WorldWideScience

Sample records for hide document type

  1. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  2. A method for removing adobe-type manure from hides using an oxidizing agent

    Science.gov (United States)

    Adobe-type (hardened) manure attached to bovine hair is a major source of meat contamination, hide quality deterioration, and devalued leather products. Therefore, it is important to develop cleaning solutions that can rapidly remove adobe-type manure to improve the quality of hides delivered to tan...

  3. Selective Redundancy Removal: A Framework for Data Hiding

    Directory of Open Access Journals (Sweden)

    Ugo Fiore

    2010-02-01

    Full Text Available Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs. Such redundancy may be removed by means of optimization software. Redundancy removal, if applied selectively, enables information hiding. This work introduces Selective Redundancy Removal (SRR as a framework for hiding data. An example application of the framework is given in terms of hiding information in HTML documents. Non-uniformity across documents may raise alarms. Nevertheless, selective application of optimization techniques might be due to the legitimate use of optimization software not supporting all the optimization methods, or configured to not use all of them.

  4. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Ding Qing-Yan; Zhang Shu-Hui; Chen Xiu-Bo

    2016-01-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. (paper)

  5. Efficient Information Hiding Based on Theory of Numbers

    Directory of Open Access Journals (Sweden)

    Yanjun Liu

    2018-01-01

    Full Text Available Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hiding scheme based on the combination of Chinese remainder theorem (CRT and a new extraction function is proposed. By the proposed scheme, the cover image is divided into non-overlapping pixel groups for embedding to increase the embedding capacity. Experimental results show that the embedding capacity of the proposed scheme is significantly higher (greater than 2.5 bpp than previously proposed schemes while ensuring very good visual quality of the stego image. In addition, security analysis is given to show that the proposed scheme can resist visual attack.

  6. Digital watermarks in electronic document circulation

    Directory of Open Access Journals (Sweden)

    Vitaliy Grigorievich Ivanenko

    2017-07-01

    Full Text Available This paper reviews different protection methods for electronic documents, their good and bad qualities. Common attacks on electronic documents are analyzed. Digital signature and ways of eliminating its flaws are studied. Different digital watermark embedding methods are described, they are divided into 2 types. The solution to protection of electronic documents is based on embedding digital watermarks. Comparative analysis of this methods is given. As a result, the most convenient method is suggested – reversible data hiding. It’s remarked that this technique excels at securing the integrity of the container and its digital watermark. Digital watermark embedding system should prevent illegal access to the digital watermark and its container. Digital watermark requirements for electronic document protection are produced. Legal aspect of copyright protection is reviewed. Advantages of embedding digital watermarks in electronic documents are produced. Modern reversible data hiding techniques are studied. Distinctive features of digital watermark use in Russia are highlighted. Digital watermark serves as an additional layer of defense, that is in most cases unknown to the violator. With an embedded digital watermark, it’s impossible to misappropriate the authorship of the document, even if the intruder signs his name on it. Therefore, digital watermarks can act as an effective additional tool to protect electronic documents.

  7. Let’s play hide and seek!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    This week, we would like you to play a small online game called “Virtual Hide & Seek”. The rules are simple: some of our colleagues have published some sensitive or confidential documents on CERN’s central services like Indico, CDS, EDMS or TWiki, as well as on our many websites. Your mission, should you choose to accept it: find them!   If you provide us with documents marked “confidential”, “classified”, “sensitive”, or containing plain text operational passwords, you can win a book on computer security. There are only few conditions: these documents must be visible from outside CERN, must not require a CERN account in order to access them, and must not belong to you or have a direct link with your work. Have fun! But seriously, are you sure that your documents are really properly protected? We regularly find confidential documents stored on one of the CERN central  services and w...

  8. Short term preservation of hide using vacuum: influence on properties of hide and of processed leather.

    Science.gov (United States)

    Gudro, Ilze; Valeika, Virgilijus; Sirvaitytė, Justa

    2014-01-01

    The objective of this work was to investigate vacuum influence on hide preservation time and how it affects hide structure. It was established that vacuum prolongs the storage time without hide tissue putrefaction up to 21 days when the storage temperature is 4°C. The microorganisms act for all storage times, but the action is weak and has no observable influence on the quality of hide during the time period mentioned. The hide shrinkage temperature decrease is negligible, which shows that breaking of intermolecular bonds does not occur. Optical microscopy, infrared spectroscopy and differential scanning calorimetry also did not show any structural changes which can influence the quality of leather produced from such hide. The qualitative indexes of wet blue processed under laboratory conditions and of leather produced during industrial trials are presented. Indexes such as chromium compounds exhaustion, content of chromium in leather, content of soluble matter in dichloromethane, strength properties, and shrinkage temperature were determined. Properties of the leather produced from vacuumed hide under industrial conditions conformed to the requirements of shoe upper leather.

