WorldWideScience

Sample records for hide availability type

  1. A method for removing adobe-type manure from hides using an oxidizing agent

    Science.gov (United States)

    Adobe-type (hardened) manure attached to bovine hair is a major source of meat contamination, hide quality deterioration, and devalued leather products. Therefore, it is important to develop cleaning solutions that can rapidly remove adobe-type manure to improve the quality of hides delivered to tan...

  2. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Ding Qing-Yan; Zhang Shu-Hui; Chen Xiu-Bo

    2016-01-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. (paper)

  3. Efficient Information Hiding Based on Theory of Numbers

    Directory of Open Access Journals (Sweden)

    Yanjun Liu

    2018-01-01

    Full Text Available Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hiding scheme based on the combination of Chinese remainder theorem (CRT and a new extraction function is proposed. By the proposed scheme, the cover image is divided into non-overlapping pixel groups for embedding to increase the embedding capacity. Experimental results show that the embedding capacity of the proposed scheme is significantly higher (greater than 2.5 bpp than previously proposed schemes while ensuring very good visual quality of the stego image. In addition, security analysis is given to show that the proposed scheme can resist visual attack.

  4. An Internal Data Non-hiding Type Real-time Kernel and its Application to the Mechatronics Controller

    Science.gov (United States)

    Yoshida, Toshio

    For the mechatronics equipment controller that controls robots and machine tools, high-speed motion control processing is essential. The software system of the controller like other embedded systems is composed of three layers software such as real-time kernel layer, middleware layer, and application software layer on the dedicated hardware. The application layer in the top layer is composed of many numbers of tasks, and application function of the system is realized by the cooperation between these tasks. In this paper we propose an internal data non-hiding type real-time kernel in which customizing the task control is possible only by change in the program code of the task side without any changes in the program code of real-time kernel. It is necessary to reduce the overhead caused by the real-time kernel task control for the speed-up of the motion control of the mechatronics equipment. For this, customizing the task control function is needed. We developed internal data non-cryptic type real-time kernel ZRK to evaluate this method, and applied to the control of the multi system automatic lathe. The effect of the speed-up of the task cooperation processing was able to be confirmed by combined task control processing on the task side program code using an internal data non-hiding type real-time kernel ZRK.

  5. [Missed diagnosis of hiding posterior marginal fracture of ankle with pronation-external rotation type and its treatment].

    Science.gov (United States)

    Wang, Jia; Zhang, Yun-Tong; Zhang, Chun-Cai; Tang, Yang

    2014-01-01

    To analyze causes of missed diagnosis of hiding post-malleolar fractures in treating ankle joint fractures of pronation-external rotation type according to Lauge-Hansen classification and assess its medium-term outcomes. Among 103 patients with ankle joint fracture of pronation-external rotation type treated from March 2002 to June 2010,9 patients were missed diagnosis,including 6 males and 3 females,with a mean age of 35.2 years old (ranged, 18 to 55 years old) . Four patients were diagnosed during operation, 2 patients were diagnosed 2 or 3 days after first surgery and 3 patients came from other hospital. All the patients were treated remedially with lag screws and lock plates internal fixation. After operation,ankle joint function was evaluated according to American Orthopaedic Foot and Ankle Society (AOFAS). All the 9 patients were followed up, and the duration ranged from 14 to 30 months (averaged, 17 months). No incision infection was found, and all incision healed at the first stage. At the latest follow-up, AOFAS was 83.0 +/- 4.4, the score of 4 patients diagnosed during operation was 85.0 +/- 2.9, and the score of 5 patients treated by secondary operation was 81.0 +/- 5.3. All the patients got fracture union observed by X-ray at a mean time of 2.2 months after operation. There were no complications such as internal fixation loosing, broken and vascular or nerve injuries. Ankle joint fracture of pronation-external rotation type may be combined with hiding post-malleolar fractures. So to patients with ankle joint fracture of pronation-external rotation type, lateral X-ray should be read carefully, and if necessary, CT or MRI examination should be performed. If adding lateral X-ray examination after reduction of exterior and interior ankle joint fixation, the missed diagnosis may be avoided.

  6. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  7. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  8. Hackers in Hiding:

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2016-01-01

    On several occasions Michel Foucault advocated a methodological turn towards what he called a ‘happy positivism’. Foucault’s emphasis on the surface does not deny the importance of structures of hiding, but understands it as a game in which the structures of hiding are viewed as contingently given....... In this paper, I will analyse the conflict between the hacker movement and the field of corporate interests. I argue that the introduction of graphical user interfaces and the maintaining of copyright interests are the contingent background of the ongoing conflict. By bracketing the analyses of hidden...

  9. Information hiding technique

    Science.gov (United States)

    Younger, Michael; Budulas, Peter P.; Young, Stuart H.

    2002-08-01

    Spread spectrum communication techniques have been recognized as a viable method to gain an advantage in interference environments. Many military-oriented systems have been initiated, and some civil systems have been attempted. Spread spectrum allows the ability to hide the signal of interest below or in the noise floor, so as not to be detected. A spread spectrum system is one in which the transmitted signal is spread over a wide frequency band, much wider, in fact, than the minimum bandwidth required to transmit the information being sent. We at Army Research Lab (ARL) are proposing using the same technique on the Internet with port hopping. The information would be transmitted in data packets over multiple ports. The port used would vary per packet or per session basis. This port hopping gives you and the recipients the ability to take datagram's and spread them out over a multitude of ports. This will hide information among the Internet noise. This will allow trusted communications between the transmitter and receiver because of the port coding sequence. There are 64K possible ports to span datagram. Jamming of transmission would be limiting the ability of the sniffer/listener. Also, the listener will find it difficult to use a man in the middle attach, since the data will be spread over multiple ports and only the receiver and transmitter will know the specific port sequencing for the datagram.

  10. Selective Redundancy Removal: A Framework for Data Hiding

    Directory of Open Access Journals (Sweden)

    Ugo Fiore

    2010-02-01

    Full Text Available Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs. Such redundancy may be removed by means of optimization software. Redundancy removal, if applied selectively, enables information hiding. This work introduces Selective Redundancy Removal (SRR as a framework for hiding data. An example application of the framework is given in terms of hiding information in HTML documents. Non-uniformity across documents may raise alarms. Nevertheless, selective application of optimization techniques might be due to the legitimate use of optimization software not supporting all the optimization methods, or configured to not use all of them.

  11. Image hiding using optical interference

    Science.gov (United States)

    Zhang, Yan; Wang, Weining

    2010-09-01

    Optical image encryption technology has attracted a lot of attentions due to its large capacitance and fast speed. In conventional image encryption methods, the random phase masks are used as encryption keys to encode the images into white noise distribution. Therefore, this kind of methods requires interference technology to record complex amplitude and is vulnerable to attack techniques. The image hiding methods which employ the phase retrieve algorithm to encode the images into two or more phase masks are proposed, the hiding process is carried out within a computer using iterative algorithm. But the iterative algorithms are time consumed. All method mentioned above are based on the optical diffraction of the phase masks. In this presentation, a new optical image hiding method based on optical interference is proposed. The coherence lights which pass through two phase masks are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are design analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the novelty of the new proposed methods. This method can be expanded for double images hiding.

  12. Optical hiding with visual cryptography

    Science.gov (United States)

    Shi, Yishi; Yang, Xiubo

    2017-11-01

    We propose an optical hiding method based on visual cryptography. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof and image-covered, leading to the high security. During the extraction process, the covered phase-keys are illuminated with laser beams and then incoherently superimposed to extract the hidden information directly by human vision, without complicated optical implementations and any additional computation, resulting in the convenience of extraction. Also, the phase-keys are manufactured as the diffractive optical elements that are robust to the attacks, such as the blocking and the phase-noise. Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.

  13. Family networks and income hiding

    NARCIS (Netherlands)

    Beekman, Gonne; Gatto, Marcel; Nillesen, Eleonora

    2015-01-01

    This study investigates the relationship between family network density and income hiding in rural Liberia. We link people's behaviour in a modified lottery experiment and a time preference game to detailed information about their family networks. We find that individuals with a dense family

  14. Reflections on Quantum Data Hiding

    Science.gov (United States)

    Winter, Andreas

    Quantum data hiding, originally invented as a limitation on local operations and classical communications (LOCC) in distinguishing globally orthogonal states, is actually a phenomenon arising generically in statistics whenever comparing a `strong' set of measurements (i.e., decision rules) with a `weak' one. The classical statistical analogue of this would be secret sharing, in which two perfectly distinguishable multi-partite hypotheses appear to be indistinguishable when accessing only a marginal. The quantum versions are richer in that for example LOCC allows for state tomography, so the states cannot be come perfectly indistinguishable but only nearly so, and hence the question is one of efficiency. I will discuss two concrete examples and associated sets of problems: 1. Gaussian operations and classical computation (GOCC): Not very surprisingly, GOCC cannot distinguish optimally even two coherent states of a single mode. Here we find states, each a mixture of multi-mode coherent states, which are almost perfectly distinguishable by suitable measurements, by when restricted to GOCC, i.e. linear optics and post-processing, the states appear almost identical. The construction is random and relies on coding arguments. Open questions include whether there one can give a constructive version of the argument, and whether for instance even thermal states can be used, or how efficient the hiding is. 2. Local operation and classical communication (LOCC): It is well-known that in a bipartite dxd-system, asymptotically logd bits can be hidden. Here we show for the first time, using the calculus of min-entropies, that this is asymptotically optimal. In fact, we get bounds on the data hiding capacity of any preparation system; these are however not always tight. While it is known that data hiding by separable states is possible (i.e. the state preparation can be done by LOCC), it is open whether the optimal information efficiency of (asymptotically) log d bits can be

  15. Alkali-free method of hide preparation for tanning

    Directory of Open Access Journals (Sweden)

    V. Valeika

    2012-06-01

    Full Text Available Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming up to strongly acid (pickling. This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. During both processes, unhairing and oxidative treatment, the opening of the derma structure occurs: 13.3-14.6g of non-collagen proteins are removed and amount of dermatan sulphate decreases by 35%. The hide obtained can be chromed directly after the above processes and subsequent treatment with sodium chloride solution omitted conventional pickling. The pH of the hide varies in the range of 8.3-3.7 during the processes of preparation for tanning.

  16. Traceability System Model for Quality Gelatin Raw Material of Cattle Hides

    Directory of Open Access Journals (Sweden)

    S Nur

    2010-09-01

    Full Text Available Several criteria must be accomplished within the provision of quality products in terms of the types of materials, the processing methods and effort to get it. Traceability system involves various parties that have different needs and goals in the process of supplying raw materials. Hence, there is a need for institutional systems engineering that can organize and manage the tracking process, the procurement of raw materials that guarantee the origin of gelatin raw materials, and facilitate the industry and customer to create a standardized quality of product. The purpose of the study formulates the institutional tracking models of gelatin raw material from cattle hide based on various criteria and assessment of the expert opinion. The methods used in this study were Interpretative structural modeling to formulate a representation of institutional tracking efficiently and analytical hierarchy process to determine the tracking strategy of industrial gelatin raw materials from cowhide. The results obtained from the study were some key elements of institutional tracking model for industrial gelatin raw materials from cowhide and the traceability strategies for industrial raw materials from cattle hide gelatin Indonesia. (Animal Production 12(3: 190-198 (2010 Key Words: traceability, institutional model, cattle hide, gelatin

  17. Polycyclic Aromatic Hydrocarbons (PAHs) Content in Cattle Hides ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Vol. 21 (6) 1105-1110. Full-text Available Online at www.ajol.info and ... Keywords: Cattle hide, meat, tyre, singeing, hydrocarbons ... on the substance used as fuel for meat processing. .... through the centrifuge at 200 rpm for 5 min. The.

  18. Economic assessment and pathogenic bacteria inhibition of bovine hide presoaking solutions formulated with enzymes that can remove adobe-type manure

    Science.gov (United States)

    The presoaking formulations that have recently been developed are effective in removing the damaging adobe type bovine manure and eco-friendly because the ingredients used are recycled and required only a quarter of the amount of biocide and surfactant that the industry is commonly using. The goal ...

  19. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  20. Effect of Some Sudanese Traditional Hot Iron Branding on Cattle Hide Quality

    Directory of Open Access Journals (Sweden)

    Rehab Eltejani Abdelkarim

    2016-12-01

    Full Text Available This study was designed in order to assess and evaluate the effect of hot iron branding on cattle hide quality. 62 shapes of hot iron branding were detected and classified. Branding damage was evaluated depending on: purpose of application, location in the animal body, branding area, tribe which applied and hide degree. The results showed that, Baggara tribes branding were causing the greater damage on cattle hides; where 71.4% of its brands placed in the abdominal and animal back area (middle of the hide; in proportion to Misseriya Zuraq tribes (68.4%. According to the location of branding, the less tribe that causing damages to the cattle hides were Darfur tribes (14.3%. In terms of branding area Darfur tribes were causing the most branding damages where 42.8% of its brands on cattle hides were between 20-30cm, followed by Baggara tribes where 57.1% of its brands were between 10-20cm then Misseriya Zuraq tribes by 52.6%, and finally North Kordofan tribes of 37.5%. grading of cattle hides depending on the presence of the brand marks the study revealed that, Misseriya Zuraq tribe's brands were obtained the highest percentage (89.4% of the rejected hides (Scarto= 4 and 5 grades, when compared with North Kordofan tribes (87.5%. For commercial reason brand's were mostly done in the area of 5-10cm but, their effect on cattle hide quality was greater, where 81% of the hides were classified as Scarto.

  1. Sensitive plant (Mimosa pudica hiding time depends on individual and state

    Directory of Open Access Journals (Sweden)

    Sarah Reed-Guy

    2017-07-01

    Full Text Available The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  2. Recent Advances in Information Hiding and Applications

    CERN Document Server

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao

    2013-01-01

    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  3. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Directory of Open Access Journals (Sweden)

    Andreas Wilke

    Full Text Available Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  4. 9 CFR 350.3 - Types and availability of service.

    Science.gov (United States)

    2010-01-01

    ....3 Section 350.3 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF... product must be sound, wholesome and fit for human food. The service will be available only on premises... service will be available for products moved in tank cars and tank trucks from an official establishment...

  5. Optical image hiding based on interference

    Science.gov (United States)

    Zhang, Yan; Wang, Bo

    2009-11-01

    Optical image processing has been paid a lot of attentions recently due to its large capacitance and fast speed. Many image encryption and hiding technologies have been proposed based on the optical technology. In conventional image encryption methods, the random phase masks are usually used as encryption keys to encode the images into random white noise distribution. However, this kind of methods requires interference technology such as holography to record complex amplitude. Furthermore, it is vulnerable to attack techniques. The image hiding methods employ the phase retrieve algorithm to encode the images into two or more phase masks. The hiding process is carried out within a computer and the images are reconstructed optically. But the iterative algorithms need a lot of time to hide the image into the masks. All methods mentioned above are based on the optical diffraction of the phase masks. In this presentation, we will propose a new optical image hiding method based on interference. The coherence lights pass through two phase masks and are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are designed analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the validity of the new proposed methods.

  6. Suggested Method for Encryption and Hiding ‎Image using LCG and LSB

    Directory of Open Access Journals (Sweden)

    Atheer Hussein Zyara

    2017-12-01

    Full Text Available Maintaining the confidentiality of the data of the very important areas in computer applications , Where many researchers work in the fields of concealment and encryption . So in this research we are working on the combining of the two methods , where confidential data is encrypted by using  a proposed method , Then the cover is encrypted (regular image by LCG algorithm (which generates a series of random numbers to generate the encrypted cover (irregular image , After that ,we hide the encrypted data in encrypted cover by depending on the LSB technique, then we convert the irregular image into regular image and thereby getting  hidden data in random locations in the  cover image  , This method is characterized by flexibility in terms of the possibility of hiding the different  types of confidential data in different types of media , and durability as that data be hidden in random locations and this  what distinguishes the proposed algorithm , and the results showed high security, because the data is hidden in random locations in encrypted image then convert to the original regular image For clarification of the proposed algorithm , it has been applied on a digital image of the gray type using MATLAB language  by using the efficiency scales PSNR and MSE

  7. Motivation to hide emotion and children's understanding of the distinction between real and apparent emotions.

    Science.gov (United States)

    Gosselin, Pierre; Warren, Madeleine; Diotte, Michèle

    2002-12-01

    The authors investigated the extent to which children's understanding of the distinction between real and apparent emotions varied according to the motivation to hide emotions. Children, aged 6-7 and 10-11 years, were read stories designed to elicit either prosocial or self-protective motivated display rules and were asked to predict the facial expressions the protagonists would make to hide felt emotions. Children were found to understand the distinction between real and apparent emotions very well, independently of the type of motivation. Contrary to predictions, boys understood this distinction better than did girls when the motivation to hide positive emotions was prosocial. Children perceived neutralization as the most appropriate strategy to hide felt emotions, followed by masking.

  8. Pharmacologic Management of Type 2 Diabetes Mellitus: Available Therapies.

    Science.gov (United States)

    Thrasher, James

    2017-06-01

    Choices for the treatment of type 2 diabetes mellitus (T2DM) have multiplied as our understanding of the underlying pathophysiologic defects has evolved. Treatment should target multiple defects in T2DM and follow a patient-centered approach that considers factors beyond glycemic control, including cardiovascular risk reduction. The American Association of Clinical Endocrinologists/American College of Endocrinology and the American Diabetes Association recommend an initial approach consisting of lifestyle changes and monotherapy, preferably with metformin. Therapy choices are guided by glycemic efficacy, safety profiles, particularly effects on weight and hypoglycemia risk, tolerability, patient comorbidities, route of administration, patient preference, and cost. Balancing management of hyperglycemia with the risk of hypoglycemia and consideration of the effects of pharmacotherapy on weight figure prominently in US-based T2DM recommendations, whereas less emphasis has been placed on the ability of specific medications to affect cardiovascular outcomes. This is likely because, until recently, specific glucose-lowering agents have not been shown to affect cardiorenal outcomes. The Empagliflozin Cardiovascular Outcome Event Trial in Type 2 Diabetes Mellitus Patients-Removing Excess Glucose (EMPA-REG OUTCOME), the Liraglutide Effect and Action in Diabetes: Evaluation of Cardiovascular Outcome Results (LEADER) trial, and the Trial to Evaluate Cardiovascular and Other Long-term Outcomes with Semaglutide in Subjects with Type 2 Diabetes 6 (SUSTAIN-6) recently showed a reduction in overall cardiovascular risk with empagliflozin, liraglutide, and semaglutide treatment, respectively. Moreover, empagliflozin has become the first glucose-lowering agent indicated to reduce the risk of cardiovascular death in adults with T2DM and established cardiovascular disease. Results from cardiovascular outcomes trials have prompted an update to the 2017 American Diabetes Association

  9. Pharmacologic Management of Type 2 Diabetes Mellitus: Available Therapies.

    Science.gov (United States)

    Thrasher, James

    2017-07-01

    Choices for the treatment of type 2 diabetes mellitus (T2DM) have multiplied as our understanding of the underlying pathophysiologic defects has evolved. Treatment should target multiple defects in T2DM and follow a patient-centered approach that considers factors beyond glycemic control, including cardiovascular risk reduction. The American Association of Clinical Endocrinologists/American College of Endocrinology and the American Diabetes Association recommend an initial approach consisting of lifestyle changes and monotherapy, preferably with metformin. Therapy choices are guided by glycemic efficacy, safety profiles, particularly effects on weight and hypoglycemia risk, tolerability, patient comorbidities, route of administration, patient preference, and cost. Balancing management of hyperglycemia with the risk of hypoglycemia and consideration of the effects of pharmacotherapy on weight figure prominently in US-based T2DM recommendations, whereas less emphasis has been placed on the ability of specific medications to affect cardiovascular outcomes. This is likely because, until recently, specific glucose-lowering agents have not been shown to affect cardiorenal outcomes. The Empagliflozin Cardiovascular Outcome Event Trial in Type 2 Diabetes Mellitus Patients-Removing Excess Glucose (EMPA-REG OUTCOME), the Liraglutide Effect and Action in Diabetes: Evaluation of Cardiovascular Outcome Results (LEADER) trial, and the Trial to Evaluate Cardiovascular and Other Long-term Outcomes with Semaglutide in Subjects with Type 2 Diabetes 6 (SUSTAIN-6) recently showed a reduction in overall cardiovascular risk with empagliflozin, liraglutide, and semaglutide treatment, respectively. Moreover, empagliflozin has become the first glucose-lowering agent indicated to reduce the risk of cardiovascular death in adults with T2DM and established cardiovascular disease. Results from cardiovascular outcomes trials have prompted an update to the 2017 American Diabetes Association

  10. Preservation of bovine hide using less salt with low concentration of antiseptic, part I: effectiveness of developed formulations

    Science.gov (United States)

    Bovine raw hides are commercially cured either with high salt concentration of about half the weight of actual hide or 95% saturated brine solution. This conventional technique is very popular due to the availability of common salt (sodium chloride) and its cost effective procedure but it generates ...

  11. Unitary embedding for data hiding with the SVD

    Science.gov (United States)

    Bergman, Clifford; Davidson, Jennifer

    2005-03-01

    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  12. Book Review: No Place To Hide

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2007-03-01

    Full Text Available O'Harrow, R., Jr. (2006. No Place To Hide. New York: Free Press. 352 pages, ISBN: 0-7432-8705-3 (paper, US$26Reviewed by Gary C. Kessler (gary.kessler@champlain.eduPersonal privacy and the protection of personal identifying information are of concern to all of us. Innumerable articles and conferences address our loss of privacy, either through the sale of consumer databases or our own inattention. Opinions vary from "You have no privacy; get over it" to "This is the end of civil liberties as we know them." We teach people to safely maneuver on the Internet and minimize their exposure to bogus sites set up to steal their identity, warn users about the dangers of phishing and posting personal information on social network sites, use firewalls to protect our databases, and enact laws such as the Health Insurance Portability and Accountability Act (HIPAA and the Family Educational Rights and Privacy Act (FERPA to protect information.(see PDF for full review

  13. Short term preservation of hide using vacuum: influence on properties of hide and of processed leather.

    Science.gov (United States)

    Gudro, Ilze; Valeika, Virgilijus; Sirvaitytė, Justa

    2014-01-01

    The objective of this work was to investigate vacuum influence on hide preservation time and how it affects hide structure. It was established that vacuum prolongs the storage time without hide tissue putrefaction up to 21 days when the storage temperature is 4°C. The microorganisms act for all storage times, but the action is weak and has no observable influence on the quality of hide during the time period mentioned. The hide shrinkage temperature decrease is negligible, which shows that breaking of intermolecular bonds does not occur. Optical microscopy, infrared spectroscopy and differential scanning calorimetry also did not show any structural changes which can influence the quality of leather produced from such hide. The qualitative indexes of wet blue processed under laboratory conditions and of leather produced during industrial trials are presented. Indexes such as chromium compounds exhaustion, content of chromium in leather, content of soluble matter in dichloromethane, strength properties, and shrinkage temperature were determined. Properties of the leather produced from vacuumed hide under industrial conditions conformed to the requirements of shoe upper leather.

  14. Facts about Type 2

    Medline Plus

    Full Text Available ... Diabetes Research & Practice Home We Are Research Leaders World's Largest Diabetes Meeting Recent Advances Type 1 Research ... survey-loading').remove(); $('#emailsurvey').hide(); $('#emailsurveythanks').show(); } } }; /* bind any forms with the "luminateApi" class */ luminateExtend.api.bind(); }); })( ...

  15. HIDING TEXT IN DIGITAL IMAGES USING PERMUTATION ORDERING AND COMPACT KEY BASED DICTIONARY

    Directory of Open Access Journals (Sweden)

    Nagalinga Rajan

    2017-05-01

    Full Text Available Digital image steganography is an emerging technique in secure communication for the modern connected world. It protects the content of the message without arousing suspicion in a passive observer. A novel steganography method is presented to hide text in digital images. A compact dictionary is designed to efficiently communicate all types of secret messages. The sorting order of pixels in image blocks are chosen as the carrier of embedded information. The high correlation in image pixel values means reordering within image blocks do not cause high distortion. The image is divided into blocks and perturbed to create non repeating sequences of intensity values. These values are then sorted according to the message. At the receiver end, the message is read from the sorting order of the pixels in image blocks. Only those image blocks with standard deviation lesser than a given threshold are chosen for embedding to alleviate visual distortion. Information Security is provided by shuffling the dictionary according to a shared key. Experimental Results and Analysis show that the method is capable of hiding text with more than 4000 words in a 512×512 grayscale image with a peak signal to noise ratio above 40 decibels.

  16. Perception of Stakeholders to the Proposed Ban on Cow Hide ...

    African Journals Online (AJOL)

    User

    Keywords: Cow hide consumption, cow hide value chain, ponmo .... value chain;. 2. identify sources of information of the respondents on the proposed ban; ..... the health risk associated with the consumption of ponmo may favour its proposed.

  17. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  18. Hiding levitating objects above a ground plane

    DEFF Research Database (Denmark)

    Zhang, Jingjing; Luo, Yu; Mortensen, Asger

    2010-01-01

    An approach to hiding objects levitating above a conducting sheet is suggested in this paper. The proposed device makes use of isotropic negative-refractive-index materials without extreme material parameters, and creates an illusion of a remote conducting sheet. Numerical simulations are perform...

  19. HIDE working groups: synchrotron based system: summary

    International Nuclear Information System (INIS)

    Barton, M.Q.

    1978-01-01

    A brief overview is given of the work resulting from a one-week workshop on the use of synchrotrons in heavy ion fusion, i.e., a Heavy Ion Demonstration Experiment (HIDE). Topics discussed concerned the number of beams on target, space charge limitations, choice of ion charge state, and areas identified as needing further work

  20. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Directory of Open Access Journals (Sweden)

    Sha Edwin Hsing-Mean

    2002-01-01

    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  1. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Directory of Open Access Journals (Sweden)

    Grønstøl H

    2001-03-01

    Full Text Available The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment.

  2. Matryoshka: Hiding Secret Communication in Plain Sight

    OpenAIRE

    Safaka, Iris; Fragouli, Christina; Argyraki, Katerina

    2016-01-01

    We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small -- existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of...

  3. Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography

    Directory of Open Access Journals (Sweden)

    Wei-Liang Tai

    2018-01-01

    Full Text Available We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds data in it by using a data-hiding key. The image decryption and data extraction are independent and separable at the receiver side. Even though the receiver, who has only the data-hiding key, does not learn about the decrypted content, he can extract data from the received marked encrypted signal. However, the receiver who has only the private key cannot extract the embedded data, but he can directly decrypt the received marked encrypted signal to obtain the original image without any error. Compared with other schemes using a cipher stream to encrypt the image, the proposed scheme is more appropriate for cloud services without degrading the security level.

  4. DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Siva Shankar

    2016-08-01

    Full Text Available Digital image steganography has several applications in information security and communication. Data hiding in encrypted images ensure that both the cover image and the secret message can be recovered at the receiver end. This work presents a novel data hiding and image encryption scheme using random diffusion and Two dimensional Arnold cat mapping transform. The secret message bits are placed in the least significant bit positions of the cover image. Then a shared key is used to generate random 8 bit random integer stream and is added to the stego image in the random diffusion step. Arnold cat mapping transformation is done to scramble the pixels. The two steps of random diffusion and Arnold transform mapping are done alternatively several times to completely encrypt the image contents. The process is reversed at the receiver end to get both the secret message and the cover image with little loss. The random diffusion step overcomes the limited period of the Arnold transform. The embedding capacity of one bit per pixel is achieved. Security analysis is carried out which shows that the encryption is highly secure. The number of collisions is low thus preventing brute force attacks. The original cover image is recoverable with minimal losses.

  5. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  6. Children and Robots Learning to Play Hide and Seek

    National Research Council Canada - National Science Library

    Trafton, J. G; Schultz, Alan C; Perznowski, Dennis; Bugajska, Magdalena D; Adams, William; Cassimatis, Nicholas L; Brock, Derek P

    2006-01-01

    ...., containment, under) and use that information to play a credible game of hide and seek. They model this hypothesis within the ACT-R cognitive architecture and put the model on a robot, which is able to mimic the child's hiding behavior. They also take the "hiding" model and use it as the basis for a "seeking" model. They suggest that using the same representations and procedures that a person uses allows better interaction between the human and robotic system.

  7. An Image Encryption Method Based on Bit Plane Hiding Technology

    Institute of Scientific and Technical Information of China (English)

    LIU Bin; LI Zhitang; TU Hao

    2006-01-01

    A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane of several different open images. And then a new hiding image is acquired by a nesting "Exclusive-OR" operation on those images obtained from the first step. At last, by employing image fusion technique, the final hiding result is achieved. The experimental result shows that the method proposed in this paper is effective.

  8. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    Directory of Open Access Journals (Sweden)

    Novella Isabel S

    2003-06-01

    Full Text Available Abstract Background In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, RED, was found to avoid extinction and remain in the population for long periods of time. Since RED characterizes the past evolutionary history of the population, this observation was called quasispecies memory. While the quasispecies theory predicts the existence of these memory genomes, there is a disagreement between the expected and observed mutant frequency values. Therefore, the origin of quasispecies memory is not fully understood. Results We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry, the likely cause of fitness differences between wild type and RED mutants. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.. If the RED mutant is constantly recreated by mutations, then its frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases their fitness to the wild-type level. Moreover, even at low m.o.i. the equilibrium frequency of the mutant is higher than predicted by the standard quasispecies model, because a fraction of mutant virions generated from wild-type parents will also be encapsidated by wild-type protein. Conclusions Our model predicts that phenotypic hiding will strongly influence the population dynamics of viruses, particularly at high m.o.i., and will also have important effects on the mutation-selection balance at low m.o.i. The delay in mutant extinction and increase in mutant

  9. Hiding Information Using different lighting Color images

    Science.gov (United States)

    Majead, Ahlam; Awad, Rash; Salman, Salema S.

    2018-05-01

    The host medium for the secret message is one of the important principles for the designers of steganography method. In this study, the best color image was studied to carrying any secret image.The steganography approach based Lifting Wavelet Transform (LWT) and Least Significant Bits (LSBs) substitution. The proposed method offers lossless and unnoticeable changes in the contrast carrier color image and imperceptible by human visual system (HVS), especially the host images which was captured in dark lighting conditions. The aim of the study was to study the process of masking the data in colored images with different light intensities. The effect of the masking process was examined on the images that are classified by a minimum distance and the amount of noise and distortion in the image. The histogram and statistical characteristics of the cover image the results showed the efficient use of images taken with different light intensities in hiding data using the least important bit substitution method. This method succeeded in concealing textual data without distorting the original image (low light) Lire developments due to the concealment process.The digital image segmentation technique was used to distinguish small areas with masking. The result is that smooth homogeneous areas are less affected as a result of hiding comparing with high light areas. It is possible to use dark color images to send any secret message between two persons for the purpose of secret communication with good security.

  10. Dynamics and driving forces of hides, skins, leather and leather ...

    African Journals Online (AJOL)

    Footwear and leather goods are constrained by lack of factories, competition from used goods, synthetic plastics and uninformed market. Investment in hides, skins and leather industry supported by training programmes has potential to generate great monetary revenue. Keywords: Hides, skin, leather, value chain, slaughter ...

  11. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  12. Hide-Scrapers from Arukhlo I Settlement in Georgia (on correspondence of the shape and function of prehistoric implements

    Directory of Open Access Journals (Sweden)

    Esakia Ketevan M.

    2017-09-01

    Full Text Available The article analyses one of the primary categories of the implement complex discovered at Arukhlo I Neolithic settlement (Georgia, Kvemo Kartli Region. The stone implements discovered at the site are characterized by their great variety. Comprehensive functional research conducted by the authors demonstrated that the typological and morphological characteristics of the various categories of stone implements do not always correspond to their functions. Thus, the shapes and functions of the hide-scrapers were fully identical for 18 of 39 implements only, whereas the other tools were used for different purposes and did not feature traces of utilization. A microanalysis of their working parts allowed to determine the types of processed raw material, means of processing, and in certain cases the type of obtained articles as well. The authors made a conclusion on the importance of the comprehensive research of production inventory for the reconstruction of the characteristic features of prehistoric economy.

  13. Analysis Of Aspects Of Messages Hiding In Text Environments

    Directory of Open Access Journals (Sweden)

    Afanasyeva Olesya

    2015-09-01

    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  14. 41 CFR 102-37.40 - What type of surplus property is available for donation?

    Science.gov (United States)

    2010-07-01

    ... property is available for donation? 102-37.40 Section 102-37.40 Public Contracts and Property Management... 37-DONATION OF SURPLUS PERSONAL PROPERTY General Provisions Donation Overview § 102-37.40 What type of surplus property is available for donation? All surplus property (including property held by...

  15. Hiding Critical Targets in Smart Grid Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bao, Wei [Univ. of Arkansas, Fayetteville, AR (United States); Li, Qinghua

    2017-10-23

    With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromised nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.

  16. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  17. Alkali-free method of hide preparation for tanning

    OpenAIRE

    Valeika, V.; Beleska, K.; Sirvaityte, J.

    2012-01-01

    Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming) up to strongly acid (pickling). This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. D...

  18. 13 CFR 127.101 - What type of assistance is available under this part?

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What type of assistance is available under this part? 127.101 Section 127.101 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION WOMEN-OWNED SMALL BUSINESS FEDERAL CONTRACT ASSISTANCE PROCEDURES General Provisions § 127.101...

  19. 13 CFR 124.702 - What types of assistance are available through the 7(j) program?

    Science.gov (United States)

    2010-01-01

    ..., marketing, and operation of small business concerns; and (b) The identification and development of new... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What types of assistance are available through the 7(j) program? 124.702 Section 124.702 Business Credit and Assistance SMALL BUSINESS...

  20. Information Hiding In Digital Video Using DCT, DWT and CvT

    Science.gov (United States)

    Abed Shukur, Wisam; Najah Abdullah, Wathiq; Kareem Qurban, Luheb

    2018-05-01

    The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the Normalized cross Correlation (NC). The experiments shows the error ratio of the proposed technique is (8%) while accuracy ratio is (92%) when the Curvelet Transform (CvT) is used, but compared with Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT), the error rates are 11% and 14% respectively, while the accuracy ratios are (89%) and (86%) respectively. So, the experiments shows the Poisson noise gives better results than other types of noises, while the speckle noise gives worst results compared with other types of noises. The proposed technique has been established by using MATLAB R2016a programming language.

  1. Den ecology of Octopus vulgaris Cuvier, 1797, on soft sediment: availability and types of shelter

    Directory of Open Access Journals (Sweden)

    Stelios Katsanevakis

    2004-03-01

    Full Text Available To avoid predation, octopuses select and actively modify shelters (also called dens in the substratum, where they remain most of the time, especially during daylight hours. The main questions that this study deals with are: Is den availability a significant constraint for the distribution of Octopus vulgaris on soft sediment? What kind of dens does O. vulgaris use on soft sediment and what factors affect the selection of one type instead of another? With population density measurements by SCUBA diving and enrichment experiments with artificial dens, we concluded that the availability of solid materials necessary for den construction is a limiting factor for the distribution of O. vulgaris on soft sediment. O. vulgaris used four different types of den on soft sediment: well (a vertical hole in the sediment, rock/stone (the octopus uses a rock or a large stone to dig a cavity under it, shell (an empty shell is used, human origin (a solid material of human origin is used. The relative proportion of the four types of den in the areas studied was: 38.7% human origin, 29.7% well, 21.5% rock/stone, 2.9% shell. Also, 7.3% of the octopuses were found outside their den. The main types of den were found in different relative proportions in relation to the depth, the distance from shore, the octopus size and the granulometry of the sediment.

  2. Mechanical properties of biobased films prepared from collagen solutions derived from bovine hides

    Science.gov (United States)

    The most valuable byproducts of the meat packing industry are hides. The U.S. is the world’s 3rd largest hide producing country and currently produces approximately 35 million cattle hides annually. Due to fierce competition in global markets, the American leather and hides industry is facing chal...

  3. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: RVO:67985998 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  4. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: PRVOUK-P23 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  5. Let’s play hide and seek!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    This week, we would like you to play a small online game called “Virtual Hide & Seek”. The rules are simple: some of our colleagues have published some sensitive or confidential documents on CERN’s central services like Indico, CDS, EDMS or TWiki, as well as on our many websites. Your mission, should you choose to accept it: find them!   If you provide us with documents marked “confidential”, “classified”, “sensitive”, or containing plain text operational passwords, you can win a book on computer security. There are only few conditions: these documents must be visible from outside CERN, must not require a CERN account in order to access them, and must not belong to you or have a direct link with your work. Have fun! But seriously, are you sure that your documents are really properly protected? We regularly find confidential documents stored on one of the CERN central  services and w...

  6. Trends in types of dermatology books available over the last ten years.

    Science.gov (United States)

    Aquino, Lisa L; Wu, Jashin J

    2009-06-15

    Shifts in interest toward cosmetic and surgical dermatology and away from medical and academic dermatology have been observed in recent years. We hypothesized that this trend would be evident in the types of books available for purchase from a major medical textbook supplier. Books published from 1998-2008 were categorized by type and statistical testing was performed to determine if this trend has been reflected in books published. The percentage of medical dermatology books decreased over time, whereas the percentage of cosmetic and surgical dermatology books increased over time.

  7. A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

    Directory of Open Access Journals (Sweden)

    Milad Taleby Ahvanooey

    2018-01-01

    Full Text Available With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.

  8. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  9. Suitability of the RGB Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Ante Poljicak

    2010-06-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data  hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  10. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  11. Emotion dysregulation and amygdala dopamine D2-type receptor availability in methamphetamine users.

    Science.gov (United States)

    Okita, Kyoji; Ghahremani, Dara G; Payer, Doris E; Robertson, Chelsea L; Dean, Andy C; Mandelkern, Mark A; London, Edythe D

    2016-04-01

    Individuals who use methamphetamine chronically exhibit emotional and dopaminergic neurochemical deficits. Although the amygdala has an important role in emotion processing and receives dopaminergic innervation, little is known about how dopamine transmission in this region contributes to emotion regulation. This investigation aimed to evaluate emotion regulation in subjects who met DSM-IV criteria for methamphetamine dependence, and to test for a relationship between self-reports of difficulty in emotion regulation and D2-type dopamine receptor availability in the amygdala. Ninety-four methamphetamine-using and 102 healthy-control subjects completed the Difficulties in Emotion Regulation Scale (DERS); 33 of those who used methamphetamine completed the Addiction Severity Index (ASI). A subset of 27 methamphetamine-group and 20 control-group subjects completed positron emission tomography with [(18)F]fallypride to assay amygdala D2-type dopamine receptor availability, measured as binding potential (BPND). The methamphetamine group scored higher than the control group on the DERS total score (pmethamphetamine group. The DERS total score was positively correlated with amygdala BPND in both groups and the combined group of participants (combined: r=0.331, p=0.02), and the groups did not differ in this relationship. These findings highlight problems with emotion regulation linked to methamphetamine use, possibly contributing to personal and interpersonal behavioral problems. They also suggest that D2-type dopamine receptors in the amygdala contribute to emotion regulation in both healthy and methamphetamine-using subjects. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  12. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  13. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    Directory of Open Access Journals (Sweden)

    Ari Shawakat Tahir

    2015-12-01

    Full Text Available The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed.

  14. Physicochemical Properties of Gelatin Extracted from Buffalo Hide Pretreated with Different Acids.

    Science.gov (United States)

    Mulyani, Sri; Setyabudi, Francis M C Sigit; Pranoto, Yudi; Santoso, Umar

    2017-01-01

    The acid pretreatment of collagen molecules disrupts their crosslinks and assists in the release of acid-soluble proteins, fats, and other components. Generally, to achieve optimum extraction efficiency, strong acids may be used at a lower acid concentration compared to weak acids. This study aimed to determine the yield and physicochemical properties of gelatins extracted from buffalo hides pretreated with different acids. Hides were extracted with hydrochloric, citric, and acetic acids at concentrations of 0.3, 0.6, 0.9, 1.2, and 1.5 M. A completely randomized design and the least significant difference test were used in the experimental design, and all measurements were performed in triplicate. The highest yield (29.17%) was obtained from pretreatment with 0.9 M HCl. The gel strength did not differ significantly ( p >0.05) according to acid type (280.26-259.62 g Bloom), and the highest viscosity was obtained from the 0.6 M citric acid pretreatment. All the gelatins contained α- and β-chain components and several degraded peptides (24-66 kDa). The color and Fourier-transform infrared spectrum of the gelatin extracted using 0.9 M HCl were similar to those of commercial bovine skin gelatin. In general, the physicochemical properties of the gelatin complied with the industry standard set by the Gelatin Manufacturers Institute of America, revealing that buffalo hide could serve as a potential alternative source of gelatin.

  15. Perspective taking and theory of mind in hide and seek.

    Science.gov (United States)

    Street, Chris N H; Bischof, Walter F; Kingstone, Alan

    2018-01-01

    Does theory of mind play a significant role in where people choose to hide an item or where they search for an item that has been hidden? Adapting Anderson's "Hide-Find Paradigm" Anderson et al. (Action, Perception and Performance, 76, 907-913, 2014) participants viewed homogenous or popout visual arrays on a touchscreen table. Their task was to indicate where in the array they would hide an item, or to search for an item that had been hidden, by either a friend or a foe. Critically, participants believed that their sitting location at the touchtable was the same as-or opposite to-their partner's location. Replicating Anderson et al., participants tended to (1) select items nearer to themselves on homogenous displays, and this bias was stronger for a friend than foe; and (2) select popout items, and again, more for a friend than foe. These biases were observed only when participants believed that they shared the same physical perspective as their partner. Collectively, the data indicate that theory of mind plays a significant role in hiding and finding, and demonstrate that the hide-find paradigm is a powerful tool for investigating theory of mind in adults.

  16. An Improved Information Hiding Method Based on Sparse Representation

    Directory of Open Access Journals (Sweden)

    Minghai Yao

    2015-01-01

    Full Text Available A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.

  17. Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

    Directory of Open Access Journals (Sweden)

    Xianyi Chen

    2018-01-01

    Full Text Available Compared to the encrypted-image-based reversible data hiding (EIRDH method, the encrypted-signals-based reversible data hiding (ESRDH technique is a novel way to achieve a greater embedding rate and better quality of the decrypted signals. Motivated by ESRDH using signal energy transfer, we propose an improved ESRDH method using code division multiplexing and value expansion. At the beginning, each pixel of the original image is divided into several parts containing a little signal and multiple equal signals. Next, all signals are encrypted by Paillier encryption. And then a large number of secret bits are embedded into the encrypted signals using code division multiplexing and value expansion. Since the sum of elements in any spreading sequence is equal to 0, lossless quality of directly decrypted signals can be achieved using code division multiplexing on the encrypted equal signals. Although the visual quality is reduced, high-capacity data hiding can be accomplished by conducting value expansion on the encrypted little signal. The experimental results show that our method is better than other methods in terms of the embedding rate and average PSNR.

  18. Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

    Directory of Open Access Journals (Sweden)

    Mohammad S. Alam

    2012-10-01

    Full Text Available In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level.

  19. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    Directory of Open Access Journals (Sweden)

    H. Yang

    2009-12-01

    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  20. Data Hiding Based on a Two-Layer Turtle Shell Matrix

    Directory of Open Access Journals (Sweden)

    Xiao-Zhu Xie

    2018-02-01

    Full Text Available Data hiding is a technology that embeds data into a cover carrier in an imperceptible way while still allowing the hidden data to be extracted accurately from the stego-carrier, which is one important branch of computer science and has drawn attention of scholars in the last decade. Turtle shell-based (TSB schemes have become popular in recent years due to their higher embedding capacity (EC and better visual quality of the stego-image than most of the none magic matrices based (MMB schemes. This paper proposes a two-layer turtle shell matrix-based (TTSMB scheme for data hiding, in which an extra attribute presented by a 4-ary digit is assigned to each element of the turtle shell matrix with symmetrical distribution. Therefore, compared with the original TSB scheme, two more bits are embedded into each pixel pair to obtain a higher EC up to 2.5 bits per pixel (bpp. The experimental results reveal that under the condition of the same visual quality, the EC of the proposed scheme outperforms state-of-the-art data hiding schemes.

  1. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  2. Content-based Image Hiding Method for Secure Network Biometric Verification

    Directory of Open Access Journals (Sweden)

    Xiangjiu Che

    2011-08-01

    Full Text Available For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content correlation analysis to protect the network-based transmitted image. By using principal component analysis (PCA, the content correlation between the biometric image and the cover image is firstly analyzed. Then based on particle swarm optimization (PSO algorithm, some regions of the cover image are selected to represent the biometric image, in which the cover image can carry partial content of the biometric image. As a result of the correlation analysis, the unrepresented part of the biometric image is embedded into the cover image by using the discrete wavelet transform (DWT. Combined with human visual system (HVS model, this approach makes the hiding result perceptually invisible. The extensive experimental results demonstrate that the proposed hiding approach is robust against some common frequency and geometric attacks; it also provides an effective protection for the secure biometric verification.

  3. HIDE & SEEK: End-to-end packages to simulate and process radio survey data

    Science.gov (United States)

    Akeret, J.; Seehars, S.; Chang, C.; Monstein, C.; Amara, A.; Refregier, A.

    2017-01-01

    As several large single-dish radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these datasets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system-from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing single-dish radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single-dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal. The two packages can be used separately or together depending on the application. Their modular and flexible nature allows easy adaptation to other instruments and datasets. We describe the basic architecture of the two packages and examine in detail the noise and RFI modeling in HIDE, as well as the implementation of gain calibration and RFI mitigation in SEEK. We then apply HIDE &SEEK to forward-model a Galactic survey in the frequency range 990-1260 MHz based on data taken at the Bleien Observatory. For this survey, we expect to cover 70% of the full sky and achieve a median signal-to-noise ratio of approximately 5-6 in the cleanest channels including systematic uncertainties. However, we also point out the potential challenges of high RFI contamination and baseline removal when examining the early data from the Bleien Observatory. The fully documented HIDE &SEEK packages are available at http://hideseek.phys.ethz.ch/ and are published

  4. Market structure and performance of value chain actors in hides and ...

    African Journals Online (AJOL)

    Market structure and performance of value chain actors in hides and skins processing and marketing in Nigeria. ... There was high performance in hides and skins processing and marketing in Nigeria. ... EMAIL FULL TEXT EMAIL FULL TEXT

  5. Optimal placement of multiple types of communicating sensors with availability and coverage redundancy constraints

    Science.gov (United States)

    Vecherin, Sergey N.; Wilson, D. Keith; Pettit, Chris L.

    2010-04-01

    Determination of an optimal configuration (numbers, types, and locations) of a sensor network is an important practical problem. In most applications, complex signal propagation effects and inhomogeneous coverage preferences lead to an optimal solution that is highly irregular and nonintuitive. The general optimization problem can be strictly formulated as a binary linear programming problem. Due to the combinatorial nature of this problem, however, its strict solution requires significant computational resources (NP-complete class of complexity) and is unobtainable for large spatial grids of candidate sensor locations. For this reason, a greedy algorithm for approximate solution was recently introduced [S. N. Vecherin, D. K. Wilson, and C. L. Pettit, "Optimal sensor placement with terrain-based constraints and signal propagation effects," Unattended Ground, Sea, and Air Sensor Technologies and Applications XI, SPIE Proc. Vol. 7333, paper 73330S (2009)]. Here further extensions to the developed algorithm are presented to include such practical needs and constraints as sensor availability, coverage by multiple sensors, and wireless communication of the sensor information. Both communication and detection are considered in a probabilistic framework. Communication signal and signature propagation effects are taken into account when calculating probabilities of communication and detection. Comparison of approximate and strict solutions on reduced-size problems suggests that the approximate algorithm yields quick and good solutions, which thus justifies using that algorithm for full-size problems. Examples of three-dimensional outdoor sensor placement are provided using a terrain-based software analysis tool.

  6. Availability and improvement of a vacuum-type immobilization device in pediatric CT

    International Nuclear Information System (INIS)

    Tani, Shoji; Mizuno, Naoto; Abe, Syuji

    2002-01-01

    The essential factors for an immobilization device in pediatric CT are absence of artifacts, safety, no disturbance of the patient's sedation, and ease of handling. We evaluated the suitability of a commercially available vacuum-type immobilization device designed for radiation therapy (Vac-Lok) that meets these requisites. There were no artifacts in scans of the water phantom. The device easily immobilized the patient, was quick to release, and was superior to previous immobilization systems, according to replies to a questionnaire administered to physicians, technologists, and nurses. Schedule delays were reduced by using this device to examine sedated patients (up to 1 year of age). Despite these advantages, the device was too small to immobilize both extremities together when examining older patients. In order to overcome this problem, we invented a special immobilization device for pediatric CT. The new device could be applied to taller patients, up to 85 cm in height (the average height of 2-year-old infants), and was able to contribute to efficient utilization of the examination room. (author)

  7. Decreased in vivo availability of the cannabinoid type 2 receptor in Alzheimer's disease

    Energy Technology Data Exchange (ETDEWEB)

    Ahmad, Rawaha; Laere, Koen van [KU Leuven and University Hospitals Leuven, Department of Imaging and Pathology, Nuclear Medicine and Molecular Imaging, Leuven (Belgium); University Hospital Leuven, Division of Nuclear Medicine, Leuven (Belgium); Postnov, Andrey [KU Leuven and University Hospitals Leuven, Department of Imaging and Pathology, Nuclear Medicine and Molecular Imaging, Leuven (Belgium); National Research Nuclear University MEPhI, Moscow (Russian Federation); Bormans, Guy [KU Leuven, Laboratory for Radiopharmacy, Leuven (Belgium); Versijpt, Jan [University Hospital Brussels, Department of Neurology, Brussels (Belgium); Vandenbulcke, Mathieu [KU Leuven and University Hospitals Leuven, Old Age Psychiatry, Department of Psychiatry, Leuven (Belgium)

    2016-11-15

    The cannabinoid type 2 receptor (CB{sub 2}R) is expressed by immune cells such as monocytes and macrophages. In the brain, CB{sub 2}R is primarily found on microglia. CB{sub 2}R upregulation has been reported in animal models of Alzheimer's disease, with a preferential localization near amyloid beta (Aβ) plaques, and in patients post mortem. We performed in vivo brain imaging and kinetic modelling of the CB{sub 2}R tracer [{sup 11}C]NE40 in healthy controls (HC) and in patients with Alzheimer's disease (AD) to investigate whether higher CB{sub 2}R availability regionally colocalized to Aβ deposits is present in vivo. Dynamic 90-min [{sup 11}C]NE40 PET scans were performed in eight HC and nine AD patients with full kinetic modelling using arterial sampling and metabolite correction and partial volume correction. All AD patients received a static [{sup 11}C]PIB scan 40 min after injection. In four HC, a retest scan with [{sup 11}C]NE40 PET was performed within 9 weeks to investigate test-retest characteristics. [{sup 11}C]NE40 was metabolized quickly leading to 50 % of intact tracer 20 min after injection and 20 % at 90 min. A two-tissue kinetic model fitted most of the time-activity curves best; both binding potential (BP{sub ND}) and distribution volume (V{sub T}) parameters could be used. Brain uptake was generally low with an average K{sub 1} value of 0.07 ml/min/ml tissue. V{sub T} and BP{sub ND} were in the range of 0.7 - 1.8 and 0.6 - 1.6, respectively. Test values in HC were about 30 % for V{sub T} and BP{sub ND}. AD patients showed overall significantly lower CB{sub 2}R binding. No relationship was found between regional or global amyloid load and CB{sub 2}R availability. Kinetic modelling of [{sup 11}C]NE40 is possible with a two-tissue reversible model. In contrast to preclinical and post-mortem data, [{sup 11}C]NE40 PET shows lower CB{sub 2}R availability in vivo in AD patients, with no relationship to Aβ plaques. A possible explanation for

  8. Probability of error in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2007-01-01

    Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the

  9. On the Bayes risk in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2008-01-01

    Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability

  10. Sensor and Actuator Fault-Hiding Reconfigurable Control Design for a Four-Tank System Benchmark

    DEFF Research Database (Denmark)

    Hameed, Ibrahim; El-Madbouly, Esam I; Abdo, Mohamed I

    2015-01-01

    Invariant (LTI) system where virtual sensors and virtual actuators are used to correct faulty performance through the use of a pre-fault performance. Simulation results showed that the developed approach can handle different types of faults and able to completely and instantly recover the original system......Fault detection and compensation plays a key role to fulfill high demands for performance and security in today's technological systems. In this paper, a fault-hiding (i.e., tolerant) control scheme that detects and compensates for actuator and sensor faults in a four-tank system benchmark...

