity, and its ideal types, will help us to further understand the relationship between application...... marketplaces, platforms, and platform ecosystems. To this end, we generate a typology that distinguishes four kinds of digital application marketplaces: closed, censored, focused, and open marketplaces. The paper also offers implications for actors wishing to make informed decisions about their relationship...

  3. Establishing diagnostic reference levels in digital radiology

    International Nuclear Information System (INIS)

    Bana, Remy Wilson

    2016-04-01

    Medical application of radiation has gained wider study since diagnostic radiology plays a very important role in modern medicine. The need of the service seems to increase since the invention of digital radiology as a new technology that promises greater accuracy while minimizing patient dose. However, it is not exempted in the harmonization of doses delivered to the patient undergoing same radiologic examination in different institutions either regional or nationwide. The objective of this project was to review the establishment of Diagnostic Reference Levels (DRLs) in digital radiology at National level with the aim to reduce patient dose while maintaining appropriate image quality. A general discussion on digital radiology has been presented focusing on the optimization of patient dose as well as dosimetric quantities used for the establishment of DRLs. Recommendations have been provided for Rwanda to initiate steps to establish National Diagnostic Reference Levels for common procedures in digital radiology. (au)

  4. RF applications in digital signal processing

    CERN Document Server

    Schilcher, T

    2008-01-01

    Ever higher demands for stability, accuracy, reproducibility, and monitoring capability are being placed on Low-Level Radio Frequency (LLRF) systems of particle accelerators. Meanwhile, continuing rapid advances in digital signal processing technology are being exploited to meet these demands, thus leading to development of digital LLRF systems. The rst part of this course will begin by focusing on some of the important building-blocks of RF signal processing including mixer theory and down-conversion, I/Q (amplitude and phase) detection, digital down-conversion (DDC) and decimation, concluding with a survey of I/Q modulators. The second part of the course will introduce basic concepts of feedback systems, including examples of digital cavity eld and phase control, followed by radial loop architectures. Adaptive feed-forward systems used for the suppression of repetitive beam disturbances will be examined. Finally, applications and principles of system identi cation approaches will be summarized.

  5. Determinants of Internet skills, use and outcomes : A systematic review of the second- and third-level digital divide

    NARCIS (Netherlands)

    Scheerder, Anique; van Deursen, Alexander; van Dijk, Jan

    2017-01-01

    Recently, several digital divide scholars suggested that a shift is needed from a focus on binary Internet access (first-level digital divide) and Internet skills and use (second-level digital divide) to a third-level digital divide in which the tangible outcomes of Internet use are highlighted. A

  6. Negotiating Digital Divides: Perspectives from the New Zealand Schooling System

    Science.gov (United States)

    Starkey, Louise; Sylvester, Allan; Johnstone, David

    2017-01-01

    This article explores digital divides identified in research literature and considers educational policy directions that may mitigate or enhance future inequities. A review of literature identified three categories of digital divides in society; access, capability, and participation. To explore the strategic focus in schooling, data were gathered…

  7. Repurposing digital methods: The research affordances of platforms and engines

    NARCIS (Netherlands)

    Weltevrede, E.J.T.

    2016-01-01

    Digital research is often understood as data-driven. Yet the ways in which data are already informed by specific analytical assumptions and inscriptions of the media in which they originate, circulate, or are being used is often neglected. The thesis intervenes in such focus on digital research in

  8. Play, Creativity and Digital Cultures. Routledge Research in Education

    Science.gov (United States)

    Willett, Rebekah, Ed.; Robinson, Muriel, Ed.; Marsh, Jackie, Ed.

    2011-01-01

    Recent work on children's digital cultures has identified a range of literacies emerging through children's engagement with new media technologies. This edited collection focuses on children's digital cultures, specifically examining the role of play and creativity in learning with these new technologies. The chapters in this book were contributed…

  9. "Impossible Is Nothing": Expressing Difficult Knowledge through Digital Storytelling

    Science.gov (United States)

    Johnson, Lauren; Kendrick, Maureen

    2017-01-01

    The study focuses on a digital storytelling project conducted in a school district's transition program, in which adolescent refugee and immigrant English learners were invited to share aspects of their identities and social worlds through a range of modes. In this article, the authors look closely at one student's digital story through a…

  10. A digital health innovation ecosystem for South Africa

    CSIR Research Space (South Africa)

    Herselman, Marlien

    2016-05-01

    Full Text Available The purpose of this paper is to provide an overview of how a digital health innovation ecosystem was conceptualised and validated for South Africa. Largely, we focus on defining strategies to build Digital Health Innovation Ecosystems in the context...

  11. Digital Sport Medical Record: Sigh or a blessing?

    NARCIS (Netherlands)

    Stege, J.P.; Fleuren, M.A.H.; van der Knaap, E.T.W.; Stubbe, J.H.

    2013-01-01

    Since 2004, there have been several initiatives regarding the development of a digital Sport Medical Record (SMD). Interviews with the Netherlands Association of Sports Medicine (VSG) show that there are particular problems with commissioning of the digital SMD. During spring 2012, two focus group

  12. Digital Crafting and the Challenge to Material Practices

    DEFF Research Database (Denmark)

    Ramsgaard Thomsen, Mette

    2014-01-01

    Mette Ramsgard Thomsen will examine how architecture is influenced by new digital design—the production tools as well as the digital practices that are informing our societies culturally, socially and technologically. Focusing on the tectonic possibilities of textiles to create lighter and more r...

  13. Information Seeking Behavior in Digital Image Collections: A Cognitive Approach

    Science.gov (United States)

    Matusiak, Krystyna K.

    2006-01-01

    Presents the results of a qualitative study that focuses on search patterns of college students and community users interacting with a digital image collection. The study finds a distinct difference between the two groups of users and examines the role of mental models in information seeking behavior in digital libraries.

  14. Digital Storytelling – Special issue

    Directory of Open Access Journals (Sweden)

    Yngve Nordkvelle

    2010-11-01

    foster professional health worker identity in students”, they focus the role of personal narratives, multimedia and the creative process in developing identity and voice. The project reviewed in their paper identifies contexts in higher education where digital storytelling may be used as a promising tool to support students’ learning, assisting them to combine theory and practical experience in their field of study. Community buildingSarah Copeland, of Leeds metropolitan University and Clodagh Miskelly, independent producer contribute with an article called: “Making time for storytelling; the challenges of community building and activism in a rural locale”. Their topic is how to engage prospective participants with using digital storytelling as a challenge in itself. Motivating and arguing for this way of expressing a voice has a better chance for success when one considers the various practical barriers that one meets when employing community media. They argue that an open discussion of projects that are less successful will enhance our practice and our understanding of processes intended to enable social change. Aneta Podkalicka, Swinburne University and Craig Campbell, Salvation Army of Melbourne contribute with the article: “Understanding digital storytelling: individual ‘voice’ and community-building in youth media programs”. Their topic is empowerment for marginalised voices across community-based projects worldwide. The paper discusses uses but also limitations of the practice in the context of a Melbourne-based youth media program for ‘youth at risk’ called YouthWorx. Genres of communicationKaren Rodriguez, of the CIEE Study Center in Guanajuato, Mexico, and Universidad de Guanajuato presents the article: “Digital storytelling in study abroad: toward a counter-catalogic experience”. She reports from a pilot project of how students on visits to a foreign university may use digital storytelling to expand their experiences and support their

  15. Digital Simulation in the Geosciences

    Directory of Open Access Journals (Sweden)

    Alexandr A. Lobanov

    2014-09-01

    Full Text Available This article provides an analysis of methods for digital modeling in the area of Earth Sciences. The author illustrates the difference between digital modeling in radio communication and that in the area of Earth Sciences. The article examines the integration aspect of digital models, demonstrates the advantages of digital over analog models, and illustrates that digital models are discrete. The author outlines the characteristics of digital modeling and illustrates the logical structure of digital models.