  9. An Internal Data Non-hiding Type Real-time Kernel and its Application to the Mechatronics Controller

    Science.gov (United States)

    Yoshida, Toshio

    For the mechatronics equipment controller that controls robots and machine tools, high-speed motion control processing is essential. The software system of the controller like other embedded systems is composed of three layers software such as real-time kernel layer, middleware layer, and application software layer on the dedicated hardware. The application layer in the top layer is composed of many numbers of tasks, and application function of the system is realized by the cooperation between these tasks. In this paper we propose an internal data non-hiding type real-time kernel in which customizing the task control is possible only by change in the program code of the task side without any changes in the program code of real-time kernel. It is necessary to reduce the overhead caused by the real-time kernel task control for the speed-up of the motion control of the mechatronics equipment. For this, customizing the task control function is needed. We developed internal data non-cryptic type real-time kernel ZRK to evaluate this method, and applied to the control of the multi system automatic lathe. The effect of the speed-up of the task cooperation processing was able to be confirmed by combined task control processing on the task side program code using an internal data non-hiding type real-time kernel ZRK.

  10. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  11. A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

    Directory of Open Access Journals (Sweden)

    Milad Taleby Ahvanooey

    2018-01-01

    Full Text Available With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.

  12. Image hiding using optical interference

    Science.gov (United States)

    Zhang, Yan; Wang, Weining

    2010-09-01

    Optical image encryption technology has attracted a lot of attentions due to its large capacitance and fast speed. In conventional image encryption methods, the random phase masks are used as encryption keys to encode the images into white noise distribution. Therefore, this kind of methods requires interference technology to record complex amplitude and is vulnerable to attack techniques. The image hiding methods which employ the phase retrieve algorithm to encode the images into two or more phase masks are proposed, the hiding process is carried out within a computer using iterative algorithm. But the iterative algorithms are time consumed. All method mentioned above are based on the optical diffraction of the phase masks. In this presentation, a new optical image hiding method based on optical interference is proposed. The coherence lights which pass through two phase masks are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are design analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the novelty of the new proposed methods. This method can be expanded for double images hiding.

  13. Hackers in Hiding:

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2016-01-01

    On several occasions Michel Foucault advocated a methodological turn towards what he called a ‘happy positivism’. Foucault’s emphasis on the surface does not deny the importance of structures of hiding, but understands it as a game in which the structures of hiding are viewed as contingently given....... In this paper, I will analyse the conflict between the hacker movement and the field of corporate interests. I argue that the introduction of graphical user interfaces and the maintaining of copyright interests are the contingent background of the ongoing conflict. By bracketing the analyses of hidden...

  14. Optical image hiding based on interference

    Science.gov (United States)

    Zhang, Yan; Wang, Bo

    2009-11-01

    Optical image processing has been paid a lot of attentions recently due to its large capacitance and fast speed. Many image encryption and hiding technologies have been proposed based on the optical technology. In conventional image encryption methods, the random phase masks are usually used as encryption keys to encode the images into random white noise distribution. However, this kind of methods requires interference technology such as holography to record complex amplitude. Furthermore, it is vulnerable to attack techniques. The image hiding methods employ the phase retrieve algorithm to encode the images into two or more phase masks. The hiding process is carried out within a computer and the images are reconstructed optically. But the iterative algorithms need a lot of time to hide the image into the masks. All methods mentioned above are based on the optical diffraction of the phase masks. In this presentation, we will propose a new optical image hiding method based on interference. The coherence lights pass through two phase masks and are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are designed analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the validity of the new proposed methods.

  15. Motivation to hide emotion and children's understanding of the distinction between real and apparent emotions.

    Science.gov (United States)

    Gosselin, Pierre; Warren, Madeleine; Diotte, Michèle

    2002-12-01

    The authors investigated the extent to which children's understanding of the distinction between real and apparent emotions varied according to the motivation to hide emotions. Children, aged 6-7 and 10-11 years, were read stories designed to elicit either prosocial or self-protective motivated display rules and were asked to predict the facial expressions the protagonists would make to hide felt emotions. Children were found to understand the distinction between real and apparent emotions very well, independently of the type of motivation. Contrary to predictions, boys understood this distinction better than did girls when the motivation to hide positive emotions was prosocial. Children perceived neutralization as the most appropriate strategy to hide felt emotions, followed by masking.

  16. Information Hiding In Digital Video Using DCT, DWT and CvT

    Science.gov (United States)

    Abed Shukur, Wisam; Najah Abdullah, Wathiq; Kareem Qurban, Luheb

    2018-05-01

    The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the Normalized cross Correlation (NC). The experiments shows the error ratio of the proposed technique is (8%) while accuracy ratio is (92%) when the Curvelet Transform (CvT) is used, but compared with Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT), the error rates are 11% and 14% respectively, while the accuracy ratios are (89%) and (86%) respectively. So, the experiments shows the Poisson noise gives better results than other types of noises, while the speckle noise gives worst results compared with other types of noises. The proposed technique has been established by using MATLAB R2016a programming language.

  17. [Missed diagnosis of hiding posterior marginal fracture of ankle with pronation-external rotation type and its treatment].