  11. Intersectional Analysis in Critical Mathematics Education Research: A Response to Figure Hiding

    Science.gov (United States)

    Bullock, Erika C.

    2018-01-01

    In this chapter, I use figure hiding as a metaphor representing the processes of exclusion and suppression that critical mathematics education (CME) seeks to address. Figure hiding renders identities and modes of thought in mathematics education and mathematics education research invisible. CME has a commitment to addressing figure hiding by…

  12. Hiding and Searching Strategies of Adult Humans in a Virtual and a Real-Space Room

    Science.gov (United States)

    Talbot, Katherine J.; Legge, Eric L. G.; Bulitko, Vadim; Spetch, Marcia L.

    2009-01-01

    Adults searched for or cached three objects in nine hiding locations in a virtual room or a real-space room. In both rooms, the locations selected by participants differed systematically between searching and hiding. Specifically, participants moved farther from origin and dispersed their choices more when hiding objects than when searching for…

  13. Effects of dehydration methods on the characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  14. Effects of dehydration methods on characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  15. Human Infrastructure Detection and Exploitation (HIDE)

    Science.gov (United States)

    2009-11-01

    7  Figure 4. Picture of the fluxgate magnetometer and the coil-type magnetic sensor...may also be used to detect the usage of computer monitors. We used two different B-field sensors (figure 4), namely, (1) a fluxgate magnetometer ...collected at 256 samples per second. The three-axis fluxgate magnetometer used was an Applied Physics Systems Model 1540. It has the sensitivity

  16. Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    OpenAIRE

    de Fuentes, Jose Maria; Blasco, Jorge; González-Tablas, Ana Isabel; González-Manzano, Lorena

    2014-01-01

    Vehicular ad hoc networks (VANETs) are a new communication scenario in which vehicles take an active part. Real-time reporting of misbehaving vehicles by surrounding ones is enabled by in-vehicle sensors and VANETs. Thus, sensors allow detecting the misbehavior whereas VANETs allow sending the report to the authority. Nevertheless, these reports should pass unnoticed by the reported driver to avoid his/her potential reprisals. Information hiding techniques could be used to allow vehicles to t...

  17. Efficient reversible data hiding in encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2014-09-01

    Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.

  18. Are QSO2 hiding among EROs?

    OpenAIRE

    Brusa, Marcella

    2004-01-01

    We present the results of a deep (80 ks) XMM-Newton survey of one of the largest sample of near-infrared selected Extremely Red Objects (R-K>5) available to date (~300 objects, Daddi et al. 2000). The fraction of individually detected, X-ray emitting EROs is of the order of ~3.5%, down to F_x > 4x10^-15 cgs and Ks

  19. Soliciting Performance, Hiding Bias: Whiteness and Librarianship

    Directory of Open Access Journals (Sweden)

    Angela Galvan

    2015-06-01

    Full Text Available Image by Flickr user tweng (CC BY-SA 2.0 In Brief: Despite the growing body of research on our professional demographics and multi-year diversity initiatives, librarianship in the United States remains overwhelmingly white. I suggest the interview process is a series of repetitive gestures designed to mimic and reinforce white middle class values, which ultimately influence […

  20. Campylobacter multi-locus sequence typing subtypes detected on chicken livers available at retail.

    Science.gov (United States)

    Foodborne campylobacteriosis has been traced to undercooked chicken liver. It is not known what prevalence of Campylobacter to expect on fresh chicken livers available at retail. The objectives of this study were to measure prevalence of Campylobacter associated with chicken livers at retail and d...

  1. Significance of coast down time on safety and availability of a pool type fast breeder reactor

    International Nuclear Information System (INIS)

    Natesan, K.; Velusamy, K.; Selvaraj, P.; Chellapandi, P.

    2015-01-01

    Highlights: • Plant dynamics studies for quantifying the benefits of flow coast down time. • Establishment of minimum flow coast down time required for safety. • Assessment of influence of flow coast down on enhancing plant availability. • Synthesis of thermo mechanical benefits of flow coast down time on component design. - Abstract: Plant dynamic investigation towards establishing the influence of flow coast down time of primary and secondary sodium systems on safety and availability of plant has been carried out based on one dimensional analysis. From safety considerations, a minimum flow coast down time for primary sodium circuit is essential to be provided to limit the consequences of loss of flow event within allowable limits. Apart from safety benefits, large primary coast down time also improves plant availability by the elimination of reactor SCRAM during short term power failure events. Threshold values of SCRAM parameters also need optimization. By suitably selecting the threshold values for SCRAM parameters, significant reduction in the inertia of pumping systems can be derived to obtain desirable results on plant availability. With the optimization of threshold values and primary flow coast down behaviour equivalent to a halving time of 8 s, there is a possibility to eliminate reactor SCRAM during short term power failure events extending up to 0.75 s duration. Benefits of secondary flow halving on reducing transient thermal loading on components have also been investigated and mixed effects have been observed

  2. Hide unhairing and characterization of commercial enzymes used in leather manufacture

    Directory of Open Access Journals (Sweden)

    A Dettmer

    2011-09-01

    Full Text Available The enzymatic treatment of hides in tannery processes is a promising technology. However, the reaction kinetics of commercial enzymes available to the leather industry are not fully understood and their activities have been mainly determined with model proteins such as casein as substrate, which are not of direct relevance for cattle hides. Therefore, it is important to determine their activities on collagen and keratin, the main proteins of skin, in order to use these enzymes in leather processing. This work describes the study of five proteases, used commercially in tanneries, to assess their ability to act upon collagen and keratin and to determine their unhairing. Results showed that all commercial enzymes tested had more activity on collagen than on keratin. Unhairing was also tested and four out of the five enzymes tested showed some unhairing activity. Optima of the temperature and pH of the enzymes were very similar for all five enzymes, with maximal activities around 55ºC and pH 9 to 12, respectively.

  3. Folic acid content and antioxidant activity of different types of beers available in Hungarian retail.

    Science.gov (United States)

    Koren, Dániel; Orbán, Csaba; Galló, Nóra; Kun, Szilárd; Vecseri-Hegyes, Beáta; Kun-Farkas, Gabriella

    2017-04-01

    In this study 40 Hungarian retail beers were evaluated for folic acid content, antioxidant profile and physicochemical parameters. The physicochemical parameters, folic acid content and antioxidant activity of alcohol-free beers were the lowest. Folic acid content of beers aged with sour cherries showed high values, more than 0.4 mg/l and an alcohol-free beer-based mixed drink made with lemon juice contained more than 0.2 mg/l of folic acid. Dark beers and beers aged with sour cherries had the highest antioxidant activity probably owing to their high extract content, components released from the fruits and special malts. These results highlight the possibility of achieving adequate folic acid and relevant antioxidant intake without excessive alcohol and energy consumption by selecting appropriate beer types.

  4. Cryptic cuckoo eggs hide from competing cuckoos

    Science.gov (United States)

    Gloag, Ros; Keller, Laurie-Anne; Langmore, Naomi E.

    2014-01-01

    Interspecific arms races between cuckoos and their hosts have produced remarkable examples of mimicry, with parasite eggs evolving to match host egg appearance and so evade removal by hosts. Certain bronze-cuckoo species, however, lay eggs that are cryptic rather than mimetic. These eggs are coated in a low luminance pigment that camouflages them within the dark interiors of hosts' nests. We investigated whether cuckoo egg crypsis is likely to have arisen from the same coevolutionary processes known to favour egg mimicry. We added high and low luminance-painted eggs to the nests of large-billed gerygones (Gerygone magnirostris), a host of the little bronze-cuckoo (Chalcites minutillus). Gerygones rarely rejected either egg type, and did not reject natural cuckoo eggs. Cuckoos, by contrast, regularly removed an egg from clutches before laying their own and were five times more likely to remove a high luminance model than its low luminance counterpart. Given that we found one-third of all parasitized nests were exploited by multiple cuckoos, our results suggest that competition between cuckoos has been the key selective agent for egg crypsis. In such intraspecific arms races, crypsis may be favoured over mimicry because it can reduce the risk of egg removal to levels below chance. PMID:25122227

  5. Hiding in Plain Sight: Street artists online

    Directory of Open Access Journals (Sweden)

    Kim Barbour

    2013-10-01

    Full Text Available Identity and privacy concerns related to social media are the subject of widespread academic enquiry and mass media reporting. Although in most circumstances academic research tends to present identity play and online self­presentation as positive, media reporting in Australia makes much of the risks of identity theft, privacy breaches and online predators. This research explores the phenomenological experience of creating an online persona, focusing particularly on street artists. For street artists, the threat of unwanted exposure has to be balanced with the positive implications of sharing their creative work outside its geographical and temporal constraints. I argue that street artists use complex persona­creation strategies in order to both protect and promote themselves. The two street artists discussed in this article experience their engagement with social media and digital networks in ways that offer new insight into the opportunities and problems associated with the presentation of a persona online.

  6. Ordering the mob: Insights into replicon and MOB typing schemes from analysis of a curated dataset of publicly available plasmids.

    Science.gov (United States)

    Orlek, Alex; Phan, Hang; Sheppard, Anna E; Doumith, Michel; Ellington, Matthew; Peto, Tim; Crook, Derrick; Walker, A Sarah; Woodford, Neil; Anjum, Muna F; Stoesser, Nicole

    2017-05-01

    Plasmid typing can provide insights into the epidemiology and transmission of plasmid-mediated antibiotic resistance. The principal plasmid typing schemes are replicon typing and MOB typing, which utilize variation in replication loci and relaxase proteins respectively. Previous studies investigating the proportion of plasmids assigned a type by these schemes ('typeability') have yielded conflicting results; moreover, thousands of plasmid sequences have been added to NCBI in recent years, without consistent annotation to indicate which sequences represent complete plasmids. Here, a curated dataset of complete Enterobacteriaceae plasmids from NCBI was compiled, and used to assess the typeability and concordance of in silico replicon and MOB typing schemes. Concordance was assessed at hierarchical replicon type resolutions, from replicon family-level to plasmid multilocus sequence type (pMLST)-level, where available. We found that 85% and 65% of the curated plasmids could be replicon and MOB typed, respectively. Overall, plasmid size and the number of resistance genes were significant independent predictors of replicon and MOB typing success. We found some degree of non-concordance between replicon families and MOB types, which was only partly resolved when partitioning plasmids into finer-resolution groups (replicon and pMLST types). In some cases, non-concordance was attributed to ambiguous boundaries between MOBP and MOBQ types; in other cases, backbone mosaicism was considered a more plausible explanation. β-lactamase resistance genes tended not to show fidelity to a particular plasmid type, though some previously reported associations were supported. Overall, replicon and MOB typing schemes are likely to continue playing an important role in plasmid analysis, but their performance is constrained by the diverse and dynamic nature of plasmid genomes. Copyright © 2017 The Authors. Published by Elsevier Inc. All rights reserved.

  7. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2011-05-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  8. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2010-12-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  9. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Directory of Open Access Journals (Sweden)

    Vishakha Kelkar

    2017-01-01

    Full Text Available In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient’s information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image.

  10. Available online Efficiency potential of indirectly heated solar reforming with different types of solar air receivers

    International Nuclear Information System (INIS)

    Storch, Henrik von; Roeb, Martin; Stadler, Hannes; Sattler, Christian; Hoffschmidt, Bernhard

    2016-01-01

    Highlights: • A process for indirectly heated solar reforming of natural gas with air as heat transfer fluid is proposed. • Different solar receivers are modeled and implemented into the reforming process. • The overall efficiency of the process with different solar receivers is determined. • Optimum solar receiver characteristics for application in a solar reforming process are determined. - Abstract: In solar reforming, the heating value of natural gas is increased by utilization of concentrated solar radiation. Hence, it is a process for storing solar energy in a stable and transportable form that also permits further conversion into liquid fuels like methanol. This process has the potential to significantly decrease the natural gas consumption and the associated CO_2-emissions of methanol production with only few open questions to be addressed prior to commercialization. In the medium and long term, it has the potential to generate methanol as an environmentally friendly fuel for both transport as well as flexible electricity production in combined cycle gas turbines, when biogas is used as reactant. In a previous study the high potential of indirectly heated solar reforming with solar air receivers was shown; however, the efficiency is limited when using state of the art open volumetric receivers. Therefore, different types of air receivers are implemented into an indirectly heated solar reforming process and the overall efficiency potential is assessed in the present study. The implemented receivers are an open volumetric cavity receiver, a closed volumetric cavity receiver and a tubular cavity receiver. The open volumetric cavity receiver and tubular cavity receiver achieve the best results due to their capability of operating efficiently at temperatures well above 700 °C. For these receivers peak efficiencies up to 29% and 27% respectively are predicted. As the utilization of an open volumetric cavity receiver constitutes an open heat transfer

  11. Fluid availability of sports drinks differing in carbohydrate type and concentration

    International Nuclear Information System (INIS)

    Davis, J.M.; Burgess, W.A.; Slentz, C.A.; Bartoli, W.P.

    1990-01-01

    Plasma D2O-accumulation profiles (qualitative indices of fluid-absorption rates) were determined in eight subjects after ingestion of 275 mL of five D2O-labeled beverages: a water placebo (W), 6% maltodextrin (6% M), and three solutions containing a 6%, 8%, and 10% glucose-fructose mix (6% GF, 8% GF, and 10% GF). Except for W all beverages contained 20 mmol sodium/L and 3 mmol potassium/L. No differences in plasma D2O accumulation were found. Plasma glucose increased at 20 and 30 min after ingestion of the carbohydrate drinks and returned to baseline (6% GF and 6% M) or below (8% GF and 10% GF) by 60 min. Insulin responded similarly and, except for a slightly lower value at 30 min for 6% GF, no differences were detected. It appears that fluids in drinks containing less than or equal to 8-10% carbohydrate (simple sugars or maltodextrins) are made available for dilution in body fluids at similar rates and should be similar in replenishing body fluids lost in sweat during exercise

  12. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  13. A REVIEW ON HEAVY METALS CONTENTS IN HIDE, SKIN AND PROCESSED LEATHERS

    Directory of Open Access Journals (Sweden)

    KOIZHAIGANOVA Meruyert

    2016-05-01

    Full Text Available Heavy metals are metals with high atomic weight which can be deposited in soil, water, plants and animals. It is generally known that mammal tissues are good bioindicators of trace elements, including heavy metals. Heavy metal analysis serves to identify and quantify the elements that are a potential hazard to the consumer after varying levels of contact. Usage area of leather is increasingly expanding in these days and it has also become a material requested and demanded by effect of fashion. Leather must protect its appearance and physical stability and also be problem-free in ecological terms and harmless to human health. There is a lack of data concerning the content of toxic elements in raw hide and skin of animals. Mainly information concerning metals content, including toxic ones, in processed leathers may be found in the literature. The aim of the present study was to review and compare the content of some heavy metals in raw hide, skin and the processed leathers in order to evaluate their accumulation and transition to the end-up product.

  14. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm

    Directory of Open Access Journals (Sweden)

    Ching-Yu Yang

    2012-01-01

    Full Text Available This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.

  15. Relating environmental availability to bioavailability: soil-type-dependent metal accumulation in the oligochaete Eisenia andrei.

    Science.gov (United States)

    Peijnenburg, W J; Baerselman, R; de Groot, A C; Jager, T; Posthuma, L; Van Veen, R P

    1999-11-01

    Body residues are often better estimates of the amount of a chemical at the sites of toxic action in an organism than ambient soil concentrations, because bioavailability differences among soils are explicitly taken into account in considerations of body residues. Often, however, insufficient attention is paid to the rate and extent at which tissue concentrations respond to soil concentrations and soil characteristics. In this contribution the impact of soil characteristics on the environmental bioavailability of heavy metals for the oligochaete worm Eisenia andrei is reported. Uptake of As, Cd, Cr, Cu, Ni, Pb, and Zn in 20 Dutch field soils and in OECD artificial soil was quantified as a function of time. Internal metal concentrations varied less than the corresponding external levels. Metal uptake and elimination were both metal- and species-dependent. Worms typically attained steady-state concentrations rapidly for Cr, Cu, Ni, and Zn. Internal concentrations similar to those in the cultivation medium, linearly increasing body concentrations, or steady-state internal concentrations well above those in the cultivation medium were found for As, Cd, and Pb. Multivariate expressions were derived to describe uptake rate constants, steady-state concentrations, and bioaccumulation factors as a function of soil characteristics. Soil acidity is the most important solid-phase characteristic modulating the availability of As, Cd, and Pb. Although additional semimechanistic calculations yielded evidence of pore-water-related uptake of Cd and Pb modulated by competition between H(+) and metal ions at the active sites of the membranes, the findings for Cr, Cu, Ni, and Zn point to additional influences, among which is probably regulation. Copyright 1999 Academic Press.

  16. Hiding Techniques for Dynamic Encryption Text based on Corner Point

    Science.gov (United States)

    Abdullatif, Firas A.; Abdullatif, Alaa A.; al-Saffar, Amna

    2018-05-01

    Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

  17. A New Images Hiding Scheme Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    LIU Nian-sheng; GUO Dong-hui; WU Bo-xi; Parr G

    2005-01-01

    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of covert image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).

  18. Store Type and Demographic Influence on the Availability and Price of Healthful Foods, Leon County, Florida, 2008

    OpenAIRE

    Leone, Angela F.; Lee, Jung Sun; Rigby, Samantha; Kurtz, Hilda; Johnson, Mary Ann; Betterley, Connie; Park, Sohyun

    2011-01-01

    Introduction The availability of healthful foods varies by neighborhood. We examined the availability and price of more healthful foods by store type, neighborhood income level, and racial composition in a community with high rates of diet-related illness and death. Methods We used the modified Nutrition Environment Measures Survey in Stores to conduct this cross-sectional study in 2008. We surveyed 73 stores (29% supermarkets, 11% grocery stores, and 60% convenience stores) in Leon County, F...

  19. A network resource availability model for IEEE802.11a/b-based WLAN carrying different service types

    Directory of Open Access Journals (Sweden)

    Luo Weizhi

    2011-01-01

    Full Text Available Abstract Operators of integrated wireless systems need to have knowledge of the resource availability in their different access networks to perform efficient admission control and maintain good quality of experience to users. Network availability depends on the access technology and the service types. Resource availability in a WLAN is complex to gather when UDP and TCP services co-exist. Previous study on IEEE802.11a/b derived the achievable throughput under the assumption of inelastic and uniformly distributed traffic. Further study investigated TCP connections and derived a model to calculate the effective transmission rate of packets under the assumption of saturated traffic flows. The assumptions are too stringent; therefore, we developed a model for evaluating WLAN resource availability that tries to narrow the gap to more realistic scenarios. It provides an indication of WLAN resource availability for admitting UDP/TCP requests. This article presents the assumptions, the mathematical formulations, and the effectiveness of our model.

  20. Effects of gasification biochar on plant-available water capacity and plant growth in two contrasting soil types

    DEFF Research Database (Denmark)

    Hansen, Veronika; Hauggaard-Nielsen, Henrik; Petersen, Carsten Tilbæk

    2016-01-01

    Abstract Gasification biochar (GB) contains recalcitrant carbon that can contribute to soil carbon sequestration and soil quality improvement. However, the impact of GB on plant-available water capacity (AWC) and plant growth in diverse soil types still needs to be explored. A pot experiment......, the reduced water regime significantly affected plant growth and water consumption, whereas the effect was less pronounced in the coarse sand. Irrespective of the soil type, both GBs increased AWC by 17–42%, with the highest absolute effect in the coarse sand. The addition of SGB to coarse sand led...

  1. Reversible data hiding for image based on histogram modification of wavelet coefficients

    NARCIS (Netherlands)

    Liang, Xiaoping; Wu, Xiaoyun; Huang, Jiwu; Hao, Y.; Liu, J.; Wang, Y.; Cheung, Y.; Yin, H.; Jiao, L.; Ma, J.; Jiao, Y.C.

    2005-01-01

    Reversible data hiding has drawn intensive attention recently. Reversibility means to embed data into digital media and restore the original media from marked media losslessly. Reversible data hiding technique is desired in sensitive applications that require no permanent loss of signal fidelity. In

  2. Discovery and characterization of ACT-335827, an orally available, brain penetrant orexin receptor type 1 selective antagonist.

    Science.gov (United States)

    Steiner, Michel A; Gatfield, John; Brisbare-Roch, Catherine; Dietrich, Hendrik; Treiber, Alexander; Jenck, Francois; Boss, Christoph

    2013-06-01

    Stress relief: Orexin neuropeptides regulate arousal and stress processing through orexin receptor type 1 (OXR-1) and 2 (OXR-2) signaling. A selective OXR-1 antagonist, represented by a phenylglycine-amide substituted tetrahydropapaverine derivative (ACT-335827), is described that is orally available, penetrates the brain, and decreases fear, compulsive behaviors and autonomic stress reactions in rats. Copyright © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  3. Effect of soil type and moisture availability on the foraging behavior of the Formosan subterranean termite (Isoptera: Rhinotermitidae).

    Science.gov (United States)

    Cornelius, Mary L; Osbrink, Weste L A

    2010-06-01

    This study examined the influence of soil type and moisture availability on termite foraging behavior. Physical properties of the soil affected both tunneling behavior and shelter tube construction. Termites tunneled through sand faster than top soil and clay. In containers with top soil and clay, termites built shelter tubes on the sides of the containers. In containers with sand, termites built shelter tubes directly into the air and covered the sides of the container with a layer of sand. The interaction of soil type and moisture availability affected termite movement, feeding, and survival. In assays with moist soils, termites were more likely to aggregate in top soil over potting soil and peat moss. However, termites were more likely to move into containers with dry peat moss and potting soil than containers with dry sand and clay. Termites were also significantly more likely to move into containers with dry potting soil than dry top soil. In the assay with dry soils, termite mortality was high even though termites were able to travel freely between moist sand and dry soil, possibly due to desiccation caused by contact with dry soil. Evaporation from potting soil and peat moss resulted in significant mortality, whereas termites were able to retain enough moisture in top soil, sand, and clay to survive for 25 d. The interaction of soil type and moisture availability influences the distribution of foraging termites in microhabitats.

  4. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  5. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  6. Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload

    Directory of Open Access Journals (Sweden)

    Zhaoxia Yin

    2014-01-01

    Full Text Available This paper proposes a separable reversible data-hiding scheme in encrypted image which offers high payload and error-free data extraction. The cover image is partitioned into nonoverlapping blocks and multigranularity encryption is applied to obtain the encrypted image. The data hider preprocesses the encrypted image and randomly selects two basic pixels in each block to estimate the block smoothness and indicate peak points. Additional data are embedded into blocks in the sorted order of block smoothness by using local histogram shifting under the guidance of the peak points. At the receiver side, image decryption and data extraction are separable and can be free to choose. Compared to previous approaches, the proposed method is simpler in calculation while offering better performance: larger payload, better embedding quality, and error-free data extraction, as well as image recovery.

  7. An Algorithm for Data Hiding in Radiographic Images and ePHI/R Application

    Directory of Open Access Journals (Sweden)

    Aqsa Rashid

    2018-01-01

    Full Text Available Telemedicine is the use of Information and Communication Technology (ICT for clinical health care from a distance. The exchange of radiographic images and electronic patient health information/records (ePHI/R for diagnostic purposes has the risk of confidentiality, ownership identity, and authenticity. In this paper, a data hiding technique for ePHI/R is proposed. The color information in the cover image is used for key generation, and stego-images are produced with ideal case. As a result, the whole stego-system is perfectly secure. This method includes the features of watermarking and steganography techniques. The method is applied to radiographic images. For the radiographic images, this method resembles watermarking, which is an ePHI/R data system. Experiments show promising results for the application of this method to radiographic images in ePHI/R for both transmission and storage purpose.

  8. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    Directory of Open Access Journals (Sweden)

    A.A. Mohamed

    2014-07-01

    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.

  9. Alien invasions and the game of hide and seek in Patagonia.

    Directory of Open Access Journals (Sweden)

    Martin Lindegren

    Full Text Available The introduction, establishment and spread of alien species is a major threat to biodiversity and the provision of ecosystem services for human wellbeing. In order to reduce further loss of biodiversity and maintain productive and sustainable ecosystems, understanding the ecological mechanisms underlying species invasions and avoiding potentially harmful effects on native communities is urgently needed, but largely lacking. We here demonstrate, by means of hydroacoustics and advanced spatial modelling, how native fish species as a result of previous exposure to native predators may successfully respond to invasive novel predators through a complicated game of hide and seek, minimizing spatio-temporal overlap with predators, and potentially facilitating coexistence between native prey species (Galaxiids and introduced novel predators (Salmonids in a deep Andean lake, Patagonia.

  10. 9 CFR 310.10 - Carcasses with skin or hide on; cleaning before evisceration; removal of larvae of Hypodermae...

    Science.gov (United States)

    2010-01-01

    ..., DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION... pathological skin conditions. When a carcass is to be dressed with the skin or hide left on, the skin or hide...

  11. Availability of more healthful food alternatives in traditional, convenience, and nontraditional types of food stores in two rural Texas counties.

    Science.gov (United States)

    Bustillos, Brenda; Sharkey, Joseph R; Anding, Jenna; McIntosh, Alex

    2009-05-01

    Limited research has focused on the availability of more healthful food alternatives in traditional food stores (supermarkets and grocery stores) in rural areas. Current market trends suggest that food items may be available for purchase in stores other than traditional food stores. An observational survey was developed and used on-site to document the availability and variety of fruit and vegetables (fresh, canned, and frozen), meats (meat, poultry, fish, and eggs), dairy (milk, yogurt, and cheese), and grains (whole grains and refined grains) in all traditional food stores, convenience stores, and nontraditional food stores (dollar stores and mass merchandisers) in two rural Texas counties. Descriptive statistics and t tests identified that although the widest selection of more healthful food items was available in supermarkets, not all supermarkets carried all items. Grocery stores carried less variety of fresh fruits (8+/-0.7 vs 4.7+/-0.3; Pconvenience or nontraditional food stores. Among convenience and nontraditional food stores, "dollar" stores offered the best variety of more healthful canned fruits and vegetables, whole-wheat bread, and whole-grain cereal. Mass merchandisers and dollar stores offered a greater variety of more healthful types of canned tuna and poultry, reduced-fat and skim milk, and low-fat tortillas. In these rural counties, traditional food stores offered greater availability of more healthful food choices across food groups. More healthful food choices in canned fruits and vegetables, canned meat and fish, milk, and grains were also available in dollar stores, mass merchandisers, and convenience stores. Results suggest that a complete understanding of the food environment, especially in rural areas, requires knowledge of the availability and variety of healthful food in all types of stores that are accessible to families.

  12. No place to hide: when shame causes proselfs to cooperate.

    Science.gov (United States)

    Declerck, Carolyn Henriette; Boone, Christophe; Kiyonari, Toko

    2014-01-01

    Shame is considered a social emotion with action tendencies that elicit socially beneficial behavior. Yet, unlike other social emotions, prior experimental studies do not indicate that incidental shame boosts prosocial behavior. Based on the affect as information theory, we hypothesize that incidental feelings of shame can increase cooperation, but only for self-interested individuals, and only in a context where shame is relevant with regards to its action tendency. To test this hypothesis, cooperation levels are compared between a simultaneous prisoner's dilemma (where "defect" may result from multiple motives) and a sequential prisoner's dilemma (where "second player defect" is the result of intentional greediness). As hypothesized, shame positively affected proselfs in a sequential prisoner's dilemma. Hence ashamed proselfs become inclined to cooperate when they believe they have no way to hide their greediness, and not necessarily because they want to make up for earlier wrong-doing.

  13. Universal Steganalysis of Data Hiding in Grayscale Images

    Institute of Scientific and Technical Information of China (English)

    HUANG Ji-feng; LIN Jia-jun

    2007-01-01

    This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy.

  14. Unconventional thermal cloak hiding an object outside the cloak

    Science.gov (United States)

    Gao, Y.; Huang, J. P.

    2013-11-01

    All the thermal cloaks reported in the literature can be used to thermally hide an object inside the cloak. However, a common limitation of this kind of thermal cloaks is that the cloaked object cannot feel the external heat flow since it is located inside the cloak; thus we call these cloaks “conventional thermal cloaks”. Here we manage to overcome this limitation by exploiting a class of unconventional thermal cloaks that enable the cloaked object to feel the external heat flow. Our finite-element simulations in two dimensions show the desired cloaking effect. The underlying mechanism originates from the complementary effect of thermal metamaterials with negative thermal conductivities. This work suggests a different method to design thermal devices where heat conduction can be controlled at will.

  15. Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function

    Directory of Open Access Journals (Sweden)

    Najme Maleki

    2014-07-01

    Full Text Available This paper presents two adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Our adaptive scheme is based on the concept of human vision sensitivity, so the pixels in edge areas than to smooth areas can tolerate much more changes without making visible distortion for human eyes. In our adaptive scheme, the average differencing value of four neighborhood pixels into a block via a threshold secret key determines whether current block is located in edge or smooth area. Pixels in the edge areas are embedded by Q-bit of secret data with a larger value of Q than that of pixels placed in smooth areas. Also in this scholar, we represent one non-adaptive data hiding algorithm. Our non-adaptive scheme, via an error reduction procedure, produces a high visual quality for stego-image. The proposed schemes present several advantages. 1-of aspects the embedding capacity and visual quality of stego-image are scalable. In other words, the embedding rate as well as the image quality can be scaled for practical applications 2-the high embedding capacity with minimal visual distortion can be achieved, 3-our methods require little memory space for secret data embedding and extracting phases, 4-secret keys have used to protect of the embedded secret data. Thus, level of security is high, 5-the problem of overflow or underflow does not occur. Experimental results indicated that the proposed adaptive scheme significantly is superior to the currently existing scheme, in terms of stego-image visual quality, embedding capacity and level of security and also our non-adaptive method is better than other non-adaptive methods, in view of stego-image quality. Results show which our adaptive algorithm can resist against the RS steganalysis attack.

  16. Efficient hiding of confidential high-utility itemsets with minimal side effects

    Science.gov (United States)

    Lin, Jerry Chun-Wei; Hong, Tzung-Pei; Fournier-Viger, Philippe; Liu, Qiankun; Wong, Jia-Wei; Zhan, Justin

    2017-11-01

    Privacy preserving data mining (PPDM) is an emerging research problem that has become critical in the last decades. PPDM consists of hiding sensitive information to ensure that it cannot be discovered by data mining algorithms. Several PPDM algorithms have been developed. Most of them are designed for hiding sensitive frequent itemsets or association rules. Hiding sensitive information in a database can have several side effects such as hiding other non-sensitive information and introducing redundant information. Finding the set of itemsets or transactions to be sanitised that minimises side effects is an NP-hard problem. In this paper, a genetic algorithm (GA) using transaction deletion is designed to hide sensitive high-utility itemsets for PPUM. A flexible fitness function with three adjustable weights is used to evaluate the goodness of each chromosome for hiding sensitive high-utility itemsets. To speed up the evolution process, the pre-large concept is adopted in the designed algorithm. It reduces the number of database scans required for verifying the goodness of an evaluated chromosome. Substantial experiments are conducted to compare the performance of the designed GA approach (with/without the pre-large concept), with a GA-based approach relying on transaction insertion and a non-evolutionary algorithm, in terms of execution time, side effects, database integrity and utility integrity. Results demonstrate that the proposed algorithm hides sensitive high-utility itemsets with fewer side effects than previous studies, while preserving high database and utility integrity.

  17. Prevalence and relatedness of Escherichia coli O157:H7 strains in the feces and on the hides and carcasses of U.S. meat goats at slaughter.

    Science.gov (United States)

    Jacob, M E; Foster, D M; Rogers, A T; Balcomb, C C; Sanderson, M W

    2013-07-01

    We determined the prevalences of Escherichia coli O157:H7 in feces, hide, and carcasses of meat goats at a U.S. processing plant. Prevalences were 11.1%, 2.7%, and 2.7%, respectively. Sixteen pulsed-field gel electrophoresis (PFGE) subtypes were identified among 49 E. coli O157:H7 isolates, some of which were present on multiple sample types or collection days.

  18. Livestock and Hides and Skins Marketing in Kenya: Problems and investment needs

    OpenAIRE

    Jabbar, Mohammad A.

    2002-01-01

    The paper briefly summarises the historical perspective on the development of livestock marketing in Kenya, current problems of livestock and hides and skins marketing, and recommends investment opportunities to improve the situation.

  19. Hiding effort to gain a competitive advantage: Evidence from China.

    Science.gov (United States)

    Zhao, Li; Heyman, Gail D

    2018-06-01

    Previous studies with Western populations have shown that adolescents' tendency to downplay their academic effort is affected by two kinds of motives: ability-related motives (e.g., to appear competent) and social approval motives (e.g., to be popular). In this research, we test for the presence of additional competition-related motives in China, a culture placing strong emphasis on academic competition. Study 1 (N = 150) showed that, in response to a scenario in which a hard-working high-school junior hid effort from classmates, the most highly endorsed explanation was "to influence others to work less hard to maintain a competitive advantage." Study 2 (N = 174) revealed that competition-related explanations were endorsed relatively more often when the speaker and audience had similar academic rankings. This tendency was most evident when both speaker and audience were top performers, and when this was the case, participants' desire to demonstrate superiority over others was a positive predictor of endorsement of competition-related motives. Study 3 (N = 137) verified that competition-related motives were more strongly endorsed among Chinese participants than U.S. These results suggest that at least in cultures that emphasize academic competition and in contexts where competition is salient, hiding effort is often about attempting to gain strategic advantage. © 2016 International Union of Psychological Science.

  20. Implications of publicly available genomic data resources in searching for therapeutic targets of obesity and type 2 diabetes.

    Science.gov (United States)

    Jung, Sungwon

    2018-04-20

    Obesity and type 2 diabetes (T2D) are two major conditions that are related to metabolic disorders and affect a large population. Although there have been significant efforts to identify their therapeutic targets, few benefits have come from comprehensive molecular profiling. This limited availability of comprehensive molecular profiling of obesity and T2D may be due to multiple challenges, as these conditions involve multiple organs and collecting tissue samples from subjects is more difficult in obesity and T2D than in other diseases, where surgical treatments are popular choices. While there is no repository of comprehensive molecular profiling data for obesity and T2D, multiple existing data resources can be utilized to cover various aspects of these conditions. This review presents studies with available genomic data resources for obesity and T2D and discusses genome-wide association studies (GWAS), a knockout (KO)-based phenotyping study, and gene expression profiles. These studies, based on their assessed coverage and characteristics, can provide insights into how such data can be utilized to identify therapeutic targets for obesity and T2D.

  1. Strategie del patetico e interludi circensi in Hide and Seek di Wilkie Collins

    OpenAIRE

    De Giovanni, Flora

    2013-01-01

    Starting from Victor Turner’s definitions of cultural performance and liminoid phenomena, the essay aims to analyse Wilkie Collins’s third novel, Hide and Seek (1854), which seems to be a sort of survey of the pastimes Victorian England allowed itself in the age of the increasing commodification of leisure. Though not a proper sensation novel (the genre for which Collins became famous in the 1860s), Hide and Seek draws on the conventions of melodrama, which, as Peter Brook conv...

  2. An information hiding method based on LSB and tent chaotic map

    Science.gov (United States)

    Song, Jianhua; Ding, Qun

    2011-06-01

    In order to protect information security more effectively, a novel information hiding method based on LSB and Tent chaotic map was proposed, first the secret message is Tent chaotic encrypted, and then LSB steganography is executed for the encrypted message in the cover-image. Compared to the traditional image information hiding method, the simulation results indicate that the method greatly improved in imperceptibility and security, and acquired good results.

  3. Effects of gamma rays on the physical and mechanical properties of hide

    International Nuclear Information System (INIS)

    Sutrisno Puspodikoro.

    1976-01-01

    The effect of gamma rays on the physical and mechanical properties of hide has been studied, using Gammacell 220 as an irradiator. The determination of the physical and mechanical properties of the irradiated hide was carried out by Balai Penelitian Kulit (Leather Research Institute) at Yogyakarta. Experiments show that up to a certain dose of irradiation, favourable effects can be obtained, while higher doses impair the physical and mechanical properties of the leather raw materials. (author)

  4. An evaluation of selected methods for the decontamination of cattle hides prior to skinning.

    Science.gov (United States)

    Small, A; Wells-Burr, B; Buncic, S

    2005-02-01

    The effectiveness of different decontamination treatments in reducing microbial loads on cattle hides was assessed. The 10-s hide treatments were conducted using a wet-and-dry vacuum cleaner filled with one of the liquids (heated to 50 °C) indicated below, followed or not by 10-min drying in the air. Also, the hide was clipped, followed or not by 10-s singeing using a hand-held blowtorch. Before and after each decontamination treatment, the hide was sampled (100 cm(2) areas) by a sponge-swabbing method to compare the total viable counts of bacteria (TVC). The largest bacterial reduction (Psanitizer solution (10% Betane Plus) resulted in significant reductions of 1.80 (Peffects. Since hide contamination is associated with microbial contamination of the carcasses, the results indicate that post-killing/pre-skinning hide decontamination (used alone, or in combination with carcass decontamination) has a potential to improve microbial meat safety. Nevertheless, further research is required to optimise the efficacy of these treatments in the reduction of specific pathogens under commercial conditions.

  5. CHARACTERISTICS OF LIPID METABOLISM IN PATIENTS WITH TYPE 1 DIABETES, DEPENDING ON THE AVAILABILITY OF DIABETIC MICROANGIOPATHY AND DIET

    Directory of Open Access Journals (Sweden)

    Yu. G. Samoilova

    2014-01-01

    Full Text Available Was investigated 67 children (36 boys and 31 girls in age from 6 to 18 years old, with type 1 diabetes patients who were treated at the Children's Hospital Endocrinology number 1 inTomsk, average age of the boys at the time of the survey amounted to (13.0 ± 0.4 years, girls – (13.5 ± 0.4 years. All children diagnosed with type 1 diabetes were under subcompensation. Clinical evaluation of patients included a medical history, physical examination, evaluation of physical development. A study of lipid profile (high-density lipoprotein (HDL cholesterol, low-density lipoprotein (LDL, cholesterol (TC, triglycerides (TG, atherogenic index. Screening for diabetic retinopathy was performed by examining the fundus by direct ophthalmoscopy after pupil dilation. Diagnosis of diabetic nephropathy, retinopathy performed according to the classification. Patients were divided into groups depending on the presence of complications, and the level of compensation lipid metabolism (children with satisfactory compensation of lipid metabolism (total cholesterol level less than 5.2 mmol / l, children with poor compensation lipid metabolism (total cholesterol above 5.2 mmol / l. Nature of the subjects studied nutrition using  a questionnaire drawn up on the basis of the standard dietary questionnaire program CINDI, allowing to evaluate the eating habits by examining the frequency of intake of various foods, food preferences and priorities. Products, according to the lipid-lowering diet on the recommendations of the European Society for atherosclerosis were combined and divided into groups according to frequency of use: commonly used products, and rarely use the products. Mathematical treatment of the results was performed using the software package Statistica 5.5 for Windows. In the first phase expected to total group performance statistics – the arithmetic mean value M and the error of the mean m, as well as visualization of the distribution of values

  6. 24 CFR 906.5 - Dwelling units and types of assistance that a PHA may make available under a homeownership...

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Dwelling units and types of... HOUSING HOMEOWNERSHIP PROGRAMS Basic Program Requirements § 906.5 Dwelling units and types of assistance... for financing to eligible families (see § 905.15 of this title) purchasing dwelling units eligible...

  7. Hiding in plain sight: communication theory in implementation science.

    Science.gov (United States)

    Manojlovich, Milisa; Squires, Janet E; Davies, Barbara; Graham, Ian D

    2015-04-23

    ignoring a key contributor to implementation intervention success. When conceptualized as a transformational process, the focus of communication moves to shared understanding and is grounded in human interactions and the way we go about constructing knowledge. Instead of hiding in plain sight, we suggest explicitly acknowledging the role that communication plays in our implementation efforts. By using both paradigms, we can investigate when communication facilitates implementation, when it does not, and how to improve it so that our implementation and clinical interventions are embraced by clinicians and patients alike.

  8. The Costs of Hiding and Faking Emotions: The Case of Extraverts and Introverts.

    Science.gov (United States)

    Seger-Guttmann, Tali; Medler-Liraz, Hana

    2016-01-01

    The present study examined the moderation effects of extraversion on the relationships between hiding and faking emotions, perceived satisfaction from intimate relationships, and reported physical health concerns. Four hundred and four Israeli participants, who were all involved in intimate relationships at the time of the study, responded to the Extraversion scale from the Big-Five Inventory, the DEELS to measure hiding and faking emotions, the SELF to assess physical health concerns, and the short version of the ENRICH to evaluate perceived satisfaction with intimate relationships. The mean age was 32.3 years (SD = 8.2); and the average length of time as a couple was 7.8 years (SD = 8.2). Of the participants, 198 were married (48.5%). The findings indicate that the effect of hiding negative emotions was stronger for perceived satisfaction with intimate relationships and physical health concerns than that for faking positive emotions. Extraverts who showed a higher frequency of hiding their negative emotions were significantly less satisfied with their relationships than introverts and they also tended to report more concerns with their physical health. These results were not found when extraverts reported a high frequency of faking positive emotions. These results are discussed in the context of the trait-behavior-concordance model and stress the importance of distinguishing faking from hiding.

  9. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization

    Science.gov (United States)

    Bajaj, Ruchika; Bedi, Punam; Pal, S. K.

    Steganography is an art of hiding information in such a way that prevents the detection of hidden messages. Besides security of data, the quantity of data that can be hidden in a single cover medium, is also very important. We present a secure data hiding scheme with high embedding capacity for messages of variable length based on Particle Swarm Optimization. This technique gives the best pixel positions in the cover image, which can be used to hide the secret data. In the proposed scheme, k bits of the secret message are substituted into k least significant bits of the image pixel, where k varies from 1 to 4 depending on the message length. The proposed scheme is tested and results compared with simple LSB substitution, uniform 4-bit LSB hiding (with PSO) for the test images Nature, Baboon, Lena and Kitty. The experimental study confirms that the proposed method achieves high data hiding capacity and maintains imperceptibility and minimizes the distortion between the cover image and the obtained stego image.

  10. What is hiding behind ontogenic d13C variations in mollusk shells: New insights from scallops.

    Science.gov (United States)

    Chauvaud, L.; Lorrain, A.; Gillikin, D. P.; Thebault, J.; Paulet, Y.; Strand, O.; Blamart, D.; Guarini, J.; Clavier, J.

    2008-12-01

    We examined d13Ccalcite variations along scallop shells (Pecten maximus) sampled in Norway, France and Spain. Time series of shell calcite d13C show a consistent pattern of decreasing d13C with age. This almost linear d13C trend reflects an increasing contribution of metabolic CO2 to skeletal carbonate throughout ontogeny. We have removed this ontogenic trend to try to extract other information from our shell calcite d13C dataset. Scallops from the Bay of Brest (western Brittany, France) were then used to interpret the data as many environmental parameters were available for this site. d13Ccalcite variations were compared to d13C of dissolved inorganic carbon (DIC) and Chl a. The detrended calcite d13C profiles seem to follow a seasonal pattern, but surprisingly are inversely related to the d13C DIC and chlorophyll a concentrations measured within the water column. Theses results suggest that shell d13C variations are not controlled by isotopic variation of DIC. Since scallops eat phytoplankton and microphytobenthos cells, and, as a consequence respire organic mater largely depleted in 13C, we therefore suggest that in mollusk suspension feeders the shell d13Ccalcite might still be used to track the annual number of phytoplankton blooms when d13C values of calcite are detrended. We must consider this trend as a potential biological filter hiding precious environmental records.

  11. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

    Directory of Open Access Journals (Sweden)

    Tzu-Chuen Lu

    2017-10-01

    Full Text Available The concept of a dual-image based scheme in information sharing consists of concealing secret messages in two cover images; only someone who has both stego-images can extract the secret messages. In 2015, Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit to reduce the distortion of the stego-image. Then, in 2016, Lu et al. used a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. Because the folding strategy can obviously reduce the value, the proposed scheme includes the folding operation twice to further decrease the reduced digit. We use a frequency-based encoding strategy to encode a secret message and then use the block folding technique by performing the center-folding operation twice to embed secret messages. An indicator is needed to identify the sequence number of the folding operation. The proposed scheme collects several indicators to produce a combined code and hides the code in a pixel to reduce the size of the indicators. The experimental results show that the proposed method can achieve higher image quality under the same embedding rate or higher payload, which is better than other methods.

  12. Chlamydia pneumoniae hides inside apoptotic neutrophils to silently infect and propagate in macrophages.

    Directory of Open Access Journals (Sweden)

    Jan Rupp

    Full Text Available BACKGROUND: Intracellular pathogens have developed elaborate strategies for silent infection of preferred host cells. Chlamydia pneumoniae is a common pathogen in acute infections of the respiratory tract (e.g. pneumonia and associated with chronic lung sequelae in adults and children. Within the lung, alveolar macrophages and polymorph nuclear neutrophils (PMN are the first line of defense against bacteria, but also preferred host phagocytes of chlamydiae. METHODOLOGY/PRINCIPAL FINDINGS: We could show that C. pneumoniae easily infect and hide inside neutrophil granulocytes until these cells become apoptotic and are subsequently taken up by macrophages. C. pneumoniae infection of macrophages via apoptotic PMN results in enhanced replicative activity of chlamydiae when compared to direct infection of macrophages, which results in persistence of the pathogen. Inhibition of the apoptotic recognition of C. pneumoniae infected PMN using PS- masking Annexin A5 significantly lowered the transmission of chlamydial infection to macrophages. Transfer of apoptotic C. pneumoniae infected PMN to macrophages resulted in an increased TGF-ss production, whereas direct infection of macrophages with chlamydiae was characterized by an enhanced TNF-alpha response. CONCLUSIONS/SIGNIFICANCE: Taken together, our data suggest that C. pneumoniae uses neutrophil granulocytes to be silently taken up by long-lived macrophages, which allows for efficient propagation and immune protection within the human host.

  13. Multiple-image hiding using super resolution reconstruction in high-frequency domains

    Science.gov (United States)

    Li, Xiao-Wei; Zhao, Wu-Xiang; Wang, Jun; Wang, Qiong-Hua

    2017-12-01

    In this paper, a robust multiple-image hiding method using the computer-generated integral imaging and the modified super-resolution reconstruction algorithm is proposed. In our work, the host image is first transformed into frequency domains by cellular automata (CA), to assure the quality of the stego-image, the secret images are embedded into the CA high-frequency domains. The proposed method has the following advantages: (1) robustness to geometric attacks because of the memory-distributed property of elemental images, (2) increasing quality of the reconstructed secret images as the scheme utilizes the modified super-resolution reconstruction algorithm. The simulation results show that the proposed multiple-image hiding method outperforms other similar hiding methods and is robust to some geometric attacks, e.g., Gaussian noise and JPEG compression attacks.

  14. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    OpenAIRE

    Kuang Tsan Lin; Sheng Lih Yeh

    2014-01-01

    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  15. Type-specific identification of anogenital herpes simplex virus infections by use of a commercially available nucleic acid amplification test.

    Science.gov (United States)

    Van Der Pol, Barbara; Warren, Terri; Taylor, Stephanie N; Martens, Mark; Jerome, Keith R; Mena, Leandro; Lebed, Joel; Ginde, Savita; Fine, Paul; Hook, Edward W

    2012-11-01

    Herpes infections are among the most common sexually transmitted infections (STI), but diagnostic methods for genital herpes have not kept pace with the movement toward molecular testing. Here, we describe an FDA-approved molecular assay that identifies and types herpes simplex virus (HSV) infections for use in routine clinical settings. Paired samples from anogenital lesions were tested using the BD ProbeTec HSV Q(x) (HSVQ(x)) system, HSV culture and, a laboratory-developed PCR assay. Family planning, obstetrics/gynecology (OB/GYN), or sexually transmitted disease (STD) clinics in the United States served as recruitment sites. Sensitivity and specificity estimates, head-to-head comparisons, measures of agreement, and latent-class analyses were performed to provide robust estimates of performance. A total of 508 participants (174 men and 334 women) with anogenital lesions were included; 260 HSV-2 and 73 HSV-1 infections were identified. No differences in test performance based on gender, clinic type, location of the lesion, or type of lesion were observed. The sensitivity of HSV-2 detection ranged from 98.4 to 100% depending on the analytical approach, while the specificity ranged from 80.6%, compared to the less sensitive culture method, to 97.0%, compared to PCR. For HSV-1, the sensitivity and specificity ranges were 96.7 to 100% and 95.1 to 99.4%, respectively. This assay may improve our ability to accurately diagnose anogenital lesions due to herpes infection.

