WorldWideScience

Sample records for hide availability type

  1. A method for removing adobe-type manure from hides using an oxidizing agent

    Science.gov (United States)

    Adobe-type (hardened) manure attached to bovine hair is a major source of meat contamination, hide quality deterioration, and devalued leather products. Therefore, it is important to develop cleaning solutions that can rapidly remove adobe-type manure to improve the quality of hides delivered to tan...

  2. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    Science.gov (United States)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Ding, Qing-Yan; Zhang, Shu-Hui

    2016-06-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. Supported by the National Natural Science Foundation of China under Grant Nos. 61572297, 61303199, 61272514, and 61373131, the Shandong Provincial Natural Science Foundation of China under Grant Nos. ZR2013FM025, ZR2013FQ001, ZR2014FM003, and ZY2015YL018, the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China under Grant Nos. BS2015DX006 and BS2014DX007, the National Development Foundation for Cryptological Research, China under Grant No. MMJJ201401012, the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Funds, and the Shandong Academy of Sciences Youth Fund Project, China under Grant Nos. 2015QN003 and 2013QN007

  3. Reversible Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Dhananjay Yadav

    2012-03-01

    Full Text Available Reversible data hiding is a technique that is used to hide data inside an image. The data is hidden in such a way that the exact or original data is not visible. The hidden data can be retrieved as and when required. There are several methods that are used in reversible data hiding techniques like Watermarking, Lossless embedding and encryption. In this paper we present a review of reversible watermarking techniques and show different methods that are used to get reversible data hiding technique with higher embedding capacity and invisible objects. Watermark need not be hidden. Watermarking can be applied to 1. Images, 2. Text, 3. Audio/video, 4. Software.

  4. An Internal Data Non-hiding Type Real-time Kernel and its Application to the Mechatronics Controller

    Science.gov (United States)

    Yoshida, Toshio

    For the mechatronics equipment controller that controls robots and machine tools, high-speed motion control processing is essential. The software system of the controller like other embedded systems is composed of three layers software such as real-time kernel layer, middleware layer, and application software layer on the dedicated hardware. The application layer in the top layer is composed of many numbers of tasks, and application function of the system is realized by the cooperation between these tasks. In this paper we propose an internal data non-hiding type real-time kernel in which customizing the task control is possible only by change in the program code of the task side without any changes in the program code of real-time kernel. It is necessary to reduce the overhead caused by the real-time kernel task control for the speed-up of the motion control of the mechatronics equipment. For this, customizing the task control function is needed. We developed internal data non-cryptic type real-time kernel ZRK to evaluate this method, and applied to the control of the multi system automatic lathe. The effect of the speed-up of the task cooperation processing was able to be confirmed by combined task control processing on the task side program code using an internal data non-hiding type real-time kernel ZRK.

  5. The significance of anisotropic signals hiding in the type Ia supernovae

    CERN Document Server

    Lin, Hai-Nan; Chang, Zhe

    2016-01-01

    We use two different methods, i.e., dipole-fitting (DF) and hemisphere comparison (HC), to search for the anisotropic signals hiding in the Union2.1 data set. We find that the directions of maximum matter density derived using these two methods are about $114^{\\circ}$ away from each other. We construct four Union2.1-like mock samples to test the statistical significance of these two methods. It is shown that DF method is statistically significant, while HC method is strongly biased by the distribution of data points in the sky. Then we assume that the anisotropy of distance modulus is mainly induced by the anisotropy of matter density, which is modeled to be the dipole form $\\Omega_M=\\Omega_{M0}(1-\\cos\\theta)$. We fit our model to Union2.1, and find that the direction of maximum matter density is well consistent with the direction derived using DF method, but it is very different from the direction previously claimed. Monte Carlo simulations show that our method is statistically more significant than HC metho...

  6. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  7. EFFICIENT METHOD FOR HIDING DATA BY PIXEL INTENSITY

    Directory of Open Access Journals (Sweden)

    M.Shobana

    2013-02-01

    Full Text Available Data communication substructure has become more universal that there is absolutely no favoritism between different types of data in the carry plane of communication with each and every one skilled to carry it through the public data networks. Steganography technique is used to hide or embed data into an image or audio or video. Here the cover object used is an image. In the existing method for hiding and extraction of information from the given image three kinds of algorithm are used, based on its data and index channel of an image. In the proposed system, three kinds of hiding technique are implemented with some modifications in the logic level. Third algorithm is designed using color channels, based on its intensity. This technique would boost up the number of bits embedding in the image. The accomplishment of all the three algorithms are analyzed and the efficient one is taken into consideration while implementing in FPGA.

  8. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  9. Linear and Nonlinear Oblivious Data Hiding

    Directory of Open Access Journals (Sweden)

    Akansu Ali N

    2004-01-01

    Full Text Available The majority of the existing data hiding schemes are based on the direct-sequence (DS modulation where a low-power random sequence is embedded into the original cover signal to represent hidden information. In this paper, we investigate linear and nonlinear modulation approaches in digital data hiding. One typical DS modulation algorithm is explored and its optimal oblivious detector is derived. The results expose its poor cover noise suppression as the hiding signature signal always has much lower energy than the cover signal. A simple nonlinear algorithm, called set partitioning, is proposed and its performance is analyzed. Analysis and simulation studies further demonstrate improvements over the existing schemes.

  10. Video Steganography: Text Hiding In Video By LSB Substitution

    Directory of Open Access Journals (Sweden)

    Kamred Udham Singh

    2014-05-01

    Full Text Available The development of high speed computer networks and Internet has increased the easiness of Information Communication. In contrast with Analog media and Digital media provide several different advantages such as high quality, simple editing, high loyalty copying and authenticity. But in the field of data communication this type of development has increased the fear of sneaking the data while sending data from the sender to the receiver. Due to this reason Information Security is main problem of Data Communication. Steganography plays an important role in field of Information Security. Video and images are very common choice for hiding data. It is very important for effective and successful embedding process to select appropriate pixels in the video frames, which are used to store the secret data. We use video based Steganography because of large size and memory requirements. Hiding information in a carrier file we use least significant bit (LSB insertion technique. In Least significant bit (LSB insertion technique, for hiding information we change LSB of video file with the information bits .This paper will focus on hiding information in specific frames of the video and in specific position of the frame by LSB substitution.

  11. Hiding Information under Speech

    Science.gov (United States)

    2005-12-12

    as it arrives in real time, and it disappears as fast as it arrives. Furthermore, our cognitive process for translating audio sounds to the meaning... steganography , whose goal is to make the embedded data completely undetectable. In addi- tion, we must dismiss the idea of hiding data by using any...therefore, an image has more room to hide data; and (2) speech steganography has not led to many money-making commercial businesses. For these two

  12. HIDE: HI Data Emulator

    Science.gov (United States)

    Akeret, Joel; Seehars, Sebastian; Chang, Chihway; Monstein, Christian; Amara, Adam; Refregier, Alexandre

    2016-07-01

    HIDE (HI Data Emulator) forward-models the process of collecting astronomical radio signals in a single dish radio telescope instrument and outputs pixel-level time-ordered-data. Written in Python, HIDE models the noise and RFI modeling of the data and with its companion code SEEK (ascl:1607.020) provides end-to-end simulation and processing of radio survey data.

  13. Data Hiding in JPEG Images

    Directory of Open Access Journals (Sweden)

    Sushil Kumar

    2009-07-01

    Full Text Available Steganography has been an important subject since peoplestarted communicating in writing. Steganography meanshiding a secret message (the embedded messagewithin a larger one (source cover in such a way that anobserver cannot detect the presence of contents of thehidden message. Today the growth in the informationtechnology, especially in computer networks such asInternet, Mobile communication, and Digital Multimediaapplications such as Digital camera, handset video etc. hasopened new opportunities in scientific and commercialapplications. But this progress has also led to many seriousproblems such as hacking, duplications and malevolentusage of digital information. Steganography finds its role inattempt to address these growing concerns. We know that,with the use of steganographic techniques, it is possible tohide information within digital audio, images and video fileswhich is perceptually and statistically undetectable. Themethod of embedding secret message (which can be plaintext, cipher text, or even images is usually based onreplacing bits of useless or unused data in the source cover(can be audio files, sound, text, Disk space, hidden partition,network packets, digital images, software, or circuitry.There are two common methods of embedding: Spatialembedding in which messages are inserted into the LSBs ofimage pixels, and Transform embedding in which a messageis embedded by modifying frequency coefficients of thecover image (result is called the stego-image.Transformembedding methods are found to be in general more robustthan the Spatial embedding methods which are susceptibleto image-processing type of attacks. However with respectto steganography robustness is not a critical property but theperceptibility (i.e., whether the source cover is distorted byembedding information to a visually unacceptable level.There is another important issue of steganography, namely,capacity, i.e., how much information can be embeddedrelative to its

  14. Hiding dependence-discovery of F-hiding laws and system laws

    Institute of Scientific and Technical Information of China (English)

    Zhou Houyong; Huang Shunliang; Shi Kaiquan

    2009-01-01

    Function one direction S-rough sets have dynamic characteristics and law characteristics. By using the function one direction S-rough sets, this article presents the concepts of the f-hiding law, F-hiding law, f-hiding law dependence and F-hiding law dependence. Based on the concepts above, this article proposes the hiding-dependence theorem of f-hiding laws, the hiding-dependence theorem of F-hiding laws, the hiding-dependence separation theorem, the hiding dependencs-discovery principle of unknown laws. Finally, the application of the hiding dependence of hiding laws in the discovery of system laws is given.

  15. Reversible Data Hiding Based on DNA Computing

    Directory of Open Access Journals (Sweden)

    Bin Wang

    2017-01-01

    Full Text Available Biocomputing, especially DNA, computing has got great development. It is widely used in information security. In this paper, a novel algorithm of reversible data hiding based on DNA computing is proposed. Inspired by the algorithm of histogram modification, which is a classical algorithm for reversible data hiding, we combine it with DNA computing to realize this algorithm based on biological technology. Compared with previous results, our experimental results have significantly improved the ER (Embedding Rate. Furthermore, some PSNR (peak signal-to-noise ratios of test images are also improved. Experimental results show that it is suitable for protecting the copyright of cover image in DNA-based information security.

  16. Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures

    CERN Document Server

    Mazurczyk, Wojciech; Zander, Sebastian; Houmansadr, Amir; Szczypiorski, Krzysztof

    2016-01-01

    Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background. Information Hiding In Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures begins with introducing data concealment methods and their evolution. Chapter two discusses the existing terminology and describes the model for hidden communication and related communication scenarios. Chapters three to five present the main classes of information hiding in communication networks accompanied by a discussion of their robustness and undetectability. The book concludes with a discussion of potential countermeasures against information hiding techniques, which includes different types of mechanisms for the detection, limitation and prevention of covert co munication channels.

  17. Selective Redundancy Removal: A Framework for Data Hiding

    Directory of Open Access Journals (Sweden)

    Ugo Fiore

    2010-02-01

    Full Text Available Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs. Such redundancy may be removed by means of optimization software. Redundancy removal, if applied selectively, enables information hiding. This work introduces Selective Redundancy Removal (SRR as a framework for hiding data. An example application of the framework is given in terms of hiding information in HTML documents. Non-uniformity across documents may raise alarms. Nevertheless, selective application of optimization techniques might be due to the legitimate use of optimization software not supporting all the optimization methods, or configured to not use all of them.

  18. An Approach to Hide Secret Speech Information

    Institute of Scientific and Technical Information of China (English)

    WU Zhi-jun; DUAN Hai-xin; LI Xing

    2006-01-01

    This paper presented an approach to hide secret speech information in code excited linear prediction(CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information hiding and extracting for the purpose of secure speech communication. The secret speech is coded in 2.4Kb/s mixed excitation linear prediction (MELP), which is embedded in CELP type public speech. The ABS algorithm adopts speech synthesizer in speech coder. Speech embedding and coding are synchronous, i.e. a fusion of speech information data of public and secret. The experiment of embedding 2.4 Kb/s MELP secret speech in G.728 scheme coded public speech transmitted via public switched telephone network (PSTN) shows that the proposed approach satisfies the requirements of information hiding, meets the secure communication speech quality constraints, and achieves high hiding capacity of average 3.2 Kb/s with an excellent speech quality and complicating speakers' recognition.

  19. Hide receives the Bowie Medal

    Science.gov (United States)

    Dickey, Jean O.; Hide, Raymond

    The 1997 William Bowie Medal, given by AGU for outstanding contributions to fundamental geophysics and for unselfish cooperation in research, was presented to Raymond Hide at the AGU Spring Meeting Honor Ceremony on May 28 in Baltimore. The award citation and Hide's response are given here.

  20. 14 CFR 198.5 - Types of insurance coverage available.

    Science.gov (United States)

    2010-01-01

    ... (CONTINUED) WAR RISK INSURANCE AVIATION INSURANCE § 198.5 Types of insurance coverage available. Application may be made for insurance against loss or damage to the following persons, property, or interests: (a... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Types of insurance coverage available....

  1. Multimedia Data Hiding and Authentication via Halftoning and Coordinate Projection

    Directory of Open Access Journals (Sweden)

    Wu Chai Wah

    2002-01-01

    Full Text Available We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is demonstrated. The image authentication scheme is based on the data hiding scheme and can detect, localize, and repair the tampered area of the image. Furthermore, the self-repairing feature of the authentication scheme has a hologram-like quality; any portion of the image can be used to reconstruct the entire image, with a greater quality of reconstruction as the portion size increases.

  2. Hide and New in the Pi-Calculus

    Directory of Open Access Journals (Sweden)

    Marco Giunti

    2012-08-01

    Full Text Available In this paper, we enrich the pi-calculus with an operator for confidentiality (hide, whose main effect is to restrict the access to the object of the communication, thus representing confidentiality in a natural way. The hide operator is meant for local communication, and it differs from new in that it forbids the extrusion of the name and hence has a static scope. Consequently, a communication channel in the scope of a hide can be implemented as a dedicated channel, and it is more secure than one in the scope of a new. To emphasize the difference, we introduce a spy context that represents a side-channel attack and breaks some of the standard security equations for new. To formally reason on the security guarantees provided by the hide construct, we introduce an observational theory and establish stronger equivalences by relying on a proof technique based on bisimulation semantics.

  3. A Data-reversible Hiding Algorithm in WSNs

    Directory of Open Access Journals (Sweden)

    Jia CHEN

    2013-09-01

    Full Text Available In view of the phenomenon that data-hiding algorithm is easy to be detected by inspecting tool SPAM when carrying information, random insertion and histogram modification are adapted in the data hiding. A data-reversible hiding algorithm in WSNs is put forward. By collecting and referring sub-graph, calculating data fusion algorithm that can protect the data’s completion and privacy and analyzing the reversible hiding data algorithm research, the inspection of SPAM. Finally MATLAB7.0 exploitation is adopted to stimulate the analysis of experiment. The result shows that compared with Kim algorithm, the algorithm is safer to prevent the SPAM inspection and is more suitable for information transfer.

  4. Pre-slaughter, slaughter and post-slaughter defects of skins and hides at the Sheba Tannery and Leather Industry, Tigray region, northern Ethiopia

    Directory of Open Access Journals (Sweden)

    Tesfay Kahsay

    2015-02-01

    Full Text Available Skins and hides are perishable resources that can be damaged by parasitic diseases and human error, which result in downgrading or rejection. This study was conducted to identify defect types and to determine their prevalence in pickled sheep and wet blue goat skins and wet blue hides. Each selected skin or hide was examined for defects in natural light and the defects were graded according to established quality criteria in Ethiopian standard manuals. Major defects were captured by digital photography. The major pre-slaughter defects included scratches (64.2%, cockle (ekek (32.8%, wounds or scars (12.6%, lesions from pox or lumpy skin disease (6.1%, poor substance (5%, branding marks (2.3% and tick bites (1.5%. The presence of grain scratches in wet blue hides (76.3% was significantly higher than in pickled sheep (67.2% and wet blue goat (59.1% skins. The major slaughter defects included flay cuts or scores, holes, poor pattern and vein marks, with a higher occurrence in wet blue goat skins (28.7%; P < 0.001 than in wet blue hides (22.8% and pickled sheep skins (11.1%. The most prevalent postslaughter defects were grain cracks (14.9%, hide beetle damage (8%, damage caused by heat or putrefaction (3.7% and machine-induced defects (0.5%. Grain cracks (27.04% and hide beetle damage (13.9% in wet blue goat skins were significantly more common than in wet blue hides and pickled sheep skins. These defects cause depreciation in the value of the hides and skins. Statistically significant (P < 0.001 higher rejection rates were recorded for wet blue hides (82.9% than for pickled sheep skins (18.3% and wet blue goat skins (8.5%. Improved animal health service delivery, effective disease control strategies and strong collaboration between stakeholders are suggested to enhance the quality of skins and hides.

  5. A Study of Various Steganographic Techniques Used for Information Hiding

    Directory of Open Access Journals (Sweden)

    C.P.Sumathi

    2013-12-01

    Full Text Available The art of information hiding has received much att ention in the recent years as security of informati on has become a big concern in this internet era. As shari ng of sensitive information via a common communicat ion channel has become inevitable, Steganography – the art and science of hiding information has gained much attention. We are also surrounded by a world of secret communi cation, where people of all types are transmitting information as innocent as an encrypte d credit card number to an online-store and as insidious as a terrorist plot to hijackers. Stegano graphy derives from the Greek word steganos, meanin g covered or secret, and graphy (writing or drawing [1]. Steganography is a technology where modern da ta compression, information theory, spread spectrum, a nd cryptography technologies are brought together t o satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various tec hniques used in steganography and to identify areas in which thi s technique can be applied, so that the human race can be benefited at large

  6. Information Hiding Techniques: A Tutorial Review

    CERN Document Server

    Thampi, Sabu M

    2008-01-01

    The purpose of this tutorial is to present an overview of various information hiding techniques. A brief history of steganography is provided along with techniques that were used to hide information. Text, image and audio based information hiding techniques are discussed. This paper also provides a basic introduction to digital watermarking.

  7. A Lossless Data Hiding Technique based on AES-DWT

    Directory of Open Access Journals (Sweden)

    Gustavo Fernandaacute;ndez Torres2

    2012-09-01

    Full Text Available In this paper we propose a new data hiding technique. The new technique uses steganography and cryptography on images with a size of 256x256 pixels and an 8-bit grayscale format. There are design restrictions such as a fixed-size cover image, and reconstruction without error of the hidden image. The steganography technique uses a Haar-DWT (Discrete Wavelet Transform with hard thresholding and LSB (Less Significant Bit technique on the cover image. The algorithms used for compressing and ciphering the secret image are lossless JPG and AES, respectively. The proposed technique is used to generate a stego image which provides a double type of security that is robust against attacks. Results are reported for different thresholds levels in terms of PSNR.

  8. Alkali-free method of hide preparation for tanning

    Directory of Open Access Journals (Sweden)

    V. Valeika

    2012-06-01

    Full Text Available Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming up to strongly acid (pickling. This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. During both processes, unhairing and oxidative treatment, the opening of the derma structure occurs: 13.3-14.6g of non-collagen proteins are removed and amount of dermatan sulphate decreases by 35%. The hide obtained can be chromed directly after the above processes and subsequent treatment with sodium chloride solution omitted conventional pickling. The pH of the hide varies in the range of 8.3-3.7 during the processes of preparation for tanning.

  9. Hiding image to video: A new approach of LSB replacement

    Directory of Open Access Journals (Sweden)

    Saurabh Singh,

    2010-12-01

    Full Text Available Steganography has become great area of interest for researchers as need for secure transaction of information is increasing day by day. Information may be text, image, audio or video. Steganography is a technique in which required information is hided in any other information such that the second information does not change significantly and it appears the same as original. This paper presents a novel approach of hiding image in a video. The proposed algorithm is replacing one LSB of each pixel in video frames. It becomes very difficult for intruder to guess that an image is hidden in the video as individual frames are very difficult to analyze in a video running at 30 frames per second. The process of analysis has been made more difficult by hiding each row of image pixels in multiple frames of the video, so intruder cannot even try to unhide image until he get full video.

  10. Hide And Seek GPS And Geocaching In The Classroom

    Science.gov (United States)

    Lary, Lynn M.

    2004-01-01

    In short, geocaching is a high-tech, worldwide treasure hunt (geocaches can now be found in more than 180 countries) where a person hides a cache for others to find. Generally, the cache is some type of waterproof container that contains a log book and an assortment of goodies, such as lottery tickets, toys, photo books for cachers to fill with…

  11. PALM and STORM: what hides beyond the Rayleigh limit?

    CSIR Research Space (South Africa)

    Henriques, R

    2009-06-01

    Full Text Available -1 Biotechnol. J. 2009, 4, 846?857 Review PALM and STORM: What hides beyond the Rayleigh limit? Ricardo Henriques1 and Musa M. Mhlanga1,2 1 Gene Expression and Biophysics Unit, Instituto de Medicina Molecular, Faculdade de Medicina Universidade de...

  12. A Block Based Adaptive Video Data Hiding Method Using Forbidden Zone Data Hiding

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2013-01-01

    -Data hiding is a process of embedding information into some sort of host media. Especially video data hiding has become an important research topic as it is complex when compared data hiding process in other media. This paper proposes a new method based on erasure correction capability of RA codes...... using forbidden zone data hiding. This method finds suitable host signals that are useful for data hiding. The proposed method also overcomes the problems of frame drop and inserts attacks. The simulation results reveal that this video data hiding framework can be used in data hiding applications...... of the real world. Key Words – RA codes, selective embedding, watermarking, forbidden zone data hiding, simulation, selective embedding, erasure handling, block partitioning...

  13. A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement

    Directory of Open Access Journals (Sweden)

    Khushboo Lapa Patwari

    2016-09-01

    Full Text Available In present world demand of high quality images, security of the information on internet is one of the most important issues of research. Data hiding is a method of hiding a useful information by embedding it on another image (cover image to provide security and only the authorize person is able to extract the original information from the embedding data. This paper is a review which describes several different algorithms for Reversible Data Hiding (RDH. Previous literature has shown that histogram modification, histogram equalization (HE and interpolation are the most common methods for data hiding. To improve security these methods are used in encrypted images. This paper is a comprehensive study of all the major reversible data hiding approaches implemented as found in the literature.

  14. 9 CFR 350.3 - Types and availability of service.

    Science.gov (United States)

    2010-01-01

    ....3 Section 350.3 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF... product must be sound, wholesome and fit for human food. The service will be available only on premises... service will be available for products moved in tank cars and tank trucks from an official establishment...

  15. 15 CFR 296.3 - Types of assistance available.

    Science.gov (United States)

    2010-01-01

    ... § 296.4, assistance under this part is available to eligible companies or joint ventures that request... total of $3,000,000 over a total of 3 years. (b) Joint venture awards: No award given to a joint...

  16. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  17. DCT Based Secret Image Hiding In Video Sequence

    Directory of Open Access Journals (Sweden)

    M. Suresh Kumar

    2014-08-01

    Full Text Available Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave. As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.

  18. Near Reversible Data Hiding Scheme for images using DCT

    Directory of Open Access Journals (Sweden)

    T. Bhaskar

    2015-11-01

    Full Text Available Certain level of modifications to the original content can be acceptable. These schemes are called nearreversible. It has emerging application in remote sensing. In remote sensing application the image is captured while monitoring the damaged regions in the natural disasters such as tsunami, volcanic eruption, etc. Instead of more alterations to the pixels or coefficients here we go for less alterations , low hiding capacity and complexity that exhibit while reversible data hiding. There exist a few near reversible hiding schemes which address the limitations to the triangular trade-off that exists between capacity, robustness and visual quality characteristics. However, for achieving better vision of image, there is a need for near reversible data hiding schemes. Therefore, the traditional metric PSNR are not sufficient to assess the distorted image when the data is embedded in image for assessing the better visual quality of the image with hidden data we present a HVS based metrics like PSNR-HVS, MSSIM. Using DCT evaluates the overall image quality

  19. Video Data Hiding for Managing Privacy Information in Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Hail MichaelW

    2009-01-01

    Full Text Available From copyright protection to error concealment, video data hiding has found usage in a great number of applications. In this work, we introduce the detailed framework of using data hiding for privacy information preservation in a video surveillance environment. To protect the privacy of individuals in a surveillance video, the images of selected individuals need to be erased, blurred, or re-rendered. Such video modifications, however, destroy the authenticity of the surveillance video. We propose a new rate-distortion-based compression-domain video data hiding algorithm for the purpose of storing that privacy information. Using this algorithm, we can safeguard the original video as we can reverse the modification process if proper authorization can be established. The proposed data hiding algorithm embeds the privacy information in optimal locations that minimize the perceptual distortion and bandwidth expansion due to the embedding of privacy data in the compressed domain. Both reversible and irreversible embedding techniques are considered within the proposed framework and extensive experiments are performed to demonstrate the effectiveness of the techniques.

  20. Economic assessment and pathogenic bacteria inhibition of bovine hide presoaking solutions formulated with enzymes that can remove adobe-type manure

    Science.gov (United States)

    The presoaking formulations that have recently been developed are effective in removing the damaging adobe type bovine manure and eco-friendly because the ingredients used are recycled and required only a quarter of the amount of biocide and surfactant that the industry is commonly using. The goal ...

  1. Sensitive plant (Mimosa pudica hiding time depends on individual and state

    Directory of Open Access Journals (Sweden)

    Sarah Reed-Guy

    2017-07-01

    Full Text Available The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  2. Sensitive plant (Mimosa pudica) hiding time depends on individual and state.

    Science.gov (United States)

    Reed-Guy, Sarah; Gehris, Connor; Shi, Meng; Blumstein, Daniel T

    2017-01-01

    The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  3. Recent Advances in Information Hiding and Applications

    CERN Document Server

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao

    2013-01-01

    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  4. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Directory of Open Access Journals (Sweden)

    Andreas Wilke

    Full Text Available Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  5. Hiding Information into Palette-Based Image

    Institute of Scientific and Technical Information of China (English)

    WU Hong-tao; ZHU Bo-cheng; YANG Yi-xian

    2005-01-01

    After pointing out the weakness of the known palette-based image information hiding by palette matrix,a new spacial effective robust information hiding algorithm is proposed,which can resist the operation of ‘select all’,‘copy’,‘paste’ from cover to original,and can resist gently modification the palette matrix,and can resist the image format changed between true color image and palette-based image.The hiding capacity can reach 25% of the number of pixel index matrix.Due to the advisement of information hiding security an update algorithm is proposed at the end of the paper,with the capacity reduced and vision effect increased.

  6. 'Medical Tattoos' Help Hide Surgical Scars

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_161132.html 'Medical Tattoos' Help Hide Surgical Scars Pigments can restore more ... scars from cancer surgeries may benefit from "medical tattoos" that can help restore some of the skin's ...

  7. Motivation to hide emotion and children's understanding of the distinction between real and apparent emotions.

    Science.gov (United States)

    Gosselin, Pierre; Warren, Madeleine; Diotte, Michèle

    2002-12-01

    The authors investigated the extent to which children's understanding of the distinction between real and apparent emotions varied according to the motivation to hide emotions. Children, aged 6-7 and 10-11 years, were read stories designed to elicit either prosocial or self-protective motivated display rules and were asked to predict the facial expressions the protagonists would make to hide felt emotions. Children were found to understand the distinction between real and apparent emotions very well, independently of the type of motivation. Contrary to predictions, boys understood this distinction better than did girls when the motivation to hide positive emotions was prosocial. Children perceived neutralization as the most appropriate strategy to hide felt emotions, followed by masking.

  8. A NEW APPROACH FOR HIDING DATA USING B-BOX

    Directory of Open Access Journals (Sweden)

    Dr. Saad Abdual azize AL_ani

    2013-11-01

    Full Text Available Digital Images and video encryption play an important role in today’s multimedia world. Many encryption schemes have been proposed to provide a security for digital images. This paper designs an efficient cryptosystem for video. Our method can achieve two goals; the first goal is to design a height security for hiding a data in video, the second goal is to design a computational complexity cryptosystem.

  9. Hiding robot inertia using resonance.

    Science.gov (United States)

    Vallery, Heike; Duschau-Wicke, Alexander; Riener, Robert

    2010-01-01

    To enable compliant training modes with a rehabilitation robot, an important prerequisite is that any undesired human-robot interaction forces caused by robot dynamics must be avoided, either by an appropriate mechanical design or by compensating control strategies. Our recently proposed control scheme of "Generalized Elasticities" employs potential fields to compensate for robot dynamics, including inertia, beyond what can be done using closed-loop force control. In this paper, we give a simple mechanical equivalent using the example of the gait rehabilitation robot Lokomat. The robot consists of an exoskeleton that is attached to a frame around the patient's pelvis. This frame is suspended by a springloaded parallelogram structure. The mechanism allows vertical displacement while providing almost constant robot gravity compensation. However, inertia of the device when the patient's pelvis moves up and down remains a source of large interaction forces, which are reflected in increased ground reaction forces. Here, we investigate an alternative suspension: To hide not only gravity, but also robot inertia during vertical pelvis motion, we suspend the robot frame by a stiff linear spring that allows the robot to oscillate vertically at an eigenfrequency close to the natural gait frequency. This mechanism reduces human-robot interaction forces, which is demonstrated in pilot experimental results.

  10. Fully Traversable Wormholes Hiding Charge

    CERN Document Server

    Guendelman, Eduardo

    2012-01-01

    The charge-hiding effect by a wormhole, which was studied for the case where gravity/gauge-field system is self-consistently interacting with a charged lightlike brane (LLB) as a matter source, is now studied for the case of a time like brane. From the demand that no surfaces of infinite coordinate time redshift appear in the problem we are lead now to a completly traversable wormhole space, according to not only the traveller that goes through the wormhole (as was the case for the LLB), but also to a static external observer, this requires negative surface energy density for the shell sitting at the throat of the wormhole. We study a gauge field subsystem which is of a special non-linear form containing a square-root of the Maxwell term and which previously has been shown to produce a QCD-like confining gauge field dynamics in flat space-time. The condition of finite energy of the system or asymptotic flatness on one side of the wormhole implies that the charged object sitting at the wormhole throat expels a...

  11. Steganographic Techniques of Data Hiding Using Digital Images (Review Paper

    Directory of Open Access Journals (Sweden)

    Babloo Saha

    2012-01-01

    Full Text Available Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography’s goal is to hide the very existence of embedded data so as not to arouse an eavesdropper’s suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance. applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains. It covers and integrates recent research work without going in to much detail of steganalysis, which is the art and science of defeating steganography.Defence Science Journal, 2012, 62(1, pp.11-18, DOI:http://dx.doi.org/10.14429/dsj.62.1436

  12. Unitary embedding for data hiding with the SVD

    Science.gov (United States)

    Bergman, Clifford; Davidson, Jennifer

    2005-03-01

    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  13. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

    Directory of Open Access Journals (Sweden)

    Keita Emura

    2014-01-01

    Full Text Available If there are many displaced workers in a company, then a person who goes for job hunting might not select this company. That is, the number of members who quit is quite negative information. Similarly, in revocable group signature schemes, if one knows (or guesses the number of revoked users (say r, then one may guess the reason behind such circumstances, and it may lead to harmful rumors. However, no previous revocation procedure can achieve hiding r. In this paper, we propose the first revocable group signature scheme, where r is kept hidden, which we call r-hiding revocable group signature. To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.

  14. INDICATOR AND PATHOGENIC MICROORGANISMS CONTAMINATION OF HIDE OF CATTLE PRESENTED TO FOR SLAUGHTER AND CONTAMINATION OF THE RESULTANT CARCASSES

    Directory of Open Access Journals (Sweden)

    G. Liuzzo

    2011-01-01

    Full Text Available Foodborne pathogens including Escherichia coli O157:H7, Salmonella spp. and Campylobacter spp., can enter the meat chain at multiple points. Animals with excessively dirty hides will represent a risk of cross-contaminations during transport, in the slaughtered house environment and during dressing procedures. The aim of this work was to investigate the relationship among hygiene indicator microorganisms (Enterobacteriaceae and Escherichia coli count, in hide and carcass of cattle presented for slaughter, and different hide cleanliness level in two abattoir (R and F and estimate the prevalence of pathogens Escherichia coli O157:H7, Salmonella spp and Campylobacter spp. in hide and carcass of dirty animals. The results showed that hide Escherichia coli and Enterobacteriaceae count were significantly higher in dirty animals than in clean animals (P<0,05, but carcass contamination were significantly higher in dirty animals than in clean animals only in R abattoir. Escherichia coli O 157:H7 was detected in 19 samples of hide (40,4%, and 2 samples of carcass. Campylobacter jejuni was isolated in 13 samples of hide (25,5% and one sample of carcass. Salmonella spp. were not found in all the samples of hide and carcass.

  15. High Capacity data hiding using LSB Steganography and Encryption

    Directory of Open Access Journals (Sweden)

    Shamim Ahmed Laskar

    2013-01-01

    Full Text Available The network provides a method of communication to distribute information to the masses. With the growthof data communication over computer network, the security of information has become a major issue.Steganography and cryptography are two different data hiding techniques. Steganography hides messagesinside some other digital media. Cryptography, on the other hand obscures the content of the message. Wepropose a high capacity data embedding approach by the combination of Steganography andcryptography. In the process a message is first encrypted using transposition cipher method and then theencrypted message is embedded inside an image using LSB insertion method. The combination of these twomethods will enhance the security of the data embedded. This combinational methodology will satisfy therequirements such as capacity, security and robustness for secure data transmission over an open channel.A comparative analysis is made to demonstrate the effectiveness of the proposed method by computingMean square error (MSE and Peak Signal to Noise Ratio (PSNR. We analyzed the data hiding techniqueusing the image performance parameters like Entropy, Mean and Standard Deviation. The stego imagesare tested by transmitting them and the embedded data are successfully extracted by the receiver. The mainobjective in this paper is to provide resistance against visual and statistical attacks as well as highcapacity.

  16. Hiding Data in Images Using New Random Technique

    Directory of Open Access Journals (Sweden)

    Obaida Mohammad Awad Al-Hazaimeh

    2012-07-01

    Full Text Available Steganography is the art of hiding the fact that communication is taking place by hiding information in other information. In the field of Data Communication, Steganography play a major role. The transmission of information via the Internet may expose it to detect and theft. Some solution to be discussed is how to passing information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. We focus on the Least Significant Bit (LSB technique which is the most common Steganographic technique is employed in this paper. An improvement to this technique is suggested by randomly inserting the bits of the message in the image to produce more secured system. In this paper, the security goals were enhanced via a proposed cryptosystems to maintain the security on the Cover-image. The proposed solution consists of a simple, but strong to hiding the text data and the human eye would be unable to notice the hidden data in the Stego-image.

  17. DNA-based cryptographic methods for data hiding in DNA media.

    Science.gov (United States)

    Marwan, Samiha; Shawish, Ahmed; Nagaty, Khaled

    2016-12-01

    Information security can be achieved using cryptography, steganography or a combination of them, where data is firstly encrypted using any of the available cryptography techniques and then hid into any hiding medium. Recently, the famous genomic DNA has been introduced as a hiding medium, known as DNA steganography, due to its notable ability to hide huge data sets with a high level of randomness and hence security. Despite the numerous cryptography techniques, to our knowledge only the vigenere cipher and the DNA-based playfair cipher have been combined with the DNA steganography, which keeps space for investigation of other techniques and coming up with new improvements. This paper presents a comprehensive analysis between the DNA-based playfair, vigenere, RSA and the AES ciphers, each combined with a DNA hiding technique. The conducted analysis reports the performance diversity of each combined technique in terms of security, speed, hiding capacity in addition to both key size and data size. Moreover, this paper proposes a modification of the current combined DNA-based playfair cipher technique, which makes it not only simple and fast but also provides a significantly higher hiding capacity and security. The conducted extensive experimental studies confirm such outstanding performance in comparison with all the discussed combined techniques. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  18. Book Review: No Place To Hide

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2007-03-01

    Full Text Available O'Harrow, R., Jr. (2006. No Place To Hide. New York: Free Press. 352 pages, ISBN: 0-7432-8705-3 (paper, US$26Reviewed by Gary C. Kessler (gary.kessler@champlain.eduPersonal privacy and the protection of personal identifying information are of concern to all of us. Innumerable articles and conferences address our loss of privacy, either through the sale of consumer databases or our own inattention. Opinions vary from "You have no privacy; get over it" to "This is the end of civil liberties as we know them." We teach people to safely maneuver on the Internet and minimize their exposure to bogus sites set up to steal their identity, warn users about the dangers of phishing and posting personal information on social network sites, use firewalls to protect our databases, and enact laws such as the Health Insurance Portability and Accountability Act (HIPAA and the Family Educational Rights and Privacy Act (FERPA to protect information.(see PDF for full review

  19. Steganography An Art of Hiding Data

    CERN Document Server

    Channalli, Shashikala

    2009-01-01

    In today's world the art of sending & displaying the hidden information especially in public places, has received more attention and faced many challenges. Therefore, different methods have been proposed so far for hiding information in different cover media. In this paper a method for hiding of information on the billboard display is presented. It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. In this paper we propose a new form of steganography, on-line hiding of information on the output screens of the instrument. This method can be used for announcing a secret message in public place. It can be extended to other means such as electronic advertising board around sports stadium, railway station or airport. This method of steganography is very similar to image steganography and video steganography. Pr...

  20. Short term preservation of hide using vacuum: influence on properties of hide and of processed leather.

    Science.gov (United States)

    Gudro, Ilze; Valeika, Virgilijus; Sirvaitytė, Justa

    2014-01-01

    The objective of this work was to investigate vacuum influence on hide preservation time and how it affects hide structure. It was established that vacuum prolongs the storage time without hide tissue putrefaction up to 21 days when the storage temperature is 4°C. The microorganisms act for all storage times, but the action is weak and has no observable influence on the quality of hide during the time period mentioned. The hide shrinkage temperature decrease is negligible, which shows that breaking of intermolecular bonds does not occur. Optical microscopy, infrared spectroscopy and differential scanning calorimetry also did not show any structural changes which can influence the quality of leather produced from such hide. The qualitative indexes of wet blue processed under laboratory conditions and of leather produced during industrial trials are presented. Indexes such as chromium compounds exhaustion, content of chromium in leather, content of soluble matter in dichloromethane, strength properties, and shrinkage temperature were determined. Properties of the leather produced from vacuumed hide under industrial conditions conformed to the requirements of shoe upper leather.

  1. Preparation of biobased sponges from un-tanned hides

    Science.gov (United States)

    One of our research endeavors to address ongoing challenges faced by the U.S. hide and leather industries is to develop innovative uses and novel biobased products from hides to improve prospective markets and to secure a viable future for hides and leather industries. We had previously investigate...

  2. Hiding an Inconvenient Truth : Lies and Vagueness

    NARCIS (Netherlands)

    Serra Garcia, M.; van Damme, E.E.C.; Potters, J.J.M.

    2010-01-01

    When truth conflicts with e¢ ciency, can verbal communication destroy efficiency? Or are lies or vagueness used to hide inconvenient truths? We consider a sequential 2-player public good game in which the leader has private information about the value of the public good. This value can be low, high,

  3. Hiding levitating objects above a ground plane

    DEFF Research Database (Denmark)

    Zhang, Jingjing; Luo, Yu; Mortensen, Asger

    2010-01-01

    An approach to hiding objects levitating above a conducting sheet is suggested in this paper. The proposed device makes use of isotropic negative-refractive-index materials without extreme material parameters, and creates an illusion of a remote conducting sheet. Numerical simulations are perform...

  4. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  5. An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography

    CERN Document Server

    Mukhopadhyay, Debajyoti; Ghosh, Surjya; Biswas, Sudipto; Chakraborty, Poulami

    2011-01-01

    A crypto system can be used to encrypt messages sent between two communicating parties so that an eavesdropper who overhears the encrypted messages will not be able to decode them. The paper mainly concentrates on the method in which the substitution technique of steganography can been used to hide data in a 24-bit bitmap file. Popular audio hiding techniques based on methods of steganography is also discussed here.

  6. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Directory of Open Access Journals (Sweden)

    Sha Edwin Hsing-Mean

    2002-01-01

    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  7. Association Rule Hiding Techniques for Privacy Preserving Data Mining: A Study

    Directory of Open Access Journals (Sweden)

    Gayathiri P

    2015-12-01

    Full Text Available Association rule mining is an efficient data mining technique that recognizes the frequent items and associative rule based on a market basket data analysis for large set of transactional databases. The probability of most frequent data item occurrence of the transactional data items are calculated to present the associative rule that represents the habits of buying products of the customers in demand. Identifying associative rules of a transactional database in data mining may expose the confidentiality and privacy of an organization and individual. Privacy Preserving Data Mining (PPDM is a solution for privacy threats in data mining. This issue is solved using Association Rule Hiding (ARH techniques in Privacy Preserving Data Mining (PPDM. This research work on Association Rule Hiding technique in data mining performs the generation of sensitive association rules by the way of hiding based on the transactional data items. The property of hiding rules not the data makes the sensitive rule hiding process is a minimal side effects and higher data utility technique.

  8. Information Hiding Using Improper Frame Padding

    CERN Document Server

    Jankowski, Bartosz; Szczypiorski, Krzysztof

    2010-01-01

    Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors' best knowledge it is the first information hiding solution which represents interprotocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication. PadSteg utilizes ARP and TCP protocols together with an Etherleak vulnerability (improper Ethernet frame padding) to facilitate secret communication for hidden groups in LANs (Local Area Networks). Basing on real network traces we confirm that PadSteg is feasible in today's networks and we estimate what steganographic bandwidth is achievable while limiting the chance of disclosure. We also point at possible countermeasures against PadSteg.

  9. Estimation of Information Hiding Algorithms and Parameters

    Science.gov (United States)

    2007-02-21

    growing false positives. 15. SUBJECT TERMS Information hiding, reverse-engineering, steganography , steganalysis, watermarking 16. SECURITY...specialist in breaking a covert communication system given very little information. Since it is likely for steganography to be used on very large...multimedia files, e.g. audio and video, there are substantial issues to be addressed on the implementation end of such a system as well as the theoretical

  10. Pre-slaughter, slaughter and post-slaughter defects of skins and hides at the Sheba Tannery and Leather Industry, Tigray region, northern Ethiopia.

    Science.gov (United States)

    Kahsay, Tesfay; Negash, Guesh; Hagos, Yohannes; Hadush, Birhanu

    2015-08-21

    Skins and hides are perishable resources that can be damaged by parasitic diseases and human error, which result in downgrading or rejection. This study was conducted to identify defect types and to determine their prevalence in pickled sheep and wet blue goat skins and wet blue hides. Each selected skin or hide was examined for defects in natural light and the defects were graded according to established quality criteria in Ethiopian standard manuals. Major defects were captured by digital photography. The major pre-slaughter defects included scratches (64.2%), cockle (ekek) (32.8%), wounds or scars (12.6%), lesions from pox or lumpy skin disease (6.1%), poor substance (5%), branding marks (2.3%) and tick bites (1.5%). The presence of grain scratches in wet blue hides (76.3%) was significantly higher than in pickled sheep (67.2%) and wet blue goat (59.1%) skins. The major slaughter defects included flay cuts or scores, holes, poor pattern and vein marks, with a higher occurrence in wet blue goat skins (28.7%; P < 0.001) than in wet blue hides (22.8%) and pickled sheep skins (11.1%). The most prevalent postslaughter defects were grain cracks (14.9%), hide beetle damage (8%), damage caused by heat or putrefaction (3.7%) and machine-induced defects (0.5%). Grain cracks (27.04%) and hide beetle damage (13.9%) in wet blue goat skins were significantly more common than in wet blue hides and pickled sheep skins. These defects cause depreciation in the value of the hides and skins. Statistically significant (P < 0.001) higher rejection rates were recorded for wet blue hides (82.9%) than for pickled sheep skins (18.3%) and wet blue goat skins (8.5%). Improved animal health service delivery, effective disease control strategies and strong collaboration between stakeholders are suggested to enhance the quality of skins and hides.

  11. The study results steganography hiding messages in image files as vehicle security software

    Directory of Open Access Journals (Sweden)

    D. O. Navrotskyi

    2012-11-01

    Full Text Available Synergetics of steganographic and cryptographic encryption algorithms, which provide a solid security foundation, is presented in this paper. Hiding messages systems in spatial and frequency domain image are compared and studied by the author. The following questions: Compression scheme JPEG , JPEG – transformation structure, Practical recommendations for hiding data to image files, The method of least significant bits (spatial domain and the DCT coefficients values relative replacement method (frequency domain, Packing and unpacking the hidden message, Visual distortion image changing system parameters are considered.

  12. Reliable Transmission of Audio Streams in Lossy Channels Using Application Level Data Hiding

    Directory of Open Access Journals (Sweden)

    Parag Agarwal

    2008-12-01

    Full Text Available The paper improves the reliability of audio streams in a lossy channel. The mechanism groups audio data samples into source and carrier sets. The carrier set carry the information about the source set which is encoded using data hiding methodology - quantization index modulation. At the receiver side, a missing source data sample can be reconstructed using the carrier set and the remaining source set. Based on reliability constraints a hybrid design combining interleaving and data hiding is presented. Experiments show an improved reliability as compared to forward error correction and interleaving.

  13. Immunogenomics: Molecular hide and seek

    Directory of Open Access Journals (Sweden)

    Miretti Marcos M

    2006-01-01

    Full Text Available Abstract Similar to other classical science disciplines, immunology has been embracing novel technologies and approaches giving rise to specialised sub-disciplines such as immunogenetics and, more recently, immunogenomics, which, in many ways, is the genome-wide application of immunogenetic approaches. Here, recent progress in the understanding of the immune sub-genome will be reviewed, and the ways in which immunogenomic datasets consisting of genetic and epigenetic variation, linkage disequilibrium and recombination can be harnessed for disease association and evolutionary studies will be discussed. The discussion will focus on data available for the major histocompatibility complex and the leukocyte receptor complex, the two most polymorphic regions of the human immune sub-genome.

  14. 41 CFR 102-37.40 - What type of surplus property is available for donation?

    Science.gov (United States)

    2010-07-01

    ... property is available for donation? 102-37.40 Section 102-37.40 Public Contracts and Property Management... 37-DONATION OF SURPLUS PERSONAL PROPERTY General Provisions Donation Overview § 102-37.40 What type of surplus property is available for donation? All surplus property (including property held...

  15. Data Security by Preprocessing the Text with Secret Hiding

    Directory of Open Access Journals (Sweden)

    Ajit Singh

    2012-06-01

    Full Text Available With the advent of the Internet, an open forum, the massive increase in the data travel across networkmake an issue for secure transmission. Cryptography is the term that involves many encryption method to make data secure. But the transmission of the secure data is an intricate task. Steganography here comes with effect of transmission without revealing the secure data. The research paper provide the mechanism which enhance the security of data by using a crypto+stegano combination to increase the security level without knowing the fact that some secret data is sharing across networks. In the firstphase data is encrypted by manipulating the text using the ASCII codes and some random generated strings for the codes by taking some parameters. Steganography related to cryptography forms the basisfor many data hiding techniques. The data is encrypted using a proposed approach and then hide the message in random N images with the help of perfect hashing scheme which increase the security of the message before sending across the medium. Thus the sending and receiving of message will be safe and secure with an increased confidentiality.

  16. A Novel Image Data Hiding Scheme with Diamond Encoding

    Directory of Open Access Journals (Sweden)

    Wu Hsien-Chu

    2009-01-01

    Full Text Available A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The proposed method is the extension of the exploiting modification direction (EMD embedding scheme. First, the process of embedding partitions the cover image into nonoverlapping blocks of two consecutive pixels and transforms the secret messages to a series of -ary digits. For each block, the diamond encoding technique is applied to calculate the diamond characteristic value, and one secret -ary digit is concealed into the diamond characteristic value. The diamond characteristic value is modified to secret digit and it can be obtained by adjusting pixel values in a block. This scheme is designed in such a way that the distortion of each block after diamond encoding is never out of the embedding parameter , and the block capacity is equal to . The diamond encoding provides an easy way to produce a more perceptible result than those yielded by simple least-significant-bit substitution methods. The embedded secret data can be extracted without the original cover image. Experimental results have demonstrated that the proposed method is capable of hiding more secret data while keeping the stego-image quality degradation imperceptible.

  17. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  18. S-rough sets and the discovery of F-hiding knowledge

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Singular rough sets (S-rough sets) have three classes of forms: one-directional S-rough sets, dual of one-directional S-rough sets, and two-directional S-rough sets. Dynamic, hereditary, mnemonic, and hiding properties are the basic characteristics of S-rough sets. By using the S-rough sets, the concepts of f-hiding knowledge, F-hiding knowledge, hiding degree, and hiding dependence degree are given. Then, both the hiding theorem and the hiding dependence theorem of hiding knowledge are proposed. Finally, an application of hiding knowledge is discussed.

  19. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    Directory of Open Access Journals (Sweden)

    Novella Isabel S

    2003-06-01

    Full Text Available Abstract Background In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, RED, was found to avoid extinction and remain in the population for long periods of time. Since RED characterizes the past evolutionary history of the population, this observation was called quasispecies memory. While the quasispecies theory predicts the existence of these memory genomes, there is a disagreement between the expected and observed mutant frequency values. Therefore, the origin of quasispecies memory is not fully understood. Results We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry, the likely cause of fitness differences between wild type and RED mutants. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.. If the RED mutant is constantly recreated by mutations, then its frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases their fitness to the wild-type level. Moreover, even at low m.o.i. the equilibrium frequency of the mutant is higher than predicted by the standard quasispecies model, because a fraction of mutant virions generated from wild-type parents will also be encapsidated by wild-type protein. Conclusions Our model predicts that phenotypic hiding will strongly influence the population dynamics of viruses, particularly at high m.o.i., and will also have important effects on the mutation-selection balance at low m.o.i. The delay in mutant extinction and increase in mutant

  20. Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography

    CERN Document Server

    Sarmah, Dipti Kapoor

    2010-01-01

    Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptography techniques available; among them AES is one of the most powerful techniques. In Steganography we have various techniques in different domains like spatial domain, frequency domain etc. to hide the message. It is very difficult to detect hidden message in frequency domain and for this domain we use various transformations like DCT, FFT and Wavelets etc. In this project we are developing a system where we develop a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module. In Cryptography we are using AES algorithm to encrypt a message and a part of the message is hidden in DCT of an image; remaining part of the message is used to generate two secret keys which make this system highly secured. Keyword: Cryptography, Steganography, S...