    Science.gov (United States)

    Wang, Jia; Zhang, Yun-Tong; Zhang, Chun-Cai; Tang, Yang

    2014-01-01

    To analyze causes of missed diagnosis of hiding post-malleolar fractures in treating ankle joint fractures of pronation-external rotation type according to Lauge-Hansen classification and assess its medium-term outcomes. Among 103 patients with ankle joint fracture of pronation-external rotation type treated from March 2002 to June 2010,9 patients were missed diagnosis,including 6 males and 3 females,with a mean age of 35.2 years old (ranged, 18 to 55 years old) . Four patients were diagnosed during operation, 2 patients were diagnosed 2 or 3 days after first surgery and 3 patients came from other hospital. All the patients were treated remedially with lag screws and lock plates internal fixation. After operation,ankle joint function was evaluated according to American Orthopaedic Foot and Ankle Society (AOFAS). All the 9 patients were followed up, and the duration ranged from 14 to 30 months (averaged, 17 months). No incision infection was found, and all incision healed at the first stage. At the latest follow-up, AOFAS was 83.0 +/- 4.4, the score of 4 patients diagnosed during operation was 85.0 +/- 2.9, and the score of 5 patients treated by secondary operation was 81.0 +/- 5.3. All the patients got fracture union observed by X-ray at a mean time of 2.2 months after operation. There were no complications such as internal fixation loosing, broken and vascular or nerve injuries. Ankle joint fracture of pronation-external rotation type may be combined with hiding post-malleolar fractures. So to patients with ankle joint fracture of pronation-external rotation type, lateral X-ray should be read carefully, and if necessary, CT or MRI examination should be performed. If adding lateral X-ray examination after reduction of exterior and interior ankle joint fixation, the missed diagnosis may be avoided.

  18. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  19. Optical hiding with visual cryptography

    Science.gov (United States)

    Shi, Yishi; Yang, Xiubo

    2017-11-01

    We propose an optical hiding method based on visual cryptography. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof and image-covered, leading to the high security. During the extraction process, the covered phase-keys are illuminated with laser beams and then incoherently superimposed to extract the hidden information directly by human vision, without complicated optical implementations and any additional computation, resulting in the convenience of extraction. Also, the phase-keys are manufactured as the diffractive optical elements that are robust to the attacks, such as the blocking and the phase-noise. Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.

  20. Unitary embedding for data hiding with the SVD

    Science.gov (United States)

    Bergman, Clifford; Davidson, Jennifer

    2005-03-01

    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  1. Recent Advances in Information Hiding and Applications

    CERN Document Server

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao

    2013-01-01

    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  2. Alkali-free method of hide preparation for tanning

    Directory of Open Access Journals (Sweden)

    V. Valeika

    2012-06-01

    Full Text Available Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming up to strongly acid (pickling. This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. During both processes, unhairing and oxidative treatment, the opening of the derma structure occurs: 13.3-14.6g of non-collagen proteins are removed and amount of dermatan sulphate decreases by 35%. The hide obtained can be chromed directly after the above processes and subsequent treatment with sodium chloride solution omitted conventional pickling. The pH of the hide varies in the range of 8.3-3.7 during the processes of preparation for tanning.

  3. Alkali-free method of hide preparation for tanning

    OpenAIRE

    Valeika, V.; Beleska, K.; Sirvaityte, J.

    2012-01-01

    Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming) up to strongly acid (pickling). This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. D...

  4. An Image Encryption Method Based on Bit Plane Hiding Technology

    Institute of Scientific and Technical Information of China (English)

    LIU Bin; LI Zhitang; TU Hao

    2006-01-01

    A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane of several different open images. And then a new hiding image is acquired by a nesting "Exclusive-OR" operation on those images obtained from the first step. At last, by employing image fusion technique, the final hiding result is achieved. The experimental result shows that the method proposed in this paper is effective.

  5. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia)

    OpenAIRE

    Donatas Brandišauskas

    2010-01-01

    This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imp...

  6. HIDE & SEEK: End-to-end packages to simulate and process radio survey data

    Science.gov (United States)

    Akeret, J.; Seehars, S.; Chang, C.; Monstein, C.; Amara, A.; Refregier, A.

    2017-01-01

    As several large single-dish radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these datasets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system-from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing single-dish radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single-dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal. The two packages can be used separately or together depending on the application. Their modular and flexible nature allows easy adaptation to other instruments and datasets. We describe the basic architecture of the two packages and examine in detail the noise and RFI modeling in HIDE, as well as the implementation of gain calibration and RFI mitigation in SEEK. We then apply HIDE &SEEK to forward-model a Galactic survey in the frequency range 990-1260 MHz based on data taken at the Bleien Observatory. For this survey, we expect to cover 70% of the full sky and achieve a median signal-to-noise ratio of approximately 5-6 in the cleanest channels including systematic uncertainties. However, we also point out the potential challenges of high RFI contamination and baseline removal when examining the early data from the Bleien Observatory. The fully documented HIDE &SEEK packages are available at http://hideseek.phys.ethz.ch/ and are published

  7. Children and Robots Learning to Play Hide and Seek

    National Research Council Canada - National Science Library

    Trafton, J. G; Schultz, Alan C; Perznowski, Dennis; Bugajska, Magdalena D; Adams, William; Cassimatis, Nicholas L; Brock, Derek P

    2006-01-01

    ...., containment, under) and use that information to play a credible game of hide and seek. They model this hypothesis within the ACT-R cognitive architecture and put the model on a robot, which is able to mimic the child's hiding behavior. They also take the "hiding" model and use it as the basis for a "seeking" model. They suggest that using the same representations and procedures that a person uses allows better interaction between the human and robotic system.