  16. Emissions Associated with Electric Vehicle Charging: Impact of Electricity Generation Mix, Charging Infrastructure Availability, and Vehicle Type

    Energy Technology Data Exchange (ETDEWEB)

    McLaren, Joyce [National Renewable Energy Lab. (NREL), Golden, CO (United States); Miller, John [National Renewable Energy Lab. (NREL), Golden, CO (United States); O' Shaughnessy, Eric [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wood, Eric [National Renewable Energy Lab. (NREL), Golden, CO (United States); Shapiro, Evan [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2016-04-11

    With the aim of reducing greenhouse gas emissions associated with the transportation sector, policy-makers are supporting a multitude of measures to increase electric vehicle adoption. The actual level of emission reduction associated with the electrification of the transport sector is dependent on the contexts that determine when and where drivers charge electric vehicles. This analysis contributes to our understanding of the degree to which a particular electricity grid profile, vehicle type, and charging patterns impact CO2 emissions from light-duty, plug-in electric vehicles. We present an analysis of emissions resulting from both battery electric and plug-in hybrid electric vehicles for four charging scenarios and five electricity grid profiles. A scenario that allows drivers to charge electric vehicles at the workplace yields the lowest level of emissions for the majority of electricity grid profiles. However, vehicle emissions are shown to be highly dependent on the percentage of fossil fuels in the grid mix, with different vehicle types and charging scenarios resulting in fewer emissions when the carbon intensity of the grid is above a defined level. Restricting charging to off-peak hours results in higher total emissions for all vehicle types, as compared to other charging scenarios.

  17. Variation in the Level of Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The occurrence of hide damage light flecks and spots was determined on tanned hides from 28 herds during a period of 8 to 12 months. Light flecks and spots are described as small areas of grain loss up to 3 mm in diameter that are seen on dyed crust cattle leather. Damage was found on 75.8% of all hides. The neck and shoulders were the anatomical region with the highest prevalence of damage. Sixty-eight per cent of all hides had light flecks and spots in this region. The forelimbs and dewlap were the anatomical region with the second highest occurrence with a prevalence of 39.1%. This distribution corresponded to the known distribution of lice in cattle. No significant differences were observed in age, sex, prevalence of lice in the herd assessed in March or infestations with different lice species. The frequency of light flecks and spots varied significantly during the year. The frequency was highest in the late winter and early spring, decreased significantly during the summer and was lowest in the autumn. This variation supported the importance of lice in the development of light flecks and spots and suggested a relatively long healing period for the damages induced by lice. PMID:11455905

  18. The impact of a gender and business training on income hiding

    NARCIS (Netherlands)

    Bulte, Erwin H.; Lensink, Robert; Winkel, Anne B.

    2018-01-01

    We use a randomized controlled trial and behavioral game to study the extent and determinants of income hiding in rural Vietnam. We focus on a training program that aims to promote gender equality and entrepreneurship among women in poverty who are engaged in running a small business. In one

  19. Effect of hiding places, straw and territory on agression in group-housed rabbit does

    NARCIS (Netherlands)

    Rommers, J.M.; Reuvekamp, B.F.J.; Gunnink, H.; Jong, de I.C.

    2014-01-01

    Group-housing of rabbit does may be preferred from welfare point of view. However, group-housing causes agonistic behaviour which may cause severe injuries. Severe injuries may be prevented by offering hiding places for attacked does. Providing enrichment (straw) may reduce agonistic behaviour by

  20. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  1. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Energy Technology Data Exchange (ETDEWEB)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C. (Iso-Ster (Pty) Ltd., Kempton Park (South Africa))

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  2. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Science.gov (United States)

    Du Plessis, TA; Russell, AE; Stevens, RCB; Galloway, AC

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  3. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    International Nuclear Information System (INIS)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C.

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem. (author)

  4. Entry points to stimulation of expansion in hides and skins processing

    African Journals Online (AJOL)

    Only 3.4% of respondents add value to hides and skins by processing. ... For this status of the chain, it was proposed that a workable intervention model has to encompass placement of tanneries and slaughter slabs in the chain as new actors, linking chain actors, improving livestock services especially dipping, and ...

  5. Succession of hide-seek and pursuit-evasion at heterogeneous locations.

    Science.gov (United States)

    Gal, Shmuel; Casas, Jérôme

    2014-05-06

    Many interactions between searching agents and their elusive targets are composed of a succession of steps, whether in the context of immune systems, predation or counterterrorism. In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit-escape. Our aim is to link these two processes, usually analysed separately and with different models, in a single game theory context. We define a matrix game in which a searcher looks at a fixed number of discrete locations only once each searching for a hider, which can escape with varying probabilities according to its location. The value of the game is the overall probability of capture after k looks. The optimal search and hide strategies are described. If a searcher looks only once into any of the locations, an optimal hider chooses it's hiding place so as to make all locations equally attractive. This optimal strategy remains true as long as the number of looks is below an easily calculated threshold; however, above this threshold, the optimal position for the hider is where it has the highest probability of escaping once spotted.

  6. The Use of Polymerized Genipin for the Stabilization of the Collagen Structure of Animal Hides

    Science.gov (United States)

    Animal hides are the major byproduct of meat industry and the collagen fibers is the main constituent. Crosslinkers play a key role in stabilizing the collagen structure for useful applications. Genipin is widely used as an ideal biological protein crosslinking agent due to its low toxicity compare...

  7. Efficacy of citrilow™ and cecure™ spray wash on the levels and prevalence of aerobic bacterials and enterobacteriaceae bacteria on cattle hides

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle skins to the inner meat and hide quality detrition from bacteria is recognized as a severe hygienic problem for commercial beef and hide processing facilities. To circumvent bacterial contamination, cattle are washed during hide p...

  8. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days) after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment. PMID:11455906

  9. Availability of treatment resources for the management of acute toxic exposures and poisonings in emergency departments among various types of hospitals in Palestine: a cross-sectional study.

    Science.gov (United States)

    Zyoud, Sa'ed H; Al-Jabi, Samah W; Bali, Yara I; Al-Sayed, Afnan M; Sweileh, Waleed M; Awang, Rahmat

    2014-02-21

    Poisoning exposures continue to be a significant cause of morbidity and mortality worldwide. The lack of facilities, treatment resources, and antidotes in hospitals may affect the treatments provided and outcomes. This study aimed to determine the availability of gastrointestinal (GI) decontamination, stabilisation, elimination enhancement resources, and antidotes for the management of acute toxic exposures and poisonings in emergency departments (EDs) among various types of governmental and private hospitals in Palestine. A cross-sectional study using semi-structured questionnaire was performed. Data were collected based on hospital resources; GI decontamination, stabilisation, elimination enhancement resources and antidotes from Palestinian hospitals. Eighteen hospitals (94.7%) have responded. Among them, paracetamol poisoning was the most frequently reported cases by EDs (mean frequency score = 7.6 ± 2.1), followed by bee stings (mean = 6.9 ± 2.7) and organophosphate poisoning (mean = 6.7 ± 2.7). The availabilities of most resources related to GI decontamination items varied substantially with hospital type, but these differences were not statistical significant. The availability of stabilisation resources was not significantly different between hospitals types. For the availability of techniques used to enhance the elimination of toxic substances, there were variations between the hospitals types. However, these differences were not statistical significant, except for haemodialysis (p = 0.003) which was more available in governmental hospitals. For the availability of antidotes, none of the hospitals had sufficient stock of all antidotes listed. In relation to hospital type, there was variability in the availability of antidotes, but this did not reach statistical significance, except for deferoxamine (p management of acute toxic exposure and poisoning. The implementation of a minimum list of antidotes and treatment resources would be useful to increase the

  10. Cross-sectional study to estimate the prevalence of enterohaemorrhagic Escherichia coli on hides of market beef cows at harvest.

    Science.gov (United States)

    Schneider, L G; Stromberg, Z R; Lewis, G L; Moxley, R A; Smith, D R

    2018-03-25

    Cattle hides are an important source of enterohaemorrhagic Escherichia coli (EHEC) carcass contamination at slaughter. Seven EHEC serogroups are adulterants in raw, non-intact beef: EHEC O26, O45, O103, O111, O121, O145 and O157. The objective of this study was to estimate the probability for hide contamination with EHEC among US market beef cows at slaughter and to test the effects of season and geographic region on prevalence of hide contamination. Hides (n = 800) of market cows were swabbed at slaughter immediately after exsanguination, prior to hide removal. Cows were sampled from two geographically distinct beef packing plants during four seasons of 2015. Cattle source was categorized by northern or southern region. Samples were tested for EHEC by a molecular screening assay. The effects of region, season and their interaction on the probability of hide contamination by each EHEC serogroup were tested in separate multilevel multivariable logistic regression models, accounting for the random effect of clustering by plant. Statistical significance was set α = .05. Of 800 total samples, at least one EHEC was detected on 630 (79%) hides. Enterohaemorrhagic E. coli O26 was detected on 129 (16%) of all hides sampled, EHEC O45 on 437 (55%), EHEC O103 on 289 (36%), EHEC O111 on 189 (24%), EHEC O121 on 140 (18%), EHEC O145 on 171 (21%) and EHEC O157 on 89 (11%). Detection of EHEC O26 and EHEC O121 was associated with season. Season and region were associated with detecting EHEC O45 and EHEC O157. Season-by-region interactions were associated with the outcome of detecting EHEC O103, EHEC O111 and EHEC O145. Season, region of origin and the interaction of these factors affect hide contamination of market beef cattle at slaughter by EHEC, and each serogroup responds to these factors uniquely. © 2018 Blackwell Verlag GmbH.

  11. 25 CFR 900.73 - Is a lease with the Secretary the only method available to recover the types of cost described in...

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Is a lease with the Secretary the only method available to recover the types of cost described in § 900.70? 900.73 Section 900.73 Indians BUREAU OF INDIAN... by the Secretary § 900.73 Is a lease with the Secretary the only method available to recover the...

  12. Optical multiple-image hiding based on interference and grating modulation

    International Nuclear Information System (INIS)

    He, Wenqi; Peng, Xiang; Meng, Xiangfeng

    2012-01-01

    We present a method for multiple-image hiding on the basis of interference-based encryption architecture and grating modulation. By using a modified phase retrieval algorithm, we can separately hide a number of secret images into one arbitrarily preselected host image associated with a set of phase-only masks (POMs), which are regarded as secret keys. Thereafter, a grating modulation operation is introduced to multiplex and store the different POMs into a single key mask, which is then assigned to the authorized users in privacy. For recovery, after an appropriate demultiplexing process, one can reconstruct the distributions of all the secret keys and then recover the corresponding hidden images with suppressed crosstalk. Computer simulation results are presented to validate the feasibility of our approach. (paper)

  13. Information hiding technology and application analysis based on decimal expansion of irrational numbers

    Science.gov (United States)

    Liu, Xiaoyong; Lu, Pei; Shao, Jianxin; Cao, Haibin; Zhu, Zhenmin

    2017-10-01

    In this paper, an information hiding method using decimal expansion of irrational numbers to generate random phase mask is proposed. Firstly, the decimal expansion parts of irrational numbers generate pseudo-random sequences using a new coding schemed, the irrational number and start and end bit numbers were used as keys in image information hiding. Secondly, we apply the coding schemed to the double phase encoding system, the pseudo-random sequences are taken to generate random phase masks. The mean square error is used to calculate the quality of the recovered image information. Finally, two tests had been carried out to verify the security of our method; the experimental results demonstrate that the cipher image has such features, strong robustness, key sensitivity, and resistance to brute force attack.

  14. Impact of Media Richness on Reduction of Knowledge-Hiding Behavior in Enterprises

    DEFF Research Database (Denmark)

    Labafi, Somayeh; Khajeheian, Datis; Williams, Idongesit

    2018-01-01

    in a qualitative study. Thematic analysis is used to analyze transcribed interview data from employees in a software company in Iran. The findings of the analysis show that media richness significantly impacts on organizational learning and influences on knowledge hiding behavior in employees. This article...... suggests that entrepreneurs and managers of small firms should provide employees’ access to rich media content as well as established organizational learning as part of their organizational culture.......Knowledge hiding is one of the major obstacles in the progression of organizations that hinder the use of tacit knowledge of employees. The negative impact of this behavior is more significant in enterprises and small firms because they are more reliant on knowledge of their employees...

  15. 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing

    CERN Document Server

    Tsai, Pei-Wei; Huang, Hsiang-Cheh

    2017-01-01

    This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .

  16. Hiding objects and creating illusions above a carpet filter using a Fourier optics approach.

    Science.gov (United States)

    Wu, Kedi; Wang, Guo Ping

    2010-09-13

    Invisibility carpet cloaks are usually used to hide an object beneath carpet. In this paper we propose and demonstrate a carpet filter to hide objects and create illusions above the filter by using a Fourier optics method. Instead of using transformation optics, we get electromagnetic parameters of the filter by optical transfer functions, which play the role of modulating the propagation of the scattering angular spectrum directly from an object above the filter. By further adding a functional layer onto the filter, we can even camouflage the object so that it appears to be a different object. The analytical results are confirmed by numerical simulations. Our method is completely different from the current coordinate transfer method and may provide another point of view to more clearly understand the mechanism of invisibility cloaks.

  17. Hide depilation and feather disintegration studies with keratinolytic serine protease from a novel Bacillus subtilis isolate.

    Science.gov (United States)

    Pillai, Priya; Archana, G

    2008-03-01

    Keratinases play an important role in biotechnological applications such as improvement of feather meal, enzymatic dehairing and production of amino acids or peptides from high molecular weight substrates. Bacillus subtilis P13, isolated from Vajreshwari hot spring (45-50 degrees C) near Mumbai, India, produces a neutral serine protease and has an optimum temperature of 65 degrees C. This enzyme preparation was keratinolytic in nature and could disintegrate whole chicken feathers, except for the remnants of shafts. The enzyme preparation also exhibited depilation of goat hides with the recovery of intact animal hair. The enzyme preparation could release peptides from ground feathers and bring about their weight reduction; however, similar action on hair was relatively weak. A single major PMSF-sensitive protease band could be detected upon zymogram analysis, indicating that a single enzyme may be responsible for feather degradation and hide depilation. The importance of these findings in the biotechnological application for feather and leather industries is discussed.

  18. A dehydration process for ovine hide to obtain a new collagenous material

    OpenAIRE

    Ollé Otero, Lluís; Sorolla, Silvia; Casas Solé, Concepció; Bacardit Dalmases, Anna

    2014-01-01

    The aim of the present work is to develop a dehydration process for ovine hide to obtain a new collagenous material for use in the leather industry. What is obtained through this new process is a dry and very porous collagenous substrate which allows the application of tanning chemicals by immersion in aqueous solutions. When compared to existing, traditional processes, economic and environmental advantages are obtained from the use of this new material. More specifically, the new process ...

  19. An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining

    OpenAIRE

    Yogendra Kumar Jain,; Vinod Kumar Yadav,; Geetika S. Panday

    2011-01-01

    The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful toolfor discovering relationships which are hidden in large database. Association rules hiding algorithms get strong and efficient performance for protecting confidential and cru...

  20. Optical image hiding based on chaotic vibration of deformable moiré grating

    Science.gov (United States)

    Lu, Guangqing; Saunoriene, Loreta; Aleksiene, Sandra; Ragulskis, Minvydas

    2018-03-01

    Image hiding technique based on chaotic vibration of deformable moiré grating is presented in this paper. The embedded secret digital image is leaked in a form of a pattern of time-averaged moiré fringes when the deformable cover grating vibrates according to a chaotic law of motion with a predefined set of parameters. Computational experiments are used to demonstrate the features and the applicability of the proposed scheme.

  1. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Institute of Scientific and Technical Information of China (English)

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao

    2004-01-01

    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  2. A semantic medical multimedia retrieval approach using ontology information hiding.

    Science.gov (United States)

    Guo, Kehua; Zhang, Shigeng

    2013-01-01

    Searching useful information from unstructured medical multimedia data has been a difficult problem in information retrieval. This paper reports an effective semantic medical multimedia retrieval approach which can reflect the users' query intent. Firstly, semantic annotations will be given to the multimedia documents in the medical multimedia database. Secondly, the ontology that represented semantic information will be hidden in the head of the multimedia documents. The main innovations of this approach are cross-type retrieval support and semantic information preservation. Experimental results indicate a good precision and efficiency of our approach for medical multimedia retrieval in comparison with some traditional approaches.

  3. Prey should hide more randomly when a predator attacks more persistently.

    Science.gov (United States)

    Gal, Shmuel; Alpern, Steve; Casas, Jérôme

    2015-12-06

    When being searched for and then (if found) pursued by a predator, a prey animal has a choice between choosing very randomly among hiding locations so as to be hard to find or alternatively choosing a location from which it is more likely to successfully flee if found. That is, the prey can choose to be hard to find or hard to catch, if found. In our model, capture of prey requires both finding it and successfully pursuing it. We model this dilemma as a zero-sum repeated game between predator and prey, with the eventual capture probability as the pay-off to the predator. We find that the more random hiding strategy is better when the chances of repeated pursuit, which are known to be related to area topography, are high. Our results extend earlier results of Gal and Casas, where there was at most only a single pursuit. In that model, hiding randomly was preferred by the prey when the predator has only a few looks. Thus, our new multistage model shows that the effect of more potential looks is opposite. Our results can be viewed as a generalization of search games to the repeated game context and are in accordance with observed escape behaviour of different animals. © 2015 The Author(s).

  4. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients

    Science.gov (United States)

    Zhang, Xiaoqiang; Wang, Z. Jane

    2013-10-01

    Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 10 to 10 and thus can resist brute-force attack and unauthorized detection watermark attack.

  5. High-capacity method for hiding data in the discrete cosine transform domain

    Science.gov (United States)

    Qazanfari, Kazem; Safabakhsh, Reza

    2013-10-01

    Steganography is the art and science of hiding data in different media such as texts, audios, images, and videos. Data hiding techniques are generally divided into two groups: spatial and frequency domain techniques. Spatial domain methods generally have low security and, as a result, are less attractive to researchers. Discrete cosine transform (DCT) is the most common transform domain used in steganography and JPEG compression. Since a large number of the DCT coefficients of JPEG images are zero, the capacity of DCT domain-based steganography methods is not very high. We present a high-capacity method for hiding messages in the DCT domain. We describe the method in two classes where the receiver has and where the receiver does not have the cover image. In each class, we consider three cases for each coefficient. By considering n coefficients, there are 3n different situations. The method embeds ⌊log2 3n⌋ bits in these n coefficients. We show that the maximum reachable capacity by our method is 58% higher than the other general steganography methods. Experimental results show that the histogram-based steganalysis methods cannot detect the stego images produced by the proposed method while the capacity is increased significantly.

  6. Evaluate the impact of hospital types on the availability of antidotes for the management of acute toxic exposures and poisonings in Malaysia.

    Science.gov (United States)

    Al-Sohaim, Sulaiman I; Awang, Rahmat; Zyoud, Sa'ed H; Rashid, Sazaroni M D; Hashim, Sirajuddin

    2012-03-01

    The availability of antidotes may be considered essential and lifesaving in the management of certain poisonings. Surveys carried out in a number of countries have demonstrated inadequate availability of a variety of poisoning antidotes. The purpose of this study was to determine the availability of antidote stocking at hospitals, based on published guidelines for antidote stocking, and to evaluate the impact of hospital types on the availability of antidotes for the management of acute toxic exposures and poisonings in Malaysia. A questionnaire on the availability of antidotes was sent to all government accident and emergency departments in Malaysia. The list of commonly required antidotes and essential drugs was compiled from published guidelines. Collected data were analysed in SPSS version 16 using descriptive and comparative analysis. The response rate was 59.06%. None of the responding hospitals stocked all of the antidotes on the lists. In relation to hospital type, there was great variability in the availability of antidotes (there were significant differences between hospitals for 13 antidotes). The availabilities of most antidotes were far better in the General Hospitals and the District Hospitals with specialists compared to District Hospitals without specialists. Calcium gluconate, sodium bicarbonate, atropine sulphate, naloxone, flumazenil, vitamin K, and pyridoxine were available at all general hospitals. Atropine sulphate and naloxone were available at all district hospitals with specialists. Most Malaysian government hospitals stocked some important antidotes. Raising awareness of the importance of antidotes by education, regular review of antidote storage, distribution plans, and appropriate legislation might provide solutions. Coordination between Malaysian hospitals and the National Poison Centre at Universiti Sains Malaysia is also important.

  7. PALM and STORM: what hides beyond the Rayleigh limit?

    CSIR Research Space (South Africa)

    Henriques, R

    2009-06-01

    Full Text Available Super-resolution imaging allows the imaging of fluorescently labeled probes at a resolution of just tens of nanometers, surpassing classic light microscopy by at least one order of magnitude. Recent advances such as the development of photo...

  8. HCMM/soil moisture experiment. [relationship between surface minus air temperature differential and available water according to crop type in Canada

    Science.gov (United States)

    Cihlar, J. (Principal Investigator)

    1980-01-01

    Progress in the compilation and analysis of airborne and ground data to determine the relationship between the maximum surface minus maximum air temperature differential (delta Tsa) and available water (PAW) is reported. Also, results of an analysis of HCMM images to determine the effect of cloud cover on the availability of HCMM-type data are presented. An inverse relationship between delta Tsa and PAW is indicated along with stable delta Tsa vs. PAW distributions for fully developed canopies. Large variations, both geographical and diurnal, in the cloud cover images are reported. The average monthly daytime cloud cover fluctuated between 40 and 60 percent.

  9. Availability of treatment resources for the management of acute toxic exposures and poisonings in emergency departments among various types of hospitals in Palestine: a cross-sectional study

    OpenAIRE

    Zyoud, Sa’ed H; Al-Jabi, Samah W; Bali, Yara I; Al-Sayed, Afnan M; Sweileh, Waleed M; Awang, Rahmat

    2014-01-01

    Background Poisoning exposures continue to be a significant cause of morbidity and mortality worldwide. The lack of facilities, treatment resources, and antidotes in hospitals may affect the treatments provided and outcomes. This study aimed to determine the availability of gastrointestinal (GI) decontamination, stabilisation, elimination enhancement resources, and antidotes for the management of acute toxic exposures and poisonings in emergency departments (EDs) among various types of govern...

  10. A Lifestyle Program of Exercise and Weight Loss is Effective in Preventing and Treating Type 2 Diabetes Mellitus: Why Are Programs Not More Available?

    OpenAIRE

    Ades, Philip A.

    2015-01-01

    There is substantial evidence that type 2 diabetes mellitus (T2DM) can be prevented in high-risk individuals by a lifestyle program of regular exercise and weight reduction. Additionally, there is emerging evidence that new onset T2DM (< 1 year) can go into remission after weight loss and exercise in a majority of motivated individuals, obviating a need for glucose lowering medications. Yet, lifestyle programs to support such behavior change are not widely available. Moreover, health care ins...

  11. Medical apps in endocrine diseases - hide and seek.

    Science.gov (United States)

    Albrecht, Urs-Vito; von Jan, Ute

    2014-04-01

    Quantitative review and categorization of available endocrinology related mobile apps for the iOS platform (Apple®) and outline of search strategies to identify appropriate mobile apps for this field. A total of 80 endocrinology related search terms were collected and grouped into 8 main categories covering different areas of endocrinology. These terms were then used to perform comprehensive searches in three categories of Apple's app store, namely 'Medicine', 'Health and Fitness', and 'Reference'. Altogether, matches were found for only 33 of the 80 collected endocrinology related search terms; the majority of matches were found in the medical category, followed by matches for the health and fitness (27/33), and reference (16/33) categories. Restricting the search to these categories significantly helped in discriminating between health related apps and those having another purpose. The distribution of apps per category roughly matches what one can expect considering available data for incidence and prevalence of corresponding endocrinological conditions. Apps matching terms belonging to the spectrum of glucose homeostasis disorders are the most common. For conditions where patients do not have to constantly monitor their condition, apps tend to have a reference or educational character, while for conditions that require a high level of involvement from patients, there are proportionally more apps for self-management. With a single exception, the identified apps had not undergone regulation, and information about the data sources, professional backgrounds, and reliability of the content and integrated information sources was rare. While applying a good search strategy is important for finding apps for endocrinology related problems, users also need to consider whether the app they have found respects all necessary criteria regarding reliability, privacy and data protection before they place their trust in it.

  12. Medical apps in endocrine diseases – hide and seek

    Science.gov (United States)

    von Jan, Ute

    2014-01-01

    Objectives: Quantitative review and categorization of available endocrinology related mobile apps for the iOS platform (Apple®) and outline of search strategies to identify appropriate mobile apps for this field. Methods: A total of 80 endocrinology related search terms were collected and grouped into 8 main categories covering different areas of endocrinology. These terms were then used to perform comprehensive searches in three categories of Apple’s app store, namely ‘Medicine’, ‘Health and Fitness’, and ‘Reference’. Results: Altogether, matches were found for only 33 of the 80 collected endocrinology related search terms; the majority of matches were found in the medical category, followed by matches for the health and fitness (27/33), and reference (16/33) categories. Restricting the search to these categories significantly helped in discriminating between health related apps and those having another purpose. The distribution of apps per category roughly matches what one can expect considering available data for incidence and prevalence of corresponding endocrinological conditions. Apps matching terms belonging to the spectrum of glucose homeostasis disorders are the most common. For conditions where patients do not have to constantly monitor their condition, apps tend to have a reference or educational character, while for conditions that require a high level of involvement from patients, there are proportionally more apps for self-management. With a single exception, the identified apps had not undergone regulation, and information about the data sources, professional backgrounds, and reliability of the content and integrated information sources was rare. Conclusions: While applying a good search strategy is important for finding apps for endocrinology related problems, users also need to consider whether the app they have found respects all necessary criteria regarding reliability, privacy and data protection before they place their trust in

  13. Using DNS amplification DDoS attack for hiding data

    Science.gov (United States)

    Mehić, M.; Voznak, M.; Safarik, J.; Partila, P.; Mikulec, M.

    2014-05-01

    This paper concerns available steganographic techniques that can be used for sending hidden data through public network. Typically, in steganographic communication it is advised to use popular/often used method for sending hidden data and amount of that data need to be high as much as possible. We confirmed this by choosing a Domain Name System (DNS) as a vital protocol of each network and choosing Distributed denial of service (DDoS) attacks that are most popular network attacks currently represented in the world. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols fields and is known for IP, UDP or TCP protocols, but has never been applied to DNS (Domain Name Server) which are the fundamental part of network communications. The second explains the usage of DNS Amplification DDoS Attack to send seamlessly data through public network. The calculation that was performed to estimate the total amount of data that can be covertly transferred by using these technique, regardless of steganalysis, is included in this paper.

  14. Hiding the Source Based on Limited Flooding for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Juan Chen

    2015-11-01

    Full Text Available Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.

  15. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Science.gov (United States)

    Tuckley, Kushal

    2017-01-01

    In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient's information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB) obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image. PMID:29104744

  16. Specific Activities of Natural Radionuclides and Annual Effective Dose Due to the Intake of Some Types of Children Powdered Milk Available in Baghdad Markets

    Directory of Open Access Journals (Sweden)

    Basim Khalaf Rejah

    2017-09-01

    Full Text Available In this research the specific activity of natural radionuclides 226Ra, 232Th and 40K were determined by sodium iodide enhanced by thallium NaI(TI detector and assessed the annual effective dose in Dielac 1 and 2 and Nactalia 1 and 2 for children of less than 1 year which are available in Baghdad markets. The specific activity of 40K has the greater value in all the types which is in the range of allowed levels globally that suggested by UNSCEAR. The mean value of annual effective doses were 2.92, 4.005 and 1.6325 mSv/y for 226Ra, 232Th and 40K respectively.

  17. Type-4 Resistant Starch in Substitution for Available Carbohydrate Reduces Postprandial Glycemic Response and Hunger in Acute, Randomized, Double-Blind, Controlled Study

    Directory of Open Access Journals (Sweden)

    Maria L. Stewart

    2018-01-01

    Full Text Available Resistant starch (RS is a type of dietary fiber that has been acknowledged for multiple physiological benefits. Resistant starch type 4 (RS4 is a subcategory of RS that has been more intensively studied as new types of RS4 emerge in the food supply. The primary aim of this randomized, double-blind, controlled study was to characterize the postprandial glucose response in healthy adults after consuming a high fiber scone containing a novel RS4 or a low fiber control scone without RS4. Secondary aims included assessment of postprandial insulin response, postprandial satiety, and gastrointestinal tolerance. The fiber scone significantly reduced postprandial glucose and insulin incremental areas under the curves (43–45% reduction, 35–40% reduction, respectively and postprandial glucose and insulin maximum concentrations (8–10% and 22% reduction, respectively. The fiber scone significantly reduced hunger and desire to eat during the 180 min following consumption and yielded no gastrointestinal side effects compared with the control scone. The results from this study demonstrate that a ready-to-eat baked-good, such as a scone, can be formulated with RS4 replacing refined wheat flour to yield statistically significant and clinically meaningful reductions in blood glucose and insulin excursions. This is the first study to report increased satiety after short-term RS4 intake, which warrants further investigation in long-term feeding studies.

  18. Effect of acanthocephalan parasites on hiding behaviour in two species of shore crabs.

    Science.gov (United States)

    Latham, A D M; Poulin, R

    2002-12-01

    The effect of acanthocephalan parasites (Profilicollis spp.) on the hiding behaviour during low tide of two species of shore crabs (intermediate hosts), Macrophthalmus hirtipes (Brachyura: Ocypodidae) and Hemigrapsus crenulatus (Brachyura: Grapsidae), was examined at Blueskin Bay, South Island, New Zealand. Exposed M. hirtipes were found to have significantly higher infection levels than did hidden conspecifics. This pattern was not observed for H. crenulatus. Mean cystacanth numbers were found to be considerably higher in M. hirtipes than H. crenulatus. Crabs exposed at low tide are at a greater risk of predation by definitive shorebird hosts than are hidden conspecifics. Preferential manipulation of one intermediate host species over another could influence diversity within ecosystems.

  19. A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fujisaki, Eiichiro

    2002-01-01

    We present a statistically-hiding commitment scheme allowing commitment to arbitrary size integers, based on any (Abelian) group with certain properties, most importantly, that it is hard for the committer to compute its order. We also give efficient zero-knowledge protocols for proving knowledge...... input is chosen by the (possibly cheating) prover. -  - Our results apply to any group with suitable properties. In particular, they apply to a much larger class of RSA moduli than the safe prime products proposed in [14] - Potential examples include RSA moduli, class groups and, with a slight...

  20. Characterization of biofilms produced by Escherichia coli O157 isolated from cattle hides

    Science.gov (United States)

    Milojević, L.; Velebit, B.; Baltić, T.; Nikolić, A.; Mitrović, R.; Đorđević, V.

    2017-09-01

    This study aimed to investigate possibility E. coli O157 from cattle hides to produced biofilms. We had 28 suspect primoisolates and 17 were confirmed to be E. coli O157. Biofilm production test showed that more than 50% of this isolates did not produce biofilm. From the other half of the isolates, 5 of them were weakly adherent, 3 were moderately adherent. Since E. coli O157 are one of the main foodborne hazards in meat processing industry and the discovery that some of them can produce moderately adherent biofilms, request necessity of strict implementation of HACCP procedures to prevent further expansion this pathogen.

  1. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  2. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    DEFF Research Database (Denmark)

    Christandl, Matthias; Ferrara, Roberto

    2017-01-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005)]. The construction of those states was based...... on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable...

  3. What Hides Behind an Umemployment Rate: Comparing Portuguese and U.S. Unemployment

    OpenAIRE

    Olivier Blanchard; Pedro Portugal

    1998-01-01

    Over the last 15 years, Portugal and the United States have had the same average unemployment rate, about 6.5%. But behind these similar rates hide two very different labor markets. Unemployment duration in Portugal is more than three times that of the United States. Symmetrically, the flow of workers into unemployment in Portugal is, in proportion to the labor force, less than a third of what it is in the United States. Relying on evidence from Portuguese and U.S. micro data sets, we show th...

  4. Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding

    OpenAIRE

    Wu, Han-Zhou; Wang, Hong-Xia; Shi, Yun-Qing

    2016-01-01

    This paper presents a novel reversible data hiding (RDH) algorithm for gray-scaled images, in which the prediction-error of prediction error (PPE) of a pixel is used to carry the secret data. In the proposed method, the pixels to be embedded are firstly predicted with their neighboring pixels to obtain the corresponding prediction errors (PEs). Then, by exploiting the PEs of the neighboring pixels, the prediction of the PEs of the pixels can be determined. And, a sorting technique based on th...

  5. Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images

    Directory of Open Access Journals (Sweden)

    Mehdi Hussain

    2016-05-01

    Full Text Available The goal of image steganographic methods considers three main key issues: high embedding capacity, good visual symmetry/quality, and security. In this paper, a hybrid data hiding method combining the right-most digit replacement (RMDR with an adaptive least significant bit (ALSB is proposed to provide not only high embedding capacity but also maintain a good visual symmetry. The cover-image is divided into lower texture (symmetry patterns and higher texture (asymmetry patterns areas and these textures determine the selection of RMDR and ALSB methods, respectively, according to pixel symmetry. This paper has three major contributions. First, the proposed hybrid method enhanced the embedding capacity due to efficient ALSB utilization in the higher texture areas of cover images. Second, the proposed hybrid method maintains the high visual quality because RMDR has the closest selection process to generate the symmetry between stego and cover pixels. Finally, the proposed hybrid method is secure against statistical regular or singular (RS steganalysis and pixel difference histogram steganalysis because RMDR is capable of evading the risk of RS detection attacks due to pixel digits replacement instead of bits. Extensive experimental tests (over 1500+ cover images are conducted with recent least significant bit (LSB-based hybrid methods and it is demonstrated that the proposed hybrid method has a high embedding capacity (800,019 bits while maintaining good visual symmetry (39.00% peak signal-to-noise ratio (PSNR.

  6. Response of the leaf photosynthetic rate to available nitrogen in erect panicle-type rice (Oryza sativa L. cultivar, Shennong265

    Directory of Open Access Journals (Sweden)

    Chihiro Urairi

    2016-07-01

    Full Text Available Increasing the yield of rice per unit area is important because of the demand from the growing human population in Asia. A group of varieties called erect panicle-type rice (EP achieves very high yields under conditions of high nitrogen availability. Little is known, however, regarding the leaf photosynthetic capacity of EP, which may be one of the physiological causes of high yield. We analyzed the factors contributing to leaf photosynthetic rate (Pn and leaf mesophyll anatomy of Nipponbare, Takanari, and Shennong265 (a EP type rice cultivar varieties subjected to different nitrogen treatments. In the field experiment, Pn of Shennong265 was 33.8 μmol m−2 s−1 in the high-N treatment, and was higher than that of the other two cultivars because of its high leaf nitrogen content (LNC and a large number of mesophyll cells between the small vascular bundles per unit length. In Takanari, the relatively high value of Pn (31.5 μmol m−2 s−1 was caused by the high stomatal conductance (gs; .72 mol m−2 s−1 in the high-N treatment. In the pot experiment, the ratio of Pn/Ci to LNC, which may reflect mesophyll conductance (gm, was 20–30% higher in Nipponbare than in Takanari or Shennong265 in the high N availability treatment. The photosynthetic performance of Shennong265 might be improved by introducing the greater ratio of Pn/Ci to LNC found in Nipponbare and greater stomatal conductance found in Takanari.

  7. Will availability of inhaled human insulin (Exubera® improve management of type 2 diabetes? The design of the Real World trial

    Directory of Open Access Journals (Sweden)

    Freemantle Nick

    2006-08-01

    Full Text Available Abstract Background Common deterrents to insulin therapy for both physicians and patients are the complexity and burden of daily injections. In January 2006, the first inhaled human insulin (INH, Exubera® (insulinhuman [rDNA origin]InhalationPowder was approved for use in adult patients with type 1 diabetes mellitus (T1DM or type 2 diabetes mellitus (T2DM in the United States and European Union. Results from the INH clinical trial program have shown comparable efficacy of INH to subcutaneous (SC insulin and superior efficacy versus oral antidiabetic agents; thus providing effective glycemic control in adult patients with T2DM without the requirement for preprandial injections. However, because subjects in those trials were randomized to either INH or an alternative, the studies could not estimate the effect of INH on patient acceptance of insulin therapy. Therefore, traditional study designs cannot provide answers to important and practical questions regarding real world effectiveness, which is influenced by psychological and other access barriers. Methods To overcome these limitations, the Real World Trial was designed to estimate the effect of the availability of INH as a treatment option for glycemic control. A total of approximately 700 patients from Canada, France, Germany, Italy, Spain, United Kingdom, and the United States with T2DM poorly controlled by oral agent therapy will be randomized to two different treatment settings. Patients and clinicians in both groups (A & B may choose from all licensed therapies for diabetes including SC insulin delivered by pens; INH will be an additional treatment option only available in Group A. The Real World Trial (Protocol A2171018 has been registered with ClincalTrials.gov, registration id NCT00134147. Results The primary outcome for the trial will be the difference in mean glycosylated hemoglobin (HbA1c at 6 months between groups. The design was based on a preceding feasibility study examining the

  8. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    Science.gov (United States)

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  9. An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm

    Science.gov (United States)

    Zhang, B.; Sang, Jun; Alam, Mohammad S.

    2013-03-01

    An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.

  10. A lifestyle program of exercise and weight loss is effective in preventing and treating type 2 diabetes mellitus: Why are programs not more available?

    Science.gov (United States)

    Ades, Philip A

    2015-11-01

    There is substantial evidence that type 2 diabetes mellitus (T2DM) can be prevented in high-risk individuals by a lifestyle program of regular exercise and weight reduction. Additionally, there is emerging evidence that new onset T2DM (lifestyle programs to support such behavior change are not widely available. Moreover, health care insurance companies generally do not provide coverage for behavioral weight loss programs to prevent or treat T2DM. Consequently, physicians caring for individuals with T2DM may find it much easier to start a chronic glucose lowering medication rather than attempting to motivate and support patients through long-term behavior change. The cardiac rehabilitation model of disease management, with a network of over 2000 programs in the U.S., is well suited to deliver medically-supervised lifestyle programs. National organizations such as the American Diabetes Association and the American Association of Cardiovascular and Pulmonary Rehabilitation should support greater availability and use of lifestyle programs for T2DM treatment and prevention. Copyright © 2015 Elsevier Inc. All rights reserved.

  11. RBMK nuclear reactors: Proposals for instrumentation and control improvements to enhanced safety and availability. IEC technical report of type 3. Working material

    International Nuclear Information System (INIS)

    1995-01-01

    The present material presents a CD+V draft report ''RBMK nuclear reactors: Proposals for instrumentation and control improvements to enhance safety and availability'' prepared by the Joint IEC/IAEA team during 1993-1995. Experience has demonstrated the need to improve the safety instrumentation of the RBMK type reactors using well proven modern technology. The working group identified the upgrades and changes of the highest priority based on the evaluation of the RBMK systems and the events where the instrumentation was found to be inadequate for safe operation. The subjects discussed in this document were not selected on a systematic basis but were selected by the IEC and IAEA experts as considered to be appropriate to the activities of the IEC and for which technical experience was available. The items identified therefore do not reflect any ranking of the safety issues or any priority or impact on safety of any of the measures were they to be implemented. Many important safety issued and areas where physical measures are required to improve safety have been omitted and indeed not even acknowledged in this document. The recommendations presented in the document differ from those normally produced by the IEC in the form of standards as they are of a transitory nature and some have already been overtaken by the continuing process of improvements to plant safety. Figs and tabs

  12. Efficacy of Citrilow® and Cecure® spray wash on the prevalence of aerobic and enterobacteriaceae/gram negative enteric bacilli and cattle hide quality

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle to the inner meat as well as hide quality deterioration from bacteria are hygienic problems for meat and hide processing facilities. This study investigated spray wash treatments independently with two antimicrobials used in the ...

  13. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    Directory of Open Access Journals (Sweden)

    Farouk Abd El-Monem

    2017-05-01

    Full Text Available Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA and butyl acrylate (BA. The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leather were studied and evaluated using SEM, shrinkage temperature and the mechanical properties of the pre-tanned leather. The results showed that, the prepared polymers A & C are the best polymers in improving the physical properties of the treated leather. Furthermore, the shrinkage temperature and the mechanical properties of the tanned leather were improved. In addition, a significant enhancement in the texture of the leather treated by the polymers was noticed as proved by scanning electron microscopy (SEM.

  14. In vitro gentamicin release from commercially available calcium-phosphate bone substitutes influence of carrier type on duration of the release profile

    Directory of Open Access Journals (Sweden)

    Bronckers Antonius LJJ

    2006-02-01

    Full Text Available Abstract Background Polymethyl-methacrylate (PMMA beads releasing antibiotics are used extensively to treat osteomyelitis, but require surgical removal afterwards because they do not degrade. Methods As an alternative option, this report compares the in vitro gentamicin release profile from clinically used, biodegradable carrier-materials: six injectable cements and six granule-types. Cement cylinders and coated granules containing 3% gentamicin were submerged in dH2O and placed in a 48-sample parallel drug-release system. At regular intervals (30, 90, 180 min. and then every 24 h, for 21 days, the release fluid was exchanged and the gentamicin concentration was measured. The activity of released gentamicin was tested on Staphylococcus aureus. Results All combinations showed initial burst-release of active gentamicin, two cements had continuous-release (17 days. The relative release of all cements (36–85% and granules (30–62% was higher than previously reported for injectable PMMA-cements (up to 17% and comparable to other biodegradable carriers. From the cements residual gentamicin could be extracted, whereas the granules released all gentamicin that had adhered to the surface. Conclusion The high release achieved shows great promise for clinical application of these biodegradable drug-carriers. Using the appropriate combination, the required release profile (burst or sustained may be achieved.

  15. Nitrogen and phosphorus availabilities interact to modulate leaf trait scaling relationships across six plant functional types in a controlled-environment study.

    Science.gov (United States)

    Crous, Kristine Y; O'Sullivan, Odhran S; Zaragoza-Castells, Joana; Bloomfield, Keith J; Negrini, A Clarissa A; Meir, Patrick; Turnbull, Matthew H; Griffin, Kevin L; Atkin, Owen K

    2017-08-01

    Nitrogen (N) and phosphorus (P) have key roles in leaf metabolism, resulting in a strong coupling of chemical composition traits to metabolic rates in field-based studies. However, in such studies, it is difficult to disentangle the effects of nutrient supply per se on trait-trait relationships. Our study assessed how high and low N (5 mM and 0.4 mM, respectively) and P (1 mM and 2 μM, respectively) supply in 37 species from six plant functional types (PTFs) affected photosynthesis (A) and respiration (R) (in darkness and light) in a controlled environment. Low P supply increased scaling exponents (slopes) of area-based log-log A-N or R-N relationships when N supply was not limiting, whereas there was no P effect under low N supply. By contrast, scaling exponents of A-P and R-P relationships were altered by P and N supply. Neither R : A nor light inhibition of leaf R was affected by nutrient supply. Light inhibition was 26% across nutrient treatments; herbaceous species exhibited a lower degree of light inhibition than woody species. Because N and P supply modulates leaf trait-trait relationships, the next generation of terrestrial biosphere models may need to consider how limitations in N and P availability affect trait-trait relationships when predicting carbon exchange. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  16. Deployable nuclear fleet based on available quantities of uranium and reactor types – the case of fast reactors started up with enriched uranium

    Directory of Open Access Journals (Sweden)

    Baschwitz Anne

    2016-01-01

    Full Text Available International organizations regularly produce global energy demand scenarios. To account for the increasing population and GDP trends, as well as to encompass evolving energy uses while satisfying constraints on greenhouse gas emissions, long-term installed nuclear power capacity scenarios tend to be more ambitious, even after the Fukushima accident. Thus, the amounts of uranium or plutonium needed to deploy such capacities could be limiting factors. This study first considers light-water reactors (LWR, GEN III using enriched uranium, like most of the current reactor technologies. It then examines the contribution of future fast reactors (FR, GEN IV operating with an initial fissile load and then using depleted uranium and recycling their own plutonium. However, as plutonium is only available in limited quantity since it is only produced in nuclear reactors, the possibility of starting up these Generation IV reactors with a fissile load of enriched uranium is also explored. In one of our previous studies, the uranium consumption of a third-generation reactor like an EPR™ was compared with that of a fast reactor started up with enriched uranium (U5-FR. For a reactor lifespan of 60 years, the U5-FR consumes three times less uranium than the EPR and represents a 60% reduction in terms of separative work units (SWU, though its requirements are concentrated over the first few years of operation. The purpose of this study is to investigate the relevance of U5-FRs in a nuclear fleet deployment configuration. Considering several power demand scenarios and assuming different finite quantities of available natural uranium, this paper examines what types of reactors must be deployed to meet the demand. The deployment of light-water reactors only is not sustainable in the long run. Generation IV reactors are therefore essential. Yet when started up with plutonium, the number of reactors that can be deployed is also limited. In a fleet deployment

  17. Hiding the interior region of core-shell nanoparticles with quantum invisible cloaks

    Science.gov (United States)

    Lee, Jeng Yi; Lee, Ray-Kuang

    2014-04-01

    Based on the scattering cancellation, we provide a method not only making a nanoparticle nearly invisible, but also hiding its interior region from the outside probing matter wave. By applying the interplay among the nodal points of partial waves along with the concept of streamline in fluid dynamics for probability flux, a quantum invisible cloak to the electron transport in a host semiconductor is demonstrated by simultaneously guiding the probability flux outside a hidden region and keeping the total scattering cross section negligible. As the probability flux vanishes in the interior region, one can embed any materials inside a multiple core-shell nanoparticle without affecting physical observables from the outside. Our results reveal the possibility to design a protection shield layer for fragile interior parts from the impact of transport electrons.

  18. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  19. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2015-01-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. (paper)

  20. A novel attack method about double-random-phase-encoding-based image hiding method

    Science.gov (United States)

    Xu, Hongsheng; Xiao, Zhijun; Zhu, Xianchen

    2018-03-01

    By using optical image processing techniques, a novel text encryption and hiding method applied by double-random phase-encoding technique is proposed in the paper. The first step is that the secret message is transformed into a 2-dimension array. The higher bits of the elements in the array are used to fill with the bit stream of the secret text, while the lower bits are stored specific values. Then, the transformed array is encoded by double random phase encoding technique. Last, the encoded array is embedded on a public host image to obtain the image embedded with hidden text. The performance of the proposed technique is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient.

  1. Antibacterial activities of leave extracts as bactericides for soaking of skin or hide

    Science.gov (United States)

    Suparno, Ono; Panandita, Tania; Afifah, Amalia; Marimin; Purnawati, Rini

    2018-03-01

    Antibacteria, a subtance inhibiting the growth of bacteria, can be obtained from tropical-almond (Terminalia catappa), morinda (Morinda citrifolia), and white leadtree (Leucaena leucocephala) plants, since the plants have phytochemical content functioning as antibacterial agent. Commonly, part of plant that contains higher antibacterial substances is its leaf. The objectives of this study were to determine antibacterial activity of tropical-almond, morinda, and white leadtree leaves extracts, and to analyse the potency of the three extracts as natural bactericide for soaking of skin or hide. The responses measured in this study were phytochemical contents, total flavonoid, tannin content, the inhibition zone, the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Phytochemical contents containing the three leaves extracts were alkaloid, flavonoid, tannin, saponin, phenolic, and glycoside. Total flavonoid and tannin contents of the three extracts were tropical-almond extract of 1.14 % and 1.51 %, respectively; morinda extract of 0.61 % and 0.36 %, respectively; and white leadtree extract of 0.60 % and 4.82 %, respectively. White leadtree leaf extract gave the highest inhibition zone against B. subtilis, S. aureus and E. coli, i.e. 1.50, 1.3, and 1.65 cm, respectively; and the lowest MIC and MBC against B. subtilis, S. aureus and E. coli, i.e. 1500, 3000, and 1500 μg/ml, respectively. Therefore, the white leadtree leave extract had more potential as bactericide for soaking of skin or hide compared to those of the tropical-almond and morinda leaves extracts.

  2. Hiding a Heavy Higgs Boson at the 7 TeV LHC

    Energy Technology Data Exchange (ETDEWEB)

    Bai, Yang; Fan, JiJi; Hewett, JoAnne L.

    2012-03-20

    A heavy Standard Model Higgs boson is not only disfavored by electroweak precision observables but is also excluded by direct searches at the 7 TeV LHC for a wide range of masses. Here, we examine scenarios where a heavy Higgs boson can be made consistent with both the indirect constraints and the direct null searches by adding only one new particle beyond the Standard Model. This new particle should be a weak multiplet in order to have additional contributions to the oblique parameters. If it is a color singlet, we find that a heavy Higgs with an intermediate mass of 200-300 GeV can decay into the new states, suppressing the branching ratios for the standard model modes, and thus hiding a heavy Higgs at the LHC. If the new particle is also charged under QCD, the Higgs production cross section from gluon fusion can be reduced significantly due to the new colored particle one-loop contribution. Current collider constraints on the new particles allow for viable parameter space to exist in order to hide a heavy Higgs boson. We categorize the general signatures of these new particles, identify favored regions of their parameter space and point out that discovering or excluding them at the LHC can provide important indirect information for a heavy Higgs. Finally, for a very heavy Higgs boson, beyond the search limit at the 7 TeV LHC, we discuss three additional scenarios where models would be consistent with electroweak precision tests: including an additional vector-like fermion mixing with the top quark, adding another U(1) gauge boson and modifying triple-gauge boson couplings.

  3. Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: ACCESS 2000 - niveau 1 : 13 & 14.11.03 (2 jours) C++ for Particle Physicists : 17 – 21.11.03 (6 X 3-hour lectures) Programmation automate Schneider TSX Premium – niveau 2 : 18 – 21.11.03 (4 jours) JAVA 2 Enterprise Edition – Part 1 : WEB Applications : 20 & ...

  4. Availability, Sustainability, and Suitability of Ground Water, Rogers Mesa, Delta County, Colorado - Types of Analyses and Data for Use in Subdivision Water-Supply Reports

    Science.gov (United States)

    Watts, Kenneth R.