  1. Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes

    Directory of Open Access Journals (Sweden)

    Divya Ann Luke

    2014-06-01

    Full Text Available The wireless networks are more sensitive to the Denial-of-Service (DoS attacks. The existing system is based on Spread Spectrum (SS. This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. The main attack present in the wireless network is the selective jamming attack. This type of attack mainly focuses a single node termed as target node. Attacker always tries to block the message sent by the target node. This leads to the Denial-of-Service attack. We are proposing a new method to prevent the selective jamming attack in an internalthreat model. A wormhole is used, which will generate an alarm to indicate the presence of jammer and sent IP address of jammer node to all other nodes in the network. Using a method called packet hiding, we can send message through the network even though a jammer is present. This method is based on the technique called Strong Hiding Commitment Scheme (SHCS. Here, the access point in a network region becomes the wormhole whenever it finds out any node that violates the rules in a particular network region. That node is then considered as a jammer node. The wormhole send s IP address of jammer to all other nodes. Wormhole then prevents the jamming activity of the jammer by encrypting the source ID of message along with the message packet.So that the jammer is unable to identify its target node and the source can forward its message safely through jammer node itself

  2. An efficient steganography method for hiding patient confidential information.

    Science.gov (United States)

    Al-Dmour, Hayat; Al-Ani, Ahmed; Nguyen, Hung

    2014-01-01

    This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI).

  3. 13 CFR 127.101 - What type of assistance is available under this part?

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What type of assistance is available under this part? 127.101 Section 127.101 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION WOMEN-OWNED SMALL BUSINESS FEDERAL CONTRACT ASSISTANCE PROCEDURES General Provisions §...

  4. 13 CFR 124.702 - What types of assistance are available through the 7(j) program?

    Science.gov (United States)

    2010-01-01

    ..., marketing, and operation of small business concerns; and (b) The identification and development of new... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What types of assistance are available through the 7(j) program? 124.702 Section 124.702 Business Credit and Assistance SMALL...

  5. [The availability of particular types of medical social care to persons of elderly and senile age].

    Science.gov (United States)

    Shigabutdinov, A F

    2012-01-01

    The article presents the results of sociological survey of respondents of elderly and senile age living with their families or in senior centers. The comparative analysis was applied to availability of particular types of medical social care of contingent of interest depending on place of its residence. The age and ability of self-support of respondents were taken into account.

  6. Minimax eigenvector decomposition for data hiding

    Science.gov (United States)

    Davidson, Jennifer

    2005-09-01

    Steganography is the study of hiding information within a covert channel in order to transmit a secret message. Any public media such as image data, audio data, or even file packets, can be used as a covert channel. This paper presents an embedding algorithm that hides a message in an image using a technique based on a nonlinear matrix transform called the minimax eigenvector decomposition (MED). The MED is a minimax algebra version of the well-known singular value decomposition (SVD). Minimax algebra is a matrix algebra based on the algebraic operations of maximum and addition, developed initially for use in operations research and extended later to represent a class of nonlinear image processing operations. The discrete mathematical morphology operations of dilation and erosion, for example, are contained within minimax algebra. The MED is much quicker to compute than the SVD and avoids the numerical computational issues of the SVD because the operations involved only integer addition, subtraction, and compare. We present the algorithm to embed data using the MED, show examples applied to image data, and discuss limitations and advantages as compared with another similar algorithm.

  7. Augmented Reality Marker Hiding with Texture Deformation.

    Science.gov (United States)

    Kawai, Norihiko; Sato, Tomokazu; Nakashima, Yuta; Yokoya, Naokazu

    2016-10-19

    Augmented reality (AR) marker hiding is a technique to visually remove AR markers in a real-time video stream. A conventional approach transforms a background image with a homography matrix calculated on the basis of a camera pose and overlays the transformed image on an AR marker region in a real-time frame, assuming that the AR marker is on a planar surface. However, this approach may cause discontinuities in textures around the boundary between the marker and its surrounding area when the planar surface assumption is not satisfied. This paper proposes a method for AR marker hiding without discontinuities around texture boundaries even under nonplanar background geometry without measuring it. For doing this, our method estimates the dense motion in the marker's background by analyzing the motion of sparse feature points around it, together with a smooth motion assumption, and deforms the background image according to it. Our experiments demonstrate the effectiveness of the proposed method in various environments with different background geometries and textures.

  8. Enhancement of LSB based Steganography for Hiding Image in Audio

    OpenAIRE

    Pradeep Kumar Singh; R.K.Aggrawal

    2010-01-01

    In this paper we will take an in-depth look on steganography by proposing a new method of Audio Steganography. Emphasize will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method for data hiding in audio.

  9. Analysis Of Aspects Of Messages Hiding In Text Environments

    Directory of Open Access Journals (Sweden)

    Afanasyeva Olesya

    2015-09-01

    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  10. Reversible Data Hiding In Encrypted Images Using Improved Encryption Technique

    Directory of Open Access Journals (Sweden)

    Balika J. Chelliah

    2015-11-01

    Full Text Available Recently more and more attention is paid to reversible data hiding (RDH in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content‟s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be some errors on data extraction and/or image restoration. In this paper we propose a different scheme which attains real reversibility by reserving room before encryption with a traditional RDH algorithm, and then encrypting the data and embedding the data in the encrypted image, which is encrypted using a new proposed algorithm. The proposed method can achieve real reversibility that is data extraction and image recoveries are free of any error.

  11. Reversible Data Hiding In Encrypted Images Using Improved Encryption Technique

    Directory of Open Access Journals (Sweden)

    Mr. Balika J. Chelliah

    2014-03-01

    Full Text Available Recently more and more attention is paid to reversible data hiding (RDH in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content‟s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be some errors on data extraction and/or image restoration. In this paper we propose a different scheme which attains real reversibility by reserving room before encryption with a traditional RDH algorithm, and then encrypting the data and embedding the data in the encrypted image, which is encrypted using a new proposed algorithm. The proposed method can achieve real reversibility that is data extraction and image recoveries are free of any error.

  12. A Security Enhanced Robust Steganography Algorithm for Data Hiding

    Directory of Open Access Journals (Sweden)

    Siddharth Singh

    2012-05-01

    Full Text Available In this paper, a new robust steganography algorithm based on discrete cosine transform (DCT, Arnold transform and chaotic system is proposed. The chaotic system is used to generate a random sequence to be used for spreading data in the middle frequency band DCT coefficient of the cover image. The security is further enhanced by scrambling the secret data using Arnold Cat map before embedding. The recovery process is blind. A series of experiments is conducted to prove the security and robustness of the proposed algorithm. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression, addition of noise, low pass filtering and cropping attacks as compared to other existing algorithms for data hiding in the DCT domain.

  13. Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

    Directory of Open Access Journals (Sweden)

    Alawi A. Al-Saggaf

    2013-04-01

    Full Text Available By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS, in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statistical hiding (the advisory gets almost no statistically advantages about the secret message. The efficiency of our scheme offers different security assurance, and the trusted third party is not involved in the exchange of commitment.The characteristic of our scheme makes it useful for biometrics systems. If the biometrics template is compromised, then there is no way to use it directly again even in secure biometrics systems. This paper combines biometrics and OFCS to achieve biometric protection scheme using smart cards with renewability of protected biometrics template property.

  14. Accountable Metadata-Hiding Escrow: A Group Signature Case Study

    Directory of Open Access Journals (Sweden)

    Kohlweiss Markulf

    2015-06-01

    Full Text Available A common approach to demands for lawful access to encrypted data is to allow a trusted third party (TTP to gain access to private data. However, there is no way to verify that this trust is well placed as the TTP may open all messages indiscriminately. Moreover, existing approaches do not scale well when, in addition to the content of the conversation, one wishes to hide one’s identity. Given the importance of metadata this is a major problem. We propose a new approach in which users can retroactively verify cryptographically whether they were wiretapped. As a case study, we propose a new signature scheme that can act as an accountable replacement for group signatures, accountable forward and backward tracing signatures.

  15. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  16. Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

    Directory of Open Access Journals (Sweden)

    Rhythm Katira

    2013-04-01

    Full Text Available The rise in the use of internet, secure transmission of the data has become an utmost priority. Steganography makes the data invisible by hiding it in the multimedia such as image, audio or video file and thereby covering for its existence. In this project we use prediction error (PE technique steganography and Least Significant Bit (LSB substitution method to hide data in the image. As we do PE expansion method it can lead to expansion of pixels like it can lead to pixel value above 255. In order to solve this problem, we restricted the pixel values between 15 and 240.The PSNR was high at low threshold values. The hiding capacity increased with increase in threshold with a reasonable decrease in PSNR. There was 2dB difference then other methods because of high data hiding capacity. Also we have used knight’s tour for increasing the security of data hidden. In comparison to other methodology, this methodology proves to be better and more effective.

  17. Secure Copier Which Allows Reuse Copied Documents with Sorting Capability in Accordance with Document Types

    Directory of Open Access Journals (Sweden)

    Kohei Arai

    2013-09-01

    Full Text Available Secure copy machine which allows reuse copied documents with sorting capability in accordance with the document types. Through experiments with a variety of document types, it is found that copied documents can be shared and stored in database in accordance with automatically classified document types securely. The copied documents are protected by data hiding based on wavelet Multi Resolution Analysis: MRA.

  18. Sex Differences in Midbrain Dopamine D2-Type Receptor Availability and Association with Nicotine Dependence.

    Science.gov (United States)

    Okita, Kyoji; Petersen, Nicole; Robertson, Chelsea L; Dean, Andy C; Mandelkern, Mark A; London, Edythe D

    2016-11-01

    Women differ from men in smoking-related behaviors, among them a greater difficulty in quitting smoking. Unlike female smokers, male smokers have lower striatal dopamine D2-type receptor availability (binding potential, BPND) than nonsmokers and exhibit greater smoking-induced striatal dopamine release. Because dopamine D2-type autoreceptors in the midbrain influence striatal dopamine release, a function that has been linked to addiction, we tested for sex differences in midbrain dopamine D2-type receptor BPND and in relationships between midbrain BPND, nicotine dependence and striatal dopamine D2-type receptor BPND. Positron emission tomography was used with [(18)F]fallypride to measure BPND in a midbrain region, encompassing the substantia nigra and ventral tegmental area, in 18 daily smokers (7 women, 11 men) and 19 nonsmokers (10 women, 9 men). A significant sex-by-group interaction reflected greater midbrain BPND in female but not male smokers than in corresponding nonsmokers (F1, 32=5.089, p=0.03). Midbrain BPND was positively correlated with BPND in the caudate nucleus and putamen in nonsmokers and female smokers but not in male smokers and with nicotine dependence in female but not in male smokers. Striatal BPND was correlated negatively with nicotine dependence and smoking exposure. These findings extend observations on dopamine D2-type receptors in smokers and suggest a sex difference in how midbrain dopamine D2-type autoreceptors influence nicotine dependence.

  19. Where is hbar Hiding in Entropic Gravity?

    CERN Document Server

    Chen, Pisin

    2011-01-01

    The entropic gravity scenario recently proposed by Erik Verlinde reproduced the Newton's law of purely classical gravity yet the key assumptions of this approach all have quantum mechanical origins. This is atypical for emergent phenomena in physics, where the underlying, more fundamental physics often reveals itself as corrections to the leading classical behavior. So one naturally wonders: where is hbar hiding in entropic gravity? To address this question, we first revisit the idea of holographic screen as well as entropy and its variation law in order to obtain a self-consistent approach to the problem. Next we argue that when dealing with quantum gravity issues the generalized uncertainty principle (GUP) should be the more appropriate foundation. Indeed based on GUP it has been demonstrated that the black hole Bekenstein entropy area law must be modified not only in the strong but also in the weak gravity regime. In the weak gravity limit, such a GUP modified entropy exhibits a logarithmic correction term...

  20. Hiding Quantum Information in the Perfect Code

    CERN Document Server

    Shaw, Bilal A

    2010-01-01

    We present and analyze a protocol for quantum steganography where the sender (Alice) encodes her steganographic information into the error syndromes of the perfect (five-qubit) quantum error-correcting code, and sends it to the receiver (Bob) over a depolarizing channel. Alice and Bob share a classical secret key, and hide quantum information in such a way that to an eavesdropper (Eve) without access to the secret key, the quantum message looks like an innocent codeword with a typical sequence of quantum errors. We calculate the average rate of key consumption, and show how the protocol improves in performance as information is spread over multiple codeword blocks. Alice and Bob utilize different encodings to optimize the average number of steganographic bits that they can send to each other while matching the error statistics of the depolarizing channel.

  1. Multi-Bit Data Hiding Scheme for Compressing Secret Messages

    Directory of Open Access Journals (Sweden)

    Wen-Chung Kuo

    2015-11-01

    Full Text Available The goal of data hiding techniques usually considers two issues, embedding capacity and image quality. Consequently, in order to achieve high embedding capacity and good image quality, a data hiding scheme combining run-length encoding (RLE with multi-bit embedding is proposed in this paper. This work has three major contributions. First, the embedding capacity is increased 62% because the secret message is compressed before embedding into the cover image. Secondly, the proposed scheme keeps the multi-bit generalized exploiting modification direction (MGEMD characteristics, which are effective to reduce modified pixels in the cover image and to maintain good stego image quality. Finally, the proposed scheme can prevent modern steganalysis methods, such as RS steganalysis and SPAM (subtractive pixel adjacency matrix, and is compared to MiPOD (minimizing the power of the optimal detector scheme. From our simulation results and security discussions, we have the following results: First, there are no perceivable differences between the cover images and stego images from human inspection. For example, the average PSNR of stego images is about 44.61 dB when the secret message (80,000 bits is embedded for test cover images (such as airplane, baboon, Lena of size 512×512. Secondly, Appl. Sci. 2015, 5 1034 on average, 222,087 pixels were not modified after embedding for the cover image. That is to say, 12% less pixels are modified as compared to the MGEMD method. From the performance discussions, the proposed scheme achieves high embedding capacity and good image quality, but also maintains stego image security.

  2. Characterization of humus microbial communities in adjacent forest types that differ in nitrogen availability.

    Science.gov (United States)

    Leckie, S E; Prescott, C E; Grayston, S J; Neufeld, J D; Mohn, W W

    2004-07-01

    To address the link between soil microbial community composition and soil processes, we investigated the microbial communities in forest floors of two forest types that differ substantially in nitrogen availability. Cedar-hemlock (CH) and hemlock-amabilis fir (HA) forests are both common on northern Vancouver Island, B.C., occurring adjacently across the landscape. CH forest floors have low nitrogen availability and HA high nitrogen availability. Total microbial biomass was assessed using chloroform fumigation-extraction and community composition was assessed using several cultivation-independent approaches: denaturing gradient gel electrophoresis (DGGE) of the bacterial communities, ribosomal intergenic spacer analysis (RISA) of the bacterial and fungal communities, and phospholipid fatty acid (PLFA) profiles of the whole microbial community. We did not detect differences in the bacterial communities of each forest type using DGGE and RISA, but differences in the fungal communities were detected using RISA. PLFA analysis detected subtle differences in overall composition of the microbial community between the forest types, as well as in particular groups of organisms. Fungal PLFAs were more abundant in the nitrogen-poor CH forests. Bacteria were proportionally more abundant in HA forests than CH in the lower humus layer, and Gram-positive bacteria were proportionally more abundant in HA forests irrespective of layer. Bacterial and fungal communities were distinct in the F, upper humus, and lower humus layers of the forest floor and total biomass decreased in deeper layers. These results indicate that there are distinct patterns in forest floor microbial community composition at the landscape scale, which may be important for understanding nutrient availability to forest vegetation.

  3. Mechanical properties of biobased films prepared from collagen solutions derived from bovine hides

    Science.gov (United States)

    The most valuable byproducts of the meat packing industry are hides. The U.S. is the world’s 3rd largest hide producing country and currently produces approximately 35 million cattle hides annually. Due to fierce competition in global markets, the American leather and hides industry is facing chal...

  4. Legionnaires' Hiding in Hospital, Nursing Home Plumbing Systems: CDC

    Science.gov (United States)

    ... gov/news/fullstory_166302.html Legionnaires' Hiding in Hospital, Nursing Home Plumbing Systems: CDC Effective water management, sanitation programs can reduce the risk of exposure to this deadly bacteria To use the sharing ...

  5. Effects of donkey-hide glue reinforcing bone oral solution on expression of type Ⅰ collagen gene and protein expression in ovariectomized rats%阿胶强骨口服液对去卵巢大鼠骨质疏松模型Ⅰ型胶原基因和蛋白表达的影响

    Institute of Scientific and Technical Information of China (English)

    郭向飞; 倪家骧; 沈霖; 杨卫红

    2009-01-01

    Objective To investigate the effects of donkey-hide glue reinforcing bone oral solution (DGRBOS) on expression of type Ⅰ collagen gene and protein expression in rats, and explore the mechanism of treating osteoporosis with DGRBOS. Methods 36 female SD rats aged 6 months were randomly divided into 3 groups after ovariectomy: A(sham group),B(group of osteoporotic animal model with normal physiological saline),C(treated group of osteoporotic animal model with DGRBOS). Each group included 12 rats. The expression of type Ⅰ collagen gene in bone tissue was detected by real time fluorescence quantitative CR(FQ-PCR) method and type Ⅰ collagen protein analysis by Western blotting. Results Type Ⅰ collagen protein of Group C (OVX+DGRBOS) was significantly higher than B group (ovariectomized+saline group), P=0.002 (P<0.01), there are obvious differences in statistical significance. Type Ⅰ collagen gene fluorescence quantitative PCR (FQ-PCR) results of the B group and C group, P=0.004 (P<0.01), that amplified the differences in the efficiency of a clear statistical significance. Conclusion DGRBOS can increase type Ⅰ collagen mRNA expression level and at the same time significantly increase the type Ⅰ collagen content of expression, which is one of the mechanisms that DGRBOS can be treated for Osteoporosis.%目的 研究阿胶强骨口服液(donkey-hide glue reinforcing bone oral solution, DGRBOS) 对去卵巢骨质疏松模型SD大鼠I型胶原基因和蛋白表达的影响,探讨DGRBOS治疗骨质疏松的疗效机制.方法 6月龄SD大鼠36只, 随机分为A组(假手术组),B组(卵巢切除+生理盐水组),C组(卵巢切除+阿胶强骨口服液组),每组12只.6个月后取材检测.采用荧光定量PCR对I型胶原基因进行定量分析,采用免疫印迹法对I型胶原蛋白进行分析.结果 C组I型胶原蛋白与B组比较明显增高,已接近A组(P<0.01),差异有明显的统计学意义.I型胶原基因荧光定量PCR(FQ-PCR)结果B

  6. Suitability of the RGB Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Ante Poljicak

    2010-06-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data  hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  7. Suitability of the rgb Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Lidija Mandić

    2010-01-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  8. A Simple Image Encoding Method with Data Lossless Information Hiding

    OpenAIRE

    Zhi-Hui Wang; Chin-Chen Chang; Ming-Chu Li; Tzu-Chuen Lu

    2011-01-01

    In this paper, we propose a simple reversible data hiding method in the spatial domain for block truncation coding (BTC) compressed grayscale images. The BTC method compresses a block of a grayscale image to a bitmap and a pair of quantization numbers. The proposed method first embeds secret bits into a block by changing the order of those two quantization numbers. The compression rate is not enlarged by this embedding scheme. To further improve the hiding capacity, the proposed method embeds...

  9. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  10. A chaos-based approach for information hiding security

    OpenAIRE

    Bahi, Jacques M.; Guyeux, Christophe

    2010-01-01

    This paper introduces a new framework for data hiding security. Contrary to the existing ones, the approach introduced here is not based on probability theory. In this paper, a scheme is considered as secure if its behavior is proven unpredictable. The objective of this study is to enrich the existing notions of data hiding security with a new rigorous and practicable one. This new definition of security is based on the notion of topological chaos. It could be used to reinforce the confidence...

  11. The potency of plant extracts as antimicrobials for the skin or hide preservation

    Science.gov (United States)

    Suparno, Ono; Afifah, Amalia; Panandita, Tania; Marimin, Purnawati, Rini

    2017-03-01

    Preservation of skin or hide uses antimicrobial that will be disposed in wastewater in the skin or hide processing resulting in the environmental pollution. Extracts of some types of plants contain some antimicrobial substances which are potential to be used as biocides for the preservation of skin or hide and are more environmentally friendly. The objectives of this study were to determine the phytochemical contents of moringa, cucumber tree or wuluh starfruit, cherry, and white leadtree or lamtoro leaves and to analyse the antibacterial activities of the plant extracts against microorganisms that cause spoilage of skin or hide. Phytochemical constituents of the dried plant leaves were extracted by 70% ethanol. The resulting extracts were analysed their phytochemical contents and antimicrobial activities against gram negative and gram positive bacteria (inhibition zone test) by well diffusion method, the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Phytochemical test showed that the four leaf extracts contained alkaloids, saponins, tannins, flavonoids, steroids, and glycosides. The inhibition zones of the extracts against Escherichia coli were 5 mm for moringa leaf, 6 mm for cucumber tree leaf, 12 mm for cherry leaf, and 17 mm for white leadtree leaf. Inhibition zone of the extracts against Staphylococcus aureus were 2.5 mm for moringa leaf, 7 mm for cucumber tree leaf, 7.3 mm for cherry leaf, and 13 mm for white leadtree leaf. Inhibition zones of the extracts against Bacillus subtilis were 8 mm for moringa leaf, 9 mm for cucumber tree starfruit leaf, 14 mm for cherry leaf, and 15 mm for white leadtree leaf. The best MIC and MBC tests were demonstrated by white leadtree leaf extract against E. coli found at concentration of 1500 µg/ml, against S. aureus at concentration of 3000 µg/ml, and against B. subtilis at concentration of 3000 µg/ml. The ethanol extract of white leadtree leaf had the best antibacterial activity

  12. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  13. Let’s play hide and seek!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    This week, we would like you to play a small online game called “Virtual Hide & Seek”. The rules are simple: some of our colleagues have published some sensitive or confidential documents on CERN’s central services like Indico, CDS, EDMS or TWiki, as well as on our many websites. Your mission, should you choose to accept it: find them!   If you provide us with documents marked “confidential”, “classified”, “sensitive”, or containing plain text operational passwords, you can win a book on computer security. There are only few conditions: these documents must be visible from outside CERN, must not require a CERN account in order to access them, and must not belong to you or have a direct link with your work. Have fun! But seriously, are you sure that your documents are really properly protected? We regularly find confidential documents stored on one of the CERN central  services and w...

  14. New insights to lateral rooting: Differential responses to heterogeneous nitrogen availability among maize root types.

    Science.gov (United States)

    Yu, Peng; White, Philip J; Li, Chunjian

    2015-01-01

    Historical domestication and the "Green revolution" have both contributed to the evolution of modern, high-performance crops. Together with increased irrigation and application of chemical fertilizers, these efforts have generated sufficient food for the growing global population. Root architecture, and in particular root branching, plays an important role in the acquisition of water and nutrients, plant performance, and crop yield. Better understanding of root growth and responses to the belowground environment could contribute to overcoming the challenges faced by agriculture today. Manipulating the abilities of crop root systems to explore and exploit the soil environment could enable plants to make the most of soil resources, increase stress tolerance and improve grain yields, while simultaneously reducing environmental degradation. In this article it is noted that the control of root branching, and the responses of root architecture to nitrate availability, differ between root types and between plant species. Since the control of root branching depends upon both plant species and root type, further work is urgently required to determine the appropriate genes to manipulate to improve resource acquisition by specific crops.

  15. Comparison of methods for the enumeration of enterohemorrhagic Escherichia coli from veal hides and carcasses

    Directory of Open Access Journals (Sweden)

    Brandon E Luedtke

    2015-09-01

    Full Text Available The increased association of enterohemorrhagic Escherichia coli (EHEC with veal calves has led the United States Department of Agriculture Food Safety and Inspection Service to report results of veal meat contaminated with the Top 7 serogroups separately from beef cattle. However, detection methods that can also provide concentration for determining the prevalence and abundance of EHEC associated with veal are lacking. Here we compared the ability of qPCR and a molecular based most probable number assay (MPN to detect and enumerate EHEC from veal hides at the abattoir and the resulting pre-intervention carcasses. In addition, digital PCR (dPCR was used to analyze select samples. The qPCR assay was able to enumerate total EHEC in 32% of the hide samples with a range of approximately 34 to 91,412 CFUs/100 cm2 (95% CI 4-113,460 CFUs/100 cm2. Using the MPN assay, total EHEC was enumerable in 48% of the hide samples and ranged from approximately 1 to greater than 17,022 CFUs/100 cm2 (95% CI 0.4-72,000 CFUs/100 cm2. The carcass samples had lower amounts of EHEC with a range of approximately 4 to 275 CFUs/100 cm2 (95% CI 3-953 CFUs/100 cm2 from 17% of samples with an enumerable amount of EHEC by qPCR. For the MPN assay, the carcass samples ranged from 0.1 to 1 CFUs/100 cm2 (95% CI 0.02-4 CFUs/100 cm2 from 29% of the samples. The correlation coefficient between the qPCR and MPN enumeration methods indicated a moderate relation (R2=0.39 for the hide samples while the carcass samples had no relation (R2=0.002, which was likely due to most samples having an amount of total EHEC below the reliable limit of quantification for qPCR. Interestingly, after enrichment, 81% of the hide samples and 94% of the carcass samples had a detectable amount of total EHEC by qPCR. From our analysis, the MPN assay provided a higher percentage of enumerable hide and carcass samples, however determining an appropriate dilution range and the limited throughput offer additional

  16. Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation

    Directory of Open Access Journals (Sweden)

    Marghny Mohamed

    2011-01-01

    Full Text Available The least significant bit (LSB embedding method is one of the most commonly used techniques; it targets the LSB'sof the host image to hide the data. This paper deals with three main steganography challenges (i.e. capacity, imperceptibility,and security. This is achieved by hybrid data hiding scheme incorporates LSB technique with a key-permutation method. Thepaper also proposes an optimal key permutation method using genetic algorithms for best key selection. Both normal andoptimized methods are tested with standard images, varying both data size as well as key space. Final experimental resultsshow decrement in computation time when increasing number of keys, at the same time system security improves.

  17. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    Directory of Open Access Journals (Sweden)

    Ari Shawakat Tahir

    2015-12-01

    Full Text Available The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed.

  18. New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files

    CERN Document Server

    Alanazi, Hamdan O; Zaidan, B B; Jalab, Hamid A; AL-Ani, Zaidoon Kh

    2010-01-01

    With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important, Another problem with digital document and video is that undetectable modifications can be made with very simple and widely available equipment, which put the digital material for evidential purposes under question .With the large flood of information and the development of the digital format Information hiding considers one of the techniques which used to protect the important information. The main goals for this paper, provides a general overview of the New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files.

  19. Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms

    Directory of Open Access Journals (Sweden)

    Xu-Ren Luo

    2011-05-01

    Full Text Available In recent years, reversible data hiding has attracted much more attention than before. Reversibilitysignifies that the original media can be recovered without any loss from the marked media afterextracting the embedded message. This paper presents a new method that adopts two-level wavelettransform and exploits the feature of large wavelet coefficient variance to achieve the goal of highcapacity with imperceptibility. Our method differs from those of previous ones in which the waveletcoefficients histogram not gray-level histogram is manipulated. Besides, clever shifting rules areintroduced into histogram to avoid the decimal problem in pixel values after recovery to achievereversibility. With small alteration of the wavelet coefficients in the embedding process, and therefore lowvisual distortion is obtained in the marked image. In addition, an important feature of our design is thatthe use of threshold is much different from previous studies. The results indicate that our design issuperior to many other state-of-the-art reversible data hiding schemes.

  20. [Rapid quantification of total nitrogen and end-point determination of hide melting in manufacturing of donkey-hide gelatin].

    Science.gov (United States)

    Han, Hai-Fan; Zhang, Lu; Zhang, Yan; Li, Wen-Long; Qu, Hai-Bin

    2014-03-01

    Hide melting presents itself as one of the most critical processes in the production of donkey-hide gelatin. Here a NIR-based method was established for the rapid analysis of in-process hide melting solutions as well as for end-point determination of this process. Near infrared (NIR) spectra of hide melting solutions were collected in transflective mode. With the contents of total nitrogen determined by the Kjeldahl method as reference values, partial least squares regression (PLSR) was employed to build calibration models between NIR spectra and total nitrogen. Model parameters including wavelength range and PLS factors were optimized to achieve best model performance. Based on the contents of total nitrogen predicted by calibration model, end point of hide melting was determined. The constructed PLS model gave a high correlation coefficient (R2) of 0.991 3 and a root mean square error of prediction (RMSEP) of 0.807 g x L(-1). With the predicted total nitrogen and predefined limit, decisions concerning the proper times of melting were made. This research demonstrated that NIR transflectance spectroscopy could be used to expeditiously determine the contents of total nitrogen which was subsequently chosen as the indictor for determining the end-point of hide melting. The proposed procedure may help avoid unnecessary raw material or energy consumption.

  1. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Science.gov (United States)

    Wilke, Andreas; Minich, Steven; Panis, Megane; Langen, Tom A; Skufca, Joseph D; Todd, Peter M

    2015-01-01

    Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed) patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching) times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  2. Germination requirements and seedling responses to water availability and soil type in four eucalypt species

    Science.gov (United States)

    Schütz, Wolfgang; Milberg, Per; Lamont, Byron B.

    2002-03-01

    We conducted experiments on seed germination, seedling survival and seedling growth of four Eucalyptus species to identify factors that might explain why they are restricted to the two major soil types in southwestern Australia, deep sands ( E. macrocarpa, E. tetragona) and lateritic loam ( E. loxophleba, E. wandoo). At high temperatures (28 °C), germination in darkness was lower for the two 'loam species' than for the 'sand species', while there were no differences in light or at low temperatures (10 °C). Germination commenced earlier, and was faster in the sand species than in the loam species, but was almost inhibited in all species by -1.0 MPa. E. tetragona proved the most drought-tolerant in terms of germination level and seedling survival. Seedlings of the sand species had much longer roots two weeks after germination in the absence of water stress, and the roots of more seedlings continued to elongate under moderate water stress (-1.0 MPa), than the two loam species. Roots were longer in all species, except E. macrocarpa, at -0.5 MPa than at -0.1 MPa, despite seedlings having a smaller mass and hypocotyl length. As water availability declined, there was a tendency for the sand species to survive longer on sand than on loam while soil type had no effect on the loam species. Pattern and duration of seedling survival of the loam species was similar to that of the sand species despite their smaller seeds. We conclude that seedlings from the large-seeded sand species are able to penetrate the soil profile faster and deeper, but that they are not less prone to drying soils than seedlings from the small-seeded loam species. Instead, seed size and germination speed are important prerequisites to cope successfully with unstable soil surfaces and to exploit the rapidly descending water in deep sands.

  3. Non-blind Data hiding for RGB images using DCT-based fusion and H.264 compression concepts

    Directory of Open Access Journals (Sweden)

    Safwat Hamad

    Full Text Available Steganography is the field of research that provides innovative solutions to the problem of secure data communication. In this paper, a non-blind data hiding technique is proposed which is based on data fusion between both the cover and the secret images. ...

  4. Decreased in vivo availability of the cannabinoid type 2 receptor in Alzheimer's disease

    Energy Technology Data Exchange (ETDEWEB)

    Ahmad, Rawaha; Laere, Koen van [KU Leuven and University Hospitals Leuven, Department of Imaging and Pathology, Nuclear Medicine and Molecular Imaging, Leuven (Belgium); University Hospital Leuven, Division of Nuclear Medicine, Leuven (Belgium); Postnov, Andrey [KU Leuven and University Hospitals Leuven, Department of Imaging and Pathology, Nuclear Medicine and Molecular Imaging, Leuven (Belgium); National Research Nuclear University MEPhI, Moscow (Russian Federation); Bormans, Guy [KU Leuven, Laboratory for Radiopharmacy, Leuven (Belgium); Versijpt, Jan [University Hospital Brussels, Department of Neurology, Brussels (Belgium); Vandenbulcke, Mathieu [KU Leuven and University Hospitals Leuven, Old Age Psychiatry, Department of Psychiatry, Leuven (Belgium)

    2016-11-15

    The cannabinoid type 2 receptor (CB{sub 2}R) is expressed by immune cells such as monocytes and macrophages. In the brain, CB{sub 2}R is primarily found on microglia. CB{sub 2}R upregulation has been reported in animal models of Alzheimer's disease, with a preferential localization near amyloid beta (Aβ) plaques, and in patients post mortem. We performed in vivo brain imaging and kinetic modelling of the CB{sub 2}R tracer [{sup 11}C]NE40 in healthy controls (HC) and in patients with Alzheimer's disease (AD) to investigate whether higher CB{sub 2}R availability regionally colocalized to Aβ deposits is present in vivo. Dynamic 90-min [{sup 11}C]NE40 PET scans were performed in eight HC and nine AD patients with full kinetic modelling using arterial sampling and metabolite correction and partial volume correction. All AD patients received a static [{sup 11}C]PIB scan 40 min after injection. In four HC, a retest scan with [{sup 11}C]NE40 PET was performed within 9 weeks to investigate test-retest characteristics. [{sup 11}C]NE40 was metabolized quickly leading to 50 % of intact tracer 20 min after injection and 20 % at 90 min. A two-tissue kinetic model fitted most of the time-activity curves best; both binding potential (BP{sub ND}) and distribution volume (V{sub T}) parameters could be used. Brain uptake was generally low with an average K{sub 1} value of 0.07 ml/min/ml tissue. V{sub T} and BP{sub ND} were in the range of 0.7 - 1.8 and 0.6 - 1.6, respectively. Test values in HC were about 30 % for V{sub T} and BP{sub ND}. AD patients showed overall significantly lower CB{sub 2}R binding. No relationship was found between regional or global amyloid load and CB{sub 2}R availability. Kinetic modelling of [{sup 11}C]NE40 is possible with a two-tissue reversible model. In contrast to preclinical and post-mortem data, [{sup 11}C]NE40 PET shows lower CB{sub 2}R availability in vivo in AD patients, with no relationship to Aβ plaques. A possible explanation for

  5. Hiding Two Binary Images in Grayscale BMP Image via Five Modulus Method

    Directory of Open Access Journals (Sweden)

    Firas A. Jassim

    2014-05-01

    Full Text Available The aim of this study is to hide two binary BMP images in a single BMP grayscale image. The widespread technique in image steganography is to hide one image (stego image into another (cover image. The proposed novel method is to hide two binary images into one grayscale bitmap cover image. First of all, the proposed technique starts with transforming all grayscale cover image pixels into multiples of five using Five Modulus Method (FMM. Clearly, any modulus of five is either 0, 1, 2, 3, or 4. The transformed FMM cover image could be treated as a good host for carrying data. Obviously, it is known that the pixel value for the binary image is either 0 or 1. Therefore, by concatenating the two binary images, the composite results are 00, 01, 10 and 11. In fact, these concatenated values could be mapped using simple mapping that assigns a positive integer value such as 1 for 00, 2 for 01, 3 for 10 and 4 for 11. Consequently, a new matrix will be constructed that contains a number varying from 1 to 4 only. Fortunately, the four integer values are the same as the previously mentioned reminders of division by 5, hence, adding these four integers to the transformed FMM cover image. On the recipient side, a reverse process will be implemented to extract the two binary images. In terms of PSNR values, the cover image and the two extracted stego images have acceptable PSNR values, which yields that the proposed method is very efficient in information hiding.

  6. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  7. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    Directory of Open Access Journals (Sweden)

    H. Yang

    2009-12-01

    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  8. Pengaruh hide poison dan formalin terhadap sifat kulit dalam pengawet kulit kambing secara dikeringkan

    Directory of Open Access Journals (Sweden)

    Ignatius Sunaryo

    1991-06-01

    Full Text Available The objective of this study is know the effect of ide poison and formaline in the dried curing of goat skin. This study used 199 goat skins that were devided into seven groups od curing. Each group consisted of 17 goat skins. Those groups were : 3 groups of dried curing by hide poison of 0,1%, 0,3% and 0,5%; 3 groups of dried curing by formaline of 1%, 3% and 5%; and 1 groups of dried curing without any preserevation agent as control. After having stored for about 4 months, those skins then to be analized. Physical and chemical analysis werw carried out to evaluate the quality of the skin. Completely randomized design by Duncan’s test was used to analyze the dta. Based on this statistical analysis we can know that: the effect of hide poson in the dried curing of goat skins was the best. The quality of goat skins that were cured by hide poison was as follows : - the average tensile strength was the highest (886,30 kg/CM2, - the average of stretch was the lowest (14,50%, - the average iof hardness was the highest (201,90 kg/2,54 Cm, - the water content was the lowest (20%, and the damage was the smallest (10%.

  9. Design a Weight Based sorting distortion algorithm using Association rule Hiding for Privacy Preserving Data mining

    Directory of Open Access Journals (Sweden)

    R.Sugumar

    2011-12-01

    Full Text Available The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful tool for discovering relationships which are hidden in large database. Association rules hiding algorithms get strong an efficient performance for protecting confidential and crucial data. Data modification and rule hiding is one of the most important approaches for secure data. The objective of the proposed Weight Based Sorting Distortion (WBSD algorithm is to distort certain data which satisfies a particular sensitive rule. Then hide those transactions which support a sensitive rule and assigns them a priority and sorts them in ascending order according to the priority value of each rule. Then it uses these weights to compute the priority value for each transaction according to how weak the rule is that a transaction supports. Data distortion is one of the important methods to avoid this kind of scalability issues

  10. Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition

    Directory of Open Access Journals (Sweden)

    Hyunho Kang

    2015-03-01

    Full Text Available In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria for robust watermarks. In this study, we developed an information hiding method that satisfies the IHC evaluation criteria. The proposed method uses the difference of the frequency coefficients derived from a discrete cosine transform or a discrete wavelet transform. The algorithm employs a statistical analysis to find the best positions in the frequency domains for watermark insertion. In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem (511,31,109 code to error correct the watermark bits and the BCH (63,16,11 code as the sync signal to withstand JPEG (Joint Photographic Experts Group compression and cropping attacks. Our experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression. It should be noted that after the second compression, the file size should be less than 1 25 of the original size to satisfy the IHC evaluation criteria.

  11. Steganographic Approach for Data Hiding using LSB Techniques

    Directory of Open Access Journals (Sweden)

    Baluram Nagaria , Ashish Parikh ,Sandeep Mandliya ,Neeraj shrivastav

    2012-12-01

    Full Text Available Today’s all the multimedia work done via internet so it’s an urgent need to protect the data from malicious attacks. This lead to the research in the area of Digital watermarking and cryptography which intends to protect the copyright information of the intellectuals. In this paper a DCT based steganography scheme is proposed which provides higher resistance to image processing attacks such as JPEG compression, noise, rotation, translation etc Steganography has been implemented In MATLAB7.6 using basic image processing techniques. Steganography is the technique of hiding confidential information within any media. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information But we have design a simulator in which we have transmit our data via mail or LAN. For securing the data, this will be password protected. For design this simulator we have encrypted our data and after that without password we will not decrypted the data. Our all conclusion is that we will secure our information. The difference between the two is in the appearance in the processed output; the output of Steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention. In this paper, we have tried to elucidate the different approaches towards implementation of Steganography using ‘multimedia’ file (text, static image, audio and video and Network IP datagram as cover.

  12. Confidential Data Hiding Using Wavlet Based Ecg Stegnography

    Directory of Open Access Journals (Sweden)

    Malashree K S

    2014-05-01

    Full Text Available With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as Point-of-Care (PoC applications in hospitals around the world. Therefore, huge amount of ECG signal collected by Body Sensor Networks (BSNs from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level etc. and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data is being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this project, a wavelet based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest.

  13. 36 CFR 1250.12 - What types of records are available in NARA's FOIA Reading Room?

    Science.gov (United States)

    2010-07-01

    ... available in NARA's FOIA Reading Room? 1250.12 Section 1250.12 Parks, Forests, and Public Property NATIONAL... records are available in NARA's FOIA Reading Room? (a) NARA makes available for public inspection and... placed on NARA's web site at...

  14. HIDE & SEEK: End-to-end packages to simulate and process radio survey data

    Science.gov (United States)

    Akeret, J.; Seehars, S.; Chang, C.; Monstein, C.; Amara, A.; Refregier, A.

    2017-01-01

    As several large single-dish radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these datasets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system-from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing single-dish radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single-dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal. The two packages can be used separately or together depending on the application. Their modular and flexible nature allows easy adaptation to other instruments and datasets. We describe the basic architecture of the two packages and examine in detail the noise and RFI modeling in HIDE, as well as the implementation of gain calibration and RFI mitigation in SEEK. We then apply HIDE &SEEK to forward-model a Galactic survey in the frequency range 990-1260 MHz based on data taken at the Bleien Observatory. For this survey, we expect to cover 70% of the full sky and achieve a median signal-to-noise ratio of approximately 5-6 in the cleanest channels including systematic uncertainties. However, we also point out the potential challenges of high RFI contamination and baseline removal when examining the early data from the Bleien Observatory. The fully documented HIDE &SEEK packages are available at http://hideseek.phys.ethz.ch/ and are published

  15. Hiding Malicious Content in PDF Documents

    Directory of Open Access Journals (Sweden)

    Dan Sabin Popescu

    2011-09-01

    Full Text Available This paper is a proof-of-concept demonstration for a specific digital signatures vulnerability that shows the ineffectiveness of the WYSIWYS (What You See Is What You Sign concept. The algorithm is fairly simple: the attacker generates a polymorphic file that has two different types of content (text, as a PDF document for example, and image: TIFF – two of the most widely used file formats. When the victim signs the dual content file, he/ she only sees a PDF document and is unaware of the hidden content inside the file. After obtaining the legally signed document from the victim, the attacker simply has to change the extension to the other file format. This will not invalidate the digital signature, as no bits were altered. The destructive potential of the attack is considerable, as the Portable Document Format (PDF is widely used in e-government and in e-business contexts.

  16. Capacity bounds and constructions for reversible data-hiding

    Science.gov (United States)

    Kalker, Ton; Willems, Frans M. J.

    2003-06-01

    An undesirable side effect of many watermarking and data-hiding schemes is that the host signal into which auxiliary data is embedded is distorted. Finding an optimal balance between the amount of information embedded and the induced distortion is therefore an active field of research. In recent years, with the rediscovery of Costa's seminal paper Writing on Dirty Paper, there has been considerable progress in understanding the fundamental limits of the capacity versus distortion of watermarking and data-hiding schemes. For some applications, however, no distortion resulting from auxiliary data, however small, is allowed. In these cases the use of reversible data-hiding methods provide a way out. A reversible data-hiding scheme is defined as a scheme that allows complete and blind restoration (i.e. without additional signaling) of the original host data. Practical reversible data-hiding schemes have been proposed by Fridrich et al., but little attention has been paid to the theoretical limits. Some first results on the capacity of reversible watermarking schemes have been derived. The reversible schemes considered in most previous papers have a highly fragile nature: in those schemes, changing a single bit in the watermarked data would prohibit recovery of both the original host signal as well as the embedded auxiliary data. It is the purpose of this paper to repair this situation and to provide some first results on the limits of robust reversible data-hiding. Admittedly, the examples provided in this paper are toy examples, but they are indicative of more practical schemes that will be presented in subsequent papers.

  17. Selective adsorption of tannins onto hide collagen fibres

    Institute of Scientific and Technical Information of China (English)

    LIAO; Xuepin(廖学品); LU; Zhongbing(陆忠兵); SHI; Bi(石碧)

    2003-01-01

    Hide collagen of animals is used to prepare adsorbent material and its adsorption properties to tannins are investigated. It is indicated that the collagen fibres has excellent adsorption selectivity and high adsorption capacity to tannins. The adsorption rate of tannins is more than 90% whilst less than 10% of functional components are retained by the adsorbent. The adsorption mechanism of tannins onto hide collagen fibres is hydrogen-bonding association. Freundlich model can be used to describe the adsorption isotherms, and the pseudo-second-order rate model can be used to describe adsorption kinetics.

  18. Competitively coupled maps for hiding secret visual information

    Science.gov (United States)

    Vaidelys, M.; Ziaukas, P.; Ragulskis, M.

    2016-02-01

    A novel digital image hiding scheme based on competitively coupled maps is presented in this paper. Self-organizing patterns produced by an array of non-diffusively coupled nonlinear maps are exploited to conceal the secret. The secret image is represented in the form of a dot-skeleton representation and is embedded into a spatially homogeneous initial state far below the noise level. Self-organizing patterns leak the secret image at a predefined set of system parameters. Computational experiments are used to demonstrate the effectiveness and the security of the proposed image hiding scheme.

  19. The Impact of Various Types of Tillage on the Soil Water Availability

    Directory of Open Access Journals (Sweden)

    BESNIK GJONGECAJ

    2014-07-01

    Full Text Available The present study is focused on the role that various ways of soil tillage may have on the increase of soil water availability to the plant roots. The research was carried out in Tirana, Albania, and the experiment was established in a vineyard field. The soil was cultivated in three different ways (three treatments: conventional (plowing plus surface cultivation, conservative (subsoiling plus surface cultivation, conservative (chisel plowing plus surface cultivation. In order to quantify the available soil water to plants, the pF-soil moisture curves were determined. The determined pF-soil moisture curves belong to two layers: 0-25 cm and 25-50 cm, taken into consideration for each treatment. The soil water content between the field capacity (FWC and the permanent wilting point (PWP was considered as potentially available to plant roots. The results showed clearly that the way the tillage was applied has a significant effect on soil water capacity potentially available to plant roots. Loosening the soil by breaking up the impermeable layers, the conservative tillage makes possible the increase of the amount of water held by soil particles in the range between FWC and PWP, in comparison with the conventional tillage. This increase of available soil water capacity is due to the soil loosening in deeper layers of soil profile as well, which leads to the situation where the plant roots can penetrate deeper and occupy more space, consequently, drawing more water to meet their needs. Within the conservative tillage versions, sub soiling seems to be more effective in the increase of available soil water capacity comparing with the chisel plowing. The study contributes, as well, to the determination of the pF-soil moisture curves in a way that is theoretically well based. The founded curves fit with the exponential form of functions and the coefficients of determinations, for each case under study, are significant in high probability levels.

  20. Sensor and Actuator Fault-Hiding Reconfigurable Control Design for a Four-Tank System Benchmark

    DEFF Research Database (Denmark)

    Hameed, Ibrahim; El-Madbouly, Esam I; Abdo, Mohamed I

    2015-01-01

    Fault detection and compensation plays a key role to fulfill high demands for performance and security in today's technological systems. In this paper, a fault-hiding (i.e., tolerant) control scheme that detects and compensates for actuator and sensor faults in a four-tank system benchmark...... Invariant (LTI) system where virtual sensors and virtual actuators are used to correct faulty performance through the use of a pre-fault performance. Simulation results showed that the developed approach can handle different types of faults and able to completely and instantly recover the original system...

  1. 9 CFR 95.6 - Untanned hides and skins; importations permitted subject to restrictions.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Untanned hides and skins; importations... ENTRY INTO THE UNITED STATES § 95.6 Untanned hides and skins; importations permitted subject to restrictions. Hides or skins offered for importation which do not meet the conditions or requirements of §...

  2. 9 CFR 95.5 - Untanned hides and skins; requirements for unrestricted entry.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Untanned hides and skins; requirements... ENTRY INTO THE UNITED STATES § 95.5 Untanned hides and skins; requirements for unrestricted entry. Untanned hides and/or skins of cattle, buffalo, sheep, goats, other ruminants, and swine which do not...

  3. The physical properties, morphology and viscoelasticity of biobased sponges prepared from un-tanned hides

    Science.gov (United States)

    One of our research endeavors to address ongoing challenges faced by the U.S. hide and leather industries is to develop innovative uses and novel biobased products from hides to improve prospective markets and to secure a viable future for hides and leather industries. We had previously investigate...

  4. The prediction of leather mechanical properties from airborne ultrasonic testing of hides

    Science.gov (United States)

    High quality, clean, and well-preserved hides are paramount for competitiveness in both domestic and export markets. Currently, hides are visually inspected and ranked for quality and sale price, which is not reliable when hair is present on the hides. Advanced technologies are needed to nondestru...

  5. Performance Analysis of Data Hiding in MPEG-4 AAC Audio

    Institute of Scientific and Technical Information of China (English)

    XU Shuzheng; ZHANG Peng; WANG Pengjun; YANG Huazhong

    2009-01-01

    A high capacity data hiding technique was developed for compressed digital audio.As perceptual audio coding has become the accepted technology for storage and transmission of audio signals,compressed audio information hiding enables robust,imperceptible transmission of data within audio signals,thus allowing valuable information to be attached to the content,such as the song title,lyrics,composer's name,and artist or property rights related data.This paper describes simultaneous low bitrate encoding and information hiding for highly compressed audio signals.The information hiding is implemented in the quantization process of the audio content which improves robustness,signal quality,and security.The imperceptibility of the embedded data is ensured based on the masking property of the human auditory system (HAS).The robustness and security are evaluated by various attacking algorithms.Tests with an extended MPEG4 advanced audio coding (AAC) encoder confirm that the method is robust to the regular and singular groups method (RS) and sample pair analysis (SPA) attacks as well as other statistical steganalysis method attacks.

  6. Powdered hide model for vegetable tanning II. hydrolyzable tannin

    Science.gov (United States)

    Vegetable tannages employ both condensed and hydrolyzable tannins. As part of our exploration of tanning mechanisms, we reported last year on interactions of the condensed tannin, quebracho, with powdered hide. In this study, the interactions of chestnut extract, a hydrolyzable tannin, with powdere...

  7. Quiz Games as a model for Information Hiding

    OpenAIRE

    Bank, Bernd; Heintz, Joos; Matera, Guillermo; Montana, Jose L.; Pardo, Luis M.; Paredes, Andres Rojas

    2015-01-01

    We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game. It allows in a uniform way to prove exponential lower bounds for several complexity problems of elimination theory.