  8. Effect of Some Sudanese Traditional Hot Iron Branding on Cattle Hide Quality

    Directory of Open Access Journals (Sweden)

    Rehab Eltejani Abdelkarim

    2016-12-01

    Full Text Available This study was designed in order to assess and evaluate the effect of hot iron branding on cattle hide quality. 62 shapes of hot iron branding were detected and classified. Branding damage was evaluated depending on: purpose of application, location in the animal body, branding area, tribe which applied and hide degree. The results showed that, Baggara tribes branding were causing the greater damage on cattle hides; where 71.4% of its brands placed in the abdominal and animal back area (middle of the hide; in proportion to Misseriya Zuraq tribes (68.4%. According to the location of branding, the less tribe that causing damages to the cattle hides were Darfur tribes (14.3%. In terms of branding area Darfur tribes were causing the most branding damages where 42.8% of its brands on cattle hides were between 20-30cm, followed by Baggara tribes where 57.1% of its brands were between 10-20cm then Misseriya Zuraq tribes by 52.6%, and finally North Kordofan tribes of 37.5%. grading of cattle hides depending on the presence of the brand marks the study revealed that, Misseriya Zuraq tribe's brands were obtained the highest percentage (89.4% of the rejected hides (Scarto= 4 and 5 grades, when compared with North Kordofan tribes (87.5%. For commercial reason brand's were mostly done in the area of 5-10cm but, their effect on cattle hide quality was greater, where 81% of the hides were classified as Scarto.

  9. Mechanical properties of biobased films prepared from collagen solutions derived from bovine hides

    Science.gov (United States)

    The most valuable byproducts of the meat packing industry are hides. The U.S. is the world’s 3rd largest hide producing country and currently produces approximately 35 million cattle hides annually. Due to fierce competition in global markets, the American leather and hides industry is facing chal...

  10. Traceability System Model for Quality Gelatin Raw Material of Cattle Hides

    Directory of Open Access Journals (Sweden)

    S Nur

    2010-09-01

    Full Text Available Several criteria must be accomplished within the provision of quality products in terms of the types of materials, the processing methods and effort to get it. Traceability system involves various parties that have different needs and goals in the process of supplying raw materials. Hence, there is a need for institutional systems engineering that can organize and manage the tracking process, the procurement of raw materials that guarantee the origin of gelatin raw materials, and facilitate the industry and customer to create a standardized quality of product. The purpose of the study formulates the institutional tracking models of gelatin raw material from cattle hide based on various criteria and assessment of the expert opinion. The methods used in this study were Interpretative structural modeling to formulate a representation of institutional tracking efficiently and analytical hierarchy process to determine the tracking strategy of industrial gelatin raw materials from cowhide. The results obtained from the study were some key elements of institutional tracking model for industrial gelatin raw materials from cowhide and the traceability strategies for industrial raw materials from cattle hide gelatin Indonesia. (Animal Production 12(3: 190-198 (2010 Key Words: traceability, institutional model, cattle hide, gelatin

  11. Information Types in Nonmimetic Documents: A Review of Biddle's Wipe-Clean Slate (Understanding Documents).

    Science.gov (United States)

    Mosenthal, Peter B.; Kirsch, Irwin S.

    1991-01-01

    Describes how the 16 permanent lists used by a first grade reading teacher (and mother of 6) to manage the household represents the whole range of documents covered in the 3 major types of documents: matrix documents, graphic documents, and locative documents. Suggests class activities to clarify students' understanding of the information in…

  12. Reflections on Quantum Data Hiding

    Science.gov (United States)

    Winter, Andreas

    Quantum data hiding, originally invented as a limitation on local operations and classical communications (LOCC) in distinguishing globally orthogonal states, is actually a phenomenon arising generically in statistics whenever comparing a `strong' set of measurements (i.e., decision rules) with a `weak' one. The classical statistical analogue of this would be secret sharing, in which two perfectly distinguishable multi-partite hypotheses appear to be indistinguishable when accessing only a marginal. The quantum versions are richer in that for example LOCC allows for state tomography, so the states cannot be come perfectly indistinguishable but only nearly so, and hence the question is one of efficiency. I will discuss two concrete examples and associated sets of problems: 1. Gaussian operations and classical computation (GOCC): Not very surprisingly, GOCC cannot distinguish optimally even two coherent states of a single mode. Here we find states, each a mixture of multi-mode coherent states, which are almost perfectly distinguishable by suitable measurements, by when restricted to GOCC, i.e. linear optics and post-processing, the states appear almost identical. The construction is random and relies on coding arguments. Open questions include whether there one can give a constructive version of the argument, and whether for instance even thermal states can be used, or how efficient the hiding is. 2. Local operation and classical communication (LOCC): It is well-known that in a bipartite dxd-system, asymptotically logd bits can be hidden. Here we show for the first time, using the calculus of min-entropies, that this is asymptotically optimal. In fact, we get bounds on the data hiding capacity of any preparation system; these are however not always tight. While it is known that data hiding by separable states is possible (i.e. the state preparation can be done by LOCC), it is open whether the optimal information efficiency of (asymptotically) log d bits can be

  13. Perception of Stakeholders to the Proposed Ban on Cow Hide ...

    African Journals Online (AJOL)

    User

    Keywords: Cow hide consumption, cow hide value chain, ponmo .... value chain;. 2. identify sources of information of the respondents on the proposed ban; ..... the health risk associated with the consumption of ponmo may favour its proposed.