  16. Inclusão digital via acessibilidade web | Digital inclusion via web accessibility

    Directory of Open Access Journals (Sweden)

    Cesar Augusto Cusin

    2009-03-01

    Full Text Available Resumo A natureza atual da web, que destaca a participação colaborativa dos usuários em diversos ambientes informacionais digitais, conduz ao desenvolvimento de diretrizes que enfocam a arquitetura da informação digital inclusiva para diferentes públicos nas mais diversas ambiências informacionais. A pesquisa propõe e objetiva um ambiente informacional digital inclusivo, visando apontar os elementos de acessibilidade que permitam a promoção da inclusão informacional digital, de forma a destacar os referenciais da Arquitetura da Informação Digital, de recomendações internacionais, com o olhar da Ciência da Informação e das novas tecnologias de informação e comunicação (TIC. Palavras-chave inclusão digital; web; acessibilidade; ciência da informação; arquitetura da informação. Abstract The current nature of the web, which highlights the collaborative participation of users in various digital informational environments, leads to the development of guidelines that focus on the digital inclusive information architecture for different audiences in diverse informational environments. The study proposes an inclusive digital information environment, aiming to establish the elements of accessibility that  enable the promotion of digital inclusion information in order to highlight the references of digital information architecture, the international recommendations, with the perspective of Information Science and the new information and communication technologies (ICT. Keywords digital inclusion; web; accessibility; information science; information architecture.

  17. Final focus test beam

    International Nuclear Information System (INIS)

    1991-03-01

    This report discusses the following: the Final Focus Test Beam Project; optical design; magnets; instrumentation; magnetic measurement and BPM calibration; mechanical alignment and stabilization; vacuum system; power supplies; control system; radiation shielding and personnel protection; infrastructure; and administration

  18. Facility Focus: Food Service.

    Science.gov (United States)

    College Planning & Management, 2002

    2002-01-01

    Describes the Hawthorn Court Community Center at Iowa State University, Ames, and the HUB-Robeson Center at Pennsylvania State University. Focuses on the food service offered in these new student-life buildings. Includes photographs. (EV)

  19. Focus group discussions

    CERN Document Server

    Hennink, Monique M

    2014-01-01

    The Understanding Research series focuses on the process of writing up social research. The series is broken down into three categories: Understanding Statistics, Understanding Measurement, and Understanding Qualitative Research. The books provide researchers with guides to understanding, writing, and evaluating social research. Each volume demonstrates how research should be represented, including how to write up the methodology as well as the research findings. Each volume also reviews how to appropriately evaluate published research. Focus Group Discussions addresses the challenges associated with conducting and writing focus group research. It provides detailed guidance on the practical and theoretical considerations in conducting focus group discussions including: designing the discussion guide, recruiting participants, training a field team, moderating techniques and ethical considerations. Monique Hennink describes how a methodology section is read and evaluated by others, such as journal reviewers or ...

  20. Digital radiology and ultrasound

    International Nuclear Information System (INIS)

    Todd-Pokropek, A.

    1991-01-01

    With the access to digital methods for handling and processing images in general, many medical imaging methods are becoming more effectively handled digitally. This applies in particular to basically digital techniques such as CT and MR but also now includes Nuclear Medicine (NM), Ultrasound (US) and a variety of radiological procedures such as Digital Subtraction Angiography (DSA) and Fluoroscopy (DF). The access to conventional projection images by stimulatable plates (CR) or by digitization of film makes all of radiology potentially accessible, and the management of such images by a network is the basic aim of Picture Archiving and Communication Systems (PACS). However, it is suggested that in order for such systems to be of greater value, that way in which such images are treated needs to change, that is, digital images can be used to derive additional clinical value by appropriate processing

  1. Digital cine-imaging

    International Nuclear Information System (INIS)

    Masuda, Kazuhiro

    1992-01-01

    Digitization of fluoroscopic images has been developed for the digital cine imaging system as a result of the computer technology, television technology, and popularization of interventional radiology. Present digital cine imaging system is able to offer images similar to cine film because of the higher operatability and better image quality with the development of interventional radiology. As a result, its higher usefulness for catheter diagnosis examination except for interventional radiology was reported, and the possibility of having filmless cine is close to becoming a reality. However several problems have been pointed out, such as spatial resolution, time resolution, storage and exchangeability of data, disconsolidated viewing functions, etc. Anyhow, digital cine imaging system has some unresolved points and lots the needs to be discussed. The tendency of digitization is the passage of the time and we have to promote a study for more useful digital cine imaging system in team medical treatment which centers on the patients. (author)

  2. High harmonics focusing undulator

    Energy Technology Data Exchange (ETDEWEB)

    Varfolomeev, A.A.; Hairetdinov, A.H.; Smirnov, A.V.; Khlebnikov, A.S. [Kurchatov Institute, Moscow (Russian Federation)

    1995-12-31

    It was shown in our previous work that there exist a possibility to enhance significantly the {open_quote}natural{close_quote} focusing properties of the hybrid undulator. Here we analyze the actual undulator configurations which could provide such field structure. Numerical simulations using 2D code PANDIRA were carried out and the enhanced focusing properties of the undulator were demonstrated. The obtained results provide the solution for the beam transport in a very long (short wavelength) undulator schemes.

  3. The Individually Focused Interview

    DEFF Research Database (Denmark)

    Clausen, Aksel Skovgaard

    2012-01-01

    relatively “strong” interviewees (interview persons: IPs) with diverse backgrounds; (2) thorough planning of the interview with well-focused themes; and (3) a thorough and repeated introduction to the interview. The omission of audio transcriptions is an obvious solution to the researcher who wants a breadth...... of range of statements stemming from the use of many more interviewees than is often possible. The Individually Focused Interview (TIFI) also provides more time for involvement in the field and further analysis....

  4. Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics

    Directory of Open Access Journals (Sweden)

    Nana Rachmana Syambas

    2015-01-01

    Full Text Available In digital forensic investigations, the investigators take digital evidence from computers, laptops or other electronic goods. There are many complications when a suspect or related person does not want to cooperate or has removed digital evidence. A lot of research has been done with the goal of retrieving data from flash memory or other digital storage media from which the content has been deleted. Unfortunately, such methods cannot guarantee that all data will be recovered. Most data can only be recovered partially and sometimes not perfectly, so that some or all files cannot be opened. This paper proposes the development of a new method for the retrieval of digital evidence called the Two-Step Injection method (TSI. It focuses on the prevention of the loss of digital evidence through the deletion of data by suspects or other parties. The advantage of this method is that the system works in secret and can be combined with other digital evidence applications that already exist, so that the accuracy and completeness of the resulting digital evidence can be improved. An experiment to test the effectiveness of the method was set up. The developed TSI system worked properly and had a 100% success rate.

  5. Demonetization to Digitalization: A Step Toward Progress

    Directory of Open Access Journals (Sweden)

    Harshita Bhatnagar

    2017-05-01

    Full Text Available Journey from demonetization to digitalization is very hard hitting but not impossible. Recent demonetization in India on November 8, 2016, created lot of panic in the economy but also paved the way to digitalization. Cash crunch and availability of e-sources of transactions compelled many people to use electronic modes of payment. Credit cards, debit cards/RuPay card, USSD/UPI, Internet banking, mobile wallets like Oxigen, Paytm, Mobiwik, aadhar-enabled payment system, POS, and so on are few popular modes of electronic transaction, which are commonly used by the citizen. Digitalization will embrace higher transparency in monetary terms; low-cost maintenance; more convenience in use; and help in financial inclusion and weeding out black money and counterfeit money from the economy. But journey to a destination is always full of roadblocks, and similarly the journey of India toward a digital India is also full of hurdles like a huge illiteracy rate; low bandwidth; more unbanked areas; late adoption of technology; lack of full-time electricity; security concerns like hacking, cybercrime, and safety of personal details; and need for high investments. So, to defend the dream of a digital India, we have to develop well-defined strategies to coach people in using technology like focusing on customer education as well as employee education in technology by conducting workshops, presentations, enforcing strict cyber laws, use of local language, and developing user-friendly websites that leverage technology using the development of simple and smart digital tools, such as the use of a one-time password (OTP. The government has started Vittiya Sakharata Abhiyaan (VISAKA and outreach campaigns like DigiDhan Abhiyan and so on to encourage people to adopt digital tools. Overall demonetization is greasing the wheels of digitalization and transforming India into Digital India.