  8. Frequent Itemset Hiding Algorithm Using Frequent Pattern Tree Approach

    Science.gov (United States)

    Alnatsheh, Rami

    2012-01-01

    A problem that has been the focus of much recent research in privacy preserving data-mining is the frequent itemset hiding (FIH) problem. Identifying itemsets that appear together frequently in customer transactions is a common task in association rule mining. Organizations that share data with business partners may consider some of the frequent…

  9. Frequent Itemset Hiding Algorithm Using Frequent Pattern Tree Approach

    Science.gov (United States)

    Alnatsheh, Rami

    2012-01-01

    A problem that has been the focus of much recent research in privacy preserving data-mining is the frequent itemset hiding (FIH) problem. Identifying itemsets that appear together frequently in customer transactions is a common task in association rule mining. Organizations that share data with business partners may consider some of the frequent…

  10. 24 CFR 5.518 - Types of preservation assistance available to mixed families and other families.

    Science.gov (United States)

    2010-04-01

    ... consolidated plan, as described in 24 CFR part 91 and if applicable to the covered program, indicates that the... in 24 CFR part 91), the responsible entity's own knowledge of the availability of affordable housing... from a rent level that reflects HUD assistance to a rent level that is unassisted; the term refers...

  11. Timing and type of disaster severity data available on Internet following the 2010 Haiti Earthquake.

    Science.gov (United States)

    Wefer, Agnes; Von Schreeb, Johan

    2012-05-23

    Background To adequately plan relief, adequate information that describe and quantify the severity of a disaster, and estimate the number of affected population, is rapidly needed. However, needs assessments describing the severity of the disaster has been shown to be conducted too late in order to guide the first days relief interventions. The aim of this study was to assess availability of early disaster severity information on Internet during the first seven days following the 2010 Haiti earthquake and assess to which extent the information was consistent with later revelations. Methods We searched the well acknowledged web portal Relief Web for all Haiti postings during the first seven days (12 -18 January 2010) after the earthquake. A form was created to classify and quantify extracted severity variables found in the postings. The results were compiled, analysed and compared with CRED (Centre for Research on the Epidemiology of Disaster) official data made available later. Findings A total of 822 reports were posted where of 15 % provided a numerical estimate of the affected population, while 10% had an estimate on the number of dead. On day four 200 000 dead was reported, which is of the same magnitud compared to later official estimates (CRED data). Not a single report described the data collection method. Conclusions Within a few days of the 2010 Haiti earthquake it was possible to find surprisingly accurate information regarding severity of the earthquake but the available data must be questioned as no method was reported. More specialized and independent needs assessment agencies may improve availability of strategic information in the early onset of a disaster.

  12. Laboratory Diagnostics Market in East Africa: A Survey of Test Types, Test Availability, and Test Prices in Kampala, Uganda.

    Directory of Open Access Journals (Sweden)

    Lee F Schroeder

    Full Text Available Diagnostic laboratory tests are routinely defined in terms of their sensitivity, specificity, and ease of use. But the actual clinical impact of a diagnostic test also depends on its availability and price. This is especially true in resource-limited settings such as sub-Saharan Africa. We present a first-of-its-kind report of diagnostic test types, availability, and prices in Kampala, Uganda.Test types (identity and availability were based on menus and volumes obtained from clinical laboratories in late 2011 in Kampala using a standard questionnaire. As a measure of test availability, we used the Availability Index (AI. AI is the combined daily testing volumes of laboratories offering a given test, divided by the combined daily testing volumes of all laboratories in Kampala. Test prices were based on a sampling of prices collected in person and via telephone surveys in 2015.Test volumes and menus were obtained for 95% (907/954 of laboratories in Kampala city. These 907 laboratories offered 100 different test types. The ten most commonly offered tests in decreasing order were Malaria, HCG, HIV serology, Syphilis, Typhoid, Urinalysis, Brucellosis, Stool Analysis, Glucose, and ABO/Rh. In terms of AI, the 100 tests clustered into three groups: high (12 tests, moderate (33 tests, and minimal (55 tests availability. 50% and 36% of overall availability was provided through private and public laboratories, respectively. Point-of-care laboratories contributed 35% to the AI of high availability tests, but only 6% to the AI of the other tests. The mean price of the most commonly offered test types was $2.62 (range $1.83-$3.46.One hundred different laboratory test types were in use in Kampala in late 2011. Both public and private laboratories were critical to test availability. The tests offered in point-of-care laboratories tended to be the most available tests. Prices of the most common tests ranged from $1.83-$3.46.

  13. Joint data-hiding and rate-distortion optimization for H.264/AVC videos

    Science.gov (United States)

    Lin, Yih-Chuan; Li, Jung-Hong

    2012-07-01

    We address video data-hiding on the context-adaptive variable-length coding domain of the H.264/AVC standard. It is challenging to maintain a minimum variation of rate-distortion performance when hiding data in compressed videos by slightly modifying one or more transform coefficients of prediction residual data. The fluctuant variation of rate-distortion performance is especially serious in the case of hiding data in H.264/AVC compressed videos due to the thorough use of various prediction modes. Most current video data-hiding schemes concentrate on hiding messages in video intra (I)-frames to mitigate performance degradation at the expense of limited hiding capacity and applicability. Unlike most previous video data-hiding schemes, this paper considers data-hiding schemes on both I- and predicted (P)-frames of videos. We first investigate the possible ways used to suppress the significant degradation of the rate-distortion performance for hiding data in H.264/AVC videos. Based on the investigation, a hybrid video data-hiding scheme is designed to perform the classification of 4×4 residual blocks according to the characteristics of each block and to hide message data differently in each classified block in order to reduce the performance degradation caused by the data-hiding process. The block classification is based on the magnitude of the last non-zero coefficient and the coefficient difference energy of each block to select suitable blocks that are capable of contributing less degradation of coding performance for hiding additional messages. Moreover, the proposed data-hiding algorithm is incorporated with the rate-distortion optimization loop of the H.264/AVC encoder to provide further degradation suppression on the output bit-rate and decoded quality. From experiments on several well-known test videos, it can be seen that the proposed data-hiding scheme demonstrates improved efficiency on video quality and output bit-rate compared to other similar methods.

  14. Laboratory Diagnostics Market in East Africa: A Survey of Test Types, Test Availability, and Test Prices in Kampala, Uganda.

    Science.gov (United States)

    Schroeder, Lee F; Elbireer, Ali; Jackson, J Brooks; Amukele, Timothy K

    2015-01-01

    Diagnostic laboratory tests are routinely defined in terms of their sensitivity, specificity, and ease of use. But the actual clinical impact of a diagnostic test also depends on its availability and price. This is especially true in resource-limited settings such as sub-Saharan Africa. We present a first-of-its-kind report of diagnostic test types, availability, and prices in Kampala, Uganda. Test types (identity) and availability were based on menus and volumes obtained from clinical laboratories in late 2011 in Kampala using a standard questionnaire. As a measure of test availability, we used the Availability Index (AI). AI is the combined daily testing volumes of laboratories offering a given test, divided by the combined daily testing volumes of all laboratories in Kampala. Test prices were based on a sampling of prices collected in person and via telephone surveys in 2015. Test volumes and menus were obtained for 95% (907/954) of laboratories in Kampala city. These 907 laboratories offered 100 different test types. The ten most commonly offered tests in decreasing order were Malaria, HCG, HIV serology, Syphilis, Typhoid, Urinalysis, Brucellosis, Stool Analysis, Glucose, and ABO/Rh. In terms of AI, the 100 tests clustered into three groups: high (12 tests), moderate (33 tests), and minimal (55 tests) availability. 50% and 36% of overall availability was provided through private and public laboratories, respectively. Point-of-care laboratories contributed 35% to the AI of high availability tests, but only 6% to the AI of the other tests. The mean price of the most commonly offered test types was $2.62 (range $1.83-$3.46). One hundred different laboratory test types were in use in Kampala in late 2011. Both public and private laboratories were critical to test availability. The tests offered in point-of-care laboratories tended to be the most available tests. Prices of the most common tests ranged from $1.83-$3.46.

  15. Ordering the mob: Insights into replicon and MOB typing schemes from analysis of a curated dataset of publicly available plasmids.

    Science.gov (United States)

    Orlek, Alex; Phan, Hang; Sheppard, Anna E; Doumith, Michel; Ellington, Matthew; Peto, Tim; Crook, Derrick; Walker, A Sarah; Woodford, Neil; Anjum, Muna F; Stoesser, Nicole

    2017-03-09

    Plasmid typing can provide insights into the epidemiology and transmission of plasmid-mediated antibiotic resistance. The principal plasmid typing schemes are replicon typing and MOB typing, which utilize variation in replication loci and relaxase proteins respectively. Previous studies investigating the proportion of plasmids assigned a type by these schemes ('typeability') have yielded conflicting results; moreover, thousands of plasmid sequences have been added to NCBI in recent years, without consistent annotation to indicate which sequences represent complete plasmids. Here, a curated dataset of complete Enterobacteriaceae plasmids from NCBI was compiled, and used to assess the typeability and concordance of in silico replicon and MOB typing schemes. Concordance was assessed at hierarchical replicon type resolutions, from replicon family-level to plasmid multilocus sequence type (pMLST)-level, where available. We found that 85% and 65% of the curated plasmids could be replicon and MOB typed, respectively. Overall, plasmid size and the number of resistance genes were significant independent predictors of replicon and MOB typing success. We found some degree of non-concordance between replicon families and MOB types, which was only partly resolved when partitioning plasmids into finer-resolution groups (replicon and pMLST types). In some cases, non-concordance was attributed to ambiguous boundaries between MOBP and MOBQ types; in other cases, backbone mosaicism was considered a more plausible explanation. β-lactamase resistance genes tended not to show fidelity to a particular plasmid type, though some previously reported associations were supported. Overall, replicon and MOB typing schemes are likely to continue playing an important role in plasmid analysis, but their performance is constrained by the diverse and dynamic nature of plasmid genomes.

  16. Socioeconomic status affects mosquito (Diptera: Culicidae) larval habitat type availability and infestation level.

    Science.gov (United States)

    Dowling, Zara; Ladeau, Shannon L; Armbruster, Peter; Biehler, Dawn; Leisnham, Paul T

    2013-07-01

    Mosquito populations are largely regulated by processes occurring at the larval stage. We sampled mosquito larval microhabitats (mostly water-holding containers) in six neighborhoods in the Washington, DC, area that varied in socioeconomic status (SES) and housing structure (row houses vs. stand-alone houses) to test associations among these neighborhood characteristics, microhabitat abundance and parameters, and mosquito occurrence and densities. Thirty-four percent (33.9%) of sampled microhabitats contained mosquito larvae, and 93.1% of larvae were Aedes albopictus Skuse or Culex pipiens L. Five specific container types (drains, corrugated flexible drainpipes, planters, garbage cans, and buckets) accounted for the majority of water-holding (56.0%) and mosquito-positive (50.6%) microhabitats sampled. We found no associations between SES or housing structure with total microhabitat abundance per yard, mosquito occurrence or mosquito densities per microhabitat. In contrast, container purpose varied with SES, with low SES neighborhoods having greater numbers of disused containers and lower numbers of functional containers than low and medium SES neighborhoods. Ae. albopictus were 83% more abundant in disused containers, whereas Cx. pipiens were more abundant in structural and functional containers, possibly owing to species-specific oviposition and development related to water quality. Ae. albopictus densities increased over the summer, whereas Cx. pipiens densities remained constant. Ae. albopictus is usually the dominant pest in urban areas in the eastern United States; therefore, integrated mosquito management programs should incorporate the elimination of disused containers to reduce its infestation and adult production, especially in low SES neighborhoods where they occur most frequently.

  17. Fluid availability of sports drinks differing in carbohydrate type and concentration

    Energy Technology Data Exchange (ETDEWEB)

    Davis, J.M.; Burgess, W.A.; Slentz, C.A.; Bartoli, W.P. (Univ. of South Carolina, Columbia (USA))

    1990-06-01

    Plasma D2O-accumulation profiles (qualitative indices of fluid-absorption rates) were determined in eight subjects after ingestion of 275 mL of five D2O-labeled beverages: a water placebo (W), 6% maltodextrin (6% M), and three solutions containing a 6%, 8%, and 10% glucose-fructose mix (6% GF, 8% GF, and 10% GF). Except for W all beverages contained 20 mmol sodium/L and 3 mmol potassium/L. No differences in plasma D2O accumulation were found. Plasma glucose increased at 20 and 30 min after ingestion of the carbohydrate drinks and returned to baseline (6% GF and 6% M) or below (8% GF and 10% GF) by 60 min. Insulin responded similarly and, except for a slightly lower value at 30 min for 6% GF, no differences were detected. It appears that fluids in drinks containing less than or equal to 8-10% carbohydrate (simple sugars or maltodextrins) are made available for dilution in body fluids at similar rates and should be similar in replenishing body fluids lost in sweat during exercise.

  18. Species specificities among primates probed with commercially available fluorescence-based multiplex PCR typing kits.

    Science.gov (United States)

    Hiroshige, Yuuji; Ohtaki, Hiroyuki; Yoshimoto, Takashi; Ogawa, Hisae; Ishii, Akira; Yamamoto, Toshimichi

    2015-09-01

    To assess species specificities among primates of signals from short tandem repeat (STR) loci included in two commercially available kits, mainly the AmpFlSTR Identifiler kit and additionally the GenePrint PowerPlex 16 system, we analyzed 69 DNA samples from 22 nonhuman primate species representing apes, Old World Monkeys (OWMs), New World Monkeys (NWMs), and prosimians. Each prosimian species and the NWM cotton-top tamarin apparently lacked all STR loci probed. Only one peak, the amelogenin-X peak, was evident in samples from all other NWMs, except the owl monkey. In contrast, several loci, including the amelogenin-X peak, was evident in samples from each OWM species. Notably, for each ape sample, the amelogenin peaks were concordant with morphological gender of the individual. Among the primates, especially in apes, the numbers of alleles for STR loci were increasing according to their phylogenetic order: prosimiansprimates for a few commercially released multiplex STR kits examined in this study would contribute to forensic examinations.

  19. Invertebrate availability and vegetation characteristics explain use of nonnesting cover types by mature-forest songbirds during the postfledging period

    Science.gov (United States)

    Streby, Henry M.; Peterson, Sean M.; Andersen, D.E.

    2011-01-01

    Some species of mature-forest-nesting songbirds use regenerating clearcuts and forested wetlands during the postfledging period (between nesting and migration). Relatively dense vegetation structure and abundant food resources in non-mature-forest cover types have been hypothesized to explain this phenomenon. We examined the relative importance of vegetation structure and invertebrate availability on use of nonnesting cover types by adult and hatch-year Ovenbirds (Seiurus aurocapilla) and American Redstarts (Setophaga ruticilla) during the postfledging period of 2009 in northern Minnesota. We used mist nets to sample bird use of forested wetlands and regenerating clearcuts of three age groups: 1-6, 7-12, and 16-19 yr after harvest. We modeled captures of birds using vegetation characteristics and invertebrate availability sampled around nets as explanatory variables. For all birds studied, captures were best explained by food availability and secondarily by vegetation characteristics including litter depth and woody debris for Ovenbirds and canopy height for American Redstarts. Shrub-level invertebrate availability received a cumulative weight of 0.74-0.99 in Akaike's information criterion corrected ranked models for adult and hatch-year birds of both species. Vegetation density and variation in vegetation density explained almost no variation in captures of either species. We conclude that both invertebrate availability and some vegetation characteristics influence use of nonnesting cover types by Ovenbirds and American Redstarts during the postfledging period, but that invertebrate availability is generally the stronger predictor of that use. ?? 2011 Association of Field Ornithologists.

  20. Optical image hiding based on computational ghost imaging

    Science.gov (United States)

    Wang, Le; Zhao, Shengmei; Cheng, Weiwen; Gong, Longyan; Chen, Hanwu

    2016-05-01

    Imaging hiding schemes play important roles in now big data times. They provide copyright protections of digital images. In the paper, we propose a novel image hiding scheme based on computational ghost imaging to have strong robustness and high security. The watermark is encrypted with the configuration of a computational ghost imaging system, and the random speckle patterns compose a secret key. Least significant bit algorithm is adopted to embed the watermark and both the second-order correlation algorithm and the compressed sensing (CS) algorithm are used to extract the watermark. The experimental and simulation results show that the authorized users can get the watermark with the secret key. The watermark image could not be retrieved when the eavesdropping ratio is less than 45% with the second-order correlation algorithm, whereas it is less than 20% with the TVAL3 CS reconstructed algorithm. In addition, the proposed scheme is robust against the 'salt and pepper' noise and image cropping degradations.

  1. Hiding a Realistic Object Using a Broadband Terahertz Invisibility Cloak

    CERN Document Server

    Zhou, Fan; Cao, Wei; Stuart, Colin T; Gu, Jianqiang; Zhang, Weili; Sun, Cheng

    2011-01-01

    The invisibility cloak has been a long-standing dream for many researchers over the decades. The introduction of transformational optics has revitalized this field by providing a general method to design material distributions to hide the subject from detection. By transforming space and light propagation, a three-dimensional (3D) object is perceived as having a reduced number of dimensions, in the form of points, lines, and thin sheets, making it "undetectable" judging from the scattered field. Although a variety of cloaking devices have been reported at microwave and optical frequencies, the spectroscopically important Terahertz (THz) domain remains unexplored. Moreover, due to the difficulties in fabricating cloaking devices that are optically large in all three dimensions, hiding realistic 3D objects has yet to be demonstrated. Here, we report the first experimental demonstration of a 3D THz cloaking device fabricated using a scalable Projection Microstereolithography process. The cloak operates at a broa...

  2. Steganography Algorithm to Hide Secret Message inside an Image

    CERN Document Server

    Ibrahim, Rosziati

    2011-01-01

    In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (SIS) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.

  3. The effect of media on knowledge hiding in entrepreneurial firms

    DEFF Research Database (Denmark)

    Labafi, Somayeh; Khajeheian, Datis; Williams, Idongesit

    2017-01-01

    in a qualitative study. Thematic analysis is used to analyze transcribed interview data from employees in a software company in Iran. The findings of the analysis show that media richness significantly impacts on organizational learning and influences on knowledge hiding behavior in employees. This article...... suggests that entrepreneurs and managers of small firms should provide employees’ access to rich media content as well as established organizational learning as part of their organizational culture........ For this reason, factors that influence on the tendency of employees to expose and use their knowledge would be appreciated by managers of organizations. This paper investigates the effect of the media on knowledge hiding in organizations. The investigation is done with the aid of a conceptual framework...

  4. Robust color image hiding method in DCT domain

    Institute of Scientific and Technical Information of China (English)

    LI Qing-zhong; YU Chen; CHU Dong-sheng

    2006-01-01

    This paper presents a robust color image hiding method based on YCbCr color system in discrete cosine transform (DCT) domain,which can hide a secret color image behind a public color cover image and is compatible with the international image compression standard of JPEG.To overcome the grave distortion problem in the restored secret image,this paper proposes a new embedding scheme consisting of reasonable partition of a pixel value and sign embedding.Moreover,based on human visual system (HVS) and fuzzy theory,this paper also presents a fuzzy classification method for DCT sub-blocks to realize the adaptive selection of embedding strength.The experimental results show that the maximum distortion error in pixel value for the extracted secret image is ±1.And the color cover image can provide good quality after embedding large amount of data.

  5. Hiding an image in cascaded Fresnel digital holograms

    Institute of Scientific and Technical Information of China (English)

    Shaogeng Deng; Liren Liu; Haitao Lang; Weiqing Pan; Dong Zhao

    2006-01-01

    @@ A system of two separated computer-generated holograms termed cascaded Fresnel digital holography (CFDH) is proposed and its application to hiding information is demonstrated by a computer simulation experiment. The technique is that the reconstructed image is the result of the wave Fresnel diffractionof two sub-holograms located at different distances from the imaging plane along the illuminating beam. The two sub-holograms are generated by an iterative algorithm based on the projection onto convex sets. In the application to the hiding of optical information, the information to be hidden is encoded into thesub-hologram which is multiplied by the host image in the input plane, the other sub-hologram in the filterplane is used for the deciphering key, the hidden image can be reconstructed in the imaging plane of the CFDH setup.

  6. Discovery and characterization of ACT-335827, an orally available, brain penetrant orexin receptor type 1 selective antagonist.

    Science.gov (United States)

    Steiner, Michel A; Gatfield, John; Brisbare-Roch, Catherine; Dietrich, Hendrik; Treiber, Alexander; Jenck, Francois; Boss, Christoph

    2013-06-01

    Stress relief: Orexin neuropeptides regulate arousal and stress processing through orexin receptor type 1 (OXR-1) and 2 (OXR-2) signaling. A selective OXR-1 antagonist, represented by a phenylglycine-amide substituted tetrahydropapaverine derivative (ACT-335827), is described that is orally available, penetrates the brain, and decreases fear, compulsive behaviors and autonomic stress reactions in rats.

  7. Data Hiding Techniques Using Prime and Natural Numbers

    CERN Document Server

    Dey, Sandipan; Bandyopadhyay, Bijoy; Sanyal, Sugata

    2010-01-01

    In this paper, a few novel data hiding techniques are proposed. These techniques are improvements over the classical LSB data hiding technique and the Fibonacci LSB data-hiding technique proposed by Battisti et al. \\cite{r1}. The classical LSB technique is the simplest, but using this technique it is possible to embed only in first few bit-planes, since image quality becomes drastically distorted when embedding in higher bit-planes. Battisti et al. \\cite{r1} proposed an improvement over this by using Fibonacci decomposition technique and generating a different set of virtual bit-planes all together, thereby increasing the number of bit-planes. In this paper, first we mathematically model and generalize this particular approach of virtual bit-plane generation. Then we propose two novel embedding techniques, both of which are special-cases of our generalized model. The first embedding scheme is based on decomposition of a number (pixel-value) in sum of prime numbers, while the second one is based on decompositi...

  8. Hide unhairing and characterization of commercial enzymes used in leather manufacture

    Directory of Open Access Journals (Sweden)

    A Dettmer

    2011-09-01

    Full Text Available The enzymatic treatment of hides in tannery processes is a promising technology. However, the reaction kinetics of commercial enzymes available to the leather industry are not fully understood and their activities have been mainly determined with model proteins such as casein as substrate, which are not of direct relevance for cattle hides. Therefore, it is important to determine their activities on collagen and keratin, the main proteins of skin, in order to use these enzymes in leather processing. This work describes the study of five proteases, used commercially in tanneries, to assess their ability to act upon collagen and keratin and to determine their unhairing. Results showed that all commercial enzymes tested had more activity on collagen than on keratin. Unhairing was also tested and four out of the five enzymes tested showed some unhairing activity. Optima of the temperature and pH of the enzymes were very similar for all five enzymes, with maximal activities around 55ºC and pH 9 to 12, respectively.

  9. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2010-12-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  10. Effects of gasification biochar on plant-available water capacity and plant growth in two contrasting soil types

    DEFF Research Database (Denmark)

    Hansen, Veronika; Hauggaard-Nielsen, Henrik; Petersen, Carsten Tilbæk

    2016-01-01

    Abstract Gasification biochar (GB) contains recalcitrant carbon that can contribute to soil carbon sequestration and soil quality improvement. However, the impact of GB on plant-available water capacity (AWC) and plant growth in diverse soil types still needs to be explored. A pot experiment......, the reduced water regime significantly affected plant growth and water consumption, whereas the effect was less pronounced in the coarse sand. Irrespective of the soil type, both GBs increased AWC by 17–42%, with the highest absolute effect in the coarse sand. The addition of SGB to coarse sand led...

  11. Hiding Secret Text in Quick Response Code and Transforming the Position of the Secret Data using Rotation Transformation

    Directory of Open Access Journals (Sweden)

    V. Ramya

    2014-05-01

    Full Text Available In order to provide high security and safety in the field of information hiding, this study proposes a novel technology using Steganography. An exotic steganographic algorithm, is used in this study, which Hides the secret text data in a 2D plane (Here, in our case let the 2D plane be the QR code, after encryption and the position of the secret data will be changed using rotation transformation. The proposed algorithm has been tested under various imperceptibility characters such as PSNR, MSE, Human Vision Quality Metrics and Histograms are compared to both cover image and the stego image. This novel algorithm shows Lower MSE, higher PSNR values and it is evident that the proposed algorithm is robust to JPEG attacks.

  12. Soliciting Performance, Hiding Bias: Whiteness and Librarianship

    Directory of Open Access Journals (Sweden)

    Angela Galvan

    2015-06-01

    Full Text Available Image by Flickr user tweng (CC BY-SA 2.0 In Brief: Despite the growing body of research on our professional demographics and multi-year diversity initiatives, librarianship in the United States remains overwhelmingly white. I suggest the interview process is a series of repetitive gestures designed to mimic and reinforce white middle class values, which ultimately influence […

  13. Soliciting Performance, Hiding Bias: Whiteness and Librarianship

    Directory of Open Access Journals (Sweden)

    Angela Galvan

    2015-06-01

    Full Text Available Despite the growing body of research on our professional demographics and multi-year diversity initiatives, librarianship in the United States remains overwhelmingly white. I suggest the interview process is a series of repetitive gestures designed to mimic and reinforce white middle class values, which ultimately influence the hiring decisions—and relative lack of diversity—of librarianship as a whole. I consider how the whiteness of librarianship may manifest long before the hiring process. By identifying and interrogating the body of white, middle class values inherent to both librarianship and professional job searching, I offer suggestions to encourage an authentically diverse pool of applicants.

  14. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm

    Directory of Open Access Journals (Sweden)

    Ching-Yu Yang

    2012-01-01

    Full Text Available This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.

  15. HIDE & SEEK: End-to-End Packages to Simulate and Process Radio Survey Data

    CERN Document Server

    Akeret, Joel; Chang, Chihway; Monstein, Christian; Amara, Adam; Refregier, Alexandre

    2016-01-01

    As several large radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these data sets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system - from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal....

  16. Secure Reversible Data Hiding in Encrypted Images by Allocating Memory before Encryption via Security keys

    Directory of Open Access Journals (Sweden)

    Priya Jambhulkar

    2015-11-01

    Full Text Available Digital image and information embedding system have number of important multimedia applications. Recently, attention is paid to reversible data hiding (RDH in encrypted images is more, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content’s confidentiality. RDH is a technique used to hide data inside image for high security in such a way that original data is not visible. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose another method in which we simply encrypt an image without its header by using our own algorithm. And thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.

  17. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  18. Modified Approach for Hiding Sensitive Association Rules for Preserving Privacy in Database

    Directory of Open Access Journals (Sweden)

    Tania Banerjee

    2014-03-01

    Full Text Available Data mining is the process of analyzing large database to find useful patterns. The term pattern refers to the items which are frequently occurring in set of transaction. The frequent patterns are used to find association between sets of item. The efficiency of mining association rules and confidentiality of association rule is becoming one of important area of knowledge discovery in database. This paper is organized into two sections. In the system Apriori algorithm is being presented that efficiently generates association rules. These reduces unnecessary database scan at time of forming frequent large item sets .We have tried to give contribution to improved Apriori algorithm by hiding sensitive association rules which are generated by applying improved Apriori algorithm on supermarket database. In this paper we have used novel approach that strategically modifies few transactions in transaction database to decrease support and confidence of sensitive rule without producing any side effects. Thus in the paper we have efficiently generated frequent item set sets by applying Improved Apriori algorithm and generated association rules by applying minimum support and minimum confidence and then we went one step further to identify sensitive rules and tried to hide them without any side effects to maintain integrity of data without generating spurious rules.

  19. Double Hiding Information in Color Image File Based on Classical LSB Method

    Directory of Open Access Journals (Sweden)

    Aymen Mudheher Badr

    2014-07-01

    Full Text Available This study presents a two principles, Cryptography and Steganography, each tow methods work separately from the other to ensure a secure content. We are developed an algorithm to increase the safety and reliability of the copyrights of the images or books (etc. that published on the internet by providing a watermark image (as logo hiding inside the original file that we want product it. Firstly reading image (the logo image, convert it to binary and encrypted it by using EX-OR with a secret key and embedding it inside a gray image in the LSB (in the 1st and hiding first key in the 2nd bit and the second key in the 3rd bit, then we embedding them in the LSB of Original image in RGB to be protected. The two secret keys, first one as an encryption key and the second key using as signature (data that have been taken from the cover image (original to make sure the reliability of the image transmitted via the Internet.

  20. A REVIEW ON HEAVY METALS CONTENTS IN HIDE, SKIN AND PROCESSED LEATHERS

    Directory of Open Access Journals (Sweden)

    KOIZHAIGANOVA Meruyert

    2016-05-01

    Full Text Available Heavy metals are metals with high atomic weight which can be deposited in soil, water, plants and animals. It is generally known that mammal tissues are good bioindicators of trace elements, including heavy metals. Heavy metal analysis serves to identify and quantify the elements that are a potential hazard to the consumer after varying levels of contact. Usage area of leather is increasingly expanding in these days and it has also become a material requested and demanded by effect of fashion. Leather must protect its appearance and physical stability and also be problem-free in ecological terms and harmless to human health. There is a lack of data concerning the content of toxic elements in raw hide and skin of animals. Mainly information concerning metals content, including toxic ones, in processed leathers may be found in the literature. The aim of the present study was to review and compare the content of some heavy metals in raw hide, skin and the processed leathers in order to evaluate their accumulation and transition to the end-up product.

  1. Short communication. The role of animal-sourced insulin in the treatment of type 1 diabetes and its availability.

    Science.gov (United States)

    Klein, A V; Taylor, E; Legaré, C; Vu, D; Griffiths, E

    2014-07-01

    As a result of a number of factors, the treatment of insulin-dependent diabetes has moved away from using insulin of beef or pork origin to using recombinant (biosynthetic) insulin preparations. However, some people with type 1 diabetes can manage their diabetes better using animal-sourced insulin. Despite dwindling options and decreased production, animal-sourced insulin (and pork insulin in particular) is still available on the Canadian market. This communication describes the actions taken by Health Canada with respect to the availability of animal insulin.

  2. Function S-rough sets and security-authentication of hiding law

    Institute of Scientific and Technical Information of China (English)

    SHI KaiQuan; ZHAO JianLi

    2008-01-01

    Function S-rough sets are defined by R-function equivalence class,which have dynamic characteristic.Function S-rough sets have dynamic characteristic,law characteristic and law-hiding characteristic.Function S-rough sets can generate f-hiding law and f-hiding law.By engrafting,crossing,and penetrating between the information security theory and function S-rough sets,the security hiding and the authentication of f-hiding law and f-hiding law are given respectively in this paper.The fusion and share between function S-rough sets and information secu-rity theory is a new research direction of the application of information law in in-formation system.

  3. Cryptic cuckoo eggs hide from competing cuckoos.

    Science.gov (United States)

    Gloag, Ros; Keller, Laurie-Anne; Langmore, Naomi E

    2014-10-07

    Interspecific arms races between cuckoos and their hosts have produced remarkable examples of mimicry, with parasite eggs evolving to match host egg appearance and so evade removal by hosts. Certain bronze-cuckoo species, however, lay eggs that are cryptic rather than mimetic. These eggs are coated in a low luminance pigment that camouflages them within the dark interiors of hosts' nests. We investigated whether cuckoo egg crypsis is likely to have arisen from the same coevolutionary processes known to favour egg mimicry. We added high and low luminance-painted eggs to the nests of large-billed gerygones (Gerygone magnirostris), a host of the little bronze-cuckoo (Chalcites minutillus). Gerygones rarely rejected either egg type, and did not reject natural cuckoo eggs. Cuckoos, by contrast, regularly removed an egg from clutches before laying their own and were five times more likely to remove a high luminance model than its low luminance counterpart. Given that we found one-third of all parasitized nests were exploited by multiple cuckoos, our results suggest that competition between cuckoos has been the key selective agent for egg crypsis. In such intraspecific arms races, crypsis may be favoured over mimicry because it can reduce the risk of egg removal to levels below chance.

  4. Hiding in Plain Sight: Street artists online

    Directory of Open Access Journals (Sweden)

    Kim Barbour

    2013-10-01

    Full Text Available Identity and privacy concerns related to social media are the subject of widespread academic enquiry and mass media reporting. Although in most circumstances academic research tends to present identity play and online self­presentation as positive, media reporting in Australia makes much of the risks of identity theft, privacy breaches and online predators. This research explores the phenomenological experience of creating an online persona, focusing particularly on street artists. For street artists, the threat of unwanted exposure has to be balanced with the positive implications of sharing their creative work outside its geographical and temporal constraints. I argue that street artists use complex persona­creation strategies in order to both protect and promote themselves. The two street artists discussed in this article experience their engagement with social media and digital networks in ways that offer new insight into the opportunities and problems associated with the presentation of a persona online.

  5. An Advancement To The Security Level Through Galois Field In The Existing Password Based Technique Of Hiding Classified Information In Images

    Directory of Open Access Journals (Sweden)

    Mita Kosode

    2015-06-01

    Full Text Available Abstract In this paper we are using the existing passcode based approach of hiding classified information in images with addition of the Galois field theorywhich is advancing the security level to make this combination method extremely difficult to intercept and useful for open channel communication while maintaining the losses and high speed transmission.

  6. Availability of more healthful food alternatives in traditional, convenience, and nontraditional types of food stores in two rural Texas counties.

    Science.gov (United States)

    Bustillos, Brenda; Sharkey, Joseph R; Anding, Jenna; McIntosh, Alex

    2009-05-01

    Limited research has focused on the availability of more healthful food alternatives in traditional food stores (supermarkets and grocery stores) in rural areas. Current market trends suggest that food items may be available for purchase in stores other than traditional food stores. An observational survey was developed and used on-site to document the availability and variety of fruit and vegetables (fresh, canned, and frozen), meats (meat, poultry, fish, and eggs), dairy (milk, yogurt, and cheese), and grains (whole grains and refined grains) in all traditional food stores, convenience stores, and nontraditional food stores (dollar stores and mass merchandisers) in two rural Texas counties. Descriptive statistics and t tests identified that although the widest selection of more healthful food items was available in supermarkets, not all supermarkets carried all items. Grocery stores carried less variety of fresh fruits (8+/-0.7 vs 4.7+/-0.3; Pfood stores. Among convenience and nontraditional food stores, "dollar" stores offered the best variety of more healthful canned fruits and vegetables, whole-wheat bread, and whole-grain cereal. Mass merchandisers and dollar stores offered a greater variety of more healthful types of canned tuna and poultry, reduced-fat and skim milk, and low-fat tortillas. In these rural counties, traditional food stores offered greater availability of more healthful food choices across food groups. More healthful food choices in canned fruits and vegetables, canned meat and fish, milk, and grains were also available in dollar stores, mass merchandisers, and convenience stores. Results suggest that a complete understanding of the food environment, especially in rural areas, requires knowledge of the availability and variety of healthful food in all types of stores that are accessible to families.

  7. Hiding message into DNA sequence through DNA coding and chaotic maps.

    Science.gov (United States)

    Liu, Guoyan; Liu, Hongjun; Kadir, Abdurahman

    2014-09-01

    The paper proposes an improved reversible substitution method to hide data into deoxyribonucleic acid (DNA) sequence, and four measures have been taken to enhance the robustness and enlarge the hiding capacity, such as encode the secret message by DNA coding, encrypt it by pseudo-random sequence, generate the relative hiding locations by piecewise linear chaotic map, and embed the encoded and encrypted message into a randomly selected DNA sequence using the complementary rule. The key space and the hiding capacity are analyzed. Experimental results indicate that the proposed method has a better performance compared with the competing methods with respect to robustness and capacity.

  8. A place to hide in the home-cage decreases yolk androgen levels and offspring emotional reactivity in Japanese quail.

    Directory of Open Access Journals (Sweden)

    Vanessa Guesdon

    Full Text Available An animal's emotional responses are the result of its cognitive appraisal of a situation. This appraisal is notably influenced by the possibility of an individual to exert control over an aversive event. Although the fact that environment controllability decreases emotional responses in animals is well established, far less is known about its potential trans-generational effects. As the levels of avian yolk hormones can vary according to the mother's environment, we hypothesized that housing environment of mothers would modulate the quality of her eggs and in turn her offspring's behaviour. Two groups of female Japanese quail were constituted: a group that had access to a place to hide in their home-cage (Hd, n = 20 and a group that had nowhere to hide (NoHd, n = 20 when stressed. Both groups were submitted to daily human disturbances for a twenty-day-period. Hd females produced eggs with both less testosterone and androstenedione than did NoHd females. The emotional and social reactivity of Hd females' offspring were lower and their growth was slower than those of NoHd females' offspring. Our results show that a minor difference in housing environment had substantial effects on eggs and offspring. The presence of a shelter probably helped quail to cope with daily human disturbances, producing less reactive offspring. This transgenerational effect caused by an opportunity to hide could lead to applications in care of laboratory animals, conservation biology and animal welfare.

  9. A New Images Hiding Scheme Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    LIU Nian-sheng; GUO Dong-hui; WU Bo-xi; Parr G

    2005-01-01

    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of covert image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).

  10. Text Hiding Based on True Color Image Classification

    OpenAIRE

    Shahd Abdul-Rhman Hasso

    2012-01-01

    In this work a new approach was built to apply k-means algorithm on true colored images (24bit images) which are usually treated by researchers as three image (RGB) that are classified to 15 class maximum only. We find the true image as 24 bit and classify it to more than 15 classes. As we know k-means algorithm classify images to many independent classes or features and we could increase the class number therefore we could hide information in the classes or features that have minimum number ...

  11. Approaches to Computer Modeling of Phosphate Hide-Out.

    Science.gov (United States)

    1984-06-28

    phosphate acts as a buffer to keep pH at a value above which acid corrosion occurs . and below which caustic corrosion becomes significant. Difficulties are...ionization of dihydrogen phosphate : HIPO - + + 1PO, K (B-7) H+ + - £Iao 1/1, (B-8) H , PO4 - + O- - H0 4 + H20 K/Kw (0-9) 19 * Such zero heat...OF STANDARDS-1963-A +. .0 0 0 9t~ - 4 NRL Memorandum Report 5361 4 Approaches to Computer Modeling of Phosphate Hide-Out K. A. S. HARDY AND J. C

  12. Analysis of plant available water in the context of climate change using Thornthwaite type monthly water balance model

    Science.gov (United States)

    Herceg, Andras; Gribovszki, Zoltan; Kalicz, Peter

    2016-04-01

    The hydrological impact of climate change can be dramatic. The primary objective of this paper was to analyze plant available water in the context of climate change using Thornthwaite type monthly water balance calibrated by remote sensing based ET maps. The calibrated model was used for projection on the basis of 4 climate model datasets. The 3 periods of projection were: 2010-2040, 2040-2070, and 2070-2100. The benefit of this method is its robust build up, which can be applied if temperature and precipitation time series are accessible. The key parameter is the water storage capacity of the soil (SOILMAX), which can be calibrated using the actual available evapotranspiration data. If the soil's physical properties are available, the maximal rooting depth is also projectable. Plant available water was evaluated for future scenarios focusing water stress periods. For testing the model, a dataset of an agricultural parcel next to Mosonmagyaróvár and a dataset of a small forest covered catchment next to Sopron were successfully used. Each of the models projected slightly ascending evapotranspiration values (+7 percent), but strongly decreasing soil moisture values (-15 percent) for the 21st century. The soil moisture minimum values (generally appeared at the end of the summer) reduced more than 50 percent which indicate almost critical water stress for vegetation. This research has been supported by Agroclimate.2 VKSZ_12-1-2013-0034 project.

  13. Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography

    CERN Document Server

    Ganesh, Vijay; Rinard, Martin

    2012-01-01

    We propose a novel approach to improving software security called Cryptographic Path Hardening, which is aimed at hiding security vulnerabilities in software from attackers through the use of provably secure and obfuscated cryptographic devices to harden paths in programs. By "harden" we mean that certain error-checking if-conditionals in a given program P are replaced by equivalent" we mean that adversaries cannot use semi-automatic program analysis techniques to reason about the hardened program paths and thus cannot discover as-yet-unknown errors along those paths, except perhaps through black-box dictionary attacks or random testing (which we can never prevent). Other than these unpreventable attack methods, we can make program analysis aimed at error-finding "provably hard" for a resource-bounded attacker, in the same sense that cryptographic schemes are hard to break. Unlike security-through-obscurity, in Cryptographic Path Hardening we use provably-secure crypto devices to hide errors and our mathemati...

  14. A secure and robust information hiding technique for covert communication

    Science.gov (United States)

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.

    2015-08-01

    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  15. 9 CFR 95.24 - Methods for disinfection of hides, skins, and other materials.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Methods for disinfection of hides... ENTRY INTO THE UNITED STATES § 95.24 Methods for disinfection of hides, skins, and other materials... subjected to disinfection by methods found satisfactory and approved from time to time by the Deputy...

  16. Tactical deception to hide sexual behaviour : macaques use distance, not visibility

    NARCIS (Netherlands)

    Overduin-de Vries, A. M.; Spruijt, B. M.; de Vries, H.; Sterck, E. H. M.

    2015-01-01

    Although tactical deception (TD) may be employed to hide sexual behaviour, there is as yet no firm evidence for it. Hiding may be guided by cognitive mechanisms consistent with either no, low or high level TD, such as exploiting male peripheral positions (no TD), creating distance (TD level 1) or hi

  17. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    Directory of Open Access Journals (Sweden)

    A.A. Mohamed

    2014-07-01

    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.

  18. ENTROPY BASED DATA HIDING ON DOCUMENT IMAGES APPLIED ON DRDM APPROACH

    Directory of Open Access Journals (Sweden)

    Sadia Aslam

    2013-03-01

    Full Text Available This paper presents a data hiding application for document images providing security. Document images should be in bitmap format as well as grayscale in nature otherwise the developed system will automatically change it to grayscale. The system accepts any grayscale document image as an input and applies the developed technique on it. Developed technique is based on Entropy Based that selects the suitable areas in an image for that data insertion purpose. Output produced by the system is the processed document that is data embedded. Processed document should not look different from the original image means its visual quality should be high. The system is successfully tested for the test cases generated to check the effectiveness, quality and validation of the system. The system is developed using Matlab 7.7.0 (R2008b for the development of front end as well as the back end.

  19. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  20. Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload

    Directory of Open Access Journals (Sweden)

    Zhaoxia Yin

    2014-01-01

    Full Text Available This paper proposes a separable reversible data-hiding scheme in encrypted image which offers high payload and error-free data extraction. The cover image is partitioned into nonoverlapping blocks and multigranularity encryption is applied to obtain the encrypted image. The data hider preprocesses the encrypted image and randomly selects two basic pixels in each block to estimate the block smoothness and indicate peak points. Additional data are embedded into blocks in the sorted order of block smoothness by using local histogram shifting under the guidance of the peak points. At the receiver side, image decryption and data extraction are separable and can be free to choose. Compared to previous approaches, the proposed method is simpler in calculation while offering better performance: larger payload, better embedding quality, and error-free data extraction, as well as image recovery.

  1. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  2. Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption

    Directory of Open Access Journals (Sweden)

    Harish G, Smitha Shekar B, Prajwal R, Sunil S Shetty

    2014-07-01

    Full Text Available Recently, more and more attention is paid to reversible data hiding (RDH in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may subject to some errors on data extraction and/or image restoration. Here, a novel method is proposed so as to reserve room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, i.e., data extraction and image recovery are free of any error.

  3. Block Based Information Hiding using Cosine, Hartley, Walsh and Haar Wavelets

    Directory of Open Access Journals (Sweden)

    H. B. Ke kre

    2013-04-01

    Full Text Available Steganography is the art of hiding informationwithin other information in such a way that it ishard or even impossible to tell that it is there. Thereare many different carriers for steganography butthe most popular is digital images. Typically, themessage is embedded within another image knownas a cover image, by tweaking its properties. Theresulting output, known as astego-image isengineered such that it is a near identicalperceptual model of the cover image, but it will alsocontain the hiddenmessage.It is this stego-imagethat is sent between the sender and the receiver.Steganography is a science for invisiblecommunication and play vital role on the networksecurity.To improve the embedding capacity as wellas to have minimum distortion tocarrier media, we

  4. A New Method for Text Hiding in the Image by Using LSB

    Directory of Open Access Journals (Sweden)

    Reza tavoli

    2016-04-01

    Full Text Available an important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data-hiding science which aims to reach a desirable level of security in the exchange of private military and commercial data which is not clear. These approaches can be used as complementary methods of encryption in the exchange of private data.

  5. Alien invasions and the game of hide and seek in Patagonia.

    Directory of Open Access Journals (Sweden)

    Martin Lindegren

    Full Text Available The introduction, establishment and spread of alien species is a major threat to biodiversity and the provision of ecosystem services for human wellbeing. In order to reduce further loss of biodiversity and maintain productive and sustainable ecosystems, understanding the ecological mechanisms underlying species invasions and avoiding potentially harmful effects on native communities is urgently needed, but largely lacking. We here demonstrate, by means of hydroacoustics and advanced spatial modelling, how native fish species as a result of previous exposure to native predators may successfully respond to invasive novel predators through a complicated game of hide and seek, minimizing spatio-temporal overlap with predators, and potentially facilitating coexistence between native prey species (Galaxiids and introduced novel predators (Salmonids in a deep Andean lake, Patagonia.

  6. Mother-young recognition in goitered gazelle during hiding period.

    Science.gov (United States)

    Blank, D A; Yang, W

    2017-09-01

    The mother-young recognition process is crucial for the growth and survival of progeny. In "follower" ungulate species, vocal and visual cues have been found to play a leading role in the mother-young identification process from the first days postpartum, with olfactory cues also important in establishing the initial selective mother-young bond immediately after birth. In "hider" species, however, much less has been documented of mother-young recognition behaviors, especially in their natural habitat. In this paper, we investigated this process in goitered gazelle (Gazella subgutturosa), a typical hider species, in its native environment in Kazakhstan. Over the course of our study period, we investigated the behaviors of 257 females with twins and 158 females with singles through visual observations. We found that within the first month after birth, when females spend only a short time with their young, mothers recognized their fawns using mostly olfactory cues, while vision was used to locate their hiding offspring. Fawns vocalized very rarely, producing only distress calls that did not seem intended for individual identification. Licking of young by their mothers was observed frequently, not only during the first week after birth, when this action was very important for fawn stimulation for a number of physiological functions, but for several weeks after (until one month of age), when licking lost its physiological importance and likely became more of a recognition procedure. Fawns did not recognize their mothers at all, either through vision or vocalizations, since during their first weeks after birth, they responded to any gazelle that approached their hiding area. By a month after birth, when mothers and fawns began to stay together for longer periods of time, their recognition process became more enhanced, and in addition to olfactory cues, the mother and her young began to use more and more visual cues for longer distance identification, as well as

  7. Hiding Secret Information in Movie Clip: A Steganographic Approach

    CERN Document Server

    Sahoo, G

    2011-01-01

    Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the internet. One of the key methods for establishing hidden communication is steganography. Modern day steganography mainly deals with hiding information within files like image, text, html, binary files etc. These file contains small irrelevant information that can be substituted for small secret data. To store a high capacity secret data these carrier files are not very supportive. To overcome the problem of storing the high capacity secret data with the utmost security fence, we have proposed a novel methodology for concealing a voluminous data with high levels of security wall by using movie clip as a carrier file.

  8. Universal Steganalysis of Data Hiding in Grayscale Images

    Institute of Scientific and Technical Information of China (English)

    HUANG Ji-feng; LIN Jia-jun

    2007-01-01

    This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy.

  9. Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function

    Directory of Open Access Journals (Sweden)

    Najme Maleki

    2014-07-01

    Full Text Available This paper presents two adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Our adaptive scheme is based on the concept of human vision sensitivity, so the pixels in edge areas than to smooth areas can tolerate much more changes without making visible distortion for human eyes. In our adaptive scheme, the average differencing value of four neighborhood pixels into a block via a threshold secret key determines whether current block is located in edge or smooth area. Pixels in the edge areas are embedded by Q-bit of secret data with a larger value of Q than that of pixels placed in smooth areas. Also in this scholar, we represent one non-adaptive data hiding algorithm. Our non-adaptive scheme, via an error reduction procedure, produces a high visual quality for stego-image. The proposed schemes present several advantages. 1-of aspects the embedding capacity and visual quality of stego-image are scalable. In other words, the embedding rate as well as the image quality can be scaled for practical applications 2-the high embedding capacity with minimal visual distortion can be achieved, 3-our methods require little memory space for secret data embedding and extracting phases, 4-secret keys have used to protect of the embedded secret data. Thus, level of security is high, 5-the problem of overflow or underflow does not occur. Experimental results indicated that the proposed adaptive scheme significantly is superior to the currently existing scheme, in terms of stego-image visual quality, embedding capacity and level of security and also our non-adaptive method is better than other non-adaptive methods, in view of stego-image quality. Results show which our adaptive algorithm can resist against the RS steganalysis attack.

  10. CHARACTERISTICS OF LIPID METABOLISM IN PATIENTS WITH TYPE 1 DIABETES, DEPENDING ON THE AVAILABILITY OF DIABETIC MICROANGIOPATHY AND DIET

    Directory of Open Access Journals (Sweden)

    Yu. G. Samoilova

    2014-01-01

    Full Text Available Was investigated 67 children (36 boys and 31 girls in age from 6 to 18 years old, with type 1 diabetes patients who were treated at the Children's Hospital Endocrinology number 1 inTomsk, average age of the boys at the time of the survey amounted to (13.0 ± 0.4 years, girls – (13.5 ± 0.4 years. All children diagnosed with type 1 diabetes were under subcompensation. Clinical evaluation of patients included a medical history, physical examination, evaluation of physical development. A study of lipid profile (high-density lipoprotein (HDL cholesterol, low-density lipoprotein (LDL, cholesterol (TC, triglycerides (TG, atherogenic index. Screening for diabetic retinopathy was performed by examining the fundus by direct ophthalmoscopy after pupil dilation. Diagnosis of diabetic nephropathy, retinopathy performed according to the classification. Patients were divided into groups depending on the presence of complications, and the level of compensation lipid metabolism (children with satisfactory compensation of lipid metabolism (total cholesterol level less than 5.2 mmol / l, children with poor compensation lipid metabolism (total cholesterol above 5.2 mmol / l. Nature of the subjects studied nutrition using  a questionnaire drawn up on the basis of the standard dietary questionnaire program CINDI, allowing to evaluate the eating habits by examining the frequency of intake of various foods, food preferences and priorities. Products, according to the lipid-lowering diet on the recommendations of the European Society for atherosclerosis were combined and divided into groups according to frequency of use: commonly used products, and rarely use the products. Mathematical treatment of the results was performed using the software package Statistica 5.5 for Windows. In the first phase expected to total group performance statistics – the arithmetic mean value M and the error of the mean m, as well as visualization of the distribution of values

  11. 31P NMR characterization and efficiency of new types of water-insoluble phosphate fertilizers to supply plant-available phosphorus in diverse soil types.