  14. Efficient hiding of confidential high-utility itemsets with minimal side effects

    Science.gov (United States)

    Lin, Jerry Chun-Wei; Hong, Tzung-Pei; Fournier-Viger, Philippe; Liu, Qiankun; Wong, Jia-Wei; Zhan, Justin

    2017-11-01

    Privacy preserving data mining (PPDM) is an emerging research problem that has become critical in the last decades. PPDM consists of hiding sensitive information to ensure that it cannot be discovered by data mining algorithms. Several PPDM algorithms have been developed. Most of them are designed for hiding sensitive frequent itemsets or association rules. Hiding sensitive information in a database can have several side effects such as hiding other non-sensitive information and introducing redundant information. Finding the set of itemsets or transactions to be sanitised that minimises side effects is an NP-hard problem. In this paper, a genetic algorithm (GA) using transaction deletion is designed to hide sensitive high-utility itemsets for PPUM. A flexible fitness function with three adjustable weights is used to evaluate the goodness of each chromosome for hiding sensitive high-utility itemsets. To speed up the evolution process, the pre-large concept is adopted in the designed algorithm. It reduces the number of database scans required for verifying the goodness of an evaluated chromosome. Substantial experiments are conducted to compare the performance of the designed GA approach (with/without the pre-large concept), with a GA-based approach relying on transaction insertion and a non-evolutionary algorithm, in terms of execution time, side effects, database integrity and utility integrity. Results demonstrate that the proposed algorithm hides sensitive high-utility itemsets with fewer side effects than previous studies, while preserving high database and utility integrity.

  15. Sensitive plant (Mimosa pudica hiding time depends on individual and state

    Directory of Open Access Journals (Sweden)

    Sarah Reed-Guy

    2017-07-01

    Full Text Available The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  16. Intersectional Analysis in Critical Mathematics Education Research: A Response to Figure Hiding

    Science.gov (United States)

    Bullock, Erika C.

    2018-01-01

    In this chapter, I use figure hiding as a metaphor representing the processes of exclusion and suppression that critical mathematics education (CME) seeks to address. Figure hiding renders identities and modes of thought in mathematics education and mathematics education research invisible. CME has a commitment to addressing figure hiding by…

  17. Perspective taking and theory of mind in hide and seek.

    Science.gov (United States)

    Street, Chris N H; Bischof, Walter F; Kingstone, Alan

    2018-01-01

    Does theory of mind play a significant role in where people choose to hide an item or where they search for an item that has been hidden? Adapting Anderson's "Hide-Find Paradigm" Anderson et al. (Action, Perception and Performance, 76, 907-913, 2014) participants viewed homogenous or popout visual arrays on a touchscreen table. Their task was to indicate where in the array they would hide an item, or to search for an item that had been hidden, by either a friend or a foe. Critically, participants believed that their sitting location at the touchtable was the same as-or opposite to-their partner's location. Replicating Anderson et al., participants tended to (1) select items nearer to themselves on homogenous displays, and this bias was stronger for a friend than foe; and (2) select popout items, and again, more for a friend than foe. These biases were observed only when participants believed that they shared the same physical perspective as their partner. Collectively, the data indicate that theory of mind plays a significant role in hiding and finding, and demonstrate that the hide-find paradigm is a powerful tool for investigating theory of mind in adults.

  18. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2011-05-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  19. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2010-12-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  20. Dynamics and driving forces of hides, skins, leather and leather ...

    African Journals Online (AJOL)

    Footwear and leather goods are constrained by lack of factories, competition from used goods, synthetic plastics and uninformed market. Investment in hides, skins and leather industry supported by training programmes has potential to generate great monetary revenue. Keywords: Hides, skin, leather, value chain, slaughter ...

  1. Effects of dehydration methods on characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  2. Suggested Method for Encryption and Hiding ‎Image using LCG and LSB

    Directory of Open Access Journals (Sweden)

    Atheer Hussein Zyara

    2017-12-01

    Full Text Available Maintaining the confidentiality of the data of the very important areas in computer applications , Where many researchers work in the fields of concealment and encryption . So in this research we are working on the combining of the two methods , where confidential data is encrypted by using  a proposed method , Then the cover is encrypted (regular image by LCG algorithm (which generates a series of random numbers to generate the encrypted cover (irregular image , After that ,we hide the encrypted data in encrypted cover by depending on the LSB technique, then we convert the irregular image into regular image and thereby getting  hidden data in random locations in the  cover image  , This method is characterized by flexibility in terms of the possibility of hiding the different  types of confidential data in different types of media , and durability as that data be hidden in random locations and this  what distinguishes the proposed algorithm , and the results showed high security, because the data is hidden in random locations in encrypted image then convert to the original regular image For clarification of the proposed algorithm , it has been applied on a digital image of the gray type using MATLAB language  by using the efficiency scales PSNR and MSE

  3. Market structure and performance of value chain actors in hides and ...

    African Journals Online (AJOL)

    Market structure and performance of value chain actors in hides and skins processing and marketing in Nigeria. ... There was high performance in hides and skins processing and marketing in Nigeria. ... EMAIL FULL TEXT EMAIL FULL TEXT

  4. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  5. DOE evaluation document for DOT 7A Type A packaging

    International Nuclear Information System (INIS)

    Edling, D.A.; Hopkins, D.R.; Williams, R.L.