  6. Plutonium focus area

    International Nuclear Information System (INIS)

    1996-08-01

    To ensure research and development programs focus on the most pressing environmental restoration and waste management problems at the U.S. Department of Energy (DOE), the Assistant Secretary for the Office of Environmental Management (EM) established a working group in August 1993 to implement a new approach to research and technology development. As part of this new approach, EM developed a management structure and principles that led to the creation of specific Focus Areas. These organizations were designed to focus the scientific and technical talent throughout DOE and the national scientific community on the major environmental restoration and waste management problems facing DOE. The Focus Area approach provides the framework for intersite cooperation and leveraging of resources on common problems. After the original establishment of five major Focus Areas within the Office of Technology Development (EM-50, now called the Office of Science and Technology), the Nuclear Materials Stabilization Task Group (EM-66) followed the structure already in place in EM-50 and chartered the Plutonium Focus Area (PFA). The following information outlines the scope and mission of the EM, EM-60, and EM-66 organizations as related to the PFA organizational structure

  7. Plasma focus matching conditions

    International Nuclear Information System (INIS)

    Soliman, H.M.; Masoud, M.M.; Elkhalafawy, T.A.

    1988-01-01

    A snow-plough and slug models have been used to obtain the optimum matching conditions of the plasma in the focus. The dimensions of the plasma focus device are, inner electrode radius = 2 cm, outer electrode radius = 5.5 cm, and its length = 8 cm. It was found that the maximum magnetic energy of 12.26 kJ has to be delivered to plasma focus whose density is 10 19 /cm 3 at focusing time of 2.55 μs and with total external inductance of 24.2 n H. The same method is used to evaluate the optimum matching conditions for the previous coaxial discharge system which had inner electrode radius = 1.6 cm, outer electrode radius = 3.3 cm and its length = 31.5 cm. These conditions are charging voltage = 12 kV, capacity of the condenser bank = 430 μf, plasma focus density = 10 19 /cm 3 focusing time = 8 μs and total external inductance = 60.32 n H.3 fig., 2 tab

  8. Digital collections and exhibits

    CERN Document Server

    Denzer, Juan

    2015-01-01

    Today's libraries are taking advantage of cutting-edge technologies such as flat panel displays using touch, sound, and hands-free motions to design amazing exhibits using everything from simple computer hardware to advanced technologies such as the Microsoft Kinect. Libraries of all types are striving to add new interactive experiences for their patrons through exciting digital exhibits, both online and off. Digital Collections and Exhibits takes away the mystery of designing stunning digital exhibits to spotlight library trea

  9. Digital Sensor Technology

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken D. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Quinn, Edward L. [Technology Resources, Dana Point, CA (United States); Mauck, Jerry L. [Technology Resources, Dana Point, CA (United States); Bockhorst, Richard M. [Technology Resources, Dana Point, CA (United States)

    2015-02-01

    The nuclear industry has been slow to incorporate digital sensor technology into nuclear plant designs due to concerns with digital qualification issues. However, the benefits of digital sensor technology for nuclear plant instrumentation are substantial in terms of accuracy and reliability. This paper, which refers to a final report issued in 2013, demonstrates these benefits in direct comparisons of digital and analog sensor applications. Improved accuracy results from the superior operating characteristics of digital sensors. These include improvements in sensor accuracy and drift and other related parameters which reduce total loop uncertainty and thereby increase safety and operating margins. An example instrument loop uncertainty calculation for a pressure sensor application is presented to illustrate these improvements. This is a side-by-side comparison of the instrument loop uncertainty for both an analog and a digital sensor in the same pressure measurement application. Similarly, improved sensor reliability is illustrated with a sample calculation for determining the probability of failure on demand, an industry standard reliability measure. This looks at equivalent analog and digital temperature sensors to draw the comparison. The results confirm substantial reliability improvement with the digital sensor, due in large part to ability to continuously monitor the health of a digital sensor such that problems can be immediately identified and corrected. This greatly reduces the likelihood of a latent failure condition of the sensor at the time of a design basis event. Notwithstanding the benefits of digital sensors, there are certain qualification issues that are inherent with digital technology and these are described in the report. One major qualification impediment for digital sensor implementation is software common cause failure (SCCF).

  10. Preserving Digital Materials

    CERN Document Server

    Harvey, Ross

    2011-01-01

    This book provides a single-volume introduction to the principles, strategies and practices currently applied by librarians and recordkeeping professionals to the critical issue of preservation of digital information. It incorporates practice from both the recordkeeping and the library communities, taking stock of current knowledge about digital preservation and describing recent and current research, to provide a framework for reflecting on the issues that digital preservation raises in professional practice.

  11. Dakwah di Era Digital

    OpenAIRE

    Budiantoro, Wahyu

    2018-01-01

    These days dakwah is not only interpreted as transformation of a pure religious value, but also transformation of a more relevant value including many aspects in digital era. Digital era is when society succumbed into the flow of information causing cultural shock and difficulties on synthesizing meaning from those scattered information. Dakwah on Digital age must accommodate societal needs which tend to move into a mass society. It results in strategy and more humane and innovative dakwah me...

  12. The Digital Imperative

    OpenAIRE

    Veling, Louise; Murnane, Sinéad; Carcary, Marian; Zlydareva, Olga

    2014-01-01

    The pervasiveness of digital technologies and their potential for reshaping the industry landscape dictates that organizations operating today have little choice but to incorporate digital technologies into their business strategies. Failure to do so will impede the business’s viability, and may ultimately lead to business failure. However, for those organizations that successfully transition to digital business, unprecedented business opportunities exist for value creation and reali...

  13. Digital piracy : theory

    OpenAIRE

    BELLEFLAMME, Paul; PEITZ, Martin

    2010-01-01

    This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital pirate. Next, it provides an exploration of the consequences of digital piracy, using a base model and several extensions (with consumer sampling, network effects, and indirect appropriation). A closer look at market-structure implications of end-u...

  14. La radio digital

    Directory of Open Access Journals (Sweden)

    Carlos Eduardo Cortés S.

    2015-01-01

    Full Text Available La radio digital es un producto de la llamada convergencia digital. Las nuevas tecnologías interconectadas permiten la aparición de nuevos modos de audiencia y la implementación de herramientas versátiles. Habla del problema de los estándares, de la radio satelital, la radio digital terrestre, las radios internacionales, la interactividad.

  15. Easy digital engineering

    International Nuclear Information System (INIS)

    Jin, Dal Bok

    2002-02-01

    This book lists basic of digital engineering, number system and digital code, Boolean algebra and basic logic circuit, simplify of logical expression, combinational circuit, arithmetic circuit, multivibrator circuit, sequential circuit, memory unit of semiconductor and logical element for program, D/A converter and A/D converter, logic element and integrated circuit and logic circuit and micro controller. It has exercises and answers about digital engineering and summary in the end of each chapter.

  16. Debunking the "Digital Native": Beyond Digital Apartheid, towards Digital Democracy

    Science.gov (United States)

    Brown, C.; Czerniewicz, L.

    2010-01-01

    This paper interrogates the currently pervasive discourse of the "net generation" finding the concept of the "digital native" especially problematic, both empirically and conceptually. We draw on a research project of South African higher education students' access to and use of Information and Communication Technologies (ICTs)…

  17. Digital Natives and Digital Divide: Analysing Perspective for Emerging Pedagogy

    Science.gov (United States)

    Onye, Uriel U.; Du, Yunfei

    2016-01-01

    This paper addresses the concepts of digital natives and digital divide from the perspective of the digital outsiders (part of digital natives). It takes a critical look at the implications of available ICT in both developed and underdeveloped countries in the fight against digital divide. The major contribution to literature is by drawing…

  18. Centralized digital control of accelerators

    International Nuclear Information System (INIS)

    Melen, R.E.