    Science.gov (United States)

    Erro, Javier; Baigorri, Roberto; Yvin, Jean-Claude; Garcia-Mina, Jose M

    2011-03-01

    Hydroponic plant experiments demonstrated the efficiency of a type of humic acid-based water-insoluble phosphate fertilizers, named rhizosphere controlled fertilizers (RCF), to supply available phosphorus (P) to different plant species. This effect was well correlated to the root release of specific organic acids. In this context, the aims of this study are (i) to study the chemical nature of RCF using solid-state (31)P NMR and (ii) to evaluate the real efficiency of RCF matrix as a source of P for wheat plants cultivated in an alkaline and acid soil in comparison with traditional water-soluble (simple superphosphate, SSP) and water-insoluble (dicalcium phosphate, DCP) P fertilizers. The (31)P NMR study revealed the formation of multimetal (double and triple, MgZn and/or MgZnCa) phosphates associated with chelating groups of the humic acid through the formation of metal bridges. With regard to P fertilizer efficiency, the results obtained show that the RCF matrix produced higher plant yields than SSP in both types of soil, with DCP and the water-insoluble fraction from the RCF matrix (WI) exhibiting the best results in the alkaline soil. By contrast, in the acid soil, DCP showed very low efficiency, WI performed on a par with SSP, and RCF exhibited the highest efficiency, thus suggesting a protector effect of humic acid from soil fixation.

  12. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    CERN Document Server

    Wilke, C O; Wilke, Claus O.; Novella, Isabel S.

    2003-01-01

    Background. In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, was found to avoid extinction and remain in the population for long periods of time. This observation was called quasispecies memory. The origin of quasispecies memory is not fully understood. Results. We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.). The mutant's frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases t...

  13. STUDY ON AUDIO INFORMATION HIDING METHOD BASED ON MODIFIED PHASE PARTITION

    Institute of Scientific and Technical Information of China (English)

    Tong Ming; Hao Chongyang; Liu Xiaojun; Chen Yanpu

    2005-01-01

    Hiding efficiency of traditional audio information hiding methods is always low since the sentience similarity cannot be guaranteed. A new audio information hiding method is proposed in this letter which can impose the insensitivity with the audio phase for auditory and realize the information hiding through specific algorithm in order to modify local phase within the auditory perception. The algorithm is to introduce the operation of "set 1" and "set 0" for every phase vectors, then the phases must lie on the boundary of a phase area after modified. If it lies on "1" boundary, it comes by set 1 operation. If it lies on "0" boundary, it comes by set 0 operation. The results show that, compared with the legacy method, the proposed method has better auditory similarity, larger information embedding capacity and lower code error rate. As a kind of blind detect method, it fits for application scenario without channel interference.

  14. An evaluation of selected methods for the decontamination of cattle hides prior to skinning.

    Science.gov (United States)

    Small, A; Wells-Burr, B; Buncic, S

    2005-02-01

    The effectiveness of different decontamination treatments in reducing microbial loads on cattle hides was assessed. The 10-s hide treatments were conducted using a wet-and-dry vacuum cleaner filled with one of the liquids (heated to 50 °C) indicated below, followed or not by 10-min drying in the air. Also, the hide was clipped, followed or not by 10-s singeing using a hand-held blowtorch. Before and after each decontamination treatment, the hide was sampled (100 cm(2) areas) by a sponge-swabbing method to compare the total viable counts of bacteria (TVC). The largest bacterial reduction (Psanitizer solution (10% Betane Plus) resulted in significant reductions of 1.80 (Pefficacy of these treatments in the reduction of specific pathogens under commercial conditions.

  15. Insight into error hiding: exploration of nursing students' achievement goal orientations.

    Science.gov (United States)

    Dunn, Karee E

    2014-02-01

    An estimated 50% of medication errors go unreported, and error hiding is costly to hospitals and patients. This study explored one issue that may facilitate error hiding. Descriptive statistics were used to examine nursing students' achievement goal orientations in a high-fidelity simulation course. Results indicated that although this sample of nursing students held high mastery goal orientations, they also held moderate levels of performance-approach and performance-avoidance goal orientations. These goal orientations indicate that this sample is at high risk for error hiding, which places the benefits that are typically gleaned from a strong mastery orientation at risk. Understanding variables, such as goal orientation, that can be addressed in nursing education to reduce error hiding is an area of research that needs to be further explored. This article discusses the study results and evidence-based instructional practices for this sample's achievement goal orientation profile.

  16. 16 CFR 1630.61 - Hide carpets and rugs-alternative washing procedure.

    Science.gov (United States)

    2010-01-01

    ... natural “lay” of the hair structure for ten complete strokes. (8) Place test specimen in a circulating... wool or hair attached to the hide with no synthetic fibers and (2) have been treated with a fire...

  17. 16 CFR 1631.61 - Hide carpets and rugs-alternative washing procedure.

    Science.gov (United States)

    2010-01-01

    ... natural “lay” of the hair structure for ten complete strokes. (8) Place test specimen in a circulating... wool or hair attached to the hide with no synthetic fibers and (2) have been treated with a fire...

  18. Differences between Used and Available Microhabitats and Vegetation Types for Giant Gartersnakes Associated with a Restored Marsh in California

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — These data describe differences in percent cover of microhabitats and vegetation types at giant gartersnake locations and random points paired with giant gartersnake...

  19. Hiding effort to gain a competitive advantage: Evidence from China.

    Science.gov (United States)

    Zhao, Li; Heyman, Gail D

    2016-06-06

    Previous studies with Western populations have shown that adolescents' tendency to downplay their academic effort is affected by two kinds of motives: ability-related motives (e.g., to appear competent) and social approval motives (e.g., to be popular). In this research, we test for the presence of additional competition-related motives in China, a culture placing strong emphasis on academic competition. Study 1 (N = 150) showed that, in response to a scenario in which a hard-working high-school junior hid effort from classmates, the most highly endorsed explanation was "to influence others to work less hard to maintain a competitive advantage." Study 2 (N = 174) revealed that competition-related explanations were endorsed relatively more often when the speaker and audience had similar academic rankings. This tendency was most evident when both speaker and audience were top performers, and when this was the case, participants' desire to demonstrate superiority over others was a positive predictor of endorsement of competition-related motives. Study 3 (N = 137) verified that competition-related motives were more strongly endorsed among Chinese participants than U.S. These results suggest that at least in cultures that emphasize academic competition and in contexts where competition is salient, hiding effort is often about attempting to gain strategic advantage. © 2016 International Union of Psychological Science.

  20. Experimental Test of Quantum No-Hiding Theorem

    CERN Document Server

    Samal, Jharana Rani; Kumar, Anil

    2010-01-01

    Linearity and unitarity are two fundamental tenets of quantum theory. Any consequence that follows from these must be respected in the quantum world. The no-cloning theorem and the no-deleting theorem are the consequences of the linearity and the unitarity. Together with the stronger no-cloning theorem they provide permanence to quantum information, thus, suggesting that in the quantum world information can neither be created nor be destroyed. In this sense quantum information is robust, but at the same time it is also fragile because any interaction with the environment may lead to loss of information. Recently, another fundamental theorem was proved, namely, the no-hiding theorem that addresses precisely the issue of information loss. It says that if any physical process leads to bleaching of quantum information from the original system, then it must reside in the rest of the universe with no information being hidden in the correlation between these two subsystems. This has applications in quantum teleporta...

  1. In vitro availability of iron and zinc: Effects of the type, concentration and fractions of digestion products of the protein

    NARCIS (Netherlands)

    Pérez-Llamas, F.; Diepenmaat-Wolters, M.G.E.; Zamora, S.

    1996-01-01

    An in vitro dialysis method was employed to determine the effect on the Fe and Zn absorption of the type (beef, pork and soyabean) and the amount (10 and 30 g/kg) of protein present. In addition, the effects of low- and high-molecular-weight (LMW and HMW respectively) digestion products were investi

  2. 24 CFR 906.5 - Dwelling units and types of assistance that a PHA may make available under a homeownership...

    Science.gov (United States)

    2010-04-01

    ... forgiveness funding not already committed to another purpose. (3) In accordance with the rules and regulations... housing choice voucher funds available to provide assistance to a family purchasing a unit under this...

  3. The effect of probiotics (Lactobacillus rhamnosus HN001, Lactobacillus paracasei LPC-37, and Lactobacillus acidophilus NCFM) on the availability of minerals from Dutch-type cheese.

    Science.gov (United States)

    Aljewicz, Marek; Siemianowska, Ewa; Cichosz, Grażyna; Tońska, Elżbieta

    2014-01-01

    The use of probiotic cultures in the production of Dutch-type cheeses did not lead to significant changes in their chemical composition but it lowered their acidity. The availability of calcium and magnesium analyzed by in vitro enzymatic hydrolysis was 19 and 35%, respectively; the availability of phosphorus was significantly higher, at >90%. The use of probiotic cultures significantly increased the availability of calcium (~2.5%), phosphorus (~6%), and magnesium (~18%). The in vitro method supports accurate determination of the effect of the Lactobacillus spp. cultures on the availability of mineral compounds ingested with Dutch-type cheese.

  4. Emissions Associated with Electric Vehicle Charging: Impact of Electricity Generation Mix, Charging Infrastructure Availability, and Vehicle Type

    Energy Technology Data Exchange (ETDEWEB)

    McLaren, Joyce [National Renewable Energy Lab. (NREL), Golden, CO (United States); Miller, John [National Renewable Energy Lab. (NREL), Golden, CO (United States); O' Shaughnessy, Eric [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wood, Eric [National Renewable Energy Lab. (NREL), Golden, CO (United States); Shapiro, Evan [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2016-04-11

    With the aim of reducing greenhouse gas emissions associated with the transportation sector, policy-makers are supporting a multitude of measures to increase electric vehicle adoption. The actual level of emission reduction associated with the electrification of the transport sector is dependent on the contexts that determine when and where drivers charge electric vehicles. This analysis contributes to our understanding of the degree to which a particular electricity grid profile, vehicle type, and charging patterns impact CO2 emissions from light-duty, plug-in electric vehicles. We present an analysis of emissions resulting from both battery electric and plug-in hybrid electric vehicles for four charging scenarios and five electricity grid profiles. A scenario that allows drivers to charge electric vehicles at the workplace yields the lowest level of emissions for the majority of electricity grid profiles. However, vehicle emissions are shown to be highly dependent on the percentage of fossil fuels in the grid mix, with different vehicle types and charging scenarios resulting in fewer emissions when the carbon intensity of the grid is above a defined level. Restricting charging to off-peak hours results in higher total emissions for all vehicle types, as compared to other charging scenarios.

  5. A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding

    CERN Document Server

    Dey, Sandipan; Sane, Suneeta; Sanyal, Sugata

    2010-01-01

    In this paper, we suggest a lower and an upper bound for the Generalized Fibonacci-p-Sequence, for ?different values of p. The Fibonacci-p-Sequence is a generalization of the Classical Fibonacci Sequence. We ?first show that the ratio of two consecutive terms in generalized Fibonacci sequence converges to a p-degree polynomial and then use this result to prove the bounds for generalized Fibonacci-p sequence, thereby generalizing the exponential bounds for classical Fibonacci Sequence. Then we show how these results can be used to prove efficiency for data hiding techniques using generalized Fibonacci sequence. These steganographic techniques use generalized Fibonacci-p-Sequence for increasing number available of bit-planes to hide data, so that more and more data can be hidden into the higher bit-planes of any pixel without causing much distortion of the cover image. This bound can be used as a theoretical proof for efficiency of those techniques, for instance it explains why more and more data can be hidden ...

  6. 5 CFR 892.211 - What options are available to me if I go on a period of leave without pay (LWOP) or other types...

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false What options are available to me if I go on a period of leave without pay (LWOP) or other types of non-pay status? 892.211 Section 892.211... What options are available to me if I go on a period of leave without pay (LWOP) or other types of non...

  7. Olive fruit fly (Diptera: Tephritidae) populations in relation to region, trap type, season, and availability of fruit.

    Science.gov (United States)

    Yokoyama, Victoria Y; Miller, Gina T; Stewart-Leslie, Judy; Rice, Richard E; Phillips, Phil A

    2006-12-01

    Olive fruit fly, Bactrocera oleae (Gmelin), was monitored with adult captures by season and trap type, and was related to fruit volume and nonharvested fruit to elucidate the occurrence of the newly introduced pest in California. The highest numbers of adults captured in ChamP traps in olive trees, Olea europaea, were in October in an inland valley location, and in September in a coastal location. Comparisons of trap types showed that the number of olive fruit fly adults captured in Pherocon AM traps in a commercial orchard was significantly greater than in ChamP traps. A significantly greater number of females were captured in Pherocon AM traps with bait packets and pheromone lures than traps with pheromone lures alone, while a significantly greater number of adults and males were captured in traps with pheromone lures alone. Significantly more adults were captured in ChamP traps with bait packets and pheromone lures versus traps with bait packets alone. Fruit volume increased by four times from mid-June to mid-November. Olive fruit fly was found to oviposit on small olive fruit fruit set, the maximum number of ovipositional sites per fruit occurred in October, and the greatest number of pupae and adults were reared from fruit collected in September and October. The highest numbers of pupae were collected from nonharvested fruit in March when high numbers of adults were captured in the same orchard.

  8. CO2 emissions associated with electric vehicle charging: The impact of electricity generation mix, charging infrastructure availability and vehicle type

    Energy Technology Data Exchange (ETDEWEB)

    McLaren, Joyce; Miller, John; O’Shaughnessy, Eric; Wood, Eric; Shapiro, Evan

    2016-06-01

    The emission reduction benefits of EVs are dependent on the time and location of charging. An analysis of battery electric and plug-in hybrid vehicles under four charging scenarios and five electricity grid profiles shows that CO2 emissions are highly dependent on the percentage of fossil fuels in the grid mix. Availability of workplace charging generally results in lower emissions, while restricting charging to off-peak hours results in higher total emissions.

  9. Information Hiding and Countermeasures%信息隐藏技术及其攻击方法

    Institute of Scientific and Technical Information of China (English)

    吴树峰; 黄刘生; 卢继军; 陈国良

    2003-01-01

    Information Hiding Technology has a long history. With the development of Digital Technology,it has become a newly evolved discipline and a hot research area. Since the first Information Hiding Workshop held in 1996 ,thetechnology has been widely applied to areas such as multimedia ,signal processing and protection of software Intellectual Property,but the research work in secure communication is relatively fewer. Based on success of developing asteganography tool for communication,this article summarizes the current progress in the research of InformationHiding Technology systematically, and analyzes possible countermeasures against various Information Hiding techniques.

  10. The Costs of Hiding and Faking Emotions: The Case of Extraverts and Introverts.

    Science.gov (United States)

    Seger-Guttmann, Tali; Medler-Liraz, Hana

    2016-01-01

    The present study examined the moderation effects of extraversion on the relationships between hiding and faking emotions, perceived satisfaction from intimate relationships, and reported physical health concerns. Four hundred and four Israeli participants, who were all involved in intimate relationships at the time of the study, responded to the Extraversion scale from the Big-Five Inventory, the DEELS to measure hiding and faking emotions, the SELF to assess physical health concerns, and the short version of the ENRICH to evaluate perceived satisfaction with intimate relationships. The mean age was 32.3 years (SD = 8.2); and the average length of time as a couple was 7.8 years (SD = 8.2). Of the participants, 198 were married (48.5%). The findings indicate that the effect of hiding negative emotions was stronger for perceived satisfaction with intimate relationships and physical health concerns than that for faking positive emotions. Extraverts who showed a higher frequency of hiding their negative emotions were significantly less satisfied with their relationships than introverts and they also tended to report more concerns with their physical health. These results were not found when extraverts reported a high frequency of faking positive emotions. These results are discussed in the context of the trait-behavior-concordance model and stress the importance of distinguishing faking from hiding.

  11. Caffeine modifies blood glucose availability during prolonged low-intensity exercise in individuals with type-2 diabetes

    Directory of Open Access Journals (Sweden)

    Luiz Augusto da Silva

    2014-07-01

    Full Text Available Objective: The study investigated the effect of supplementation with maltodextrin (CHO alone or associated to caffeine during exercise in T2DM subjects.Methods: Pilot study, using Eight subjects with T2DM, aged 55±10 years, received CHO (1g/kg or caffeine (1.5 mg/kg alone or associated before exercise protocol. The exercise was executed at 40% heart rate (HR reserve for 40 min, with 10-min recovery. Blood pressure (BP and perceived exertion scale (Borg were checked every 2 min. Blood glucose (BG was checked every 10 min. For statistical analysis, ANOVA test was used and the value was considered statistically significant at p <0.05.Results: The results showed that BP and HR did not change significantly among all treatments. Caffeine promoted a significant reduction in BG of 75 mg/dL (65%, p <0.05 during 40 min of exercise protocol compared to all groups.Conclusion: Supplementation with 1.5 mg/kg of caffeine reduces BG concentration during prolonged exercise in T2DM patients.

  12. Managing Communication Latency-Hiding at Runtime for Parallel Programming Languages and Libraries

    CERN Document Server

    Kristensen, Mads Ruben Burgdorff

    2012-01-01

    This work introduces a runtime model for managing communication with support for latency-hiding. The model enables non-computer science researchers to exploit communication latency-hiding techniques seamlessly. For compiled languages, it is often possible to create efficient schedules for communication, but this is not the case for interpreted languages. By maintaining data dependencies between scheduled operations, it is possible to aggressively initiate communication and lazily evaluate tasks to allow maximal time for the communication to finish before entering a wait state. We implement a heuristic of this model in DistNumPy, an auto-parallelizing version of numerical Python that allows sequential NumPy programs to run on distributed memory architectures. Furthermore, we present performance comparisons for eight benchmarks with and without automatic latency-hiding. The results shows that our model reduces the time spent on waiting for communication as much as 27 times, from a maximum of 54% to only 2% of t...

  13. Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)

    CERN Document Server

    Jain, Dhyanendra

    2012-01-01

    Association rule mining is an important data-mining technique that finds interesting association among a large set of data items. Since it may disclose patterns and various kinds of sensitive knowledge that are difficult to find otherwise, it may pose a threat to the privacy of discovered confidential information. Such information is to be protected against unauthorized access. Many strategies had been proposed to hide the information. Some use distributed databases over several sites, data perturbation, clustering, and data distortion techniques. Hiding sensitive rules problem, and still not sufficiently investigated, is the requirement to balance the confidentiality of the disclosed data with the legitimate needs of the user. The proposed approach uses the data distortion technique where the position of the sensitive items is altered but its support is never changed. The size of the database remains the same. It uses the idea of representative rules to prune the rules first and then hides the sensitive rule...

  14. A statistical hiding algorithm based on self-similar network traffic

    Institute of Scientific and Technical Information of China (English)

    SHA Xue-jun; XU Yu-bin; QIANG Wei

    2008-01-01

    Although the encryption of network packets significantly increases privacy, the density of the traffic can still provide useful information to the observer, and maybe results in the breach of confidentiality. In this paper, we address issues related to hiding information in self-similar network, which is proved to be similar with modem communication network. And a statistical hiding algorithm is proposed for traffic padding. The figures and the comparison of Hurst Parameters before and after traffic padding, show the effective performance of the algorithm.

  15. Directory of IEC Assistance. Sources and Types of Aid Available for the Information, Education, Communication Components of Population/Family Planning Programs.

    Science.gov (United States)

    Hawaii Univ., Honolulu. East-West Center.

    This directory is intended as a source of information on the types and sources of assistance available to support the information, education, communication (IEC) components of population/family planning programs in developing countries. Forty international agencies are identified as involved in supporting the IEC components of population/family…

  16. Survey of Multiple Information Hiding Techniques using Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Bijoy Chhetri

    2015-10-01

    Full Text Available Information now a day‟s seems to have become abundant and the secure transmission and visualization of it has been a challenge. The major security concerns are of Authentication, Confidentiality and Data Integrity.  In regard to this, the various security methodologies have been introduced and Cryptography is one of the schemes where the information is transferred in the disguise form and only authentic user can reveal the exact information. Various Cryptographic techniques has played a very vital role in this regard, among which Visual Cryptographic System(VCS is one of such kind  where the secret data (image, text etc is encoded into multiple images and decoded using Human Visual System(HVS without having to tedious calculations and sound  knowledge of Cryptography. VC  is one of such methodology where the secret information is bifurcated into many disguise images and on super imposing these images, the original secret information is revealed, using Human Visual System(HVS unlike the traditional cryptography where lot of complex mathematical and time consuming calculation are to be performed. In this paper study of various VC techniques has been done based on number of shares, number of secret messages and types of shares in the cases of Grayscale Image.

  17. Hiding an Inconvenient Truth : Lies and Vagueness (Revision of DP 2008-107)

    NARCIS (Netherlands)

    Serra Garcia, M.; van Damme, E.E.C.; Potters, J.J.M.

    2010-01-01

    When truth conflicts with efficiency, can verbal communication destroy efficiency? Or are lies or vagueness used to hide inconvenient truths? We consider a sequential 2-player public good game in which the leader has private information about the value of the public good. This value can be low, high

  18. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  19. A NOVEL APPROACH OF SECURE COMMUNICATION BASED ON THE TECHNIQUE OF SPEECH INFORMATION HIDING

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    The proposed secure communication approach adopts the proposed algorithm of Analysis-BySynthesis (ABS) speech information hiding to establish a Secret Speech Subliminal Channel (SSSC) for speech secure communication over PSTN (Public Switched Telephone Network), and employs the algorithm of ABS speech information extracting to recovery the secret information. This approach is more reliable, covert and securable than traditional and chaotic secure communication.

  20. Effect of hiding places, straw and territory on agression in group-housed rabbit does

    NARCIS (Netherlands)

    Rommers, J.M.; Reuvekamp, B.F.J.; Gunnink, H.; Jong, de I.C.

    2014-01-01

    Group-housing of rabbit does may be preferred from welfare point of view. However, group-housing causes agonistic behaviour which may cause severe injuries. Severe injuries may be prevented by offering hiding places for attacked does. Providing enrichment (straw) may reduce agonistic behaviour by at

  1. Salimicrobium salexigens sp. nov., a moderately halophilic bacterium from salted hides.

    Science.gov (United States)

    de la Haba, Rafael R; Yilmaz, Pinar; Sánchez-Porro, Cristina; Birbir, Meral; Ventosa, Antonio

    2011-09-01

    Two Gram-positive, moderately halophilic bacteria, designated strains 29CMI(T) and 53CMI, were isolated from salted hides. Both strains were non-motile, strictly aerobic cocci, growing in the presence of 3-25% (w/v) NaCl (optimal growth at 7.5-12.5% [w/v] NaCl), between pH 5.0 and 10.0 (optimal growth at pH 7.5) and at temperatures between 15 and 40°C (optimal growth at 37°C). Phylogenetic analysis based on 16S rRNA gene sequence comparison showed that both strains showed a similarity of 98.7% and were closely related to species of the genus Salimicrobium, within the phylum Firmicutes. Strains 29CMI(T) and 53CMI exhibited 16S rRNA gene sequence similarity values of 97.9-97.6% with Salimicrobium album DSM 20748(T), Salimicrobium halophilum DSM 4771(T), Salimicrobium flavidum ISL-25(T) and Salimicrobium luteum BY-5(T). The DNA G+C content was 50.7mol% and 51.5mol% for strains 29CMI(T) and 53CMI, respectively. The DNA-DNA hybridization between both strains was 98%, whereas the values between strain 29CMI(T) and the species S. album CCM 3517(T), S. luteum BY-5(T), S. flavidum ISL-25(T) and S. halophilum CCM 4074(T) were 45%, 28%, 15% and 10%, respectively, showing unequivocally that strains 29CMI(T) and 53CMI constitute a new genospecies. The major cellular fatty acids were anteiso-C(15:0), anteiso-C(17:0), iso-C(15:0) and iso-C(14:0). The main respiratory isoprenoid quinone was MK-7, although small amounts of MK-6 were also found. The polar lipids of the type strain consist of diphosphatidylglycerol, phosphatidylglycerol, one unidentified phospholipid and one glycolipid. The peptidoglycan type is A1γ, with meso-diaminopimelic acid as the diagnostic diamino acid. On the basis of the phylogenetic analysis, and phenotypic, genotypic and chemotaxonomic characteristics, we propose strains 29CMI(T) and 53CMI as a novel species of the genus Salimicrobium, with the name Salimicrobium salexigens sp. nov. The type strain is 29CMI(T) (=CECT 7568(T)=JCM 16414(T)=LMG 25386(T)).

  2. Research on the methods of optical image hiding based on double random phase encoding and digital holography

    Science.gov (United States)

    Xu, Hongsheng; Sang, Nong

    2011-12-01

    Optical information hiding system has many features such as high processing speed, high parallel, high encryption dimension and high speed of optical transformation and related operations, more advantages than digital method in some way. But it has not adequate security, and enough combination with techniques of digital image processing. So on basis of analyzing existing image hiding and analyzing techniques, we give out the idea. We should adopt idea of virtual optics on the way of all-digital simulation to do research of optical image hiding and analyzing methods based on optical image processing technique especially technique of double random phase encoding and digital holography.

  3. Secondary analysis of publicly available data reveals superoxide and oxygen radical pathways are enriched for associations between type 2 diabetes and low-frequency variants.

    Science.gov (United States)

    Yazdanpanah, Mojgan; Chen, Chuhua; Graham, Jinko

    2013-11-01

    Genome-wide association studies explain at most 5%-10% of the heritable components of type 2 diabetes. Some of the "missing type 2 diabetes heritability" could be explained by low-frequency variants. We examined the associations between low-frequency variants and type 2 diabetes, using data from 2538 diabetic and 2977 nondiabetic subjects in the publicly available database of Genotypes and Phenotypes. We applied two approaches. First, we combined information from all low-frequency (1%-5%) variants at a locus in a gene-centric analysis of associations with diabetes. Next, we searched for gene ontology (GO) biological processes that were enriched for gene-centric associations, after correcting for multiple testing to control the false discovery rate (FDR). We found three GO biological processes that were significantly enriched for associations to diabetes: "response to superoxide" (FDR-adjusted p=2.7×10(-3)), "response to oxygen radical" (FDR-adjusted p=2.7×10(-3)), and "heart contraction" (FDR-adjusted p=2.6×10(-2)). There were three genes that contributed to "response to superoxide" and "oxygen radical" pathways, including the SOD1 gene. Gene-centric tests of association with low-frequency variants, followed by analysis to evaluate which biological pathways are enriched for these associations has the potential to recover, at least some proportion of, the "missing heritability" of type 2 diabetes.

  4. Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression.

    Science.gov (United States)

    Zhang, Weiming; Hu, Xiaocheng; Li, Xiaolong; Yu, Nenghai

    2013-07-01

    State-of-the-art schemes for reversible data hiding (RDH) usually consist of two steps: first construct a host sequence with a sharp histogram via prediction errors, and then embed messages by modifying the histogram with methods, such as difference expansion and histogram shift. In this paper, we focus on the second stage, and propose a histogram modification method for RDH, which embeds the message by recursively utilizing the decompression and compression processes of an entropy coder. We prove that, for independent identically distributed (i.i.d.) gray-scale host signals, the proposed method asymptotically approaches the rate-distortion bound of RDH as long as perfect compression can be realized, i.e., the entropy coder can approach entropy. Therefore, this method establishes the equivalency between reversible data hiding and lossless data compression. Experiments show that this coding method can be used to improve the performance of previous RDH schemes and the improvements are more significant for larger images.

  5. Parallel steganography framework for hiding a color image inside stereo images

    Science.gov (United States)

    Munoz-Ramirez, David O.; Ponomaryov, Volodymyr I.; Reyes-Reyes, Rogelio; Cruz-Ramos, Clara

    2017-05-01

    In this work, a robust steganography framework to hide a color image into a stereo images is proposed. The embedding algorithm is performed via Discrete Cosine Transform (DCT) and Quantization Index Modulation-Dither Modulation (QIM-DM) hiding the secret data. Additionally, the Arnold's Cat Map Transform is applied in order to scramble the secret color image, guaranteeing better security and robustness of the proposed system. Novel framework has demonstrated better performance against JPEG compression attacks among other existing approaches. Besides, the proposed algorithm is developed taking into account the parallel paradigm in order to be implemented in multi-core CPU increasing the processing speed. The results obtained by the proposed framework show high values of PSNR and SSIM, which demonstrate imperceptibility and sufficient robustness against JPEG compression attacks.

  6. An Attribute-Based Signcryption Scheme and Its Application in Information Hiding

    Institute of Scientific and Technical Information of China (English)

    PENG Changgen; WANG Weiru; TIAN Youliang; YUAN Zhilong

    2016-01-01

    In order to provide a secure, reliable and flexible way to hide information, a new attribute-based signcryption scheme based on ciphertext-policy and its se-curity proof are presented. This scheme not only can simul-taneously fulfil both authentication and confidentiality in an efficient way, but also implements a hierarchical decryp-tion in one group and also between different groups accord-ing to user’s authority (different users satisfying the same access structure can be considered as a group). We provide a solution to information hiding using our proposed scheme which can embed ciphertext into a carrier. Because the hi-erarchical decryption property, different users will obtain different message from the same carrier. Illegal user can not get any information without private key because mes-sage existed in the carrier is ciphertext. Such solution can be applied in sharing important message under the public network.

  7. A data hiding approach for the self-security of iris recognition

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Attacks to biometric data are the primary danger to the self-security of biometrics.To improve the iris feature template data security,a data hiding approach based on bit streams is proposed,in which an iris feature template is embedded into a face image. The proposed approach is applicable to present dominant techniques of iris recognition.With the low computation cost and the zero decoding-error-rate,this data hiding approach,embedding target biometric data into other biometric data for improving the security of target data in identity recognition,data storage and transmission,can deceive attackers more effectively.Furthermore,it does not degrade the iris recognition performances.Experimental results prove that the proposed approach can be used to protect iris feature templates and enhance the security of the iris recognition system itself.

  8. 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing

    CERN Document Server

    Tsai, Pei-Wei; Huang, Hsiang-Cheh

    2017-01-01

    This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .

  9. A new method for high-capacity information hiding in video robust against temporal desynchronization

    Science.gov (United States)

    Mitekin, Vitaly; Fedoseev, Victor A.

    2015-02-01

    This paper presents a new method for high-capacity information hiding in digital video and algorithms of embedding and extraction of hidden information based on this method. These algorithms do not require temporal synchronization to provide robustness against both malicious and non-malicious frame dropping (temporal desynchronization). At the same time, due to randomized distribution of hidden information bits across the video frames, the proposed method allows to increase the hiding capacity proportionally to the number of frames used for information embedding. The proposed method is also robust against "watermark estimation" attack aimed at estimation of hidden information without knowing the embedding key or non-watermarked video. Presented experimental results demonstrate declared features of this method.

  10. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Institute of Scientific and Technical Information of China (English)

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao

    2004-01-01

    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  11. C#实现窗口自动隐藏%Form Automatically Hide with C#

    Institute of Scientific and Technical Information of China (English)

    涂显政

    2012-01-01

      该文介绍了如何利用C#语言,实现靠屏边窗口自动隐藏及鼠标指向后自动弹出。%  Mark a form with C#, the form can automatically hide when it close the edge of screen and it can recover to nor⁃mal when mouse point on it.

  12. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients

    Science.gov (United States)

    Zhang, Xiaoqiang; Wang, Z. Jane

    2013-10-01

    Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 10 to 10 and thus can resist brute-force attack and unauthorized detection watermark attack.

  13. Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images.

    Science.gov (United States)

    Al-Qershi, Osamah M; Khoo, Bee Ee

    2011-02-01

    Authenticating medical images using watermarking techniques has become a very popular area of research, and some works in this area have been reported worldwide recently. Besides authentication, many data-hiding techniques have been proposed to conceal patient's data into medical images aiming to reduce the cost needed to store data and the time needed to transmit data when required. In this paper, we present a new hybrid watermarking scheme for DICOM images. In our scheme, two well-known techniques are combined to gain the advantages of both and fulfill the requirements of authentication and data hiding. The scheme divides the images into two parts, the region of interest (ROI) and the region of non-interest (RONI). Patient's data are embedded into ROI using a reversible technique based on difference expansion, while tamper detection and recovery data are embedded into RONI using a robust technique based on discrete wavelet transform. The experimental results show the ability of hiding patient's data with a very good visual quality, while ROI, the most important area for diagnosis, is retrieved exactly at the receiver side. The scheme also shows some robustness against certain levels of salt and pepper and cropping noise.

  14. Efficient blind decoders for additive spread spectrum embedding based data hiding

    Science.gov (United States)

    Valizadeh, Amir; Wang, Z. Jane

    2012-12-01

    This article investigates efficient blind watermark decoding approaches for hidden messages embedded into host images, within the framework of additive spread spectrum (SS) embedding based for data hiding. We study SS embedding in both the discrete cosine transform and the discrete Fourier transform (DFT) domains. The contributions of this article are multiple-fold: first, we show that the conventional SS scheme could not be applied directly into the magnitudes of the DFT, and thus we present a modified SS scheme and the optimal maximum likelihood (ML) decoder based on the Weibull distribution is derived. Secondly, we investigate the improved spread spectrum (ISS) embedding, an improved technique of the traditional additive SS, and propose the modified ISS scheme for information hiding in the magnitudes of the DFT coefficients and the optimal ML decoders for ISS embedding are derived. We also provide thorough theoretical error probability analysis for the aforementioned decoders. Thirdly, sub-optimal decoders, including local optimum decoder (LOD), generalized maximum likelihood (GML) decoder, and linear minimum mean square error (LMMSE) decoder, are investigated to reduce the required prior information at the receiver side, and their theoretical decoding performances are derived. Based on decoding performances and the required prior information for decoding, we discuss the preferred host domain and the preferred decoder for additive SS-based data hiding under different situations. Extensive simulations are conducted to illustrate the decoding performances of the presented decoders.

  15. 拓扑隐藏的MANET安全多路径路由协议%Topology-Hiding Secure Multipath Routing Protocol for MANET

    Institute of Scientific and Technical Information of China (English)

    胡琪; 张娇; 张玉军; 李忠诚

    2011-01-01

    分析了移动自组网(mobile ad hoc network,简称MANET)暴露拓扑带来的安全问题,提出了一种拓扑隐藏的安全多路径路由协议.在路由发现过程中,不在路由包中携带任何路径信息,从而有效隐藏网络拓扑.通过按需的邻居发现进行身份认证并建立路由表项,最终采用排除节点的方法实现多路径的选取;在路由维护过程中,设计了专门的错误发现机制以检验所选路径的有效性和安全性.该协议综合考虑时间因素和路径长度因素,实现了安全的最短路径确定.安全分析表明,该方案可以抵御黑洞攻击、虫洞攻击、rushing攻击和sybil等典型攻击,同时对一般类型的攻击也具有抵御能力.仿真结果表明,与SRP(secure routing protocol)这种典型的安全多路径方案相比,该方案能够找到更多节点不相交的多路径;在普通场景中,该方案没有对协议性能带来额外影响;在黑洞攻击场景中,该方案只需付出一定的信令开销即可大幅度提高数据包转发率,可有效抵御黑洞攻击.%This paper provides a detailed ana. lysis on the threats of topology-exposure in Mobile Ad Hoc Network (MANET) and proposes a secure topology-hiding multipath routing protocol based on the analysis. In Route Discovery, the new protocol exposes no routing information in packets to hide the network topology and adopts a node-excluded mechanism to find multiple paths. During this process, this protocol implements on-demand Neighbor Discovery to verify node identities. In Route Maintenance, a fault detection mechanism is designed to provide assurance that the selected paths are available and secure. Considering the factors of both reaction time and the path length, the scheme aims to find the shortest secure path. The security analysis shows that this scheme can resist the black hole attack, the wormhole attack, the rushing attack, the sybil attack, and other types of common attacks. Through extensive

  16. Response of the leaf photosynthetic rate to available nitrogen in erect panicle-type rice (Oryza sativa L. cultivar, Shennong265

    Directory of Open Access Journals (Sweden)

    Chihiro Urairi

    2016-07-01

    Full Text Available Increasing the yield of rice per unit area is important because of the demand from the growing human population in Asia. A group of varieties called erect panicle-type rice (EP achieves very high yields under conditions of high nitrogen availability. Little is known, however, regarding the leaf photosynthetic capacity of EP, which may be one of the physiological causes of high yield. We analyzed the factors contributing to leaf photosynthetic rate (Pn and leaf mesophyll anatomy of Nipponbare, Takanari, and Shennong265 (a EP type rice cultivar varieties subjected to different nitrogen treatments. In the field experiment, Pn of Shennong265 was 33.8 μmol m−2 s−1 in the high-N treatment, and was higher than that of the other two cultivars because of its high leaf nitrogen content (LNC and a large number of mesophyll cells between the small vascular bundles per unit length. In Takanari, the relatively high value of Pn (31.5 μmol m−2 s−1 was caused by the high stomatal conductance (gs; .72 mol m−2 s−1 in the high-N treatment. In the pot experiment, the ratio of Pn/Ci to LNC, which may reflect mesophyll conductance (gm, was 20–30% higher in Nipponbare than in Takanari or Shennong265 in the high N availability treatment. The photosynthetic performance of Shennong265 might be improved by introducing the greater ratio of Pn/Ci to LNC found in Nipponbare and greater stomatal conductance found in Takanari.

  17. A heuristic algorithm for quick hiding of association rules

    Directory of Open Access Journals (Sweden)

    Maryam Fouladfar

    Full Text Available Increasing use of data mining process and extracting of association rules caused the introduction of privacy preserving in data mining. A complete publication of the database is inconsistent with security policies and it would result in disclosure of some ...

  18. A semantic medical multimedia retrieval approach using ontology information hiding.

    Science.gov (United States)

    Guo, Kehua; Zhang, Shigeng

    2013-01-01

    Searching useful information from unstructured medical multimedia data has been a difficult problem in information retrieval. This paper reports an effective semantic medical multimedia retrieval approach which can reflect the users' query intent. Firstly, semantic annotations will be given to the multimedia documents in the medical multimedia database. Secondly, the ontology that represented semantic information will be hidden in the head of the multimedia documents. The main innovations of this approach are cross-type retrieval support and semantic information preservation. Experimental results indicate a good precision and efficiency of our approach for medical multimedia retrieval in comparison with some traditional approaches.

  19. [Not Available].

    Science.gov (United States)

    Brenke, Rainer

    2015-01-01

    The benefits of using sauna in prevention and therapy could be enhanced. In this paper, new findings are reported underpinning the preventive and therapeutic potential of this intervention. Sauna can be helpful in toughening up and in supplementing pain management of e.g. fibromyalgia as well as in preventing and treating common lifestyle diseases, such as stress, metabolic diseases, or type 2 diabetes.

  20. GEOGLAM best available crop masks and calendars for the four primary crop types (corn, wheat, soy and rice) within the main agricultural producing regions of the world.

    Science.gov (United States)

    Barker, B.; McGaughey, K.; Humber, M. L.; Nordling, J.; Claverie, M.; Justice, C. O.; Deshayes, M.; Becker-Reshef, I.

    2014-12-01

    The Global Agricultural Monitoring (GEOGLAM) initiative was developed by the Group on Earth Observations in order to produce and disseminate relevant, timely and accurate forecasts of agricultural production at national, regional and global scales through the use of earth observations, agro-meteorological data, field reports and national level expertise. As part of this goal GEOGLAM has developed the monthly GEOGLAM Crop Monitor, which provides coordinated global crop assessments on the four primary crop types (corn, wheat, soy and rice) within the main agricultural producing regions of the world. As a component of these assessments the GEOGLAM Crop Monitor has developed best available crop specific masks and seasonal specific calendars for each of the four primary crop types within these main producing regions of the world based on Crop Monitor partner products and inputs. These crop masks and calendars are due to be publically released in order to be of benefit to the greater agricultural research and monitoring communities. This talk will discuss the sources and development of these crop specific masks and calendars.

  1. [Not Available].

    Science.gov (United States)

    1992-03-25

    Archersstar Sudha Bhuchar, right, launches a video on breast screening for women from ethnic minorities, sponsored by the NHS. The video is available in six languages. Ms Bhuchar is pictured with programme co-ordinator Julietta Patrick.

  2. Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: ACCESS 2000 - niveau 1 : 13 & 14.11.03 (2 jours) C++ for Particle Physicists : 17 – 21.11.03 (6 X 3-hour lectures) Programmation automate Schneider TSX Premium – niveau 2 : 18 – 21.11.03 (4 jours) JAVA 2 Enterprise Edition – Part 1 : WEB Applications : 20 & ...

  3. MANIFESTATIONS OF VIOLENCE STUDENTS HIDING IN PRIMARY SCHOOL

    Directory of Open Access Journals (Sweden)

    Emmanuel García González

    2015-01-01

    Full Text Available The purpose of this post is a first part contextualize some of the violence manifested within the Sor Juana Ines de la Cruz, elementary school to reflect after about those hidden violence that some students prefer silence rather than report. In the second part, the approaches of peace impossible exposed in the classroom, in respect of hidden violence , its causes and consequences that prevent students reported because of fear of reprisals and therefore not pass it at all well in school . Given this reality of peace impossible in school, a peaceful alternative to help students to denounce violence and witness living within their schools is proposed.

  4. Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Places available The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses : Introduction à Outlook : 19.8.2004 (1 journée) Outlook (short course I) : E-mail : 31.8.2004 (2 hours, morning) Outlook (short course II) : Calendar, Tasks and Notes : 31.8.2004 (2 hours, afternoon) Instructor-led WBTechT Study or Follow-up for Microsoft Applications : 7.9.2004 (morning) Outlook (short course III) : Meetings and Delegation : 7.9.2004 (2 hours, afternoon) Introduction ...

  5. Reptile assemblages across agricultural landscapes: where does biodiversity hide?

    Directory of Open Access Journals (Sweden)

    Biaggini, M.

    2015-12-01

    Full Text Available The transition from traditional to intensive farming, aimed at large–scale production, has rapidly altered agricultural landscapes, leading to the reduction and fragmentation of natural habitats and to the consequent loss of biodiversity. Herpetofauna is seriously threatened by agriculture intensification worldwide, but less is known about its distribution in agro–ecosystems, especially at field scale. We analysed reptile abundance and diversity in eight agricultural and semi–natural land uses, and inside vegetated buffer strips interspersed among fields. Interestingly, most reptiles were recorded in the buffer strips while intensive crops and pastures hosted just one lizard species. Richness of individuals and species increased when strips were connected to semi–natural areas, independently of their width and vegetation structure. In view of our results, that highlight the role of minor landscape features for the presence of vertebrates in intensive agro–ecosystems, we recommend the implementation of buffer strips among the measures for vertebrate conservation in agricultural landscapes.

  6. A new view on an old debate: type of cue conflict manipulation and availability of stars can explain the discrepancies between cue conflict experiments with migratory songbirds

    Directory of Open Access Journals (Sweden)

    Sissel eSjöberg

    2016-02-01

    recalibrated magnetic compass. If sunrise and sunset information can be viewed from the same location, the birds average the information to get a true geographic reference. We conclude that the type of cue-conflict manipulation and the availability of stars can explain the discrepancies between studies.

  7. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: C++ Programming Level 2 - Traps & Pitfalls:  16 - 19.7.02 (4 days) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training Monique Duval Tel.74924 monique.duval@cern.ch

  8. Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval Tel. 74924technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: MATLAB Fundamentals and Programming Techniques (ML01) : 2 & 3.12.03 (2 days) Oracle 8i : SQL : 3 - 5.12.03 (3 days) The EDMS MTF in practice : 5.12.03 (afternoon, free of charge) Modeling Dynamic Systems with Simulink (SL01) : 8 & 9.12.03 (2 days) Signal Processing with MATLAB (SG01) : 11 & 12.12.03 (2 days) The JAVA Programming Language - l...

  9. Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval Tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: JAVA 2 Enterprise Edition - Part 1 : WEB Applications : 20 & 21.11.03(2 days) FrontPage 2000 - niveau 1 : 20 & 21.11.03 (2 jours) Oracle 8i : SQL : 3 - 5.12.03 (3 days) Oracle 8i : Programming with PL/SQL : 8 - 10.12.03 (3 days) The JAVA Programming Language - leve...

  10. Places available**

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The JAVA Programming Language Level 1 :9 & 10.1.2004 (2 days) The JAVA Programming Language Level 2 : 11 to 13.1.2004 (3 days) Hands-on Introduction to Python Programming : 16 - 18.2.2004 (3 days - free of charge) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon - free of charge) C++ for Particle Physicists : 8 - 12.3.2004...

  11. Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses : EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) CLEAN-2002 : Working in a Cleanroom (free of charge) : 23.10.03 (half day) The EDMS-MTF in practice (free of charge) :  28 -  30.10.03 (6 half-day sessions) AutoCAD 2002 - Level 1 : 3, 4, 12, 13.11.03 (4 days) LabVIEW TestStand ver. 3 : 4 & 5.11.03 (2 days) Introduction to Pspice : 4.11.03 p.m. (half-day) Hands-on Introduction to Python Programm...

  12. Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: MATLAB Fundamentals and Programming Techniques (ML01) :2 & 3.12.03 (2 days) Oracle 8i : SQL : 3 - 5.12.03 (3 days) The EDMS MTF in practice : 5.12.03 (afternoon, free of charge) Modeling Dynamic Systems with Simulink (SL01) : 8 & 9.12.03 (2 days) Signal Processing with MATLAB (SG01) : 11 & ...

  13. Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Project Planning with MS-Project : 15 & 22.1.2004 (2 days) Joint PVSS JCOP Framework Course : 2 sessions : 2 - 6.2.2004 and 16 - 20-2-2004 (5 days) Hands-on Introduction to Python Programming : 16 - 18.2.2004 (3 days - free of charge) C++ for Particle Physicists : 8 - 12.3.2004 ( 6 X 4-hour sessions)

  14. Places available**

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt.TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The JAVA Programming Language Level 1 : 9 & 10.1.2004 (2 days) The JAVA Programming Language Level 2 : 11 to 13.1.2004 (3 days) LabVIEW base 1 : 25 - 27.2.2004 (3 jours) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon - free of charge) C++ for Particle Physicists : 8 - 12.3.2004 ( 6 X 4-hour sessions) LabVIEW Basics 1 : 22 - 24.3.20...

  15. Using DNS amplification DDoS attack for hiding data

    Science.gov (United States)

    Mehić, M.; Voznak, M.; Safarik, J.; Partila, P.; Mikulec, M.

    2014-05-01

    This paper concerns available steganographic techniques that can be used for sending hidden data through public network. Typically, in steganographic communication it is advised to use popular/often used method for sending hidden data and amount of that data need to be high as much as possible. We confirmed this by choosing a Domain Name System (DNS) as a vital protocol of each network and choosing Distributed denial of service (DDoS) attacks that are most popular network attacks currently represented in the world. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols fields and is known for IP, UDP or TCP protocols, but has never been applied to DNS (Domain Name Server) which are the fundamental part of network communications. The second explains the usage of DNS Amplification DDoS Attack to send seamlessly data through public network. The calculation that was performed to estimate the total amount of data that can be covertly transferred by using these technique, regardless of steganalysis, is included in this paper.

  16. Hiding the Source Based on Limited Flooding for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Juan Chen

    2015-11-01

    Full Text Available Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.

  17. Uric Acid for Cardiovascular Risk: Dr. Jekyll or Mr. Hide?

    Science.gov (United States)

    Vassalle, Cristina; Mazzone, Annamaria; Sabatino, Laura; Carpeggiani, Clara

    2016-02-26

    Uric acid (UA) is a potent endogenous antioxidant. However, high concentrations of this molecule have been associated with cardiovascular disease (CVD) and renal dysfunction, involving mechanisms that include oxidative stress, inflammatory processes, and endothelial injury. Experimental and in vitro results suggest that this biomarker behaves like other antioxidants, which can shift from the physiological antioxidant action to a pro-oxidizing effect according to their level and to microenvironment conditions. However, data on patients (general population or CAD cohorts) are controversial, so the debate on the role of hyperuricemia as a causative factor for CVD is still ongoing. Increasing evidence indicates UA as more meaningful to assess CVD in women, even though this aspect needs deeper investigation. It will be important to identify thresholds responsible for UA "biological shift" from protective to harmful effects in different pathological conditions, and according to possible gender-related differences. In any case, UA is a low-tech and inexpensive biomarker, generally performed at patient's hospitalization and, therefore, easily accessible information for clinicians. For these reasons, UA might represent a useful additive tool as much as a CV risk marker. Thus, in view of available evidence, progressive UA elevation with levels higher than 6 mg/dL could be considered an "alarm" for increased CV risk.

  18. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: C++ Programming Level 2 - Traps & Pitfalls:  16 - 19.7.02 (4 days) Frontpage 2000 - level 1 :  22 - 23.7.02  (2 days) Introduction à Windows 2000 au CERN : 24.7.02 (après-midi) CLEAN-2002 : Travailler en salle blanche (cours gratuit) : 13.08.2002 (matin) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training Monique Duval Tel.74924 monique.duval@cern.ch

  19. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: December 2002   PCAD Schémas - Débutants :  5 & 6.12.02  (2 jours) PCAD PCB - Débutants :  9 - 11.12.02  (3 jours) FrontPage 2000 - level 1:  9 & 10.12.02  (2 days) Introduction à la CAO Cadence (cours gratuit) :  10 & 11.12.02  (2 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training Monique Duval Tel.74924 monique.duval@cern.ch

  20. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: CLEAN-2002 : Travailler en salle blanche (cours gratuit) : 13.08.2002 (matin) Introduction to the CERN Enginnering Data Management System :  27.8.02  (1 day) The CERN Engineering Data Management System for Advanced Users :  28.8.02  (1 day) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training Monique Duval Tel.74924 monique.duval@cern.ch    

  1. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Introduction to Databases :  3 - 4.7.01 (2 days) The JAVA programming language Level 2 : 4 - 6.7.01 (3 days) Enterprise JavaBeans :  9 - 11.7.01 (3 days) Design Patterns :  10 - 12.7.01 (3 days) C++ for Particle Physicists :  23 - 27.7.01 (6 3-hour lectures) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt.