    2008-01-01

    The population of Delta County, Colorado, like that in much of the Western United States, is forecast to increase substantially in the next few decades. A substantial portion of the increased population likely will reside in rural subdivisions and use residential wells for domestic water supplies. In Colorado, a subdivision developer is required to submit a water-supply plan through the county for approval by the Colorado Division of Water Resources. If the water supply is to be provided by wells, the water-supply plan must include a water-supply report. The water-supply report demonstrates the availability, sustainability, and suitability of the water supply for the proposed subdivision. During 2006, the U.S. Geological Survey, in cooperation with Delta County, Colorado, began a study to develop criteria that the Delta County Land Use Department can use to evaluate water-supply reports for proposed subdivisions. A table was prepared that lists the types of analyses and data that may be needed in a water-supply report for a water-supply plan that proposes the use of ground water. A preliminary analysis of the availability, sustainability, and suitability of the ground-water resources of Rogers Mesa, Delta County, Colorado, was prepared for a hypothetical subdivision to demonstrate hydrologic analyses and data that may be needed for water-supply reports for proposed subdivisions. Rogers Mesa is a 12-square-mile upland mesa located along the north side of the North Fork Gunnison River about 15 miles east of Delta, Colorado. The principal land use on Rogers Mesa is irrigated agriculture, with about 5,651 acres of irrigated cropland, grass pasture, and orchards. The principal source of irrigation water is surface water diverted from the North Fork Gunnison River and Leroux Creek. The estimated area of platted subdivisions on or partially on Rogers Mesa in 2007 was about 4,792 acres of which about 2,756 acres was irrigated land in 2000. The principal aquifer on Rogers

  5. Estimation of available water capacity components of two-layered soils using crop model inversion: Effect of crop type and water regime

    Science.gov (United States)

    Sreelash, K.; Buis, Samuel; Sekhar, M.; Ruiz, Laurent; Kumar Tomer, Sat; Guérif, Martine

    2017-03-01

    Characterization of the soil water reservoir is critical for understanding the interactions between crops and their environment and the impacts of land use and environmental changes on the hydrology of agricultural catchments especially in tropical context. Recent studies have shown that inversion of crop models is a powerful tool for retrieving information on root zone properties. Increasing availability of remotely sensed soil and vegetation observations makes it well suited for large scale applications. The potential of this methodology has however never been properly evaluated on extensive experimental datasets and previous studies suggested that the quality of estimation of soil hydraulic properties may vary depending on agro-environmental situations. The objective of this study was to evaluate this approach on an extensive field experiment. The dataset covered four crops (sunflower, sorghum, turmeric, maize) grown on different soils and several years in South India. The components of AWC (available water capacity) namely soil water content at field capacity and wilting point, and soil depth of two-layered soils were estimated by inversion of the crop model STICS with the GLUE (generalized likelihood uncertainty estimation) approach using observations of surface soil moisture (SSM; typically from 0 to 10 cm deep) and leaf area index (LAI), which are attainable from radar remote sensing in tropical regions with frequent cloudy conditions. The results showed that the quality of parameter estimation largely depends on the hydric regime and its interaction with crop type. A mean relative absolute error of 5% for field capacity of surface layer, 10% for field capacity of root zone, 15% for wilting point of surface layer and root zone, and 20% for soil depth can be obtained in favorable conditions. A few observations of SSM (during wet and dry soil moisture periods) and LAI (within water stress periods) were sufficient to significantly improve the estimation of AWC

  6. Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Places available The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses : Introduction à Outlook : 19.8.2004 (1 journée) Outlook (short course I) : E-mail : 31.8.2004 (2 hours, morning) Outlook (short course II) : Calendar, Tasks and Notes : 31.8.2004 (2 hours, afternoon) Instructor-led WBTechT Study or Follow-up for Microsoft Applications : 7.9.2004 (morning) Outlook (short course III) : Meetings and Delegation : 7.9.2004 (2 hours, afternoon) Introduction ...

  7. Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval Tel. 74924technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: MATLAB Fundamentals and Programming Techniques (ML01) : 2 & 3.12.03 (2 days) Oracle 8i : SQL : 3 - 5.12.03 (3 days) The EDMS MTF in practice : 5.12.03 (afternoon, free of charge) Modeling Dynamic Systems with Simulink (SL01) : 8 & 9.12.03 (2 days) Signal Processing with MATLAB (SG01) : 11 & 12.12.03 (2 days) The JAVA Programming Language - l...

  8. Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: MATLAB Fundamentals and Programming Techniques (ML01) :2 & 3.12.03 (2 days) Oracle 8i : SQL : 3 - 5.12.03 (3 days) The EDMS MTF in practice : 5.12.03 (afternoon, free of charge) Modeling Dynamic Systems with Simulink (SL01) : 8 & 9.12.03 (2 days) Signal Processing with MATLAB (SG01) : 11 & ...

  9. Places available**

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt.TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The JAVA Programming Language Level 1 : 9 & 10.1.2004 (2 days) The JAVA Programming Language Level 2 : 11 to 13.1.2004 (3 days) LabVIEW base 1 : 25 - 27.2.2004 (3 jours) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon - free of charge) C++ for Particle Physicists : 8 - 12.3.2004 ( 6 X 4-hour sessions) LabVIEW Basics 1 : 22 - 24.3.20...

  10. Places available**

    CERN Document Server

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The JAVA Programming Language Level 1 :9 & 10.1.2004 (2 days) The JAVA Programming Language Level 2 : 11 to 13.1.2004 (3 days) Hands-on Introduction to Python Programming : 16 - 18.2.2004 (3 days - free of charge) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon - free of charge) C++ for Particle Physicists : 8 - 12.3.2004...

  11. Places available**

    CERN Document Server

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval Tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: JAVA 2 Enterprise Edition - Part 1 : WEB Applications : 20 & 21.11.03(2 days) FrontPage 2000 - niveau 1 : 20 & 21.11.03 (2 jours) Oracle 8i : SQL : 3 - 5.12.03 (3 days) Oracle 8i : Programming with PL/SQL : 8 - 10.12.03 (3 days) The JAVA Programming Language - leve...

  12. Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Project Planning with MS-Project : 15 & 22.1.2004 (2 days) Joint PVSS JCOP Framework Course : 2 sessions : 2 - 6.2.2004 and 16 - 20-2-2004 (5 days) Hands-on Introduction to Python Programming : 16 - 18.2.2004 (3 days - free of charge) C++ for Particle Physicists : 8 - 12.3.2004 ( 6 X 4-hour sessions)

  13. Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses : EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) CLEAN-2002 : Working in a Cleanroom (free of charge) : 23.10.03 (half day) The EDMS-MTF in practice (free of charge) :  28 -  30.10.03 (6 half-day sessions) AutoCAD 2002 - Level 1 : 3, 4, 12, 13.11.03 (4 days) LabVIEW TestStand ver. 3 : 4 & 5.11.03 (2 days) Introduction to Pspice : 4.11.03 p.m. (half-day) Hands-on Introduction to Python Programm...

  14. Young Stars in Old Galaxies - a Cosmic Hide and Seek Game

    Science.gov (United States)

    2002-05-01

    of its stars are found in large elliptical galaxies (this refers to their form) whose overall appearance has so far led us to believe that they, and their stars as well, are very old, indeed among the oldest objects in the Universe. These elliptical galaxies do shine with the diffuse, reddish glow normally associated with stars that are many billions of years old. However, what is really the underlying mix of stars that produces this elderly appearance? Could perhaps a significant number of much younger stars be "hiding" among the older ones? Whatever the case, this question must obviously be looked into, before it is possible to claim understanding of the evolution of these old galaxies. It is a very challenging investigation and it is only now that new and more detailed observations with the world's premier telescopes have been obtained that cast more light on this central question and thus on the true behaviour of some of the major building blocks of the Universe. Cosmic archaeology In order to identify the constitutents of the stellar "cocktail" in elliptical galaxies, a team of European and American astronomers [2] observed massive stellar clusters in and around several nearby galaxies. These clusters, referred to as "globular" because of their shape, are present in large numbers around most galaxies and together they form a kind of "skeleton" within their host galaxies. These "bones" receive an imprint for every episode of star formation they undergo. Thus, by reading the ages of the globular clusters in a galaxy, it is possible to identify the past epoch(s) of active star formation in that galaxy. This is like digging into the ruins of an ancient archaeological city site and to find those layers and establish those times when the city underwent bursts of building activity. In this way, by the study of the distribution and ages of the globular clusters in an elliptical galaxy, astronomers can reveal when many of its stars were formed. A surprise discovery ESO

  15. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Introduction to Databases :  3 - 4.7.01 (2 days) The JAVA programming language Level 2 : 4 - 6.7.01 (3 days) Enterprise JavaBeans :  9 - 11.7.01 (3 days) Design Patterns :  10 - 12.7.01 (3 days) C++ for Particle Physicists :  23 - 27.7.01 (6 3-hour lectures) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt.

  16. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Introduction to Perl 5 : 2 - 3.7.01 (2 days) Introduction to Databases :  3 - 4.7.01 (2 days) JAVA programming language Level 2 : 4 - 6.7.01 (3 days) Enterprise JavaBeans :  9 - 11.7.01 (3 days) Design Patterns :  10 - 12.7.01 (3 days) C++ for Particle Physicists :  23 - 27.7.01 (6 3-hour lectures) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt.

  17. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: CLEAN-2002 : Travailler en salle blanche (cours gratuit) : 13.08.2002 (matin) Introduction to the CERN Enginnering Data Management System :  27.8.02  (1 day) The CERN Engineering Data Management System for Advanced Users :  28.8.02  (1 day) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training Monique Duval Tel.74924 monique.duval@cern.ch    

  18. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: C++ Programming Level 2 - Traps & Pitfalls:  16 - 19.7.02 (4 days) Frontpage 2000 - level 1 :  22 - 23.7.02  (2 days) Introduction à Windows 2000 au CERN : 24.7.02 (après-midi) CLEAN-2002 : Travailler en salle blanche (cours gratuit) : 13.08.2002 (matin) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training Monique Duval Tel.74924 monique.duval@cern.ch

  19. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: December 2002   PCAD Schémas - Débutants :  5 & 6.12.02  (2 jours) PCAD PCB - Débutants :  9 - 11.12.02  (3 jours) FrontPage 2000 - level 1:  9 & 10.12.02  (2 days) Introduction à la CAO Cadence (cours gratuit) :  10 & 11.12.02  (2 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training Monique Duval Tel.74924 monique.duval@cern.ch

  20. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: Conception de PCB rapides dans le flot Cadence : 11.6.03 (matin) EXCEL 2000 - level 1 : 12 & 13.6.03 (2 days) Introduction to PVSS : 16.6.03 (p.m.) Basic PVSS : 17 - 19.6.03 (3 days) Réalisation de PCB rapides dans le flot Cadence : 17.6.03 (matin) PVSS - JCOP Framework Tutorial : 20.6.03 (1 day) Programmation automate Schneider : Programmation automate Schneider TSX Premium - 2ème niveau : 24 - 27.6.03 (4 jours) - audience : toute personne qui veux maitriser la mise en uvre et la programmation des fonctions spécialisées d'un automate TSX Premium - objectifs : maitriser la mise en uvre et la programmation des fonctions spécialisées d'un automate TSX Premium Cours de sécurité : Etre TSO au CERN : Prochaines sessions : 24, 25 & 27.6.03 - 4, 5 & 7.11.03 (session de 3 jours) ** The number of places available may vary. Please check our Web site to find out the current availability. If you wish to participate in one of these courses, pl...

  1. PLACES AVAILABLE

    CERN Multimedia

    Enseignement Technique; Tél. 74924; Technical Training; Monique Duval; Tel. 74924

    2000-01-01

    Places available Places are available in the following courses:   LabView hands-on 13.11.00 4 hours LabView Basics 1 14 - 16.11.00 3 days Nouveautés de WORD 19 et 20.10.00 2 jours ACCESS 1er niveau 30 - 31.10.00 2 jours Advanced aspects of the C language 2 - 3.11.00 2 days Introduction to Oracle SQL and PL/SQL 13 - 17.11.00 5 days C++ for Particle Physicists 20 - 24.11.00 6 lectures Develop PL/SQL Program Units 20 - 22.11.00 3 days Oracle Application Server Develop Web-Based Applications with PL/SQL 27 - 28.11.00 2 days Programmation TSX Premium 1 28.11 - 1.12.00 4 jours Programmation TSX Premium 2 12 - 15.12.00 4 jours If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : http://www.cern.ch/Training/ or fill in an “application for training” form available from your Divisional Secretariat or from your DTO (Divisional Training Offi...

  2. Places available**

    CERN Multimedia

    Places are available in the following courses: Hands-on Introduction to Python Programming: 11-13.08.2003 (3 days) Introduction to the CERN Engineering Data Management System (EDMS): 26.08.2003 (1 day) The CERN Engineering Data Management System (EDMS) for Engineers: 27.08.2003 (1 day) CLEAN-2002 : Travailler en salle blanche : 4.09.2003 (une demi-journée) AutoCAD 2002 - Level 1: 4, 5, 15, 16.09.2003 (2 x 2 days) AutoCAD Mechanical 6 PowerPack : 17, 18, 25, 26.09.2003 et 2, 3.10.2003 (3 x 2 journées, français) AutoCAD 2002 - niveau 1 : 23, 24, 30.09.2003 et 1.10.2003 (2 x 2 journées) Introduction to the CERN Engineering Data Management System (EDMS): 23.09.2003 (1 day) The CERN Engineering Data Management System (EDMS) for Local Administrators: 24-25.09.2003 (2 days) AutoCAD 2002 - niveau 2 : 8 et 10.10.2003 (2 journées) CLEAN-2002: Working in a Cleanroom: 23.10.2003 (half day, p.m.) ** The number of places available may vary. Please check our Web site to find out the current availabili...

  3. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: Hands-on Introduction to Python Programming: 11-13.08.2003(3 days) Introduction to the CERN Engineering Data Management System (EDMS): 26.08.2003 (1 day) The CERN Engineering Data Management System (EDMS) for Engineers: 27.08.2003 (1 day) CLEAN-2002 : Travailler en salle blanche : 4.09.2003 (une demi-journée) AutoCAD 2002 - Level 1: 4, 5, 15, 16.09.2003 (2 x 2 days) AutoCAD Mechanical 6 PowerPack : 17, 18, 25, 26.09.2003 et 2, 3.10.2003 (3 x 2 journées, français) AutoCAD 2002 - niveau 1 : 23, 24, 30.09.2003 et 1.10.2003 (2 x 2 journées) Introduction to the CERN Engineering Data Management System (EDMS): 23.09.2003 (1 day) The CERN Engineering Data Management System (EDMS) for Local Administrators: 24-25.09.2003 (2 days) AutoCAD 2002 - niveau 2 : 8 et 10.10.2003 (2 journées) CLEAN-2002: Working in a Cleanroom: 23.10.2003 (half day, p.m.) ** The number of places available may vary. Please ch...

  4. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: LabView Hands-on (bilingue/bilingual - gratuit/free of charge) : 13.9.02 (a.m.) LabView DAQ Hands-on (bilingue/bilingual - gratuit/free of charge) : 13.9.02 (p.m.) AutoCAD 2002 - niveau 1 : 19, 20, 26, 27.9.02 (4 jours) LabView Base 1 : 23 - 25.9.02 (3 jours) LabView DAQ (E) : 26 - 27.9.02 (2 days) AutoCAD Mechanical 6 PowerPack (F) : 30.9, 1, 2, 9, 10, 11.10.02 (6 jours) CLEAN-2002 : Working in a Cleanroom (free of charge) : 10.10.02 (half-day, p.m.) AutoCAD 2002 - niveau 2 : 14 - 15.10.02 (2 jours) AutoCAD 2002 - Level 1 : 17, 18, 24, 25.10.02 (4 days) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Of...

  5. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel 74924

    2002-01-01

    Places are available in the following courses: LabView hands-on : 21.01.02 (1/2 journée) LabView DAQ hands-on : 21.01.02 (1/2 journée) FileMaker Pro : 22 - 25.1.02 (4 jours) MS-Project 2000 : 24 & 25.01.02 (2 jours) Introduction au PC et à Windows 2000 au CERN : 29 - 30.1.02 (2 jours) LabView Base 1 : 4 - 6.2.02 (3 jours) LabView DAQ (E) : 7 & 8.02.02 (2 days) Hands-on Object-Oriented Design & Programming with Java : 11 - 13.02.02 (3 days) C++ for Particle Physicists : 11 - 15.3.2002 (6 * 3 hour lectures) Cours sur la migration AutoCAD : AutoCAD : Mise à jour AutoCAD r-14 vers 2002 (2 jours) AutoCAD Mechanical PowerPack 6 basé sur AutoCAD 2002 (5 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO ...

  6. PLACES AVAILABLE

    CERN Multimedia

    TECHNICAL TRAINING; Tel. 74460

    2001-01-01

    Places are available in the following courses: MS-Project 1er niveau : 20 - 23.2.01 (4 matins) Architecture d'automatisme : 20 - 21.2.01 (2 jours) Introduction à PowerPoint : 26.2.01 (1 journée) Programmation TSX Premium 1 (Schneider) : 26.2 - 2.3.01 (5 jours) Premiers pas avec votre PC : 27.2 - 2.3.01 (4 matins) C++ for Particle Physicists : 5 - 9.3.01 (6*3 hour lectures) EXCEL : 6, 7 et 13, 14.3.01 (4 jours) The JAVA programming language level 2 :  12 - 14.3.01 (3 days) Nouveautés de FileMaker :  20 - 23.03.01 (4 matins) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt.

  7. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Habilitation électrique : recyclage HT/BT : 11 - 15.3.2002  (2 * 2 heures) PVSS Basics :  8 - 12.4.02  (5 days) ELEC-2002 : Spring Term :  9, 11, 16, 18, 23, 25, 30.4.02 (7 * 2.5 hours) LabVIEW base 1 : 22 - 24.4.02 (3 jours) LabVIEW DSC (F) 25 & 26.4.02 (2 jours) LabVIEW Basics 2 : 13 & 14.5.02 (2 days) LabVIEW DAQ (F) : 15 & 16.5.02 (2 jours) Cours sur la migration AutoCAD :   AutoCAD : Mise à jour AutoCAD r-14 vers 2002 (2 jours) AutoCAD Mechanical PowerPack 6 basé sur AutoCAD 2002 (5 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applica...

  8. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: November 2002   Hands-on Object-Oriented Design and Programming with C++:  19 - 21.11.02  (3 days)  December 2002   LabVIEW - DSC (English) :  2 - 3.12.02  (2 days) AutoCAD 2002 - niveau 2 :  2 & 3.12.02  (2 jours) FileMaker (Français) :  2 - 5.12.02  (4 jours) PCAD Schémas - Débutants :  5 & 6.12.02  (2 jours) PCAD PCB - Débutants :  9 - 11.12.02  (3 jours) FrontPage 2000 - level 1:  9 & 10.12.02  (2 days) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisiona...

  9. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: November 2002   Java Programming Language level 1 :  28 & 29.11.02  (2 days) December 2002   LabVIEW - DSC (English) :  2 - 3.12.02  (2 days) FileMaker (Français) :  2 - 5.12.02  (4 jours) PCAD Schémas - Débutants :  5 & 6.12.02  (2 jours) PCAD PCB - Débutants :  9 - 11.12.02  (3 jours) FrontPage 2000 - level 1:  9 & 10.12.02  (2 days) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at : Technical Training or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training M...

  10. Hide out return test and blowndown crud composition under ETA chemistry

    International Nuclear Information System (INIS)

    Chocron, Mauricio; Rodriguez, Ivanna; Saucedo, Ramona; Rodriguez-Aliciardi, Matias; Montes, Juan

    2012-09-01

    Among the techniques recommended for the surveillance of the Steam Generators (SGs) are (i) the follow-up of the corrosion products in the Feed Water and Blown down water and the corresponding accumulation mass balance and (ii) The follow-up of ionic impurities normally present in the main condensate and feed water that can enter the cycle either by condenser leakages or even by the make-up water. This is so, no matter how well the the cycle is constructed or the make-up water plant behaves given the continuous phase change present in it and the subsequent concentration. A synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in the deposits creating a potentially risky environment for the steam generator tubes. Hide out return determination consists in the measurement of the concentration of ions, anions and cations, present in the blown-down water which are eluted during the shutdown along with the reduction of power and temperature. The integrated value provides figures to perform several evaluations like: (i) how well the make-up water plant has performed during the cycle, (ii) presence of condenser in leakages, (iii) amount of deposits present in the steam generator and (iv) it allows to estimate the chemistry in operation inside the steam generator liquid phase inside the sludge pile. Embalse, a CANDU 6 pressurized heavy water reactor located in Cordoba Province, Argentina, is close to reach the end-of-design-life and a project of life extension is currently ongoing. There, also the chemistry in the BOP has been modified from Morpholine to Ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of steam generator internals and new steam generators will be installed. It is of interest then to set up a hide-out return procedure and analysis of blown down crud collected during the shut down as a base line for the second period of operation

  11. Frailty and the relationship between blood pressure and mortality in elderly patients with type 2 diabetes (Zwolle Outpatient Diabetes project Integrating Available Care-34)

    NARCIS (Netherlands)

    van Hateren, Kornelis J. J.; Hendriks, Steven H.; Groenier, Klaas H.; Bakker, Stephan J. L.; Bilo, Henk J. G.; Kleefstra, Nanne; Landman, Gijs W. D.

    Objective: We aimed to investigate whether adjustment for frailty influences the relationship of blood pressure with mortality in elderly patients with type 2 diabetes mellitus (T2DM). Methods: Patients aged 60 years and older (n = 858) were selected from a prospective observational cohort study of

  12. Places available **

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: PIPES-2003 - Pratique du Sertissage de tubes métalliques et multicouches : 26.8.03 (stage pratique) The CERN Engineering Data Management System (EDMS) for Engineers : 27.8.03 (1 day, free of charge) CLEAN-2002 : Travailler en salle blanche : 4.9.03 (une demi-journée, séminaire gratuit) The CERN Engineering Data Management System (EDMS) for Local Administrators : 24 & 25.9.03 (2 days, free of charge) Siemens SIMATIC Training : Programmation STEP7 - niveau 1 : 29 - 2.10.03 (4 jours) - ouverture des inscriptions fin août Programmation STEP7 - niveau 2 : 13 - 17.10.03 (5 jours) - ouverture des inscriptions fin août Réseau Simatic Net : 22 & 23.10.03 (2 jours) - ouverture des inscriptions fin août CLEAN-2002 : Working in a Cleanroom : 23.20.03 (half day, free of charge) These courses will be given in French or Englis...

  13. Places available**

    CERN Document Server

    2003-01-01

    Places are available in the following courses : FrontPage 2000 - niveau 1: 20 & 21.5.03 (2 jours) PIPES-2003 : Pratique du sertissage de tubes métalliques et multicouches: 21.5.03 (1 jour) Introduction à la CAO Cadence: de la saisie de schéma Concept-HDL au PCB : 20 & 22.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (E): 5, 6, 12, 13, 26, 27.6.03 (6 days) EXCEL 2000 - niveau 1: 10 & 11.6.03 (2 jours) Conception de PCB rapides dans le flot Cadence: 11.6.03 (matin) EXCEL 2000 - level 1: 12 & 13.6.03 (2 days) Introduction to PVSS: 16.6.03 (half-day, pm) Basic PVSS: 17 - 19.6.03 (3 days) Réalisation de PCB rapides dans le flot Cadence: 17.6.03 (matin) LabView DSC (language to be defined): 19 & 20.6.03 PVSS - JCOP Framework Tutorial: 20.6.03 (1 day) EXCEL 2000 - niveau 2: 24 & 25.6.03 (2 jours) Siemens SIMATIC Training: Introduction to STEP7: 3 & 4.6.03 (2 days) STEP7 Programming: 16 - 20.6.03 (5 days) Simatic Net Network: 26 & 27.6.03 (2 days) These courses will be given...

  14. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Introduction to Oracle 8i : SQL and PL/SQL:  7 - 11.10.02  (5 days) CLEAN-2002 : Working in a Cleanroom (free of charge):  10.10.02  (half-day, p.m.) AutoCAD 2002 - niveau 2 :  14 - 15.10.02  (2 jours) Introduction à DesignSpace :  16.10.02  (1 journée) Introduction to DesignSpace:  17.10.02  (1 day) AutoCAD 2002 - Level 1:  17, 18, 24, 25.10.02  (4 days) AutoCAD Mechanical 6 PowerPack (F) :  21, 22, 23.10 et 4, 5, 6.11.02  (6 jours) Introduction à ANSYS/Introduction to ANSYS (langue à définir suivant demande/ Language to be chosen according to demand):  21 - 25.10.02  (5 jours/days) HREF-2002: Helium Refrigeration Techniques (English-French, bilingual) :  21 - 25.10.2002  (7 half days) HREF-2002: Techniques de la Réfri...

  15. Places available**

    CERN Document Server

    2003-01-01

    Places are available in the following courses : The CERN EDMS for Local Administrators : 24 & 25.9.03 (2 days, free of charge) HeREF-2003 : Techniques de la réfrigération Hélium (cours en français avec support en anglais) : 6 - 10.10.2003 (7 demi-journées) The Java Programming Language Level 1 : 6 - 7.10.2003 (2 days) Java 2 Enterprise Edition - Part 2 : Enterprise JavaBeans : 8 - 10.10.2003 (3 days) FileMaker - niveau 1 : 9 & 10.10.03 (2 jours) EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) AutoCAD 2002 - niveau 1 : 20, 21, 27, 28.10.03 (4 jours) CLEAN-2002 : Working in a Cleanroom : 23.10.03 (half day, free of charge) AutoCAD 2002 - Level 1 : 3, 4, 12, 13.11.03 (4 days) AutoCAD 2002 - niveau 2 : 10 & 11.11.03 (2 jours) ACCESS 2000 - niveau 1 : 13 & 14.11.03 (2 jours) AutoCAD Mechanical 6 PowerPack (E) : 17, 18, 24, 25.11 & 1, 2.12.03 (6...

  16. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Introduction à DesignSpace :  16.10.02  (1 journée) AutoCAD Mechanical 6 PowerPack (F) :  21, 22, 23.10 et 4, 5, 6.11.02  (6 jours) Introduction à ANSYS 21 - 25.10.02  (5 jours/days) HREF-2002: Helium Refrigeration Techniques (English-French, bilingual) :  21 - 25.10.2002  (7 half days) LabVIEW Basics 1 (English):  21 - 23.10.02  (3 days) LabVIEW Basics 2 (English):  24 & 25.10.02  (2 days) Oracle 8i : Access the Database with Java:  7 & 8.11.02  (2 days) AutoCAD 2002 - niveau 2 :  7 & 8.11.02  (2 jours) AutoCAD 2002 - Level 1:  14, 15, 21, 22.11.02  (4 days) LabVIEW - Advanced (English) :  18 - 20.11.2002  (3 days) AutoCAD 2002 - niveau 1 :  19, 20, 25, 26.11.02 (4 jours) Oracle iDS Designer: First Class:&...

  17. Places available**

    CERN Document Server

    2003-01-01

    Places are available in the following courses: CLEAN-2002 : Travailler en salle blanche (séminaire gratuit) : 4.9.03 (une demi-journée) The CERN EDMS for Local Administrators (free of charge) : 24 & 25.9.03 (2 days) HeREF-2003 : Techniques de la réfrigération Hélium (cours en français avec support en anglais) : 6 - 10.10.2003 (7 demi-journées) The Java Programming Language Level 1 : 6 - 7.10.2003 (2 days) Java 2 Enterprise Edition - Part 2 : Enterprise JavaBeans : 8 - 10.10.2003 (3 days) FileMaker - niveau 1 : 9 & 10.10.03 (2 jours) EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) AutoCAD 2002 - niveau 1 : 20, 21, 27, 28.10.03 (4 jours) CLEAN-2002 : Working in a Cleanroom (free of charge) : 23.10.03 (half day) AutoCAD Mechanical 6 PowerPack (E) : 23, 24, 30, 31.10 & 12, 13.11.03 (6 days) AutoCAD 2002 - niveau 2 : 10 & 11.11.03 (2 jours)...

  18. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: The CERN EDMS for Local Administrators : 24 & 25.9.03 (2 days, free of charge) HeREF-2003 : Techniques de la réfrigération Hélium cours en français avec support en anglais) : 6 - 10.10.2003 (7 demi-journées) The Java Programming Language Level 1 : 6 - 7.10.2003 (2 days) Java 2 Enterprise Edition - Part 2 : Enterprise JavaBeans : 8 - 10.10.2003 (3 days) FileMaker - niveau 1 : 9 & 10.10.03 (2 jours) EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) AutoCAD 2002 - niveau 1 : 20, 21, 27, 28.10.03 (4 jours) CLEAN-2002 : Working in a Cleanroom : 23.10.03 (half day, free of charge) AutoCAD 2002 - Level 1 : 3, 4, 12, 13.11.03 (4 days) AutoCAD 2002 - niveau 2 : 10 & 11.11.03 (2 jours) ACCESS 2000 - niveau 1 : 13 & 14.11.03 (2 jours) AutoCAD Mechanical 6 PowerPack (E) : 17, 18, 24, 25.11 & 1, 2.12.03 (6 days) FrontPage 2000 - niveau 1 : 20 & 21.11.03 (2 jours) MAGNE-03 : Magnétisme pour l'électrotechnique : 25 - 27.11.03 (3 jours) ...

  19. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: LabView hands-on (bilingue/bilingual): 5.11.02 (matin/morning) LabView DAQ hands-on (bilingue/bilingual):  5.11.02  (après-midi afternoon) Introduction au PC et Windows 2000 au CERN:  6 & 7.11.02  (2 jours) Oracle 8i : Access the Database with Java:  7 & 8.11.02  (2 days) AutoCAD 2002 - niveau 2:  7 & 8.11.02  (2 jours) Introduction to PVSS (free of charge):  11.11.2002 pm  (1/2 day) Basic PVSS:  12 - 14.11.02  (3 days) EXCEL 2000 - niveau 1:  12 & 13.11.02  (2 jours) CLEAN-2002: Working in a Cleanroom (English, free of charge):  13.11.2002  (afternoon) LabView Base 1 :  13 - 15.11.02  (3 jours) AutoCAD 2002 - Level 1:  14, 15, 21, 22.11.2002  (4 days) LabVIEW - Advanced:  18 - 20.11.02  (3 days) Auto...

  20. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: PIPES-2003 - Pratique du sertissage de tubes métalliques et multicouches :26.8.03(stage pratique) The CERN EDMS for Engineers (free of charge) : 27.8.03 (1 day) CLEAN-2002 : Travailler en salle blanche (séminaire gratuit) : 4.9.03(une demi-journée) The CERN EDMS for Local Administrators (free of charge) : 24 & 25.9.03 (2 days) HeREF-2003 : Techniques de la réfrigération Hélium (cours en français avec support en anglais) : 6 - 10.10.2003 (7 demi-journées) The Java Programming Language Level 1 : 6 - 7.10.2003 (2 days) Java 2 Enterprise Edition - Part 2 : Enterprise JavaBeans : 8 - 10.10.2003 (3 days) FileMaker - niveau 1 : 9 & 10.10.03 (2 jours) EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) AutoCAD 2002 - niveau 1 : 20, 21, 27, 28.10.03 (4 jours) CLEAN-2002 : Working in a Cleanroom (free of charge) : 23.10.03 (half day) AutoCAD Mechanical 6 PowerPack (E) : 23, 24, 30, 31.10 & 12, 13.11.03 (6 days) AutoCAD 2002 - niveau 2...

  1. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses: The CERN EDMS for Local Administrators (free of charge) : 24 & 25.9.03 (2 days) HeREF-2003 : Techniques de la réfrigération Hélium (cours en français avec support en anglais) : 6 - 10.10.2003 (7 demi-journées) The Java Programming Language Level 1 : 6 - 7.10.2003 (2 days) Java 2 Enterprise Edition - Part 2 : Enterprise JavaBeans : 8 - 10.10.2003 (3 days) FileMaker - niveau 1 : 9 & 10.10.03 (2 jours) EXCEL 2000 - niveau 1 : 20 & 22.10.03 (2 jours) AutoCAD 2002 - niveau 1 : 20, 21, 27, 28.10.03 (4 jours) CLEAN-2002 : Working in a Cleanroom (free of charge) : 23.10.03 (half day) AutoCAD Mechanical 6 PowerPack (E) : 23, 24, 30, 31.10 & 12, 13.11.03 (6 days) AutoCAD 2002 - niveau 2 : 10 & 11.11.03 (2 jours) ACCESS 2000 - niveau 1 : 13 & 14.11.03 (2 jours) FrontPage 2000 - niveau 1 : 20...

  2. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: October 2002   Introduction to the CERN Engineering Data Management System (free of charge):  29.10.2002  (1 day) The CERN EDMS for Advanced users (free of charge):  30.10.2002  (1 day) November 2002   LabView hands-on (bilingue/bilingual): 5.11.02 (matin/morning) LabView DAQ hands-on (bilingue/bilingual):  5.11.02  (après-midi afternoon) Introduction au PC et Windows 2000 au CERN :  6 & 7.11.02  (2 jours) Oracle 8i : Access the Database with Java:  7 & 8.11.02  (2 days) AutoCAD 2002 - niveau 2 :  7 & 8.11.02  (2 jours) Introduction to PVSS (free of charge):  11.11.2002 pm  (1/2 day) Basic PVSS:  12 - 14.11.02  (3 days) EXCEL 2000 - niveau 1 :  12 & 13.11.02  (2 jours) CLEAN-2002: Working in a Cleanroom (English, free ...

  3. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Introduction to Oracle 8i : SQL and PL/SQL:  7 - 11.10.02  (5 days) CLEAN-2002 : Working in a Cleanroom (free of charge):  10.10.02  (half-day, p.m.) LabView Hands-on (bilingue/bilingual) : 10.10.02 (matin/morning) LabView DAQ Hands-on (bilingue/bilingual)  10.10.02 (après-midi /afternoon) Introduction à DesignSpace :  16.10.02  (1 journée) Introduction to DesignSpace:  17.10.02  (1 day) AutoCAD Mechanical 6 PowerPack (F) :  21, 22, 23.10 et 4, 5, 6.11.02  (6 jours) Introduction à ANSYS/Introduction to ANSYS (langue à définir suivant demande/ Language to be chosen according to demand):  21 - 25.10.02  (5 jours/days) HREF-2002: Helium Refrigeration Techniques (English-French, bilingual) :  21 - 25.10.2002  (7 half days) HREF-2002: Techniques de la...

  4. PLACES AVAILABLE

    CERN Multimedia

    Enseignement Technique; Tél. 74924; Technical Training; Monique Duval; Tel. 74924

    2000-01-01

    Places are available in the following courses : Premiers pas avec votre PC 12 - 15.9.00 (4 demi-journées) WORD 20, 21 et 26, 27.9.2000 (4 jours) JAVA programming level 1 25 - 26.9.2000 (2 days) Gaz inflammables 1 26.9.2000 (1 journée) Advanced aspects of PERL 5 6.10.2000 (1 day) Initiation au WWW 10 - 12.10.00 (3 demi-journées) WORD : importer et manipuler des images 16.10.2000 (1 journée) FileMaker 17, 18 et 24, 25.10.00 (4 jours) Nouveautés de WORD 19 et 20.10.2000 (2 jours) ACCESS 1er niveau 30 - 31.10.00 (2 jours)Introduction à PowerPoint 6.11.00 (1 journée)Nouveautés d’EXCEL 7.11.2000(4 demi-journées)Excel 13, 14 et 20, 21.11.00 (4 jours) LabView hands-on 13.11.2000(4 hours)LabView Basics 1 14 - 16.11.2000 (3 days) MS-Project 1er niveau 14-17.11.00 (4 demi-journées) If you wish to participate in one of these courses, please discuss with your supervisor and apply elec...

  5. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2002-01-01

    Places are available in the following courses: LabView hands-on : 21.01.02 (1/2 journée) LabView DAQ hands-on : 21.01.02 (1/2 journée) FileMaker Pro : 22 - 25.1.02 (4 jours) MS-Project 2000 : 22, 24 & 25.01.02 (3 jours) Introduction au PC et à Windows 2000 au CERN : 29 - 30.1.02 (2 jours) LabView Base 1 : 4 - 6.2.02 (3 jours) LabView DAQ  (E) :  7 & 8.02.02 (2 days) Hands-on Object-Oriented Design & Programming with Java :  11 - 13.02.02 (3 days) PVSS basics :  11 - 15.2.02 (5 days) Introduction à Windows 2000 : 18.2.02 (1 demi-journée) Introduction to the CERN Engineering Data Management System :  20.2.02 (1 day) The CERN Engineering Data Management System for Advanced users :  21.2.02  (1 day) C++ for Particle Physicists :  11 - 15.3.2002  (6 * 3 hour lectures) Cours sur la migration AutoCAD : AutoCAD : Mise à...

  6. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: LabVIEW - Basics 1 :  10 - 12.12.01 (3 days) Introduction to XML :  12 & 13.12.01 (2 days) Introduction au PC et Windows 2000 : 12 & 14.12.01 (2 jours) LabVIEW - Basics 2 :  13 - 14.12.01 (2 days) Habilitation électrique : superviseurs : 17.12.2001 (1/2 journée) MS-Project 2000 : 10 & 11.01.02 (2 jours) EXCEL 2000 - niveau 2 : 15 - 16.1.02 (2 jours) Sécurité dans les installations cryogéniques: 15-17.1.2002 (2 demi-journées) C++ Programming Level 2 - Traps and Pitfalls :  15 - 18.1.2002  (4 days) ELEC-2002 Winter Term: Readout and system electronics for Physics  15.1.2002 - 7.2.2002 (8 half- days) Nouveautés de WORD 2000 : 18.1.02 (1/2 journée) LabView hands-on : 21.01.02 (1/2 journée) LabView DAQ hands-on : 21.01.02 (1/2 journée) FileMaker Pro : 22 -...

  7. PLACES AVAILABLE

    CERN Multimedia

    Enseignement Technique; Tel. 74924

    2001-01-01

    Places are available in the following courses: MS-Project 2000 : 10 & 11.01.02 (2 jours) EXCEL 2000 - niveau 2 : 15 - 16.1.02 (2 jours) Sécurité dans les installations cryogéniques: 15-17.1.2002 (2 demi-journées) C++ Programming Level 2 - Traps and Pitfalls :  15 - 18.1.2002  (4 days) ELEC-2002 Winter Term: Readout and system electronics for Physics  15.1.2002 - 7.2.2002 (8 half- days) Nouveautés de WORD 2000 : 18.1.02 (1/2 journée) LabView hands-on : 21.01.02 (1/2 journée) LabView DAQ hands-on : 21.01.02 (1/2 journée) FileMaker Pro : 22 - 25.1.02 (4 jours) MS-Project 2000 : 24 & 25.01.02 (2 jours) Introduction au PC et à Windows 2000 au CERN : 29 - 30.1.02 (2 jours) LabView Base 1 : 4 - 6.2.02 (3 jours) LabView DAQ  (E) :  7 & 8.02.02 (2 days) Hands-on Object-Oriented Design & Programming with Java :&nbs...

  8. Places available **

    CERN Multimedia

    2003-01-01

    Des places sont disponibles dans les cours suivants : Places are available in the following courses : WorldFIP 2003 pour utilisateurs : 11-14.2.03 (4 jours) DISP-2003 ? Spring I Term : Introduction to Digital Signal Processing : 20, 27.2, 6, 13, 20, 27.3, 3.4.03 (7 X 2-hour lectures) AXEL-2003 - Introduction to Accelerators : 24-28.2.03 (10 X 1-hour lectures) AutoCAD 2002 - niveau 1 : 24, 25.2 & 3, 4.3.03 (4 jours) Introduction à Windows 2000 au CERN : 25.2.03 (1/2 journée) LabView base 2/LabView Basics 2 : 10 & 11.3.03 (2 jours/2 days) langue à définir/Language to be decided C++ for Particle Physicists : 10 ? 14.3.03 (6 X 3-hour lectures) Introduction to PVSS : 10.3.03 (half day, afternoon) Basic PVSS : 11 - 13.3.03 (3 days) LabView avancé /LabView Advanced : 12 - 14.3.03 (3 jours/3days) Langue à définir/language to be decided AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 17, 18, 24 & 25.3.03 (6 jours) PVSS - JCOP Framework Tutorial : 14.3.03 (1 day) MAGNE-03 - Magnetism for Technical Ele...

  9. Places available **

    CERN Multimedia

    2003-01-01

    Des places sont disponibles dans les cours suivants : Places are available in the following courses : Introduction à Windows 2000 au CERN : 25.2.03 (1/2 journée) LabView base 2/LabView Basics 2 : 10 & 11.3.03 (2 jours/2 days) langue à définir/Language to be decided C++ for Particle Physicists : 10 - 14.3.03 (6 X 3-hour lectures) Introduction to PVSS : 10.3.03 (half day, afternoon) Basic PVSS : 11 - 13.3.03 (3 days) LabView avancé /LabView Advanced : 12 - 14.3.03 (3 jours/3days) Langue à définir/Language to be decided AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 17, 18, 24 & 25.3.03 (6 jours) PVSS - JCOP Framework Tutorial : 14.3.03 (1 day) CLEAN-2002 : Working in a cleanroom : 2.4.03 (half-day, afternoon, free course, registration required) LabView base 1/LabView Basics 1 : 9 - 11.4.03 (3 jours/3 days) Langue à définir/Language to be decided DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (...

  10. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : CLEAN-2002 : Working in a cleanroom (free course, registration required) : 2.4.03 (half-day, afternoon) LabView base 1/LabView Basics 1 (Langue à définir/ language to be decided) : 9 - 11.4.03 (3 jours/3 days) DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03(6 jours) Formation Siemens SIMATIC /Siemens SIMATIC Training : Introduction à STEP7 /Introduction to STEP7 : 3 & 4.6.03 (2 jours/2 days) Programmation STEP7/STEP7 Programming : 31.3 - 4.4.03 / 16 - 20.6.03 (5 jours/5 days) Réseau Simatic Net /Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 These courses will be given in French or English following the requests. Cours de sécurité : Etre TSO au CERN : 3 sessions sont programmées pour 2003 : 25...

  11. Places available **

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : CLEAN-2002 : Working in a cleanroom (free course, registration required): 11.4.03 (half-day, afternoon, ) LabView Basics 2 : 10 - 11.4.03 (3 days) DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) Oracle iDS Reports : Build Internet Reports : 5 - 9.5.03 (5 days) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03 (6 jours) Formation Siemens SIMATIC /Siemens SIMATIC Training : Introduction à STEP7 /Introduction to STEP7 : 3 & 4.6.03 (2 jours/2 days) Programmation STEP7/STEP7 Programming : 31.3 - 4.4.03 / 16 - 20.6.03 (5 jours/5 days) Réseau Simatic Net /Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 These courses will be given in French or English following the requests. Cours de sécurité : Etre TSO au CERN : Prochaines sessions : 24, 25 & 27.6....

  12. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) Oracle iDS Reports : Build Internet Reports : 5 - 9.5.03 (5 days) LabView DAQ (language to be defined) : 8 & 9.5.03 AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03 (6 jours) AutoCAD 2002 - niveau 2 : 3 & 4.6.03 (2 jours) LabView DSC (language to be defined) : 19 & 20.6.03 Siemens SIMATIC Training : Introduction to STEP7 : 3 & 4.6.03 (2 days) STEP7 Programming : 16 - 20.6.03 (5 days) Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 (sessions of 2 days) These courses will be given in French or English following the requests. Cours de sécurité : Etre TSO au CERN : Prochaines sessions : 24, 25 & 27.6.03 - 4, 5 & 7.11.03 (session de 3 jours) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the course description ...

  13. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : CLEAN-2002 : Working in a cleanroom (free course, registration required): 11.4.03 (half-day, afternoon, ) LabView Basics 2 : 10 - 11.4.03 (3 days) DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) Oracle iDS Reports : Build Internet Reports : 5 - 9.5.03 (5 days) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03(6 jours) Formation Siemens SIMATIC /Siemens SIMATIC Training : Introduction à STEP7 /Introduction to STEP7 : 3 & 4.6.03 (2 jours/2 days) Programmation STEP7/STEP7 Programming : 31.3 - 4.4.03 / 16 - 20.6.03 (5 jours/5 days) Réseau Simatic Net /Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 These courses will be given in French or English following the requests. Cours de sécurité : Etre TSO au CERN : Prochaines sessions : 24, 25 & 27.6...

  14. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) Programmation de pilotes périphériques : 5 - 8.5.03 (4 jours) Oracle iDS Reports : Build Internet Reports : 5 - 9.5.03 (5 days) LabView DAQ (language to be defined) : 8 & 9.5.03 AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.0 (6 jours) FrontPage 2000 - niveau 1 : 20 & 21.5.03 (2 jours) AutoCAD 2002 - niveau 2 : 3 & 4.6.03 (2 jours) EXCEL 2000 - niveau 1 : 10 & 11.6.03 (2 jours) EXCEL 2000 - level 1 : 12 & 13.6.03 (2 days) PowerPoint 2000 (F) : 17 & 18.6.03 (2 jours) FrontPage 2000 - niveau 2 : 19 & 20.6.03 (2 jours) LabView DSC (langue à décider/language to be defined) : 19 & 20.6.03 EXCEL 2000 - niveau 2 : 24 & 25.6.03 (2 jours) Siemens SIMATIC Training : Introduction to STEP7 : 3 & 4.6.03 (2 days) STEP7 Programming : 16 - 20.6.03 (5 days) Simatic Net Network : 26 & 27.6.03 ...

  15. Places available **

    CERN Multimedia

    2003-01-01

    Des places sont disponibles dans les cours suivants : Places are available in the following courses : DISP-2003 - Spring I Term : Introduction to Digital Signal Processing : 20, 27.2, 6, 13, 20, 27.3, 3.4.03 (7 X 2-hour lectures) AXEL-2003 - Introduction to Accelerators : 24 - 28.2.03 (10 X 1-hour lectures) AutoCAD 2002 - niveau 1 : 24, 25.2 & 3, 4.3.03 (4 jours) Introduction à Windows 2000 au CERN : 25.2.03 (1/2 journée) LabView base 2/LabView Basics 2 : 10 & 11.3.03 (2 jours/2 days) langue à définir/Language to be decided C++ for Particle Physicists : 10 - 14.3.03 (6 X 3-hour lectures) Introduction to PVSS : 10.3.03 (half day, afternoon) Basic PVSS : 11 - 13.3.03 (3 days) LabView avancé /LabView Advanced : 12 - 14.3.03 (3 jours/3days) Langue à définir/language to be decided AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 17, 18, 24 & 25.3.03 (6 jours) PVSS - JCOP Framework Tutorial : 14.3.03 (1 day) CLEAN-2002 : Working in a cleanroom : 2.4.03 (half-day, afternoon, free course, regis...

  16. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : CLEAN-2002 : Working in a cleanroom (free course, registration required): 11.4.03 (half-day, afternoon) LabView Basics 2 : 10 - 11.4.03 (3 days) DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) Oracle iDS Reports : Build Internet Reports : 5 - 9.5.03 (5 days) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03(6 jours) Formation Siemens SIMATIC /Siemens SIMATIC Training : Introduction à STEP7 /Introduction to STEP7 : 3 & 4.6.03 (2 jours/2 days) Programmation STEP7/STEP7 Programming : 16 - 20.6.03 (5 jours/5 days) Réseau Simatic Net /Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 These courses will be given in French or English following the requests. Cours de sécurité : Etre TSO au CERN : Prochaines sessions : 24, 25 & 27.6.03 - 4, 5 & 7....

  17. Places available **

    CERN Multimedia

    2003-01-01

    Des places sont disponibles dans les cours suivants : Places are available in the following courses : C++ for Particle Physicists : 10 - 14.3.03 (6 X 3-hour lectures) Introduction to PVSS : 10.3.03 (half day, afternoon) Basic PVSS : 11 - 13.3.03 (3 days) PVSS - JCOP Framework Tutorial : 14.3.03 (1 day) CLEAN-2002 : Working in a cleanroom : 2.4.03 (half-day, afternoon, free course, registration required) LabView base 1/LabView Basics 1 : 9 - 11.4.03 (3 jours/3 days) Langue à définir/language to be decided DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures) AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03 (6 jours) Formation Siemens SIMATIC /Siemens SIMATIC Training : Introduction à STEP7 /Introduction to STEP7 : 11 & 12.3.03 / 3 & 4.6.03 (2 jours/2 days) Programmation STEP7/STEP7 Programming : 31.3 - 4.4.03 / 16...

  18. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : Introduction to PVSS : 10.3.03 (half-day, afternoon) CLEAN-2002 : Working in a cleanroom : 2.4.03 (half-day, afternoon, free course, registration required) LabView Basics 1 : 9 - 11.4.03 (3 days) Language to be decided. DISP-2003 - Spring II Term : Advanced Digital Signal Processing : 30.4, 7, 14, 21.5.03 (4 X 2-hour lectures). AutoCAD 2002 - niveau 1 : 29, 30.4 et 7, 8.5.03 (4 jours) AutoCAD 2002 - niveau 2 : 5 & 6.5.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 12, 13, 20, 21, 27 & 28.5.03 (6 jours) Siemens SIMATIC Training: Introduction to STEP7 : 3 & 4.6.03 (2 days) STEP7 Programming : 31.3 - 4.4.03 / 16 - 20.6.03 (5 days) Simatic Net Network : 15 & 16.4.03 / 26 & 27.6.03 These courses will be given in French or English following the requests. Cours de sécurité: Etre TSO au CERN : 3 sessions sont programmées pour 2003 : 25, 26 & 28.3.03 - 24, 25 & 27.6.03 - 4, 5 & 7.11.03 (sessions de 3 jours) ** The number o...

  19. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: November 2002   Introduction to PVSS (free of charge): 11.11.02  (afternoon) EXCEL 2000 - niveau 1 :  12 & 13.11.02  (2 jours) CLEAN-2002: Working in a Cleanroom (English, free of charge):  13.11.2002  (afternoon) AutoCAD 2002 - niveau 1 :  14, 15, 21, 22.11.02  (4 jours) Hands-on Object-Oriented Design and Programming with C++:  19 - 21.11.02  (3 days)  EXCEL 2000 - niveau 2 :  25 & 26.11.02  (2 jours) FrontPage 2000 - niveau 1 :  27 & 28.11.02  (2 jours) December 2002   LabVIEW - DSC (English) :  2 - 3.12.02  (2 days) AutoCAD 2002 - niveau 2 :  2 & 3.12.02  (2 jours) FileMaker (Français) :  2 - 5.12.02  (4 jours) PCAD Schémas - Débutants :  5 & 6.12.02 ...