    1983-09-01

    In contrasting the title of this paper with a second paper to be presented at this conference entitled Distributed Digital Control of Accelerators, a potential reader might be led to believe that this paper will focus on systems whose computing intelligence is centered in one or more computers in a centralized location. Instead, this paper will describe the architectural evolution of SLAC's computer based accelerator control systems with respect to the distribution of their intelligence. However, the use of the word centralized in the title is appropriate because these systems are based on the use of centralized large and computationally powerful processors that are typically supported by networks of smaller distributed processors

  19. Digital signal processing for NDT

    International Nuclear Information System (INIS)

    Georgel, B.

    1994-01-01

    NDT begins to adapt and use the most recent developments of digital signal and image processing. We briefly sum up the main characteristics of NDT situations (particularly noise and inverse problem formulation) and comment on techniques already used or just emerging (SAFT, split spectrum, adaptive learning network, noise reference filtering, stochastic models, neural networks). This survey is focused on ultrasonics, eddy currents and X-ray radiography. The final objective of end users (availability of automatic diagnosis systems) cannot be achieved only by signal processing algorithms. A close cooperation with other techniques such as artificial intelligence has therefore to be implemented. (author). 20 refs

  20. Research note: Digital divide across borders: A cross-national study of adolescents' use of digital technologies

    NARCIS (Netherlands)

    Notten, N.J.W.R.; Peter, J.; Kraaykamp, G.L.M.; Valkenburg, P.M.

    2009-01-01

    In this study, we analyse digital divides in terms of social inequality in digital access and use patterns from a hierarchical perspective. Using data from the Programme for International Student Assessment (PISA) 2003 in 30 nations, we focus on social cleavages in mid-adolescents access and use of

  1. Research note: digital divide across borders: a cross-national study of adolescents’ use of digital technologies

    NARCIS (Netherlands)

    Notten, N.; Peter, J.; Kraaykamp, G.; Valkenburg, P.M.

    2009-01-01

    In this study, we analyse digital divides in terms of social inequality in digital access and use patterns from a hierarchical perspective. Using data from the Programme for International Student Assessment (PISA) 2003 in 30 nations, we focus on social cleavages in mid-adolescents’ access and use of

  2. Using Disruptive Technologies to Make Digital Connections: Stories of Media Use and Digital Literacy in Secondary Classrooms

    Science.gov (United States)

    Nowell, Shanedra D.

    2014-01-01

    This study focused on ways teachers and students in an urban high school used technologies often labeled as disruptive (i.e. social media and mobile phones) as learning and relationship building tools, inside and outside the classroom. In this teacher research study, secondary teachers discussed digital literacies, the digital divide, and digital…

  3. The Digitally Disadvantaged: Access to Digital Communication Technologies among First Year Students at a Rural South African University

    Science.gov (United States)

    Oyedemi, Toks; Mogano, Saki

    2018-01-01

    Considering the importance of digital skills in university education, this article reports on a study which examined access to technology among first year students at a rural South African university. The study focused on the digital readiness of students prior to their admission to the university, since many universities provide access to…

  4. The digital media handbook

    CERN Document Server

    Dewdney, Andrew

    2013-01-01

    The new edition of The Digital Media Handbook presents an essential guide to the historical and theoretical development of digital media, emphasising cultural continuity alongside technological change, and highlighting the emergence of new forms of communication in contemporary networked culture.Andrew Dewdney and Peter Ride present detailed critical commentary and descriptive historical accounts, as well as a series of interviews from a range of digital media practitioners, including producers, developers, curators and artists.The Digital Media Handbook highlights key concerns of today's prac

  5. Digitization of conventional radiographs

    International Nuclear Information System (INIS)

    Wenz, W.; Buitrago-Tellez, C.; Blum, U.; Hauenstein, K.H.; Gufler, H.; Meyer, E.; Ruediger, K.

    1992-01-01

    The diagnostic value of a digitization system for analogue films based on a charge-coupled-device (CCD) scanner with adjustable resolution of 2.5 or 5 lp/mm was assessed. Some 110 skeletal radiographs, 50 contrast studies, including 25 of patients with Crohn's disease, and 70 abdominal plain films before and after successful lithotripsy for renal stones were digitized. Receiver operating characteristic (ROC) studies showed improved detection of cortical and trabecular defects with contrast-optimized digitized films. Edge enhancement algorithms yielded no additional information. Inflammatory lesions of Crohn's disease were detected equally well by conventional films and digitized images. A statistically significant improvement (p [de

  6. Exploring digital professionalism.

    Science.gov (United States)

    Ellaway, Rachel H; Coral, Janet; Topps, David; Topps, Maureen

    2015-01-01

    The widespread use of digital media (both computing devices and the services they access) has blurred the boundaries between our personal and professional lives. Contemporary students are the last to remember a time before the widespread use of the Internet and they will be the first to practice in a largely e-health environment. This article explores concepts of digital professionalism and their place in contemporary medical education, and proposes a series of principles of digital professionalism to guide teaching, learning and practice in the healthcare professions. Despite the many risks and fears surrounding their use, digital media are not an intrinsic threat to medical professionalism. Professionals should maintain the capacity for deliberate, ethical, and accountable practice when using digital media. The authors describe a digital professionalism framework structured around concepts of proficiency, reputation, and responsibility. Digital professionalism can be integrated into medical education using strategies based on awareness, alignment, assessment, and accountability. These principles of digital professionalism provide a way for medical students and medical practitioners to embrace the positive aspects of digital media use while being mindful and deliberate in its use to avoid or minimize any negative consequences.

  7. Radiographic film digitizing devices

    International Nuclear Information System (INIS)

    McFee, W.H.

    1988-01-01

    Until recently, all film digitizing devices for use with teleradiology or picture archiving and communication systems used a video camera to capture an image of the radiograph for subsequent digitization. The development of film digitizers that use a laser beam to scan the film represents a significant advancement in digital technology, resulting in improved image quality compared with video scanners. This paper discusses differences in resolution, efficiency, reliability, and the cost between these two types of devices. The results of a modified receiver operating characteristic comparison study of a video scanner and a laser scanner manufactured by the same company are also discussed

  8. Interoperability of Web Archives and Digital Libraries

    DEFF Research Database (Denmark)

    Kalb, Hendrik; Lazaridou, Paraskevi; Pinsent, Edward

    2013-01-01

    The interoperability of web archives and digital libraries is crucial to avoid silos of preserved data and content. While various researches focus on specfic facets of the challenge to interoperate, there is a lack of empirical work about the overall situation of actual challenges. We conduct...

  9. Digital Photography--a Question of Ethics.

    Science.gov (United States)

    Meltzer, Bonnie

    1996-01-01

    Discusses reasons for computer manipulation of photographs and the need to educate students about the ethics involving digital scanning. Focuses on ownership, copyrights, reasons for changing a photograph, reader-interpretation, and the context in which the photograph is used. Suggests a photo illustration project to teach students about these…

  10. Fractal Image Coding with Digital Watermarks

    Directory of Open Access Journals (Sweden)

    Z. Klenovicova

    2000-12-01

    Full Text Available In this paper are presented some results of implementation of digitalwatermarking methods into image coding based on fractal principles. Thepaper focuses on two possible approaches of embedding digitalwatermarks into fractal code of images - embedding digital watermarksinto parameters for position of similar blocks and coefficients ofblock similarity. Both algorithms were analyzed and verified on grayscale static images.

  11. Teacher Professional Development through Digital Content Evaluation

    Science.gov (United States)

    Xie, Kui; Kim, Min Kyu; Cheng, Sheng-Lun; Luthy, Nicole C.