  2. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Introduction to Perl 5 : 2 - 3.7.01 (2 days) Introduction to Databases :  3 - 4.7.01 (2 days) JAVA programming language Level 2 : 4 - 6.7.01 (3 days) Enterprise JavaBeans :  9 - 11.7.01 (3 days) Design Patterns :  10 - 12.7.01 (3 days) C++ for Particle Physicists :  23 - 27.7.01 (6 3-hour lectures) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt.

  3. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: Conception de PCB rapides dans le flot Cadence : 11.6.03 (matin) EXCEL 2000 - level 1 : 12 & 13.6.03 (2 days) Introduction to PVSS : 16.6.03 (p.m.) Basic PVSS : 17 - 19.6.03 (3 days) Réalisation de PCB rapides dans le flot Cadence : 17.6.03 (matin) PVSS - JCOP Framework Tutorial : 20.6.03 (1 day) Programmation automate Schneider : Programmation automate Schneider TSX Premium - 2ème niveau : 24 - 27.6.03 (4 jours) - audience : toute personne qui veux maitriser la mise en uvre et la programmation des fonctions spécialisées d'un automate TSX Premium - objectifs : maitriser la mise en uvre et la programmation des fonctions spécialisées d'un automate TSX Premium Cours de sécurité : Etre TSO au CERN : Prochaines sessions : 24, 25 & 27.6.03 - 4, 5 & 7.11.03 (session de 3 jours) ** The number of places available may vary. Please check our Web site to find out the current availability. If you wish to participate in one of these courses, pl...

  4. Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images

    Directory of Open Access Journals (Sweden)

    Mehdi Hussain

    2016-05-01

    Full Text Available The goal of image steganographic methods considers three main key issues: high embedding capacity, good visual symmetry/quality, and security. In this paper, a hybrid data hiding method combining the right-most digit replacement (RMDR with an adaptive least significant bit (ALSB is proposed to provide not only high embedding capacity but also maintain a good visual symmetry. The cover-image is divided into lower texture (symmetry patterns and higher texture (asymmetry patterns areas and these textures determine the selection of RMDR and ALSB methods, respectively, according to pixel symmetry. This paper has three major contributions. First, the proposed hybrid method enhanced the embedding capacity due to efficient ALSB utilization in the higher texture areas of cover images. Second, the proposed hybrid method maintains the high visual quality because RMDR has the closest selection process to generate the symmetry between stego and cover pixels. Finally, the proposed hybrid method is secure against statistical regular or singular (RS steganalysis and pixel difference histogram steganalysis because RMDR is capable of evading the risk of RS detection attacks due to pixel digits replacement instead of bits. Extensive experimental tests (over 1500+ cover images are conducted with recent least significant bit (LSB-based hybrid methods and it is demonstrated that the proposed hybrid method has a high embedding capacity (800,019 bits while maintaining good visual symmetry (39.00% peak signal-to-noise ratio (PSNR.

  5. A Novel Steganography Method for Hiding BW Images into Gray Bitmap Images via k-Modulus Method

    Directory of Open Access Journals (Sweden)

    Firas A. Jassim

    2013-09-01

    Full Text Available This paper is to create a pragmatic steganographic implementation to hide black and white image which is known as stego image inside another gray bitmap image that known as cover image. First of all, the proposed technique uses k-Modulus Method (K-MM to convert all pixels within the cover image into multiples of positive integer named k. Since the black and white images can be represented using binary representation, i.e. 0 or 1. Then, in this article, the suitable value for the positive integer k is two. Therefore, each pixel inside the cover image is divisible by two and this produces a reminder which is either 0 or 1. Subsequently, the black and white representation of the stego image could be hidden inside the cover image. The ocular differences between the cover image before and after adding the stego image are insignificant. The experimental results show that the PSNR values for the cover image are very high with very small Mean Square Error.

  6. Bovine viral diarrhea virus antigen detection across whole cattle hides using two antigen-capture enzyme-linked immunosorbent assays.

    Science.gov (United States)

    Vander Ley, Brian L; Ridpath, Julia F; Sweiger, Shaun H

    2012-05-01

    Bovine viral diarrhea virus is a costly disease of cattle that can be controlled by vaccination, biosecurity, and removal of persistently infected cattle. Development and proficiency testing of assays to identify persistently infected cattle requires substantial quantities of known positive- and negative-sample material. The objective of this study was to determine what sections of bovine skin contained Bovine viral diarrhea virus antigen. Two commercially available antigen-capture enzyme-linked immunoassays were used to test subsamples representing the entire skin of 3 persistently infected calves. Both assays detected Bovine viral diarrhea virus antigen in the samples indicated for use by assay protocol. However, one assay identified all subsamples as positive, while the second assay identified 64.4% of subsamples as positive. These results show that use of samples other than those specified by the assay protocol must be validated for each individual assay. In this study, alternative sample sites and use of the entire hide for proficiency testing would be acceptable for only one of the assays tested.

  7. In vitro gentamicin release from commercially available calcium-phosphate bone substitutes influence of carrier type on duration of the release profile

    Directory of Open Access Journals (Sweden)

    Bronckers Antonius LJJ

    2006-02-01

    Full Text Available Abstract Background Polymethyl-methacrylate (PMMA beads releasing antibiotics are used extensively to treat osteomyelitis, but require surgical removal afterwards because they do not degrade. Methods As an alternative option, this report compares the in vitro gentamicin release profile from clinically used, biodegradable carrier-materials: six injectable cements and six granule-types. Cement cylinders and coated granules containing 3% gentamicin were submerged in dH2O and placed in a 48-sample parallel drug-release system. At regular intervals (30, 90, 180 min. and then every 24 h, for 21 days, the release fluid was exchanged and the gentamicin concentration was measured. The activity of released gentamicin was tested on Staphylococcus aureus. Results All combinations showed initial burst-release of active gentamicin, two cements had continuous-release (17 days. The relative release of all cements (36–85% and granules (30–62% was higher than previously reported for injectable PMMA-cements (up to 17% and comparable to other biodegradable carriers. From the cements residual gentamicin could be extracted, whereas the granules released all gentamicin that had adhered to the surface. Conclusion The high release achieved shows great promise for clinical application of these biodegradable drug-carriers. Using the appropriate combination, the required release profile (burst or sustained may be achieved.

  8. Deployable nuclear fleet based on available quantities of uranium and reactor types – the case of fast reactors started up with enriched uranium

    Directory of Open Access Journals (Sweden)

    Baschwitz Anne

    2016-01-01

    Full Text Available International organizations regularly produce global energy demand scenarios. To account for the increasing population and GDP trends, as well as to encompass evolving energy uses while satisfying constraints on greenhouse gas emissions, long-term installed nuclear power capacity scenarios tend to be more ambitious, even after the Fukushima accident. Thus, the amounts of uranium or plutonium needed to deploy such capacities could be limiting factors. This study first considers light-water reactors (LWR, GEN III using enriched uranium, like most of the current reactor technologies. It then examines the contribution of future fast reactors (FR, GEN IV operating with an initial fissile load and then using depleted uranium and recycling their own plutonium. However, as plutonium is only available in limited quantity since it is only produced in nuclear reactors, the possibility of starting up these Generation IV reactors with a fissile load of enriched uranium is also explored. In one of our previous studies, the uranium consumption of a third-generation reactor like an EPR™ was compared with that of a fast reactor started up with enriched uranium (U5-FR. For a reactor lifespan of 60 years, the U5-FR consumes three times less uranium than the EPR and represents a 60% reduction in terms of separative work units (SWU, though its requirements are concentrated over the first few years of operation. The purpose of this study is to investigate the relevance of U5-FRs in a nuclear fleet deployment configuration. Considering several power demand scenarios and assuming different finite quantities of available natural uranium, this paper examines what types of reactors must be deployed to meet the demand. The deployment of light-water reactors only is not sustainable in the long run. Generation IV reactors are therefore essential. Yet when started up with plutonium, the number of reactors that can be deployed is also limited. In a fleet deployment

  9. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: The CERN Engineering Data Management System for Advanced users :  13.6.02  (1 day) The CERN Engineering Data Management System for Local Administrators :  18.6.02  (1 day) AutoCAD 2002 - niveau 2 : 24 - 25.6.02 (2 jours) Frontpage 2000 - niveau 2 : 25 - 26.6.02 (2 jours) Object-oriented Analysis and Design :  2 - 5.7.02  (4 days) C++ Programming Level 2 - Traps & Pitfalls :  16 - 19.7.02  (4 days) C++ for Particle Physicists :  22 - 26.7.02  (6 * 3 hour lectures) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of the...

  10. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: LabView Hands-on (bilingue/bilingual - gratuit/free of charge) : 13.9.02 (a.m.) LabView DAQ Hands-on (bilingue/bilingual - gratuit/free of charge) : 13.9.02 (p.m.) AutoCAD 2002 - niveau 1 : 19, 20, 26, 27.9.02 (4 jours) LabView Base 1 : 23 - 25.9.02 (3 jours) LabView DAQ (E) : 26 - 27.9.02 (2 days) AutoCAD Mechanical 6 PowerPack (F) : 30.9, 1, 2, 9, 10, 11.10.02 (6 jours) CLEAN-2002 : Working in a Cleanroom (free of charge) : 10.10.02 (half-day, p.m.) AutoCAD 2002 - niveau 2 : 14 - 15.10.02 (2 jours) AutoCAD 2002 - Level 1 : 17, 18, 24, 25.10.02 (4 days) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Of...

  11. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Utilisation du simulateur Simplorer : 30.5 - 1.6.01 (3 jours) JAVA programming language level 1: 11-12.6.01 (2 days) LabView hands-on F ou E : 11.6.01 (1/2 journée) Comprehensive VHDL for EPLD/FPGA Design : 11 - 15.6.01 (5 days) Introduction au Langage C : 13 - 15.6.01 (3 jours) LabView Base 1 : 12 - 14.6.01 (3 jours) Habilitation électrique : superviseurs : 2 sessions d'une demi-journée les 12 et 19.6.01 Migration de LabVIEW 5 vers LabVIEW 6i Migration from LabVIEW 5 to LabVIEW 6I :  15.6.01 (1/2 journée/half-day) Introduction to Perl 5 : 2 - 3.7.01 (2 days) JAVA programming language level 2 : 4 - 6.7.01 (3 days) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : http://www.cern.ch/Training/ or fill in an 'application for training' form available from ...

  12. PLACES AVAILABLES

    CERN Document Server

    Technical Training; Tel. 74924

    2000-01-01

    Places are available in the following courses:   C++ for Particle Physicists 20 - 24.11.00 6 lectures CANbus 20.11.00 1 journée CANopen 21 et 22.11.00 2 jours Sécutiré dans les installations cryogéniques 21 et 22.11.00 2 demi-journées The JAVA programming language level 2 27 ­ 29.11.00 3 days Contract Follow-up 27.11.00 3 heures 1/2 Cryogénie (introduction) 4 ­ 8.12.00 ANSYS Introduction : langue a décider suivant majorité 5 ­ 7.12.00 3 jours EXCEL 7, 8, 13 et 14.12.00 4 jours Contract Follow-up 15.12.00 3 heures 1/2 If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : http://www.cern.ch/Training/ or fill in an “application for training” form available from your Divisional Secretariat or from your DTO (Divisional Training Officer)....

  13. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Habilitation électrique : recyclage HT/BT : 11 - 15.3.2002  (2 * 2 heures) PVSS Basics :  8 - 12.4.02  (5 days) ELEC-2002 : Spring Term :  9, 11, 16, 18, 23, 25, 30.4.02 (7 * 2.5 hours) LabVIEW base 1 : 22 - 24.4.02 (3 jours) LabVIEW DSC (F) 25 & 26.4.02 (2 jours) LabVIEW Basics 2 : 13 & 14.5.02 (2 days) LabVIEW DAQ (F) : 15 & 16.5.02 (2 jours) Cours sur la migration AutoCAD :   AutoCAD : Mise à jour AutoCAD r-14 vers 2002 (2 jours) AutoCAD Mechanical PowerPack 6 basé sur AutoCAD 2002 (5 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applica...

  14. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel 74924

    2002-01-01

    Places are available in the following courses: LabView hands-on : 21.01.02 (1/2 journée) LabView DAQ hands-on : 21.01.02 (1/2 journée) FileMaker Pro : 22 - 25.1.02 (4 jours) MS-Project 2000 : 24 & 25.01.02 (2 jours) Introduction au PC et à Windows 2000 au CERN : 29 - 30.1.02 (2 jours) LabView Base 1 : 4 - 6.2.02 (3 jours) LabView DAQ (E) : 7 & 8.02.02 (2 days) Hands-on Object-Oriented Design & Programming with Java : 11 - 13.02.02 (3 days) C++ for Particle Physicists : 11 - 15.3.2002 (6 * 3 hour lectures) Cours sur la migration AutoCAD : AutoCAD : Mise à jour AutoCAD r-14 vers 2002 (2 jours) AutoCAD Mechanical PowerPack 6 basé sur AutoCAD 2002 (5 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO ...

  15. PLACES AVAILABLES

    CERN Multimedia

    Enseignement Technique; Tél. 74924; monique.duval@cern.ch

    2000-01-01

    Places are available in the following courses: LabView hands-on : 13.11.00 (4 hours) LabView Basics 1 : 14 ­ 16.11.00 (3 days) Nouveautés de WORD : 19 et 20.10.00 (2 jours) ACCESS 1er niveau : 30 ­ 31.10.00 (2 jours) Advanced C programming : 2 ­ 3.11.00 (2 days) Introduction à PowerPoint : 6.11.00 (1 journée) C++ for Particle Physicists : 20 ­ 24.11.00 (12 hours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : http://www.cern.ch/Training/ or fill in an “application for training” form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt.

  16. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: PVSS basics :  18 - 22.2.02 (5 days) Introduction à la CAO CADENCE : 20 & 21.2.02 (2 jours) LabView Basics 1 :  4 - 6.3.02  (3 days) Introduction au VHDL et utilisation du simulateur de CADENCE : 6 & 7.3.02 (2 jours) LabView Base 2 : 11 & 12.3.02 (2 jours) C++ for Particle Physicists :  11 - 15.3.2002  (6 * 3 hour lectures) LabView Advanced :  13 - 15.3.02 (3 days) Cours sur la migration AutoCAD :   AutoCAD : Mise à jour AutoCAD r-14 vers 2002 (2 jours) AutoCAD Mechanical PowerPack 6 basé sur AutoCAD 2002 (5 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO...

  17. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Introduction à la CAO CADENCE : 20 & 21.2.02 (2 jours) LabView Basics 1 :  4 - 6.3.02  (3 days) Introduction au VHDL et utilisation du simulateur de CADENCE : 6 & 7.3.02 (2 jours) CLEAN-2002 : Working in a Clean Room :  7.3.2002  (1 day) LabView Base 2 : 11 & 12.3.02 (2 jours) C++ for Particle Physicists :  11 - 15.3.2002  (6 * 3 hour lectures) LabView Advanced :  13 - 15.3.02 (3 days) Cours sur la migration AutoCAD :   AutoCAD : Mise à jour AutoCAD r-14 vers 2002 (2 jours) AutoCAD Mechanical PowerPack 6 basé sur AutoCAD 2002 (5 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisiona...

  18. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: Hands-on Introduction to Python Programming: 11-13.08.2003(3 days) Introduction to the CERN Engineering Data Management System (EDMS): 26.08.2003 (1 day) The CERN Engineering Data Management System (EDMS) for Engineers: 27.08.2003 (1 day) CLEAN-2002 : Travailler en salle blanche : 4.09.2003 (une demi-journée) AutoCAD 2002 - Level 1: 4, 5, 15, 16.09.2003 (2 x 2 days) AutoCAD Mechanical 6 PowerPack : 17, 18, 25, 26.09.2003 et 2, 3.10.2003 (3 x 2 journées, français) AutoCAD 2002 - niveau 1 : 23, 24, 30.09.2003 et 1.10.2003 (2 x 2 journées) Introduction to the CERN Engineering Data Management System (EDMS): 23.09.2003 (1 day) The CERN Engineering Data Management System (EDMS) for Local Administrators: 24-25.09.2003 (2 days) AutoCAD 2002 - niveau 2 : 8 et 10.10.2003 (2 journées) CLEAN-2002: Working in a Cleanroom: 23.10.2003 (half day, p.m.) ** The number of places available may vary. Please ch...

  19. Places available**

    CERN Multimedia

    Places are available in the following courses: Hands-on Introduction to Python Programming: 11-13.08.2003 (3 days) Introduction to the CERN Engineering Data Management System (EDMS): 26.08.2003 (1 day) The CERN Engineering Data Management System (EDMS) for Engineers: 27.08.2003 (1 day) CLEAN-2002 : Travailler en salle blanche : 4.09.2003 (une demi-journée) AutoCAD 2002 - Level 1: 4, 5, 15, 16.09.2003 (2 x 2 days) AutoCAD Mechanical 6 PowerPack : 17, 18, 25, 26.09.2003 et 2, 3.10.2003 (3 x 2 journées, français) AutoCAD 2002 - niveau 1 : 23, 24, 30.09.2003 et 1.10.2003 (2 x 2 journées) Introduction to the CERN Engineering Data Management System (EDMS): 23.09.2003 (1 day) The CERN Engineering Data Management System (EDMS) for Local Administrators: 24-25.09.2003 (2 days) AutoCAD 2002 - niveau 2 : 8 et 10.10.2003 (2 journées) CLEAN-2002: Working in a Cleanroom: 23.10.2003 (half day, p.m.) ** The number of places available may vary. Please check our Web site to find out the current availabili...

  20. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: November 2002   Java Programming Language level 1 :  28 & 29.11.02  (2 days) December 2002   LabVIEW - DSC (English) :  2 - 3.12.02  (2 days) FileMaker (Français) :  2 - 5.12.02  (4 jours) PCAD Schémas - Débutants :  5 & 6.12.02  (2 jours) PCAD PCB - Débutants :  9 - 11.12.02  (3 jours) FrontPage 2000 - level 1:  9 & 10.12.02  (2 days) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training M...

  1. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: November 2002   Hands-on Object-Oriented Design and Programming with C++:  19 - 21.11.02  (3 days)  December 2002   LabVIEW - DSC (English) :  2 - 3.12.02  (2 days) AutoCAD 2002 - niveau 2 :  2 & 3.12.02  (2 jours) FileMaker (Français) :  2 - 5.12.02  (4 jours) PCAD Schémas - Débutants :  5 & 6.12.02  (2 jours) PCAD PCB - Débutants :  9 - 11.12.02  (3 jours) FrontPage 2000 - level 1:  9 & 10.12.02  (2 days) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisiona...

  2. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74460

    2001-01-01

    Places are available in the following courses: LabView Base 1 : 27-29.3.01 (3 jours) Contract Follow-up : 9.4.01 (3 heures) Introduction à PowerPoint : 24.4.01 (1 journée) Publier sur le Web : 25-27.4.01 (3 demi-journées) Programmation TSX Premium 2 : 15-16.5.01 (5 jours) LabView Base 2 : 27-29.3.01 (2 jours) Hands-on Object-oriented Analysis, Design & Programming with C++ :  23-27.4.01 (5 days) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt.

  3. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-01

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  4. Use of Commonly Available Technologies for Diabetes Information and Self-Management Among Adolescents With Type 1 Diabetes and Their Parents: A Web-Based Survey Study

    Science.gov (United States)

    Vaala, Sarah E; Hood, Korey K; Laffel, Lori; Kumah-Crystal, Yaa A; Lybarger, Cindy K

    2015-01-01

    Background For individuals with Type 1 diabetes (T1D), following a complicated daily medical regimen is critical to maintaining optimal health. Adolescents in particular struggle with regimen adherence. Commonly available technologies (eg, diabetes websites, apps) can provide diabetes-related support, yet little is known about how many adolescents with T1D use them, why they are used, or relationships between use and self-management. Objective This study examined adolescent and parent use of 5 commonly available technologies for diabetes, including proportions who use each technology, frequency of use, and number of different technologies used for diabetes. Analyses also investigated the reasons adolescents reported for using or not using technologies for diabetes, and factors correlated with adolescents’ technology use. Finally, this study examined relationships between the type and number of technologies adolescents use for diabetes and their self-management and glycemic control. Methods Adolescents (12-17 years) and their parents (N=174 pairs), recruited from a pediatric diabetes clinic (n=134) and the Children with Diabetes community website (n=40), participated in this Web-based survey study. Glycosylated hemoglobin (A1C) values were obtained from medical records for pediatric clinic patients. Adolescents reported their use of 5 commonly available technologies for diabetes (ie, social networking, diabetes websites, mobile diabetes apps, text messaging, and glucometer/insulin pump software), reasons for use, and self-management behavior (Self-Care Inventory-Revised, SCI-R). Results Most adolescents and parents used at least one of the 5 technologies for diabetes. Among adolescents, the most commonly used technology for diabetes was text messaging (53%), and the least commonly used was diabetes websites (25%). Most adolescents who used diabetes apps, text messaging, or pump/glucometer software did so more frequently (≥2 times per week), compared to social

  5. [Not Available].

    Science.gov (United States)

    Geißler, K; Guntinas-Lichius, O

    2016-02-01

    Surgery in the pharynx belongs to the most frequent otorhinolaryngological procedures. Adenoidectomy and tonsillectomy are amongst the most frequent surgeries at all and belong to the first procedures which are performed by otorhinolaryngology residents during their specialist training. Therefore, it is essential to study early during the specialist training the most frequent pharyngeal procedures, surgical techniques, complications and outcome. A series of excellent clinical trials and meta-analyses have been published in the recent year demonstrating that adenoidectomy is an important therapy element in pediatric otorhinolaryngology. In particular due to the developments in the field of laser surgery, tonsillotomy could experience a revival in the recent years. The indication spectrum is still widening. There are many fields where clinical trials are needed to proof if tonsillotomy is as effective as tonsillectomy but with the advantage of lower morbidity. There are manifold pharyngeal surgical procedures to treat patients with obstructive sleep apnea. These surgical techniques have proved valuable especially as alternative to conservative therapy and in case of treatment failure under airway pressure therapy. As the obstruction during this type of sleep-related respiratory disorder is often not located at one anatomical site, an individual combination of several pharyngeal and other surgeries are needed for an effective treatment of the patient. The present article gives an overview of the most important pharyngeal surgeries for future otorhinolaryngologists under specialist training.

  6. [Not Available].

    Science.gov (United States)

    Blanchard, Elodie; de Lara, Manuel Tunon

    2013-01-01

    Pholcodine is an opioid that has been widely used worldwide since 1950 for the treatment of non-productive cough in children and adults. The results of early preclinical studies but also those of recent clinical trials have shown the antitussive efficacy of pholcodine to be superior to that of codeine, of longer duration, and with an equivalent or safer toxicity profile. Also, there is no risk of addiction. Concern had been raised over a possible cross-sensitisation with neuromuscular blocking agents. While a recent assessment of the available data by the European Medicines Agency (EMA) has confirmed the favourable risk-benefit ratio of pholcodine, further studies are needed to clear this point.

  7. [Not Available].

    Science.gov (United States)

    Murray, Clinton K; Bennett, Jason W

    2009-01-01

    Malaria's global impact is expansive and includes the extremes of the healthcare system ranging from international travelers returning to nonendemic regions with tertiary referral medical care to residents in hyperendemic regions without access to medical care. Implementation of prompt and accurate diagnosis is needed to curb the expanding global impact of malaria associated with ever-increasing antimalarial drug resistance. Traditionally, malaria is diagnosed using clinical criteria and/or light microscopy even though both strategies are clearly inadequate in many healthcare settings. Hand held immunochromatographic rapid diagnostic tests (RDTs) have been recognized as an ideal alternative method for diagnosing malaria. Numerous malaria RDTs have been developed and are widely available; however, an assortment of issues related to these products have become apparent. This review provides a summary of RDT including effectiveness and strategies to select the ideal RDT in varying healthcare settings.

  8. Availability, Sustainability, and Suitability of Ground Water, Rogers Mesa, Delta County, Colorado - Types of Analyses and Data for Use in Subdivision Water-Supply Reports

    Science.gov (United States)

    Watts, Kenneth R.

    2008-01-01

    The population of Delta County, Colorado, like that in much of the Western United States, is forecast to increase substantially in the next few decades. A substantial portion of the increased population likely will reside in rural subdivisions and use residential wells for domestic water supplies. In Colorado, a subdivision developer is required to submit a water-supply plan through the county for approval by the Colorado Division of Water Resources. If the water supply is to be provided by wells, the water-supply plan must include a water-supply report. The water-supply report demonstrates the availability, sustainability, and suitability of the water supply for the proposed subdivision. During 2006, the U.S. Geological Survey, in cooperation with Delta County, Colorado, began a study to develop criteria that the Delta County Land Use Department can use to evaluate water-supply reports for proposed subdivisions. A table was prepared that lists the types of analyses and data that may be needed in a water-supply report for a water-supply plan that proposes the use of ground water. A preliminary analysis of the availability, sustainability, and suitability of the ground-water resources of Rogers Mesa, Delta County, Colorado, was prepared for a hypothetical subdivision to demonstrate hydrologic analyses and data that may be needed for water-supply reports for proposed subdivisions. Rogers Mesa is a 12-square-mile upland mesa located along the north side of the North Fork Gunnison River about 15 miles east of Delta, Colorado. The principal land use on Rogers Mesa is irrigated agriculture, with about 5,651 acres of irrigated cropland, grass pasture, and orchards. The principal source of irrigation water is surface water diverted from the North Fork Gunnison River and Leroux Creek. The estimated area of platted subdivisions on or partially on Rogers Mesa in 2007 was about 4,792 acres of which about 2,756 acres was irrigated land in 2000. The principal aquifer on Rogers

  9. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: LabVIEW base 1 : 22 - 24.4.02 (3 jours) CLEAN 2002 : working in a cleanroom:  24.4.02  (half-day, pm) LabVIEW DSC (F) 25 & 26.4.02 (2 jours) AutoCAD : Mise à jour AutoCAD r-14 vers 2002 : 25 & 26.4.02 (2 jours) Cotations selon les normes GPS de l'ISO : 29 - 30.4.02 (2 jours) Introduction to the CERN Engineering Data Management System:  7.5.02  (1 day) LabVIEW Basics 2: 13 & 14.5.02 (2 days) AutoCAD Mechanical 6 PowerPack (F) : 13-14, 17, 21, 27-28.5.02 (6 jours) WorldFIP - Généralités : 14.5.2002 (1/2 journée) WorldFIP - Développer avec MicroFIP HANDLER : 14.5 - après-midi, 15.5.02 - matin (1 jour) WorldFIP - FullFIP FDM : FIP Device Manager (F) : 15.5 - après-midi, 16.5.02 - matin (1 jour) LabVIEW DAQ (F) : 15 & 16.5.02 (2 jours) EXCEL 2000 - niveau 2 : 22 & 23.5.02 (2 jours)...

  10. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: The CERN Engineering Data Management System for Advanced users : 16.4.02  (1 day) Migration from AutoCAD 14 towards AutoCAD Mechanical6 PowerPack:  17 - 19.4 and 2 &3.5.02  (5 days) AutoCAD - niveau 1 : 22, 23, 29, 30.4 et 6, 7.5.02 (6 jours) LabVIEW base 1 : 22 - 24.4.02 (3 jours) CLEAN 2002 : working in a cleanroom:  24.4.02  (half-day, pm) LabVIEW DSC (F) 25 & 26.4.02 (2 jours) AutoCAD : Mise à jour AutoCAD r-14 vers 2002 : 25 & 26.4.02 (2 jours) Cotations selon les normes GPS de l'ISO : 29 - 30.4.02 (2 jours) Introduction to the CERN Engineering Data Management System:  7.5.02  (1 day) LabVIEW Basics 2: 13 & 14.5.02 (2 days) AutoCAD Mechanical 6 PowerPack (F) : 13-14, 17, 21, 27-28.5.02 (6 jours) WorldFIP - Généralités : 14.5.2002 (1/2 journée) WorldFIP - Développer avec Micr...

  11. Places available **

    CERN Multimedia

    2003-01-01

    Des places sont disponibles dans les cours suivants : Places are available in the following courses : Introduction à Windows 2000 au CERN : 25.2.03 (1/2 journée) LabView base 2/LabView Basics 2 : 10 & 11.3.03 (2 jours/2 days) langue à définir/Language to be decided C++ for Particle Physicists : 10 - 14.3.03 (6 X 3-hour lectures) Introduction to PVSS : 10.3.03 (half day, afternoon) Basic PVSS : 11 - 13.3.03 (3 days) LabView avancé /LabView Advanced : 12 - 14.3.03 (3 jours/3days) Langue à définir/Language to be decided AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 17, 18, 24 & 25.3.03 (6 jours) PVSS - JCOP Framework Tutorial : 14.3.03 (1 day) CLEAN-2002 : Working in a cleanroom : 2.4.03 (half-day, afternoon, free course, registration required) LabView base 1/LabView Basics 1 : 9 - 11.4.03 (3 jours/3 days) Langue à définir/Language to be decided DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (...

  12. Places available **

    CERN Multimedia

    2003-01-01

    Des places sont disponibles dans les cours suivants : Places are available in the following courses : WorldFIP 2003 pour utilisateurs : 11-14.2.03 (4 jours) DISP-2003 ? Spring I Term : Introduction to Digital Signal Processing : 20, 27.2, 6, 13, 20, 27.3, 3.4.03 (7 X 2-hour lectures) AXEL-2003 - Introduction to Accelerators : 24-28.2.03 (10 X 1-hour lectures) AutoCAD 2002 - niveau 1 : 24, 25.2 & 3, 4.3.03 (4 jours) Introduction à Windows 2000 au CERN : 25.2.03 (1/2 journée) LabView base 2/LabView Basics 2 : 10 & 11.3.03 (2 jours/2 days) langue à définir/Language to be decided C++ for Particle Physicists : 10 ? 14.3.03 (6 X 3-hour lectures) Introduction to PVSS : 10.3.03 (half day, afternoon) Basic PVSS : 11 - 13.3.03 (3 days) LabView avancé /LabView Advanced : 12 - 14.3.03 (3 jours/3days) Langue à définir/language to be decided AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 17, 18, 24 & 25.3.03 (6 jours) PVSS - JCOP Framework Tutorial : 14.3.03 (1 day) MAGNE-03 - Magnetism for Technical Ele...

  13. Places available **

    CERN Multimedia

    2003-01-01

    Des places sont disponibles dans les cours suivants : Places are available in the following courses : DISP-2003 - Spring I Term : Introduction to Digital Signal Processing : 20, 27.2, 6, 13, 20, 27.3, 3.4.03 (7 X 2-hour lectures) AXEL-2003 - Introduction to Accelerators : 24 - 28.2.03 (10 X 1-hour lectures) AutoCAD 2002 - niveau 1 : 24, 25.2 & 3, 4.3.03 (4 jours) Introduction à Windows 2000 au CERN : 25.2.03 (1/2 journée) LabView base 2/LabView Basics 2 : 10 & 11.3.03 (2 jours/2 days) langue à définir/Language to be decided C++ for Particle Physicists : 10 - 14.3.03 (6 X 3-hour lectures) Introduction to PVSS : 10.3.03 (half day, afternoon) Basic PVSS : 11 - 13.3.03 (3 days) LabView avancé /LabView Advanced : 12 - 14.3.03 (3 jours/3days) Langue à définir/language to be decided AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 17, 18, 24 & 25.3.03 (6 jours) PVSS - JCOP Framework Tutorial : 14.3.03 (1 day) CLEAN-2002 : Working in a cleanroom : 2.4.03 (half-day, afternoon, free course, regis...

  14. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Automates et réseaux de terrain : 13 & 14.11.01 (3 jours) Introduction à Windows 2000 au CERN : 12 - 14.11.01 (1/2 journée) Introduction to Windows 2000 at CERN :  14.11.01  (half-day) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Sécurité dans les installations cryogéniques : 21 - 22.11.2001 (2 demi-journées) Introduction to C Programming :  21- 23.11.01 (3 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) Contract Follow-up (F) : 26.11.01 (1/2 journée) Object-Oriented Analysis and Design :  27 - 30.11.2001  (4 days) Introduction to the CERN Engineering Data Management System :  30.11.2001 (1 day) Electromagnetic Compatibility (EMC): Introduction (bilingual) :  3.12.01 (half-day) Introduction to the CERN Engineering Data Management System : 07.12.2001...

  15. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: October 2002   Introduction to the CERN Engineering Data Management System (free of charge):  29.10.2002  (1 day) The CERN EDMS for Advanced users (free of charge):  30.10.2002  (1 day) November 2002   LabView hands-on (bilingue/bilingual): 5.11.02 (matin/morning) LabView DAQ hands-on (bilingue/bilingual):  5.11.02  (après-midi afternoon) Introduction au PC et Windows 2000 au CERN :  6 & 7.11.02  (2 jours) Oracle 8i : Access the Database with Java:  7 & 8.11.02  (2 days) AutoCAD 2002 - niveau 2 :  7 & 8.11.02  (2 jours) Introduction to PVSS (free of charge):  11.11.2002 pm  (1/2 day) Basic PVSS:  12 - 14.11.02  (3 days) EXCEL 2000 - niveau 1 :  12 & 13.11.02  (2 jours) CLEAN-2002: Working in a Cleanroom (English, free ...

  16. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Contract Follow-up (F) : 30.10.01 (1/2 journée) The CERN Engineering Data Management System for Electronics Design :  30.10.01 (1 day) Nouveautés d'Excel 2000 : 5.11.01 (1/2 journée) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) Introduction à Windows 2000 au CERN : 6.11.01 (1/2 journée) The Java programming language Level 1: 8 - 9.11.01 (2 days) LabView Base 1 : 12 - 14.11.01 (3 jours) LabVIEW DAQ (F) : 15 & 16.11.01 (2 jours) Automates et réseaux de terrain : 13 & 14.11.01 (2 jours) Introduction to PERL 5 :  15 - 16.11.01  (2 days) LabVIEW - DAQ : 15 - 16.11.01 (2 jours) Introduction to XML :  19 - 20.11.01 (2 days) Introduction to C Programming :  21- 23.11.01 (3 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) Object-Oriented Analysis and Design :  27 - 30.11.2001 (4 days) Hands...

  17. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: ELEC-2002 : Spring Term :  9, 11, 16, 18, 23, 25, 30.4.02 (7 * 2.5 hours) Object-Oriented Analysis & Design: 16 - 19.4.02  (4 days) The CERN Engineering Data Management System for Advanced users:  16.4.02  (1 day) Migration from AutoCAD 14 towards AutoCAD Mechanical6 PowerPack:  17 - 19.4 and 2 &3.5.02  (5 days) AutoCAD - niveau 1 : 22, 23, 29, 30.4 et 6, 7.5.02 (6 jours) LabVIEW base 1 : 22 - 24.4.02 (3 jours) CLEAN 2002 : working in a cleanroom:  24.4.02  (half-day, pm) LabVIEW DSC (F) 25 & 26.4.02 (2 jours) AutoCAD : Mise à jour AutoCAD r-14 vers 2002 : 25 & 26.4.02 (2 jours) LabVIEW Basics 2 : 13 & 14.5.02 (2 days) EXCEL 2000 - niveau 1 : 15 & 16.5.02 (2 jours) LabVIEW DAQ (F) : 15 & 16.5.02 (2 jours) EXCEL 2000 - niveau 2 : 22 & 23.5.02 (2 jours) LabVIEW Basics 1:  3 - 5.6.02&a...

  18. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: ELEC-2002 : Spring Term :  9, 11, 16, 18, 23, 25, 30.4.02 (7 * 2.5 hours) Object-Oriented Analysis & Design: 16 - 19.4.02  (4 days) The CERN Engineering Data Management System for Advanced users:  16.4.02  (1 day) Migration from AutoCAD 14 towards AutoCAD Mechanical6 PowerPack:  17 - 19.4 and 2 &3.5.02  (5 days) AutoCAD - niveau 1 : 22, 23, 29, 30.4 et 6, 7.5.02 (6 jours) LabVIEW base 1 : 22 - 24.4.02 (3 jours) CLEAN 2002 : working in a cleanroom:  24.4.02  (half-day, pm) LabVIEW DSC (F) 25 & 26.4.02 (2 jours) AutoCAD : Mise à jour AutoCAD r-14 vers 2002 : 25 & 26.4.02 (2 jours) Cotations selon les normes GPS de l'ISO : 29 - 30.4.02 (2 jours) Introduction to the CERN Engineering Data Management System:  7.5.02  (1 day) LabVIEW Basics 2 : 13 & 14.5.02 (2 days) AutoCAD Mechanical 6 PowerPack (F) : 13-...

  19. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Introduction to C Programming :  21- 23.11.01 (3 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) Contract Follow-up (F) : 26.11.01 (1/2 journée) Habilitation électrique : électriciens network : 27 - 29.11.2001 (3 jours) Object-Oriented Analysis and Design :  27 - 30.11.2001  (4 days) Introduction to the CERN Engineering Data Management System :  30.11.2001 (1 day) Electromagnetic Compatibility (EMC): Introduction (bilingual) :  3.12.01 (half-day) Introduction to the CERN Engineering Data Management System : 07.12.2001 (1 day) LabVIEW - Basics 1 :  10 - 12.12.01 (3 days) LabVIEW - Basics 2 :  13 - 14.12.01 (2 days) EXCEL 2000 - niveau 2 : 15 - 16.1.02 (2 jours) C++ Programming Level 2 - Traps and Pitfalls :  15 - 18.1.2002  (4 days) Nouveautés de WORD 2000 : 18.1.02 (1/2 journée) FileMaker P...

  20. Places available **

    CERN Document Server

    2003-01-01

    Des places sont disponibles dans les cours suivants : Places are available in the following course : Introduction to the CERN Engineering Data Management System : 28.1.03 (1 day) AutoCAD 2002 - niveau 1 : 24, 25.2 et 3, 4.3.03 (4 jours) AutoCAD 2002 - niveau 2 : 27 & 28.2.03 (2 jours) C++ for Particle Physicists : 10 - 14.3.03 (6 X 3 hour lectures) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 17, 18, 24 & 25.3.03 (6 jours) CLEAN-2002 : Working in a cleanroom : 25.3.03 (half-day, afternoon, free course, registration required) Formation Siemens SIMATIC /Siemens SIMATIC Training : Introduction à STEP7 /Introduction to STEP7 : 11 & 12.3.03 / 3 & 4.6.03 (2 jours/2 days) Programmation STEP7/STEP7 Programming : 31.3 - 4.4.03 / 16 - 20.6.03 (5 jours/5 days) Réseau Simatic Net /Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 Ces cours seront donnés en français ou anglais en fonction des demandes / These courses will be given in French or English following the requests. * Etant do...

  1. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) Programmation de pilotes périphériques : 5 - 8.5.03 (4 jours) Oracle iDS Reports : Build Internet Reports : 5 - 9.5.03 (5 days) LabView DAQ (language to be defined) : 8 & 9.5.03 AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.0 (6 jours) FrontPage 2000 - niveau 1 : 20 & 21.5.03 (2 jours) AutoCAD 2002 - niveau 2 : 3 & 4.6.03 (2 jours) EXCEL 2000 - niveau 1 : 10 & 11.6.03 (2 jours) EXCEL 2000 - level 1 : 12 & 13.6.03 (2 days) PowerPoint 2000 (F) : 17 & 18.6.03 (2 jours) FrontPage 2000 - niveau 2 : 19 & 20.6.03 (2 jours) LabView DSC (langue à décider/language to be defined) : 19 & 20.6.03 EXCEL 2000 - niveau 2 : 24 & 25.6.03 (2 jours) Siemens SIMATIC Training : Introduction to STEP7 : 3 & 4.6.03 (2 days) STEP7 Programming : 16 - 20.6.03 (5 days) Simatic Net Network : 26 & 27.6.03 ...

  2. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) Oracle iDS Reports : Build Internet Reports : 5 - 9.5.03 (5 days) LabView DAQ (language to be defined) : 8 & 9.5.03 AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03 (6 jours) AutoCAD 2002 - niveau 2 : 3 & 4.6.03 (2 jours) LabView DSC (language to be defined) : 19 & 20.6.03 Siemens SIMATIC Training : Introduction to STEP7 : 3 & 4.6.03 (2 days) STEP7 Programming : 16 - 20.6.03 (5 days) Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 (sessions of 2 days) These courses will be given in French or English following the requests. Cours de sécurité : Etre TSO au CERN : Prochaines sessions : 24, 25 & 27.6.03 - 4, 5 & 7.11.03 (session de 3 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description ...

  3. [Not Available].

    Science.gov (United States)

    Calbiac, Pascale De; Lamoureux, Fabien; Pourrat, Xavier; Bretault, Lydia; Marchand, Sophie; Grassin, Jacqueline; Antier, Daniel

    2006-01-01

    Treatment of Bronchial Superinfections: Data Related to Stability of Antibiotics in Portable Pumps. Given many data about the stability of antibiotics in portable pump (elastomer) are lacking, this study was designed to make a point about available data and to evaluate the stability of antibiotics when exposed to temperature within 35°C (average temperature measured in real conditions of use). First, to collect information about the stability of antibiotics in portable pump and to confront them with the local antibiotics protocols dedicated to the treatment of bronchial superinfection in patients with cystic fibrosis; second, to evaluate the stability of piperacillin associated with tazobactam at 35°C. While measured concentrations in tazobactam did not show significant variation during the study, piperacillin measurements showed a major reduction of concentration (up to 33%), both time and concentration related to. Such information must be pointed out to prescribers and patients to ensure a cold accumulator is placed in the pump can'ying-bag and to limit the duration of infusion to 24h with a single pump. This experimental program will keep on going with the stability study of both ticarcillin and cefsulodin in portable pump. Copyright © 2006 Société Française de Pharmacologie et de Thérapeutique. Publié par Elsevier Masson SAS.

  4. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Introduction au PC et à Windows 2000 au CERN : 29 - 30.1.02 (2 jours) LabView Base 1 : 4 - 6.2.02 (3 jours) LabView DAQ  (F) : 7 & 8.2.02 (2 jours) Hands-on Object-Oriented Design & Programming with Java :  11 - 13.02.02 (3 days) PVSS basics :  18 - 22.2.02 (5 days) Introduction à Windows 2000 : 18.2.02 (1 demi-journée) Introduction to the CERN Engineering Data Management System :  20.2.02 (1 day) The CERN Engineering Data Management System for Advanced users :  21.2.02  (1 day) C++ for Particle Physicists :  11 - 15.3.2002  (6 * 3 hour lectures) Cours sur la migration AutoCAD : AutoCAD : Mise à jour AutoCAD r-14 vers 2002 (2 jours) AutoCAD Mechanical PowerPack 6 basé sur AutoCAD 2002 (5 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electr...

  5. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: C++ for Particle Physicists :  11 - 15.3.2002  (6 * 3 hour lectures) Programming the Web for Control Applications : 11, 12, 18, 19.3.2002  (4 * 2 hour lectures) Habilitation électrique : recyclage HT/BT (Français) : 13 - 14.3.2002 (2 * 2 heures) Introduction à la CAO CADENCE : 19 & 20.3.02 (2 jours) LabVIEW base 1 : 22 - 24.4.02 (3 jours) LabVIEW DSC (F) 25 & 26.4.02 (2 jours) LabVIEW Basics 2 : 13 & 14.5.02 (2 days) LabVIEW DAQ (F) : 15 & 16.5.02 (2 jours) Cours sur la migration AutoCAD :   AutoCAD : Mise à jour AutoCAD r-14 vers 2002 (2 jours) AutoCAD Mechanical PowerPack 6 basé sur AutoCAD 2002 (5 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fil...

  6. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: LabVIEW - Basics 1 :  10 - 12.12.01 (3 days) Introduction to XML :  12 & 13.12.01 (2 days) Introduction au PC et Windows 2000 : 12 & 14.12.01 (2 jours) LabVIEW - Basics 2 :  13 - 14.12.01 (2 days) Habilitation électrique : superviseurs : 17.12.2001 (1/2 journée) MS-Project 2000 : 10 & 11.01.02 (2 jours) EXCEL 2000 - niveau 2 : 15 - 16.1.02 (2 jours) Sécurité dans les installations cryogéniques: 15-17.1.2002 (2 demi-journées) C++ Programming Level 2 - Traps and Pitfalls :  15 - 18.1.2002  (4 days) ELEC-2002 Winter Term: Readout and system electronics for Physics  15.1.2002 - 7.2.2002 (8 half- days) Nouveautés de WORD 2000 : 18.1.02 (1/2 journée) LabView hands-on : 21.01.02 (1/2 journée) LabView DAQ hands-on : 21.01.02 (1/2 journée) FileMaker Pro : 22 -...

  7. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2002-01-01

    Places are available in the following courses: LabView hands-on : 21.01.02 (1/2 journée) LabView DAQ hands-on : 21.01.02 (1/2 journée) FileMaker Pro : 22 - 25.1.02 (4 jours) MS-Project 2000 : 22, 24 & 25.01.02 (3 jours) Introduction au PC et à Windows 2000 au CERN : 29 - 30.1.02 (2 jours) LabView Base 1 : 4 - 6.2.02 (3 jours) LabView DAQ  (E) :  7 & 8.02.02 (2 days) Hands-on Object-Oriented Design & Programming with Java :  11 - 13.02.02 (3 days) PVSS basics :  11 - 15.2.02 (5 days) Introduction à Windows 2000 : 18.2.02 (1 demi-journée) Introduction to the CERN Engineering Data Management System :  20.2.02 (1 day) The CERN Engineering Data Management System for Advanced users :  21.2.02  (1 day) C++ for Particle Physicists :  11 - 15.3.2002  (6 * 3 hour lectures) Cours sur la migration AutoCAD : AutoCAD : Mise à...

  8. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel.74924

    2001-01-01

    Places are available in the following courses: Habilitation électrique : superviseurs : 5.12.01 (1/2 journée) LabVIEW - Basics 1 :  10 - 12.12.01 (3 days) Introduction au PC et Windows 2000 : 12 & 14.12.01 (2 jours) LabVIEW - Basics 2 :  13 - 14.12.01 (2 days) Habilitation électrique : superviseurs : 17.12.2001 (1/2 journée) EXCEL 2000 - niveau 2 : 15 - 16.1.02 (2 jours) Sécurité dans les installations cryogéniques: 15-17.1.2002 (2 demi-journées) C++ Programming Level 2 - Traps and Pitfalls :  15 - 18.1.2002  (4 days) ELEC-2002 Winter Term: Readout and system electronics for Physics  15.1.2002 - 7.2.2002 (8 half- days) Nouveautés de WORD 2000 : 18.1.02 (1/2 journée) LabView hands-on : 21.01.02 (1/2 journée) LabView DAQ hands-on : 21.01.02 (1/2 journée) FileMaker Pro : 22 - 25.1.02 (4 jours) Frontpage...

  9. PLACES AVAILABLE

    CERN Multimedia

    Enseignement Technique; Tel. 74924

    2001-01-01

    Places are available in the following courses: MS-Project 2000 : 10 & 11.01.02 (2 jours) EXCEL 2000 - niveau 2 : 15 - 16.1.02 (2 jours) Sécurité dans les installations cryogéniques: 15-17.1.2002 (2 demi-journées) C++ Programming Level 2 - Traps and Pitfalls :  15 - 18.1.2002  (4 days) ELEC-2002 Winter Term: Readout and system electronics for Physics  15.1.2002 - 7.2.2002 (8 half- days) Nouveautés de WORD 2000 : 18.1.02 (1/2 journée) LabView hands-on : 21.01.02 (1/2 journée) LabView DAQ hands-on : 21.01.02 (1/2 journée) FileMaker Pro : 22 - 25.1.02 (4 jours) MS-Project 2000 : 24 & 25.01.02 (2 jours) Introduction au PC et à Windows 2000 au CERN : 29 - 30.1.02 (2 jours) LabView Base 1 : 4 - 6.2.02 (3 jours) LabView DAQ  (E) :  7 & 8.02.02 (2 days) Hands-on Object-Oriented Design & Programming with Java :&nbs...

  10. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: PVSS Basics :  8 - 12.4.02  (5 days) AutoCAD : Mise à jour AutoCAD r-14 vers 2002 : 25 & 26.4.02 (2 jours) ELEC-2002 : Spring Term :  9, 11, 16, 18, 23, 25, 30.4.02 (7 * 2.5 hours) Object-Oriented Analysis & Design: 16 - 19.4.02  (4 days) Migration from AutoCAD 14 towards AutoCAD Mechanical6 PowerPack:  17 - 19.4 and 2 &3.5.02  (5 days) LabVIEW base 1 : 22 - 24.4.02 (3 jours) LabVIEW DSC (F) 25 & 26.4.02 (2 jours) LabVIEW Basics 2 : 13 & 14.5.02 (2 days) EXCEL 2000 - niveau 2 : 22 & 23.5.02 (2 jours) LabVIEW DAQ (F) : 15 & 16.5.02 (2 jours) LabVIEW Basics 1:  3 - 5.6.02  (3 days) LabVIEW DAQ (E):  6 & 7.6.02  (2 days) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that...

  11. PLACES AVAILABLE

    CERN Multimedia

    Monique DUVAL

    2002-01-01

    Places are available in the following courses: LabView Basics 1 :  4 - 6.3.02  (3 days) CLEAN-2002 : Working in a Clean Room :  7.3.2002  (half day) LabView Base 2 : 11 & 12.3.02 (2 jours) C++ for Particle Physicists :  11 - 15.3.2002  (6 * 3 hour lectures) Programming the Web for Control Applications : 11, 12, 18, 19.3.2002  (4 * 2 hour lectures) Habilitation électrique : recyclage HT/BT (Français) : 13 - 14.3.2002 (2 * 2 heures) LabView Advanced :  13 - 15.3.02 (3 days) Introduction to the CERN Engineering Data Management System (EDMS) :  20.3.2002  (1 day) The CERN (EDMS) for Advanced Users :  21.3.2002  (1 day) LabVIEW DSC : 25 - 26.4.2002 (2 jours) LabVIEW DAQ : 15 - 16.5.2002 (2 jours) Cours sur la migration AutoCAD :   AutoCAD : Mise à jour AutoCAD r-14 vers 2002 (2 jours) AutoCAD Mechanical PowerPack 6 basé ...