    1987-03-01

    This document is a support document for the ''DOE Evaluation Document for DOT 7A Type A Packaging,'' MLM-3245, March 1987. Provided herein are details concerning the performance requirements specified in 178.350 Specification 7A, General Packaging, Type A. MLM-3245 references appropriate sections in this document. This document does not by itself meet the documentation requirements specified in 49 CFR 173.415 and has compliance value only when used in conjunction with MLM-3245

  6. Family networks and income hiding

    NARCIS (Netherlands)

    Beekman, Gonne; Gatto, Marcel; Nillesen, Eleonora

    2015-01-01

    This study investigates the relationship between family network density and income hiding in rural Liberia. We link people's behaviour in a modified lottery experiment and a time preference game to detailed information about their family networks. We find that individuals with a dense family

  7. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  8. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization

    Science.gov (United States)

    Bajaj, Ruchika; Bedi, Punam; Pal, S. K.

    Steganography is an art of hiding information in such a way that prevents the detection of hidden messages. Besides security of data, the quantity of data that can be hidden in a single cover medium, is also very important. We present a secure data hiding scheme with high embedding capacity for messages of variable length based on Particle Swarm Optimization. This technique gives the best pixel positions in the cover image, which can be used to hide the secret data. In the proposed scheme, k bits of the secret message are substituted into k least significant bits of the image pixel, where k varies from 1 to 4 depending on the message length. The proposed scheme is tested and results compared with simple LSB substitution, uniform 4-bit LSB hiding (with PSO) for the test images Nature, Baboon, Lena and Kitty. The experimental study confirms that the proposed method achieves high data hiding capacity and maintains imperceptibility and minimizes the distortion between the cover image and the obtained stego image.

  9. Effects of dehydration methods on the characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  10. Information hiding technique

    Science.gov (United States)

    Younger, Michael; Budulas, Peter P.; Young, Stuart H.

    2002-08-01

    Spread spectrum communication techniques have been recognized as a viable method to gain an advantage in interference environments. Many military-oriented systems have been initiated, and some civil systems have been attempted. Spread spectrum allows the ability to hide the signal of interest below or in the noise floor, so as not to be detected. A spread spectrum system is one in which the transmitted signal is spread over a wide frequency band, much wider, in fact, than the minimum bandwidth required to transmit the information being sent. We at Army Research Lab (ARL) are proposing using the same technique on the Internet with port hopping. The information would be transmitted in data packets over multiple ports. The port used would vary per packet or per session basis. This port hopping gives you and the recipients the ability to take datagram's and spread them out over a multitude of ports. This will hide information among the Internet noise. This will allow trusted communications between the transmitter and receiver because of the port coding sequence. There are 64K possible ports to span datagram. Jamming of transmission would be limiting the ability of the sniffer/listener. Also, the listener will find it difficult to use a man in the middle attach, since the data will be spread over multiple ports and only the receiver and transmitter will know the specific port sequencing for the datagram.

  11. A Type System for Dynamic Web Documents

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Sandholm, Anders

    2000-01-01

    Many interactive Web services use the CGI interface for communication with clients. They will dynamically create HTML documents that are presented to the client who then resumes the interaction by submitting data through incorporated form fields. This protocol is difficult to statically type-chec...... system is based on a flow analysis of which we prove soundness. We present an efficient runtime implementation that respects the semantics of only well-typed programs. This work is fully implemented as part of the system for defining interactive Web services.......Many interactive Web services use the CGI interface for communication with clients. They will dynamically create HTML documents that are presented to the client who then resumes the interaction by submitting data through incorporated form fields. This protocol is difficult to statically type...

  12. Succession of hide-seek and pursuit-evasion at heterogeneous locations.

    Science.gov (United States)

    Gal, Shmuel; Casas, Jérôme

    2014-05-06

    Many interactions between searching agents and their elusive targets are composed of a succession of steps, whether in the context of immune systems, predation or counterterrorism. In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit-escape. Our aim is to link these two processes, usually analysed separately and with different models, in a single game theory context. We define a matrix game in which a searcher looks at a fixed number of discrete locations only once each searching for a hider, which can escape with varying probabilities according to its location. The value of the game is the overall probability of capture after k looks. The optimal search and hide strategies are described. If a searcher looks only once into any of the locations, an optimal hider chooses it's hiding place so as to make all locations equally attractive. This optimal strategy remains true as long as the number of looks is below an easily calculated threshold; however, above this threshold, the optimal position for the hider is where it has the highest probability of escaping once spotted.