    2017-01-01

    In this study, researchers designed and implemented a 1-year professional development (PD) program that focused on supporting teachers in evaluating and selecting digital learning contents. Participants in this investigation included 109 teachers who consented to the study amongst a total of 171 teachers from five school districts across central…

  12. Emerging Collaborative Writing Strategies in Digital Environments

    DEFF Research Database (Denmark)

    Sørensen, Birgitte Holm; Levinsen, Karin Ellen Tweddell

    2015-01-01

    This paper focuses on students’ collaborative writing processes, with technology as a non-human actor. The paper is based on an ongoing research project, Students’ digital production and students as learning designers (2013–2015), fundedby the Danish Ministry of Education. The project concerns...

  13. Digital Literacy and Metaphorical Models

    Directory of Open Access Journals (Sweden)

    Carolina Girón García

    2014-09-01

    Full Text Available It is an acknowledged fact that the appearance of new genres in cyberspace has shifted the main focus of instruction strategies nowadays. Learners of any field are challenged by the acquisition of a new type of literacy, digital literacy –how to read and write, or how to interact, in and through the Internet. In this line, websites often show expressions like "home", "visit", "down-load", "link", etc. which are used in a new sense that did not exist before the digital era. Such expressions constitute the manifestation of mental models that have been transferred from traditional conceptual domains onto the new knowledge domain of the Internet. These conceptual metaphors are some of the cognitive models that help in the conceptualization of new cybergenres. This paper points at describing how these cognitive models build our notion of diverse cybergenres in English – e.g. the weblog, the social network, the cybertask. Our aim here consists in detecting these metaphorical models as well as describing and classifying their conceptual mappings between domains. With that purpose, some digital materials are analyzed, so as to test the hypothesis that such mappings and models guide the user's representation of the genre, as a coherent structure.

  14. the impact of digital technology revolution on surveying curriculum ...

    African Journals Online (AJOL)

    the impact of digital technology revolution on surveying curriculum review in ... Global Journal of Environmental Sciences ... Also, it focuses on the need to review the current surveying curriculum to meet the technological advancement. Finally ...

  15. Enhanced digital library system that supports sustainable knowledge

    African Journals Online (AJOL)

    Enhanced digital library system that supports sustainable knowledge: A focus ... This research work provides a Web-Based University library, ability to access the ... and generates pins to authorize bonafide students and staff of the University.

  16. New techniques in digital holography

    CERN Document Server

    Picart, Pascal

    2015-01-01

    A state of the art presentation of important advances in the field of digital holography, detailing advances related to fundamentals of digital holography, in-line holography applied to fluid mechanics, digital color holography, digital holographic microscopy, infrared holography, special techniques in full field vibrometry and inverse problems in digital holography

  17. Digital Human Modeling

    Science.gov (United States)

    Dischinger, H. Charles, Jr.

    2017-01-01

    The development of models to represent human characteristics and behaviors in human factors is broad and general. The term "model" can refer to any metaphor to represent any aspect of the human; it is generally used in research to mean a mathematical tool for the simulation (often in software, which makes the simulation digital) of some aspect of human performance and for the prediction of future outcomes. This section is restricted to the application of human models in physical design, e.g., in human factors engineering. This design effort is typically human interface design, and the digital models used are anthropometric. That is, they are visual models that are the physical shape of humans and that have the capabilities and constraints of humans of a selected population. They are distinct from the avatars used in the entertainment industry (movies, video games, and the like) in precisely that regard: as models, they are created through the application of data on humans, and they are used to predict human response; body stresses workspaces. DHM enable iterative evaluation of a large number of concepts and support rapid analysis, as compared with use of physical mockups. They can be used to evaluate feasibility of escape of a suited astronaut from a damaged vehicle, before launch or after an abort (England, et al., 2012). Throughout most of human spaceflight, little attention has been paid to worksite design for ground workers. As a result of repeated damage to the Space Shuttle which adversely affected flight safety, DHM analyses of ground assembly and maintenance have been developed over the last five years for the design of new flight systems (Stambolian, 2012, Dischinger and Dunn Jackson, 2014). The intent of these analyses is to assure the design supports the work of the ground crew personnel and thereby protect the launch vehicle. They help the analyst address basic human factors engineering questions: can a worker reach the task site from the work platform

  18. A handbook of digital library economics operations, collections and services

    CERN Document Server

    Baker, David P

    2013-01-01

    This book provides a companion volume to Digital Library Economics and focuses on the 'how to' of managing digital collections and services (of all types) with regard to their financing and financial management. The emphasis is on case studies and practical examples drawn from a wide variety of contexts. A Handbook of Digital Library Economics is a practical manual for those involved - or expecting to be involved - in the development and management of digital libraries.provides practical approach to the subjectfocuses on the challenges associated with the economic and financial aspects of digi

  19. The focus factor

    DEFF Research Database (Denmark)

    Nicolaisen, Jeppe; Frandsen, Tove Faber

    2015-01-01

    Introduction. We present a new bibliometric indicator to measure journal specialisation over time, named the focus factor. This new indicator is based on bibliographic coupling and counts the percentage of re-citations given in subsequent years. Method. The applicability of the new indicator....... To validate re-citations as caused by specialisation, other possible causes were measured and correlated (obsolescence, journal self-citations and number of references). Results. The results indicate that the focus factor is capable of distinguishing between general and specialised journals and thus...... effectively measures the intended phenomenon (i.e., journal specialisation). Only weak correlations were found between journal re-citations and obsolescence, journal self-citations, and number of references. Conclusions. The focus factor successfully measures journal specialisation over time. Measures based...

  20. Decontamination & decommissioning focus area

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-08-01

    In January 1994, the US Department of Energy Office of Environmental Management (DOE EM) formally introduced its new approach to managing DOE`s environmental research and technology development activities. The goal of the new approach is to conduct research and development in critical areas of interest to DOE, utilizing the best talent in the Department and in the national science community. To facilitate this solutions-oriented approach, the Office of Science and Technology (EM-50, formerly the Office of Technology Development) formed five Focus AReas to stimulate the required basic research, development, and demonstration efforts to seek new, innovative cleanup methods. In February 1995, EM-50 selected the DOE Morgantown Energy Technology Center (METC) to lead implementation of one of these Focus Areas: the Decontamination and Decommissioning (D & D) Focus Area.

  1. Academic Medical Centers as digital health catalysts.

    Science.gov (United States)

    DePasse, Jacqueline W; Chen, Connie E; Sawyer, Aenor; Jethwani, Kamal; Sim, Ida

    2014-09-01

    Emerging digital technologies offer enormous potential to improve quality, reduce cost, and increase patient-centeredness in healthcare. Academic Medical Centers (AMCs) play a key role in advancing medical care through cutting-edge medical research, yet traditional models for invention, validation and commercialization at AMCs have been designed around biomedical initiatives, and are less well suited for new digital health technologies. Recently, two large bi-coastal Academic Medical Centers, the University of California, San Francisco (UCSF) through the Center for Digital Health Innovation (CDHI) and Partners Healthcare through the Center for Connected Health (CCH) have launched centers focused on digital health innovation. These centers show great promise but are also subject to significant financial, organizational, and visionary challenges. We explore these AMC initiatives, which share the following characteristics: a focus on academic research methodology; integration of digital technology in educational programming; evolving models to support "clinician innovators"; strategic academic-industry collaboration and emergence of novel revenue models. Copyright © 2014 Elsevier Inc. All rights reserved.

  2. Digital repeat analysis; setup and operation.

    Science.gov (United States)

    Nol, J; Isouard, G; Mirecki, J

    2006-06-01

    Since the emergence of digital imaging, there have been questions about the necessity of continuing reject analysis programs in imaging departments to evaluate performance and quality. As a marketing strategy, most suppliers of digital technology focus on the supremacy of the technology and its ability to reduce the number of repeats, resulting in less radiation doses given to patients and increased productivity in the department. On the other hand, quality assurance radiographers and radiologists believe that repeats are mainly related to positioning skills, and repeat analysis is the main tool to plan training needs to up-skill radiographers. A comparative study between conventional and digital imaging was undertaken to compare outcomes and evaluate the need for reject analysis. However, digital technology still being at its early development stages, setting a credible reject analysis program became the major task of the study. It took the department, with the help of the suppliers of the computed radiography reader and the picture archiving and communication system, over 2 years of software enhancement to build a reliable digital repeat analysis system. The results were supportive of both philosophies; the number of repeats as a result of exposure factors was reduced dramatically; however, the percentage of repeats as a result of positioning skills was slightly on the increase for the simple reason that some rejects in the conventional system qualifying for both exposure and positioning errors were classified as exposure error. The ability of digitally adjusting dark or light images reclassified some of those images as positioning errors.