  12. PLACES AVAILABLE

    CERN Multimedia

    Technical Traininf; Tel. 74924

    2001-01-01

    Places are available in the following courses: Electromagnetic Compatibility (EMC): Introduction (bilingual) :  3.12.01 (half-day) Habilitation électrique : superviseurs : 5.12.01 (1/2 journée) Introduction to the CERN Engineering Data Management System : 07.12.2001 (1 day) LabVIEW - Basics 1 :  10 - 12.12.01 (3 days) Introduction au PC et Windows 2000 : 12 & 14.12.01 (2 jours) LabVIEW - Basics 2 :  13 - 14.12.01 (2 days) Habilitation électrique : superviseurs : 17.12.2001 (1/2 journée) EXCEL 2000 - niveau 2 : 15 - 16.1.02 (2 jours) C++ Programming Level 2 - Traps and Pitfalls :  15 - 18.1.2002  (4 days) Nouveautés de WORD 2000 : 18.1.02 (1/2 journée) LabView hands-on : 21.01.02 (1/2 journée) LabView DAQ hands-on : 21.01.02 (1/2 journée) FileMaker Pro : 22 - 25.1.02 (4 jours) Introduction au PC et à Windows 2000 au CERN : 29 - 30.1....

  13. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : FrontPage 2000 - niveau 1 : 20 & 21.5.03 (2 jours) PIPES-2003 : Pratique du sertissage de tubes métalliques et multicouches : 21.5.03 (1 jour) Introduction à la CAO Cadence : de la saisie de schéma Concept-HDL au PCB : 20 & 22.5.03 (2 jours) AutoCAD 2002 - niveau 2 : 3 & 4.6.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 5, 6, 12, 13, 26, 27.6.03 (6 jours) EXCEL 2000 - niveau 1 : 10 & 11.6.03 (2 jours) Conception de PCB rapides dans le flot Cadence : 11.6.03 (matin) EXCEL 2000 - level 1 : 12 & 13.6.03 (2 days) PowerPoint 2000 (F) : 17 & 18.6.03 (2 jours) Réalisation de PCB rapides dans le flot Cadence : 17.6.03 (matin) FrontPage 2000 - niveau 2 : 19 & 20.6.03 (2 jours) LabView DSC (langue à décider/language to be defined) : 19 & 20.6.03 EXCEL 2000 - niveau 2 : 24 & 25.6.03 (2 jours) Siemens SIMATIC Training: Introduction to STEP7 : 3 & 4.6.03 (2 days) STEP7 Programming : 16 - 20.6.03 (5 days) Simatic...

  14. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : FrontPage 2000 - niveau 1: 20 & 21.5.03 (2 jours) PIPES-2003 : Pratique du sertissage de tubes métalliques et multicouches: 21.5.03 (1 jour) Introduction à la CAO Cadence: de la saisie de schéma Concept-HDL au PCB : 20 & 22.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (E): 5, 6, 12, 13, 26, 27.6.03 (6 days) EXCEL 2000 - niveau 1: 10 & 11.6.03 (2 jours) Conception de PCB rapides dans le flot Cadence: 11.6.03 (matin) EXCEL 2000 - level 1: 12 & 13.6.03 (2 days) Introduction to PVSS: 16.6.03 (half-day, pm) Basic PVSS: 17 - 19.6.03 (3 days) Réalisation de PCB rapides dans le flot Cadence: 17.6.03 (matin) LabView DSC (language to be defined): 19 & 20.6.03 PVSS - JCOP Framework Tutorial: 20.6.03 (1 day) EXCEL 2000 - niveau 2: 24 & 25.6.03 (2 jours) Siemens SIMATIC Training: Introduction to STEP7: 3 & 4.6.03 (2 days) STEP7 Programming: 16 - 20.6.03 (5 days) Simatic Net Network: 26 & 27.6.03 (2 days) These courses will be given...

  15. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: EXCEL 2000 - niveau 1 : 3 et 4.10.01 (2 jours) Automates et réseaux de terrain : 3 - 4.10.2001 (2 jours) Introduction à Outlook : 5.10.01 (1 journée) C++ for Particle Physicists : 8 - 12.10.01 (6 lectures) Cadence Board Design tools : Upgrading to release 14 : 3 1-day sessions on 9, 10 & 11.10.01 MS-Project 2000 - niveau 1 : 15 - 18.10.01 (4 demi-journées) LabView Base 2 : 18 & 19.10.01 (2 jours) WORD 2000 : importer et manipuler des images : 19.10.01 (1 journée) The CERN Engineering Data Management System for Electronics Design :  30.10.01 (1 day) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) The Java programming language Level 1: 8 - 9.11.01 (2 days) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to XML :  19 - 20.11.01 (2 days) Programming TSX Premium 1 :  19 - 23.11.01  (5 days) Introd...

  16. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Contract Follow-up (F) : 30.10.01 (1/2 journée) The CERN Engineering Data Management System for Electronics Design :  30.10.01 (1 day) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) Nouveautés d'EXCEL : 5.11.01 (1/2 journée) Introduction a Windows 2000 au CERN : 6.11.01 (1/2 journée) The Java programming language Level 1: 8 - 9.11.01 (2 days) LabView Base 1 : 12 - 14.11.01 (3 jours) Automates et réseaux de terrain : 13 & 14.11.01 (2 jours) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to XML :  19 - 20.11.01 (2 days) Programming TSX Premium 1 :  19 - 23.11.01  (5 days) Introduction to C Programming :  21- 23.11.01 (3 days) The Java programming language Level 2:  26 - 28.11.01 (3 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) Autocad Migration support courses: a detail...

  17. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: MS-Project 2000 - niveau 1 : 15 - 18.10.01 (4 demi-journées) LabView Base 2 : 18 & 19.10.01 (2 jours) WORD 2000 : importer et manipuler des images : 19.10.01 (1 journée) Contract Follow-up (F) : 30.10.01 (1/2 journée) The CERN Engineering Data Management System for Electronics Design :  30.10.01 (1 day) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) The Java programming language Level 1: 8 - 9.11.01 (2 days) LabView Base 1 : 12 - 14.11.01 (3 jours) Automates et réseaux de terrain : 13 & 14.11.01 (2 jours) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to XML :  19 - 20.11.01 (2 days) Programming TSX Premium 1 :  19 - 23.11.01  (5 days) Introduction to C Programming :  21- 23.11.01 (3 days) The Java programming language Level 2:  26 - 28.11.01 (3 days) Programmation TSX Premium 2 : 26 ...

  18. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Cadence Board Design tools : Upgrading to release 14 :  3 1-day sessions on 9, 10 & 11.10.01 MS-Project 2000 - niveau 1 : 15 - 18.10.01 (4 demi-journées) LabView Base 2 : 18 & 19.10.01 (2 jours) WORD 2000 : importer et manipuler des images : 19.10.01 (1 journée) Contract Follow-up (F) :  30.10.01 (1/2 journée) The CERN Engineering Data Management System for Electronics Design :  30.10.01 (1 day) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) The Java programming language Level 1: 8 - 9.11.01 (2 days) LabView Base 1 : 12 - 14.11.01 (3 jours) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to XML :  19 - 20.11.01 (2 days) Programming TSX Premium 1 :  19 - 23.11.01  (5 days) Introduction to C Programming :  21- 23.11.01 (3 days) The Java programming language Level 2:  26 - 28.11.01 (...

  19. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Introduction à Windows 2000 au CERN : 2 sessions de _ journée les 24 et 25.9.01 PROFIBUS : 25 - 26.9.01 (2 jours) PROFIBUS : 27 - 28.9.01 (2 days) EXCEL 2000 - niveau 1 : 3 et 4.10.01 (2 jours) Automates et réseaux de terrain : 3 - 4.10.2001 (2 jours) Introduction à Outlook : 5.10.01 (1 journée) Frontpage 2000 - niveau 1 : 8 et 9.10.01 (2 jours) C++ for Particle Physicists : 8 - 12.10.01 (6 lectures) MS-Project 2000 - niveau 1 : 15 - 18.10.01 (4 demi-journées) Programmation TSX Premium 1 : 15 - 19.10.01 (5 jours) WORD 2000 : importer et manipuler des images : 19.10.01 (1 journée) Programmation TSX Premium 1 : 22 - 26.10.01 (5 jours) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) The Java programming language Level 1: 8 - 9.11.01 (2 days) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to XML :  19 - 20.11.01 (2...

  20. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: LabView DAQ  (F) : 7 & 8.2.02 (2 jours) Hands-on Object-Oriented Design & Programming with Java :  11 - 13.02.02 (3 days) PVSS basics :  18 - 22.2.02 (5 days) Introduction à Windows 2000 : 18.2.02 (1 demi-journée) Introduction to the CERN Engineering Data Management System :  20.2.02 (1 day) Introduction à la CAO CADENCE : 20 & 21.2.02 (2 jours) The CERN Engineering Data Management System for Advanced users :  21.2.02  (1 day) LabView Basics 1 :  4 - 6.3.02  (3 days) Introduction au VHDL et utilisation du simulateur de CADENCE : 6 & 7.3.02 (2 jours) LabView Base 2 : 11 & 12.3.02 (2 jours) C++ for Particle Physicists :  11 - 15.3.2002  (6 * 3 hour lectures) LabView Advanced :  13 - 15.3.02 (3 days) Cours sur la migration AutoCAD :   AutoCAD : Mise à...

  1. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: The CERN EDMS for Local Administrators (free of charge) : 24 & 25.9.03 (2 days) HeREF-2003 : Techniques de la réfrigération Hélium (cours en français avec support en anglais) : 6 - 10.10.2003 (7 demi-journées) The Java Programming Language Level 1 : 6 - 7.10.2003 (2 days) Java 2 Enterprise Edition - Part 2 : Enterprise JavaBeans : 8 - 10.10.2003 (3 days) FileMaker - niveau 1 : 9 & 10.10.03 (2 jours) EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) AutoCAD 2002 - niveau 1 : 20, 21, 27, 28.10.03 (4 jours) CLEAN-2002 : Working in a Cleanroom (free of charge) : 23.10.03 (half day) AutoCAD Mechanical 6 PowerPack (E) : 23, 24, 30, 31.10 & 12, 13.11.03 (6 days) AutoCAD 2002 - niveau 2 : 10 & 11.11.03 (2 jours) ACCESS 2000 - niveau 1 : 13 & 14.11.03 (2 jours) FrontPage 2000 - niveau 1 : 20...

  2. Places available **

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: PIPES-2003 - Pratique du Sertissage de tubes métalliques et multicouches : 26.8.03 (stage pratique) The CERN Engineering Data Management System (EDMS) for Engineers : 27.8.03 (1 day, free of charge) CLEAN-2002 : Travailler en salle blanche : 4.9.03 (une demi-journée, séminaire gratuit) The CERN Engineering Data Management System (EDMS) for Local Administrators : 24 & 25.9.03 (2 days, free of charge) Siemens SIMATIC Training : Programmation STEP7 - niveau 1 : 29 - 2.10.03 (4 jours) - ouverture des inscriptions fin août Programmation STEP7 - niveau 2 : 13 - 17.10.03 (5 jours) - ouverture des inscriptions fin août Réseau Simatic Net : 22 & 23.10.03 (2 jours) - ouverture des inscriptions fin août CLEAN-2002 : Working in a Cleanroom : 23.20.03 (half day, free of charge) These courses will be given in French or Englis...

  3. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : The CERN EDMS for Local Administrators : 24 & 25.9.03 (2 days, free of charge) HeREF-2003 : Techniques de la réfrigération Hélium (cours en français avec support en anglais) : 6 - 10.10.2003 (7 demi-journées) The Java Programming Language Level 1 : 6 - 7.10.2003 (2 days) Java 2 Enterprise Edition - Part 2 : Enterprise JavaBeans : 8 - 10.10.2003 (3 days) FileMaker - niveau 1 : 9 & 10.10.03 (2 jours) EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) AutoCAD 2002 - niveau 1 : 20, 21, 27, 28.10.03 (4 jours) CLEAN-2002 : Working in a Cleanroom : 23.10.03 (half day, free of charge) AutoCAD 2002 - Level 1 : 3, 4, 12, 13.11.03 (4 days) AutoCAD 2002 - niveau 2 : 10 & 11.11.03 (2 jours) ACCESS 2000 - niveau 1 : 13 & 14.11.03 (2 jours) AutoCAD Mechanical 6 PowerPack (E) : 17, 18, 24, 25.11 & 1, 2.12.03 (6...

  4. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : EXCEL 2000 - niveau 1 : 10 & 11.6.03 (2 jours) Conception de PCB rapides dans le flot Cadence : 11.6.03 (matin) EXCEL 2000 - level 1 : 12 & 13.6.03 (2 days) Introduction to PVSS : 16.6.03 (p.m.) Basic PVSS : 17 - 19.6.03 (3 days) Réalisation de PCB rapides dans le flot Cadence : 17.6.03 (matin) PVSS - JCOP Framework Tutorial : 20.6.03 (1 day) EXCEL 2000 - niveau 2 : 24 & 25.6.03 (2 jours) Siemens SIMATIC Training : Introduction to STEP7 : 3 & 4.6.03 (2 jours/2 days) STEP7 Programming : 16 - 20.6.03 (5 jours/5 days) Simatic Net Network : 26 & 27.6.03 (2 jours/2 days) These courses will be given in French or English following the requests. Programmation automate Schneider : Programmation automate Schneider TSX Premium - 1er niveau : 10 - 13.6.03 (4 jours) - audience : toute personne qui veux maitriser la msie en uvre et la programmation d'un automate TSX Premium - objectifs : maitriser la mise en uvre et la programmation d'un autom...

  5. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: CLEAN-2002 : Travailler en salle blanche (séminaire gratuit) : 4.9.03 (une demi-journée) The CERN EDMS for Local Administrators (free of charge) : 24 & 25.9.03 (2 days) HeREF-2003 : Techniques de la réfrigération Hélium (cours en français avec support en anglais) : 6 - 10.10.2003 (7 demi-journées) The Java Programming Language Level 1 : 6 - 7.10.2003 (2 days) Java 2 Enterprise Edition - Part 2 : Enterprise JavaBeans : 8 - 10.10.2003 (3 days) FileMaker - niveau 1 : 9 & 10.10.03 (2 jours) EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) AutoCAD 2002 - niveau 1 : 20, 21, 27, 28.10.03 (4 jours) CLEAN-2002 : Working in a Cleanroom (free of charge) : 23.10.03 (half day) AutoCAD Mechanical 6 PowerPack (E) : 23, 24, 30, 31.10 & 12, 13.11.03 (6 days) AutoCAD 2002 - niveau 2 : 10 & 11.11.03 (2 jours)...

  6. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: November 2002   Introduction to PVSS (free of charge): 11.11.02  (afternoon) EXCEL 2000 - niveau 1 :  12 & 13.11.02  (2 jours) CLEAN-2002: Working in a Cleanroom (English, free of charge):  13.11.2002  (afternoon) AutoCAD 2002 - niveau 1 :  14, 15, 21, 22.11.02  (4 jours) Hands-on Object-Oriented Design and Programming with C++:  19 - 21.11.02  (3 days)  EXCEL 2000 - niveau 2 :  25 & 26.11.02  (2 jours) FrontPage 2000 - niveau 1 :  27 & 28.11.02  (2 jours) December 2002   LabVIEW - DSC (English) :  2 - 3.12.02  (2 days) AutoCAD 2002 - niveau 2 :  2 & 3.12.02  (2 jours) FileMaker (Français) :  2 - 5.12.02  (4 jours) PCAD Schémas - Débutants :  5 & 6.12.02 ...

  7. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Introduction à Windows 2000 au CERN : 2 sessions de _ journée les 24 et 25.9.01 PROFIBUS : 25 - 26.9.01 (2 jours) PROFIBUS : 27 - 28.9.01 (2 days) PowerPoint 2000 : 1 et 2.10.01 (2 jours) EXCEL 2000 - niveau 1 : 3 et 4.10.01 (2 jours) Automates et réseaux de terrain : 3 - 4.10.2001 (2 jours) PCAD Schémas - débutants : 4 - 5.10.01 (2 jours) Introduction à Outlook : 5.10.01 (1 journée) Frontpage 2000 - niveau 1 : 8 et 9.10.01 (2 jours) PCAD PCB - débutants : 8 - 10.10.01 (3 jours) C++ for Particle Physicists : 8 - 12.10.01 (6 3-hour lectures) MS-Project 2000 - niveau 1 : 15 - 18.10.01 (4 demi-journées) LabView Basics 1 :  15 - 17.10.01  (3 days) Programmation TSX Premium 1 : 15 - 19.10.01 (5 jours) WORD 2000 : importer et manipuler des images : 19.10.01 (1 journée) Programmation TSX Premium 1 : 22 - 26.10.01...

  8. PLACES AVAILABLE

    CERN Multimedia

    Technical training; Tel. 74924

    2001-01-01

    Places are available in the following courses: PVSS Basics : 20 - 24.8.01 (5 days) PROFIBUS : 25 - 26.9.01 (2 jours) PROFIBUS : 27 - 28.9.01 (2 days) PCAD Schémas - débutants : 4 - 5.10.01 (2 jours) PCAD PCB - débutants : 8 - 10.10.01 (3 jours) Programming TSX Premium 1: 15 - 19.10.01 (5 days) Programmation TSX Premium 1 : 22 - 26.10.01 (5 jours) Programming TSX Premium 2: 19 - 23.11.01 (5 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) The following LabView courses will be given in either English or French according to demand LabVIEW - Base 1 / LabVIEW - Basics 1 : 10 - 12.9.01 (3 jours / 3 days) LabVIEW - DAQ / LabVIEW - DAQ : 13 - 14.9.01 (2 jours / 2 days) LabVIEW - Base 1 / LabVIEW - Basics 1 : 15 - 17.10.01 (3 jours / 3 days) LabVIEW - Base 2 / LabVIEW - Basics 2 : 18 - 19.10.01 (2 jours / 2 days) LabVIEW - Base 1 / LabVIEW - Basics 1 : 12 - 14.11.01 (3 jours / 3 days) LabVIEW - DAQ / LabVIEW - DAQ : 15 - 16.11.01 (2 jours / 2...

  9. PLACES AVAILABLE

    CERN Multimedia

    Technical training; Tel. 74924

    2001-01-01

    Places are available in the following courses: PROFIBUS : 25 - 26.9.01 (2 jours) PROFIBUS : 27 - 28.9.01 (2 days) Automates et réseaux de terrain : 3 - 4.10.2001 (2 jours) PCAD Schémas - débutants : 4 - 5.10.01 (2 jours) PCAD PCB - débutants : 8 - 10.10.01 (3 jours) Programmation TSX Premium 1 : 15 - 19.10.01 (5 jours) Programmation TSX Premium 1 : 22 - 26.10.01 (5 jours) Programming TSX Premium 2: 19 - 23.11.01 (5 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) Autocad Migration support courses: a detailed calendar will be published shortly for this series of sessions which will start on 15.10.2001. Registration is already open AutoCAD : Mise à jour AutoCAD r-14 vers 2002 (2 jours) AutoCAD Mechanical PowerPack 6 basé sur AutoCAD 2002 (5 jours) The following LabView courses will be given in either English or French according to demand LabVIEW - Base 1 / LabVIEW - Basics 1 : 10 - 12.9.01 (3 jours / 3 days)...

  10. PLACES AVAILABLES

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: PVSS Basics : 20 - 24.8.01 (5 days) PROFIBUS : 25 - 26.9.01 (2 jours) PROFIBUS : 27 - 28.9.01 (2 days) PCAD Schémas - débutants : 4 - 5.10.01 (2 jours) PCAD PCB - débutants : 8 - 10.10.01 (3 jours) Programming TSX Premium 1: 15 - 19.10.01 (5 days) Programmation TSX Premium 1 : 22 - 26.10.01 (5 jours) Programming TSX Premium 2: 19 - 23.11.01 (5 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) The following LabView courses will be given in either English or French according to demand LabVIEW - Base 1 / LabVIEW - Basics 1 : 10 - 12.9.01 (3 jours / 3 days) LabVIEW - DAQ / LabVIEW - DAQ : 13 - 14.9.01 (2 jours / 2 days) LabVIEW - Base 1 / LabVIEW - Basics 1 : 15 - 17.10.01 (3 jours / 3 days) LabVIEW - Base 2 / LabVIEW - Basics 2 : 18 - 19.10.01 (2 jours / 2 days) LabVIEW - Base 1 / LabVIEW - Basics 1 : 12 - 14.11.01 (3 jours / 3 days) LabVIEW - DAQ / LabVIEW - DAQ : 15 - 16.11.01 (2 jours / 2...

  11. Places available **

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : CLEAN-2002 : Working in a cleanroom (free course, registration required): 11.4.03 (half-day, afternoon, ) LabView Basics 2 : 10 - 11.4.03 (3 days) DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) Oracle iDS Reports : Build Internet Reports : 5 - 9.5.03 (5 days) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03 (6 jours) Formation Siemens SIMATIC /Siemens SIMATIC Training : Introduction à STEP7 /Introduction to STEP7 : 3 & 4.6.03 (2 jours/2 days) Programmation STEP7/STEP7 Programming : 31.3 - 4.4.03 / 16 - 20.6.03 (5 jours/5 days) Réseau Simatic Net /Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 These courses will be given in French or English following the requests. Cours de sécurité : Etre TSO au CERN : Prochaines sessions : 24, 25 & 27.6....

  12. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : CLEAN-2002 : Working in a cleanroom (free course, registration required): 11.4.03 (half-day, afternoon, ) LabView Basics 2 : 10 - 11.4.03 (3 days) DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) Oracle iDS Reports : Build Internet Reports : 5 - 9.5.03 (5 days) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03(6 jours) Formation Siemens SIMATIC /Siemens SIMATIC Training : Introduction à STEP7 /Introduction to STEP7 : 3 & 4.6.03 (2 jours/2 days) Programmation STEP7/STEP7 Programming : 31.3 - 4.4.03 / 16 - 20.6.03 (5 jours/5 days) Réseau Simatic Net /Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 These courses will be given in French or English following the requests. Cours de sécurité : Etre TSO au CERN : Prochaines sessions : 24, 25 & 27.6...

  13. Places available **

    CERN Multimedia

    2003-01-01

    Des places sont disponibles dans les cours suivants : Places are available in the following courses : C++ for Particle Physicists : 10 - 14.3.03 (6 X 3-hour lectures) Introduction to PVSS : 10.3.03 (half day, afternoon) Basic PVSS : 11 - 13.3.03 (3 days) PVSS - JCOP Framework Tutorial : 14.3.03 (1 day) CLEAN-2002 : Working in a cleanroom : 2.4.03 (half-day, afternoon, free course, registration required) LabView base 1/LabView Basics 1 : 9 - 11.4.03 (3 jours/3 days) Langue à définir/language to be decided DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03 (6 jours) Formation Siemens SIMATIC /Siemens SIMATIC Training : Introduction à STEP7 /Introduction to STEP7 : 11 & 12.3.03 / 3 & 4.6.03 (2 jours/2 days) Programmation STEP7/STEP7 Programming : 31.3 - 4.4.03 / 16...

  14. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : Introduction to PVSS : 10.3.03 (half-day, afternoon) CLEAN-2002 : Working in a cleanroom : 2.4.03 (half-day, afternoon, free course, registration required) LabView Basics 1 : 9 - 11.4.03 (3 days) Language to be decided. DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures). AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03 (6 jours) Siemens SIMATIC Training: Introduction to STEP7 : 3 & 4.6.03 (2 days) STEP7 Programming : 31.3 - 4.4.03 / 16 - 20.6.03 (5 days) Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 These courses will be given in French or English following the requests. Cours de sécurité: Etre TSO au CERN : 3 sessions sont programmées pour 2003 : 25, 26 & 28.3.03 - 24, 25 & 27.6.03 - 4, 5 & 7.11.03 (sessions de 3 jours) ** The number o...

  15. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : CLEAN-2002 : Working in a cleanroom (free course, registration required) : 2.4.03 (half-day, afternoon) LabView base 1/LabView Basics 1 (Langue à définir/ language to be decided) : 9 - 11.4.03 (3 jours/3 days) DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03(6 jours) Formation Siemens SIMATIC /Siemens SIMATIC Training : Introduction à STEP7 /Introduction to STEP7 : 3 & 4.6.03 (2 jours/2 days) Programmation STEP7/STEP7 Programming : 31.3 - 4.4.03 / 16 - 20.6.03 (5 jours/5 days) Réseau Simatic Net /Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 These courses will be given in French or English following the requests. Cours de sécurité : Etre TSO au CERN : 3 sessions sont programmées pour 2003 : 25...

  16. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : CLEAN-2002 : Working in a cleanroom (free course, registration required): 11.4.03 (half-day, afternoon) LabView Basics 2 : 10 - 11.4.03 (3 days) DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) Oracle iDS Reports : Build Internet Reports : 5 - 9.5.03 (5 days) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03(6 jours) Formation Siemens SIMATIC /Siemens SIMATIC Training : Introduction à STEP7 /Introduction to STEP7 : 3 & 4.6.03 (2 jours/2 days) Programmation STEP7/STEP7 Programming : 16 - 20.6.03 (5 jours/5 days) Réseau Simatic Net /Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 These courses will be given in French or English following the requests. Cours de sécurité : Etre TSO au CERN : Prochaines sessions : 24, 25 & 27.6.03 - 4, 5 & 7....

  17. PLACES AVAILABLE

    CERN Document Server

    Enseignement Technique; Tél. 74924; Technical Training; Monique Duval; Tel. 74924

    2000-01-01

    Places are available in the following courses : Premiers pas avec votre PC 12 - 15.9.00 (4 demi-journées) WORD 20, 21 et 26, 27.9.2000 (4 jours) JAVA programming level 1 25 - 26.9.2000 (2 days) Gaz inflammables 1 26.9.2000 (1 journée) Advanced aspects of PERL 5 6.10.2000 (1 day) Initiation au WWW 10 - 12.10.00 (3 demi-journées) WORD : importer et manipuler des images 16.10.2000 (1 journée) FileMaker 17, 18 et 24, 25.10.00 (4 jours) Nouveautés de WORD 19 et 20.10.2000 (2 jours) ACCESS 1er niveau 30 - 31.10.00 (2 jours)Introduction à PowerPoint 6.11.00 (1 journée)Nouveautés d’EXCEL 7.11.2000(4 demi-journées)Excel 13, 14 et 20, 21.11.00 (4 jours) LabView hands-on 13.11.2000(4 hours)LabView Basics 1 14 - 16.11.2000 (3 days) MS-Project 1er niveau 14-17.11.00 (4 demi-journées) If you wish to participate in one of these courses, please discuss with your supervisor and apply elec...

  18. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: LabView hands-on (bilingue/bilingual): 5.11.02 (matin/morning) LabView DAQ hands-on (bilingue/bilingual):  5.11.02  (après-midi afternoon) Introduction au PC et Windows 2000 au CERN:  6 & 7.11.02  (2 jours) Oracle 8i : Access the Database with Java:  7 & 8.11.02  (2 days) AutoCAD 2002 - niveau 2:  7 & 8.11.02  (2 jours) Introduction to PVSS (free of charge):  11.11.2002 pm  (1/2 day) Basic PVSS:  12 - 14.11.02  (3 days) EXCEL 2000 - niveau 1:  12 & 13.11.02  (2 jours) CLEAN-2002: Working in a Cleanroom (English, free of charge):  13.11.2002  (afternoon) LabView Base 1 :  13 - 15.11.02  (3 jours) AutoCAD 2002 - Level 1:  14, 15, 21, 22.11.2002  (4 days) LabVIEW - Advanced:  18 - 20.11.02  (3 days) Auto...

  19. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: LabView Base 1 :  23 - 25.9.02  (3 jours) Object-Oriented Analysis & Design using UML:  25 - 27.9.02  (3 days) LabView DAQ (E):  26 - 27.9.02  (2 days) Introduction to Oracle 8i : SQL and PL/SQL:  7 - 11.10.02  (5 days) CLEAN-2002 : Working in a Cleanroom (free of charge):  10.10.02  (half-day, p.m.) AutoCAD 2002 - niveau 2 :  14 - 15.10.02  (2 jours) Introduction à DesignSpace :  16.10.02  (1 journée) Introduction to DesignSpace:  17.10.02  (1 day) AutoCAD 2002 - Level 1:  17, 18, 24, 25.10.02  (4 days) AutoCAD Mechanical 6 PowerPack (F) :  21, 22, 23.10 et 4, 5, 6.11.02  (6 jours) Introduction à ANSYS/Introduction to ANSYS (langue à définir suivant demande/ Language to be chosen according to demand):...

  20. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: November 2002   LabView hands-on (bilingue/bilingual): 5.11.02 (matin/morning) LabView DAQ hands-on (bilingue/bilingual):  5.11.02  (après-midi afternoon) PCAD Schémas - Débutants :  5 & 6.11.02  (2 jours) PCAD PCB - Débutants :  9 - 11.11.02  (3 jours) Introduction au PC et Windows 2000 au CERN :  6 & 7.11.02  (2 jours) Oracle 8i : Access the Database with Java :  7 & 8.11.02  (2 days) Introduction to PVSS (free of charge):  11.11.2002 pm  (1/2 day) Basic PVSS:  12 - 14.11.02  (3 days) EXCEL 2000 - niveau 1 :  12 & 13.11.02  (2 jours) CLEAN-2002: Working in a Cleanroom (English, free of charge):  13.11.2002  (afternoon) LabView Base 1 :  13 - 15.11.02  (3 jours) AutoCAD 2002 - niveau 1 :  14, 15, 21, 22.11.02  (4 jours) LabVIEW - Advanced:  18 - 20.11.02  (3 days) Hands-on Object-Oriented Design and Programming with C++ :  19 - 21.11.02  (3 days)  LabVIEW - Basics 2:  21 - 22.11.02 ...

  1. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Java 2 Enterprise Edition - Part 2: Enterprise JavaBeans:  18 - 20.9.02  (3 days) AutoCAD 2002 - niveau 1 :  19, 20, 26, 27.9.02  (4 jours) LabView Base 1 :  23 - 25.9.02  (3 jours) Object-Oriented Analysis & Design using UML:  25 - 27.9.02  (3 days) LabView DAQ (E):  26 - 27.9.02  (2 days) Introduction to Oracle 8i : SQL and PL/SQL:  7 - 11.10.02  (5 days) CLEAN-2002 : Working in a Cleanroom (free of charge):  10.10.02  (half-day, p.m.) AutoCAD 2002 - niveau 2 :  14 - 15.10.02  (2 jours) Introduction à DesignSpace :  16.10.02  (1 journée) Introduction to DesignSpace:  17.10.02  (1 day) AutoCAD 2002 - Level 1:  17, 18, 24, 25.10.02  (4 days) AutoCAD Mechanical 6 PowerPack (F) :  21, 22, 23.10 et 4, 5, 6.11....

  2. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Introduction à DesignSpace :  16.10.02  (1 journée) AutoCAD Mechanical 6 PowerPack (F) :  21, 22, 23.10 et 4, 5, 6.11.02  (6 jours) Introduction à ANSYS 21 - 25.10.02  (5 jours/days) HREF-2002: Helium Refrigeration Techniques (English-French, bilingual) :  21 - 25.10.2002  (7 half days) LabVIEW Basics 1 (English):  21 - 23.10.02  (3 days) LabVIEW Basics 2 (English):  24 & 25.10.02  (2 days) Oracle 8i : Access the Database with Java:  7 & 8.11.02  (2 days) AutoCAD 2002 - niveau 2 :  7 & 8.11.02  (2 jours) AutoCAD 2002 - Level 1:  14, 15, 21, 22.11.02  (4 days) LabVIEW - Advanced (English) :  18 - 20.11.2002  (3 days) AutoCAD 2002 - niveau 1 :  19, 20, 25, 26.11.02 (4 jours) Oracle iDS Designer: First Class:&...

  3. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Introduction to Oracle 8i : SQL and PL/SQL:  7 - 11.10.02  (5 days) CLEAN-2002 : Working in a Cleanroom (free of charge):  10.10.02  (half-day, p.m.) AutoCAD 2002 - niveau 2 :  14 - 15.10.02  (2 jours) Introduction à DesignSpace :  16.10.02  (1 journée) Introduction to DesignSpace:  17.10.02  (1 day) AutoCAD 2002 - Level 1:  17, 18, 24, 25.10.02  (4 days) AutoCAD Mechanical 6 PowerPack (F) :  21, 22, 23.10 et 4, 5, 6.11.02  (6 jours) Introduction à ANSYS/Introduction to ANSYS (langue à définir suivant demande/ Language to be chosen according to demand):  21 - 25.10.02  (5 jours/days) HREF-2002: Helium Refrigeration Techniques (English-French, bilingual) :  21 - 25.10.2002  (7 half days) HREF-2002: Techniques de la Réfri...

  4. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: PIPES-2003 - Pratique du sertissage de tubes métalliques et multicouches :26.8.03(stage pratique) The CERN EDMS for Engineers (free of charge) : 27.8.03 (1 day) CLEAN-2002 : Travailler en salle blanche (séminaire gratuit) : 4.9.03(une demi-journée) The CERN EDMS for Local Administrators (free of charge) : 24 & 25.9.03 (2 days) HeREF-2003 : Techniques de la réfrigération Hélium (cours en français avec support en anglais) : 6 - 10.10.2003 (7 demi-journées) The Java Programming Language Level 1 : 6 - 7.10.2003 (2 days) Java 2 Enterprise Edition - Part 2 : Enterprise JavaBeans : 8 - 10.10.2003 (3 days) FileMaker - niveau 1 : 9 & 10.10.03 (2 jours) EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) AutoCAD 2002 - niveau 1 : 20, 21, 27, 28.10.03 (4 jours) CLEAN-2002 : Working in a Cleanroom (free of charge) : 23.10.03 (half day) AutoCAD Mechanical 6 PowerPack (E) : 23, 24, 30, 31.10 & 12, 13.11.03 (6 days) AutoCAD 2002 - niveau 2...

  5. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Introduction to Oracle 8i : SQL and PL/SQL:  7 - 11.10.02  (5 days) CLEAN-2002 : Working in a Cleanroom (free of charge):  10.10.02  (half-day, p.m.) LabView Hands-on (bilingue/bilingual) : 10.10.02 (matin/morning) LabView DAQ Hands-on (bilingue/bilingual)  10.10.02 (après-midi /afternoon) Introduction à DesignSpace :  16.10.02  (1 journée) Introduction to DesignSpace:  17.10.02  (1 day) AutoCAD Mechanical 6 PowerPack (F) :  21, 22, 23.10 et 4, 5, 6.11.02  (6 jours) Introduction à ANSYS/Introduction to ANSYS (langue à définir suivant demande/ Language to be chosen according to demand):  21 - 25.10.02  (5 jours/days) HREF-2002: Helium Refrigeration Techniques (English-French, bilingual) :  21 - 25.10.2002  (7 half days) HREF-2002: Techniques de la...

  6. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: The CERN EDMS for Local Administrators : 24 & 25.9.03 (2 days, free of charge) HeREF-2003 : Techniques de la réfrigération Hélium cours en français avec support en anglais) : 6 - 10.10.2003 (7 demi-journées) The Java Programming Language Level 1 : 6 - 7.10.2003 (2 days) Java 2 Enterprise Edition - Part 2 : Enterprise JavaBeans : 8 - 10.10.2003 (3 days) FileMaker - niveau 1 : 9 & 10.10.03 (2 jours) EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) AutoCAD 2002 - niveau 1 : 20, 21, 27, 28.10.03 (4 jours) CLEAN-2002 : Working in a Cleanroom : 23.10.03 (half day, free of charge) AutoCAD 2002 - Level 1 : 3, 4, 12, 13.11.03 (4 days) AutoCAD 2002 - niveau 2 : 10 & 11.11.03 (2 jours) ACCESS 2000 - niveau 1 : 13 & 14.11.03 (2 jours) AutoCAD Mechanical 6 PowerPack (E) : 17, 18, 24, 25.11 & 1, 2.12.03 (6 days) FrontPage 2000 - niveau 1 : 20 & 21.11.03 (2 jours) MAGNE-03 : Magnétisme pour l'électrotechnique : 25 - 27.11.03 (3 jours) ...

  7. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Nouveautés d'EXCEL : 5.11.01 (1/2 journée) Introduction a Windows 2000 au CERN : 6.11.01 (1/2 journée) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) Design Patterns :  7 - 8.11.01 (2 days) The Java programming language Level 1: 8 - 9.11.01 (2 days) Automates et réseaux de terrain : 13 & 14.11.01 (3 jours) Introduction à Windows 2000 au CERN : 12 - 14.11.01 (1/2 journée) Introduction to Windows 2000 at CERN :  14.11.01  (half-day) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to C Programming :  21- 23.11.01 (3 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) Contract Follow-up (F) : 26.11.01 (1/2 journée) Object-Oriented Analysis and Design :  27 - 30.11.2001  (4 days) Hands-on Object-Oriented Design and Programming with C++ :  11 - 13.12.2...

  8. Estimation of available water capacity components of two-layered soils using crop model inversion: Effect of crop type and water regime

    Science.gov (United States)

    Sreelash, K.; Buis, Samuel; Sekhar, M.; Ruiz, Laurent; Kumar Tomer, Sat; Guérif, Martine

    2017-03-01

    Characterization of the soil water reservoir is critical for understanding the interactions between crops and their environment and the impacts of land use and environmental changes on the hydrology of agricultural catchments especially in tropical context. Recent studies have shown that inversion of crop models is a powerful tool for retrieving information on root zone properties. Increasing availability of remotely sensed soil and vegetation observations makes it well suited for large scale applications. The potential of this methodology has however never been properly evaluated on extensive experimental datasets and previous studies suggested that the quality of estimation of soil hydraulic properties may vary depending on agro-environmental situations. The objective of this study was to evaluate this approach on an extensive field experiment. The dataset covered four crops (sunflower, sorghum, turmeric, maize) grown on different soils and several years in South India. The components of AWC (available water capacity) namely soil water content at field capacity and wilting point, and soil depth of two-layered soils were estimated by inversion of the crop model STICS with the GLUE (generalized likelihood uncertainty estimation) approach using observations of surface soil moisture (SSM; typically from 0 to 10 cm deep) and leaf area index (LAI), which are attainable from radar remote sensing in tropical regions with frequent cloudy conditions. The results showed that the quality of parameter estimation largely depends on the hydric regime and its interaction with crop type. A mean relative absolute error of 5% for field capacity of surface layer, 10% for field capacity of root zone, 15% for wilting point of surface layer and root zone, and 20% for soil depth can be obtained in favorable conditions. A few observations of SSM (during wet and dry soil moisture periods) and LAI (within water stress periods) were sufficient to significantly improve the estimation of AWC

  9. [Not Available].

    Science.gov (United States)

    Spivak, M

    1987-01-01

    Some ideas, whether right or wrong, seem never to die, whatever might be the general evolution of knowledge, of science, or simply of good common sense. This is exactly the case with physical education or sports. For centuries, and especially since the middle of the nineteenth century, its advocates have fought for recognition of its all-round virtues, taken as a concept. But to attain a high level of recognition, not only in society but in official government circles, certain conditions were necessary. Education as a whole, around the middle of the nineteenth century, had to be strict and similar to military drill to be considered efficient, although the French middle classes and bourgeoisie had very little taste for the military. Although they admired physical prowess they had a horror of regimentation. But later on, when the Prussians so easily defeated Austria, feelings of doubt in French superiority began to spread, and a handful of theoreticians of physical exercise tried to show that to combat the so-called degeneration of the race, it was essential to impose a system of education in which physical exercise, coupled with military drill, still had an important place. As scientific arguments they referred to the theories of evolution and its then accepted principle, according to Lamarck, or the transmission of acquired properties and character. Darwin was still unknown in France at that time. These zealous advocates succeeded in convincing the Minister of Public Education, Victor Duruy, to include gymnastics in the normal course of studies in all schools, and by 1869 one can say that a craze for all types of physical exercise and sport had spread into many levels of society. That was the start of a never-ending movement which has passed through various stages of evolution corresponding to the changes in society itself. It has therefore changed its methods, its ways, its forms, but the overall principle remains the same, in spite of the improved understanding

  10. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    Science.gov (United States)

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  11. Directionally hiding objects and creating illusions above a carpet-like device by reflection holography

    Science.gov (United States)

    Cheng, Qiluan; Wu, Kedi; Shi, Yile; Wang, Hui; Wang, Guo Ping

    2015-02-01

    Realization of a perfect invisibility cloak still challenges the current fabricating technologies. Most experiments, if not all, are hence focused on carpet cloaks because of their relatively low requirements to material properties. Nevertheless, present invisibility carpets are used to hide beneath objects. Here, we report a carpet-like device to directionally conceal objects and further to create illusions above it. The device is fabricated through recording a reflection hologram of objects and is used to produce a time-reversed signal to compensate for the information of the objects and further to create light field of another object so as to realize both functions of hiding the objects and creating illusions, respectively. The carpet-like device can work for macroscopic objects at visible wavelength as the distance between objects and device is at decimeter scale. Our carpet-like device to realizing invisibility and creating illusions may provide a robust way for crucial applications of magic camouflaging and anti-detection etc.

  12. Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding

    CERN Document Server

    Bahi, Jacques M; Guyeux, Christophe; Wang, Qianxue

    2011-01-01

    Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we described a generator based on chaotic iterations which behaves chaotically as defined by Devaney. In this paper which is an extension of the work presented at the conference Internet`10, the proposal is to improve the speed, the security, and the evaluation of this generator, to make its use more relevant in the Internet security context. In order to do so, a comparative study between various generators is carried out and statistical results are improved. Finally, an application in the information hiding framework is presented with details, to give an illustrative example of the use of such a gener...

  13. Temporal cloak with large fractional hiding window at telecommunication data rate

    Science.gov (United States)

    Zhou, Feng; Dong, Jianji; Yan, Siqi; Yang, Ting

    2017-04-01

    We design and experimentally investigate a temporal cloak scheme using ultrashort pulse compression and time-domain Fraunhofer diffraction. An input continuous-wave probe beam is compressed to ultrashort pulse train based on self-phase modulation effect and chirp compensation using single mode fiber. Accordingly, wide temporal gaps appear to act as the cloaking windows. The train of ultrashort pulses can be converted to continuous wave after experiencing enough dispersion, indicating that the temporal gaps are closed. Thus, any time events will be hidden in the temporal gaps from observers. In our study, we demonstrated a temporal cloak system, which is able to hide 88% of the whole time period and cloak pseudorandom digital data at a bitrate of 10 Gbit/s. The relationships of cloaking window fraction versus pump power and the condition of cloaking off are also investigated. These results present a new feasible way towards obtaining a high-fractional cloaking window at telecommunication data rate and hiding real-world messages.

  14. A one-time pad encryption method combining full-phase image encryption and hiding

    Science.gov (United States)

    Li, Jiaosheng; Xiong, Jiaxiang; Zhang, Qinnan; Zhong, Liyun; Zhou, Yunfei; Li, Jun; Lu, Xiaoxu

    2017-08-01

    A one-time pad encryption method combining full-phase image encryption and hiding is proposed. Firstly, original images are encoded in the phase and encrypted by phase keys loaded on the phase-only liquid crystal spatial light modulator, where the phase keys can be distributed using a quantum key distribution method. Subsequently, a host image is introduced to produce a reference wave, and overlap with an object wave to form an interferogram. Finally, based on phase-shifting interferometry, we can achieve the above encrypted image hiding. Both the simulation and experiment research demonstrate the feasibility of the proposed method, meanwhile the key and the encrypted image can be changed randomly, so the proposed system reveals the high flexibility, anti-attack ability and can be used to implement the one-time pad to achieve absolute secure transmission with the quantum key distribution method. Moreover, system security will be improved due to the fact that encryption information hidden in the host image can be treated as background noise, which does not attract the attention of the attacker.

  15. Efficacy of octenidine hydrochloride for reducing Escherichia coli O157:H7, Salmonella spp., and Listeria monocytogenes on cattle hides.

    Science.gov (United States)

    Baskaran, Sangeetha Ananda; Upadhyay, Abhinav; Upadhyaya, Indu; Bhattaram, Varunkumar; Venkitanarayanan, Kumar

    2012-06-01

    The efficacy of octenidine hydrochloride (OH; 0.025, 0.15, and 0.25%) for inactivating Escherichia coli O157:H7, Salmonella spp., and Listeria monocytogenes on cattle hides was investigated at 23°C in the presence and absence of bovine feces. All tested concentrations of OH were effective in decreasing more than 5.0 log CFU of bacteria/cm(2) in 5 min (P < 0.01). The results suggest that OH could be used to decontaminate cattle hides; however, further studies under commercial settings are necessary to validate these results.

  16. Evaluation of bacteriophage application to cattle in lairage at beef processing plants to reduce Escherichia coli O157:H7 prevalence on hides and carcasses

    Science.gov (United States)

    Escherichia coli O157:H7 is a major food safety concern for the beef industry. Several studies have provided evidence that cattle hides are the main source of beef carcass contamination during processing and that reductions in the E. coli O157:H7 load on the hides of cattle entering processing faci...

  17. Frailty and the relationship between blood pressure and mortality in elderly patients with type 2 diabetes (Zwolle Outpatient Diabetes project Integrating Available Care-34)

    NARCIS (Netherlands)

    van Hateren, Kornelis J. J.; Hendriks, Steven H.; Groenier, Klaas H.; Bakker, Stephan J. L.; Bilo, Henk J. G.; Kleefstra, Nanne; Landman, Gijs W. D.

    Objective: We aimed to investigate whether adjustment for frailty influences the relationship of blood pressure with mortality in elderly patients with type 2 diabetes mellitus (T2DM). Methods: Patients aged 60 years and older (n = 858) were selected from a prospective observational cohort study of

  18. Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding.

    Science.gov (United States)

    Mehra, Isha; Nishchal, Naveen K

    2014-03-10

    Image fusion is a popular method which provides better quality fused image for interpreting the image data. In this paper, color image fusion using wavelet transform is applied for securing data through asymmetric encryption scheme and image hiding. The components of a color image corresponding to different wavelengths (red, green, and blue) are fused together using discrete wavelet transform for obtaining a better quality retrieved color image. The fused color components are encrypted using amplitude- and phase-truncation approach in Fresnel transform domain. Also, the individual color components are transformed into different cover images in order to result disguising information of input image to an attacker. Asymmetric keys, Fresnel propagation parameters, weighing factor, and three cover images provide enlarged key space and hence enhanced security. Computer simulation results support the idea of the proposed fused color image encryption scheme.

  19. Costly hide and seek pays: Unexpected consequences of deceit in a social dilemma

    CERN Document Server

    Szolnoki, Attila

    2014-01-01

    Deliberate deceptiveness intended to gain an advantage is commonplace in human and animal societies. In a social dilemma, an individual may only pretend to be a cooperator to elicit cooperation from others, while in reality he is a defector. With this as motivation, we study a simple variant of the evolutionary prisoner's dilemma game entailing deceitful defectors and conditional cooperators that lifts the veil on the impact of such two-faced behavior. Defectors are able to hide their true intentions at a personal cost, while conditional cooperators are probabilistically successful at identifying defectors and act accordingly. By focusing on the evolutionary outcomes in structured populations, we observe a number of unexpected and counterintuitive phenomena. We show that deceitful behavior may fare better if it is costly, and that a higher success rate of identifying defectors does not necessarily favor cooperative behavior. These results are rooted in the spontaneous emergence of cycling dominance and spatia...

  20. HIDES spectroscopy of bright detached eclipsing binaries from the $Kepler$ field - I. Single-lined objects

    CERN Document Server

    Hełminiak, K G; Kambe, E; Kozłowski, S K; Sybilski, P; Ratajczak, M; Maehara, H; Konacki, M

    2016-01-01

    We present results of our spectroscopic observations of nine detached eclipsing binaries (DEBs), selected from the $Kepler$ Eclipsing Binary Catalog, that only show one set of spectral lines. Radial velocities (RVs) were calculated from the high resolution spectra obtained with the HIDES instrument, attached to the 1.88-m telescope at the Okayama Astrophysical Observatory, and from the public APOGEE archive. In our sample we found five single-lined binaries, with one component dominating the spectrum. The orbital and light curve solutions were found for four of them, and compared with isochrones, in order to estimate absolute physical parameters and evolutionary status of the components. For the fifth case we only update the orbital parameters, and estimate the properties of the unseen star. Two other systems show orbital motion with a period known from the eclipse timing variations (ETVs). For these we obtained parameters of outer orbits, by translating the ETVs to RVs of the centre of mass of the eclipsing ...

  1. An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security

    CERN Document Server

    Farouk, Hala A

    2011-01-01

    The hybrid hiding encryption algorithm, as its name implies, embraces concepts from both steganography and cryptography. In this exertion, an improved micro-architecture Field Programmable Gate Array (FPGA) implementation of this algorithm is presented. This design overcomes the observed limitations of a previously-designed micro-architecture. These observed limitations are: no exploitation of the possibility of parallel bit replacement, and the fact that the input plaintext was encrypted serially, which caused a dependency between the throughput and the nature of the used secret key. This dependency can be viewed by some as vulnerability in the security of the implemented micro-architecture. The proposed modified micro-architecture is constructed using five basic modules. These modules are; the message cache, the message alignment module, the key cache, the comparator, and at last the encryption module. In this work, we provide comprehensive simulation and implementation results. These are: the timing diagra...

  2. Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem

    CERN Document Server

    Kabetta, Herman; Suyoto,

    2012-01-01

    In many recent years, the programming world has been introduced about a new programming language for designing websites, it is CSS that can be be used together with HTML to develop a web interface. And now, these two programming languages as if inseparably from each other. As a client-side scripting, CSS is visible by all users as the original script, but it can not be granted changed. Website is a tool of information disseminator throughout the world, this is certainly can be used to a secret communication by using CSS as a message hider. This paper proposed a new scheme using web tools like CSS for hiding informations. This is a secret communication mechanism using text steganography techniques that is embedded messages on CSS files and is further encrypted using RSA as a public key cryptographic algorithm.

  3. Perfectly secure steganography: Hiding information in the quantum noise of a photograph

    Science.gov (United States)

    Sanguinetti, Bruno; Traverso, Giulia; Lavoie, Jonathan; Martin, Anthony; Zbinden, Hugo

    2016-01-01

    We show that it is possible to hide information perfectly within a photograph. The proposed protocol works by selecting each pixel value from two images that differ only by shot noise. Pixel values are never modified, but only selected, making the resulting stego image provably indistinguishable from an untampered image, and the protocol provably secure. We demonstrate that a perfect steganographic protocol is also a perfectly secure cryptographic protocol, and therefore has at least the same requirements: a truly random key as long as the message. In our system, we use a second image as the key, satisfying length requirements, and the randomness is provided by the naturally occurring quantum noise which is dominant in images taken with modern sensors. We conclude that, given a photograph, it is impossible to tell whether it contains any hidden information.