  13. An evaluation of selected methods for the decontamination of cattle hides prior to skinning.

    Science.gov (United States)

    Small, A; Wells-Burr, B; Buncic, S

    2005-02-01

    The effectiveness of different decontamination treatments in reducing microbial loads on cattle hides was assessed. The 10-s hide treatments were conducted using a wet-and-dry vacuum cleaner filled with one of the liquids (heated to 50 °C) indicated below, followed or not by 10-min drying in the air. Also, the hide was clipped, followed or not by 10-s singeing using a hand-held blowtorch. Before and after each decontamination treatment, the hide was sampled (100 cm(2) areas) by a sponge-swabbing method to compare the total viable counts of bacteria (TVC). The largest bacterial reduction (Psanitizer solution (10% Betane Plus) resulted in significant reductions of 1.80 (Peffects. Since hide contamination is associated with microbial contamination of the carcasses, the results indicate that post-killing/pre-skinning hide decontamination (used alone, or in combination with carcass decontamination) has a potential to improve microbial meat safety. Nevertheless, further research is required to optimise the efficacy of these treatments in the reduction of specific pathogens under commercial conditions.

  14. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  15. Physicochemical Properties of Gelatin Extracted from Buffalo Hide Pretreated with Different Acids.

    Science.gov (United States)

    Mulyani, Sri; Setyabudi, Francis M C Sigit; Pranoto, Yudi; Santoso, Umar

    2017-01-01

    The acid pretreatment of collagen molecules disrupts their crosslinks and assists in the release of acid-soluble proteins, fats, and other components. Generally, to achieve optimum extraction efficiency, strong acids may be used at a lower acid concentration compared to weak acids. This study aimed to determine the yield and physicochemical properties of gelatins extracted from buffalo hides pretreated with different acids. Hides were extracted with hydrochloric, citric, and acetic acids at concentrations of 0.3, 0.6, 0.9, 1.2, and 1.5 M. A completely randomized design and the least significant difference test were used in the experimental design, and all measurements were performed in triplicate. The highest yield (29.17%) was obtained from pretreatment with 0.9 M HCl. The gel strength did not differ significantly ( p >0.05) according to acid type (280.26-259.62 g Bloom), and the highest viscosity was obtained from the 0.6 M citric acid pretreatment. All the gelatins contained α- and β-chain components and several degraded peptides (24-66 kDa). The color and Fourier-transform infrared spectrum of the gelatin extracted using 0.9 M HCl were similar to those of commercial bovine skin gelatin. In general, the physicochemical properties of the gelatin complied with the industry standard set by the Gelatin Manufacturers Institute of America, revealing that buffalo hide could serve as a potential alternative source of gelatin.

  16. Reversible data hiding for image based on histogram modification of wavelet coefficients

    NARCIS (Netherlands)

    Liang, Xiaoping; Wu, Xiaoyun; Huang, Jiwu; Hao, Y.; Liu, J.; Wang, Y.; Cheung, Y.; Yin, H.; Jiao, L.; Ma, J.; Jiao, Y.C.

    2005-01-01

    Reversible data hiding has drawn intensive attention recently. Reversibility means to embed data into digital media and restore the original media from marked media losslessly. Reversible data hiding technique is desired in sensitive applications that require no permanent loss of signal fidelity. In

  17. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    Directory of Open Access Journals (Sweden)

    Novella Isabel S

    2003-06-01

    Full Text Available Abstract Background In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, RED, was found to avoid extinction and remain in the population for long periods of time. Since RED characterizes the past evolutionary history of the population, this observation was called quasispecies memory. While the quasispecies theory predicts the existence of these memory genomes, there is a disagreement between the expected and observed mutant frequency values. Therefore, the origin of quasispecies memory is not fully understood. Results We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry, the likely cause of fitness differences between wild type and RED mutants. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.. If the RED mutant is constantly recreated by mutations, then its frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases their fitness to the wild-type level. Moreover, even at low m.o.i. the equilibrium frequency of the mutant is higher than predicted by the standard quasispecies model, because a fraction of mutant virions generated from wild-type parents will also be encapsidated by wild-type protein. Conclusions Our model predicts that phenotypic hiding will strongly influence the population dynamics of viruses, particularly at high m.o.i., and will also have important effects on the mutation-selection balance at low m.o.i. The delay in mutant extinction and increase in mutant

  18. Hiding and Searching Strategies of Adult Humans in a Virtual and a Real-Space Room

    Science.gov (United States)

    Talbot, Katherine J.; Legge, Eric L. G.; Bulitko, Vadim; Spetch, Marcia L.