  3. Digital amnesia and the future tourist

    Directory of Open Access Journals (Sweden)

    Chris Greenwood

    2017-04-01

    Full Text Available Purpose – The purpose of this paper is to examine the phenomenon of digital amnesia and its influence on the future tourist. Design/methodology/approach – A trend paper based on environmental scanning and speculative future analysis. Findings – The phenomena of digital amnesia are established. The growth of digital platforms and the consumer’s reliance is exponential. The implications for the future tourist in terms of decision making, the influence of marketing messaging and potentially the recall and reimagining of authentic experience will be significant in the future. Practical implications – Subject to the signals of change, should consumer’s reliance on digital platforms for the storing of information and memories continue to grow this has implications on how tourism businesses engage with their customers, influence and inform their marketing and how destinations would be reimagined based on the recall of their visitors. Originality/value – The trend of digital amnesia is an established and well-documented phenomenon. The development of the trend to consider the implications for the future tourism industry based a growing dependence on digital platforms is the focus of this paper.

  4. Digital Labour in Chinese Internet Industries

    Directory of Open Access Journals (Sweden)

    Bingqing Xia

    2014-09-01

    Full Text Available Digital labour has been the subject of considerable research in recent years (Van Dijck 2009, Manzerolle 2010, Dyer-Witheford 2010. But relatively little research has considered professional workers in digital media. This research addresses this gap by focusing on professional workers in the Chinese Internet industries. This paper asks: How are these digital labourers involved in the digital media production? To what extent should we criticise this involvement? Based on detailed empirical research in China, I argue that the rapid growth of the Internet industries depends on exploiting these Internet workers, such as the workers in Chinese Internet industries—the new ‘sweatshop’ of the digital era. Chinese Internet workers have been subsumed in the global capitalist system as the new ‘sweatshop workers’. This paper shows that Chinese Internet workers suffer very poor working conditions, and argues that these working conditions are the result of exploitation, a concept explored via using Eric Olin Wright’s schema. This paper also argues that most of the Chinese Internet workers are in the lower middle-class class position, in which they are exploited by the upper classes. Their working conditions have seriously deteriorated and they are victims of inequality and injustice—although they also are able to exercise agency and resistance. This paper therefore calls urgent attention to the working conditions of these digital labourers.

  5. Digital temperature meter

    Energy Technology Data Exchange (ETDEWEB)

    Glowacki, S

    1982-01-01

    Digital temperature meter for precise temperature measurements is presented. Its parts such as thermostat, voltage-frequency converter and digital frequency meter are described. Its technical parameters such as temperature range 50degC-700degC, measurement precision 1degC, measurement error +-1degC are given. (A.S.).

  6. Changing State Digital Libraries

    Science.gov (United States)

    Pappas, Marjorie L.

    2006-01-01

    Research has shown that state virtual or digital libraries are evolving into websites that are loaded with free resources, subscription databases, and instructional tools. In this article, the author explores these evolving libraries based on the following questions: (1) How user-friendly are the state digital libraries?; (2) How do state digital…

  7. Digital signage sobre IP

    OpenAIRE

    Casademont Filella, Albert

    2012-01-01

    Projecte que versa sobre el disseny i la implementació d'un sistema de Digital Signage (Cartelleria Digital) sobre IP, creant un gestor que permeti controlar de forma remota tot un conjunt de petits dispositius connectats a pantalles que emeten continguts multimèdia com vídeos, imatges, feeds rss...

  8. The First Digit 1

    Indian Academy of Sciences (India)

    IAS Admin

    1075. RESONANCE | December 2013. GENERAL | ARTICLE. Table 2. The first digits distri- bution according to Benford's law. First Frequency. Digit. 1. 30.1 %. 2. 17.6 %. 3. 12.4 %. 4. 9.7 %. 5. 7.9 %. 6. 6.7 %. 7. 5.8 %. 8. 5.1 %. 9. 4.5 % ...

  9. Digital Cultural Heritage

    NARCIS (Netherlands)

    Navarrete, T.; Rizzo, I.; Mignosa, A.

    2013-01-01

    What is the impact of media technology on the supply and demand of heritage with what is usually described as digitization? This chapter presents the concept of digitization as concerning far more than just the introduction of computers, the development of databases and websites, and the conversion

  10. Digital formidling af kulturarv

    DEFF Research Database (Denmark)

    En af tidens store kulturelle dagsordner drejer sig om digital tilgængeliggørelse af kulturarv. Fortidens spor dukker op i nye former på nettet - næsten alle kulturinstitutioner arbejder med, og befolkningen har fået helt nye muligheder for at se med og deltage. Digital formidling af kulturarv...

  11. Digitizing migration heritage

    DEFF Research Database (Denmark)

    Marselis, Randi

    2011-01-01

    Museums are increasingly digitizing their collections and making them available to the public on-line. Creating such digital resources may become means for social inclusion. For museums that acknowledge migration history and cultures of ethnic minority groups as important subjects in multiethnic...

  12. Navigate the Digital Rapids

    Science.gov (United States)

    Lindsay, Julie; Davis, Vicki

    2010-01-01

    How can teachers teach digital citizenship when the digital landscape is changing so rapidly? How can teachers teach proper online social interactions when the students are outside their classroom and thus outside their control? Will encouraging students to engage in global collaborative environments land teachers in hot water? These are the…

  13. Monetizing Digital Assets

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2013-04-01

    Full Text Available This article covers the options the digital content creators have to monetize their creations. The simplest solution seems to be the winning one, so by enabling the ads, the digital content may be quickly transformed into money with no cost.

  14. Digital chest radiography

    DEFF Research Database (Denmark)

    Debess, Jeanne Elisabeth; Johnsen, Karen Kirstine; Thomsen, Henrik

    on collimation and dose reduction in digital chest radiography Methods and Materials A retrospective study of digital chest radiography is performed to evaluate the primary x-ray tube collimation of the PA and lateral radiographs. Data from one hundred fifty self-reliant female patients between 15 and 55 years...

  15. Recurrent infantile digital fibromatosis

    African Journals Online (AJOL)

    We present a case of an 8-year-old-boy with recurrent infantile digital fibromatosis (IDF) who presented with new ... Keywords: fibrous tumors, inclusion body fibromatosis, infantile digital fibromatosis, spindle cells, Reye tumor .... watch-and-wait strategy for patients with histologically confirmed IDF nodules that do not cause ...

  16. Practical digital mammography

    Energy Technology Data Exchange (ETDEWEB)

    Hashimoto, Beverly E. [Washington Univ., Seattle, WA (United States)]|[Virginia Mason Medical Center, VA (United States)

    2008-07-01

    This book is meant for the radiologist who is facing the challenge of organizing a digital mammographic imaging center. This text is meant to be a practical book that provides information about digital mammographic physics and equipment which will allow one to intelligently compare technologies and systems. Some of the major challenges include: large expense; rapidly changing technology, and inconsistent connectivity; and finally, need for strong information technology support. The initial conversion cost to digital mammographic imaging is relatively expensive due to the cost of digital mammography hardware, software, and storage. Virtually all other imaging modalities are being converted to purely digital storage and transfer, and the digital trend in mammography is inevitable. Technical advantages of digital mammography are described. However, the improved flexibility in image display and transfer are some of its strongest features. In conclusion, although there are increasing imaging modalities that may be used to evaluate breast disease, mammography will continue to play a key role in detecting breast cancer. To be an effective imager, the radiologist should become familiar with digital mammography and understand its role within the increasing complex structure of breast imaging techniques.