  4. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  5. Optical image hiding based on dual-channel simultaneous phase-shifting interferometry and compressive sensing

    Science.gov (United States)

    Li, Jiaosheng; Zhong, Liyun; Zhang, Qinnan; Zhou, Yunfei; Xiong, Jiaxiang; Tian, Jindong; Lu, Xiaoxu

    2017-01-01

    We propose an optical image hiding method based on dual-channel simultaneous phase-shifting interferometry (DCSPSI) and compressive sensing (CS) in all-optical domain. In the DCSPSI architecture, a secret image is firstly embedded in the host image without destroying the original host's form, and a pair of interferograms with the phase shifts of π/2 is simultaneously generated by the polarization components and captured by two CCDs. Then, the holograms are further compressed sampling to the less data by CS. The proposed strategy will provide a useful solution for the real-time optical image security transmission and largely reducing data volume of interferogram. The experimental result demonstrates the validity and feasibility of the proposed method.

  6. Study of information hiding algorithm based on GHM and color transfer theory

    Institute of Scientific and Technical Information of China (English)

    REN Shuai; MU De-jun; ZHANG Tao; HU Wei

    2009-01-01

    Taking the feature that the energy of the image would gather and spread on four components (LL2, LH2, HL2 and HH2) in the sub-image atfer first-order GHM multi-wavelet-transform. And by using the color control ability oflαβ color space in color transfer theory (CTT), an information hiding algorithm based on GHM-CTT is proposed. In this way, the robust parameters are embedded in the LL2, the hidden information is set in LH2 and HL2 with RAID4, and fragile sign is set in HH2. The consistence between the embedded data bits' order and the embedded code of the sub-image is improved by using the chaotic mapping and the genetic algorithm. Experimental results indicate that the GHM-CTT can increase the imperceptibility by 15.72% averagely and robustness by 18.89% at least.

  7. The attraction of virgin female hide beetles (Dermestes maculatus to cadavers by a combination of decomposition odour and male sex pheromones

    Directory of Open Access Journals (Sweden)

    von Hoermann Christian

    2012-08-01

    Full Text Available Abstract Introduction The hide beetle Dermestes maculatus (Coleoptera: Dermestidae feeds as an adult and larva on decomposing animal remains and can also be found on human corpses. Therefore, forensic entomological questions with regard to when and how the first receptive females appear on carcasses are important, as the developmental stages of their larvae can be used to calculate the post-mortem interval. To date, we know that freshly emerged males respond to the cadaver odour of post-bloated carcasses (approximately 9 days after death at Tmean = 27°C, being attracted by benzyl butyrate. This component occurs at its highest concentration at this stage of decay. The aim of our study was to determine the principle of attraction of virgin females to the feeding and breeding substrate. For this purpose, we tested the response of these females to headspace samples of piglet cadavers and male sex pheromones [(Z9-unsaturated fatty acid isopropyl esters] in a Y-olfactometer. Because we expected that such an odour combination is of importance for virgin female attraction, we tested the following two questions: 1 Are virgin female hide beetles attracted by a combination of cadaver odour and male sex pheromones? 2 During which decomposition stage do the first virgin females respond to cadaver odour when combined with male sex pheromones? Results We found that young virgin females were attracted to the cadaver by a combination of cadaver odour and male sex pheromones. Neither cadaver odour alone nor male sex pheromones alone was significantly more attractive than a solvent control. Our results also gave a weak indication that the first young virgin females respond as early as the post-bloating stage to its associated decomposition odour when combined with male sex pheromones. Conclusions Our results indicate that freshly emerged males possibly respond to cadaver odour and visit carcasses before virgin females. Being attracted to cadavers when male sex

  8. Hiding a Heavy Higgs Boson at the 7 TeV LHC

    Energy Technology Data Exchange (ETDEWEB)

    Bai, Yang; Fan, JiJi; Hewett, JoAnne L.

    2012-03-20

    A heavy Standard Model Higgs boson is not only disfavored by electroweak precision observables but is also excluded by direct searches at the 7 TeV LHC for a wide range of masses. Here, we examine scenarios where a heavy Higgs boson can be made consistent with both the indirect constraints and the direct null searches by adding only one new particle beyond the Standard Model. This new particle should be a weak multiplet in order to have additional contributions to the oblique parameters. If it is a color singlet, we find that a heavy Higgs with an intermediate mass of 200-300 GeV can decay into the new states, suppressing the branching ratios for the standard model modes, and thus hiding a heavy Higgs at the LHC. If the new particle is also charged under QCD, the Higgs production cross section from gluon fusion can be reduced significantly due to the new colored particle one-loop contribution. Current collider constraints on the new particles allow for viable parameter space to exist in order to hide a heavy Higgs boson. We categorize the general signatures of these new particles, identify favored regions of their parameter space and point out that discovering or excluding them at the LHC can provide important indirect information for a heavy Higgs. Finally, for a very heavy Higgs boson, beyond the search limit at the 7 TeV LHC, we discuss three additional scenarios where models would be consistent with electroweak precision tests: including an additional vector-like fermion mixing with the top quark, adding another U(1) gauge boson and modifying triple-gauge boson couplings.

  9. 通信信息隐藏技术研究%A Research on Communication Information Hiding Technologies

    Institute of Scientific and Technical Information of China (English)

    张松; 冯祺

    2016-01-01

    网络的技术的迅速发展使得通信信息的传输变得更加快捷、方便,与此同时,也为攻击者截获通信信息带来了便利,通信的安全和隐蔽成为一个亟需解决的问题。信息隐藏技术为保证通信的隐蔽性提供了一种新的思路。论文对信息隐藏技术进行分类介绍,给出了信息隐藏技术的模型和基本特征,并分析了信息隐藏技术与隐藏分析技术和密码学之间的关系,最后给出了总结与展望。%The rapid development of network technology enables the transmission of communication information to be ‐come faster and more convenient ,at the same time ,it also makes it easier for attackers to intercept communication informa‐tion .Security and covert communication has become an urgent problem ,information hiding technology provides a new way of thinking to ensure the covert communication .This paper describes the classification of information hiding technology ,and gives the model and the basic characteristics of information hiding ,and analyzes the relationship between information hiding and steganalysis as well as the relationship between information hiding and cryptography ,finally ,gives the summary and outlook future development .

  10. Comparison of a Commercially Available Repetitive-Element PCR System (DiversiLab) with PCR Ribotyping for Typing of Clostridium difficile Strains ▿

    OpenAIRE

    Eckert, C; Van Broeck, J; Spigaglia, P.; Burghoffer, B.; Delmée, M; Mastrantonio, P; Barbut, F

    2011-01-01

    This study compared a repetitive-element PCR (rep-PCR) method (DiversiLab system) to PCR ribotyping. The discriminatory power of rep-PCR was 0.997. Among the PCR ribotype 027 isolates tested, different rep types could be distinguished. rep-PCR showed a higher discriminatory power than PCR ribotyping. Nevertheless, this method requires technical skill, and visual interpretation of rep-PCR fingerprint patterns may be difficult.

  11. Comparison of a commercially available rep-PCR system (Diversilab(R)) with PCR-ribotyping for typing of Clostridium difficile strains.

    OpenAIRE

    Eckert, C.; van Broeck, Johan; Spigaglia, P.; Burghoffer, B; Delmée, Michel; Mastrantonio, P; Barbut, F

    2011-01-01

    This study compared a rep-PCR method (DiversiLab® system) to PCR-ribotyping. The discriminatory power of rep-PCR was 0.997. Among the PCR-ribotype 027, different rep-types could be distinguished. Rep-PCR showed a higher discriminatory power than PCR-ribotyping. Nevertheless, this method requires technical skill and visual interpretation of rep-PCR fingerprint patterns may be difficult.

  12. Comparison of a Commercially Available Repetitive-Element PCR System (DiversiLab) with PCR Ribotyping for Typing of Clostridium difficile Strains ▿

    OpenAIRE

    Eckert, C.; Van Broeck, J.; Spigaglia, P.; Burghoffer, B; Delmée, M; Mastrantonio, P; Barbut, F

    2011-01-01

    This study compared a repetitive-element PCR (rep-PCR) method (DiversiLab system) to PCR ribotyping. The discriminatory power of rep-PCR was 0.997. Among the PCR ribotype 027 isolates tested, different rep types could be distinguished. rep-PCR showed a higher discriminatory power than PCR ribotyping. Nevertheless, this method requires technical skill, and visual interpretation of rep-PCR fingerprint patterns may be difficult.

  13. Availability growth modeling

    Energy Technology Data Exchange (ETDEWEB)

    Wendelberger, J.R.

    1998-12-01

    In reliability modeling, the term availability is used to represent the fraction of time that a process is operating successfully. Several different definitions have been proposed for different types of availability. One commonly used measure of availability is cumulative availability, which is defined as the ratio of the amount of time that a system is up and running to the total elapsed time. During the startup phase of a process, cumulative availability may be treated as a growth process. A procedure for modeling cumulative availability as a function of time is proposed. Estimates of other measures of availability are derived from the estimated cumulative availability function. The use of empirical Bayes techniques to improve the resulting estimates is also discussed.

  14. Review on the Content, Specification of Selenium and Its Availability in Soils

    Directory of Open Access Journals (Sweden)

    ZHOU Yue

    2014-12-01

    Full Text Available As more selenium (Se rich soil has been found, people begin to give more attention to the availability of Se for plant and human-beings. However, current understanding for the content, specification and plant availability is not complete and accurate. By analyzing the past research on Se in soils, we believed that differences in backgrounds (soil types, climate and hiding effect of various influential factors led to different results with regard to the relationship of soil Se with influential factors. There should be more controlled study and quantitative-based model to trace the genuine relationship between soil Se and Fe and Al oxide, pH, Eh and organic matter. For the regional Se balance within air-soil-water-plant system, air precipitation, Se volatilization and leaching should be more precisely monitored. Isotope technology (natural istotope and labelling could be a good option for tracing transformation mechanisms of Se in soil-plant system and this would give more good scientific support for the increasing Se utilization efficiency.

  15. [The effectiveness of empirical antibiotic therapy of pyelonephritis in patients with type 2 diabetes and without depending on the availability of plasmid-mediated resistance genes].

    Science.gov (United States)

    Chub, O I; Bilchenko, A V

    2015-02-01

    Multi-drug resistance has been increasing in the treatment of urinary tract infections, especially complicated. The prevalence of plasmid-mediated resistance genes among urinary pathogens has nether been studied in Ukraine. So, the aim of our study was to identify the plasmid-mediated resistance genes and to determine their impact on the efficacy of the treatment. A total of 105 adult patients with chronic pyelonephritis were included in the study. Among them, 32 patients were diagnosed with type 2 diabetes mellitus. The diagnosis of pyelonephritis was verified according to the criteria EAU, 2013. Plasmid-mediated resistance genes were determined by polymerase chain reaction (PCR). The prevalence of plasmid-mediated resistance mechanisms among patients with pyelonephritis were 44,4%. ESBLs was the most common isolated genes. Favorable clinical response was seen in 11/31 (35,5%) infected with ESBL-producing organisms compared with 59/74 (79,7%) patients with non-ESBL-producing organisms (ppyelonephritis due to presence of plasmid-mediated resistance genes. Therefore, prоpеr mаnagеment fоr prescriptiоn of аntibiоtics and also idеntificаtiоn of ESBL-prоducing bаcteria in cоmmunitiеs arе impоrtant fоr prevеntion.

  16. Asymmetric information hiding and noise-free recovery based on rotating analyzer ellipsometry and quick-response code.

    Science.gov (United States)

    Lin, Chao; Shen, Xueju; Wang, Zhisong

    2014-08-01

    We report an asymmetric optical information hiding method based on a rotating analyzer ellipsometry technique. This asymmetric hiding architecture not only avoids the interception of keys during transmission or distribution but also makes the cyphertext more inconspicuous for attackers. A new kind of one-way optical trapdoor function is constructed based on the fact that the state of polarization (SOP) of elliptical polarized light cannot be recovered with only the knowledge of intensity captured after passing through a linear polarizer. Meanwhile, the SOP of a polarization ellipse could be calculated by rotating the polarizer to record two scenes of intensity after it. Introduction of a quick response code as a container leads to noise-free recovery for original information and enhances practicality of the proposed cryptosystem with versatile key sensitivity and fault tolerance capability. Numerical simulation results that support theoretical analysis are presented. Analysis on the relationship between hiding effect or quality of decryption and parameters of the algorithm also is provided.

  17. Use of steam condensing at subatmospheric pressures to reduce Escherichia coli O157:H7 numbers on bovine hide.

    Science.gov (United States)

    McEvoy, J M; Doherty, A M; Sheridan, J J; Blair, I S; McDowell, D A

    2001-11-01

    This study used a laboratory-scale apparatus to apply subatmospheric steam to bovine hide pieces inoculated with Escherichia coli O157:H7 in maximum recovery diluent (MRD) and in high-liquid content and low-liquid content fecal suspensions (HLC fecal and LLC fecal, respectively). The survival of the organism in fecal clods, which were stored for 24 days in a desiccated state, was assessed. Inoculated fecal clods were also treated with subatmospheric steam. Steam treatment at 80 +/- 2 degrees C for 20 s reduced E. coli O157:H7 concentrations on hide inoculated to initial concentrations of approximately 7 log10 CFU/g by 5.46 (MRD inoculum), 4.17 (HLC fecal inoculum), and 5.99 (LLC fecal inoculum) log10 CFU/g. The reductions achieved in samples inoculated with LLC feces were larger than in samples inoculated with HLC feces (P Steam treatment (20 s) of 3-day-old clods reduced surviving E. coli O157:H7 numbers from 4.20 log10 CFU/g to below the limit of detection of the assay used (1.20 log10 CFU/g). This study shows that steam condensing at or below 80 +/- 2 degrees C can reduce E. coli O157:H7 when present on bovine hide, reducing the risk of cross contamination to the carcass during slaughter and dressing.

  18. Novel serine keratinase from Caldicoprobacter algeriensis exhibiting outstanding hide dehairing abilities.

    Science.gov (United States)

    Bouacem, Khelifa; Bouanane-Darenfed, Amel; Zaraî Jaouadi, Nadia; Joseph, Manon; Hacene, Hocine; Ollivier, Bernard; Fardeau, Marie-Laure; Bejar, Samir; Jaouadi, Bassem

    2016-05-01

    The current paper reports on the purification of an extracellular thermostable keratinase (KERCA) produced from Caldicoprobacter algeriensis strain TH7C1(T), a thermophilic, anaerobic bacterium isolated from a hydrothermal hot spring in Algeria. The maximum keratinase activity recorded after 24-h of incubation at 50 °C was 21000 U/ml. The enzyme was purified by ammonium sulfate precipitation-dialysis and heat treatment (2h at 50 °C) followed by UNO Q-6 FPLC anion exchange chromatography, and submitted to biochemical characterization assays. Matrix assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF/MS) analysis revealed that the purified enzyme was a monomer with a molecular mass of 33246.10 Da. The sequence of the 23 N-terminal residues of KERCA showed high homology with those of bacterial keratinases. Optimal activity was achieved at pH 7 and 50 °C. The enzyme was completely inhibited by phenylmethanesulfonyl fluoride (PMSF) and diiodopropyl fluorophosphates (DFP), which suggests that it belongs to the serine keratinase family. KERCA displayed higher levels of hydrolysis and catalytic efficiency than keratinase KERQ7 from Bacillus tequilensis strain Q7. These properties make KERCA a potential promising and eco-friendly alternative to the conventional chemicals used for the dehairing of goat, sheep, and bovine hides in the leather processing industry.

  19. Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2015-05-01

    A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  20. Performance evaluation of information hiding%信息隐藏性能评价方法

    Institute of Scientific and Technical Information of China (English)

    马秀莹; 林家骏

    2011-01-01

    It is necessary to establish a benchmark for information hiding. Imperceptibility is an important index to evaluate the performance of steganography. Based on HVS model, a new imperceptibility measure CHD for color stego image was proposed. Experimental results show that the quality of stego image calculated by CHD reflects the luminance masking, texture masking and color masking of HVS, and CHD can be used to evaluate the imperceptibility of steganography tools.%建立信息隐藏技术的评价标准十分必要.隐写术的视觉不可感知性是评价隐写术性能的重要指标之一.基于HVS模型,给出不可感知性评价指标CHD.实验结果表明,CHD的判定结果反映了人类视觉的亮度,对比度和色彩掩蔽特性,可以作为隐写术的不可感知性评价指标.

  1. Hiding the system from the user: Moving from complex mental models to elegant metaphors

    Energy Technology Data Exchange (ETDEWEB)

    Curtis W. Nielsen; David J. Bruemmer

    2007-08-01

    In previous work, increased complexity of robot behaviors and the accompanying interface design often led to operator confusion and/or a fight for control between the robot and operator. We believe the reason for the conflict was that the design of the interface and interactions presented too much of the underlying robot design model to the operator. Since the design model includes the implementation of sensors, behaviors, and sophisticated algorithms, the result was that the operator’s cognitive efforts were focused on understanding the design of the robot system as opposed to focusing on the task at hand. This paper illustrates how this very problem emerged at the INL and how the implementation of new metaphors for interaction has allowed us to hide the design model from the user and allow the user to focus more on the task at hand. Supporting the user’s focus on the task rather than on the design model allows increased use of the system and significant performance improvement in a search task with novice users.

  2. New approach for ensuring cloud computing security: using data hiding methods

    Indian Academy of Sciences (India)

    MURAT YESILYURT; YILDIRAY YALMAN

    2016-11-01

    Cloud computing is one of the largest developments occurred in the field of information technology during recent years. This model has become more desirable for all institutions, organizations and also for personal use thanks to the storage of ‘valuable information’ at low costs, access to such information from anywhere in the world as well as its ease of use and low cost. In this paper, the services constituting the cloud architecture and deployment models are examined, and the main factors in the provision of security requirements of all those models as well as points to be taken into consideration are described in detail. In addition, the methods and tools considering how security, confidentiality and integrity of the information or data that formsthe basis of modern technology are implemented in cloud computing architecture are examined. Finally, it is proposed in the paper that the use of data hiding methods in terms of access security in cloud computing architecture and the security of the stored data would be very effective in securing information.

  3. A simple method to hide data loggers safely in observation wells.

    Science.gov (United States)

    Lorenzen, Gunnar; Sprenger, Christoph; Pekdeger, Asaf

    2011-01-01

    Submersible data loggers are widely used for groundwater monitoring, but their application often runs the risk of hardware and data loss through vandalism or theft. During a field study in India, the authors of this article experienced that well locks attract the attention of unauthorized persons and do not provide secure protection in unattended areas. To minimize the risk of losing data loggers, a cheap and simple solution has been invented to hide the instruments and associated attachments below the ground surface, inside observation wells. It relies on attaching the logger to a length of small-diameter pipe that is submerged at the bottom of the well, instead of attaching it to the top of the well. The small-diameter pipe with the logger is connected to a small bottle containing a magnet that floats on the water surface of the well and can be recovered using another bottle also with a magnet. A logger that is concealed in this way is difficult to detect and access without knowledge of the method and adequate removal tools. The system was tested and successfully applied for monitoring shallow observation wells at three field sites in Greater Delhi, India. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  4. Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs

    Institute of Scientific and Technical Information of China (English)

    TANG ChunMing; PEI DingYi; WANG XiaoFeng; LIU ZhuoJun

    2008-01-01

    A delegateable signature scheme (DSS) which was first introduced by Barak is mainly based on the non-interactive zero-knowledge proof (NIZK) for preventing the signing verifier from telling which witness (i.e., restricted subset) is being used. However, the scheme is not significantly efficient due to the difficulty of constructing NIZK. We first show that a non-Interactive witness indistinguishable (NIWI) proof sys-tern and a non-interactive witness hiding (NIWH) proof system are easier and more efficient proof models than NIZK in some cases. Furthermore, the witnesses em-ployed in these two protocols (NIWI and NIWT) cannot also be distinguished by the verifiers. Combined with the Σ-protocol, we then construct NlWl and NIWH proofs for any NP statement under the existence of one-way functions and show that each proof is different from those under the existence of trapdoor permutations. Finally, based on our NIWI and NIWH proofs, we construct delegateable signature schemes under the existence of one-way functions, which are more efficient than Barak's scheme under the existence of trapdoor permutations.

  5. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    Science.gov (United States)

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Niu, Xin-Xin; Yang, Yi-Xian

    2015-05-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. Project supported by the National Natural Science Foundation of China (Grant Nos. 61303199, 61272514, 61170272, 61121061, and 61411146001), the Shandong Provincial Natural Science Foundation of China (Grant Nos. ZR2013FM025, ZR2013FQ001, and ZR2014FM003), the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China (Grant Nos. BS2013DX010 and BS2014DX007), the Program for New Century Excellent Talents in Universities, China (Grant No. NCET-13-0681), the National Development Foundation for Cryptological Research, China (Grant No. MMJJ201401012), the Fok Ying Tong Education Foundation, China (Grant No. 131067), and the Shandong Academy of Sciences Youth Fund Project, China (Grant No. 2013QN007).

  6. HIDES spectroscopy of bright detached eclipsing binaries from the Kepler field - I. Single-lined objects

    Science.gov (United States)

    Hełminiak, K. G.; Ukita, N.; Kambe, E.; Kozłowski, S. K.; Sybilski, P.; Ratajczak, M.; Maehara, H.; Konacki, M.

    2016-09-01

    We present results of our spectroscopic observations of nine detached eclipsing binaries (DEBs), selected from the Kepler Eclipsing Binary Catalog, that only show one set of spectral lines. Radial velocities (RVs) were calculated from the high-resolution spectra obtained with the HIgh-Dispersion Echelle Spectrograph (HIDES) instrument, attached to the 1.88-m telescope at the Okayama Astrophysical Observatory, and from the public Apache Point Observatory Galactic Evolution Experiment archive. In our sample, we found five single-lined binaries, with one component dominating the spectrum. The orbital and light-curve solutions were found for four of them, and compared with isochrones, in order to estimate absolute physical parameters and evolutionary status of the components. For the fifth case, we only update the orbital parameters, and estimate the properties of the unseen star. Two other systems show orbital motion with a period known from the eclipse timing variations (ETVs). For these we obtained parameters of outer orbits, by translating the ETVs to RVs of the centre of mass of the eclipsing binary, and combining with the RVs of the outer star. Of the two remaining ones, one is most likely a blend of a faint background DEB with a bright foreground star, which lines we see in the spectra, and the last case is possibly a quadruple bearing a sub-stellar mass object. Where possible, we compare our results with literature, especially with results from asteroseismology. We also report possible detections of solar-like oscillations in our RVs.

  7. The Core Extrusion Schema-Revised: Hiding Oneself Predicts Severity of Social Interaction Anxiety.

    Science.gov (United States)

    Levinson, Cheri A; Rodebaugh, Thomas L; Lim, Michelle H; Fernandez, Katya C

    2017-01-01

    Cognitive behavioral models of social anxiety disorder (SAD) suggest that fear of negative evaluation is a core fear or vulnerability for SAD. However, why negative evaluation is feared is not fully understood. It is possible that core beliefs contribute to the relationship between fear of negative evaluation and SAD. One of these beliefs may be a core extrusion schema: a constellation of beliefs that one's true self will be rejected by others and therefore one should hide one's true self. In the current study (N = 699), we extended research on the Core Extrusion Schema and created a shortened and revised version of the measure called the Core Extrusion Schema-Revised The Core Extrusion Schema-Revised demonstrated good factor fit for its two subscales (Hidden Self and Rejection of the True Self) and was invariant across gender and ethnicity. The Hidden Self subscale demonstrated excellent incremental validity within the full sample as well as in participants diagnosed with generalized SAD. Specifically, the Hidden Self subscale may help explain severity of social interaction anxiety. This measure could be used with individuals diagnosed with generalized SAD to design exposures targeting these core beliefs.

  8. Hiding the word: examining the relationship between a new measure of religiosity and sexual behavior.

    Science.gov (United States)

    Young, Michael; Denny, George; Penhollow, Tina; Palacios, Rebecca; Morris, Duston

    2015-06-01

    The relationship between religiosity and sexual behavior has been previously investigated, but researchers have not examined the relationship between the intellectual dimension of religiosity and sexual behavior. In this study, we developed an intellectual measure of religiosity, Hiding the Word (HTW), and examined whether it accounted for variation in the sexual behavior of college students, beyond that for which age and a generic measure of religiosity could account. Results showed, after accounting for age and generic religiosity, HTW made a significant contribution to distinguishing between students who had, and those who had not, engaged in various sexual behaviors. For females, this was the case in three of the five behaviors examined (all except receiving oral sex and participating in unprotected penile-vaginal intercourse at most recent sexual encounter), and for males, two of the four behaviors (sexual intercourse and anal intercourse). HTW was less of a factor in accounting for variation in the frequency of participation. For males, HTW was significant for the frequency of participation in penile-vaginal intercourse, receiving oral sex, and the number of sexual partners in the last month. For females, HTW was significant only for the number of sexual partners in the last month. Thus, religiosity, and specifically HTW, seems to play more of a role in determining whether or not a person has participated in behavior, rather than in the frequency of participation.

  9. Secure Copier Which Allows Reuse Copied Documents with Sorting Capability in Accordance with Document Types

    OpenAIRE

    Kohei Arai

    2013-01-01

    Secure copy machine which allows reuse copied documents with sorting capability in accordance with the document types. Through experiments with a variety of document types, it is found that copied documents can be shared and stored in database in accordance with automatically classified document types securely. The copied documents are protected by data hiding based on wavelet Multi Resolution Analysis: MRA.

  10. 基于二值图像的信息隐藏算法%Information Hiding Algorithm Based on Binary Image

    Institute of Scientific and Technical Information of China (English)

    刘九芬; 付磊; 张卫明

    2011-01-01

    This paper presents a new information hiding algorithm used for binary image with a small distortion, aiming at the feature that the changing trace is obvious in binary image. The selection criteria of turning point is presented and the set of pixels suitable for turning is denoted. Considering the visual features, the method for computing the scores of the turning pixels is presented. An image block containing the turning pixel can be viewed as a cover block containing the hidden data after the threshold of choosing the turning point is set up. The binary image is divided into blocks, and the STC(Syndrome-trellis Codes) encoding is used to choose the optimal path in the sequence of cover blocks for hiding message. Experimental results show that the proposed algorithm can reduce the distortion of the cover image, and the stego image has good visual effect, while the statistical properties of the variance of L-type in a binary image can be maintained. Therefore, it can be effective against the related steganalysis.%针对二值图像修改痕迹明显的特点,提出一种失真较小的二值图像信息隐藏算法.给出翻转点选择标准,定义二值图像所有适合翻转的像索点集合.考虑视觉特性,提出可翻转像素点修改得分的计算方法,设定可翻转点选取的门限值,将含有可修改像素点的图像块视为隐藏消息的载体块.对二值图像进行分块,利用STC编码,在载体块序列中选择一条信息嵌入的最佳修改路径,实现信息的嵌入.实验结果表明,该隐藏算法能够减小载密图像的失真度,提高视觉隐蔽性,保持二值图像中L型的方差统计特性,抵抗相关的隐写检测.

  11. Assessing theory of mind nonverbally in those with intellectual disability and ASD: the penny hiding game.

    Science.gov (United States)

    San José Cáceres, Antonia; Keren, Noa; Booth, Rhonda; Happé, Francesca

    2014-10-01

    Individuals with autism spectrum disorder (ASD) and low intellectual/language abilities are often omitted from experimental studies because of the challenges of testing these individuals. It is vital to develop appropriate and accessible tasks so that this significant part of the spectrum is not neglected. The theory of mind (ToM) has been extensively assessed in ASD, predominantly in relatively high-functioning individuals with reasonable language skills. This study aims to assess the ToM abilities of a sample of 132 participants with intellectual disability (ID) with and without ASD, matched in verbal mental age (VMA) and chronological age, using a naturalistic and nonverbal deception task: the Penny Hiding Game (PHG). The relationship between performance on the PHG and everyday adaptation was also studied. The PHG proved accessible to most participants, suggesting its suitability for use with individuals with low cognitive skills, attentional problems, and limited language. The ASD + ID group showed significantly more PHG errors, and fewer tricks, than the ID group. PHG performance correlated with Vineland adaptation scores for both groups. VMA was a major predictor of passing the task in both groups, and participants with ASD + ID required, on average, 2 years higher VMA than those with ID only, to achieve the same level of PHG success. VMA moderated the association between PHG performance and real-life social skills for the ASD + ID more than the ID group, suggesting that severely impaired individuals with ASD may rely on verbal ability to overcome their social difficulties, whereas individuals with ID alone may use more intuitive social understanding both in the PHG and everyday situations. © 2014 International Society for Autism Research, Wiley Periodicals, Inc.

  12. Information hiding techniques for infrared images: exploring the state-of-the art and challenges

    Science.gov (United States)

    Pomponiu, Victor; Cavagnino, Davide; Botta, Marco; Nejati, Hossein

    2015-10-01

    The proliferation of Infrared technology and imaging systems enables a different perspective to tackle many computer vision problems in defense and security applications. Infrared images are widely used by the law enforcement, Homeland Security and military organizations to achieve a significant advantage or situational awareness, and thus is vital to protect these data against malicious attacks. Concurrently, sophisticated malware are developed which are able to disrupt the security and integrity of these digital media. For instance, illegal distribution and manipulation are possible malicious attacks to the digital objects. In this paper we explore the use of a new layer of defense for the integrity of the infrared images through the aid of information hiding techniques such as watermarking. In this context, we analyze the efficiency of several optimal decoding schemes for the watermark inserted into the Singular Value Decomposition (SVD) domain of the IR images using an additive spread spectrum (SS) embedding framework. In order to use the singular values (SVs) of the IR images with the SS embedding we adopt several restrictions that ensure that the values of the SVs will maintain their statistics. For both the optimal maximum likelihood decoder and sub-optimal decoders we assume that the PDF of SVs can be modeled by the Weibull distribution. Furthermore, we investigate the challenges involved in protecting and assuring the integrity of IR images such as data complexity and the error probability behavior, i.e., the probability of detection and the probability of false detection, for the applied optimal decoders. By taking into account the efficiency and the necessary auxiliary information for decoding the watermark, we discuss the suitable decoder for various operating situations. Experimental results are carried out on a large dataset of IR images to show the imperceptibility and efficiency of the proposed scheme against various attack scenarios.

  13. Analysis of the bacterial diversity existing on animal hide and wool: development of a preliminary PCR-restriction fragment length polymorphism fingerprint database for identifying isolates.

    Science.gov (United States)

    Chen, Yu; Gao, Hongwei; Zhang, Yanming; Deng, Mingjun; Wu, Zhenxing; Zhu, Laihua; Duan, Qing; Xu, Biao; Liang, Chengzhu; Yue, Zhiqin; Xiao, Xizhi

    2012-01-01

    Twenty-one bacterial strains were isolated from imported cattle hide and rabbit wool using two types of media, nutrient broth, and nutrient broth with serum. The bacteria identified were Brevibacillus laterosporus, Leclercia adecarboxylata, Peptococcus niger, Bacillus circulans, Raoultella ornithinolytica, Bacillus subtilis, Bacillus cereus, Bacillus thermobacillus, Bacillus choshinensis, Bacillus sphaericus, Acinetobacter haemolyticus, Sphingomonas paucimobilis, Bacillus thuringiensis, Staphylococcus intermedius, Mycobacteria, Moraxella, Klebsiella pneumoniae, Ralstonia pickettii, Staphylococcus chromogenes, Comamonas testosteroni, and Cupriavidus pauculus. The 16s rDNA gene of each bacterium was amplified using the universal primers 27f and 1492r. The amplicons were digested with AvaI, BamHI, BgII, DraI, EcoRI, EcoRV, HindIII, HinfI, HpaI, PstI, SmaI, TaqII, XbaI, XmaI, AluI, XhoI, and PvuI individually. A specific fingerprint from the PCR-restriction fragment length polymorphism method based on 16s rDNA was obtained for each bacterium. The results showed that the method developed was useful not only for bacterial identification but also for the etiological investigation of pathogens in imported animal hair and wool.

  14. Probing the crucial role of Leu31 and Thr33 of the Bacillus pumilus CBS alkaline protease in substrate recognition and enzymatic depilation of animal hide.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    Full Text Available The sapB gene, encoding Bacillus pumilus CBS protease, and seven mutated genes (sapB-L31I, sapB-T33S, sapB-N99Y, sapB-L31I/T33S, sapB-L31I/N99Y, sapB-T33S/N99Y, and sapB-L31I/T33S/N99Y were overexpressed in protease-deficient Bacillus subtilis DB430 and purified to homogeneity. SAPB-N99Y and rSAPB displayed the highest levels of keratinolytic activity, hydrolysis efficiency, and enzymatic depilation. Interestingly, and at the semi-industrial scale, rSAPB efficiently removed the hair of goat hides within a short time interval of 8 h, thus offering a promising opportunity for the attainment of a lime and sulphide-free depilation process. The efficacy of the process was supported by submitting depilated pelts and dyed crusts to scanning electron microscopic analysis, and the results showed well opened fibre bundles and no apparent damage to the collagen layer. The findings also revealed better physico-chemical properties and less effluent loads, which further confirmed the potential candidacy of the rSAPB enzyme for application in the leather industry to attain an ecofriendly process of animal hide depilation. More interestingly, the findings on the substrate specificity and kinetic properties of the enzyme using the synthetic peptide para-nitroanilide revealed strong preferences for an aliphatic amino-acid (valine at position P1 for keratinases and an aromatic amino-acid (phenylalanine at positions P1/P4 for subtilisins. Molecular modeling suggested the potential involvement of a Leu31 residue in a network of hydrophobic interactions, which could have shaped the S4 substrate binding site. The latter could be enlarged by mutating L31I, fitting more easily in position P4 than a phenylalanine residue. The molecular modeling of SAPB-T33S showed a potential S2 subside widening by a T33S mutation, thus suggesting its importance in substrate specificity.

  15. Obscuration of Supersoft X-ray Sources by Circumbinary Material - A Way to Hide Type Ia Supernova Progenitors?

    DEFF Research Database (Denmark)

    Nielsen, Mikkel; Dominik, Carsten; Nelemans, Gijs;

    2012-01-01

    single degenerate binary system. In case of obscured systems we wish to determine their general observational characteristics. We examine the emergent X-ray emission from a canonical SSS system surrounded by a spherically symmetric configuration of material, assuming a black body spectrum with T_BB=50 e......V and L=10^38 erg/s. The circumbinary material is assumed to be of solar chemical abundances, and we leave the mechanism behind the mass loss into the circumbinary region unspecified. If steadily accreting, nuclear burning WDs are canonical SSS our analysis suggests that they can be obscured by relatively...... modest circumbinary mass loss rates. This may explain the discrepancy of SSS compared to the SN Ia rate inferred from observations if the SD progenitor scenario contributes significantly to the SN Ia rate. Recycled emissions from obscured systems may be visible in other wavebands than X-rays. It may also...

  16. Image Hiding Technology Based on DCT and Chaos%基于DCT和混沌的图像隐藏技术①

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

      提出一种基于 DCT 和混沌的图像隐藏算法。首先利用混沌系统产生混沌序列对秘密图像进行加密,然后利用DCT变换与混沌序列把秘密图像隐藏到载体图像中。实验结果表明,该算法具有良好的安全性和隐藏效果。%An improved image hiding technology based on DCT and chaos is presented. We use chaotic system to generate one chaotic sequence which is utilized to encrypt the secret image, and then we use DCT and chaotic sequence to realize the secret image hiding in the host image. Simulation results show that the algorithm has good security and hiding effect.

  17. 图像隐藏算法的MATLAB实现%Realization of image hiding algorithm based on MATLAB

    Institute of Scientific and Technical Information of China (English)

    宫海梅

    2016-01-01

    根据HVS的特性,人类视觉系统对高位信号敏感,去掉图像最低几个位并不会造成画面质量的明显下降,视觉系统就无法感觉到信号的存在,提出了四比特图像信息替换算法实现图像隐藏,运用MATLAB软件进行算法实现,嵌入信息后的载体图像与原始图像视觉效果基本一致,有效解决了图像信息隐藏问题。%According to the characteristics of HVS, The human visual system is sensitive to the high signal. To remove the image of the least number of bits does not cause a significant decline in the quality of picture, the visual system can not feel the existence of the signal. In this paper, four bit image information replacement algorithm is proposed to realize the image hiding, MATLAB software is used to realize the algorithm. The carrier image after embedding information is basically consistent with the original image, effectively solve the problem of image information hiding.

  18. Improving the microbiological safety of veal: validation of hot water rinse plus lactic acid spray in combination with scalding for hide-on carcasses to control Shiga-toxin producing Escherichia coli (STEC)

    Science.gov (United States)

    Bob veal calves (n=6) were assigned to six hide-on carcass treatments for each of 5 replications. Primary treatments were no-scald, scald, or scalding with chemical; secondary treatments were no-treatment control or lactic acid. Hides were inoculated with non-pathogenic rifampicin-resistant Escheric...

  19. Hide, keep quiet, and keep low: properties that make Aspergillus fumigatus a successful lung pathogen

    Directory of Open Access Journals (Sweden)

    Natalia eEscobar

    2016-04-01

    Full Text Available Representatives of the genus Aspergillus are opportunistic fungal pathogens. Their conidia can reach the alveoli by inhalation and can give rise to infections in immunocompromised individuals. Aspergillus fumigatus is the causal agent of invasive aspergillosis in nearly 90 % of the cases. It is not yet well established what makes this fungus more pathogenic than other aspergilli such as Aspergillus niger. Here, we show that A. fumigatus and A. niger conidia adhere with similar efficiency to lung epithelial A549 cells but A. fumigatus conidia internalized 17% more efficiently. Conidia of both aspergilli were taken up in phagolysosomes 8 h after the challenge. These organelles only acidified in the case of A. niger, which is probably due to the type of melanin coating of the conidia. Viability of both types of conidia was not affected after uptake in the phagolysosomes. Germination of A. fumigatus and A. niger conidia in the presence of epithelial cells was delayed when compared to conidia in the medium. However, germination of A. niger conidia was still higher than that of A. fumigatus 10 h after exposure to A549 cells. Remarkably, A. fumigatus hyphae grew mainly parallel to the epithelium, while growth direction of A. niger hyphae was predominantly perpendicular to the plane of the cells. Neutrophils reduced germination and hyphal growth of A. niger, but not of A fumigatus, in presence of epithelial cells. Taken together, efficient internalization, delayed germination, and hyphal growth parallel to the epithelium gives a new insight into what could be the causes for the success of A. fumigatus compared to A. niger as an opportunistic pathogen in the lung.

  20. 二值图像中的数据隐藏算法%Data Hiding in Binary Images

    Institute of Scientific and Technical Information of China (English)

    郭萌; 张鸿宾; 魏磊

    2009-01-01

    本文证明了在一个m×n的二值图像块中至多改变1个像素时所能隐藏的比特数的上界为[(log_2(mn+1)],并实际构造了达到此上界的信息隐藏算法.文中归纳了一些选择修改像素位置的规则,较好地保持了数据嵌入后图像的质量.对算法的鲁棒性和安全性进行了分析.用3个例子一数字手写签名中认证信息的嵌入、二值电子文档的窜改检测和卡通图像中注释信息的嵌入说明了本文算法可能的应用.%This paper proposes a method to embed data in binary images with high embedding capacity. It is proved that,given an m × n image block of the host image, the upper bound of the amount of bits that can be embedded in that block is L[(log_2(mn + 1)] ]by changing at most 1 pixel in the block. An algorithm whose embedding capacity can reach the bound is then constructed. We also summarize some rules for selecting pixels to be changed in order to maintain higher quality of the host image after data hiding. The robustness and security of the proposed algorithm is analyzed. Three examples,data hiding in digital handwritten signature, temper detection of digital binary documents, and invisible annotation for cartoon image are tested to illustrate the potential applications.

  1. Disponibilidade hídrica de dois solos e diferentes idades de corte no comportamento agronômico da Jureminha Water availability of two soil-types and at different cropping ages on the agronomic performance of Jureminha

    Directory of Open Access Journals (Sweden)

    Manoel Alexandre Diniz Neto

    2013-03-01

    Full Text Available O trabalho foi desenvolvido para avaliar os efeitos de dois solos submetidos a níveis de disponibilidade de água e idade de corte nos componentes de crescimento vegetativo e composição bromatológica em plantas de jureminha (Desmanthus virgatus L. Willd.. Os tratamentos foram distribuídos em arranjo fatorial 2 x 4 em delineamento de blocos casualizados com doze repetições, com os fatores: dois solos, sendo um da região úmida do município de Alagoinha e outro da região semiárida do município de São João do Cariri, ambos no Estado da Paraíba; quatro níveis de disponibilidade de água (40; 60; 80 e 100% de água disponível e quatro idades de corte (60; 90; 120 e 150 dias após a emergência das plântulas conduzidos em casa-de-vegetação do CCA/UFPB, Areia-PB. O aumento da água disponível no solo estimula o crescimento das plantas, mas inibe a produção de proteína bruta da jureminha. As plantas cresceram mais e produziram menos proteína bruta no solo de São João do Cariri em relação ao solo de Alagoinha.The study was developed to evaluate the effects of two soil-types under different levels of water availability and cropping ages on the components of vegetative growth and chemical composition of jureminha plants (Desmanthusvirgatus L. Willd.. The treatments were distributed in a 2 x 4 factorial in a completely randomized block design with twelve replications of the factors: two soil types, one being from the humid region of the town of Alagoinha, and other from the semi-arid region of the town of São João do Cariri, both in the State of Paraíba; four levels of water availability (40, 60, 80 and 100% of the available water and four cropping ages (60,; 90; 120 and 150 days after the emergence of seedlings, the study being carried out in a greenhouse at CCA / UFPB,in Areia, Paraíba. An increase in the water available in the soil stimulates plant growth but inhibits gross protein production in jureminha. Plants grew

  2. No Place to Hide: Missing Primitive Stars Outside Milky Way Uncovered

    Science.gov (United States)

    2010-02-01

    , Sculptor, Sextans and Carina dwarf galaxies. Since the dwarf galaxies are typically 300 000 light years away - which is about three times the size of our Milky Way - only strong features in the spectrum could be measured, like a vague, smeared fingerprint. The team found that none of their large collection of spectral fingerprints actually seemed to belong to the class of stars they were after, the rare, extremely metal-poor stars found in the Milky Way. The team of astronomers around Starkenburg has now shed new light on the problem through careful comparison of spectra to computer-based models. They found that only subtle differences distinguish the chemical fingerprint of a normal metal-poor star from that of an extremely metal-poor star, explaining why previous methods did not succeed in making the identification. The astronomers also confirmed the almost pristine status of several extremely metal-poor stars thanks to much more detailed spectra obtained with the UVES instrument on ESO's Very Large Telescope. "Compared to the vague fingerprints we had before, this would be as if we looked at the fingerprint through a microscope," explains team member Vanessa Hill. "Unfortunately, just a small number of stars can be observed this way because it is very time consuming." "Among the new extremely metal-poor stars discovered in these dwarf galaxies, three have a relative amount of heavy chemical elements between only 1/3000 and 1/10 000 of what is observed in our Sun, including the current record holder of the most primitive star found outside the Milky Way," says team member Martin Tafelmeyer. "Not only has our work revealed some of the very interesting, first stars in these galaxies, but it also provides a new, powerful technique to uncover more such stars," concludes Starkenburg. "From now on there is no place left to hide!" Notes [1] According to the definition used in astronomy, "metals" are all the elements other than hydrogen and helium. Such metals, except for a very

  3. A New View on an Old Debate: Type of Cue-Conflict Manipulation and Availability of Stars Can Explain the Discrepancies between Cue-Calibration Experiments with Migratory Songbirds.

    Science.gov (United States)

    Sjöberg, Sissel; Muheim, Rachel

    2016-01-01

    horizon at sunrise or sunset, the birds temporarily transfer the previously calibrated magnetic compass information to the available celestial compasses. We conclude that the type of cue-conflict manipulation and the availability of stars can explain the discrepancies between studies.

  4. Fatty liver disease and hypertransaminasemia hiding the association of clinically silent Duchenne muscular dystrophy and hereditary fructose intolerance

    Directory of Open Access Journals (Sweden)

    Paolella Giulia

    2012-10-01

    Full Text Available Abstract We report a case with the association of well self-compensated hereditary fructose intolerance and still poorly symptomatic Duchenne type muscular dystrophy. This case illustrates the problems of a correct diagnosis in sub-clinical patients presenting with “cryptogenic” hypertransaminasemia.

  5. Factors influencing a patient's decision to choose the type of treatment to improve dental esthetics

    Directory of Open Access Journals (Sweden)

    Gržić Renata

    2012-01-01

    Full Text Available Backgroung/Aim. Interest in dental esthetics has increased rapidly during the last few decades among both patients and dentists, and the creation of a natural dental appearance has become an important task in all fields of dentistry, especially in prosthodontics and restorative dentistry. The aim of this research was to investigate factors influencing a patient's decision to choose the type of treatment to improve dental esthetics. Methods. A total of 700 Caucasian subjects participated in the crosssectional study (261 men, 439 women, aged 18-86 years, mean age 46.2 ± 18.6. The study included clinical examination and a self-administrated questionnaire based on self-perceived esthetics, satisfaction with the appearance of their maxillary anterior teeth and previous dental experience. Multiple logistic regression was used in statistical analysis. Results. Hiding teeth during smile was the most important predictor for choosing fixed prosthetic restorations (OR 9.1, followed by self-perceived bad fixed prosthesis, malpositioned teeth and female gender (OR 2.9, 2.4, and 1.5, respectively. The increase in satisfaction with dental appearance and previous orthodontic therapy reduced chances for seeking prosthetic therapy (each OR 0.4. The significant predictors for bleaching choosing were hiding teeth during smiling, already done bleaching, female gender, lower levels of satisfaction with dental appearance and the absence of the previous orthodontic therapy (OR 5.8, 2.4, 1.8, 0.5 and 0.4, respecitively. Hiding teeth during smile, self-perceived malposition and crowding, and lower levels of satisfaction, were significant predictors for choosing orthodontic treatment (OR 3.1, 2.4, 2.2 and 0.6, respectively. None of current dental statuses was statistically significant predictor for choosing prosthodontic, bleeching nor orthodontic therapy. Conclusion. The psychological elements and female gender are the main predictors of seeking dental therapy

  6. 糖尿病量化运动处方适用性与安全性的研究%Study on the availability and safety of exercises quantizing prescription for type 2 diabetes mellitus

    Institute of Scientific and Technical Information of China (English)

    戴霞; 陈青云; 薛月桂; 周爱民; 游越西; 林健云; 黎莹; 范海萍; 唐冬花

    2009-01-01

    目的 评价糖尿病量化运动处方在2型糖尿病病人中应用的适用性和安全性.方法 运动处方按运动量由小到大分为1至5级.选择80例2型糖尿病病人,每例病人均从运动量最小的处方1做起,依次递增至运动量最大的处方5,每级处方均连续3 d,运动时间选择在晚餐后1 h,每个运动处方的运动时间设为60 min.运动前、运动结束即刻、运动结束后4及12 h分别测定心率、血压、血氧饱和度,计算低血糖发生率,以评估量化运动处方的安全性;比较出院后3个月血糖、糖化血红蛋白、血脂、腰围、臀围及体重的变化,以评估运动处方的适用性.结果 运动结束即刻、运动结束后4 h及12 h的心率、收缩压、舒张压及血氧饱和度均在正常值范围,运动结束即刻无低血糖发生,运动结束后4 h及12 h低血糖发生率为1.25%和2.5%.3个月后,各组的窄腹血糖、餐后2 h血糖及糖化血红蛋白均明显降低;除B2组外,总胆固醇均明显下降,BMI25各组的腰围、臀围、体重均显著降低.结论 糖尿病量化运动处方是2型糖尿病病人安全且有效的运动干预措施;1至5级糖尿病量化运动处方对2型糖尿病病人实施个体化运动干预提供了更多的选择.%Objective To evaluate the availability and security of exercises quantizing prescription for type 2 diabetes mellitus. Methods 1 to 5 grades of prescriptions were designed according to different exercises. 80 patients of type 2 diabetes mellitus were treated by 1 to 5 grades of exercise prescriptions. One hour after dinner, each patient started from a minimum amount of Exercise Prescription 1 for three days. Then the patient increased the grade of exercise prescription every three days, until to the greatest amount of Exercise Prescription 5. Exercise time of each exercise prescription was 60 minutes. Heart rate, blood pressure, and PaO2 were determined before exercise, instantly after exercise, 4 hours

  7. (Re)Searching Culture in Foreign Language Textbooks, or the Politics of Hide and Seek

    Science.gov (United States)

    Canale, Germán

    2016-01-01

    Textbooks are curriculum artefacts that embody particular ideologies and legitimise specific types of knowledge [Apple, M. W. (1982). "Education and power." Boston: Routledge & Kegan Paul; Apple, M. W., & Christian-Smith, L. K. (1991). "The politics of the textbook." In M. W. Apple & L. K. Christian-Smith (Eds.),…

  8. Hiding from swans: optimal burial depth of sago pondweed tubers foraged by Bewick's swans

    NARCIS (Netherlands)

    Santamaría, L.; Rodriguez-Girones, M.A.

    2002-01-01

    1 We used a combination of laboratory and field experiments to test the hypothesis that the burial depth of Potamogeton pectinatus tubers will vary with local sediment type and swan predation pressure. 2 In the field, mortality due to predation by swans decreased linearly with burial depth (from 100

  9. Playing hide-and-seek: detecting the manipulation of android timestamps

    CSIR Research Space (South Africa)

    Pieterse, H

    2015-08-01

    Full Text Available Mobile technology continues to evolve in the 21st century, providing users with improved capabilities and advance functionality. The current leader of this evolution is Android, a mobile operating system that continuously elevates existing features...