  20. PLACES AVAILABLE

    CERN Multimedia

    Technical training; Tel. 74924

    2001-01-01

    Places are available in the following courses: PROFIBUS : 25 - 26.9.01 (2 jours) PROFIBUS : 27 - 28.9.01 (2 days) Automates et réseaux de terrain : 3 - 4.10.2001 (2 jours) PCAD Schémas - débutants : 4 - 5.10.01 (2 jours) PCAD PCB - débutants : 8 - 10.10.01 (3 jours) Programmation TSX Premium 1 : 15 - 19.10.01 (5 jours) Programmation TSX Premium 1 : 22 - 26.10.01 (5 jours) Programming TSX Premium 2: 19 - 23.11.01 (5 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) Autocad Migration support courses: a detailed calendar will be published shortly for this series of sessions which will start on 15.10.2001. Registration is already open AutoCAD : Mise à jour AutoCAD r-14 vers 2002 (2 jours) AutoCAD Mechanical PowerPack 6 basé sur AutoCAD 2002 (5 jours) The following LabView courses will be given in either English or French according to demand LabVIEW - Base 1 / LabVIEW - Basics 1 : 10 - 12.9.01 (3 jours / 3 days)...

  1. PLACES AVAILABLES

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: PVSS Basics : 20 - 24.8.01 (5 days) PROFIBUS : 25 - 26.9.01 (2 jours) PROFIBUS : 27 - 28.9.01 (2 days) PCAD Schémas - débutants : 4 - 5.10.01 (2 jours) PCAD PCB - débutants : 8 - 10.10.01 (3 jours) Programming TSX Premium 1: 15 - 19.10.01 (5 days) Programmation TSX Premium 1 : 22 - 26.10.01 (5 jours) Programming TSX Premium 2: 19 - 23.11.01 (5 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) The following LabView courses will be given in either English or French according to demand LabVIEW - Base 1 / LabVIEW - Basics 1 : 10 - 12.9.01 (3 jours / 3 days) LabVIEW - DAQ / LabVIEW - DAQ : 13 - 14.9.01 (2 jours / 2 days) LabVIEW - Base 1 / LabVIEW - Basics 1 : 15 - 17.10.01 (3 jours / 3 days) LabVIEW - Base 2 / LabVIEW - Basics 2 : 18 - 19.10.01 (2 jours / 2 days) LabVIEW - Base 1 / LabVIEW - Basics 1 : 12 - 14.11.01 (3 jours / 3 days) LabVIEW - DAQ / LabVIEW - DAQ : 15 - 16.11.01 (2 jours / 2...

  2. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: November 2002   LabView hands-on (bilingue/bilingual): 5.11.02 (matin/morning) LabView DAQ hands-on (bilingue/bilingual):  5.11.02  (après-midi afternoon) PCAD Schémas - Débutants :  5 & 6.11.02  (2 jours) PCAD PCB - Débutants :  9 - 11.11.02  (3 jours) Introduction au PC et Windows 2000 au CERN :  6 & 7.11.02  (2 jours) Oracle 8i : Access the Database with Java :  7 & 8.11.02  (2 days) Introduction to PVSS (free of charge):  11.11.2002 pm  (1/2 day) Basic PVSS:  12 - 14.11.02  (3 days) EXCEL 2000 - niveau 1 :  12 & 13.11.02  (2 jours) CLEAN-2002: Working in a Cleanroom (English, free of charge):  13.11.2002  (afternoon) LabView Base 1 :  13 - 15.11.02  (3 jours) AutoCAD 2002 - niveau 1 :  14, 15, 21, 22.11.02  (4 jours) LabVIEW - Advanced:  18 - 20.11.02  (3 days) Hands-on Object-Oriented Design and Programming with C++ :  19 - 21.11.02  (3 days)  LabVIEW - Basics 2:  21 - 22.11.02 ...

  3. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : EXCEL 2000 - niveau 1 : 10 & 11.6.03 (2 jours) Conception de PCB rapides dans le flot Cadence : 11.6.03 (matin) EXCEL 2000 - level 1 : 12 & 13.6.03 (2 days) Introduction to PVSS : 16.6.03 (p.m.) Basic PVSS : 17 - 19.6.03 (3 days) Réalisation de PCB rapides dans le flot Cadence : 17.6.03 (matin) PVSS - JCOP Framework Tutorial : 20.6.03 (1 day) EXCEL 2000 - niveau 2 : 24 & 25.6.03 (2 jours) Siemens SIMATIC Training : Introduction to STEP7 : 3 & 4.6.03 (2 jours/2 days) STEP7 Programming : 16 - 20.6.03 (5 jours/5 days) Simatic Net Network : 26 & 27.6.03 (2 jours/2 days) These courses will be given in French or English following the requests. Programmation automate Schneider : Programmation automate Schneider TSX Premium - 1er niveau : 10 - 13.6.03 (4 jours) - audience : toute personne qui veux maitriser la msie en uvre et la programmation d'un automate TSX Premium - objectifs : maitriser la mise en uvre et la programmation d'un autom...

  4. Places available**

    CERN Multimedia

    2003-01-01

    Places are available in the following courses : FrontPage 2000 - niveau 1 : 20 & 21.5.03 (2 jours) PIPES-2003 : Pratique du sertissage de tubes métalliques et multicouches : 21.5.03 (1 jour) Introduction à la CAO Cadence : de la saisie de schéma Concept-HDL au PCB : 20 & 22.5.03 (2 jours) AutoCAD 2002 - niveau 2 : 3 & 4.6.03 (2 jours) AutoCAD Mechanical 6 PowerPack (F) : 5, 6, 12, 13, 26, 27.6.03 (6 jours) EXCEL 2000 - niveau 1 : 10 & 11.6.03 (2 jours) Conception de PCB rapides dans le flot Cadence : 11.6.03 (matin) EXCEL 2000 - level 1 : 12 & 13.6.03 (2 days) PowerPoint 2000 (F) : 17 & 18.6.03 (2 jours) Réalisation de PCB rapides dans le flot Cadence : 17.6.03 (matin) FrontPage 2000 - niveau 2 : 19 & 20.6.03 (2 jours) LabView DSC (langue à décider/language to be defined) : 19 & 20.6.03 EXCEL 2000 - niveau 2 : 24 & 25.6.03 (2 jours) Siemens SIMATIC Training: Introduction to STEP7 : 3 & 4.6.03 (2 days) STEP7 Programming : 16 - 20.6.03 (5 days) Simatic...

  5. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: PVSS Basics : 20 - 24.8.01 (5 days) PROFIBUS : 25 - 26.9.01 (2 jours) PROFIBUS : 27 - 28.9.01 (2 days) PCAD Schémas - débutants : 4 - 5.10.01 (2 jours) PCAD PCB - débutants : 8 - 10.10.01 (3 jours) Programming TSX Premium 1: 15 - 19.10.01 (5 days) Programmation TSX Premium 1 : 22 - 26.10.01 (5 jours) Programming TSX Premium 2: 19 - 23.11.01 (5 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) The following LabView courses will be given in either English or French according to demand LabVIEW - Base 1 / LabVIEW - Basics 1 : 10 - 12.9.01 (3 jours / 3 days) LabVIEW - DAQ / LabVIEW - DAQ : 13 - 14.9.01 (2 jours / 2 days) LabVIEW - Base 1 / LabVIEW - Basics 1 : 15 - 17.10.01 (3 jours / 3 days) LabVIEW - Base 2 / LabVIEW - Basics 2 : 18 - 19.10.01 (2 jours / 2 days) LabVIEW - Base 1 / LabVIEW - Basics 1 : 12 - 14.11.01 (3 jours / 3 days) LabVIEW - DAQ / LabVIEW - DAQ : 15 - 16.11.01 (2 jours / 2...

  6. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Introduction à Windows 2000 au CERN : 2 sessions de _ journée les 24 et 25.9.01 PROFIBUS : 25 - 26.9.01 (2 jours) PROFIBUS : 27 - 28.9.01 (2 days) PowerPoint 2000 : 1 et 2.10.01 (2 jours) EXCEL 2000 - niveau 1 : 3 et 4.10.01 (2 jours) Automates et réseaux de terrain : 3 - 4.10.2001 (2 jours) PCAD Schémas - débutants : 4 - 5.10.01 (2 jours) Introduction à Outlook : 5.10.01 (1 journée) Frontpage 2000 - niveau 1 : 8 et 9.10.01 (2 jours) PCAD PCB - débutants : 8 - 10.10.01 (3 jours) C++ for Particle Physicists : 8 - 12.10.01 (6 3-hour lectures) MS-Project 2000 - niveau 1 : 15 - 18.10.01 (4 demi-journées) LabView Basics 1 :  15 - 17.10.01  (3 days) Programmation TSX Premium 1 : 15 - 19.10.01 (5 jours) WORD 2000 : importer et manipuler des images : 19.10.01 (1 journée) Programmation TSX Premium 1 : 22 - 26.10.01...

  7. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Cadence Board Design tools : Upgrading to release 14 :  3 1-day sessions on 9, 10 & 11.10.01 MS-Project 2000 - niveau 1 : 15 - 18.10.01 (4 demi-journées) LabView Base 2 : 18 & 19.10.01 (2 jours) WORD 2000 : importer et manipuler des images : 19.10.01 (1 journée) Contract Follow-up (F) :  30.10.01 (1/2 journée) The CERN Engineering Data Management System for Electronics Design :  30.10.01 (1 day) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) The Java programming language Level 1: 8 - 9.11.01 (2 days) LabView Base 1 : 12 - 14.11.01 (3 jours) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to XML :  19 - 20.11.01 (2 days) Programming TSX Premium 1 :  19 - 23.11.01  (5 days) Introduction to C Programming :  21- 23.11.01 (3 days) The Java programming language Level 2:  26 - 28.11.01 (...

  8. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Introduction à Windows 2000 au CERN : 2 sessions de _ journée les 24 et 25.9.01 PROFIBUS : 25 - 26.9.01 (2 jours) PROFIBUS : 27 - 28.9.01 (2 days) EXCEL 2000 - niveau 1 : 3 et 4.10.01 (2 jours) Automates et réseaux de terrain : 3 - 4.10.2001 (2 jours) Introduction à Outlook : 5.10.01 (1 journée) Frontpage 2000 - niveau 1 : 8 et 9.10.01 (2 jours) C++ for Particle Physicists : 8 - 12.10.01 (6 lectures) MS-Project 2000 - niveau 1 : 15 - 18.10.01 (4 demi-journées) Programmation TSX Premium 1 : 15 - 19.10.01 (5 jours) WORD 2000 : importer et manipuler des images : 19.10.01 (1 journée) Programmation TSX Premium 1 : 22 - 26.10.01 (5 jours) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) The Java programming language Level 1: 8 - 9.11.01 (2 days) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to XML :  19 - 20.11.01 (2...

  9. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: EXCEL 2000 - niveau 1 : 3 et 4.10.01 (2 jours) Automates et réseaux de terrain : 3 - 4.10.2001 (2 jours) Introduction à Outlook : 5.10.01 (1 journée) C++ for Particle Physicists : 8 - 12.10.01 (6 lectures) Cadence Board Design tools : Upgrading to release 14 : 3 1-day sessions on 9, 10 & 11.10.01 MS-Project 2000 - niveau 1 : 15 - 18.10.01 (4 demi-journées) LabView Base 2 : 18 & 19.10.01 (2 jours) WORD 2000 : importer et manipuler des images : 19.10.01 (1 journée) The CERN Engineering Data Management System for Electronics Design :  30.10.01 (1 day) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) The Java programming language Level 1: 8 - 9.11.01 (2 days) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to XML :  19 - 20.11.01 (2 days) Programming TSX Premium 1 :  19 - 23.11.01  (5 days) Introd...

  10. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: MS-Project 2000 - niveau 1 : 15 - 18.10.01 (4 demi-journées) LabView Base 2 : 18 & 19.10.01 (2 jours) WORD 2000 : importer et manipuler des images : 19.10.01 (1 journée) Contract Follow-up (F) : 30.10.01 (1/2 journée) The CERN Engineering Data Management System for Electronics Design :  30.10.01 (1 day) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) The Java programming language Level 1: 8 - 9.11.01 (2 days) LabView Base 1 : 12 - 14.11.01 (3 jours) Automates et réseaux de terrain : 13 & 14.11.01 (2 jours) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to XML :  19 - 20.11.01 (2 days) Programming TSX Premium 1 :  19 - 23.11.01  (5 days) Introduction to C Programming :  21- 23.11.01 (3 days) The Java programming language Level 2:  26 - 28.11.01 (3 days) Programmation TSX Premium 2 : 26 ...

  11. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: LabView Base 1 :  23 - 25.9.02  (3 jours) Object-Oriented Analysis & Design using UML:  25 - 27.9.02  (3 days) LabView DAQ (E):  26 - 27.9.02  (2 days) Introduction to Oracle 8i : SQL and PL/SQL:  7 - 11.10.02  (5 days) CLEAN-2002 : Working in a Cleanroom (free of charge):  10.10.02  (half-day, p.m.) AutoCAD 2002 - niveau 2 :  14 - 15.10.02  (2 jours) Introduction à DesignSpace :  16.10.02  (1 journée) Introduction to DesignSpace:  17.10.02  (1 day) AutoCAD 2002 - Level 1:  17, 18, 24, 25.10.02  (4 days) AutoCAD Mechanical 6 PowerPack (F) :  21, 22, 23.10 et 4, 5, 6.11.02  (6 jours) Introduction à ANSYS/Introduction to ANSYS (langue à définir suivant demande/ Language to be chosen according to demand):...

  12. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Java 2 Enterprise Edition - Part 2: Enterprise JavaBeans:  18 - 20.9.02  (3 days) AutoCAD 2002 - niveau 1 :  19, 20, 26, 27.9.02  (4 jours) LabView Base 1 :  23 - 25.9.02  (3 jours) Object-Oriented Analysis & Design using UML:  25 - 27.9.02  (3 days) LabView DAQ (E):  26 - 27.9.02  (2 days) Introduction to Oracle 8i : SQL and PL/SQL:  7 - 11.10.02  (5 days) CLEAN-2002 : Working in a Cleanroom (free of charge):  10.10.02  (half-day, p.m.) AutoCAD 2002 - niveau 2 :  14 - 15.10.02  (2 jours) Introduction à DesignSpace :  16.10.02  (1 journée) Introduction to DesignSpace:  17.10.02  (1 day) AutoCAD 2002 - Level 1:  17, 18, 24, 25.10.02  (4 days) AutoCAD Mechanical 6 PowerPack (F) :  21, 22, 23.10 et 4, 5, 6.11....

  13. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Automates et réseaux de terrain : 13 & 14.11.01 (3 jours) Introduction à Windows 2000 au CERN : 12 - 14.11.01 (1/2 journée) Introduction to Windows 2000 at CERN :  14.11.01  (half-day) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Sécurité dans les installations cryogéniques : 21 - 22.11.2001 (2 demi-journées) Introduction to C Programming :  21- 23.11.01 (3 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) Contract Follow-up (F) : 26.11.01 (1/2 journée) Object-Oriented Analysis and Design :  27 - 30.11.2001  (4 days) Introduction to the CERN Engineering Data Management System :  30.11.2001 (1 day) Electromagnetic Compatibility (EMC): Introduction (bilingual) :  3.12.01 (half-day) Introduction to the CERN Engineering Data Management System : 07.12.2001...

  14. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Contract Follow-up (F) : 30.10.01 (1/2 journée) The CERN Engineering Data Management System for Electronics Design :  30.10.01 (1 day) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) Nouveautés d'EXCEL : 5.11.01 (1/2 journée) Introduction a Windows 2000 au CERN : 6.11.01 (1/2 journée) The Java programming language Level 1: 8 - 9.11.01 (2 days) LabView Base 1 : 12 - 14.11.01 (3 jours) Automates et réseaux de terrain : 13 & 14.11.01 (2 jours) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to XML :  19 - 20.11.01 (2 days) Programming TSX Premium 1 :  19 - 23.11.01  (5 days) Introduction to C Programming :  21- 23.11.01 (3 days) The Java programming language Level 2:  26 - 28.11.01 (3 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) Autocad Migration support courses: a detail...

  15. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Contract Follow-up (F) : 30.10.01 (1/2 journée) The CERN Engineering Data Management System for Electronics Design :  30.10.01 (1 day) Nouveautés d'Excel 2000 : 5.11.01 (1/2 journée) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) Introduction à Windows 2000 au CERN : 6.11.01 (1/2 journée) The Java programming language Level 1: 8 - 9.11.01 (2 days) LabView Base 1 : 12 - 14.11.01 (3 jours) LabVIEW DAQ (F) : 15 & 16.11.01 (2 jours) Automates et réseaux de terrain : 13 & 14.11.01 (2 jours) Introduction to PERL 5 :  15 - 16.11.01  (2 days) LabVIEW - DAQ : 15 - 16.11.01 (2 jours) Introduction to XML :  19 - 20.11.01 (2 days) Introduction to C Programming :  21- 23.11.01 (3 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) Object-Oriented Analysis and Design :  27 - 30.11.2001 (4 days) Hands...

  16. PLACES AVAILABLE

    CERN Multimedia

    Technical Training; Tel. 74924

    2001-01-01

    Places are available in the following courses: Nouveautés d'EXCEL : 5.11.01 (1/2 journée) Introduction a Windows 2000 au CERN : 6.11.01 (1/2 journée) UNIX pour non-programmeurs : 5 - 7.11.01 (3 jours) Design Patterns :  7 - 8.11.01 (2 days) The Java programming language Level 1: 8 - 9.11.01 (2 days) Automates et réseaux de terrain : 13 & 14.11.01 (3 jours) Introduction à Windows 2000 au CERN : 12 - 14.11.01 (1/2 journée) Introduction to Windows 2000 at CERN :  14.11.01  (half-day) Introduction to PERL 5 :  15 - 16.11.01  (2 days) Introduction to C Programming :  21- 23.11.01 (3 days) Programmation TSX Premium 2 : 26 - 30.11.01 (5 jours) Contract Follow-up (F) : 26.11.01 (1/2 journée) Object-Oriented Analysis and Design :  27 - 30.11.2001  (4 days) Hands-on Object-Oriented Design and Programming with C++ :  11 - 13.12.2...

  17. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: ELEC-2002 : Spring Term :  9, 11, 16, 18, 23, 25, 30.4.02 (7 * 2.5 hours) Object-Oriented Analysis & Design: 16 - 19.4.02  (4 days) The CERN Engineering Data Management System for Advanced users:  16.4.02  (1 day) Migration from AutoCAD 14 towards AutoCAD Mechanical6 PowerPack:  17 - 19.4 and 2 &3.5.02  (5 days) AutoCAD - niveau 1 : 22, 23, 29, 30.4 et 6, 7.5.02 (6 jours) LabVIEW base 1 : 22 - 24.4.02 (3 jours) CLEAN 2002 : working in a cleanroom:  24.4.02  (half-day, pm) LabVIEW DSC (F) 25 & 26.4.02 (2 jours) AutoCAD : Mise à jour AutoCAD r-14 vers 2002 : 25 & 26.4.02 (2 jours) Cotations selon les normes GPS de l'ISO : 29 - 30.4.02 (2 jours) Introduction to the CERN Engineering Data Management System:  7.5.02  (1 day) LabVIEW Basics 2 : 13 & 14.5.02 (2 days) AutoCAD Mechanical 6 PowerPack (F) : 13-...

  18. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: Introduction to the CERN Engineering Data Management System:  7.5.02  (1 day) LabVIEW Basics 2: 13 & 14.5.02 (2 days) AutoCAD Mechanical 6 PowerPack (F) : 13-14, 17, 21, 27-28.5.02 (6 jours) WorldFIP - Généralités : 14.5.2002 (1/2 journée) WorldFIP - Développer avec MicroFIP HANDLER : 14.5 - après-midi, 15.5.02 - matin (1 jour) WorldFIP - FullFIP FDM : FIP Device Manager (F) : 15.5 - après-midi, 16.5.02 - matin (1 jour) LabVIEW DAQ (F) : 15 & 16.5.02 (2 jours) EXCEL 2000 - niveau 2 : 22 & 23.5.02 (2 jours) The CERN Engineering Data Management System for Advanced users:  30.5.02  (1 day) LabVIEW Basics 1:  3 - 5.6.02  (3 days) AutoCAD 2002 - condensé : 4 - 6.6.02 (3 jours) LabVIEW DAQ (E):  6 & 7.6.02  (2 days) AutoCAD 2002 - Level 1:  10 - ...

  19. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: The CERN Engineering Data Management System for Advanced users : 16.4.02  (1 day) Migration from AutoCAD 14 towards AutoCAD Mechanical6 PowerPack:  17 - 19.4 and 2 &3.5.02  (5 days) AutoCAD - niveau 1 : 22, 23, 29, 30.4 et 6, 7.5.02 (6 jours) LabVIEW base 1 : 22 - 24.4.02 (3 jours) CLEAN 2002 : working in a cleanroom:  24.4.02  (half-day, pm) LabVIEW DSC (F) 25 & 26.4.02 (2 jours) AutoCAD : Mise à jour AutoCAD r-14 vers 2002 : 25 & 26.4.02 (2 jours) Cotations selon les normes GPS de l'ISO : 29 - 30.4.02 (2 jours) Introduction to the CERN Engineering Data Management System:  7.5.02  (1 day) LabVIEW Basics 2: 13 & 14.5.02 (2 days) AutoCAD Mechanical 6 PowerPack (F) : 13-14, 17, 21, 27-28.5.02 (6 jours) WorldFIP - Généralités : 14.5.2002 (1/2 journée) WorldFIP - Développer avec Micr...

  20. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: LabVIEW Basics 2: 13 & 14.5.02 (2 days) WorldFIP - Généralités : 14.5.2002 (1/2 journée) WorldFIP - Développer avec MicroFIP HANDLER : 14.5 - après-midi, 15.5.02 - matin (1 jour) WorldFIP - FullFIP FDM : FIP Device Manager (F) : 15.5 - après-midi, 16.5.02 - matin (1 jour) LabVIEW DAQ (F) : 15 & 16.5.02 (2 jours) EXCEL 2000 - niveau 2 : 22 & 23.5.02 (2 jours) The CERN Engineering Data Management System for Advanced users:  30.5.02  (1 day) LabVIEW Basics 1:  3 - 5.6.02  (3 days) AutoCAD 2002 - condensé : 4 - 6.6.02 (3 jours) LabVIEW DAQ (E):  6 & 7.6.02  (2 days) AutoCAD 2002 - Level 1:  10 - 12 and 24 - 26.6.02  (6 days) If you wish to participate in one of these courses, please discuss with your supervisor and apply electronically directly from the c...

  1. PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2002-01-01

    Places are available in the following courses: LabVIEW base 1 : 22 - 24.4.02 (3 jours) CLEAN 2002 : working in a cleanroom:  24.4.02  (half-day, pm) LabVIEW DSC (F) 25 & 26.4.02 (2 jours) AutoCAD : Mise à jour AutoCAD r-14 vers 2002 : 25 & 26.4.02 (2 jours) Cotations selon les normes GPS de l'ISO : 29 - 30.4.02 (2 jours) Introduction to the CERN Engineering Data Management System:  7.5.02  (1 day) LabVIEW Basics 2: 13 & 14.5.02 (2 days) AutoCAD Mechanical 6 PowerPack (F) : 13-14, 17, 21, 27-28.5.02 (6 jours) WorldFIP - Généralités : 14.5.2002 (1/2 journée) WorldFIP - Développer avec MicroFIP HANDLER : 14.5 - après-midi, 15.5.02 - matin (1 jour) WorldFIP - FullFIP FDM : FIP Device Manager (F) : 15.5 - après-midi, 16.5.02 - matin (1 jour) LabVIEW DAQ (F) : 15 & 16.5.02 (2 jours) EXCEL 2000 - niveau 2 : 22 & 23.5.02 (2 jours)...

  2. [Not Available].

    Science.gov (United States)

    Spivak, M

    1987-01-01

    Some ideas, whether right or wrong, seem never to die, whatever might be the general evolution of knowledge, of science, or simply of good common sense. This is exactly the case with physical education or sports. For centuries, and especially since the middle of the nineteenth century, its advocates have fought for recognition of its all-round virtues, taken as a concept. But to attain a high level of recognition, not only in society but in official government circles, certain conditions were necessary. Education as a whole, around the middle of the nineteenth century, had to be strict and similar to military drill to be considered efficient, although the French middle classes and bourgeoisie had very little taste for the military. Although they admired physical prowess they had a horror of regimentation. But later on, when the Prussians so easily defeated Austria, feelings of doubt in French superiority began to spread, and a handful of theoreticians of physical exercise tried to show that to combat the so-called degeneration of the race, it was essential to impose a system of education in which physical exercise, coupled with military drill, still had an important place. As scientific arguments they referred to the theories of evolution and its then accepted principle, according to Lamarck, or the transmission of acquired properties and character. Darwin was still unknown in France at that time. These zealous advocates succeeded in convincing the Minister of Public Education, Victor Duruy, to include gymnastics in the normal course of studies in all schools, and by 1869 one can say that a craze for all types of physical exercise and sport had spread into many levels of society. That was the start of a never-ending movement which has passed through various stages of evolution corresponding to the changes in society itself. It has therefore changed its methods, its ways, its forms, but the overall principle remains the same, in spite of the improved understanding

  3. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding.

    Science.gov (United States)

    Wang, Xiaogang; Chen, Wen; Chen, Xudong

    2014-09-22

    We present a novel image hiding method based on phase retrieval algorithm under the framework of nonlinear double random phase encoding in fractional Fourier domain. Two phase-only masks (POMs) are efficiently determined by using the phase retrieval algorithm, in which two cascaded phase-truncated fractional Fourier transforms (FrFTs) are involved. No undesired information disclosure, post-processing of the POMs or digital inverse computation appears in our proposed method. In order to achieve the reduction in key transmission, a modified image hiding method based on the modified phase retrieval algorithm and logistic map is further proposed in this paper, in which the fractional orders and the parameters with respect to the logistic map are regarded as encryption keys. Numerical results have demonstrated the feasibility and effectiveness of the proposed algorithms.

  4. Comparison of a Commercially Available Repetitive-Element PCR System (DiversiLab) with PCR Ribotyping for Typing of Clostridium difficile Strains ▿

    OpenAIRE

    Eckert, C.; Van Broeck, J.; Spigaglia, P.; Burghoffer, B.; Delmée, M.; Mastrantonio, P.; Barbut, F.

    2011-01-01

    This study compared a repetitive-element PCR (rep-PCR) method (DiversiLab system) to PCR ribotyping. The discriminatory power of rep-PCR was 0.997. Among the PCR ribotype 027 isolates tested, different rep types could be distinguished. rep-PCR showed a higher discriminatory power than PCR ribotyping. Nevertheless, this method requires technical skill, and visual interpretation of rep-PCR fingerprint patterns may be difficult.

  5. Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2015-05-01

    A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  6. Costly hide and seek pays: unexpected consequences of deceit in a social dilemma

    International Nuclear Information System (INIS)

    Szolnoki, Attila; Perc, Matjaž

    2014-01-01

    Deliberate deceptiveness intended to gain an advantage is commonplace in human and animal societies. In a social dilemma, an individual may only pretend to be a cooperator to elicit cooperation from others, while in reality he is a defector. With this as motivation, we study a simple variant of the evolutionary prisoner's dilemma game entailing deceitful defectors and conditional cooperators that lifts the veil on the impact of such two-faced behavior. Defectors are able to hide their true intentions at a personal cost, while conditional cooperators are probabilistically successful at identifying defectors and act accordingly. By focusing on the evolutionary outcomes in structured populations, we observe a number of unexpected and counterintuitive phenomena. We show that deceitful behavior may fare better if it is costly, and that a higher success rate of identifying defectors does not necessarily favor cooperative behavior. These results are rooted in the spontaneous emergence of cycling dominance and spatial patterns that give rise to fascinating phase transitions, which in turn reveal the hidden complexity behind the evolution of deception. (paper)

  7. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    Science.gov (United States)

    Christandl, Matthias; Ferrara, Roberto

    2017-12-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005), 10.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.

  8. Synthesis of Citric-Acrylate Oligomer and its in-Situ Reaction with Chrome Tanned Collagen (hide powder)

    International Nuclear Information System (INIS)

    Haroun, A.A.; Masoud, R.A.; Bronco, S.; Ciardelli, F.

    2005-01-01

    The purpose of this study was to formulate the new combined system of acrylic and citric acids, which has been prepared by free radical polymerization and esterification reaction at the same time to form citric acrylate (CAC) oligomer through ester linkage and low molecular weight (Mw 2241), in compared with polyacrylic acid. The chemical structure and the reaction mechanism of this oligomer were confirmed by different spectroscopic tools (1 H , 13 C-NMR, ATR-IR), gel permeation chromatography and thermogravimetric analysis (TGA/DTA). The problem of the effect of the masking agents in the chrome tanning of the collagen and the pickling of the hide has been approached from the study of the hydrothermal and mechanical properties, using this new eco-friendly oligomer, which was carried out in-situ treated/grafted chrome tanned collagen (hide powder), and pickled hide. The microemulsion grafting copolymerization of (CAC) using 2.2-azo-bis isobutyronitrile (ABIN), via direct coupling reaction, onto the chrome tanned collagen showed that the free amino groups of the collagen were considered to be a potential site for the in-situ reaction with (CAC) oligomer. Also, using of citric-acrylate (CAC) oligomer, during chrome tanning of leather, instead of the traditional strong acids (sulfuric, hydrochloric and formic) resulted in significant improvement in chrome exhaustion and physical properties

  9. A Data Hiding Technique to Synchronously Embed Physiological Signals in H.264/AVC Encoded Video for Medicine Healthcare.

    Science.gov (United States)

    Peña, Raul; Ávila, Alfonso; Muñoz, David; Lavariega, Juan

    2015-01-01

    The recognition of clinical manifestations in both video images and physiological-signal waveforms is an important aid to improve the safety and effectiveness in medical care. Physicians can rely on video-waveform (VW) observations to recognize difficult-to-spot signs and symptoms. The VW observations can also reduce the number of false positive incidents and expand the recognition coverage to abnormal health conditions. The synchronization between the video images and the physiological-signal waveforms is fundamental for the successful recognition of the clinical manifestations. The use of conventional equipment to synchronously acquire and display the video-waveform information involves complex tasks such as the video capture/compression, the acquisition/compression of each physiological signal, and the video-waveform synchronization based on timestamps. This paper introduces a data hiding technique capable of both enabling embedding channels and synchronously hiding samples of physiological signals into encoded video sequences. Our data hiding technique offers large data capacity and simplifies the complexity of the video-waveform acquisition and reproduction. The experimental results revealed successful embedding and full restoration of signal's samples. Our results also demonstrated a small distortion in the video objective quality, a small increment in bit-rate, and embedded cost savings of -2.6196% for high and medium motion video sequences.

  10. Wild-type MIC distributions of four fluoroquinolones active against Mycobacterium tuberculosis in relation to current critical concentrations and available pharmacokinetic and pharmacodynamic data.

    Science.gov (United States)

    Angeby, K A; Jureen, P; Giske, C G; Chryssanthou, E; Sturegård, E; Nordvall, M; Johansson, A G; Werngren, J; Kahlmeter, G; Hoffner, S E; Schön, T

    2010-05-01

    To describe wild-type distributions of the MIC of fluoroquinolones for Mycobacterium tuberculosis in relation to current critical concentrations used for drug susceptibility testing and pharmacokinetic/pharmacodynamic (PK/PD) data. A 96-stick replicator on Middlebrook 7H10 medium was used to define the MICs of ciprofloxacin, ofloxacin, moxifloxacin and levofloxacin for 90 consecutive clinical strains and 24 drug-resistant strains. The MICs were compared with routine BACTEC 460 susceptibility results and with MIC determinations in the BACTEC MGIT 960 system in a subset of strains using ofloxacin as a class representative. PK/PD data for each drug were reviewed in relation to the wild-type MIC distribution. The wild-type MICs of ciprofloxacin, ofloxacin, moxifloxacin and levofloxacin were distributed from 0.125 to 1, 0.25 to 1, 0.032 to 0.5 and 0.125 to 0.5 mg/L, respectively. The MIC data correlated well with the BACTEC 960 MGIT and BACTEC 460 results. PD indices were the most favourable for levofloxacin, followed by moxifloxacin, ofloxacin and ciprofloxacin. We propose S (susceptible)

  11. Nuclear data libraries and online services. An introduction to the data types and services available from the IAEA Nuclear Data Section

    International Nuclear Information System (INIS)

    Oblozinsky, P.; Schwerer, O.

    1998-09-01

    The IAEA Nuclear Data Section provides convenient, cost-free access to the world's most comprehensive collection of numerical nuclear physics data. These nuclear data libraries result from a worldwide cooperation of nuclear data centres coordinated by the IAEA. An introduction is given to the various nuclear data types and libraries with particular emphasis to online services via the Internet. This paper summarizes a presentation for the IAEA Workshop on ''Nuclear Reaction Data and Nuclear Reactors: Physics, Design and Safety'' held at ICTP Trieste, Italy, 23 February - 17 March 1998. (author)

  12. Available number of multiplexed holograms based on signal-to-noise ratio analysis in reflection-type holographic memory using three-dimensional speckle-shift multiplexing.

    Science.gov (United States)

    Nishizaki, Tatsuya; Matoba, Osamu; Nitta, Kouichi

    2014-09-01

    The recording properties of three-dimensional speckle-shift multiplexing in reflection-type holographic memory are analyzed numerically. Three-dimensional recording can increase the number of multiplexed holograms by suppressing the cross-talk noise from adjacent holograms by using depth-direction multiplexing rather than in-plane multiplexing. Numerical results indicate that the number of multiplexed holograms in three-layer recording can be increased by 1.44 times as large as that of a single-layer recording when an acceptable signal-to-noise ratio is set to be 2 when NA=0.43 and the thickness of the recording medium is 0.5 mm.

  13. Effect of nitrogen and water availability of three soil types on yield, radiation use efficiency and evapotranspiration in field-grown quinoa

    DEFF Research Database (Denmark)

    Razzaghi, Fatemeh; Plauborg, Finn; Jacobsen, Sven-Erik

    2012-01-01

    Quinoa (Chenopodium quinoa Willd.) is believed to be tolerant to abiotic stress including salinity, drought and poor soil quality. To investigate the effect of soil type and soil-drying during the seed-filling phase on N-uptake, yield and water use, a Danish-bred cultivar (cv. Titicaca) was grown...... in field lysimeters with sand, sandy loam and sandy clay loam soil. Despite application of the same amount of nitrogen (120 kg N ha−1) to all plots, there were large differences in crop nitrogen-uptake for sandy clay loam (134 kg ha−1), sandy loam (102 kg ha−1) and sand (77 kg ha−1) under full irrigation....... This lead to higher interception of photosynthetic active radiation and higher seed yield on sandy clay loam (3.3 Mg ha−1) and sandy loam (3.0 Mg ha−1) than on sand (2.3 Mg ha−1). The soil with higher clay content had also the highest transpiration, crop evapotranspiration and yield due to the higher uptake...

  14. Comparative trial of the canine parvovirus, canine distemper virus and canine adenovirus type 2 fractions of two commercially available modified live vaccines.

    Science.gov (United States)

    Bergman, J G H E; Muniz, M; Sutton, D; Fensome, R; Ling, F; Paul, G

    2006-11-25

    The results of vaccinating two groups of puppies with commercial vaccines, both of which claimed to provide adequate protection with a final vaccination at 10 weeks of age, were compared. Groups of 19 and 20 puppies with similar titres of maternally derived antibodies against canine parvovirus (cpv), canine distemper virus (cdv) and canine adenovirus type 2 (cav-2) at four weeks of age were vaccinated at six and 10 weeks of age and their responses to each vaccination were measured by comparing the titres against cpv, cdv and cav-2 in the serum samples taken immediately before the vaccination and four weeks later. After the vaccination at six weeks of age, all 19 of the puppies in group 1 had responded to cpv and cdv, and 14 had responded to cav-2; in group 2, 17 of the 20 had responded to cpv, 19 to cdv and 15 to cav-2. In both groups the puppies that did not respond to the first vaccination had responded serologically to cpv, cdv and cav-2 at 10 weeks of age.

  15. Assessing theory of mind nonverbally in those with intellectual disability and ASD: the penny hiding game.

    Science.gov (United States)

    San José Cáceres, Antonia; Keren, Noa; Booth, Rhonda; Happé, Francesca

    2014-10-01

    Individuals with autism spectrum disorder (ASD) and low intellectual/language abilities are often omitted from experimental studies because of the challenges of testing these individuals. It is vital to develop appropriate and accessible tasks so that this significant part of the spectrum is not neglected. The theory of mind (ToM) has been extensively assessed in ASD, predominantly in relatively high-functioning individuals with reasonable language skills. This study aims to assess the ToM abilities of a sample of 132 participants with intellectual disability (ID) with and without ASD, matched in verbal mental age (VMA) and chronological age, using a naturalistic and nonverbal deception task: the Penny Hiding Game (PHG). The relationship between performance on the PHG and everyday adaptation was also studied. The PHG proved accessible to most participants, suggesting its suitability for use with individuals with low cognitive skills, attentional problems, and limited language. The ASD + ID group showed significantly more PHG errors, and fewer tricks, than the ID group. PHG performance correlated with Vineland adaptation scores for both groups. VMA was a major predictor of passing the task in both groups, and participants with ASD + ID required, on average, 2 years higher VMA than those with ID only, to achieve the same level of PHG success. VMA moderated the association between PHG performance and real-life social skills for the ASD + ID more than the ID group, suggesting that severely impaired individuals with ASD may rely on verbal ability to overcome their social difficulties, whereas individuals with ID alone may use more intuitive social understanding both in the PHG and everyday situations. © 2014 International Society for Autism Research, Wiley Periodicals, Inc.

  16. Information hiding techniques for infrared images: exploring the state-of-the art and challenges

    Science.gov (United States)

    Pomponiu, Victor; Cavagnino, Davide; Botta, Marco; Nejati, Hossein

    2015-10-01

    The proliferation of Infrared technology and imaging systems enables a different perspective to tackle many computer vision problems in defense and security applications. Infrared images are widely used by the law enforcement, Homeland Security and military organizations to achieve a significant advantage or situational awareness, and thus is vital to protect these data against malicious attacks. Concurrently, sophisticated malware are developed which are able to disrupt the security and integrity of these digital media. For instance, illegal distribution and manipulation are possible malicious attacks to the digital objects. In this paper we explore the use of a new layer of defense for the integrity of the infrared images through the aid of information hiding techniques such as watermarking. In this context, we analyze the efficiency of several optimal decoding schemes for the watermark inserted into the Singular Value Decomposition (SVD) domain of the IR images using an additive spread spectrum (SS) embedding framework. In order to use the singular values (SVs) of the IR images with the SS embedding we adopt several restrictions that ensure that the values of the SVs will maintain their statistics. For both the optimal maximum likelihood decoder and sub-optimal decoders we assume that the PDF of SVs can be modeled by the Weibull distribution. Furthermore, we investigate the challenges involved in protecting and assuring the integrity of IR images such as data complexity and the error probability behavior, i.e., the probability of detection and the probability of false detection, for the applied optimal decoders. By taking into account the efficiency and the necessary auxiliary information for decoding the watermark, we discuss the suitable decoder for various operating situations. Experimental results are carried out on a large dataset of IR images to show the imperceptibility and efficiency of the proposed scheme against various attack scenarios.

  17. Bituminization of simulated PWR type reactor wastes, boric evaporator bottons and ion exchange resins, carried out in CNEN/SP using commercial bitumen available in the Brazilian market

    International Nuclear Information System (INIS)

    Grosche Filho, C.E.; Chandra, U.

    1986-01-01

    The first results of the study of bituminization of simulated PWR wastes, boric evaporator bottons and spent ion-exclange resins (OH - , H + ) and incinerated ash-wates are presented and discussed. The study consisted of characterization of the commercial bitumen, locally available and bitumen wastes products of varying whight compositions. The characterization was carried out using standard analysis methods of ABNT and ASTM, and included measurement of, penetration, softening point and flash point. In addition, the bitumen samples were analized for their resin and asphaltene contents. For leaching studies, wastes products of bitumen and resin loaded with 134 Cs were utilized. The method used was according to the ISO norms. The simulation of the industrial process was carried out using an extruder-evaporator typically used in the plastic industries offered by Industria de Maquinas Miotto Ltda., Sao Bernardo do Campo - SP. (Author) [pt

  18. Analysis of the bacterial diversity existing on animal hide and wool: development of a preliminary PCR-restriction fragment length polymorphism fingerprint database for identifying isolates.

    Science.gov (United States)

    Chen, Yu; Gao, Hongwei; Zhang, Yanming; Deng, Mingjun; Wu, Zhenxing; Zhu, Laihua; Duan, Qing; Xu, Biao; Liang, Chengzhu; Yue, Zhiqin; Xiao, Xizhi

    2012-01-01

    Twenty-one bacterial strains were isolated from imported cattle hide and rabbit wool using two types of media, nutrient broth, and nutrient broth with serum. The bacteria identified were Brevibacillus laterosporus, Leclercia adecarboxylata, Peptococcus niger, Bacillus circulans, Raoultella ornithinolytica, Bacillus subtilis, Bacillus cereus, Bacillus thermobacillus, Bacillus choshinensis, Bacillus sphaericus, Acinetobacter haemolyticus, Sphingomonas paucimobilis, Bacillus thuringiensis, Staphylococcus intermedius, Mycobacteria, Moraxella, Klebsiella pneumoniae, Ralstonia pickettii, Staphylococcus chromogenes, Comamonas testosteroni, and Cupriavidus pauculus. The 16s rDNA gene of each bacterium was amplified using the universal primers 27f and 1492r. The amplicons were digested with AvaI, BamHI, BgII, DraI, EcoRI, EcoRV, HindIII, HinfI, HpaI, PstI, SmaI, TaqII, XbaI, XmaI, AluI, XhoI, and PvuI individually. A specific fingerprint from the PCR-restriction fragment length polymorphism method based on 16s rDNA was obtained for each bacterium. The results showed that the method developed was useful not only for bacterial identification but also for the etiological investigation of pathogens in imported animal hair and wool.

  19. Probing the crucial role of Leu31 and Thr33 of the Bacillus pumilus CBS alkaline protease in substrate recognition and enzymatic depilation of animal hide.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    Full Text Available The sapB gene, encoding Bacillus pumilus CBS protease, and seven mutated genes (sapB-L31I, sapB-T33S, sapB-N99Y, sapB-L31I/T33S, sapB-L31I/N99Y, sapB-T33S/N99Y, and sapB-L31I/T33S/N99Y were overexpressed in protease-deficient Bacillus subtilis DB430 and purified to homogeneity. SAPB-N99Y and rSAPB displayed the highest levels of keratinolytic activity, hydrolysis efficiency, and enzymatic depilation. Interestingly, and at the semi-industrial scale, rSAPB efficiently removed the hair of goat hides within a short time interval of 8 h, thus offering a promising opportunity for the attainment of a lime and sulphide-free depilation process. The efficacy of the process was supported by submitting depilated pelts and dyed crusts to scanning electron microscopic analysis, and the results showed well opened fibre bundles and no apparent damage to the collagen layer. The findings also revealed better physico-chemical properties and less effluent loads, which further confirmed the potential candidacy of the rSAPB enzyme for application in the leather industry to attain an ecofriendly process of animal hide depilation. More interestingly, the findings on the substrate specificity and kinetic properties of the enzyme using the synthetic peptide para-nitroanilide revealed strong preferences for an aliphatic amino-acid (valine at position P1 for keratinases and an aromatic amino-acid (phenylalanine at positions P1/P4 for subtilisins. Molecular modeling suggested the potential involvement of a Leu31 residue in a network of hydrophobic interactions, which could have shaped the S4 substrate binding site. The latter could be enlarged by mutating L31I, fitting more easily in position P4 than a phenylalanine residue. The molecular modeling of SAPB-T33S showed a potential S2 subside widening by a T33S mutation, thus suggesting its importance in substrate specificity.

  20. Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number

    OpenAIRE

    Kohei Arai; Yuji Yamada

    2011-01-01

    An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images...

  1. Effects of Ultrasound Assisted Extraction in Conjugation with Aid of Actinidin on the Molecular and Physicochemical Properties of Bovine Hide Gelatin

    Directory of Open Access Journals (Sweden)

    Tanbir Ahmad

    2018-03-01

    Full Text Available Actinidin was used to pretreat the bovine hide and ultrasonic wave (53 kHz and 500 W was used for the time durations of 2, 4 and 6 h at 60 °C to extract gelatin samples (UA2, UA4 and UA6, respectively. Control (UAC gelatin was extracted using ultrasound for 6 h at 60 °C without enzyme pretreatment. There was significant (p < 0.05 increase in gelatin yield as the time duration of ultrasound treatment increased with UA6 giving the highest yield of 19.65%. Gel strength and viscosity of UAC and UA6 extracted gelatin samples were 627.53 and 502.16 g and 16.33 and 15.60 mPa.s, respectively. Longer duration of ultrasound treatment increased amino acids content of the extracted gelatin and UAC exhibited the highest content of amino acids. Progressive degradation of polypeptide chains was observed in the protein pattern of the extracted gelatin as the time duration of ultrasound extraction increased. Fourier transform infrared (FTIR spectroscopy depicted loss of molecular order and degradation in UA6. Scanning electron microscopy (SEM revealed protein aggregation and network formation in the gelatin samples with increasing time of ultrasound treatment. The study indicated that ultrasound assisted gelatin extraction using actinidin exhibited high yield with good quality gelatin.

  2. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia)

    OpenAIRE

    Donatas Brandišauskas

    2010-01-01

    This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imp...

  3. Biochemical and molecular characterization of a serine keratinase from Brevibacillus brevis US575 with promising keratin-biodegradation and hide-dehairing activities.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    Full Text Available Dehairing is one of the highly polluting operations in the leather industry. The conventional lime-sulfide process used for dehairing produces large amounts of sulfide, which poses serious toxicity and disposal problems. This operation also involves hair destruction, a process that leads to increased chemical oxygen demand (COD, biological oxygen demand (BOD, and total suspended solid (TSS loads in the effluent. With these concerns in mind, enzyme-assisted dehairing has often been proposed as an alternative method. The main enzyme preparations so far used involved keratinases. The present paper reports on the purification of an extracellular keratinase (KERUS newly isolated from Brevibacillus brevis strain US575. Matrix assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF/MS analysis revealed that the purified enzyme was a monomer with a molecular mass of 29121.11 Da. The sequence of the 27 N-terminal residues of KERUS showed high homology with those of Bacillus keratinases. Optimal activity was achieved at pH 8 and 40°C. Its thermoactivity and thermostability were upgraded in the presence of 5 mM Ca(2+. The enzyme was completely inhibited by phenylmethanesulfonyl fluoride (PMSF and diiodopropyl fluorophosphates (DFP, which suggests that it belongs to the serine protease family. KERUS displayed higher levels of hydrolysis, substrate specificity, and catalytic efficiency than NUE 12 MG and KOROPON® MK EG keratinases. The enzyme also exhibited powerful keratinolytic activity that made it able to accomplish the entire feather-biodegradation process on its own. The kerUS gene encoding KERUS was cloned, sequenced, and expressed in Escherichia coli. The biochemical properties of the extracellular purified recombinant enzyme (rKERUS were similar to those of native KERUS. Overall, the findings provide strong support for the potential candidacy of this enzyme as an effective and eco-friendly alternative to the conventional

  4. [Currently available skin substitutes].

    Science.gov (United States)

    Oravcová, Darina; Koller, Ján

    2014-01-01

    The current trend of burn wound care has shifted to more holistic approach of improvement in the long-term form and function of the healed burn wounds and quality of life. Autologous split or full-thickness skin graft are the best definitive burn wound coverage, but it is constrained by the limited available sources, especially in major burns. Donor site morbidities in term of additional wounds and scarring are also of concern of the autograft application. This has demanded the emergence of various skin substitutes in the management of acute burn injury as well as post burn reconstructions. This paper reviews currently available skin substitutes, produced in not for-profit skin banks as well as commercially available. They are divided according to type of material included, as biological, biosynthetic and synthetic and named respectively.

  5. No Place to Hide: Missing Primitive Stars Outside Milky Way Uncovered

    Science.gov (United States)

    2010-02-01

    , Sculptor, Sextans and Carina dwarf galaxies. Since the dwarf galaxies are typically 300 000 light years away - which is about three times the size of our Milky Way - only strong features in the spectrum could be measured, like a vague, smeared fingerprint. The team found that none of their large collection of spectral fingerprints actually seemed to belong to the class of stars they were after, the rare, extremely metal-poor stars found in the Milky Way. The team of astronomers around Starkenburg has now shed new light on the problem through careful comparison of spectra to computer-based models. They found that only subtle differences distinguish the chemical fingerprint of a normal metal-poor star from that of an extremely metal-poor star, explaining why previous methods did not succeed in making the identification. The astronomers also confirmed the almost pristine status of several extremely metal-poor stars thanks to much more detailed spectra obtained with the UVES instrument on ESO's Very Large Telescope. "Compared to the vague fingerprints we had before, this would be as if we looked at the fingerprint through a microscope," explains team member Vanessa Hill. "Unfortunately, just a small number of stars can be observed this way because it is very time consuming." "Among the new extremely metal-poor stars discovered in these dwarf galaxies, three have a relative amount of heavy chemical elements between only 1/3000 and 1/10 000 of what is observed in our Sun, including the current record holder of the most primitive star found outside the Milky Way," says team member Martin Tafelmeyer. "Not only has our work revealed some of the very interesting, first stars in these galaxies, but it also provides a new, powerful technique to uncover more such stars," concludes Starkenburg. "From now on there is no place left to hide!" Notes [1] According to the definition used in astronomy, "metals" are all the elements other than hydrogen and helium. Such metals, except for a very

  6. Analysis of Multiple Data Hiding Combined Coloured Visual Cryptography and LSB

    Science.gov (United States)

    Maulana, Halim; Rahman Syahputra, Edy

    2017-12-01

    Currently the level of data security becoming a major factor in data transfer. As we know every process of sending data through any medium the risk of that data gets hacked will still be there. Some techniques for securing data such as steganography and cryptography also often used as a solution for securing data. But it does not last long because it has been found out the weaknesses of the algorithm so that the security be assured. So, in need of variety of new algorithms to be able to protect the data so that data security can be guaranteed. In this study tries to combine two visual algorithms that steganography and cryptography. Where in these experiments will try to secure two pieces of data type that is the type of image data and text data where both the data is regarded as a message so to obtain the correct information receiver should get that two types of data.

  7. Hiding from swans: optimal burial depth of sago pondweed tubers foraged by Bewick's swans

    NARCIS (Netherlands)

    Santamaría, L.; Rodriguez-Girones, M.A.