  17. Practical digital mammography

    International Nuclear Information System (INIS)

    Hashimoto, Beverly E.

    2008-01-01

    This book is meant for the radiologist who is facing the challenge of organizing a digital mammographic imaging center. This text is meant to be a practical book that provides information about digital mammographic physics and equipment which will allow one to intelligently compare technologies and systems. Some of the major challenges include: large expense; rapidly changing technology, and inconsistent connectivity; and finally, need for strong information technology support. The initial conversion cost to digital mammographic imaging is relatively expensive due to the cost of digital mammography hardware, software, and storage. Virtually all other imaging modalities are being converted to purely digital storage and transfer, and the digital trend in mammography is inevitable. Technical advantages of digital mammography are described. However, the improved flexibility in image display and transfer are some of its strongest features. In conclusion, although there are increasing imaging modalities that may be used to evaluate breast disease, mammography will continue to play a key role in detecting breast cancer. To be an effective imager, the radiologist should become familiar with digital mammography and understand its role within the increasing complex structure of breast imaging techniques

  18. Educating Digital Citizens

    Science.gov (United States)

    Tan, Thomas

    2011-01-01

    Digital citizenship is how educators, citizens, and parents can teach where the lines of cyber safety and ethics are in the interconnected online world their students will inhabit. Aside from keeping technology users safe, digital citizenship also prepares students to survive and thrive in an environment embedded with information, communication,…

  19. Digital Rights Management

    NARCIS (Netherlands)

    Koster, P.; Jonker, Willem; Blanken, Henk; de Vries, A.P.; Blok, H.E.; Feng, L.

    2007-01-01

    Digital Rights Management, or DRM for short, is a much-discussed topic nowadays. The main reason for this is that DRM technology is often mentioned in the context of protection of digital audio and video content, for example to avoid large scale copying of CDs and DVDs via peer-to-peer networks in

  20. Collective focusing ion accelerator

    International Nuclear Information System (INIS)

    Goldin, F.J.

    1986-01-01

    The principal subject of this dissertation is the trapping confinement of pure electron plasmas in bumpy toroidal magnetic fields, with particular attention given to the trapping procedure and the behavior of the plasma during the final equilibrium. The most important aspects of the equilibrium studied were the qualitative nature of the plasma configuration and motion and its density, distribution and stability. The motivation for this study was that an unneutralized cloud of electrons contained in a toroidal system, sufficiently dense and stable, may serve to electrostatically focus ions (against centrifugal and self space charge forces) in a cyclic ion accelerator. Such an accelerator, known as a Collective Focusing Ion Accelerator (CFIA) could be far smaller than conventional designs (which use external magnetic fields directly to focus the ions) due to the smaller gyro-radium of an electron in a magnetic field of given strength. The electron cloud generally drifted poloidally at a finite radius from the toroidal minor axis. As this would preclude focusing ions with such clouds, damping this motion was investigated. Finite resistance in the normally perfectly conductive vessel wall did this. In further preparation for a working CFIA, additional experiments studied the effect of ions on the stability of the electron cloud

  1. Plasma focus project

    International Nuclear Information System (INIS)

    Sahlin, H.L.

    1975-12-01

    The primary objective of this project is to provide a relatively simple pulsed power source for high density pulsed fusion studies with a variety of DT and other fusion microexplosion targets. The plasma focus operated on DT at 1 MJ should produce greater than or equal to 10 15 DT neutrons per pulse corresponding to 2800 J of nuclear energy release and for low pressure operation and appropriately configured high Z anode center should yield an x-ray burst of about 1000 J with a substantial fraction of this x-ray energy concentrated in the 5-100 kV range. Because of its x-ray and neutron production potential, the operation of the focus as an x-ray source is also under study and an initial design study for a repetitively pulsed 1 MJ plasma focus as a pulsed neutron materials testing source has been completed. The plasma focus seems particularly appropriate for application as a materials testing source for pulsed fusion reactors, for example, based on laser driven fusion microexplosions. The construction status of the device is described

  2. High Res at High Speed: Automated Delivery of High-Resolution Images from Digital Library Collections

    Science.gov (United States)

    Westbrook, R. Niccole; Watkins, Sean

    2012-01-01

    As primary source materials in the library are digitized and made available online, the focus of related library services is shifting to include new and innovative methods of digital delivery via social media, digital storytelling, and community-based and consortial image repositories. Most images on the Web are not of sufficient quality for most…

  3. [Application of three-dimensional digital technology in the diagnosis and treatment planning in orthodontics].

    Science.gov (United States)

    Bai, Y X

    2016-06-01

    Three-dimensional(3D)digital technology has been widely used in the field of orthodontics in clinical examination, diagnosis, treatment and curative effect evaluation. 3D digital technology greatly improves the accuracy of diagnosis and treatment, and provides effective means for personalized orthodontic treatment. This review focuses on the application of 3D digital technology in the field of orthodontics.

  4. Predicting Digital Informal Learning: An Empirical Study among Chinese University Students

    Science.gov (United States)

    He, Tao; Zhu, Chang; Questier, Frederik

    2018-01-01

    Although the adoption of digital technology has gained considerable attention in higher education, currently research mainly focuses on implementation in formal learning contexts. Investigating what factors influence students' digital informal learning is still unclear and limited. To understand better university students' digital informal…

  5. Collaborative Digital Games as Mediation Tool to Foster Intercultural Integration in Primary Dutch Schools

    NARCIS (Netherlands)

    de la Hera Conde-Pumpido, T.|info:eu-repo/dai/nl/331869063; Paz Aléncar, Amanda

    2015-01-01

    The use of digital games has found to be an effective tool to reinforce teaching/learning practices. Several studies have already shown the benefits of the use of digital games in educational contexts. However, most of these studies are focused on how digital games can be used as a mediation tool in

  6. Empowering vocational math teachers by using digital learning material (DLM) with workplace assignments

    NARCIS (Netherlands)

    Zwart, D.P.; van Luit, J.E.H.; Goei, S. L.

    2016-01-01

    Digital Learning Material (DLM) are fast becoming a key instrument in teaching. The focus on E-learning systems with Digital Learning Material (DLM) is mostly on the medium and resources, instead of on the role of teachers. But like students, teachers also need to professionalize their digital

  7. Digital Storytelling as Arts-Inspired Inquiry for Engaging, Understanding, and Supporting Indigenous Youth

    Science.gov (United States)

    Eglinton, Kristen Ali; Gubrium, Aline; Wexler, Lisa

    2017-01-01

    In this paper we examine digital storytelling as a mode of arts-inspired inquiry: in particular we consider digital storytelling as a powerful arts-inspired approach that can help researchers, practitioners, and communities understand and support indigenous and marginalized youth. Our two-fold focus is on: (1) a digital storytelling initiative…

  8. Digitalization of daycare institutions

    DEFF Research Database (Denmark)

    Chimirri, Niklas Alexander

    in the intergenerational interaction with as well as the intragenerational interaction among daycare children. To some extent, digital media usage, foremost of tablet computers, has seen a discursive and material normalization across a number Danish daycare institutions before at all clarifying how it could be rendered...... as on situated sociomaterial approaches to critical psychological practice research in order to inquire into possible specificities of digital media device usage: How is this usage similar to and different from interacting via other material-communicative devices in a pedagogical practice? How do digital media......The digitalization of Danish daycare institutions is not only affecting the ways staff is documenting and reporting on its pedagogical work. It also appears to be redefining what pedagogical work itself is about, given the drastic increase in deployment of digital (mobile) media devices...