  10. 计算机系统信息隐藏反取证技术%Data Hiding and Anti-Forensic on Modern Computer System

    Institute of Scientific and Technical Information of China (English)

    李佟鸿; 王宁; 刘志军

    2013-01-01

    研究了现代计算机系统信息隐藏的各种可能方式.运用HPA和DCO、隐藏分区等技术分析了磁盘驱动的数据隐藏,运用簇分配、Slack空间等技术分析了NTFS文件系统的各种信息隐藏方法,以及各种方法可能的检测手段.分析各种隐藏技术作为计算机反取证手段,给计算机取证带来的巨大影响.%This paper discusses some of the possible ways to hide data on modern computer systems.Using HPA and DCO,hidden partition and other technical analysis of the disk drive data hidden.Using the cluster distribution,Slack space and so on technical discusses some of the methods that can be used to hide data in NTFS and analysis techniques that can be used to detect and recover hidden data.The exploration of the different hiding technology can be used as computer anti-forensics means,to the great impacts of computer forensics.

  11. Digital image hiding technology based on information%基于数字图像的信息隐藏技术探究

    Institute of Scientific and Technical Information of China (English)

    任师迁

    2013-01-01

    In the process of information society,information has become an important resource for social development.With the rapid development of Internet,more and more information is transmitted through the network,the confidentiality,authenticity,the integrity of the information has become a research focus. Introduces the technologies of information hiding in the image concept,classification and development of information hiding technology,vector quantization is analyzed in detail,and points out the development trend of information hiding technology.%  在社会信息化的进程中,信息已经成为社会发展的重要资源。随着互联网的快速发展,越来越多的信息通过网络进行传播,信息的保密性、真实性、完整性逐渐成为研究焦点。介绍了图像中信息隐藏技术的概念、分类和发展,对矢量量化信息隐藏技术进行了重点分析,指出了信息隐藏技术的发展趋势。

  12. Analyzing THE PLACE FOR THE EVENT-type Metonymies from the Perspective of Negative Evaluative Factors

    Directory of Open Access Journals (Sweden)

    Nami Arimitsu

    Full Text Available This paper has two objectives. First, by analyzing THE PLACE FOR THE EVENT-type metonymies, this paper points out that it is mainly negative events that are expressed by this type of metonymy. Second, this paper reveals the motivations of those THE PLACE FOR THE EVENT-type metonymies that express negative events. Metonymies are widely investigated along with the views of Lakoff and Johnson (1980, and their oppositional semantic aspects are pointed out by Voßhagen (1999. However, none of the previous studies focused on the nature of THE PLACE FOR THE EVENT-type metonymies from the perspective of negative evaluation, euphemism, and politeness. "Let's not let Thailand become another Vietnam" expresses the Vietnam War and all the tragedies behind it. Speakers refrain from expressing negative evaluative aspects from a euphemistic perspective and try to behave politely through hiding the exact expression, and listeners can also easily understand THE PLACE FOR THE EVENT-type metonymies that express negative events, since negative events are much more highly marked and intensified, as well as more prominent, than are positive ones.

  13. Technical training - places available

    CERN Multimedia

    2012-01-01

    If you would like more information on a course, or for any other inquiry/suggestions, please contact Technical.Training@cern.ch Valeria Perez Reale, Learning Specialist, Technical Programme Coordinator (Tel.: 62424) Eva Stern and Elise Romero, Technical Training Administration (Tel.: 74924) HR Department »Electronics design Next Session Duration Language Availability Comprehensive VHDL for FPGA Design 08-Oct-12 to 12-Oct-12 5 days English 3 places available Foundations of Electromagnetism and Magnet Design (EMAG) 14-Nov-12 to 27-Nov-12 6 days English 20 places available Impacts de la suppression du plomb (RoHS) en électronique 26-Oct-12 to 26-Oct-12 8 hours French 15 places available Introduction to VHDL 10-Oct-12 to 11-Oct-12 2 days English 7 places available LabVIEW Real Time and FPGA 13-Nov-12 to 16-Nov-12 5 days French 5 places available »Mechanical design Next Se...

  14. An eco-friendly method for short term preservation of skins/hides using Semecarpus anacardium nut extract.

    Science.gov (United States)

    Iyappan, Kuttalam; Ponrasu, Thangavel; Sangeethapriya, Vilvanathan; Gayathri, Vinaya Subramani; Suguna, Lonchin

    2013-09-01

    Preservation or curing of hides and skins is performed as the primary step of leather processing. Common salt is employed as the conventional agent for curing purpose. Use of salt enhances the pollution load of tannery effluent which becomes highly contaminated with increased total dissolved solids and chlorides. To overcome this hurdle, researchers are in constant search of alternative preservation techniques which are either totally void of salt or use only a meager amount of salt. In the present study, we had explored the possibility of using Semecarpus anacardium nut extract as an alternative to salt for the curing process by assessing different parameters like hair slip, putrefaction odor, volatile nitrogen content, moisture content, bacterial count, and shrinkage temperature in comparison to the salt curing method. The antibacterial property of the plant extract was also investigated. The results obtained substantiated that the nut extract of S. anacardium effectively could preserve the skins for more than a month, by its antibacterial activity along with the dehydrating property of acetone.

  15. Can organic matter hide from decomposers in the labyrinth of soil aggregates? Micro-engineered Soil Chips challenging foraging fungi

    Science.gov (United States)

    Hammer, Edith C.; Aleklett, Kristin; Arellano Caicedo, Carlos G.; Bengtsson, Martin; Micaela Mafla Endara, Paola; Ohlsson, Pelle

    2017-04-01

    From the point of view of microorganisms, the soil environment is an enormously complex labyrinth with paths and dead-end streets, where resources and shelters are unevenly distributed. We study foraging strategies of soil organisms, especially fungi, and the possibility of physio-spatial stabilization of organic matter by "hiding" in occluded soil spaces. We manipulate growth habitat microstructure with lab-on-a-chip techniques, where we designed complex environments with channels and obstacle at dimensions of the size of hyphae, and construct them in the transparent, gas-permeable polymer PDMS. We fill those with different nutrient solutions or combine with mineral nutrient gradients, and inoculate them with soil organisms. We analyze organisms and substrates with microscopy, fluorescence microscopy and analytical chemistry. We compared different soil litter decomposers and an arbuscular mycorrhizal fungus for their ability to forage through complex air-gap structures and attempt to classify them into functional traits concerning their mycelium directionality, space-exploring approach and ability to grow through acute angles and narrow constrictions. We identified structures which are very difficult to penetrate for most species, and compounds located behind such features may thus be spatially unavailable for decomposers. We discuss our approach in comparison to soil pore space tomographic analyses and findings we made in the pore space of colonized wood biochar.

  16. 'Hide-then-hit' to explain the importance of genotypic polymorphism of DNA repair genes in determining susceptibility to cancer

    Institute of Scientific and Technical Information of China (English)

    Pei-Ei Wu; Chen-Yang Shen

    2011-01-01

    Interindividual variations in DNA repair capacity/efficiency linked to the presence of polymorphisms in DNA repair-related genes have been suggested to account for different risk of developing cancers. In this review article, on the basis of breast cancer formation as a model, we propose a 'hide-then-hit' hypothesis indicating the importance of escaping checkpoint surveillance for sub-optimal DNA repair variants to cause cancer. Therefore, only cells with subtle defects in repair capacity arising from low-penetrance variants of DNA repair genes would have the opportunity to grow and accumulate the genetic changes needed for cancer formation, without triggering cell-cycle checkpoint surveillance. Furthermore, distinct from high-penetrance alleles, these polymorphic alleles of DNA repair genes would predispose carriers to a higher risk of developing cancer but would not necessarily cause cancer. To examine this,we simultaneously genotyped multiple SNPs of cell-cycle checkpoint genes and the DNA repair genes. Support for the hypothesis came from observations that breast cancer risk associated with variant genotypes of DNA repair genes became more significant in be confirmed by biological evidence in which a cause-effect relationship has to be established. However, based on this, possible gene-gene interaction is considered to play an important role in modifying the cancer risk associated with genotypic polymorphism of DNA repair gene in different study populations.

  17. Purification and Partial Characterization of a Collagenolytic Enzyme Produced by Pseudomonas aeraginosa SCU Screened from Rotten Hides

    Institute of Scientific and Technical Information of China (English)

    Yang Guangyao(杨光垚); Zhang Yizheng

    2004-01-01

    Strain Pseudomonas Aeraginosa SCU isolated from rotten hides is shown to produce various gelatinolytic enzymes with molecular masses ranging from ~50 to ~200 kD. A gelatinolytic enzyme called PAC exhibiting collagenolytic activity is purified by SP sepharose fast flow, Sephadex G-200 gel filtration and native PAGE cutting method. The purified enzyme has an apparent molecular weight of about 110 kD by SDS PAGE without β-mercaptoethanol. Treatment withβ-Me suggests that PAC is dissociated into three subunits approximately 33 kD,25 kD and 20 kD with a ratio of 2∶1∶1, named sub A, sub B and sub C repectively. EDTA and EGTA display a significant inhibitory effect on the enzyme activity while PMSF, leupeptin and pepstain do not appreciably inhibit it. The first 15 amino acid residues of the major subunit (subA) are determined and the sequence is Ala-Glu-Ala-Gly-Gly-Pro-Gly-Gly-Asn-Gln-Lys-Ile-Gly -Lys-Tyr. This sequence is identical to that of elastase of P.aeruginosa. The fragment of encoding mature sub A is cloned and its sequence is determined, which has a high homology with the gene of elastase. These results indicate that PAC is a novel collagenolytic metalloprotease composed of three kinds of subunits, of which elastase is the major one.

  18. Available Energy and Exergy

    Directory of Open Access Journals (Sweden)

    Richard A. Gaggioli

    1998-06-01

    Full Text Available

    An "available energy" is defined for every state of any system. The definition is independent of (a the concept of work. (b any reference environment, and (c the makeup of the system (e.g. "macro" or "micro. On the basis of this available energy, given any composite system, the contribution of each subsystem to the available energy -- that is, the exergy content of a subsystem -- is defined, as well as the instantaneous "dead state" of the composite and each subsystem.

    Some pedagogical, scientific and engineering implications are discussed.

  19. Available area isotherm

    NARCIS (Netherlands)

    Bosma, JC; Wesselingh, JA

    2004-01-01

    A new isotherm is presented for adsorption of proteins, the available area isotherm. This isotherm has a steric basis, unlike the (steric) mass action model. The shape of the available area isotherm is determined only by geometric exclusion. With the new isotherm, experimental results can be fitted

  20. Proxmox high availability

    CERN Document Server

    Cheng, Simon MC

    2014-01-01

    If you want to know the secrets of virtualization and how to implement high availability on your services, this is the book for you. For those of you who are already using Proxmox, this book offers you the chance to build a high availability cluster with a distributed filesystem to further protect your system from failure.

  1. Technical training - Places available

    CERN Multimedia

    2012-01-01

    If you would like more information on a course, or for any other inquiry/suggestions, please contact Technical.Training@cern.ch Valeria Perez Reale, Learning Specialist, Technical Programme Coordinator (Tel.: 62424) Eva Stern and Elise Romero, Technical Training Administration (Tel.: 74924)   Electronics design Next Session Duration Language Availability Certified LabVIEW Associate Developer (CLAD) 06-Dec-12 to 06-Dec-12 1 hour English One more place available Compatibilité électromagnetique (CEM): Applications 23-Nov-12 to 23-Nov-12 3.5 hours English 3 places available Compatibilité électromagnétique (CEM): Introduction 23-Nov-12 to 23-Nov-12 3 hours English 43 places available Effets des Radiations sur les composants et systèmes électroniques 11-Dec-12 to 12-Dec-12 1 day 4 hours French 9 places available LabVIEW for beginners ...

  2. A Method for Hiding Association rules with Minimum Changes in Database

    Directory of Open Access Journals (Sweden)

    Zahra Sheykhinezhad

    Full Text Available Privacy preserving data mining is a continues way for to use data mining, without disclosing private information. To prevent disclosure of sensitive information by data mining techniques, it is necessary to make changes to the data base. Association rules ...

  3. Endless Hide-and-Seek: Dynamic Co-evolution in Plant-Bacterium Warfare

    Institute of Scientific and Technical Information of China (English)

    Libo Shan; Ping He; Jen Sheen

    2007-01-01

    Plants possess innate immune systems to prevent most potential infections. The ancient and conserved innate immune responses are triggered by microbe-associated molecular patterns (MAMPs) and play important roles in broad-spectrum defenses. However, successful bacterial pathogens evolved type Ⅲvirulence effectors to suppress MAMP-mediated immunity. To survive, plants further developed highly specific resistance (R) genes to trigger gene-for-gene-mediated immunity and turn the virulent pathogens into avirulent ones. We summarize here the very recent advances in this dynamic coevolution of plantbacterium interaction.

  4. Technical training: places available

    CERN Multimedia

    HR Department

    2007-01-01

    CERN Technical Training: Open Courses (April - June 2007) The following course sessions are currently scheduled in the framework of the CERN Technical Training Programme 2007:   AutoCAD 2006 - niveau 1 (course in French): 25.4.- 26.4.2007 & 2.5. - 3.5.2007 (4 days in 2 modules, 5 places available) AutoCAD 2006 - niveau 1 (course in French): 27.6.- 28.6.2007 & 3.7. - 4.7.2007 (4 days in 2 modules, 5 places available) AutoCAD Mechanical 2006 (course in French) 21.6.-22.6.2007 (2 days, 8 places available) * NEW COURSE* Automate de securite S7 (course in French) 14.5.-16.5.2007 (3 days, 4 places available) * NEW COURSE* Automate de securite S7 (course in French): 9.5.-11.5.2007 (3 days, 4 places available) JCOP - Joint PVSS-JCOP Frameswork (course in English): 21.5.-25.5.2007 (5 days, 12 places available) JCOP - Finite State Machines in the JCOP Frameswork (course in English): 12.6.-14.6.2007 (3 days, 12 places available) LabVIEW Basics 1 (in English): 2.-4.5.2007 (3 days, 7 places ...

  5. A New Information Hiding Way Based on Word XML%一种基于Word XML的信息隐藏新方法

    Institute of Scientific and Technical Information of China (English)

    董艳; 徐江峰

    2015-01-01

    It is of great significance to hide some secret information in a Word document. Based on analyzing the"revision identifiers" in document. xml of Word 2007 document, propose a new information hiding method. According to a pseudo-random binary sequence which is produced by logistic pseudo-random sequence generator,extract certain attributes of"revision identifiers" in document. xml,and change the last six attributes values with the hexadecimal secret information,achieving the purpose of hiding secret information. The ex-perimental result show that compared with the previous hiding ways based on Word,the new hiding way based on the "revision identi-fiers" is better in robustness and safety and so on.%在应用广泛的Word文档中隐藏秘密信息意义巨大,在对Word 2007中document. xml文件的“修改标识”特性分析的基础上,提出了一种的新的信息隐藏方法。该方法首先根据logistic方程伪随机序列生成器产生的伪随机二进制序列,去抽取载体文件document. xml中特定的“修改标识”属性值,而后用秘密信息的十六进制码替换抽取的属性值后六位,从而达到隐藏秘密信息的目的。实验结果表明,基于document. xml文件中“修改标识”属性值的信息隐藏新方法,与既有的基于Word的信息隐藏方法相比,具有安全性更高、隐蔽性更强等优点。

  6. Authenticity of identification and processing experience of donkey hide gelatin%阿胶的真伪鉴别以及炮制经验

    Institute of Scientific and Technical Information of China (English)

    张萍

    2015-01-01

    阿胶是有改善男女生育、调节月经、恢复元气等功效,能够促进造血功能,升高白细胞,提高自身免疫力等功能,对免疫力低下患者或癌症患者有着重要的作用,还可以促进凝血和降低血管通透性,提高对钙的吸收,预防骨质疏松疾病,是骨折患者较佳的补品。由于阿胶的应用范围较广,有些不法商贩弄虚作假,严重扰乱了阿胶市场,给消费者带来了较大伤害,因此,掌握阿胶的真伪鉴别方法至关重要,本文对阿胶的真伪鉴别以及炮制经验进行总结。%Donkey hide gelatin has the function of improving male and female fertility,regulating menstruation,recovering vitality and so on.It can promote the hematopoietic function,elevate the white blood cells,improve the autoimmunity,and it plays an important role on the immunocompromised patients or cancer patients.On the side,it can promote coagulation and reduce vascular permeability,enhance the absorption of calcium,prevent osteoporosis.It is a better tonic for patients with fracture.Because the application range of donkey hide gelatin is wide,some unscrupulous traders have falsification and seriously disrupte the donkey hide gelatin market to bring a greater harm on consumers.Therefore,it is great importance to grasp the authenticity of identification method of donkey hide gelatin.In this paper,the author summarizes the authenticity of identification and processing experience of donkey hide gelatin.

  7. High availability IT services

    CERN Document Server

    Critchley, Terry

    2014-01-01

    This book starts with the basic premise that a service is comprised of the 3Ps-products, processes, and people. Moreover, these entities and their sub-entities interlink to support the services that end users require to run and support a business. This widens the scope of any availability design far beyond hardware and software. It also increases the potential for service failure for reasons beyond just hardware and software; the concept of logical outages. High Availability IT Services details the considerations for designing and running highly available ""services"" and not just the systems

  8. High Availability Electronics Standards

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, R.S.; /SLAC

    2006-12-13

    Availability modeling of the proposed International Linear Collider (ILC) predicts unacceptably low uptime with current electronics systems designs. High Availability (HA) analysis is being used as a guideline for all major machine systems including sources, utilities, cryogenics, magnets, power supplies, instrumentation and controls. R&D teams are seeking to achieve total machine high availability with nominal impact on system cost. The focus of this paper is the investigation of commercial standard HA architectures and packaging for Accelerator Controls and Instrumentation. Application of HA design principles to power systems and detector instrumentation are also discussed.

  9. Data Hiding and Retrival Using Advanced Encryption and Decryption Algorithms Mamtha Shetty, Shreedhar. A. Joshi

    Directory of Open Access Journals (Sweden)

    Mamtha Shetty

    2014-04-01

    Full Text Available In this era of digital world, with the evolution of technology, there is an essential need for optimization of online digital data and information. Nowadays, Security and Authenticity of digital data has become a big challenge. This paper proposes an innovative method to authenticate the digital documents. A new method is introduced here, which allows multiple encryption and decryption of digital data.

  10. Carcinosarcoma of the Pancreas: How a Common Blood Disorder Can Hide an Extremely Rare Tumour

    Directory of Open Access Journals (Sweden)

    Anastasios Katsourakis

    2015-05-01

    Full Text Available Context Sarcomas represent a relatively rare malignancy. Primary sarcomas of the pancreas represent an extremely rare pathology. Case report We report a case of primary pancreatic carcinoma that presented with anaemia. The patient underwent a Kausch-Whipple operation, and, 16 months after the operation, the patient is disease free. Conclusion This unique case describes an extremely rare gastrointestinal tumour that was found during the patient's anaemia assessment.

  11. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The Joint PVSS JCOP Framework: 14 - 18.6.2004 (5 days) EXCEL 2003 - niveau 2 : 17 & 18.6.2004 (2 jours) MAGNE-04 : Magnétisme pour l'électrotechnique : 6 au 8.7.2004 (3 jours) Technical Training Monique Duval - Tel.74924 technical.training@cern.ch

  12. Hodgkin Lymphoma and Castleman Disease: When One Blood Disease Can Hide Another

    Directory of Open Access Journals (Sweden)

    L. Filliatre-Clement

    2017-01-01

    Full Text Available We describe a rare case of Castleman disease associated de novo with Hodgkin lymphoma. The incidence of Castleman disease is rare; only a few studies have described it in de novo association with Hodgkin lymphoma. The patient described here complained of unique evolutionary axillary adenopathy. A positron-emission tomography/computed tomography scan revealed hypermetabolic activity in this area. Diagnosis was based on a total excision biopsy of the adenopathy. The patient underwent complete remission with ABVD (doxorubicin, bleomycin, vinblastine, and dacarbazine chemotherapy for treating Hodgkin lymphoma after surgical excision of the unicentric Castleman disease lesion.

  13. Technical training - Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 16.5.2006 (May-November course sessions) Technical Training: Places available The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language ACROBAT 7.0 : Utilisation de fichiers PDF 8 8.05.06 F WORD 2003 - niveau 2 : ECDL 16 22-23.05.06 23-24.05.06 F Comprehensive VHDL for FPGA Design 40 29.05-2.06.06 E C++ Programming Part 2 - Advanced C++ and its Traps and Pitfalls 32 30.05-2.06.06 E ACROBAT 7.0 : Utilisation de fichiers PDF 24 7-9.06.06 E AutoCAD Mechanical 2006 16 13-14.06.06 F CERN EDMS for Local Administrators 16 13-14.06.06 E LabVIEW Base 2 32 27.06-5.07.06 F C++ Programming Part 3 - Templates and the STL (Standard Template Library) 16 27-28.06.06 E C++ Programming Part 4 - Exceptions 8 29.06.06 E FrontPage 2003 - niveau 1 16 29-...

  14. A new Approach for Averting Jamming Invasion with Packet Hiding Methods

    Directory of Open Access Journals (Sweden)

    M.Ramabai

    2013-12-01

    Full Text Available Wireless networks dependent on the active nodes which are reciprocally connected to uninterrupted availability of the wireless environment. Any person with a device which transmits and receives radio signals can secretly read those transmitted lines on wireless transmissions and put some bogus information, or stop legitimate ones. The surroundings of wireless medium is exposed to predictable interruption attacks which are referred as jamming. With wireless transmissions this predictable interruption can be used as launch pad for increasing Denial of Service attacks on wireless network. The internal information of procedure specifications and network secrets with challengers can launch low-effort jamming attacks which are difficult to distinguish and oppose. A condition of particular jamming attacks in wireless networks is shown in this paper. At the physical layer by performing real time packet classification the selective jamming attacks can be launched are demonstrated. By combining cryptographic primitives with physical-layer attributes we expand three schemes that prevent real time packet classification in order to moderate these attacks.

  15. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: PowerPoint 2003 (F) : 25.4.2005 (1 jour) WORD 2003 - niveau 1 : 2 & 3.5.2005 (2 jours) FrontPage 2003 - niveau 1 : 9 & 10.5.2005 (2 jours) ELEC-2005 - Summer Term: System electronics for physics - Issues : 10, 12, 17, 19, 24, 26 & 31.5.2005 (7 x 2h lectures) AutoCAD 2005 - niveau 1 : 11 & 12.5.2005 (2 days) Finite State Machines in the JCOP Framework: 24 - 26.5.2005 (3 days) The Joint PVSS JCOP Framework: 30.5 - 3.6.2005 (5 days) LabVIEW Migration 6 to 7: 14.6.2005 (1 day) Introduction to ANSYS: 21 - 24.6.2005 (4 days) ENSEIGNEMENT TECHNIQUE TECHNICAL TRAINING Monique Duval 74924 technical.training@cern.ch

  16. Energy availability in athletes.

    Science.gov (United States)

    Loucks, Anne B; Kiens, Bente; Wright, Hattie H

    2011-01-01

    This review updates and complements the review of energy balance and body composition in the Proceedings of the 2003 IOC Consensus Conference on Sports Nutrition. It argues that the concept of energy availability is more useful than the concept of energy balance for managing the diets of athletes. It then summarizes recent reports of the existence, aetiologies, and clinical consequences of low energy availability in athletes. This is followed by a review of recent research on the failure of appetite to increase ad libitum energy intake in compensation for exercise energy expenditure. The review closes by summarizing the implications of this research for managing the diets of athletes.

  17. Energy availability in athletes

    DEFF Research Database (Denmark)

    Loucks, Anne B; Kiens, Bente; Wright, Hattie H

    2011-01-01

    Abstract This review updates and complements the review of energy balance and body composition in the Proceedings of the 2003 IOC Consensus Conference on Sports Nutrition. It argues that the concept of energy availability is more useful than the concept of energy balance for managing the diets...... of athletes. It then summarizes recent reports of the existence, aetiologies, and clinical consequences of low energy availability in athletes. This is followed by a review of recent research on the failure of appetite to increase ad libitum energy intake in compensation for exercise energy expenditure...

  18. JUNOS High Availability

    CERN Document Server

    Sonderegger, James; Milne, Kieran; Palislamovic, Senad

    2009-01-01

    Whether your network is a complex carrier or just a few machines supporting a small enterprise, JUNOS High Availability will help you build reliable and resilient networks that include Juniper Networks devices. With this book's valuable advice on software upgrades, scalability, remote network monitoring and management, high-availability protocols such as VRRP, and more, you'll have your network uptime at the five, six, or even seven nines -- or 99.99999% of the time. Rather than focus on "greenfield" designs, the authors explain how to intelligently modify multi-vendor networks. You'll learn

  19. Duty and dilemma: Perioperative nurses hiding an objection to participate in organ procurement surgery.

    Science.gov (United States)

    Smith, Zaneta

    2016-12-21

    Perioperative nurses assist in organ procurement surgery; however, there is a dearth of information of how they encounter making conscientious objection requests or refusals to participate in organ procurement surgery. Organ procurement surgical procedures can present to the operating room ad hoc and can catch a nurse who may not desire to participate by surprise with little opportunity to refuse as a result of staffing, skill mix or organizational work demands. This paper that stems from a larger doctoral research study exploring the experiences of perioperative nurses participating in multi-organ procurement surgery used a grounded theory method to develop a substantive theory of the nurses' experiences. This current paper aimed to highlight the experiences of perioperative nurses when confronted with expressing a conscientious objection towards their participation in these procedures. A number of organizational and cultural barriers within the healthcare organization were seen to hamper their ability in expressing a conscience-based refusal, which lead to their reluctant participation. Perioperative nurses must feel safe to express a conscientious objection towards these types of surgical procedures and feel supported in doing so by their respective hospital organizations and not be forced to participate unwillingly.

  20. Can R-parity violation hide vanilla supersymmetry at the LHC?

    Energy Technology Data Exchange (ETDEWEB)

    Asano, Masaki [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Rolbiecki, Krzysztof; Sakurai, Kazuki [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2012-09-15

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  1. An Image Hiding Scheme Using 3D Sawtooth Map and Discrete Wavelet Transform

    Directory of Open Access Journals (Sweden)

    Ruisong Ye

    2012-07-01

    Full Text Available An image encryption scheme based on the 3D sawtooth map is proposed in this paper. The 3D sawtooth map is utilized to generate chaotic orbits to permute the pixel positions and to generate pseudo-random gray value sequences to change the pixel gray values. The image encryption scheme is then applied to encrypt the secret image which will be imbedded in one host image. The encrypted secret image and the host image are transformed by the wavelet transform and then are merged in the frequency domain. Experimental results show that the stego-image looks visually identical to the original host one and the secret image can be effectively extracted upon image processing attacks, which demonstrates strong robustness against a variety of attacks.

  2. A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value

    Directory of Open Access Journals (Sweden)

    Farheen Fatima

    2016-11-01

    Full Text Available Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values.

  3. Hide It to See It Better: A Robust Setup to Probe the Thermal Casimir Effect

    Science.gov (United States)

    Bimonte, Giuseppe

    2014-06-01

    We describe a Casimir setup consisting of two aligned sinusoidally corrugated Ni surfaces, one of which is "hidden" by a thin opaque layer of gold with a flat exposed surface. The gold layer acts as a low-pass filter that allows for a clean observation of the controversial thermal Casimir force between the corrugations, with currently available Casimir apparatuses. The proposed scheme of measurement, based on the phase-dependent modulation of the Casimir force, requires no electrostatic calibrations of the apparatus, and is unaffected by uncertainties in the knowledge of the optical properties of the surfaces. This scheme should allow for an unambiguous discrimination between alternative theoretical prescriptions that have been proposed in the literature for the thermal Casimir effect.

  4. Trends in availability management

    Energy Technology Data Exchange (ETDEWEB)

    Marriott, P.W.; McCandless, R.J.; Smith, B.W.

    1985-01-01

    This paper explores future directions in the management of nuclear power plant availability. The issue is of great economic interest both to utilities and to their customers. Current trends are discussed, and some that appear to have promise in the future are identified.

  5. Technical training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 13.6.2006 (June-December course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue LabVIEW Base 2 16 22-23.06.06 F FileMaker - niveau 1 16 26-27.06.06 F C++ Programming Part 3 - Templates and the STL (Standard Template Library) 16 27-28.06.06 E C++ Programming Part 4 - Exceptions 8 29.06.06 E FrontPage 2003 - niveau 1 16 29-30.06.06 F Manipulation des images 4 6.07.06 F Introduction to Databases and Database Design 16 11-12.07.06 E ACCESS 2003 - Level 1: ECDL 16 13-14.07.06 E-F Design Patterns 16 25-26.07.06 E Introduction à Dreamweaver MX 16 26-27.07.06 F ANSYS DesignModeler 16 29-30.08.06 F LabVIEW Basics 1 24 4-6.09.06 E ANSYS Workbench 32 12-15.09.06 F AutoCAD Mechanical 20...

  6. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 30.5.2006 (June-November course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue ACROBAT 7.0 : Utilisation de fichiers PDF 8 6.06.06 F Introduction à InDesign 16 7-8.06.06 F Python: Hands-on Introduction 24 7-9.06.06 E LabVIEW Base 2 16 22-23.06.06 F FileMaker - niveau 1 16 26-27.06.06 F C++ Programming Part 3 - Templates and the STL (Standard Template Library) 16 27-28.06.06 E C++ Programming Part 4 - Exceptions 8 29.06.06 E FrontPage 2003 - niveau 1 16 29-30.06.06 F Manipulation des images 4 6.07.06 F Introduction to Databases and Database Design 16 11-12.07.06 E ACCESS 2003 - Level 1: ECDL 16 13-14.07.06 E-F Design Patterns 16 25-26.07.06 E Introduction à Dreamweaver MX 16 ...

  7. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 21.3.2006 (March-October course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language FrontPage 2003 - niveau 1 16 27-28.03.06 F Oracle Forms Developer 10g: Move to the Web 16 27-28.03.06 E ACCESS 2003 - Level 2: ECDL AM5 16 3-4.03.06 E-F JAVA 2 Enterprise Edition - Part 1: Web Applications 16 3-4.04.06 E JAVA 2 Enterprise Edition - Part 2: Enterprise JavaBeans 24 5-7.04.06 E AutoCAD Mechanical 2006 16 11-12.04.06 F FrontPage 2003 - niveau 2 16 24-25.04.06 F C++ Programming Part 1 - Introduction to Object-Oriented Design and Programming 24 25-27.04.06 E AutoCAD 2006 - niveau 1 32 27.04-4.05.06 F Oracle: SQL 24 3-5.05.06 E EXCEL 2003 (Short Course I) - HowTo... Work with formulae 3 4.05.06 (am) E-F EXCEL 2003 (Short Course II) - HowTo... Format your worksheet for printing 3 4...

  8. Technical Training: Places available

    CERN Multimedia

    2006-01-01

    Places available as of 21.3.2006 (March-October course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: find out the curren Hours Date Language ACROBAT 7.0 : Utilisation de fichiers PDF 8 8.05.06 F Project Planning with MS-Project 16 9.05-6.06.06 E STEP7: niveau 1 32 9-12.05.06 E-F Oracle: Programming with PL/SQL 24 10-12.05.06 E FileMaker - niveau 2 16 11-12.05.06 F LabVIEW Application Development 24 15-17.05.06 E LabVIEW Advanced Programming 16 18-19.05.06 E PERL 5: Advanced Aspects 8 18.05.06 E Technique du vide 16 18-19.05.06 F WORD 2003 - niveau 2 : ECDL 16 22-23.05.06 F Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE 16 23-24.05.06 F Comprehensive VHDL for FPGA Design 40 29.05-2.06.06 E C++ Programming Part 2 - Advanced C++ and its T...

  9. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 9.5.2006 (May-October course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: find out the curren Hours Date Language LabVIEW Application Development 24 15-17.05.06 E LabVIEW Advanced Programming 16 18-19.05.06 E PERL 5: Advanced Aspects 8 18.05.06 E Technique du vide 16 18-19.05.06 F FileMaker - niveau 2 16 11-12.05.06 F WORD 2003 - niveau 2 : ECDL 16 22-23.05.06 F Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE 16 23-24.05.06 F Comprehensive VHDL for FPGA Design 40 29.05-2.06.06 E C++ Programming Part 2 - Advanced C++ and its Traps and Pitfalls 32 30.05-2.06.06 E Python: Hands-on Introduction 24 7-9.06.06 E AutoCAD Mechanical 2006 16 13-14.06.06 F CERN EDMS for Local Administrators 16 13-14.06.06...

  10. Available nutrients in biochar

    Science.gov (United States)

    Biochar technology may contribute to the recovery and recycling of plant nutrients and thus add a fertilizer value to the biochar. Total nutrient content in biochars varies greatly and is mainly dependent on feedstock elemental composition and to a lesser extent on pyrolysis conditions. Availability...

  11. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Joint PVSS JCOP Programming : 9 - 13.8.2004 (5 days) Hands-on Introduction to Python Programming: 1 - 3.9.2004 (3 days - free course) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 7 & 8.9.2004 (2 jours) Joint PVSS JCOP Programming : 13 - 17.9.2004 (5 days) AutoCAD 2002 - niveau 1 : 13, 14, 23, 24.9.2004 (4 jours) Programmation STEP7 niveau 1 : 14-17.9.2004 (4...

  12. Technical Training: Places available**

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The JAVA Programming Language Level 1 : 9 & 10.1.2004 (2 days) LabVIEW TestStand I (E) : 23 & 24.2.2004 (2 days) LabVIEW base 1 : 25 - 27.2.2004 (3 jours) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon - free of charge) C++ for Particle Physicists : 8 - 12.3.2004 ( 6 X 4-hour sessions) LabVIEW hands-on (E) 16.3...

  13. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: LabVIEW base 1 : 25 - 27.2.2004(3 jours) Instructor-led WBTechT study or follow-up for Microsoft applications : 26.2.2004 (morning) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon - free of charge) C++ for Particle Physicists : 8 - 12.3.2004 (6 X 4-hour sessions) LabVIEW hands-on (E) : 16.3.2004 (afternoon) LabVIEW Basics 1 : 22 - 24.3.2004 ...

  14. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Introduction to the CERN EDMS : 22.6.2004 (1 day) The CERN EDMS for local administrators : 23 & 24.6.2004 (2 days) Compatibilité électromagnétique (CEM) - Introduction / Electromagnetic Compatibility (EMC) - Introduction: 7.7.2004 (morning) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 7 & 8.9.2004 (2 jours) AutoCAD 2002 - niveau 1 : 13, 14, 23, 24.9.2004 (4 jours) Programmation STEP...

  15. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Oracle 9i : New features for developers : 14 - 16.6.2004 (3 days) The Joint PVSS JCOP Framework: 14 - 18.6.2004 (5 days) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 15 & 16.6.2004 (2 jours) EXCEL 2003 - niveau 2 : 17 & 18.6.2004 (2 jours) MAGNE-04 : Magnétisme pour l'électrotechnique : 6 au 8.7.2004 (3 jours) AutoCAD 2002 - niveau 1 : 13, 14, 23, 24.09.2004 (4 jours) ENSEIGNEMEN...

  16. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Joint PVSS JCOP Framework : 9 - 13.8.2004 (5 days) Introduction à Outlook : 19.8.2004 (1 jour) Outlook (Short Course I): E-mail: 31.8.2004 (2 hours, morning) Outlook (Short Course II): Calendar, Tasks and Notes: 31.8.2004 (2 hours, afternoon) Instructor-led WBTechT Study or Follow-up for Microsoft Applications: 7.9.2004 (morning) Outlook (Short Course III): Meetings and Delegation: 7.9.2004 (2 hours, afternoon) I...

  17. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Instructor-led WBTechT study or follow-up for Microsoft applications : 19.2.2004 (morning) LabVIEW TestStand I (E) : 23 & 24.2.2004 (2 days) LabVIEW base 1 : 25 - 27.2.2004 (3 jours) Instructor-led WBTechT study or follow-up for Microsoft applications : 26.2.2004 (morning) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon - free of charge) C++ for Pa...

  18. TECHNICAL TRAINING: Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Hands-on Introduction to Python Programming : 12 - 14.11.03(3 days) ACCESS 2000 - niveau 1 : 13 & 14.11.03 (2 jours) C++ for Particle Physicists : 17 - 21.11.03 (6 X 3-hour lectures) Programmation automate Schneider TSX Premium - niveau 2 : 18 - 21.11.03 (4 jours) Project Planning with MS-Project  (free of charg...

  19. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Instructor-led WBTechT study or follow-up for Microsoft applications : 1.4.2004 (morning) FrontPage XP - niveau 1 : 5 & 6.4.2004 (2 jours) AutoCAD 2002 - niveau 1 : 19, 20.4 et 3, 4.5.2004 (4 jours) Oracle 8i/9i - Develop Web-based Applications with PL/SQL : 19 & 20.4.2004 (2 days) Introduction to ANSYS : 20 - 23.4.2004 (4 day...

  20. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: FrontPage XP - niveau 2 : 26 & 27.4.2004 (2 jours) The Joint PVSS JCOP Framework : 26 - 30.4.2004 (5 days) Computational Electromagnetics with the ELEKTRA Module of OPERA-3D : 27 & 28.4.2004 (2 days) Hands-on Introduction to Python Programming : 3 - 5.5.2004 (3 days) LabVIEW Base 2 : 6 & 7.5.2004 (2 jours) Project Pla...

  1. TECHNICAL TRAINING: Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval Tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The EDMS-MTF in practice (free of charge) : 28 -  30.10.03 (6 half-day sessions) AutoCAD 2002 – Level 1 : 3, 4, 12, 13.11.03 (4 days) LabVIEW TestStand ver. 3 : 4 & 5.11.03 (2 days) Introduction to PSpice : 4.11.03 p.m. (half-day) Hands-on Introduction to Python Programming : 12 – 14.11.03 (3 days) ACCESS ...

  2. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Instructor-led WBTechT study for Microsoft applications :12.2.2004 (morning) Instructor-led WBTechT study or follow-up for Microsoft applications : 19.2.2004 (morning) LabVIEW TestStand I (E) : 23 & 24.2.2004 (2 days) LabVIEW base 1 : 25 - 27.2.2004 (3 jours) Instructor-led WBTechT study or follow-up for Microsoft applications : 19.2.2004 (morning) CLEAN-2002 ...

  3. Technical Training: Places Available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training Monique Duval - Tel.74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Oracle 9i: SQL: 17 - 19.5.2004 (3 days) Word 2003 - niveau 2 : 24 & 25.5.2004 (2 jours) EXCEL 2003 - niveau 1 : 27 & 28.5.2004 (2 jours) STEP7 Programming Level 1: 1 - 4.6.2004 (4 days) Oracle 9i : Programming with PL/SQL: 2 - 4.6.2004 (3 days) CST Microwave Studio: 3 & 4.6.2004 (2 days) Oracle 9i : New f...

  4. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Joint PVSS JCOP Framework : 9 - 13.8.2004 (5 days) Introduction à Outlook : 19.8.2004 (1 jour) Outlook (Short Course I): E-mail: 31.8.2004 (2 hours, morning) Outlook (Short Course II): Calendar, Tasks and Notes: 31.8.2004 (2 hours, afternoon) Hands-on Introduction to Python Programming: 1 - 3.9.2004 (3 days - free course) Instructor-led WBTechT Study or Follow-up for Microsoft Applications: 7.9.20...

  5. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Hands-on Introduction to Python Programming: 1 - 3.9.2004 (3 days - free course) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 7 & 8.9.2004 (2 jours) AutoCAD 2002 - niveau 1 : 13, 14, 23, 24.9.2004 (4 jours) Programmation STEP7 niveau 1 : 14-17.9.2004 (4 jours) FrontPage 2003 - niveau 1 : 20 & 21.9.2004 (2 jours) Word 2003 - niveau 2 : 27 & 28.9.2004 (2 jours) Introduction à Wind...

  6. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: C++ for Particle Physicists : 8 - 12.3.2004 (6 X 4-hour sessions) Introduction to the CERN EDMS : 9.3.2004 (1 day, free of charge) The EDMS MTF in Practice : 10.3.2004 (morning, free of charge) CLEAN-2002: Working in a Cleanroom : 10.3.2004 (afternoon, free of charge) The CERN EDMS for Engineers : 11.3.2004 (1 day, free of charge) LabVIEW hands-on (E):...

  7. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Outlook (short course I) : E-mail : 31.8.2004 (2 hours, morning) Introduction à Outlook : Outlook (short course II) : Calendar, Tasks and Notes : 31.8.2004 (2 hours, afternoon) Instructor-led WBTechT Study or Follow-up for Microsoft Applications : 7.9.2004 (morning) Outlook (short course III) : Meetings and Delegation : 7.9.2004 (2 hours, afternoon) Introduction au VHDL et utilisation du simulateur ...

  8. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: AutoCAD 2002 - niveau 1 : 13, 14, 23, 24.09.2004 (4 jours) Introduction to the CERN EDMS : 22.6.2004 (1 day) The CERN EDMS for local administrators : 23 & 24.6.2004 (2 days) MAGNE-04 : Magnétisme pour l'électrotechnique : 6 - 8.7.2004 (3 jours) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 7 & 8.9.2004 (2 jours) ENSEIGNEMENT TECHNIQUE TECHNICAL TRAINING...

  9. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Project Planning with MS-Project :6 & 13.5.2004 (2 days) Word 2003 - niveau 1 : 10 & 11.5.2004 (2 jours) Oracle 9i : SQL : 17 - 19.5.2004 (3 days) Word 2003 - niveau 2 : 24 & 25.5.2004 (2 jours) EXCEL 2003 - niveau 1: 27 & 28.5.2004 (2 jours) STEP7 Programming Level 1 : 1 - 4.6.2004 (4 days) Oracle 9i : Programming with PL/SQL : 2 - 4.6.2...

  10. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training Monique Duval - Tel.74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Word 2003 - niveau 2 : 24 & 25.5.2004 (2 jours) VisualEliteHDL : 25 & 26.5.2004 (2 days) EXCEL 2003 - niveau 1 : 27 & 28.5.2004 (2 jours) STEP7 Programming Level 1: 1 - 4.6.2004 (4 days) Oracle 9i : Programming with PL/SQL: 2 - 4.6.2004 (3 days) CST Microwave Studio: 3 & 4.6.2004 (2 days) Oracle 9...

  11. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Computational Electromagnetics with the ELEKTRA Module of OPERA-3D : 27 & 28.4.2004 (2 days) Hands-on Introduction to Python Programming : 3 - 5.5.2004 (3 days) LabVIEW Base 2 : 6 & 7.5.2004 (2 jours) Project Planning with MS-Project : 6 & 13.5.2004 (2 days) Word 2003 - niveau 1 : 10 & 11.5.2004 (2 jours) Oracle 9i : SQL : 10 - 12.5.2004 (3...

  12. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: AutoCAD 2002 - niveau 1 : 19, 20.4 et 3, 4.5.2004 (4 jours) Oracle 8i/9i - Develop Web-based Applications with PL/SQL : 19 & 20.4.2004 (2 days) Introduction to ANSYS : 20 - 23.4.2004 (4 days) LabVIEW Hands-on : 20.4.2004 (half-day, p.m.) FrontPage XP - niveau 2 : 26 & 27.4.2004 (2 jours) The Joint PVSS JCOP Framework : 26 -...

  13. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: C++ for Particle Physicists : 8 - 12.3.2004 (6 X 4-hour sessions) Introduction to the CERN EDMS : 9.3.2004 (1 day, free of charge) The EDMS MTF in Practice : 10.3.2004 (morning, free of charge) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon, free of charge) The CERN EDMS for Engineers : 11.3.2004 (1 day, free of charge) LabVIEW...

  14. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 27.6.2006 (July-December course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue Manipulation des images 4 6.07.06 F Introduction to Databases and Database Design 16 11-12.07.06 E ACCESS 2003 - Level 1: ECDL 16 13-14.07.06 E-F Design Patterns 16 25-26.07.06 E CERN EDMS for Local Administrators 16 1-2.08.06 E ANSYS DesignModeler 16 29-30.08.06 F CERN EDMS - Introduction 8 5.09.06 E CERN EDMS MTF en pratique 4 6.09.06 F LabVIEW Basics 1 24 4-6.09.06 E ANSYS Workbench 32 12-15.09.06 F AutoCAD Mechanical 2006 16 12-13.09.06 F CERN EDMS for Engineers 8 12.09.06 E Software Engineering in the Small and the Large 16 12-13.09.06 E AutoCAD 2006 - niveau 1 32 14-21.09.06 F LabVIEW Basics 2 ...

  15. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 19.7.2006 (August-December course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue CERN EDMS for Local Administrators 16 1-2.08.06 E ANSYS DesignModeler 16 29-30.08.06 F OUTLOOK 2003 (Short Course I) - E-mail 3 1.09.06 E/F OUTLOOK 2003 (Short Course II) - Calendar, Tasks and Notes 3 1.09.06 E/F CERN EDMS - Introduction 8 5.09.06 E CERN EDMS MTF en pratique 4 6.09.06 F LabVIEW Basics 1 24 11-13.09.06 E ANSYS Workbench 32 12-15.09.06 F CERN EDMS for Engineers 8 12.09.06 E Software Engineering in the Small and the Large 16 12-13.09.06 E LabVIEW Basics 2 16 14-15.09.06 E EXCEL 2003 (Short Course I) - HowTo... Work with formulae 3 15.09.06 E/F WORD 2003 (Short Course III) - HowTo... Work with long docu...

  16. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 7.2.2006 (February-May course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language WORD 2003 (Short Course II) - HowTo... Mail merge 3 13.03.06 E-F EXCEL 2003 (Short Course III) - HowTo... Pivot tables 3 20.03.06 E-F EXCEL 2003 (Short Course IV) - HowTo....Link cells, worksheets and workbooks 3 20.03.06 E-F Object-Oriented Analysis and Design using UML 24 21-23.03.06 E EXCEL 2003 - niveau 1 16 22-23.03.06 F FrontPage 2003 - niveau 1 16 27-28.03.06 F Oracle Forms Developer 10g: Move to the Web 16 27-28.03.06 E Oracle JDeveloper 10g: Build Applications with ADF 24 29-31.03.06 E ACCESS 2003 - Level 2: ECDL AM5 16 3-4.03.06 E-F JAVA 2 Enterprise Edition - Part 1: Web Applications 16 3-4.04.06 E JCOP: Control System Integration using JCOP Tools 24 4-6.04.06 E JAVA 2 Enterprise Edition...

  17. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 7.2.2006 (February-May course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language WORD 2003 (Short Course II) - HowTo... Mail merge 3 09-02-06 E-F ACCESS 2003 - Level 1: ECDL M5 16 13 to 14-02-06 E-F OUTLOOK 2003 (Short Course II) - Calendar, Tasks and Notes 3 16-02-06 E-F WORD 2003 (Short Course III) - HowTo... Work with long documents 3 16-02-06 E-F CERN EDMS - Introduction 8 21.02.06 E OUTLOOK 2003 (Short Course III) - Meetings and Delegation 3 27-02-06 E-F WORD 2003 (Short Course IV) - HowTo... Work with master document 3 27-02-06 E-F JAVA: Level 2 32 28-02-06 to 03-03-06 E Manipulation des images 4 28.02.06 F ACCESS 2003 - Level 2: ECDL AM5 16 02 to 03-03-06 E-F FrontPage 2003 - niveau 2 16 02 to 03-03-06 F C++ for Particle Physicists 20 06 to 10-03-06 E FileMaker - niv...

  18. Technical Training: Places available

    CERN Multimedia

    DAvide Vitè

    2006-01-01

    Places available as of 25.7.2006 (August-December course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue CERN EDMS for Local Administrators 16 1-2.08.06 E ANSYS DesignModeler 16 29-30.08.06 F EXCEL 2003 - niveau 1 : ECDL 16 30-31.08.06 F OUTLOOK 2003 (Short Course I) - E-mail 3 1.09.06 E/F OUTLOOK 2003 (Short Course II) - Calendar, Tasks and Notes 3 1.09.06 E/F CERN EDMS - Introduction 8 5.09.06 E CERN EDMS MTF en pratique 4 6.09.06 F ANSYS Workbench 32 12-15.09.06 F CERN EDMS for Engineers 8 12.09.06 E Software Engineering in the Small and the Large 16 12-13.09.06 E LabVIEW Basics 2 16 14-15.09.06 E WORD 2003 (Short Course III) - HowTo... Work with long documents 3 15.09.06 E/F EXCEL 2003 (Short Course I) - HowTo... Wor...

  19. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 7.2.2006 (February-May course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language WORD 2003 (Short Course IV) - HowTo... Work with master document 3 27.02.06 E-F JAVA: Level 2 32 28.02-3.03.06 E Manipulation des images 4 28.02.06 F ACCESS 2003 - Level 2: ECDL AM5 16 2-3.03.06 E-F C++ for Particle Physicists 20 6-10.03.06 E PowerPoint 2003 8 9.03.06 F JCOP: Control System Integration using JCOP Tools 24 14-16.03.06 E EXCEL 2003 (Short Course III) - HowTo... Pivot tables 3 20.03.06 E-F EXCEL 2003 (Short Course IV) - HowTo....Link cells, worksheets and workbooks 3 20.03.06 E-F JCOP: Finite State Machines in the JCOP Framework 24 21-23.03.06 E Object-Oriented Analysis and Design using UML 24 21-23.03.06 E FrontPage 2003 - niveau 1 16 27-28.03.06 F JCOP: Joint PVSS-JCOP Fram...

  20. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 11.7.2006 (July-December course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue Design Patterns 16 25-26.07.06 E CERN EDMS for Local Administrators 16 1-2.08.06 E ANSYS DesignModeler 16 29-30.08.06 F CERN EDMS – Introduction 8 5.09.06 E CERN EDMS MTF en pratique 4 6.09.06 F LabVIEW Basics 1 24 4-6.09.06 E ANSYS Workbench 32 12-15.09.06 F AutoCAD Mechanical 2006 16 12-13.09.06 F CERN EDMS for Engineers 8 12.09.06 E Software Engineering in the Small and the Large 16 12-13.09.06 E LabVIEW Basics 2 16 14-15.09.06 E LabVIEW: Working efficiently with LabWIEW 8 8 18.09.06 E PCAD Schémas ? Introduction 16 21-22.09.06 F PCAD PCB - Introduction  24 27-29.09.06 F C++ for Particle Physicists ...