    2002-01-01

    1 We used a combination of laboratory and field experiments to test the hypothesis that the burial depth of Potamogeton pectinatus tubers will vary with local sediment type and swan predation pressure. 2 In the field, mortality due to predation by swans decreased linearly with burial depth (from 100

  8. Mammary prostheses may hide breast cancer. Silicon implants and cancer diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Heywang, S H

    1987-10-30

    Mammoplasty with silicon implants is risky: In women wearing protheses of this type, carcinomas of the breast may be diagnosed in a more advanced stage than in women without silicon implants. This is the result of a study by US oncologists and was proved by observation in Grosshadern hospital, Munich. (orig.)

  9. 16 CFR 1631.61 - Hide carpets and rugs-alternative washing procedure.

    Science.gov (United States)

    2010-01-01

    ... normally used for that type of carpet or rug in service. (b) On February 10, 1972 (37 FR 3010) the Federal... 2″ in diameter and 9″ long composed of nonabsorbent material such as glass or plastic. (4) Select... remove all excess water and wrap around the operating applicator. (7) Immediately, with light pressure...

  10. 16 CFR 1630.61 - Hide carpets and rugs-alternative washing procedure.

    Science.gov (United States)

    2010-01-01

    ... normally used for that type of carpet or rug in service. (b) On February 10, 1972 (37 FR 3010) the Federal... 2″ in diameter and 9″ long composed of nonabsorbant material such as glass or plastic. (4) Select... remove all excess water and wrap around the operating applicator. (7) Immediately with light pressure...

  11. (Re)Searching Culture in Foreign Language Textbooks, or the Politics of Hide and Seek

    Science.gov (United States)

    Canale, Germán

    2016-01-01

    Textbooks are curriculum artefacts that embody particular ideologies and legitimise specific types of knowledge [Apple, M. W. (1982). "Education and power." Boston: Routledge & Kegan Paul; Apple, M. W., & Christian-Smith, L. K. (1991). "The politics of the textbook." In M. W. Apple & L. K. Christian-Smith (Eds.),…

  12. Analysis of hide-out return and the composition of the steam generators' combined blowdown under ethanolamine chemistry

    International Nuclear Information System (INIS)

    Rodriguez Aliciardi, M; Belloni, M; Croatto, F; Ferrari, F; Herrera, C; Mendizabal, M; Montes, J; Saucedo, R; Rodriguez, I; Chocron, M

    2012-01-01

    Among the techniques recommended for the surveillance of the steam generators (SG's) are (i) the follow-up of the corrosion products in the feed water and blown-down water and the corresponding accumulation mass balance and (ii) the follow-up of the ionic impurities normally present in the main condensate and feed water that can enter in the cycle either through condenser leakages or even with the make-up water. This is, no matter how well the cycle is constructed or the make-up water plant behaves, given the continuous phase change present in the cycle, a concentration equilibrium is established. Moreover, a synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in crevices and deposits creating a potentially corrosion risky environment for the SG's tubes. Hide-out return determination consists in the measurement of ions' concentrations, present in the blown-down water which are eluted in the shutdown during the power and temperature reduction. The integrated values allow graphical representations for performing several evaluations like: (i) the performance make-up water plant during a period, (ii) the presence of condenser in-leakages, (iii) the SG's deposits estimation and (iv) the internal chemistry of the SG's liquid phase inside the sludge pile. CNE, a CANDU 6 pressurized heavy-water reactor (PHWR) located in Embalse, Cordoba Province, Argentina, is close to reach the end-of-design-life and a life extension project is currently ongoing. In the plant also the chemistry of the BOP has been modified from a morpholine to an ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of SG's internals and new SG's will be installed. Then, it is of interest to set up a hide-out return procedure and analysis of the combined blown-down crud collected during the shut down as a base line for the second period of

  13. Playing hide-and-seek: detecting the manipulation of android timestamps

    CSIR Research Space (South Africa)

    Pieterse, H

    2015-08-01

    Full Text Available Mobile technology continues to evolve in the 21st century, providing users with improved capabilities and advance functionality. The current leader of this evolution is Android, a mobile operating system that continuously elevates existing features...

  14. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    OpenAIRE

    El-Monem, Farouk Abd; Hussain, Ahmed I.; Nashy, EL-Shahat H.A.; El-Wahhab, Hamada Abd; Naser, Abd El-Rahman M.

    2014-01-01

    Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA) and butyl acrylate (BA). The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leat...

  15. Can organic matter hide from decomposers in the labyrinth of soil aggregates? Micro-engineered Soil Chips challenging foraging fungi

    Science.gov (United States)

    Hammer, Edith C.; Aleklett, Kristin; Arellano Caicedo, Carlos G.; Bengtsson, Martin; Micaela Mafla Endara, Paola; Ohlsson, Pelle

    2017-04-01

    From the point of view of microorganisms, the soil environment is an enormously complex labyrinth with paths and dead-end streets, where resources and shelters are unevenly distributed. We study foraging strategies of soil organisms, especially fungi, and the possibility of physio-spatial stabilization of organic matter by "hiding" in occluded soil spaces. We manipulate growth habitat microstructure with lab-on-a-chip techniques, where we designed complex environments with channels and obstacle at dimensions of the size of hyphae, and construct them in the transparent, gas-permeable polymer PDMS. We fill those with different nutrient solutions or combine with mineral nutrient gradients, and inoculate them with soil organisms. We analyze organisms and substrates with microscopy, fluorescence microscopy and analytical chemistry. We compared different soil litter decomposers and an arbuscular mycorrhizal fungus for their ability to forage through complex air-gap structures and attempt to classify them into functional traits concerning their mycelium directionality, space-exploring approach and ability to grow through acute angles and narrow constrictions. We identified structures which are very difficult to penetrate for most species, and compounds located behind such features may thus be spatially unavailable for decomposers. We discuss our approach in comparison to soil pore space tomographic analyses and findings we made in the pore space of colonized wood biochar.

  16. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications.

    Science.gov (United States)

    Loan, Nazir A; Parah, Shabir A; Sheikh, Javaid A; Akhoon, Jahangir A; Bhat, Ghulam M

    2017-09-01

    A high capacity and semi-reversible data hiding scheme based on Pixel Repetition Method (PRM) and hybrid edge detection for scalable medical images has been proposed in this paper. PRM has been used to scale up the small sized image (seed image) and hybrid edge detection ensures that no important edge information is missed. The scaled up version of seed image has been divided into 2×2 non overlapping blocks. In each block there is one seed pixel whose status decides the number of bits to be embedded in the remaining three pixels of that block. The Electronic Patient Record (EPR)/data have been embedded by using Least Significant and Intermediate Significant Bit Substitution (ISBS). The RC4 encryption has been used to add an additional security layer for embedded EPR/data. The proposed scheme has been tested for various medical and general images and compared with some state of art techniques in the field. The experimental results reveal that the proposed scheme besides being semi-reversible and computationally efficient is capable of handling high payload and as such can be used effectively for electronic healthcare applications. Copyright © 2017. Published by Elsevier Inc.

  17. Modeling and estimating system availability

    International Nuclear Information System (INIS)

    Gaver, D.P.; Chu, B.B.

    1976-11-01

    Mathematical models to infer the availability of various types of more or less complicated systems are described. The analyses presented are probabilistic in nature and consist of three parts: a presentation of various analytic models for availability; a means of deriving approximate probability limits on system availability; and a means of statistical inference of system availability from sparse data, using a jackknife procedure. Various low-order redundant systems are used as examples, but extension to more complex systems is not difficult

  18. California scrub-jays reduce visual cues available to potential pilferers by matching food colour to caching substrate.

    Science.gov (United States)

    Kelley, Laura A; Clayton, Nicola S

    2017-07-01

    Some animals hide food to consume later; however, these caches are susceptible to theft by conspecifics and heterospecifics. Caching animals can use protective strategies to minimize sensory cues available to potential pilferers, such as caching in shaded areas and in quiet substrate. Background matching (where object patterning matches the visual background) is commonly seen in prey animals to reduce conspicuousness, and caching animals may also use this tactic to hide caches, for example, by hiding coloured food in a similar coloured substrate. We tested whether California scrub-jays ( Aphelocoma californica ) camouflage their food in this way by offering them caching substrates that either matched or did not match the colour of food available for caching. We also determined whether this caching behaviour was sensitive to social context by allowing the birds to cache when a conspecific potential pilferer could be both heard and seen (acoustic and visual cues present), or unseen (acoustic cues only). When caching events could be both heard and seen by a potential pilferer, birds cached randomly in matching and non-matching substrates. However, they preferentially hid food in the substrate that matched the food colour when only acoustic cues were present. This is a novel cache protection strategy that also appears to be sensitive to social context. We conclude that studies of cache protection strategies should consider the perceptual capabilities of the cacher and potential pilferers. © 2017 The Author(s).

  19. Disponibilidade hídrica de dois solos e diferentes idades de corte no comportamento agronômico da Jureminha Water availability of two soil-types and at different cropping ages on the agronomic performance of Jureminha

    Directory of Open Access Journals (Sweden)

    Manoel Alexandre Diniz Neto

    2013-03-01

    Full Text Available O trabalho foi desenvolvido para avaliar os efeitos de dois solos submetidos a níveis de disponibilidade de água e idade de corte nos componentes de crescimento vegetativo e composição bromatológica em plantas de jureminha (Desmanthus virgatus L. Willd.. Os tratamentos foram distribuídos em arranjo fatorial 2 x 4 em delineamento de blocos casualizados com doze repetições, com os fatores: dois solos, sendo um da região úmida do município de Alagoinha e outro da região semiárida do município de São João do Cariri, ambos no Estado da Paraíba; quatro níveis de disponibilidade de água (40; 60; 80 e 100% de água disponível e quatro idades de corte (60; 90; 120 e 150 dias após a emergência das plântulas conduzidos em casa-de-vegetação do CCA/UFPB, Areia-PB. O aumento da água disponível no solo estimula o crescimento das plantas, mas inibe a produção de proteína bruta da jureminha. As plantas cresceram mais e produziram menos proteína bruta no solo de São João do Cariri em relação ao solo de Alagoinha.The study was developed to evaluate the effects of two soil-types under different levels of water availability and cropping ages on the components of vegetative growth and chemical composition of jureminha plants (Desmanthusvirgatus L. Willd.. The treatments were distributed in a 2 x 4 factorial in a completely randomized block design with twelve replications of the factors: two soil types, one being from the humid region of the town of Alagoinha, and other from the semi-arid region of the town of São João do Cariri, both in the State of Paraíba; four levels of water availability (40, 60, 80 and 100% of the available water and four cropping ages (60,; 90; 120 and 150 days after the emergence of seedlings, the study being carried out in a greenhouse at CCA / UFPB,in Areia, Paraíba. An increase in the water available in the soil stimulates plant growth but inhibits gross protein production in jureminha. Plants grew

  20. Hide and Seek. Roads, Lookouts and Directional Visibility Cones in Central Anatolia

    Directory of Open Access Journals (Sweden)

    Turchetto Jacopo

    2017-01-01

    Full Text Available In Cappadocia (central Turkey, routes that were only of a secondary importance during the Roman age acquired a new relevance starting from the end of the 7th century. In this framework, to what extent did the archaeological evidence match the picture recalled by the written sources? To address this question, the relationship between movement and visibility was considered and view shed analyses were conducted from targeted and strategic spots set along the routes considered. This allowed to better understand the role and the different functions of those axes crossing Cappadocia, and to evaluate the Byzantine/Arab military strategies in central Anatolia.

  1. Can R-parity violation hide vanilla supersymmetry at the LHC?

    International Nuclear Information System (INIS)

    Asano, Masaki

    2012-09-01

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  2. Duty and dilemma: Perioperative nurses hiding an objection to participate in organ procurement surgery.

    Science.gov (United States)

    Smith, Zaneta

    2017-07-01

    Perioperative nurses assist in organ procurement surgery; however, there is a dearth of information of how they encounter making conscientious objection requests or refusals to participate in organ procurement surgery. Organ procurement surgical procedures can present to the operating room ad hoc and can catch a nurse who may not desire to participate by surprise with little opportunity to refuse as a result of staffing, skill mix or organizational work demands. This paper that stems from a larger doctoral research study exploring the experiences of perioperative nurses participating in multi-organ procurement surgery used a grounded theory method to develop a substantive theory of the nurses' experiences. This current paper aimed to highlight the experiences of perioperative nurses when confronted with expressing a conscientious objection towards their participation in these procedures. A number of organizational and cultural barriers within the healthcare organization were seen to hamper their ability in expressing a conscience-based refusal, which lead to their reluctant participation. Perioperative nurses must feel safe to express a conscientious objection towards these types of surgical procedures and feel supported in doing so by their respective hospital organizations and not be forced to participate unwillingly. © 2016 John Wiley & Sons Ltd.

  3. Can R-parity violation hide vanilla supersymmetry at the LHC?

    Energy Technology Data Exchange (ETDEWEB)

    Asano, Masaki [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Rolbiecki, Krzysztof; Sakurai, Kazuki [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2012-09-15

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  4. Analyzing THE PLACE FOR THE EVENT-type Metonymies from the Perspective of Negative Evaluative Factors

    Directory of Open Access Journals (Sweden)

    Nami Arimitsu

    Full Text Available This paper has two objectives. First, by analyzing THE PLACE FOR THE EVENT-type metonymies, this paper points out that it is mainly negative events that are expressed by this type of metonymy. Second, this paper reveals the motivations of those THE PLACE FOR THE EVENT-type metonymies that express negative events. Metonymies are widely investigated along with the views of Lakoff and Johnson (1980, and their oppositional semantic aspects are pointed out by Voßhagen (1999. However, none of the previous studies focused on the nature of THE PLACE FOR THE EVENT-type metonymies from the perspective of negative evaluation, euphemism, and politeness. "Let's not let Thailand become another Vietnam" expresses the Vietnam War and all the tragedies behind it. Speakers refrain from expressing negative evaluative aspects from a euphemistic perspective and try to behave politely through hiding the exact expression, and listeners can also easily understand THE PLACE FOR THE EVENT-type metonymies that express negative events, since negative events are much more highly marked and intensified, as well as more prominent, than are positive ones.

  5. Can a Bright and Energetic X-Ray Pulsar Be Hiding Amid the Debris of SN 1987A?

    Science.gov (United States)

    Esposito, Paolo; Rea, Nanda; Lazzati, Davide; Matsuura, Mikako; Perna, Rosalba; Pons, José A.

    2018-04-01

    The mass of the stellar precursor of supernova (SN) 1987A and the burst of neutrinos observed at the moment of the explosion are consistent with the core-collapse formation of a neutron star. However, no compelling evidence for the presence of a compact object of any kind in SN 1987A has been found yet in any band of the electromagnetic spectrum, prompting questions on whether the neutron star survived and, if it did, on its properties. Beginning with an analysis of recent Chandra observations, here we appraise the current observational situation. We derived limits on the X-ray luminosity of a compact object with a nonthermal, Crab-pulsar-like spectrum of the order of ≈(1–5) × 1035 erg s‑1, corresponding to limits on the rotational energy loss of a possible X-ray pulsar in SN 1987A of ≈(0.5–1.5) × 1038 erg s‑1. However, a much brighter X-ray source cannot be excluded if, as is likely, it is enshrouded in a cloud of absorbing matter with a metallicity similar to that expected in the outer layers of a massive star toward the end of its life. We found that other limits obtained from various arguments and observations in other energy ranges either are unbinding or allow a similar maximum luminosity of the order of ≈1035 erg s‑1. We conclude that while a pulsar alike the one in the Crab Nebula in both luminosity and spectrum is hardly compatible with the observations, there is ample space for an “ordinary” X-ray-emitting young neutron star, born with normal initial spin period, temperature, and magnetic field, to be hiding inside the evolving remnant of SN 1987A.

  6. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

    Directory of Open Access Journals (Sweden)

    Jong Hyuk Park

    2016-10-01

    Full Text Available Long Term Evolution (LTE and Long Term Evolution-Advanced (LTE-A support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI and Radio Network Temporary Identities (RNTI are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME. The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.

  7. Hidden losses in financial reporting and the manner of hiding case Serbia: Part two

    Directory of Open Access Journals (Sweden)

    Kaluđerović Nenad

    2016-01-01

    Full Text Available There has always been a dilemma whether financial statements are a reflection of the real situation. When financial statements are subject to various conveniences in order to be presented according to the wish of the purchaser, it leads us to the dilemma when and how this happens. This thesis deals with the attempt to start to solve the dilemmas where and when manipulative actions in financial reporting occur. We have carried out researches on selected samples of money losing companies for the period from 2010 to 2013, on the example of financial indicators of the companies which operated in Serbia. Detection of manipulations by means of which loss is hidden in financial statements is very important for the state economy. Under these conditions, development of an adequate method in this area is limited with the international standards of financial reporting. Numerous qualitative and quantitative methods have been used for evaluation of the real and objective components of losses in order to reflect the level of losses in the economy much better. However, in our conditions, there is an universally accepted method which can foresee and evaluate all events and actions that detect hidden losses in financial statements. This thesis presents methods of evaluation (quantitative and qualitative data mining and how they may be applied in detection of hidden losses in financial statements, by trying to identify a combination of methods which satisfies real needs of a certain task best.

  8. Hiding in Fresh Fruits and Vegetables: Opportunistic Pathogens May Cross Geographical Barriers

    Directory of Open Access Journals (Sweden)

    Zahra S. Al-Kharousi

    2016-01-01

    Full Text Available Different microbial groups of the microbiome of fresh produce can have diverse effects on human health. This study was aimed at identifying some microbial communities of fresh produce by analyzing 105 samples of imported fresh fruits and vegetables originated from different countries in the world including local samples (Oman for aerobic plate count and the counts of Enterobacteriaceae, Enterococcus, and Staphylococcus aureus. The isolated bacteria were identified by molecular (PCR and biochemical methods (VITEK 2. Enterobacteriaceae occurred in 60% of fruits and 91% of vegetables. Enterococcus was isolated from 20% of fruits and 42% of vegetables. E. coli and S. aureus were isolated from 22% and 7% of vegetables, respectively. Ninety-seven bacteria comprising 21 species were similarly identified by VITEK 2 and PCR to species level. E. coli, Klebsiella pneumoniae, Enterococcus casseliflavus, and Enterobacter cloacae were the most abundant species; many are known as opportunistic pathogens which may raise concern to improve the microbial quality of fresh produce. Phylogenetic trees showed no relationship between clustering of the isolates based on the 16S rRNA gene and the original countries of fresh produce. Intercountry passage of opportunistic pathogens in fresh produce cannot be ruled out, which requires better management.

  9. CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Cemal Kocak

    2017-03-01

    Full Text Available Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio and SSIM (Structural Similarity Index. In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD method, Simulated Annealing (SA Algorithm and Mix column transform based on irreducible polynomial mathematics methods.

  10. Hiding in Plain Sight: A Case for Cryptic Metapopulations in Brook Trout (Salvelinus fontinalis.

    Directory of Open Access Journals (Sweden)

    David C Kazyak

    Full Text Available A fundamental issue in the management and conservation of biodiversity is how to define a population. Spatially contiguous fish occupying a stream network have often been considered to represent a single, homogenous population. However, they may also represent multiple discrete populations, a single population with genetic isolation-by-distance, or a metapopulation. We used microsatellite DNA and a large-scale mark-recapture study to assess population structure in a spatially contiguous sample of Brook Trout (Salvelinus fontinalis, a species of conservation concern. We found evidence for limited genetic exchange across small spatial scales and in the absence of barriers to physical movement. Mark-recapture and stationary passive integrated transponder antenna records demonstrated that fish from two tributaries very seldom moved into the opposite tributary, but movements between the tributaries and mainstem were more common. Using Bayesian genetic clustering, we identified two genetic groups that exhibited significantly different growth rates over three years of study, yet survival rates were very similar. Our study highlights the importance of considering the possibility of multiple genetically distinct populations occurring within spatially contiguous habitats, and suggests the existence of a cryptic metapopulation: a spatially continuous distribution of organisms exhibiting metapopulation-like behaviors.

  11. How the leopard hides its spots: ASIP mutations and melanism in wild cats.

    Directory of Open Access Journals (Sweden)

    Alexsandra Schneider

    Full Text Available The occurrence of melanism (darkening of the background coloration is documented in 13 felid species, in some cases reaching high frequencies at the population level. Recent analyses have indicated that it arose multiple times in the Felidae, with three different species exhibiting unique mutations associated with this trait. The causative mutations in the remaining species have so far not been identified, precluding a broader assessment of the evolutionary dynamics of melanism in the Felidae. Among these, the leopard (Panthera pardus is a particularly important target for research, given the iconic status of the 'black panther' and the extremely high frequency of melanism observed in some Asian populations. Another felid species from the same region, the Asian golden cat (Pardofelis temminckii, also exhibits frequent records of melanism in some areas. We have sequenced the coding region of the Agouti Signaling Protein (ASIP gene in multiple leopard and Asian golden cat individuals, and identified distinct mutations strongly associated with melanism in each of them. The single nucleotide polymorphism (SNP detected among the P. pardus individuals was caused by a nonsense mutation predicted to completely ablate ASIP function. A different SNP was identified in P. temminckii, causing a predicted amino acid change that should also induce loss of function. Our results reveal two additional cases of species-specific mutations implicated in melanism in the Felidae, and indicate that ASIP mutations may play an important role in naturally-occurring coloration polymorphism.

  12. AP-IO: Asynchronous Pipeline I/O for Hiding Periodic Output Cost in CFD Simulation

    Directory of Open Access Journals (Sweden)

    Ren Xiaoguang

    2014-01-01

    Full Text Available Computational fluid dynamics (CFD simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  13. Auditing HIV Testing Rates across Europe: Results from the HIDES 2 Study.

    Directory of Open Access Journals (Sweden)

    D Raben

    Full Text Available European guidelines recommend the routine offer of an HIV test in patients with a number of AIDS-defining and non-AIDS conditions believed to share an association with HIV; so called indicator conditions (IC. Adherence with this guidance across Europe is not known. We audited HIV testing behaviour in patients accessing care for a number of ICs. Participating centres reviewed the case notes of either 100 patients or of all consecutive patients in one year, presenting for each of the following ICs: tuberculosis, non-Hodgkins lymphoma, anal and cervical cancer, hepatitis B and C and oesophageal candidiasis. Observed HIV-positive rates were applied by region and IC to estimate the number of HIV diagnoses potentially missed. Outcomes examined were: HIV test rate (% of total patients with IC, HIV test accepted (% of tests performed/% of tests offered and new HIV diagnosis rate (%. There were 49 audits from 23 centres, representing 7037 patients. The median test rate across audits was 72% (IQR 32-97, lowest in Northern Europe (median 44%, IQR 22-68% and highest in Eastern Europe (median 99%, IQR 86-100. Uptake of testing was close to 100% in all regions. The median HIV+ rate was 0.9% (IQR 0.0-4.9, with 29 audits (60.4% having an HIV+ rate >0.1%. After adjustment, there were no differences between regions of Europe in the proportion with >0.1% testing positive (global p = 0.14. A total of 113 patients tested HIV+. Applying the observed rates of testing HIV+ within individual ICs and regions to all persons presenting with an IC suggested that 105 diagnoses were potentially missed. Testing rates in well-established HIV ICs remained low across Europe, despite high prevalence rates, reflecting missed opportunities for earlier HIV diagnosis and care. Significant numbers may have had an opportunity for HIV diagnosis if all persons included in IC audits had been tested.

  14. Saving lives with public access defibrillation: A deadly game of hide and seek.

    Science.gov (United States)

    Sidebottom, David B; Potter, Ryan; Newitt, Laura K; Hodgetts, Gillian A; Deakin, Charles D

    2018-07-01

    Early defibrillation is a critical link in the chain of survival. Public access defibrillation (PAD) programmes utilising automated external defibrillators (AEDs) aim to decrease the time-to-first-shock, and improve survival from out-of-hospital cardiac arrest. Effective use of PADs requires rapid location of the device, facilitated by adequate signage. We aimed to therefore assess the quality of signage for PADs in the community. From April 2017 to January 2018 we surveyed community PADs available for public use on the 'Save a Life' AED locator mobile application in and around Southampton, UK. Location and signage characteristics were collected, and the distance from the furthest sign to the AED was measured. Researchers evaluated 201 separate PADs. All devices visited were included in the final analysis. No signage at all was present for 135 (67.2%) devices. Only 15/201 (7.5%) AEDs had signage at a distance from AED itself. In only 5 of these cases (2.5%) was signage mounted more than 5.0 m from the AED. When signage was present, 46 used 2008 ILCOR signage and 15 used 2006 Resuscitation Council (UK) signage. Signage visibility was partially or severely obstructed at 27/66 (40.9%) sites. None of the 45 GP surgeries surveyed used exterior signage or an exterior 24/7 access box. Current signage of PADs is poor and limits the device effectiveness by impeding public awareness and location of AEDs. Recommendations should promote visible signage within the operational radius of each AED. Copyright © 2018 Elsevier B.V. All rights reserved.

  15. Emperors in hiding: when ice-breakers and satellites complement each other in Antarctic exploration.

    Directory of Open Access Journals (Sweden)

    André Ancel

    Full Text Available Evaluating the demographic trends of marine top predators is critical to understanding the processes involved in the ongoing rapid changes in Antarctic ecosystems. However, the remoteness and logistical complexity of operating in Antarctica, especially during winter, make such an assessment difficult. Satellite imaging is increasingly recognised as a valuable method for remote animal population monitoring, yet its accuracy and reliability are still to be fully evaluated. We report here the first ground visit of an emperor penguin colony first discovered by satellite, but also the discovery of a second one not indicated by satellite survey at that time. Several successive remote surveys in this coastal region of East Antarctica, both before and after sudden local changes, had indeed only identified one colony. These two colonies (with a total of ca. 7,400 breeding pairs are located near the Mertz Glacier in an area that underwent tremendous habitat change after the glacier tongue broke off in February 2010. Our findings therefore suggest that a satellite survey, although offering a major advance since it allows a global imaging of emperor penguin colonies, may miss certain colony locations when challenged by certain features of polar ecosystems, such as snow cover, evolving ice topology, and rapidly changing habitat. Moreover our survey shows that this large seabird has considerable potential for rapid adaptation to sudden habitat loss, as the colony detected in 2009 may have moved and settled on new breeding grounds. Overall, the ability of emperor penguin colonies to relocate following habitat modification underlines the continued need for a mix of remote sensing and field surveys (aerial photography and ground counts, especially in the less-frequented parts of Antarctica, to gain reliable knowledge about the population demography and dynamics of this flagship species of the Antarctic ecosystem.

  16. Is Hiding Foot and Mouth Disease Sensitive Behavior for Farmers? A Survey Study in Sri Lanka

    Directory of Open Access Journals (Sweden)

    Anoma Gunarathne

    2016-02-01

    Full Text Available Foot and mouth disease (FMD has a long history in Sri Lanka and was found to be endemic in various parts of the country and constitutes a constant threat to farmers. In Sri Lanka, currently there is no regular, nationwide vaccination programme devised to control FMD. Therefore, improving farmers’ knowledge regarding distinguishing FMD from other diseases and ensuring prompt reporting of any suspicion of FMD as well as restricting movement of animals are critical activities for an effective FMD response effort. Therefore, the main purpose of this study was to clarify the relationship between farmers’ knowledge levels and their behaviors to establish a strategy to control FMD. In our study, item count technique was applied to estimate the number of farmers that under-report and sell FMD-infected animals, although to do so is prohibited by law. The following findings were observed: about 63% of farmers have very poor knowledge of routes of FMD transmission; ‘under-reporting’ was found to be a sensitive behavior and nearly 23% of the farmers were reluctant to report FMD-infected animals; and ‘selling FMD-infected animals’ is a sensitive behavior among high-level knowledge group while it is a non-sensitive behavior among the low-level knowledge group. If farmers would understand the importance of prompt reporting, they may report any suspected cases of FMD to veterinary officials. However, even if farmers report honestly, they do not want to cull FMD-infected animals. Thus, education programs should be conducted not only on FMD introduction and transmission, but also its impact. Furthermore, consumers may criticize the farmers for culling their infected animals. Hence, not only farmers, but also consumers need to be educated on the economic impact of FMD and the importance of controlling an outbreak. If farmers have a high knowledge of FMD transmission, they consider selling FMD-infected animals as a sensitive behavior. Therefore, severe

  17. Genetic diversity and antimicrobial resistance among isolates of Escherichia coli O157: H7 from feces and hides of super-shedders and low-shedding pen-mates in two commercial beef feedlots

    Directory of Open Access Journals (Sweden)

    Stanford Kim

    2012-09-01

    Full Text Available Abstract Background Cattle shedding at least 104 CFU Escherichia coli O157:H7/g feces are described as super-shedders and have been shown to increase transmission of E. coli O157:H7 to other cattle in feedlots. This study investigated relationships among fecal isolates from super-shedders (n = 162, perineal hide swab isolates (PS from super-shedders (n = 137 and fecal isolates from low-shedder (4 CFU/g feces pen-mates (n = 496 using pulsed-field gel electrophoresis (PFGE. A subsample of these fecal isolates (n = 474 was tested for antimicrobial resistance. Isolates of E. coli O157:H7 were obtained from cattle in pens (avg. 181 head at 2 commercial feedlots in southern Alberta with each steer sampled at entry to the feedlot and prior to slaughter. Results Only 1 steer maintained super-shedder status at both samplings, although approximately 30% of super-shedders in sampling 1 had low-shedder status at sampling 2. A total of 85 restriction endonuclease digestion clusters (REPC; 90% or greater similarity and 86 unique isolates (P = 0.94. Only 2/21 super-shedders had fecal isolates in the same REPC at both samplings. Fecal and PS isolates from individual super-shedders generally belonged to different REPCs, although fecal isolates of E. coli O157:H7 from super- and low-shedders showed greater similarity (P P = 0.69, although all super-shedder isolates with antimicrobial resistance (n = 3 were resistant to multiple antimicrobials. Conclusions Super-shedders did not have increased antimicrobial resistance compared to low-shedder pen mates. Our data demonstrated that PFGE profiles of individual super-shedders varied over time and that only 1/162 steers remained a super-shedder at 2 samplings. In these two commercial feedlots, PFGE subtypes of E. coli O157:H7 from fecal isolates of super- and low-shedders were frequently different as were subtypes of fecal and perineal hide isolates from super-shedders.

  18. Nothing to Hide

    DEFF Research Database (Denmark)

    Raun, Tobias; Keegan, Cael

    2018-01-01

    of sexualized consumption. We argue that in order to understand the gendered and sexual complexities of this image, it is necessary to contextualize it within Dowling’s comprehensive selfie-practice on YouTube and Instagram. Although this image is not a selfie per se, it is almost impossible to separate from...

  19. Hide and seek

    DEFF Research Database (Denmark)

    Radel, Dietrich; Sand, Andreas; Steel, Mike

    2013-01-01

    criterion. This provides, for the first time, a rigorous way to test tree search algorithms on homoplasy-rich data, where we know in advance what the ‘best’ tree is. In this short note we consider just one search program (TNT) but show that it is able to locate the globally optimal tree correctly for 32......Finding optimal evolutionary trees from sequence data is typically an intractable problem, and there is usually no way of knowing how close to optimal the best tree from some search truly is. The problem would seem to be particularly acute when we have many taxa and when that data has high levels...... of homoplasy, in which the individual characters require many changes to fit on the best tree. However, a recent mathematical result has provided a precise tool to generate a short number of high-homoplasy characters for any given tree, so that this tree is provably the optimal tree under the maximum parsimony...

  20. Influence of Therapeutic Ceftiofur Treatments of Feedlot Cattle on Fecal and Hide Prevalences of Commensal Escherichia coli Resistant to Expanded-Spectrum Cephalosporins, and Molecular Characterization of Resistant Isolates

    Science.gov (United States)

    Griffin, Dee; Kuehn, Larry A.; Brichta-Harhay, Dayna M.

    2013-01-01

    In the United States, the blaCMY-2 gene contained within incompatibility type A/C (IncA/C) plasmids is frequently identified in extended-spectrum-cephalosporin-resistant (ESCr) Escherichia coli strains from both human and cattle sources. Concerns have been raised that therapeutic use of ceftiofur in cattle may increase the prevalence of ESCr E. coli. We report that herd ESCr E. coli fecal and hide prevalences throughout the residency of cattle at a feedlot, including during the period of greatest ceftiofur use at the feedlot, were either not significantly different (P ≥ 0.05) or significantly less (P E. coli shedding that follows ceftiofur injection abated, ceftiofur-injected cattle were no more likely than untreated members of the same herd to shed ESCr E. coli. Pulsed-field gel electrophoresis (PFGE) genotyping, antibiotic resistance phenotyping, screening for presence of the blaCMY-2 gene, and plasmid replicon typing were performed on 312 ESCr E. coli isolates obtained during six sampling periods spanning the 10-month residence of cattle at the feedlot. The identification of only 26 unique PFGE genotypes, 12 of which were isolated during multiple sampling periods, suggests that clonal expansion of feedlot-adapted blaCMY-2 E. coli strains contributed more to the persistence of blaCMY-2 than horizontal transfer of IncA/C plasmids between E. coli strains at this feedlot. We conclude that therapeutic use of ceftiofur at this cattle feedlot did not significantly increase the herd prevalence of ESCr E. coli. PMID:23354706

  1. Technical training - places available

    CERN Multimedia

    2012-01-01

    If you would like more information on a course, or for any other inquiry/suggestions, please contact Technical.Training@cern.ch Valeria Perez Reale, Learning Specialist, Technical Programme Coordinator (Tel.: 62424) Eva Stern and Elise Romero, Technical Training Administration (Tel.: 74924) HR Department »Electronics design Next Session Duration Language Availability Comprehensive VHDL for FPGA Design 08-Oct-12 to 12-Oct-12 5 days English 3 places available Foundations of Electromagnetism and Magnet Design (EMAG) 14-Nov-12 to 27-Nov-12 6 days English 20 places available Impacts de la suppression du plomb (RoHS) en électronique 26-Oct-12 to 26-Oct-12 8 hours French 15 places available Introduction to VHDL 10-Oct-12 to 11-Oct-12 2 days English 7 places available LabVIEW Real Time and FPGA 13-Nov-12 to 16-Nov-12 5 days French 5 places available »Mechanical design Next Se...

  2. Proxmox high availability

    CERN Document Server

    Cheng, Simon MC

    2014-01-01

    If you want to know the secrets of virtualization and how to implement high availability on your services, this is the book for you. For those of you who are already using Proxmox, this book offers you the chance to build a high availability cluster with a distributed filesystem to further protect your system from failure.

  3. Technical training - Places available

    CERN Document Server

    2012-01-01

    If you would like more information on a course, or for any other inquiry/suggestions, please contact Technical.Training@cern.ch Valeria Perez Reale, Learning Specialist, Technical Programme Coordinator (Tel.: 62424) Eva Stern and Elise Romero, Technical Training Administration (Tel.: 74924)   Electronics design Next Session Duration Language Availability Certified LabVIEW Associate Developer (CLAD) 06-Dec-12 to 06-Dec-12 1 hour English One more place available Compatibilité électromagnetique (CEM): Applications 23-Nov-12 to 23-Nov-12 3.5 hours English 3 places available Compatibilité électromagnétique (CEM): Introduction 23-Nov-12 to 23-Nov-12 3 hours English 43 places available Effets des Radiations sur les composants et systèmes électroniques 11-Dec-12 to 12-Dec-12 1 day 4 hours French 9 places available LabVIEW for beginners ...

  4. Technical training: places available

    CERN Multimedia

    HR Department

    2007-01-01

    CERN Technical Training: Open Courses (April - June 2007) The following course sessions are currently scheduled in the framework of the CERN Technical Training Programme 2007:   AutoCAD 2006 - niveau 1 (course in French): 25.4.- 26.4.2007 & 2.5. - 3.5.2007 (4 days in 2 modules, 5 places available) AutoCAD 2006 - niveau 1 (course in French): 27.6.- 28.6.2007 & 3.7. - 4.7.2007 (4 days in 2 modules, 5 places available) AutoCAD Mechanical 2006 (course in French) 21.6.-22.6.2007 (2 days, 8 places available) * NEW COURSE* Automate de securite S7 (course in French) 14.5.-16.5.2007 (3 days, 4 places available) * NEW COURSE* Automate de securite S7 (course in French): 9.5.-11.5.2007 (3 days, 4 places available) JCOP - Joint PVSS-JCOP Frameswork (course in English): 21.5.-25.5.2007 (5 days, 12 places available) JCOP - Finite State Machines in the JCOP Frameswork (course in English): 12.6.-14.6.2007 (3 days, 12 places available) LabVIEW Basics 1 (in English): 2.-4.5.2007 (3 days, 7 places ...

  5. High availability IT services

    CERN Document Server

    Critchley, Terry

    2014-01-01

    This book starts with the basic premise that a service is comprised of the 3Ps-products, processes, and people. Moreover, these entities and their sub-entities interlink to support the services that end users require to run and support a business. This widens the scope of any availability design far beyond hardware and software. It also increases the potential for service failure for reasons beyond just hardware and software; the concept of logical outages. High Availability IT Services details the considerations for designing and running highly available ""services"" and not just the systems

  6. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The Joint PVSS JCOP Framework: 14 - 18.6.2004 (5 days) EXCEL 2003 - niveau 2 : 17 & 18.6.2004 (2 jours) MAGNE-04 : Magnétisme pour l'électrotechnique : 6 au 8.7.2004 (3 jours) Technical Training Monique Duval - Tel.74924 technical.training@cern.ch

  7. SSC accelerator availability allocation

    International Nuclear Information System (INIS)

    Dixon, K.T.; Franciscovich, J.

    1991-03-01

    Superconducting Super Collider (SSC) operational availability is an area of major concern, judged by the Central Design Group to present such risk that use of modern engineering tools would be essential to program success. Experience has shown that as accelerator beam availability falls below about 80%, efficiency of physics experiments degrades rapidly due to inability to maintain adequate coincident accelerator and detector operation. For this reason, the SSC availability goal has been set at 80%, even though the Fermi National Accelerator Laboratory accelerator, with a fraction of the SSC's complexity, has only recently approached that level. This paper describes the allocation of the top-level goal to part-level reliability and maintainability requirements, and it gives the results of parameter sensitivity studies designed to help identify the best approach to achieve the needed system availability within funding and schedule constraints. 1 ref., 12 figs., 4 tabs

  8. Estimations of actual availability

    International Nuclear Information System (INIS)

    Molan, M.; Molan, G.

    2001-01-01

    Adaptation of working environment (social, organizational, physical and physical) should assure higher level of workers' availability and consequently higher level of workers' performance. A special theoretical model for description of connections between environmental factors, human availability and performance was developed and validated. The central part of the model is evaluations of human actual availability in the real working situation or fitness for duties self-estimation. The model was tested in different working environments. On the numerous (2000) workers, standardized values and critical limits for an availability questionnaire were defined. Standardized method was used in identification of the most important impact of environmental factors. Identified problems were eliminated by investments in the organization in modification of selection and training procedures in humanization of working .environment. For workers with behavioural and health problems individual consultancy was offered. The described method is a tool for identification of impacts. In combination with behavioural analyses and mathematical analyses of connections, it offers possibilities to keep adequate level of human availability and fitness for duty in each real working situation. The model should be a tool for achieving adequate level of nuclear safety by keeping the adequate level of workers' availability and fitness for duty. For each individual worker possibility for estimation of level of actual fitness for duty is possible. Effects of prolonged work and additional tasks should be evaluated. Evaluations of health status effects and ageing are possible on the individual level. (author)

  9. Technical training - Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 16.5.2006 (May-November course sessions) Technical Training: Places available The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language ACROBAT 7.0 : Utilisation de fichiers PDF 8 8.05.06 F WORD 2003 - niveau 2 : ECDL 16 22-23.05.06 23-24.05.06 F Comprehensive VHDL for FPGA Design 40 29.05-2.06.06 E C++ Programming Part 2 - Advanced C++ and its Traps and Pitfalls 32 30.05-2.06.06 E ACROBAT 7.0 : Utilisation de fichiers PDF 24 7-9.06.06 E AutoCAD Mechanical 2006 16 13-14.06.06 F CERN EDMS for Local Administrators 16 13-14.06.06 E LabVIEW Base 2 32 27.06-5.07.06 F C++ Programming Part 3 - Templates and the STL (Standard Template Library) 16 27-28.06.06 E C++ Programming Part 4 - Exceptions 8 29.06.06 E FrontPage 2003 - niveau 1 16 29-...

  10. Energy availability in athletes

    DEFF Research Database (Denmark)

    Loucks, Anne B; Kiens, Bente; Wright, Hattie H

    2011-01-01

    Abstract This review updates and complements the review of energy balance and body composition in the Proceedings of the 2003 IOC Consensus Conference on Sports Nutrition. It argues that the concept of energy availability is more useful than the concept of energy balance for managing the diets...... of athletes. It then summarizes recent reports of the existence, aetiologies, and clinical consequences of low energy availability in athletes. This is followed by a review of recent research on the failure of appetite to increase ad libitum energy intake in compensation for exercise energy expenditure...

  11. JUNOS High Availability

    CERN Document Server

    Sonderegger, James; Milne, Kieran; Palislamovic, Senad

    2009-01-01

    Whether your network is a complex carrier or just a few machines supporting a small enterprise, JUNOS High Availability will help you build reliable and resilient networks that include Juniper Networks devices. With this book's valuable advice on software upgrades, scalability, remote network monitoring and management, high-availability protocols such as VRRP, and more, you'll have your network uptime at the five, six, or even seven nines -- or 99.99999% of the time. Rather than focus on "greenfield" designs, the authors explain how to intelligently modify multi-vendor networks. You'll learn

  12. Beating Depression …Help Is Available

    Science.gov (United States)

    ... Navigation Bar Home Current Issue Past Issues Beating Depression …Help Is Available Past Issues / Summer 2007 Table ... treatments are available from your physician. Types of Depression Just like other illnesses, such as heart disease, ...

  13. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: C++ for Particle Physicists : 8 - 12.3.2004 (6 X 4-hour sessions) Introduction to the CERN EDMS : 9.3.2004 (1 day, free of charge) The EDMS MTF in Practice : 10.3.2004 (morning, free of charge) CLEAN-2002: Working in a Cleanroom : 10.3.2004 (afternoon, free of charge) The CERN EDMS for Engineers : 11.3.2004 (1 day, free of charge) LabVIEW hands-on (E):...

  14. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: LabVIEW base 1 : 25 - 27.2.2004(3 jours) Instructor-led WBTechT study or follow-up for Microsoft applications : 26.2.2004 (morning) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon - free of charge) C++ for Particle Physicists : 8 - 12.3.2004 (6 X 4-hour sessions) LabVIEW hands-on (E) : 16.3.2004 (afternoon) LabVIEW Basics 1 : 22 - 24.3.2004 ...

  15. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Instructor-led WBTechT study for Microsoft applications :12.2.2004 (morning) Instructor-led WBTechT study or follow-up for Microsoft applications : 19.2.2004 (morning) LabVIEW TestStand I (E) : 23 & 24.2.2004 (2 days) LabVIEW base 1 : 25 - 27.2.2004 (3 jours) Instructor-led WBTechT study or follow-up for Microsoft applications : 19.2.2004 (morning) CLEAN-2002 ...

  16. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Instructor-led WBTechT study or follow-up for Microsoft applications : 19.2.2004 (morning) LabVIEW TestStand I (E) : 23 & 24.2.2004 (2 days) LabVIEW base 1 : 25 - 27.2.2004 (3 jours) Instructor-led WBTechT study or follow-up for Microsoft applications : 26.2.2004 (morning) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon - free of charge) C++ for Pa...

  17. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 30.5.2006 (June-November course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue ACROBAT 7.0 : Utilisation de fichiers PDF 8 6.06.06 F Introduction à InDesign 16 7-8.06.06 F Python: Hands-on Introduction 24 7-9.06.06 E LabVIEW Base 2 16 22-23.06.06 F FileMaker - niveau 1 16 26-27.06.06 F C++ Programming Part 3 - Templates and the STL (Standard Template Library) 16 27-28.06.06 E C++ Programming Part 4 - Exceptions 8 29.06.06 E FrontPage 2003 - niveau 1 16 29-30.06.06 F Manipulation des images 4 6.07.06 F Introduction to Databases and Database Design 16 11-12.07.06 E ACCESS 2003 - Level 1: ECDL 16 13-14.07.06 E-F Design Patterns 16 25-26.07.06 E Introduction à Dreamweaver MX 16 ...

  18. Technical training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 13.6.2006 (June-December course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue LabVIEW Base 2 16 22-23.06.06 F FileMaker - niveau 1 16 26-27.06.06 F C++ Programming Part 3 - Templates and the STL (Standard Template Library) 16 27-28.06.06 E C++ Programming Part 4 - Exceptions 8 29.06.06 E FrontPage 2003 - niveau 1 16 29-30.06.06 F Manipulation des images 4 6.07.06 F Introduction to Databases and Database Design 16 11-12.07.06 E ACCESS 2003 - Level 1: ECDL 16 13-14.07.06 E-F Design Patterns 16 25-26.07.06 E Introduction à Dreamweaver MX 16 26-27.07.06 F ANSYS DesignModeler 16 29-30.08.06 F LabVIEW Basics 1 24 4-6.09.06 E ANSYS Workbench 32 12-15.09.06 F AutoCAD Mechanical 20...

  19. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 9.5.2006 (May-October course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: find out the curren Hours Date Language LabVIEW Application Development 24 15-17.05.06 E LabVIEW Advanced Programming 16 18-19.05.06 E PERL 5: Advanced Aspects 8 18.05.06 E Technique du vide 16 18-19.05.06 F FileMaker - niveau 2 16 11-12.05.06 F WORD 2003 - niveau 2 : ECDL 16 22-23.05.06 F Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE 16 23-24.05.06 F Comprehensive VHDL for FPGA Design 40 29.05-2.06.06 E C++ Programming Part 2 - Advanced C++ and its Traps and Pitfalls 32 30.05-2.06.06 E Python: Hands-on Introduction 24 7-9.06.06 E AutoCAD Mechanical 2006 16 13-14.06.06 F CERN EDMS for Local Administrators 16 13-14.06.06...

  20. High availability using virtualization

    International Nuclear Information System (INIS)

    Calzolari, Federico; Arezzini, Silvia; Ciampa, Alberto; Mazzoni, Enrico; Domenici, Andrea; Vaglini, Gigliola

    2010-01-01

    High availability has always been one of the main problems for a data center. Till now high availability was achieved by host per host redundancy, a highly expensive method in terms of hardware and human costs. A new approach to the problem can be offered by virtualization. Using virtualization, it is possible to achieve a redundancy system for all the services running on a data center. This new approach to high availability allows the running virtual machines to be distributed over a small number of servers, by exploiting the features of the virtualization layer: start, stop and move virtual machines between physical hosts. The 3RC system is based on a finite state machine, providing the possibility to restart each virtual machine over any physical host, or reinstall it from scratch. A complete infrastructure has been developed to install operating system and middleware in a few minutes. To virtualize the main servers of a data center, a new procedure has been developed to migrate physical to virtual hosts. The whole Grid data center SNS-PISA is running at the moment in virtual environment under the high availability system.

  1. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Outlook (short course I) : E-mail : 31.8.2004 (2 hours, morning) Introduction à Outlook : Outlook (short course II) : Calendar, Tasks and Notes : 31.8.2004 (2 hours, afternoon) Instructor-led WBTechT Study or Follow-up for Microsoft Applications : 7.9.2004 (morning) Outlook (short course III) : Meetings and Delegation : 7.9.2004 (2 hours, afternoon) Introduction au VHDL et utilisation du simulateur ...

  2. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Joint PVSS JCOP Framework : 9 - 13.8.2004 (5 days) Introduction à Outlook : 19.8.2004 (1 jour) Outlook (Short Course I): E-mail: 31.8.2004 (2 hours, morning) Outlook (Short Course II): Calendar, Tasks and Notes: 31.8.2004 (2 hours, afternoon) Instructor-led WBTechT Study or Follow-up for Microsoft Applications: 7.9.2004 (morning) Outlook (Short Course III): Meetings and Delegation: 7.9.2004 (2 hours, afternoon) I...

  3. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Joint PVSS JCOP Framework : 9 - 13.8.2004 (5 days) Introduction à Outlook : 19.8.2004 (1 jour) Outlook (Short Course I): E-mail: 31.8.2004 (2 hours, morning) Outlook (Short Course II): Calendar, Tasks and Notes: 31.8.2004 (2 hours, afternoon) Hands-on Introduction to Python Programming: 1 - 3.9.2004 (3 days - free course) Instructor-led WBTechT Study or Follow-up for Microsoft Applications: 7.9.20...

  4. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: C++ for Particle Physicists : 8 - 12.3.2004 (6 X 4-hour sessions) Introduction to the CERN EDMS : 9.3.2004 (1 day, free of charge) The EDMS MTF in Practice : 10.3.2004 (morning, free of charge) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon, free of charge) The CERN EDMS for Engineers : 11.3.2004 (1 day, free of charge) LabVIEW...

  5. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: AutoCAD 2002 - niveau 1 : 13, 14, 23, 24.09.2004 (4 jours) Introduction to the CERN EDMS : 22.6.2004 (1 day) The CERN EDMS for local administrators : 23 & 24.6.2004 (2 days) MAGNE-04 : Magnétisme pour l'électrotechnique : 6 - 8.7.2004 (3 jours) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 7 & 8.9.2004 (2 jours) ENSEIGNEMENT TECHNIQUE TECHNICAL TRAINING...

  6. Technical Training: Places available

    CERN Document Server

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Joint PVSS JCOP Programming : 9 - 13.8.2004 (5 days) Hands-on Introduction to Python Programming: 1 - 3.9.2004 (3 days - free course) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 7 & 8.9.2004 (2 jours) Joint PVSS JCOP Programming : 13 - 17.9.2004 (5 days) AutoCAD 2002 - niveau 1 : 13, 14, 23, 24.9.2004 (4 jours) Programmation STEP7 niveau 1 : 14-17.9.2004 (4...

  7. Technical Training: Places available**

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The JAVA Programming Language Level 1 : 9 & 10.1.2004 (2 days) LabVIEW TestStand I (E) : 23 & 24.2.2004 (2 days) LabVIEW base 1 : 25 - 27.2.2004 (3 jours) CLEAN-2002 : Working in a Cleanroom : 10.3.2004 (afternoon - free of charge) C++ for Particle Physicists : 8 - 12.3.2004 ( 6 X 4-hour sessions) LabVIEW hands-on (E) 16.3...