  9. Creative Digital Media Practices

    DEFF Research Database (Denmark)

    Frølunde, Lisbeth

    , 2006, 2009), machinima (machine + cinema + anime, real-time animation captured in games etc.), and the digital storytelling movement. A dialogic perspective on the diversity of digital media practices opens up for understanding the complex evolution of language on socio-historical, cultural......The presentation reviews the interplay of dialogic (Bakhtin, 1981) and multimodal theories on media production practices, with attention to visual communication (Kress and van Leeuwen, 2001, 2006). This theoretical approach aids in reflecting on digital media practices as novel (new) sign systems...... develop a collaborative digital storytelling showcase for their own digital stories about Roskilde University. This course is intended to bring up reflections on the wider phenomenon of contemporary media practices, such as: YouTube, DIY (do-it-yourself) filmmaking or homemade, garage cinema (Jenkins...

  10. Transformation of Digital Ecosystems

    DEFF Research Database (Denmark)

    Henningsson, Stefan; Hedman, Jonas

    2014-01-01

    the Digital Ecosystem Technology Transformation (DETT) framework for explaining technology-based transformation of digital ecosystems by integrating theories of business and technology ecosystems. The framework depicts ecosystem transformation as distributed and emergent from micro-, meso-, and macro- level......In digital ecosystems, the fusion relation between business and technology means that the decision of technical compatibility of the offering is also the decision of how to position the firm relative to the coopetive relations that characterize business ecosystems. In this article we develop...... coopetition. The DETT framework consists an alternative to the existing explanations of digital ecosystem transformation as the rational management of one central actor balancing ecosystem tensions. We illustrate the use of the framework by a case study of transformation in the digital payment ecosystem...

  11. The digital spine

    DEFF Research Database (Denmark)

    Ebbesen, Toke Riis

    2019-01-01

    In the words of the Oxford English Dictionary, a book is 'a portable volume consisting of a series of written, printed, or illustrated pages bound together for ease of reading' (‘book, n.’nd). Yet, the world of books isn’t what it used to be. If differences between media are material differences...... analyze books as digital or even 'post-digital' artifacts (Cramer 2014), while preserving the material dimension of the book artifact. In other words: is there is such a thing as a (post-)digital spine, and how can it be described? This article outlines an answer to this question within an inferential...... (Seiter 2015), and books are produced, distributed and read on various digital media and devices, it is no longer possible to understand digital books on the basis of the material and syntactical features of the codex artifact. It then becomes important to discuss how to conceptualize and subsequently...

  12. Digital Tectonic Tools

    DEFF Research Database (Denmark)

    Schmidt, Anne Marie Due

    2005-01-01

    Tectonics has been an inherent part of the architectural field since the Greek temples while the digital media is new to the field. This paper is built on the assumption that in the intermediate zone between the two there is a lot to be learned about architecture in general and the digital media...... in particular. A model of the aspects in the term tectonics – epresentation, ontology and culture – will be presented and used to discuss the current digital tools’ ability in tectonics. Furthermore it will be discussed what a digital tectonic tool is and could be and how a connection between the digital...... and tectonic could become a part of the architectural education....

  13. Focusing over Optical Fiber Using Time Reversal

    DEFF Research Database (Denmark)

    Piels, Molly; Porto da Silva, Edson; Estaran Tolosa, Jose Manuel

    2015-01-01

    A time-reversal array in multimode fiber is proposed for lossless remotely controlled switching using passive optical splitters. The signal to be transmitted is digitally pre-distorted so that it is routed through the physical layer in order to arrive at only one receiver in an array. System...... performance in the presence of additive white gaussian noise, modal group delay, and timing error is investigated numerically for single-mode and 10-mode fiber. Focusing using a two-transmitter array and 44 km of single- mode fiber is demonstrated experimentally for 3 GBd QPSK signals with a bit error rate...

  14. Digital forensic standards: international progress

    CSIR Research Space (South Africa)

    Grobler, MM

    2010-05-01

    Full Text Available With the explosion of digital crime, digital forensics is more often applied. The digital forensic discipline developed rather rapidly, but up to date very little international standardization with regard to processes, procedures or management has...

  15. Computing Logarithms Digit-by-Digit

    Science.gov (United States)

    Goldberg, Mayer

    2005-01-01

    In this work, we present an algorithm for computing logarithms of positive real numbers, that bears structural resemblance to the elementary school algorithm of long division. Using this algorithm, we can compute successive digits of a logarithm using a 4-operation pocket calculator. The algorithm makes no use of Taylor series or calculus, but…

  16. Principles of synchronous digital hierarchy

    CERN Document Server

    Jain, Rajesh Kumar

    2012-01-01

    The book presents the current standards of digital multiplexing, called synchronous digital hierarchy, including analog multiplexing technologies. It is aimed at telecommunication professionals who want to develop an understanding of digital multiplexing and synchronous digital hierarchy in particular and the functioning of practical telecommunication systems in general. The text includes all relevant fundamentals and provides a handy reference for problem solving or defining operations and maintenance strategies. The author covers digital conversion and TDM principles, line coding and digital

  17. Implementing digital preservation in repositories: Knowledge and practices

    Directory of Open Access Journals (Sweden)

    Caterina Groposo Pavão

    2016-09-01

    Full Text Available Digital preservation has to be undertaken by institutional repositories, which are responsible for the preservation of the scientific output from academic institutions. However, due to the constant evolution of the field, to gain domain knowledge and recognise best practices is a complex task for people responsible for digital preservation in those institutions. Digital preservation research, practices and solutions address specific problems, such as formats, curation, reference models, authenticity, policies and preservation plans, tools, etc., while stakeholders need an integrated, contextualized and applicable overview. This paper focuses on the implementation of digital preservation in repositories, from the perspective of the team responsible for the project, regarding the necessary knowledge and best practices. Initially, it defines and contextualizes digital preservation repositories. The following section presents a conceptual model of digital preservation, synthesized from conceptual models developed in influential projects in the field, which allows us to identify the domain knowledge in digital preservation. Finally, aspects represented in the model are discussed in the light of the performance of teams implementing digital preservation repositories. It provides recommendations, guides and examples that may be useful for the implementation of digital preservation. It points to the need to strengthen the relationship between domain knowledge in digital preservation repositories with practices developed in numerous projects developed worldwide.

  18. Research on Digital Product Modeling Key Technologies of Digital Manufacturing

    Institute of Scientific and Technical Information of China (English)

    DING Guoping; ZHOU Zude; HU Yefa; ZHAO Liang

    2006-01-01

    With the globalization and diversification of the market and the rapid development of Information Technology (IT) and Artificial Intelligence (AI), the digital revolution of manufacturing is coming. One of the key technologies in digital manufacturing is product digital modeling. This paper firstly analyzes the information and features of the product digital model during each stage in the product whole lifecycle, then researches on the three critical technologies of digital modeling in digital manufacturing-product modeling, standard for the exchange of product model data and digital product data management. And the potential signification of the product digital model during the process of digital manufacturing is concluded-product digital model integrates primary features of each stage during the product whole lifecycle based on graphic features, applies STEP as data exchange mechanism, and establishes PDM system to manage the large amount, complicated and dynamic product data to implement the product digital model data exchange, sharing and integration.

  19. Classical Music, liveness and digital technologies

    DEFF Research Database (Denmark)

    Steijn, Arthur

    2014-01-01

    . This article uses the suggestion of Philip Auslander to rethink the relationship between the mediatized and live format in order to use digital technologies to enrich and develop the live performance as a starting position. On the background of an ongoing EU funded interregional project, a series...... of interrelated design experiments are presented which all share the ambition of integration digital technologies in life performances of classical music. A particular focus is put on the ongoing development of a design concept where interactive audio and visual experiences in an underground metro station shall...

  20. Developing Digital Technologies for Undergraduate University Mathematics

    DEFF Research Database (Denmark)

    Triantafyllou, Eva; Timcenko, Olga

    2013-01-01

    Our research effort presented in this paper relates with developing digital tools for mathematics education at undergraduate university level. It focuses specifically on studies where mathematics is not a core subject but it is very important in order to cope with core subjects. For our design, we...... requirements for the development of digital tools that support mathematics teaching and learning at university level....... during lectures and exercise time. During these observations we were able to investigate how the applets were used in practice but also to get insight in the challenges that the students face during mathematics learning. These findings together with student feedback inspire the next round of design...