  8. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Hands-on Introduction to Python Programming: 1 - 3.9.2004 (3 days - free course) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 7 & 8.9.2004 (2 jours) AutoCAD 2002 - niveau 1 : 13, 14, 23, 24.9.2004 (4 jours) Programmation STEP7 niveau 1 : 14-17.9.2004 (4 jours) FrontPage 2003 - niveau 1 : 20 & 21.9.2004 (2 jours) Word 2003 - niveau 2 : 27 & 28.9.2004 (2 jours) Introduction à Wind...

  9. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Introduction to the CERN EDMS : 22.6.2004 (1 day) The CERN EDMS for local administrators : 23 & 24.6.2004 (2 days) Compatibilité électromagnétique (CEM) - Introduction / Electromagnetic Compatibility (EMC) - Introduction: 7.7.2004 (morning) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 7 & 8.9.2004 (2 jours) AutoCAD 2002 - niveau 1 : 13, 14, 23, 24.9.2004 (4 jours) Programmation STEP...

  10. Analytical system availability techniques

    NARCIS (Netherlands)

    Brouwers, J.J.H.; Verbeek, P.H.J.; Thomson, W.R.

    1987-01-01

    Analytical techniques are presented to assess the probability distributions and related statistical parameters of loss of production from equipment networks subject to random failures and repairs. The techniques are based on a theoretical model for system availability, which was further developed

  11. Session 2: Availability

    CERN Document Server

    Uythoven, J

    2012-01-01

    This session concentrated on the main players affecting the availability of the LHC: the Quench Protection System (QPS), the cryogenics system, the regularly foreseen technical stops and the effect of radiation on equipment failures. A forecast for operation in 2012 was made for all these items.

  12. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Project Planning with MS-Project :6 & 13.5.2004 (2 days) Word 2003 - niveau 1 : 10 & 11.5.2004 (2 jours) Oracle 9i : SQL : 17 - 19.5.2004 (3 days) Word 2003 - niveau 2 : 24 & 25.5.2004 (2 jours) EXCEL 2003 - niveau 1: 27 & 28.5.2004 (2 jours) STEP7 Programming Level 1 : 1 - 4.6.2004 (4 days) Oracle 9i : Programming with PL/SQL : 2 - 4.6.2...

  13. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 27.6.2006 (July-December course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue Manipulation des images 4 6.07.06 F Introduction to Databases and Database Design 16 11-12.07.06 E ACCESS 2003 - Level 1: ECDL 16 13-14.07.06 E-F Design Patterns 16 25-26.07.06 E CERN EDMS for Local Administrators 16 1-2.08.06 E ANSYS DesignModeler 16 29-30.08.06 F CERN EDMS - Introduction 8 5.09.06 E CERN EDMS MTF en pratique 4 6.09.06 F LabVIEW Basics 1 24 4-6.09.06 E ANSYS Workbench 32 12-15.09.06 F AutoCAD Mechanical 2006 16 12-13.09.06 F CERN EDMS for Engineers 8 12.09.06 E Software Engineering in the Small and the Large 16 12-13.09.06 E AutoCAD 2006 - niveau 1 32 14-21.09.06 F LabVIEW Basics 2 ...

  14. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 11.7.2006 (July-December course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue Design Patterns 16 25-26.07.06 E CERN EDMS for Local Administrators 16 1-2.08.06 E ANSYS DesignModeler 16 29-30.08.06 F CERN EDMS – Introduction 8 5.09.06 E CERN EDMS MTF en pratique 4 6.09.06 F LabVIEW Basics 1 24 4-6.09.06 E ANSYS Workbench 32 12-15.09.06 F AutoCAD Mechanical 2006 16 12-13.09.06 F CERN EDMS for Engineers 8 12.09.06 E Software Engineering in the Small and the Large 16 12-13.09.06 E LabVIEW Basics 2 16 14-15.09.06 E LabVIEW: Working efficiently with LabWIEW 8 8 18.09.06 E PCAD Schémas ? Introduction 16 21-22.09.06 F PCAD PCB - Introduction  24 27-29.09.06 F C++ for Particle Physicists ...

  15. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Oracle 9i : New features for developers : 14 - 16.6.2004 (3 days) The Joint PVSS JCOP Framework: 14 - 18.6.2004 (5 days) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 15 & 16.6.2004 (2 jours) EXCEL 2003 - niveau 2 : 17 & 18.6.2004 (2 jours) MAGNE-04 : Magnétisme pour l'électrotechnique : 6 au 8.7.2004 (3 jours) AutoCAD 2002 - niveau 1 : 13, 14, 23, 24.09.2004 (4 jours) ENSEIGNEMEN...

  16. Technical Training: Places Available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training Monique Duval - Tel.74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Oracle 9i: SQL: 17 - 19.5.2004 (3 days) Word 2003 - niveau 2 : 24 & 25.5.2004 (2 jours) EXCEL 2003 - niveau 1 : 27 & 28.5.2004 (2 jours) STEP7 Programming Level 1: 1 - 4.6.2004 (4 days) Oracle 9i : Programming with PL/SQL: 2 - 4.6.2004 (3 days) CST Microwave Studio: 3 & 4.6.2004 (2 days) Oracle 9i : New f...

  17. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an 'application for training' form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. Technical Training Monique Duval - Tel.74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Word 2003 - niveau 2 : 24 & 25.5.2004 (2 jours) VisualEliteHDL : 25 & 26.5.2004 (2 days) EXCEL 2003 - niveau 1 : 27 & 28.5.2004 (2 jours) STEP7 Programming Level 1: 1 - 4.6.2004 (4 days) Oracle 9i : Programming with PL/SQL: 2 - 4.6.2004 (3 days) CST Microwave Studio: 3 & 4.6.2004 (2 days) Oracle 9...

  18. Distributed intelligence improves availability

    International Nuclear Information System (INIS)

    Einholf, C.W.; Ciaramitaro, W.

    1982-01-01

    The new generation of instrumentation which is being developed to monitor critical variables in nuclear power plants is described. Powerful, compact microprocessors have been built into monitors to simplify data display. Some of the benefits of digital systems are improved plant availability, reduction in maintenance costs, reduction in manpower, lessening of test times and less frequent inspection and overhaul. (U.K.)

  19. Technical Training: Places available

    CERN Multimedia

    2006-01-01

    Places available as of 21.3.2006 (March-October course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: find out the curren Hours Date Language ACROBAT 7.0 : Utilisation de fichiers PDF 8 8.05.06 F Project Planning with MS-Project 16 9.05-6.06.06 E STEP7: niveau 1 32 9-12.05.06 E-F Oracle: Programming with PL/SQL 24 10-12.05.06 E FileMaker - niveau 2 16 11-12.05.06 F LabVIEW Application Development 24 15-17.05.06 E LabVIEW Advanced Programming 16 18-19.05.06 E PERL 5: Advanced Aspects 8 18.05.06 E Technique du vide 16 18-19.05.06 F WORD 2003 - niveau 2 : ECDL 16 22-23.05.06 F Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE 16 23-24.05.06 F Comprehensive VHDL for FPGA Design 40 29.05-2.06.06 E C++ Programming Part 2 - Advanced C++ and its T...

  20. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Instructor-led WBTechT study or follow-up for Microsoft applications : 1.4.2004 (morning) FrontPage XP - niveau 1 : 5 & 6.4.2004 (2 jours) AutoCAD 2002 - niveau 1 : 19, 20.4 et 3, 4.5.2004 (4 jours) Oracle 8i/9i - Develop Web-based Applications with PL/SQL : 19 & 20.4.2004 (2 days) Introduction to ANSYS : 20 - 23.4.2004 (4 day...

  1. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: FrontPage XP - niveau 2 : 26 & 27.4.2004 (2 jours) The Joint PVSS JCOP Framework : 26 - 30.4.2004 (5 days) Computational Electromagnetics with the ELEKTRA Module of OPERA-3D : 27 & 28.4.2004 (2 days) Hands-on Introduction to Python Programming : 3 - 5.5.2004 (3 days) LabVIEW Base 2 : 6 & 7.5.2004 (2 jours) Project Pla...

  2. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Computational Electromagnetics with the ELEKTRA Module of OPERA-3D : 27 & 28.4.2004 (2 days) Hands-on Introduction to Python Programming : 3 - 5.5.2004 (3 days) LabVIEW Base 2 : 6 & 7.5.2004 (2 jours) Project Planning with MS-Project : 6 & 13.5.2004 (2 days) Word 2003 - niveau 1 : 10 & 11.5.2004 (2 jours) Oracle 9i : SQL : 10 - 12.5.2004 (3...

  3. Technical Training: Places available

    CERN Multimedia

    2004-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: AutoCAD 2002 - niveau 1 : 19, 20.4 et 3, 4.5.2004 (4 jours) Oracle 8i/9i - Develop Web-based Applications with PL/SQL : 19 & 20.4.2004 (2 days) Introduction to ANSYS : 20 - 23.4.2004 (4 days) LabVIEW Hands-on : 20.4.2004 (half-day, p.m.) FrontPage XP - niveau 2 : 26 & 27.4.2004 (2 jours) The Joint PVSS JCOP Framework : 26 -...

  4. TECHNICAL TRAINING: Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Hands-on Introduction to Python Programming : 12 - 14.11.03(3 days) ACCESS 2000 - niveau 1 : 13 & 14.11.03 (2 jours) C++ for Particle Physicists : 17 - 21.11.03 (6 X 3-hour lectures) Programmation automate Schneider TSX Premium - niveau 2 : 18 - 21.11.03 (4 jours) Project Planning with MS-Project  (free of charg...

  5. TECHNICAL TRAINING: Places available**

    CERN Multimedia

    2003-01-01

    If you wish to participate in one of the following courses, please discuss with your supervisor and apply electronically directly from the course description pages that can be found on the Web at: http://www.cern.ch/Training/ or fill in an "application for training" form available from your Divisional Secretariat or from your DTO (Divisional Training Officer). Applications will be accepted in the order of their receipt. TECHNICAL TRAINING Monique Duval Tel. 74924 technical.training@cern.ch ** The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The EDMS-MTF in practice (free of charge) : 28 -  30.10.03 (6 half-day sessions) AutoCAD 2002 – Level 1 : 3, 4, 12, 13.11.03 (4 days) LabVIEW TestStand ver. 3 : 4 & 5.11.03 (2 days) Introduction to PSpice : 4.11.03 p.m. (half-day) Hands-on Introduction to Python Programming : 12 – 14.11.03 (3 days) ACCESS ...

  6. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 19.7.2006 (August-December course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue CERN EDMS for Local Administrators 16 1-2.08.06 E ANSYS DesignModeler 16 29-30.08.06 F OUTLOOK 2003 (Short Course I) - E-mail 3 1.09.06 E/F OUTLOOK 2003 (Short Course II) - Calendar, Tasks and Notes 3 1.09.06 E/F CERN EDMS - Introduction 8 5.09.06 E CERN EDMS MTF en pratique 4 6.09.06 F LabVIEW Basics 1 24 11-13.09.06 E ANSYS Workbench 32 12-15.09.06 F CERN EDMS for Engineers 8 12.09.06 E Software Engineering in the Small and the Large 16 12-13.09.06 E LabVIEW Basics 2 16 14-15.09.06 E EXCEL 2003 (Short Course I) - HowTo... Work with formulae 3 15.09.06 E/F WORD 2003 (Short Course III) - HowTo... Work with long docu...

  7. Technical Training: Places available

    CERN Multimedia

    DAvide Vitè

    2006-01-01

    Places available as of 25.7.2006 (August-December course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Titre Heure Date Langue CERN EDMS for Local Administrators 16 1-2.08.06 E ANSYS DesignModeler 16 29-30.08.06 F EXCEL 2003 - niveau 1 : ECDL 16 30-31.08.06 F OUTLOOK 2003 (Short Course I) - E-mail 3 1.09.06 E/F OUTLOOK 2003 (Short Course II) - Calendar, Tasks and Notes 3 1.09.06 E/F CERN EDMS - Introduction 8 5.09.06 E CERN EDMS MTF en pratique 4 6.09.06 F ANSYS Workbench 32 12-15.09.06 F CERN EDMS for Engineers 8 12.09.06 E Software Engineering in the Small and the Large 16 12-13.09.06 E LabVIEW Basics 2 16 14-15.09.06 E WORD 2003 (Short Course III) - HowTo... Work with long documents 3 15.09.06 E/F EXCEL 2003 (Short Course I) - HowTo... Wor...

  8. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 7.2.2006 (February-May course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language WORD 2003 (Short Course II) - HowTo... Mail merge 3 09-02-06 E-F ACCESS 2003 - Level 1: ECDL M5 16 13 to 14-02-06 E-F OUTLOOK 2003 (Short Course II) - Calendar, Tasks and Notes 3 16-02-06 E-F WORD 2003 (Short Course III) - HowTo... Work with long documents 3 16-02-06 E-F CERN EDMS - Introduction 8 21.02.06 E OUTLOOK 2003 (Short Course III) - Meetings and Delegation 3 27-02-06 E-F WORD 2003 (Short Course IV) - HowTo... Work with master document 3 27-02-06 E-F JAVA: Level 2 32 28-02-06 to 03-03-06 E Manipulation des images 4 28.02.06 F ACCESS 2003 - Level 2: ECDL AM5 16 02 to 03-03-06 E-F FrontPage 2003 - niveau 2 16 02 to 03-03-06 F C++ for Particle Physicists 20 06 to 10-03-06 E FileMaker - niv...

  9. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 21.3.2006 (March-October course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language FrontPage 2003 - niveau 1 16 27-28.03.06 F Oracle Forms Developer 10g: Move to the Web 16 27-28.03.06 E ACCESS 2003 - Level 2: ECDL AM5 16 3-4.03.06 E-F JAVA 2 Enterprise Edition - Part 1: Web Applications 16 3-4.04.06 E JAVA 2 Enterprise Edition - Part 2: Enterprise JavaBeans 24 5-7.04.06 E AutoCAD Mechanical 2006 16 11-12.04.06 F FrontPage 2003 - niveau 2 16 24-25.04.06 F C++ Programming Part 1 - Introduction to Object-Oriented Design and Programming 24 25-27.04.06 E AutoCAD 2006 - niveau 1 32 27.04-4.05.06 F Oracle: SQL 24 3-5.05.06 E EXCEL 2003 (Short Course I) - HowTo... Work with formulae 3 4.05.06 (am) E-F EXCEL 2003 (Short Course II) - HowTo... Format your worksheet for printing 3 4...

  10. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 7.2.2006 (February-May course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language WORD 2003 (Short Course II) - HowTo... Mail merge 3 13.03.06 E-F EXCEL 2003 (Short Course III) - HowTo... Pivot tables 3 20.03.06 E-F EXCEL 2003 (Short Course IV) - HowTo....Link cells, worksheets and workbooks 3 20.03.06 E-F Object-Oriented Analysis and Design using UML 24 21-23.03.06 E EXCEL 2003 - niveau 1 16 22-23.03.06 F FrontPage 2003 - niveau 1 16 27-28.03.06 F Oracle Forms Developer 10g: Move to the Web 16 27-28.03.06 E Oracle JDeveloper 10g: Build Applications with ADF 24 29-31.03.06 E ACCESS 2003 - Level 2: ECDL AM5 16 3-4.03.06 E-F JAVA 2 Enterprise Edition - Part 1: Web Applications 16 3-4.04.06 E JCOP: Control System Integration using JCOP Tools 24 4-6.04.06 E JAVA 2 Enterprise Edition...

  11. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    Places available as of 7.2.2006 (February-May course sessions) The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language WORD 2003 (Short Course IV) - HowTo... Work with master document 3 27.02.06 E-F JAVA: Level 2 32 28.02-3.03.06 E Manipulation des images 4 28.02.06 F ACCESS 2003 - Level 2: ECDL AM5 16 2-3.03.06 E-F C++ for Particle Physicists 20 6-10.03.06 E PowerPoint 2003 8 9.03.06 F JCOP: Control System Integration using JCOP Tools 24 14-16.03.06 E EXCEL 2003 (Short Course III) - HowTo... Pivot tables 3 20.03.06 E-F EXCEL 2003 (Short Course IV) - HowTo....Link cells, worksheets and workbooks 3 20.03.06 E-F JCOP: Finite State Machines in the JCOP Framework 24 21-23.03.06 E Object-Oriented Analysis and Design using UML 24 21-23.03.06 E FrontPage 2003 - niveau 1 16 27-28.03.06 F JCOP: Joint PVSS-JCOP Fram...

  12. Uranium distribution and availability

    International Nuclear Information System (INIS)

    Bowie, S.H.U.

    1977-01-01

    Uranium deposits are not uniformly distributed in the earth's crust but occur in well-defined provinces, mainly in Precambrian terrain and in association with acid igneous rocks. Deposits can conveniently be classified into four main groups; uranium in sandstones; uranium in conglomerates; vein-and similar-type deposits; and other uranium deposits. Most of the presently known reserves occur in sandstones; vein-type deposits are now second in importance; conglomerates are third and other deposits, excluding shales, fourth. The shales of southern Sweden constitute a special case; although recoverable reserves are large (300 000 t U), annual production from them is not likely to exceed 1000 to 2000 t U. The estimation of reserves has been complicated by rapid price rises since 1973 and by uncertainty as to what cost or price levels should be adopted in distinguishing between reserves and resources. Also there has been a tendency for requirements to be revised downwards, and this, together with the apparent acceptance of cost levels of around $30/lb U 3 O 8 , has relieved the medium-term prospects so far as supply is concerned. In the longer term, however, there is clearly a need for increased prospecting effort on a world scale and for the introduction of new search methods, particularly those aimed at the detection of hidden orebodies. this requirement will be greatly enhanced if there is any retardation in the introduction of fast reactors. (author)

  13. Validation of a hot water rinse and lactic acid spray in combination with scaling for treating hide-on carcasses to control biotype I strains of Escherichia coli used as surrogates for Shiga toxin-producing E. coli

    Science.gov (United States)

    Scalding of hide-on bob veal carcasses with or without standard scalding chemical agents typically used for hogs, followed by an 82.2degreeC hot water wash and lactic acid spray (applied at ambient temperature) prior to chilling, was evaluated to determine its effectiveness in reducing the levels of...

  14. Optical image-hiding method with false information disclosure based on the interference principle and partial-phase-truncation in the fractional Fourier domain

    International Nuclear Information System (INIS)

    Dai, Chaoqing; Wang, Xiaogang; Zhou, Guoquan; Chen, Junlang

    2014-01-01

    An image-hiding method based on the optical interference principle and partial-phase-truncation in the fractional Fourier domain is proposed. The primary image is converted into three phase-only masks (POMs) using an analytical algorithm involved partial-phase-truncation and a fast random pixel exchange process. A procedure of a fake silhouette for a decryption key is suggested to reinforce the encryption and give a hint of the position of the key. The fractional orders of FrFT effectively enhance the security of the system. In the decryption process, the POM with false information and the other two POMs are, respectively, placed in the input and fractional Fourier planes to recover the primary image. There are no unintended information disclosures and iterative computations involved in the proposed method. Simulation results are presented to verify the validity of the proposed approach. (letters)

  15. Test plans for availability

    International Nuclear Information System (INIS)

    Rise, J.L.; Bjoerklund, O.

    1978-12-01

    In this work is developed principles for statistical test plans for availability compliance tests. Failure terminated and time terminated fixed size plans are considered as well as sequential test plans without and with failure and time truncation. The suggested methods are evaluated with respect to some important characteristics, namely the average number of failures to termination, the duration of the test and the operating characteristic function. The methods used are based on the assumption that up- and down-times can be considered gamma distributed. Simulation studies indicate that the methods are robust against reasonable deviations in distribution assumptions for the down-times. In the work is also outlined technical conditions and prerequisites applicable to availability compliance tests in general. The approach choosen seems very promising and is worth further development. It is based on the same fundamental principles as present is used in International standardization of equipment reliability testing. (author)

  16. Future Contracting for Availability

    Science.gov (United States)

    2016-04-30

    rising costs for its social welfare system as the population continues to age. Unless retirement and healthcare entitlement expenditures are reduced...could make better use of available government and industry resources at the system, subsystem, and component levels. In that context, outsourcing ...should be considered in functions where robust capability already exists in the private sector. Outsourcing those functions could result in a 10–15

  17. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Hands-on Object-Oriented Design and Programming with C++ : 22 - 24.3.2005 (3 days) FileMaker - niveau 2 : 4 & 5.4.2005 (2 jours) EMAG-2004 - Electromagnetic Design and Mathematical Optimization in Magnet Technology: 4- 14.4.2005 (8 x 3h) EXCEL 2003 - niveau 2 : 11 & 12.4.2005 (2 jours) LabVIEW Intermediate 1: 11 - 13.4.2005 (3 days) ACCESS 2003 - Level 2 - ECDL AM5: 13 & 14.4.2005 (2 days) LabVIEW Intermediate 2: 14 & 15.4.2005 (2 days) PowerPoint 2003 (F) : 18.4.2005 (1 jour) Joint PVSS JCOP Framework : 25 - 29.4.2005 (5 days) WORD 2003 - niveau 1 : 2 & 3.5.2005 (2 jours) ELEC-2005 - Summer Term: System electronics for physics - Issues : 10, 12, 17, 19, 24, 26 & 31.5.2005 (7 x 2h lectures) AutoCAD 2002 - niveau 1 : 11, 12, 18 & 19.5.2005 (4 jour...

  18. Resources available in society

    International Nuclear Information System (INIS)

    Berg, S.E.

    1997-01-01

    A decontamination operation will only be successful if cost-efficient methods are used. The cost-effectiveness depends, among many other factors, including the qualifications and training of the personnel and the capability of the equipment. The personnel must be able to handle the equipment in a professional way and should also know how to protect themselves. To fulfil these requirements they need courses in radiation protection. The equipment must be suitable for the selected countermeasure. Societies planning and preparedness for reclamation should meet realistic demands for early actions and outline a cost-effective strategy that implies reasonable use of personnel and equipment resources. Planning for early cleanup actions is different from that of long term planning with respect to the available time and quantity and quality of available information on which to base decisions. Available resources vary, of course, between the Nordic countries, but in all countries there are organisations with both knowledgeable staff and suitable equipment accessible for decontamination operations. (EG)

  19. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Introduction à ANSYS : 23 - 26.11.2004 (4 jours) FileMaker - niveau 1 : 23 - 26.11.2004 (4 jours) Project Planning with MS-Project : 25.11 & 2.12.2004 (2 days) Explicit Dynamics with ANSYS/LS-Dyna : 7 - 9.12.2004 (3 days) Introduction to PERL 5 : 8 & 9.12.2004 (2 days) PCAD Schémas - Débutants : 9 & 10.12.2004 (2 jours) The JAVA Programming Language Level 1 : 11 & 12.1.2005 (2 days) Introduction to XML : 13 & 14.1.2005 (2 days) Introduction to the CERN EDMS : 18.1.2005 (1 day - free course) The CERN EDMS for Local Administrators : 19 & 20.1.2005 (2 days - free course) Programmation Unity-Pro pour utilisateurs de Schneider PL7-Pro : 24 - 28.1.2005 (8 demi-journées) CLEAN-2002 : Travaill...

  20. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Explicit Dynamics with ANSYS/LS-Dyna : 7 - 9.12.2004 (3 days) Introduction to PERL 5 : 8 & 9.12.2004 (2 days) PCAD Schémas - Débutants : 9 & 10.12.2004 (2 jours) Advanced aspects of PERL 5: 10.12.2004 (1 day) PCAD PCB – Débutants : 13 - 15.12.2004 (3 jours) The JAVA Programming Language Level 1 : 11 & 12.1.2005 (2 days) Introduction to XML : 13 & 14.1.2005 (2 days) Introduction to the CERN EDMS : 18.1.2005 (1 day - free course) The CERN EDMS for Local Administrators : 19 & 20.1.2005 (2 days - free course) Programmation Unity-Pro pour utilisateurs de Schneider PL7-Pro : 24 - 28.1.2005 (8 demi-journées) CLEAN-2002 : Travailler en salle propre : 25.1.2005 (après-midi, cours gratuit) Compatibilit&eac...

  1. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: FileMaker - niveau 1 : 23 - 26.11.2004 (4 jours) Explicit Dynamics with ANSYS/LS-Dyna : 7 - 9.12.2004 (3 days) Introduction to PERL 5 : 8 & 9.12.2004 (2 days) PCAD Schémas - Débutants : 9 & 10.12.2004 (2 jours) Advanced aspects of PERL 5: 10.12.2004 (1 day) PCAD PCB – Débutants : 13 - 15.12.2004 (3 jours) The JAVA Programming Language Level 1 : 11 & 12.1.2005 (2 days) Introduction to XML : 13 & 14.1.2005 (2 days) Introduction to the CERN EDMS : 18.1.2005 (1 day - free course) The CERN EDMS for Local Administrators : 19 & 20.1.2005 (2 days - free course) Programmation Unity-Pro pour utilisateurs de Schneider PL7-Pro : 24 - 28.1.2005 (8 demi-journées) CLEAN-2002 : Travailler en salle propre : 25.1.2005 ...

  2. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: C++ for Particle Physicists : 15 - 19.11.2004 (6 X 3 hours sessions) Word 2003 - niveau 1 : 22 & 23.11.2004 (2 jours) Introduction à ANSYS : 23 - 26.11.2004 (4 jours) Project Planning with MS-Project : 25.11 & 2.12.2004 (2 days) Explicit Dynamics with ANSYS/LS-Dyna : 7 - 9.12.2004 (2 days) PCAD Schémas - Débutants : 9 & 10.12.2004 (2 jours) The JAVA Programming Language Level 1 : 11 & 12.1.2005 (2 days) Introduction to XML : 13 & 14.1.2005 (2 days) CLEAN-2002 : Travailler en salle propre : 25.1.2005 (après-midi, cours gratuit) Compatibilité électromagnétique (CEM) : installation et remèdes : 25 - 27.1.2005 (3 jours) Finite State Machines in the JCOP Fr ...

  3. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: LabVIEW Intermediate I : 8 - 10.11.2004 (3 days) Instructor-led WTechT Study or Follow-up for Microsoft Applications : 9.11.2004 (morning) Hands-On Object Oriented Design and Programming with C++ : 9 - 11.11.2004 (3 days) Outlook (Short Course III) : Meetings and Delegation : 9.11.2004 (2 hours, afternoon) LabVIEW Intermediate II : 11 & 12.11.2004 (2 days) AutoCAD 2002 - niveau 1 : 11, 12, 18, 19.11.2004 (4 jours) C++ for Particle Physicists : 15 - 19.11.2004 (6 X 3 hours sessions) Word 2003 - niveau 1 : 22 & 23.11.2004 (2 jours) Introduction à ANSYS : 23 - 26.11.2004 (4 jours) CLEAN-2002 - Travailler en salle propre : 23.11.2004 (après-midi, cours gratuit) Project Planning with MS-Project : 25.11 & 2.12.2004 (2 days) ENSEIGNEMENT ...

  4. Technical training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: LabVIEW Intermediate I : 8 - 10.11.2004 (3 days) Instructor-led WTechT Study or Follow-up for Microsoft Applications : 9.11.2004 (morning) Outlook (Short Course III) : Meetings and Delegation : 9.11.2004 (2 hours, afternoon) LabVIEW Intermediate II : 11 & 12.11.2004 (2 days) AutoCAD 2002 - niveau 1 : 11, 12, 18, 19.11.2004 (4 jours) C++ for Particle Physicists : 15 - 19.11.2004 (6 X 3 hours sessions) Word 2003 - niveau 1 : 22 & 23.11.2004 (2 jours) Introduction à ANSYS : 23 - 26.11.2004 (4 jours) Project Planning with MS-Project : 25.11 & 2.12.2004 (2 days) Introduction to PERL 5 : 8 & 9.12.2004 (2 days) Advanced aspects of PERL 5 : 10.12.2004 (1 day) The JAVA Programming Language Level 1 : 11 & 12.1.2005 (2 days) Introduction...

  5. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Finite State Machines in the JCOP Framework:  26 - 28.9.2005 (3 days) WORD 2003 (Short Course IV) - HowTo... Work with master document: 28.9.2005 (morning) Joint PVSS JCOP Framework : 3 - 7.10.2005 (5 days) Introduction à Dreamweaver MX :  3 - 4.10.2005 (2 jours) Utilisation des fichiers PDF avec Acrobat 7.0 :   4.10.2005 (1 journée) LaTeX par la pratique :   4 - 6.10.2005 (3 matinées) PowerPoint 2003 (F) :  7.10.2005 (1 journée) FileMaker - niveau 1 :  20 - 21.10.2005 (2 jours) ACCESS 2003 - Level 1 - ECDL M5: 24 - 25.10.2005 (2 days) EXCEL 2003 (Short Course III) - HowTo... Pivot tables: 26.10.2005 (morning) WORD 2003 (Short Course I) - HowTo... Work with AutoTasks: 26.10.2005 (afternoon) OUTLOOK (Short Course I) - E-mail: 2.11.2005 (morning) WORD 2003 (Short Course II) - HowTo... Mail merge: 2.11....

  6. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Introduction à Windows XP au CERN : 12.9.2005 (1 demi-journée) FrontPage 2003 - niveau 2 : 15 - 16.9.2005 (2 jours) Finite State Machines in the JCOP Framework:  26 - 28.9.2005 (3 days) MAGNE-05 - Magnétisme pour l'électrotechnique : 27 - 29.9.2005 (3 jours) WORD 2003 (Short Course IV) - HowTo... Work with master document: 28.9.2005 (morning) Joint PVSS JCOP Framework : 3 - 7.10.2005 (5 days) Introduction à Dreamweaver MX :  3 - 4.10.2005 (2 jours) Utilisation des fichiers PDF avec Acrobat 7.0 :   4.10.2005 (1 journée) LaTeX par la pratique :   4 - 6.10.2005 (3 matinées) PowerPoint 2003 (F) :  7.10.2005 (1 journée) ACCESS 2003 - Level 1 - ECDL M5: 24 - 25.10.2005 (2 days) EXCEL 2003 (Short Course III) - HowTo... Pivot tables: 26.10.2005 (morning) WORD 2003 (Short Course I) - HowTo... Work with Auto...

  7. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Joint PVSS JCOP Framework: 8 - 12.8.2005 (5 days) WORD 2003 (Short Course I) - HowTo... Work with AutoTasks (AutoText, AutoFormat, AutoCorrect, Lists, Find/Replace): 25.8.2005 (morning) WORD 2003 (Short Course II) - HowTo... Mail merge: 25.8.2005 (afternoon) EXCEL 2003 (Short Course I) - HowTo... Work with formulae: 26.8.2005 (morning) WORD 2003 (Short Course III) - HowTo... Work with long documents: 26.8.2005 (afternoon) FrontPage 2003 - niveau 1 : 1 - 2.9.2005 (2 jours) Utilisation des fichiers PDF avec ACROBAT 7.0 : 5.9.2005 (1 jour) LabVIEW Basics 1 : 5 - 7.9.2005 (3 days, dates to be confirmed) Introduction à Windows XP au CERN : 12.9.2005 (1 demi-journée) FrontPage 2003 - niveau 2 : 15 - 16.9.2005 (2 jours) AutoCAD 2005 - niveau 1 : 22, 23, 28, 29.9.2005 (4 jours) MAGNE-05 - Magn&...

  8. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Utilisation des fichiers PDF avec ACROBAT 7.0 : 5.9.2005 (1 jour) LabVIEW Basics 1:  5 - 7.9.2005 (3 days) Introduction à Windows XP au CERN : 12.9.2005 (1 demi-journée) FrontPage 2003 - niveau 2 : 15 - 16.9.2005 (2 jours) AutoCAD 2005 - niveau 1 : 22, 23, 28, 29.9.2005 (4 jours) Finite State Machines in the JCOP Framework:  26 - 28.9.2005 (3 days) MAGNE-05 - Magnétisme pour l'électrotechnique : 27 - 29.9.2005 (3 jours) WORD 2003 (Short Course IV) - HowTo... Work with master document: 28.9.2005 (morning) Joint PVSS JCOP Framework : 3 - 7.10.2005 (5 days) ACCESS 2003 - Level 1 - ECDL M5: 24 - 25.10.2005 (2 days) EXCEL 2003 (Short Course III) - HowTo... Pivot tables: 26.10.2005 (morning) WORD 2003 (Short Course I) - HowTo... Work with AutoTasks: 26.10.2005 (afternoon) OUTLOOK (Short Course I) - E-mail: 2...

  9. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Joint PVSS JCOP Framework: 8 - 12.8.2005 (5 days) WORD 2003 (Short Course I) - HowTo... Work with AutoTasks (AutoText, AutoFormat, AutoCorrect, Lists, Find/Replace): 25.8.2005 (morning) WORD 2003 (Short Course II) - HowTo... Mail merge: 25.8.2005 (afternoon) EXCEL 2003 (Short Course I) - HowTo... Work with formulae: 26.8.2005 (morning) WORD 2003 (Short Course III) - HowTo... Work with long documents: 26.8.2005 (afternoon) FrontPage 2003 - niveau 1 : 1 - 2.9.2005 (2 jours) Utilisation des fichiers PDF avec ACROBAT 7.0 : 5.9.2005 (1 jour) LabVIEW Basics 1 : 5 - 7.9.2005 (3 days, dates to be confirmed) Introduction à Windows XP au CERN : 12.9.2005 (1 demi-journée) FrontPage 2003 - niveau 2 : 15 - 16.9.2005 (2 jours) AutoCAD 2005 - niveau 1 : 22, 23, 28, 29.9.2005 (4 jours) Finite State Machines in the JCOP Framew...

  10. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language AutoCAD Mechanical 2006 16 30 to 31-01-06 F DIAdem : base 24 01 to 03-02-06 F ACROBAT 7.0 : Utilisation de fichiers PDF 8 06-02-06 F Manipulation des images 4 08-02-06 F OUTLOOK 2003 (Short Course I) - E-mail 3 09-02-06 E-F WORD 2003 (Short Course II) - HowTo... Mail merge 3 09-02-06 E-F ACCESS 2003 - Level 1: ECDL M5 16 13 to 14-02-06 E-F JCOP: Control System Integration using JCOP Tools 24 14 to 16-02-06 E OUTLOOK 2003 (Short Course II) - Calendar, Tasks and Notes 3 16-02-06 E-F WORD 2003 (Short Course III) - HowTo... Work with long documents 3 16-02-06 E-F FrontPage 2003 - niveau 1 16 23 to 24-02-06 F OUTLOOK 2003 (Short Course III) - Meetings and Delegation 3 27-02-06 E-F WORD 2003 (Short Course IV) - HowTo... Work with master document 3 27-02-06 E-F ...

  11. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2006-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Title Hours Date Language ACCESS 2003 - Level 2: ECDL AM5 16 19 to 20-01-06 E-F AutoCAD 2006 - niveau 1 32 19 to 25-01-06 F C++ Programming Advanced - Traps and Pitfalls 32 24 to 27-01-06 E STEP7 : Level 1 32 24 to 27-01-06 E LabVIEW Basics 2 16 26 to 27-01-06 E AutoCAD Mechanical 2006 16 30 to 31-01-06 F DIAdem : base 24 01 to 03-02-06 F FrontPage 2003 - niveau 1 16 02 to 03-02-06 F ACROBAT 7.0 : Utilisation de fichiers PDF 8 06-02-06 F Manipulation des images 4 08-02-06 F OUTLOOK 2003 (Short Course I) - E-mail 3 09-02-06 E-F WORD 2003 (Short Course II) - HowTo... Mail merge 3 09-02-06 E-F ACCESS 2003 - Level 1: ECDL M5 16 13 to 14-02-06 E-F JCOP: Control System Integration using JCOP Tools 24 14 to 16-02-06 E OUTLOOK 2003 (Short Course II) - Calendar, Tasks and Note...

  12. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: WORD 2003 (Short Course I) - HowTo... Work with AutoTasks (AutoText, AutoFormat, AutoCorrect, Lists, Find/Replace): 25.8.2005 (morning) WORD 2003 (Short Course II) - HowTo... Mail merge: 25.8.2005 (afternoon) EXCEL 2003 (Short Course I) - HowTo... Work with formulae: 26.8.2005 (morning) WORD 2003 (Short Course III) - HowTo... Work with long documents: 26.8.2005 (afternoon) FrontPage 2003 - niveau 1 : 1 - 2.9.2005 (2 jours) Utilisation des fichiers PDF avec ACROBAT 7.0 : 5.9.2005 (1 jour) LabVIEW base 1 : 5 - 7.9.2005 (3 jours) Introduction à Windows XP au CERN : 12.9.2005 (1 demi-journée) FrontPage 2003 - niveau 2 : 15 - 16.9.2005 (2 jours) AutoCAD 2005 - niveau 1 : 22, 23, 28, 29.9.2005 (4 jours) Finite State Machines in the JCOP Framework:  26 - 28.9.2005 (3 days) MAGNE-05 - Magnétisme pour l'électrotechniq...

  13. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: LabVIEW Real-Time (F) : 7 - 9.6.2005 (3 jours) LabVIEW Migration 6 to 7: 14.6.2005 (1 day) FrontPage 2003 - niveau 2 : 16 & 17.6.2005 (2 jours) Utilisation de fichiers PDF avec ACROBAT 6.0 : 20.6.2005 (1journée) Introduction to ANSYS: 21 - 24.6.2005 (4 days) WORD 2003 (Short Course I) - HowTo... Work with repetitive tasks /AutoText, AutoFormat, AutoCorrect, Find/Replace) : 4.7.2005 (afternoon) WORD 2003 (Short Course II) - HowTo... Mail merge: 5.7.2005 (afternoon) WORD 2003 (Short Course III) - HowTo... Work with long documents : 6.7.2005 (afternoon) ACCESS 2003 - Level 2 - ECDL AM5: 5 - 8.7.2005 (4 mornings) EXCEL 2003 (Short Course I) - HowTo... Work with formulae: 7.7.2005 (afternoon) EXCEL 2003 (Short Course II) - HowTo... Format your worksheet for printing: 8.7.2005 (aftern...

  14. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: LabVIEW base 1 : 4 - 6.7.2005 (3 jours) LabVIEW Basics 2: 7 - 8.7.2005 (2 days) Utilisation des fichiers PDF avec ACROBAT 7.0 : 5.7.2005 (1 jour) FrontPage 2003 - niveau 1 : 6-7.7.2005 (2 jours) WORD 2003 (Short Course I) - HowTo... Work with repetitive tasks /AutoText, AutoFormat, AutoCorrect, Find/Replace) : 4.7.2005 (afternoon) WORD 2003 (Short Course II) - HowTo... Mail merge: 5.7.2005 (afternoon) WORD 2003 (Short Course III) - HowTo... Work with long documents : 6.7.2005 (afternoon) OUTLOOK (Short Course I) - E-mail: 6.7.2005 (morning) OUTLOOK (Short Course II) - Calendar, Tasks and Notes: 7.7.2005 (morning) OUTLOOK (Short Course III) - Meetings and Delegation: 8.7.2005 (morning) EXCEL 2003 (Short Course I) - HowTo... Work with formulae: 7.7.2005 (afternoon) EXCEL 2003 (Short Course II) - HowTo... Format y...

  15. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: LabVIEW Real-Time (F) : 7 - 9.6.2005 (3 jours) LabVIEW Migration 6 to 7: 14.6.2005 (1 day) IT3T/1 - Read your mail and more with Outlook 2003 : 14.6.2005 (IT Technical Training Tutorial, free of charge) IT3T/2 - Creating, managing and using distribution lists with Simba2 : 16.6.2005 (IT Technical Training Tutorial, free of charge) FrontPage 2003 - niveau 2 : 16 & 17.6.2005 (2 jours) Utilisation de fichiers PDF avec ACROBAT 6.0 : 20.6.2005 (1journée) Introduction to ANSYS: 21 - 24.6.2005 (4 days) IT3T/3 - Working remotely with Windows XP : 28.6.2005 (IT Technical Training Tutorial, free of charge) IT3T/4 - Editing Websites with Frontpage 2003 : 30.6.2005 (IT Technical Training Tutorial, free of charge) WORD 2003 (Short Course I) - HowTo... Work with repetitive tasks /AutoText, AutoFormat, AutoC...

  16. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Hands-on Introduction to Python Programming: 28 - 30.6.2005 (3 days) Introduction to ANSYS: 28.6 - 1.7.2005 (4 days) IT3T/3 - Working remotely with Windows XP: 28.6.2005 (IT Technical Training Tutorial, free of charge) IT3T/4 - Editing Websites with Frontpage 2003: 30.6.2005 (IT Technical Training Tutorial, free of charge) LabVIEW base 1 : 4 - 6.7.2005 (3 jours) LabVIEW Basics 2: 7 - 8.7.2005 (2 days) Utilisation des fichiers PDF avec ACROBAT 7.0 : 5.7.2005 (1 jour) FrontPage 2003 - niveau 1 : 6-7.7.2005 (2 jours) WORD 2003 (Short Course I) - HowTo... Work with repetitive tasks /AutoText, AutoFormat, AutoCorrect, Find/Replace) : 4.7.2005 (afternoon) WORD 2003 (Short Course II) - HowTo... Mail merge: 5.7.2005 (afternoon) WORD 2003 (Short Course III) - HowTo... Work with long documents : 6.7.2005 (afternoon) ACCES...

  17. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Joint PVSS JCOP Framework: 8 - 12.8.2005 (5 days) FrontPage 2003 - niveau 1 : 1 - 2.9.2005 (2 jours) Utilisation des fichiers PDF avec ACROBAT 7.0 : 5.9.2005 (1 jour) LabVIEW Basics 1 : 5 - 7.9.2005 (3 days, dates to be confirmed) Introduction à Windows XP au CERN : 12.9.2005 (1 demi-journée) FrontPage 2003 - niveau 2 : 15 - 16.9.2005 (2 jours) AutoCAD 2005 - niveau 1 : 22, 23, 28, 29.9.2005 (4 jours) MAGNE-05 - Magnétisme pour l'électrotechnique : 27 - 29.9.2005 (3 jours) LabVIEW Application Development (Intermediate I): 5 - 7.12.2005 (3 days) LabVIEW Advanced Programming (Intermediate 2): 8 - 9.12.2005 (2 days) ENSEIGNEMENT TECHNIQUE TECHNICAL TRAINING Monique Duval 74924 technical.training@cern.ch

  18. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The JAVA Programming Language Level 1: 11 & 12.1.2005 (2 days) Introduction to XML : 13 & 14.1.2005 (2 days) The CERN EDMS for Local Administrators: 19 & 20.1.2005 (2 days - free course) Programmation Unity-Pro pour utilisateurs de Schneider PL7-Pro : 24 - 28.1.2005 (8 demi-journées) LabVIEW base 1/basics 1 : 31.1 - 1.2.2005 (2 j size="2">LabVIEW base 2/basics 2 : 3 & 4.2.2005 (2 jours/2 days - langue à décider/language to be decided) Finite State Machines in the JCOP Framework: 1 - 3.2.2005 (3 days - free course) The JAVA Programming Language Level 2: 7 - 9.2.2005 (3 days) C++ Programming Advanced -Traps and Pitfalls: 8 - 11.2.2005 (4 days) Joint PVSS JCOP Framework: 14 - 18.2.2005 (5 days) JAVA 2 Enterprise Edition - Part 1: ...

  19. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Joint PVSS JCOP Framework : 3 - 7.10.2005 (5 days) Utilisation des fichiers PDF avec Acrobat 7.0 :   4.10.2005 (1 journée) LaTeX par la pratique :   4 - 6.10.2005 (3 matinées) PowerPoint 2003 (F) :  7.10.2005 (1 journée) FileMaker - niveau 1 :  20 - 21.10.2005 (2 jours) ACCESS 2003 - Level 1 - ECDL M5: 24 - 25.10.2005 (2 days) Finite State Machines in the JCOP Framework : 25 - 27.10.2005 (3 days) EXCEL 2003 (Short Course III) - HowTo... Pivot tables: 26.10.2005 (morning) WORD 2003 (Short Course I) - HowTo... Work with AutoTasks: 26.10.2005 (afternoon) OUTLOOK (Short Course I) - E-mail: 2.11.2005 (morning) WORD 2003 (Short Course II) - HowTo... Mail merge: 2.11.2005 (afternoon) FrontPage 2003 - niveau 1 :  3 - 4.11.2005 (2 jours) AutoCAD 2006 - niveau 1 : 3, 4, 9, 10.11.2005 (4 jours) Joint PVSS JCO...

  20. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: LabVIEW Intermediate I : 8 - 10.11.2004 (3 days) Instructor-led WTechT Study or Follow-up for Microsoft Applications : 9.11.2004 (morning) Hands-On Object Oriented Design and Programming with C++ : 9 - 11.11.2004 (3 days) Outlook (Short Course III) : Meetings and Delegation : 9.11.2004 (2 hours, afternoon) LabVIEW Intermediate II : 11 & 12.11.2004 (2 days) AutoCAD 2002 - niveau 1 : 11, 12, 18, 19.11.2004 (4 jours) C++ for Particle Physicists : 15 - 19.11.2004 (6 X 3 hours sessions) Word 2003 - niveau 1 : 22 & 23.11.2004 (2 jours) Introduction à ANSYS : 23 - 26.11.2004 (4 jours) CLEAN-2002 - Travailler en salle propre : 23.11.2004 (après-midi, cours gratuit) Project Planning with MS-Project : 25.11 & 2.12.2004 (2 days) PCAD Sch&eac...

  1. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: FileMaker - niveau 1 :  20 - 21.10.2005 (2 jours) ACCESS 2003 - Level 1 - ECDL M5: 24 - 25.10.2005 (2 days) Finite State Machines in the JCOP Framework : 25 - 27.10.2005 (3 days) EXCEL 2003 (Short Course III) - HowTo... Pivot tables: 26.10.2005 (morning) WORD 2003 (Short Course I) - HowTo... Work with AutoTasks: 26.10.2005 (afternoon) OUTLOOK (Short Course I) - E-mail: 2.11.2005 (morning) WORD 2003 (Short Course II) - HowTo... Mail merge: 2.11.2005 (afternoon) FrontPage 2003 - niveau 1 :  3 - 4.11.2005 (2 jours) AutoCAD 2006 - niveau 1 : 3, 4, 9, 10.11.2005 (4 jours) Joint PVSS JCOP Framework : 7 - 11.11.2005 (5 days) OUTLOOK (Short Course II) - Calendar, Tasks and Notes: 16.11.2005 (morning) Joint PVSS JCOP Framework : 21 - 25.11.2005 (5 days) OUTLOOK (Short Course III) - Meetings and Delegation: 30.11....

  2. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: FileMaker - niveau 1 :  20 - 21.10.2005 (2 jours) ACCESS 2003 - Level 1 - ECDL M5: 24 - 25.10.2005 (2 days) Finite State Machines in the JCOP Framework : 25 - 27.10.2005 (3 days) EXCEL 2003 (Short Course III) - HowTo... Pivot tables: 26.10.2005 (morning) OUTLOOK (Short Course I) - E-mail: 2.11.2005 (morning) WORD 2003 (Short Course II) - HowTo... Mail merge: 2.11.2005 (afternoon) FrontPage 2003 - niveau 1 :  3 - 4.11.2005 (2 jours) AutoCAD 2006 - niveau 1 : 3, 4, 9, 10.11.2005 (4 jours) Joint PVSS JCOP Framework : 7 - 11.11.2005 (5 days) OUTLOOK (Short Course II) - Calendar, Tasks and Notes: 16.11.2005 (morning) Joint PVSS JCOP Framework : 21 - 25.11.2005 (5 days) OUTLOOK (Short Course III) - Meetings and Delegation: 30.11.2005 (morning) WORD 2003 (Short Course III) - HowTo... Work with long documents : ...

  3. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: FrontPage 2003 - niveau 1 : 1 - 2.9.2005 (2 jours) Utilisation des fichiers PDF avec ACROBAT 7.0 : 5.9.2005 (1 jour) LabVIEW Basics 1:  5 â€" 7.9.2005 (3 days) Introduction à Windows XP au CERN : 12.9.2005 (1 demi-journée) FrontPage 2003 - niveau 2 : 15 - 16.9.2005 (2 jours) AutoCAD 2005 - niveau 1 : 22, 23, 28, 29.9.2005 (4 jours) Finite State Machines in the JCOP Framework:  26 - 28.9.2005 (3 days) MAGNE-05 - Magnétisme pour l'électrotechnique : 27 - 29.9.2005 (3 jours) Joint PVSS JCOP Framework : 3 - 7.10.2005 (5 days) ACCESS 2003 - Level 1 - ECDL M5: 24 - 25.10.2005 (2 days) EXCEL 2003 (Short Course III) - HowTo... Pivot tables: 26.10.2005 (morning) OUTLOOK (Short Course I) - E-mail: 2.11.2005 (morning) OUTLOOK (Short Course II) - Calendar, Tasks and Notes: 16.11.2005 (morning) OU...

  4. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The JAVA Programming Language Level 1: 11 & 12.1.2005 (2 days) Introduction to XML : 13 & 14.1.2005 (2 days) ELEC-2005.:Winter term: Introduction to electronics in HEP: 18, 20, 25, 27.1, 1 & 3.2.2005 (6 x 2h lectures) The CERN EDMS for Local Administrators: 19 & 20.1.2005 (2 days - free course) Programmation Unity-Pro pour utilisateurs de Schneider PL7-Pro : 24 - 28.1.2005 (8 demi-journées) CLEAN-2002 : Travailler en salle propre : 25.1.2005 (après-midi, cours gratuit) Compatibilité électromagnétique (CEM) : installation et remèdes : 25 - 27.1.2005 (3 jours) Finite State Machines in the JCOP Framework: 1 - 3.2.2005 (3 days - free course) The JAVA Programming Language Level 2: 7 - 9...

  5. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: The CERN EDMS for Local Administrators: 19 & 20.1.2005 (2 days - free course) Programmation Unity-Pro pour utilisateurs de Schneider PL7-Pro : 24 - 28.1.2005 (9 demi-journées) LabVIEW base 1/basics 1 : 31.1 - 2.2.2005 (3 jours/3 days - langue à décider/language to be decided) LabVIEW base 2/basics 2 : 3 & 4.2.2005 (2 jours/2 days - langue à décider/language to be decided) Finite State Machines in the JCOP Framework: 1 - 3.2.2005 (3 days - free course) The JAVA Programming Language Level 2: 7 - 9.2.2005 (3 days) C++ Programming Advanced -Traps and Pitfalls: 8 - 11.2.2005 (4 days) Joint PVSS JCOP Framework: 14 - 18.2.2005 (5 days) JAVA 2 Enterprise Edition - Part 1: WEB Applications: 21 & 22.2.2005 (2 days) JAVA 2 Enterprise Edition - Part 2: Enterprise JavaBeans: 23 - 25.2.2005 (3 days) ELEC-2005 â...

  6. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: LabVIEW base 1/basics 1 : 31.1 - 2.2.2005 (3 jours/3 days - langue à décider/language to be decided) LabVIEW base 2/basics 2 : 3 & 4.2.2005 (2 jours/2 days - langue à décider/language to be decided) Finite State Machines in the JCOP Framework: 1 - 3.2.2005 (3 days - free course) The JAVA Programming Language Level 2: 7 - 9.2.2005 (3 days) C++ Programming Advanced -Traps and Pitfalls: 8 - 11.2.2005 (4 days) Joint PVSS JCOP Framework: 14 - 18.2.2005 (5 days) JAVA 2 Enterprise Edition - Part 1: WEB Applications: 21 & 22.2.2005 (2 days) FrontPage 2003 - niveau 1 : 21 & 22.2.2005 (2 jours) JAVA 2 Enterprise Edition - Part 2: Enterprise JavaBeans: 23 - 25.2.2005 (3 days) ELEC-2005 - Spring Term: Integrated circuits and VLSI technology...

  7. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Joint PVSS JCOP Framework : 9 - 13.8.2004 (5 days) Outlook (I): E-mail : 31.8.2004 (2 hours, morning) Outlook (II): Calendar, Tasks and Notes : 31.8.2004 (2 hours, afternoon) Hands-on Introduction to Python Programming : 1 - 3.9.2004 (3 days - free course) Instructor-led WBTechT Study or Follow-up for Microsoft Applications : 7.9.2004 (morning) Outlook (III): Meetings and Delegation : 7.9.2004 (2 hours, afternoon) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 7 & 8.9.2004 (2 jours) Joint PVSS JCOP Framework : 13 - 17.9.2004 (5 days) AutoCAD 2002 - niveau 1 : 13, 14, 23, 24.9.2004 (4 jours) Programmation STEP7 niveau 1 : 14 - 17.9.2004 (4 jours) FrontPage 2003 - niveau 1 : 20 & 21.9.2004 (2 jours) ANSYS: Thermal Analysis : 22 - 24.9.2004 (3 days) ANSYS: Advanced Topics : 27.9...

  8. Technical Training: Places available

    CERN Document Server

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Instructor-led WBTechT Study or Follow-up for Microsoft Applications : 7.9.2004 7.9.2004 Outlook (short course III) : Meetings and Delegation : 7.9.2004 (2 hours, afternoon) Introduction au VHDL et utilisation du simulateur NCVHDL de CADENCE : 7 & 8.9.2004 (2 jours) Joint PVSS JCOP Framework : 13 - 17.9.2004 (5 days) Programmation STEP7 niveau 1 : 14-17.9.2004 (4 jours) ANSYS : Thermal Analysis : 22 - 24.9.2004 (3 days) LabVIEW Migration 6 à 7 : 23.9.2004 (one day) ANSYS : Advanced Topics : 27.9 - 1.10.2004 (5 days) Word 2003 - niveau 2 : 27 & 28.9.2004 (2 jours) LabVIEW - Basics 1 : 27 - 29.9.2004 (3 days) MAGNE-04 : Magnétisme pour l'électrotechnique : 28 - 30.9.2004 (3 jours) LabVIEW - Basics 2 : 30.9 & 1.10.2004 (2 days) Introduction à Windows XP au CERN : 4.10.2004 (matin) ...

  9. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Programmation STEP7 niveau 1 : 14-17.9.2004 (4 jours) ANSYS : Thermal Analysis : 22 - 24.9.2004 (3 days) LabVIEW Migration 6 à 7 : 23.9.2004 (one day) ANSYS : Advanced Topics : 27.9 - 1.10.2004 (5 days) Word 2003 - niveau 2 : 27 & 28.9.2004 (2 jours) LabVIEW - Basics 1 : 27 - 29.9.2004 (3 days) MAGNE-04 : Magnétisme pour l'électrotechnique : 28 - 30.9.2004 (3 jours) LabVIEW - Basics 2 : 30.9 & 1.10.2004 (2 days) Introduction à Windows XP au CERN : 4.10.2004 (matin) FrontPage 2003 - niveau 1 : 7 & 8.10.04 (2 jours) Outlook (short course I) : E-mail : 22.10.2004 (2 hours, morning) Outlook (short course II) : Calendar, Tasks and Notes: 22.10.2004 (2 hours, afternoon) Introduction à ANSYS : 23 - 26.11.2004 (4 jours) ENSEIGNEMENT TECHNIQUE TECHNICAL TRAINING Monique Duval 74924...

  10. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Hands-on Introduction to Python Programming: 28 - 30.6.2005 (3 days) Introduction to ANSYS: 21 - 24.6.2005 (4 days) IT3T/3 - Working remotely with Windows XP: 28.6.2005 (IT Technical Training Tutorial, free of charge) IT3T/4 - Editing Websites with Frontpage 2003: 30.6.2005 (IT Technical Training Tutorial, free of charge) Utilisation des fichiers PDF avec ACROBAT 7.0 : 5.7.2005 (1 jour) FrontPage 2003 - niveau 1 : 6-7.7.2005 (2 jours) LabVIEW base 1 : 4 - 6.7.2005 (3 jours) LabVIEW Basics 2: 7 - 8.7.2005 (2 days) WORD 2003 (Short Course I) - HowTo... Work with repetitive tasks /AutoText, AutoFormat, AutoCorrect, Find/Replace) : 4.7.2005 (afternoon) WORD 2003 (Short Course II) - HowTo... Mail merge: 5.7.2005 (afternoon) WORD 2003 (Short Course III) - HowTo (4 mornings) EXCEL 2003 (Short Course I) - HowTo... Work ...

  11. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Utilisation des fichiers PDF avec ACROBAT 6.0 : 1.3.2005 (1 journée) ELEC-2005 - Spring Term: Integrated circuits and VLSI technology for physics: 1 - 17.3.2005 (6 x 2.5-hour lectures) C++ for Particle Physicists: 7 - 11.3.2005 (6 x 3-hour lectures) Joint PVSS JCOP Framework : 14 - 18.3.2005 (5 days) AXEL-2005; Introduction to Particle Accelerators : 14- 18.3.2005 (10 x 1 h lectures) ACCESS 2003 - Level 1: ECDL M5: 15 - 16.3.2005 (2 days) AutoCAD 2002 - niveau 1 : 15, 16, 21& 22.3.2005 (4 jours) FrontPage 2003 - niveau 2 : 21 & 22.3.2005 (2 jours) Hands-on Object-Oriented Design and Programming with C++ : 22 - 24.3.2005 (3 days) FileMaker - niveau 2 : 4 & 5.4.2005 (2 jours) EXCEL 2003 - niveau 2 : 11 & 12.4.2005 (2 jours) LabVIEW Intermediate 1: 11 - 13.4.2005...

  12. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: JAVA 2 Enterprise Edition - Part 1: WEB Applications: 21 & 22.2.2005 (2 days) FrontPage 2003 - niveau 1 : 21 & 22.2.2005 (2 jours) JAVA 2 Enterprise Edition - Part 2: Enterprise JavaBeans: 23 - 25.2.2005 (3 days) Utilisation des fichiers PDF avec ACROBAT 6.0 : 1.3.2005 (1 journée) Hands-on Object-Oriented Design and Programming with C++ : 1 - 3.3.2005 (3 days) ELEC-2005 - Spring Term: Integrated circuits and VLSI technology for physics: 1 - 17.3.2005 (6 x 2.5-hour lectures) C++ for Particle Physicists: 7 - 11.3.2005 (6 x 3-hour lectures) Joint PVSS JCOP Framework : 14 - 18.3.2005 (5 days) ACCESS 2003 - Level 1 : 15 - 16.3.2005 (2 days) AutoCAD 2002 - niveau 1 : 15, 16, 21& 22.3.2005 (4 jours) FrontPage 2003 - niveau 2 : 21 & 22.3.2005 (2 jours) FileMaker - ...

  13. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: FrontPage 2003 - niveau 1 : 9 & 10.5.2005 (2 jours) ELEC-2005 - Summer Term: System electronics for physics - Issues : 10, 12, 17, 19, 24, 26 & 31.5.2005 (7 x 2h lectures) AutoCAD 2005 - niveau 1 : 12, 13, 18, 19.5.2005 (4 jours) ACCESS 2003 - Level 1: ECDL M5 : 11 & 12.5.2005 (2 days) Object-Oriented Analysis and Design using UML: 17 - 19.5.2005 (3 days) Synplify Pro Training: 18.5.2005 (1 day) Finite State Machines in the JCOP Framework: 24 - 26.5.2005 (3 days) The Joint PVSS JCOP Framework: 30.5 - 3.6.2005 (5 days) Introduction à la CAO CADENCE : 31.5 - 1.6.2005 (2 jours) LabVIEW Real-Time (F) : 7 - 9.6.2005 (3 jours) LabVIEW Migration 6 to 7: 14.6.2005 (1 day) FrontPage 2003 - niveau 2 : 16 & 17.6.2005 (2 jours) Utilisation de fichiers PDF avec ACROBAT 6.0 : 20.6.2005 (1journée) Intr...

  14. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: FrontPage 2003 - niveau 1 : 9 & 10.5.2005 (2 jours) ELEC-2005 - Summer Term: System electronics for physics - Issues : 10, 12, 17, 19, 24, 26 & 31.5.2005 (7 x 2h lectures) AutoCAD 2005 - niveau 1 : 11, 12, 18, 19.5.2005 (4 jours) Object-Oriented Analysis and Design using UML: 17 - 19.5.2005 (3 days) Synplify Pro Training: 18.5.2005 (1 day) Finite State Machines in the JCOP Framework: 24 - 26.5.2005 (3 days) The Joint PVSS JCOP Framework: 30.5 - 3.6.2005 (5 days) Introduction à la CAO CADENCE : 31.5 - 1.6.2005 (2 jours) LabVIEW Real-Time (F) : 7 - 9.6.2005 (3 jours) LabVIEW Migration 6 to 7: 14.6.2005 (1 day) FrontPage 2003 - niveau 2 : 16 & 17.6.2005 (2 jours) Utilisation de fichiers PDF avec ACROBAT 6.0 : 20.6.2005 (1journée) Introductio...

  15. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: The Java Programming Language Level 1: 21 - 23.11.2005 (3 days) OUTLOOK (Short Course III) - Meetings and Delegation: 30.11.2005 (morning) WORD 2003 (Short Course III) - HowTo... Work with long documents : 30.11.2005 (afternoon) FrontPage 2003 - niveau 2 : 5 - 6.12.2005 (2 jours) Introduction à ANSYS Classique : 6 - 9.12.2005 (4 jours) EXCEL 2003 (Short Course II) - HowTo... Format your worksheet for printing: 7.12.2005 (morning) PCAD Schémas - Introduction : 8 - 9.12.2005 (2 jours) ACCESS 2003 - Level 2 - ECDL AM5: 14 - 15.12.2005 (2 days) LabVIEW Basics I:  23 - 25.1.2006 (3 days) C++ Programming Advanced - Traps and Pitfalls: 24 - 27.1.2006 (4 days) LabVIEW Basics II:  26 - 27.1.2006 (2 days) Joint PVSS-JCOP Framework: 30.1 - 3.2.2006 (5 days, free of charge) Finite State Machines in the JCOP Framework : ...

  16. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: FrontPage 2003 - niveau 2 : 5 - 6.12.2005 (2 jours) Introduction à ANSYS Classique : 6 - 9.12.2005 (4 jours) EXCEL 2003 (Short Course II) - HowTo... Format your worksheet for printing: 7.12.2005 (morning) PCAD Schémas - Introduction : 8 - 9.12.2005 (2 jours) Finite State Machines in the JCOP Framework: 13 - 15.12.2005 (3 days) ACCESS 2003 - Level 2 - ECDL AM5: 14 - 15.12.2005 (2 days) PCAD PCB - Introduction : 14 - 16.12.2005 (3 jours) AutoCAD 2006 - niveau 1 : 19, 20, 24 & 25.1.2006 (4 jours) LabVIEW Basics I:  23 - 25.1.2006 (3 days) C++ Programming Advanced - Traps and Pitfalls: 24 - 27.1.2006 (4 days) STEP7 Programming Level 1: 24 - 27.1.2006 (4 days) LabVIEW Basics II:  26 - 27.1.2006 (2 days) AutoCAD Mechanical 2006 : 30 - 31.1.2006 (2 jours; suite du cours AutoCAD 2006 - niveau 1) Joint PVS...

  17. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: ACCESS 2003 - Level 1 - ECDL M5: 24 - 25.10.2005 (2 days) Finite State Machines in the JCOP Framework : 25 - 27.10.2005 (3 days) EXCEL 2003 (Short Course III) - HowTo... Pivot tables: 26.10.2005 (morning) Introduction to the CERN EDMS: 2.11.2005 (1 day, free of charge) OUTLOOK (Short Course I) - E-mail: 2.11.2005 (morning) WORD 2003 (Short Course II) - HowTo... Mail merge: 2.11.2005 (afternoon) FrontPage 2003 - niveau 1 :  3 - 4.11.2005 (2 jours) AutoCAD 2006 - niveau 1 : 3, 4, 9, 10.11.2005 (4 jours) Joint PVSS JCOP Framework : 7 - 11.11.2005 (5 days) The CERN EDMS for Engineers: 8.11.2005 (1 day, free of charge) The EDMS-MTF in practice: 9.11.2005 (morning, free of charge) The CERN EDMS for Local Administrators: 15-16.11.2005 (2 days, free of charge) OUTLOOK (Short Course II) - Calendar, Tasks and Notes: ...

  18. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: OUTLOOK (Short Course III) - Meetings and Delegation: 30.11.2005 (morning) WORD 2003 (Short Course III) - HowTo... Work with long documents: 30.11.2005 (afternoon) FrontPage 2003 - niveau 2 : 5 - 6.12.2005 (2 jours) Introduction à ANSYS Classique : 6 - 9.12.2005 (4 jours) EXCEL 2003 (Short Course II) - HowTo... Format your worksheet for printing: 7.12.2005 (morning) AutoCAD - mise à jour d’AutoCAD 2002 à AutoCAD 2006 : 8.12.2005 (1 journée - pour les utilisateurs d’AutoCAD 2002) PCAD Schémas - Introduction : 8 - 9.12.2005 (2 jours) Finite State Machines in the JCOP Framework: 13 - 15.12.2005 (3 days) PCAD PCB - Introduction : 14 - 16.12.2005 (3 jours) ACCESS 2003 - Level 2 - ECDL AM5: 14 - 15.12.2005 (2 days) AutoCAD 2006 - niveau 1 : 19, 20, 24 & 25.1.2006 (4 jours) LabVIEW Basics I:  23 - 25.1.2006...

  19. EVALUATING COMMERCIALLY AVAILABLE DERMAL ...

    Science.gov (United States)

    As the Human Exposure Program focuses on the exposure of children to pesticides, there are concerns about the effect, or perceived effect, of components of the sampling procedure on the health and well-being of the infant and the ability to collect pesticide residues. One concern involves the materials in wipes used to collect pesticide residues or other contact materials on the skin. In recent studies (e.g., National Human Exposure Assessment Survey; NHEXAS), isopropyl alcohol has been used as a solvent in conjunction with a cloth wipe to obtain samples from the hands of adults and children. Although isopropyl alcohol is generally considered innocuous, the use of commercially available products could eliminate concerns about exposure to alcohol. A few studies have evaluated the potential of commercially available baby wipes to collect personal exposure samples for metals research, but not for the area of pesticide research (Millson et al., 1994; Campbell et al., 1993; Lichtenwalner et al., 1993). Therefore, there is a need to evaluate the potential for using commercially available baby wipes for collecting pesticide samples from skin and other surfaces. Another concern involves establishing a convenient and safe method for assessing overall dermal exposure for children, especially for those in crawling stage. One route that the U .S. Environmental Protection Agency (EPA) would like to investigate is the use of cotton body suits (infant sleepers) as an indicator

  20. TECHNICAL TRAINING: PLACES AVAILABLE

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: LabVIEW Basics 1 : 22 - 24.3.2004 (3 days) Oracle 9i : New Features for Developers : 22 - 24.3.2004 (3 days) Instructor-led WBTechT study or follow-up for Microsoft applications : 1.4.2004 (morning) FrontPage XP - niveau 1 : 5 & 6.4.2004 (2 jours) AutoCAD 2002 - niveau 1 : 19, 20.4 et 3, 4.5.2004 (4 jours) Oracle 8i/9i - Develop Web-based Applications with PL/SQL : 19 & 20.4.2004 (2 days) Introduction to ANSYS : 20 - 23.4.2004 (4 days) LabVIEW hands-on (E) : 20.4.2004 (afternoon, free of charge) FrontPage XP - niveau 2 : 26 & 27.4.2004 (2 jours) LabVIEW Base 2 : 6 & 7.5.2004 (2 jours) Word XP - niveau 1 : 10 & 11.5.2004 (2 jours) Word XP - niveau 2 : 24 & 25.5.2004 (2 jours) If you wish to participate in one of these courses, pleas...

  1. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: JAVA 2 Enterprise Edition - Part 1: WEB Applications: 21 & 22.2.2005 (2 days) FrontPage 2003 - niveau 1 : 21 & 22.2.2005 (2 jours) JAVA 2 Enterprise Edition - Part 2: Enterprise JavaBeans: 23 - 25.2.2005 (3 days) Utilisation des fichiers PDF avec ACROBAT 6.0 : 1.3.2005 (1 journée) ELEC-2005 - Spring Term: Integrated circuits and VLSI technology for physics: 1 - 17.3.2005 (6 X 2.30-hours lectures) C++ for Particle Physicists: 7 - 11.3.2005 (6 X 3-hour lectures) Joint PVSS JCOP Framework : 14 - 18.3.2005 (5 days) AutoCAD 2002 - niveau 1 : 15, 16, 21& 22.3.2005 (4 jours) FrontPage 2003 - niveau 2 : 21 & 22.3.2005 (2 jours) FileMaker - niveau 2 : 4 & 5.4.2005 (2 jours) EXCEL 2003 - niveau 2 : 11 & 12.4.2005 (2 jours) LabVIEW intermediate 1: 11 - 13....

  2. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: LabVIEW base 2/basics 2 : 3 & 4.2.2005 (2 jours/2 days - langue à décider/language to be decided) Finite State Machines in the JCOP Framework: 1 - 3.2.2005 (3 days - free course) The JAVA Programming Language Level 2: 7 - 9.2.2005 (3 days) JAVA 2 Enterprise Edition - Part 1: WEB Applications: 21 & 22.2.2005 (2 days) FrontPage 2003 - niveau 1 : 21 & 22.2.2005 (2 jours) JAVA 2 Enterprise Edition - Part 2: Enterprise JavaBeans: 23 - 25.2.2005 (3 days) ELEC-2005 - Spring Term: Integrated circuits and VLSI technology for physics: 1 - 17.3.2005 (6 X 2.30-hours lectures) C++ for Particle Physicists: 7 - 11.3.2005 (6 X 3-hour lectures) Joint PVSS JCOP Framework : 14 - 18.3.2005 (5 days) AutoCAD 2002 - niveau 1 : 15, 16, 21& 22.3.2005 (4 jours) FrontPage 20...

  3. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: ELEC-2005 - Spring Term: Integrated circuits and VLSI technology for physics: 1 - 17.3.2005 (6 x 2.5-hour lectures) C++ for Particle Physicists: 7 - 11.3.2005 (6 x 3-hour lectures) Joint PVSS JCOP Framework : 14 - 18.3.2005 (5 days) Oracle 9i: SQL: 14 -16.3.2005 (3 days) AXEL-2005; Introduction to Particle Accelerators : 14- 18.3.2005 (10 x 1 h lectures) ACCESS 2003 - Level 1: ECDL M5: 15 - 16.3.2005 (2 days) AutoCAD 2002 - niveau 1 : 15, 16, 21& 22.3.2005 (4 jours) FrontPage 2003 - niveau 2 : 21 & 22.3.2005 (2 jours) Hands-on Object-Oriented Design and Programming with C++ : 22 - 24.3.2005 (3 days) FileMaker - niveau 2 : 4 & 5.4.2005 (2 jours) Oracle 9i: Programming with PL/SQL: 4 - 6.4.2005 (3 days) EXCEL 2003 - niveau 2 : 11 & 12.4.2005 (2 jours) LabVIEW Intermedia...

  4. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: The CERN EDMS for Engineers : 6.10.2004 (1 day) FileMaker - niveau 1 : 18 & 19.10.2004 (2 jours) Outlook (short course I) : E-mail : 22.10.2004 (2 hours, morning) Outlook (short course II) : Calendar, Tasks and Notes: 22.10.2004 (2 hours, afternoon) Excel 2003 - niveau 1 : 4 & 5.11.2004 (2 jours) LabVIEW Intermediate I : 8 - 10.11.2004 (3 days) Instructor-led WTechT Study or Follow-up for Microsoft Applications : 9.11.2004 (morning) Hands-On Object Oriented Design and Programming with C++ : 9 - 11.11.2004 (3 days) Outlook (Short Course III) : Meetings and Delegation : 9.11.2004 (2 hours, afternoon) LabVIEW Intermediate II : 11 & 12.11.2004 (2 days) AutoCAD 2002 - niveau 1 : 11, 12, 18, 19.11.2004 (4 jours) C++ for Particle Physicists : 15 - 19.11.2004 (6 X 3 hours sessions...

  5. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: LabVIEW - Basics 2 : 30.9 & 1.10.2004 (2 days) Introduction à Windows XP au CERN : 4.10.2004 (matin) The EDMS MTF in practice : 4.10.2004 (afternoon) The CERN EDMS for Engineers : 6.10.2004 (1 day) FrontPage 2003 - niveau 1 : 7 & 8.10.04 (2 jours) Hands-On Object Oriented Design and Programming with C++ : 9 - 12.11.2004 (3 days) FileMaker - niveau 1 : 18 & 19.10.2004 (2 jours) Outlook (short course I) : E-mail : 22.10.2004 (2 hours, morning) Outlook (short course II) : Calendar, Tasks and Notes: 22.10.2004 (2 hours, afternoon) Excel 2003 - niveau 1 : 4 & 5.11.2004 (2 jours) Instructor-led WTechT Study or Follow-up for Microsoft Applications : 9.11.2004 (morning) Outlook (Short Course III) : Meetings and Delegation : 9.11...

  6. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: FileMaker - niveau 1 : 18 & 19.10.2004 (2 jours) Outlook (short course I) : E-mail : 22.10.2004 (2 hours, morning) Outlook (short course II) : Calendar, Tasks and Notes: 22.10.2004 (2 hours, afternoon) Excel 2003 - niveau 1 : 4 & 5.11.2004 (2 jours) LabVIEW Intermediate I : 8 - 10.11.2004 (3 days) Instructor-led WTechT Study or Follow-up for Microsoft Applications : 9.11.2004 (morning) Hands-On Object Oriented Design and Programming with C++ : 9 - 11.11.2004 (3 days) Outlook (Short Course III) : Meetings and Delegation : 9.11.2004 (2 hours, afternoon) LabVIEW Intermediate II : 11 & 12.11.2004 (2 days) AutoCAD 2002 - niveau 1 : 11, 12, 18, 19.11.2004 (4 jours) C++ for Particle Physicists : 15 - 19.11.2004 (6 X 3 hours sessions) FrontPage 2003 - niveau 2 : 18 &a...

  7. Technical Training: Places available

    CERN Multimedia

    Monique Duval

    2004-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available in the following courses: Outlook (short course I) : E-mail : 22.10.2004 (2 hours, morning) Outlook (short course II) : Calendar, Tasks and Notes: 22.10.2004 (2 hours, afternoon) Excel 2003 - niveau 1 : 4 & 5.11.2004 (2 jours) LabVIEW Intermediate I : 8 - 10.11.2004 (3 days) Instructor-led WTechT Study or Follow-up for Microsoft Applications : 9.11.2004 (morning) Hands-On Object Oriented Design and Programming with C++ : 9 - 11.11.2004 (3 days) Outlook (Short Course III) : Meetings and Delegation : 9.11.2004 (2 hours, afternoon) LabVIEW Intermediate II : 11 & 12.11.2004 (2 days) AutoCAD 2002 - niveau 1 : 11, 12, 18, 19.11.2004 (4 jours) C++ for Particle Physicists : 15 - 19.11.2004 (6 X 3 hours sessions) FrontPage 2003 - niveau 2 : 18 & 19.11.2004 (2 jours) Word 2003 - niveau 1 : 22 &a...

  8. Technical training - Places available

    CERN Multimedia

    2003-01-01

    * Etant donné le délai d'impression du Bulletin, ces places peuvent ne plus être disponibles au moment de sa parution. Veuillez consulter notre site Web pour avoir la dernière mise à jour. ** The number of places available may vary. Please check our Web site to find out the current availability. Des places sont disponibles dans les cours suivants : Places are available in the following courses: Hands-on Introduction to Python Programming 12 – 14.11.03 (3 days) ACCESS 2000 – niveau 1 13 & 14.11.03 (2 jours) C++ for Particle Physicists 17 – 21.11.03 (6 x 3-hour lectures) Programmation automate Schneider TSX Premium – niveau 2  18 – 21.11.03 (4 jours) Planification de projet avec MS-Project/Project Planning with MS-Project (gratuit/free of charge – langue à définir/language to be defined) : 18 & 25.11.03 (2 jours/2 days) JAVA 2 Enterprise Edition – Part 1 : WEB...

  9. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: ELEC-2005 Autumn Term - Electronics applications in HEP experiments: 8.11 - 8.12.2005 (10 x 2h lectures) The CERN EDMS for Local Administrators: 15-16.11.2005 (2 days, free of charge) OUTLOOK (Short Course II) - Calendar, Tasks and Notes: 16.11.2005 (morning) Hands-On Object Oriented Design and Programming with C++ : 16 - 18.11.2005 (3 days) The CERN EDMS for Engineers: 17.11.2005 (1 day, free of charge) The Java Programming Language Level 1: 21 - 23.11.2005 (3 days) Hands-on Introduction to Python Programming: 28 - 30.11.2005 (3 days) OUTLOOK (Short Course III) - Meetings and Delegation: 30.11.2005 (morning) WORD 2003 (Short Course III) - HowTo... Work with long documents : 30.11.2005 (afternoon) FrontPage 2003 - niveau 2 : 5 - 6.12.2005 (2 jours) LabVIEW Application Development (Intermediate 1): 5 - 7.12.2005 (3 d...

  10. Technical Training: Places available

    CERN Multimedia

    Davide Vitè

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Joint PVSS JCOP Framework : 7 - 11.11.2005 (5 days) ELEC-2005 Autumn Term - Electronics applications in HEP experiments: 8.11 - 8.12.2005 (10 x 2h lectures) The EDMS-MTF in practice: 9.11.2005 (morning, free of charge) The CERN EDMS for Local Administrators: 15-16.11.2005 (2 days, free of charge) OUTLOOK (Short Course II) - Calendar, Tasks and Notes: 16.11.2005 (morning) Hands-On Object Oriented Design and Programming with C++ : 16 - 18.11.2005 (3 days) The CERN EDMS for Engineers: 17.11.2005 (1 day, free of charge) The Java Programming Language Level 1: 21 - 23.11.2005 (3 days) Hands-on Introduction to Python Programming: 28 - 30.11.2005 (3 days) OUTLOOK (Short Course III) - Meetings and Delegation: 30.11.2005 (morning) WORD 2003 (Short Course III) - HowTo... Work with long documents : 30.11.2005 (afternoon) Fron...

  11. Technical training: places available

    CERN Multimedia

    Davide Vitè

    2005-01-01

    The number of places available may vary. Please check our Web site to find out the current availability. Places are available on the following courses: Introduction to the CERN EDMS: 2.11.2005 (1 day, free of charge) OUTLOOK (Short Course I) - E-mail: 2.11.2005 (morning) WORD 2003 (Short Course II) - HowTo... Mail merge: 2.11.2005 (afternoon) FrontPage 2003 - niveau 1 :  3 - 4.11.2005 (2 jours) AutoCAD 2006 - niveau 1 : 3, 4, 9, 10.11.2005 (4 jours) Joint PVSS JCOP Framework : 7 - 11.11.2005 (5 days) The CERN EDMS for Engineers: 8.11.2005 (1 day, free of charge) The EDMS-MTF in practice: 9.11.2005 (morning, free of charge) The CERN EDMS for Local Administrators: 15-16.11.2005 (2 days, free of charge) OUTLOOK (Short Course II) - Calendar, Tasks and Notes: 16.11.2005 (morning) Hands-On Object Oriented Design and Programming with C++ : 16 - 18.11.2005 (3 days) The Java Programming Language Level 1: 21 - 23.11.2005 (3 days) Hands-on Introduction to Python Prog...

  12. Available: motorised platform

    CERN Multimedia

    The COMPASS collaboration

    2014-01-01

    The COMPASS collaboration would like to offer to a new owner the following useful and fully operational piece of equipment, which is due to be replaced with better adapted equipment.   Please contact Erwin Bielert (erwin.bielert@cern.ch or 160539) for further information.  Motorized platform (FOR FREE):   Fabricated by ACL (Alfredo Cardoso & Cia Ltd) in Portugal. The model number is MeXs 5-­‐30.  Specifications: 5 m wide, 1 m deep, adjustable height (1.5 m if folded). Maximum working floor height: 4 m. conforms to CERN regulations, number LV158. Type LD500, capacity 500 kg and weight 2000 kg.  If no interested party is found before December 2014, the platform will be thrown away.

  13. Hiding the tobacco power wall reduces cigarette smoking risk in adolescents: using an experimental convenience store to assess tobacco regulatory options at retail point-of-sale.

    Science.gov (United States)

    Shadel, William G; Martino, Steven C; Setodji, Claude M; Scharf, Deborah M; Kusuke, Daniela; Sicker, Angela; Gong, Min

    2015-11-23

    This experiment tested whether changing the location or visibility of the tobacco power wall in a life sized replica of a convenience store had any effect on adolescents' susceptibility to future cigarette smoking. The study was conducted in the RAND StoreLab (RSL), a life sized replica of a convenience store that was developed to experimentally evaluate how changing aspects of tobacco advertising displays in retail point-of-sale environments influences tobacco use risk and behaviour. A randomised, between-subjects experimental design with three conditions that varied the location or visibility of the tobacco power wall within the RSL was used. The conditions were: cashier (the tobacco power wall was located in its typical position behind the cash register counter); sidewall (the tobacco power wall was located on a sidewall away from the cash register); or hidden (the tobacco power wall was located behind the cashier but was hidden behind an opaque wall). The sample included 241 adolescents. Hiding the tobacco power wall significantly reduced adolescents' susceptibility to future cigarette smoking compared to leaving it exposed (ie, the cashier condition; p=0.02). Locating the tobacco power wall on a sidewall away from the cashier had no effect on future cigarette smoking susceptibility compared to the cashier condition (p=0.80). Hiding the tobacco power wall at retail point-of-sale locations is a strong regulatory option for reducing the impact of the retail environment on cigarette smoking risk in adolescents. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  14. Non disponible / Not available

    OpenAIRE

    Bernard , Nguyen

    2001-01-01

    Non disponible / Not available; La chronobiologie est une science récente qui apporte une nouvelle manière de voir la médecine. La chronobiologie, grâce aux développements des moyens techniques de mesure physiologique, a contribué à faire d'importants progrès dans les connaissances tant dans le domaine de la physiologie que de la pathologie ou de la thérapeutique. Et son étude dans l'hypertension artérielle semble logique, puisqu'en France cette pathologie touche jusqu'à 20 à 30% de la popula...

  15. Non disponible / Not available

    OpenAIRE

    Muriel , Henry

    2010-01-01

    Non disponible / Not available; L'incidence et la prévalence de l'insuffisance rénale chronique terminale (IRCT) en France sont en augmentation. Lors de cette maladie, la fonction rénale diminue et les reins ne peuvent plus assurer leurs fonctions.Le recours à une technique de suppléance est obligatoire pour vivre.Ces techniques sont la dialyse péritonéale, l'hémodialyse et la greffe rénale.Les patients en insuffisance rénale chronique terminale sont des patients polymédiqués. Il existe de no...

  16. Non disponible / Not available

    OpenAIRE

    Clément , Wielgus

    2013-01-01

    Non disponible / Not available; L'insuffisance rénale chronique touche plus de 2,5 millions de français. Parmi eux, plus de 55000 personnes en stade terminal, doivent recourir à un traitement de suppléance, qui, le plus souvent, est l'hémodialyse. Cette insuffisance rénale terminale est souvent associée et attribuable à d'autres maladies. C'est la diminution du nombre de néphrons sains fonctionnels qui entraîne l'apparition des symptômes de l'insuffisance rénale chronique. Ainsi le syndrome n...

  17. Non disponible / Not available

    OpenAIRE

    Claire , Michel

    2015-01-01

    Non disponible / Not available; Introduction : Les capacités de reconnaissance des expressions faciales s’altèrent avec l’âge et dans certaines pathologies telles que la maladie d’Alzheimer mais aussi, entre autres, dans d’autres démences, maladies neurologiques ou psychiatriques. Les soignants peuvent-ils être assimilés à la population générale en ce qui concerne la reconnaissance des expressions faciales ? Les patients atteints de maladie d’Alzheimer sont-ils capables d’exprimer des émotion...

  18. Non disponible / Not available

    OpenAIRE

    Maud , Conti

    2010-01-01

    Non disponible / Not available; La stratification des résines composites sur dents antérieures est la méthode directe qui devrait être systématiquement employée pour reconstituer la région antérieure.En effet, cette technique permet d'obtenir d'excellents résultats durables et esthétiques. Cependant, elle requiert un certain apprentissage puisqu'il s'agit d'apposer des couches successives de résine composite dans le bon ordre et dans de bonnes proportions, en suivant un protocole bien précis....

  19. Non disponible / Not available

    OpenAIRE

    Sonia , Assili

    2014-01-01

    Non disponible / Not available; Dans de nombreux pays développés, les patients cherchent des alternatives auxsoins dentaires devenus difficiles d’accès pour de multiples raisons. Parallèlement, lamondialisation n’épargne aucun secteur, si bien que nous assistons à la commercialisation dela santé. Le patient tend à devenir un consommateur de soins et le praticien un délivreur desoins. L’offre de soins à l’étranger et aujourd’hui dans des centres dentaires dits « low-cost »apparaissent comme un...

  20. Non disponible / Not available

    OpenAIRE

    Marc , Thomas

    2011-01-01

    Non disponible / Not available; Les inspecteurs de santé publique travaillent désormais au sein de l'ARS.Ils veillent au respect et à l'application du code de la santé publique et mènent des inspections dans les pharmacies d'officine notamment pour contrôler le travail du pharmacien concernant les médicaments thermo-sensibles.Le respect de la chaîne du froid est un enjeu quotidien pour le pharmacien.Quels sont les recommandations à suivre et sur quels critères doit-il se baser pour respecter ...

  1. Non disponible / Not available

    OpenAIRE

    Frédéric , Pitetti

    2004-01-01

    Non disponible / Not available; L'article R5015-G du Code de déontologie impose au pharmacien de « faire preuve du même dévouement envers toutes les personnes qui ont recours à son art». Par conséquent, les pharmaciens doivent être capables de s'adapter et de trou ver des solutions pour communiquer avec les personnes étrangères, illettrées, aveugles ou sourdes . Dans cette thèse, nous nous intéressons à la relation de communication entre le pharmacien et le sourd profond .Dans la partie bibli...

  2. Non disponible / Not available

    OpenAIRE

    Romuald , Bour

    2013-01-01

    Non disponible / Not available; La prise en charge d'une personne institutionnalisée atteinte de démence est souvent marquée par l'apparition de troubles du comportement perturbateurs pour la vie des autres résidents et la réalisation des soins. Ces situations peuvent amener les Médecins Traitants, en synergie avec le personnel soignant, à recourir aux Consultations Mémoire en vue d'une réévaluation clinique, d'une adaptation thérapeutique ou de la mise en place de traitements non pharmacolog...

  3. High Availability of RAPIENET

    International Nuclear Information System (INIS)

    Yoon, G.; Oh, J. S.; Kwon, D. H.; Kwon, S. C.; Park, Y. O.

    2012-01-01

    Many industrial customers are no longer satisfies with conventional Ethernet-based communications. They require a more accurate, more flexible, and more reliable technology for their control and measurement systems. Hence, Ethernet-based high-availability networks are becoming an important topic in the control and measurement fields. In this paper, we introduce a new redundant programmable logic controller (PLC) concept, based on real-time automation protocols for industrial Ethernet (RAPIEnet). RAPIEnet has intrinsic redundancy built into its network topology, with hardware-based recovery time. We define a redundant PLC system switching model and demonstrate its performance, including RAPIEnet recovery time

  4. Non disponible / Not available

    OpenAIRE

    Fabrice , Lavigne

    2002-01-01

    Non disponible / Not available; Nous rapportons les résultats d'une enquête prospective de 6 mois concernant 441 patients ayant présenté une douleur abdominale aiguë. Cette étude a pour objectif d 'étudier lors d'affection abdominale aiguë, d'autres paramètres hématologiques que la classique hyperleucocytose avec polynucleose neutrophile.Plus la lymphopénie est profonde, plus l'affection est potentiellement sévère; cependant sa sensibilité est faible. Une lymphopénie profonde est un pronostic...

  5. LHC Report: astounding availability

    CERN Multimedia

    Andrea Apollonio for the LHC team

    2016-01-01

    The LHC is off to an excellent start in 2016, having already produced triple the luminosity of 2015. An important factor in the impressive performance so far this year is the unprecedented machine availability.   LHC integrated luminosity in 2011, 2012, 2015 and 2016 and the prediction of the 2016 performance foreseen at the start of the year. Following the 2015-2016 end of year shutdown, the LHC restarted beam operation in March 2016. Between the restart and the first technical stop (TS1) in June, the LHC's beam intensity was successively increased, achieving operation with 2040 bunches per beam. The technical stop on 7-8 June was shortened to maximise the time available for luminosity production for the LHC experiments before the summer conferences. Following the technical stop, operation resumed and quickly returned to the performance levels previously achieved. Since then, the LHC has been running steadily with up to 2076 bunches per beam. Since the technical stop, a...

  6. High Availability in Optical Networks

    Science.gov (United States)

    Grover, Wayne D.; Wosinska, Lena; Fumagalli, Andrea

    2005-09-01

    Call for Papers: High Availability in Optical Networks Submission Deadline: 1 January 2006 The Journal of Optical Networking (JON) is soliciting papers for a feature Issue pertaining to all aspects of reliable components and systems for optical networks and concepts, techniques, and experience leading to high availability of services provided by optical networks. Most nations now recognize that telecommunications in all its forms -- including voice, Internet, video, and so on -- are "critical infrastructure" for the society, commerce, government, and education. Yet all these services and applications are almost completely dependent on optical networks for their realization. "Always on" or apparently unbreakable communications connectivity is the expectation from most users and for some services is the actual requirement as well. Achieving the desired level of availability of services, and doing so with some elegance and efficiency, is a meritorious goal for current researchers. This requires development and use of high-reliability components and subsystems, but also concepts for active reconfiguration and capacity planning leading to high availability of service through unseen fast-acting survivability mechanisms. The feature issue is also intended to reflect some of the most important current directions and objectives in optical networking research, which include the aspects of integrated design and operation of multilevel survivability and realization of multiple Quality-of-Protection service classes. Dynamic survivable service provisioning, or batch re-provisioning is an important current theme, as well as methods that achieve high availability at far less investment in spare capacity than required by brute force service path duplication or 100% redundant rings, which is still the surprisingly prevalent practice. Papers of several types are envisioned in the feature issue, including outlook and forecasting types of treatments, optimization and analysis, new

  7. Non disponible / Not available

    OpenAIRE

    Erika , Nnang Obada

    2010-01-01

    Non disponible / Not available; La préservation du capital vasculaire est un challenge permanent dans la prise en charge des patients insuffisants rénaux chroniques. Cette démarche doit être systématique, précoce, même en situation d'insuffisance rénale aiguë. La mise en place de cathéters pour l'hémodialyse doit être encadrée. Tout dysfonctionnement réduit l'efficacité d'une séance de dialyse avec une morbidité non négligeable. Dans une étude rétrospective de 62 patients hémodialysés inciden...

  8. Non disponible / Not available

    OpenAIRE

    Edouard , Kunegel

    2013-01-01

    Non disponible / Not available; Seules trois méthodes de traitement, aujourd'hui, s'offrent au patient insuffisant rénal chronique (IRC) en phase terminale : la dialyse péritonéale, l'hémodialyse, et la transplantation rénale. L'esquisse de ces techniques sera dessinée au fil de ce travail, avec un focus particulier sur l'hémodialyse, méthode à ce jour encore la plus utilisée. À ses débuts, les résultats proposés par cette procédure, assortis d'une lourde mortalité, étaient peu concluants.Jus...

  9. Non disponible / Not available

    OpenAIRE

    Nicolas , Laurent

    2013-01-01

    Non disponible / Not available; Nous avons étudié de manière rétrospective la survie et les complications péri opératoires au sein de deux groupes de patients octogénaires ayant bénéficié dans notre centre de l'implantation d'une bioprothèse par méthode TAVI ou par chirurgie conventionnelle. Les deux groupes ont été appareillés par un score de propensité. Entre juillet 2009 et juin 2013, 97 octogénaires ont bénéficié d'un TAVI dans notre centre. Nous avons identifié un groupe contrôle de 220 ...

  10. Non disponible / Not available

    OpenAIRE

    Marion , Panek

    2009-01-01

    Non disponible / Not available; La peur du chirurgien-dentiste est un problème sérieux et très répandu. Chez les enfants, elle est la principale cause de difficultés comportementales au fauteuil, d'interférences avec le bon déroulement des séances et parfois d'orientation vers des structures spécialisées. Cela engendre bien souvent des conséquences négatives pour la santé buccodentaires du jeune patient sans oublier l'impact émotionnel (honte, impuissance ). Cependant des soins dentaires de b...

  11. Non disponible / Not available

    OpenAIRE

    Pierre , Cuny

    2007-01-01

    Non disponible / Not available; La restauration des dents antérieures par la céramique collée impose une réussite au niveau de la biocompatibilité, de la forme mais également de la couleur du résultat définitif. En raison de l'opacité variable des céramiques utilisées, les industriels proposent des polymères de collage dont le mécanisme de prise est dit « dual ». Une gamme étendue de couleur de ces polymères decollage ainsi que des niveaux d'opacité variable permettent de répondre au mieux à ...

  12. Non disponible / Not available

    OpenAIRE

    Alexandre , Eichelberger

    2010-01-01

    Non disponible / Not available; Les objectifs de cette contribution sont d'exposer la relation qui existe entre la lumière et la matière. L'approche que nous avons de la couleur d'un matériau de restauration est mise en évidence tant au niveau de sa perception que de la relation qu'elle peut avoir avec la translucidité de celui-ci. La structure et la composition des céramiques dentaires et des résinescomposites sont exposées de manière à mieux comprendre les différentes difficultés de choix d...

  13. Availability by Design

    DEFF Research Database (Denmark)

    Vigo, Roberto

    . There exist various practical techniques to face DoS attacks and mitigate their effects, yet we witness the successfulness of many. The need for a renewed investigation of availability gains in relevance when considering that our life is more and more dominated by Cyber-Physical Systems (CPSs), large......In computer security, a Denial-of-Service (DoS) attack aims at making a resource unavailable. DoS attacks to systems of public concern occur increasingly and have become infamous on the Internet, where they have targeted major corporations and institutions, thus reaching the general public......-scale network of sensors that interact with the physical environment. CPSs are increasingly exploited in the realisation of critical infrastructure, from the power grid to healthcare, traffic control, and defence applications. Such systems are particularly prone to DoS attacks: in addition to classic...

  14. Non disponible / Not available

    OpenAIRE

    Julie , Grandjean

    2010-01-01

    Non disponible / Not available; Un Plan de lutte contre le cancer a été ouvert en 2002 à l'initiative du Président de la République, Jacques Chirac. Il combine un ensemble de 70 Mesures échelonnées d'avril 2003 à décembre 2007, avec pour objectif vaincre la maladie et diminuer la mortalité par cancer de 20% pour 2007. Dans ce contexte, la réalisation d'un audit est apparue pertinente pour faire un état des lieux sur la prise en charge des patients traités par chimiothérapie anticancéreuse au ...

  15. Non disponible / Not available

    OpenAIRE

    Aurélie , Moronval

    2012-01-01

    Non disponible / Not available; Après différents rappels sur la structure du parodonte et des parodontopathies, nous étudierons l'influence du régime alimentaire sur la santé parodontale. Nous analyserons les propriétés physiques et chimiques des aliments pour connaître leur influence sur la santé des tissus parodontaux. Diététique et parodontopathies sont fortement liées. Un régime alimentaire équilibré combiné à une bonne hygiène buccale participe à la prévention des pathologies buccales....

  16. Non disponible / Not available

    OpenAIRE

    Diane , François

    2010-01-01

    Non disponible / Not available; Le millepertuis ou Hypericum perforatum L. est connu depuis l'antiquité, où il était utilisé pour soigner les blessures. Au Moyen-Age, appelé « chasse-diable », il était utilisé pour éloigner les mauvais esprits. Aujourd'hui, il est connu pour ses propriétés antidépressives.Il est efficace dans les dépressions légères à modérées, ses propriétés antidépressives sont dues principalement à l'hyperforine.La sommité fleurie est inscrite à la Pharmacopée européenne d...

  17. Non disponible / Not available

    OpenAIRE

    Térence , Courbariaux

    2006-01-01

    Non disponible / Not available; Suite à la parution de l'article R.5104-15 du code de la santé publique 2003 relatif aux responsabilités portées par les pharmacies à usage intérieur, le CHU de Brabois a fait le pari de remplacer une partie du matériel stérile par de l'usage unique. Cette décision a nécessité la mise en place d'une centrale d'approvisionnement en matériel stérile (CAMS). Afin de se prévenir des risques de rupture et de péremption, des techniques de gestion du stock de DMS ont ...

  18. Available transmission capacity assessment

    Directory of Open Access Journals (Sweden)

    Škokljev Ivan

    2012-01-01

    Full Text Available Effective power system operation requires the analysis of vast amounts of information. Power market activities expose power transmission networks to high-level power transactions that threaten normal, secure operation of the power system. When there are service requests for a specific sink/source pair in a transmission system, the transmission system operator (TSO must allocate the available transfer capacity (ATC. It is common that ATC has a single numerical value. Additionally, the ATC must be calculated for the base case configuration of the system, while generation dispatch and topology remain unchanged during the calculation. Posting ATC on the internet should benefit prospective users by aiding them in formulating their requests. However, a single numerical value of ATC offers little for prospect for analysis, planning, what-if combinations, etc. A symbolic approach to the power flow problem (DC power flow and ATC offers a numerical computation at the very end, whilst the calculation beforehand is performed by using symbols for the general topology of the electrical network. Qualitative analysis of the ATC using only qualitative values, such as increase, decrease or no change, offers some new insights into ATC evaluation, multiple transactions evaluation, value of counter-flows and their impact etc. Symbolic analysis in this paper is performed after the execution of the linear, symbolic DC power flow. As control variables, the mathematical model comprises linear security constraints, ATC, PTDFs and transactions. The aim is to perform an ATC sensitivity study on a five nodes/seven lines transmission network, used for zonal market activities tests. A relatively complicated environment with twenty possible bilateral transactions is observed.

  19. Ação de diferentes agentes curtentes utilizados no curtimento de peles de coelhos: testes físico-mecânicos dos couros = Action of different tanning agents used on rabbit hide tanning: physicalmechanic tests

    Directory of Open Access Journals (Sweden)

    Nilson do Prado Franco

    2009-10-01

    Full Text Available O objetivo do experimento foi avaliar a ação de diferentes agentes curtentes no processamento das peles de coelhos, sobre a resistência do couro. Cinquenta peles de coelhos foram submetidas a diferentes agentes curtentes na etapa de curtimento (T1 = 6% sais de cromoChromossal B®, T2 = 22% tanino vegetal Clarotan-x8®; T3 = 22% tanino sintético Syntac CW®; T4 = 12% tanino vegetal Weibull® + 10% tanino sintético Syntac F®; T5 = 22% tanino vegetal Weibull®. Foram retirados os corpos de prova do couro, na região dorsal, no sentidolongitudinal e transversal em relação ao eixo céfalo-caudal. Os agentes curtentes e retirada dos corpos de prova não influenciaram no teste de tração (9,28 N mm-2 a 11,63 N mm-2 e força aplicada (17,91 N a 24,85 N nos testes. Os curtimentos com sais de cromo (62,85% e Clarotan–x8® (70,28% proporcionaram maiores valores de alongamento em relação aos demais agentes curtentes utilizados. Os corpos de prova do couro no sentido transversal (59,12% apresentaram maior alongamento comparado ao longitudinal (49,72%. Os curtimentos com sais de cromo (22,70 N mm-1, Clarotan–x8® (25,94 N mm-1 e Weibull® (21,58 N mm-1 proporcionaram couros com maior resistência ao rasgamento. O sentido de retirada dos corpos de prova no couro não influenciou no rasgamento progressivo. As técnicas de curtimento com sais de cromo e Clarotan-x8® proporcionaram couros com melhores valores de resistência ao alongamento e rasgamento progressivo.The objective of the experiment was to evaluate the action of different tanning agents in the processing of rabbit hides over skin resistance. Fifty skins of rabbit hides were submitted to different tanning agents in the tanning stage (T1 = 6% Chromossal B® chromesalts; T2 = 22% Clarotan–x8® vegetable tannin; T3 = 22% Syntac CW® synthetic tannin; T4 = 12% Weibull® vegetable tannin + 10% Syntac F® synthetic tannin; T5 = 22% Weibull® vegetable tannin. The specimens were removed

  20. Availability of thermal power plants

    International Nuclear Information System (INIS)

    Nitsch, D.; Schmitz, H.

    1981-01-01

    Availability data based on unique uniform, and clearly defined concepts and methods of acquisition have been compiled by the VGB since 1970. The data are published in anual reports. These reports contain availability data of fossil-fuelled units, combined gas/steam units, nuclear power plants, and gas turbine plants in Germany and abroad, listed by unit size fuel type, time of operation, and application. For the purpose of comparison, the data for the years since 1970 are presented as well as data averaged for the whole period under report. The main results for the year 1980 are presented now that the greater part of the plants has been evaluated. The complete evaluation will be published towards the end of 1981. (orig.) [de