    2009-01-01

    Adults searched for or cached three objects in nine hiding locations in a virtual room or a real-space room. In both rooms, the locations selected by participants differed systematically between searching and hiding. Specifically, participants moved farther from origin and dispersed their choices more when hiding objects than when searching for…

  19. Document Type Profiles in Nature, Science, and PNAS: Journal and Country Level

    Directory of Open Access Journals (Sweden)

    Jielan Ding

    2016-09-01

    Full Text Available Purpose: In this contribution, we want to detect the document type profiles of the three prestigious journals Nature, Science, and Proceedings of the National Academy of Sciences of the United States (PNAS with regard to two levels: journal and country. Design/methodology/approach: Using relative values based on fractional counting, we investigate the distribution of publications across document types at both the journal and country level, and we use (cosine document type profile similarity values to compare pairs of publication years within countries. Findings: Nature and Science mainly publish Editorial Material, Article, News Item and Letter, whereas the publications of PNAS are heavily concentrated on Article. The shares of Article for Nature and Science are decreasing slightly from 1999 to 2014, while the corresponding shares of Editorial Material are increasing. Most studied countries focus on Article and Letter in Nature, but on Letter in Science and PNAS. The document type profiles of some of the studied countries change to a relatively large extent over publication years. Research limitations: The main limitation of this research concerns the Web of Science classification of publications into document types. Since the analysis of the paper is based on document types of Web of Science, the classification in question is not free from errors, and the accuracy of the analysis might be affected. Practical implications: Results show that Nature and Science are quite diversified with regard to document types. In bibliometric assessments, where publications in Nature and Science play a role, other document types than Article and Review might therefore be taken into account. Originality/value: Results highlight the importance of other document types than Article and Review in Nature and Science. Large differences are also found when comparing the country document type profiles of the three journals with the corresponding profiles in all Web of

  20. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  1. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Directory of Open Access Journals (Sweden)

    Andreas Wilke

    Full Text Available Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  2. Multiple-image hiding using super resolution reconstruction in high-frequency domains

    Science.gov (United States)

    Li, Xiao-Wei; Zhao, Wu-Xiang; Wang, Jun; Wang, Qiong-Hua

    2017-12-01

    In this paper, a robust multiple-image hiding method using the computer-generated integral imaging and the modified super-resolution reconstruction algorithm is proposed. In our work, the host image is first transformed into frequency domains by cellular automata (CA), to assure the quality of the stego-image, the secret images are embedded into the CA high-frequency domains. The proposed method has the following advantages: (1) robustness to geometric attacks because of the memory-distributed property of elemental images, (2) increasing quality of the reconstructed secret images as the scheme utilizes the modified super-resolution reconstruction algorithm. The simulation results show that the proposed multiple-image hiding method outperforms other similar hiding methods and is robust to some geometric attacks, e.g., Gaussian noise and JPEG compression attacks.

  3. An information hiding method based on LSB and tent chaotic map

    Science.gov (United States)

    Song, Jianhua; Ding, Qun

    2011-06-01

    In order to protect information security more effectively, a novel information hiding method based on LSB and Tent chaotic map was proposed, first the secret message is Tent chaotic encrypted, and then LSB steganography is executed for the encrypted message in the cover-image. Compared to the traditional image information hiding method, the simulation results indicate that the method greatly improved in imperceptibility and security, and acquired good results.

  4. Hiding levitating objects above a ground plane

    DEFF Research Database (Denmark)

    Zhang, Jingjing; Luo, Yu; Mortensen, Asger

    2010-01-01

    An approach to hiding objects levitating above a conducting sheet is suggested in this paper. The proposed device makes use of isotropic negative-refractive-index materials without extreme material parameters, and creates an illusion of a remote conducting sheet. Numerical simulations are perform...

  5. Probability of error in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2007-01-01

    Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the

  6. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: RVO:67985998 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  7. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: PRVOUK-P23 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  8. The Costs of Hiding and Faking Emotions: The Case of Extraverts and Introverts.

    Science.gov (United States)

    Seger-Guttmann, Tali; Medler-Liraz, Hana

    2016-01-01

    The present study examined the moderation effects of extraversion on the relationships between hiding and faking emotions, perceived satisfaction from intimate relationships, and reported physical health concerns. Four hundred and four Israeli participants, who were all involved in intimate relationships at the time of the study, responded to the Extraversion scale from the Big-Five Inventory, the DEELS to measure hiding and faking emotions, the SELF to assess physical health concerns, and the short version of the ENRICH to evaluate perceived satisfaction with intimate relationships. The mean age was 32.3 years (SD = 8.2); and the average length of time as a couple was 7.8 years (SD = 8.2). Of the participants, 198 were married (48.5%). The findings indicate that the effect of hiding negative emotions was stronger for perceived satisfaction with intimate relationships and physical health concerns than that for faking positive emotions. Extraverts who showed a higher frequency of hiding their negative emotions were significantly less satisfied with their relationships than introverts and they also tended to report more concerns with their physical health. These results were not found when extraverts reported a high frequency of faking positive emotions. These results are discussed in the context of the trait-behavior-concordance model and stress the importance of distinguishing faking from hiding.

  9. Data Hiding Based on a Two-Layer Turtle Shell Matrix

    Directory of Open Access Journals (Sweden)

    Xiao-Zhu Xie

    2018-02-01

    Full Text Available Data hiding is a technology that embeds data into a cover carrier in an imperceptible way while still allowing the hidden data to be extracted accurately from the stego-carrier, which is one important branch of computer science and has drawn attention of scholars in the last decade. Turtle shell-based (TSB schemes have become popular in recent years due to their higher embedding capacity (EC and better visual quality of the stego-image than most of the none magic matrices based (MMB schemes. This paper proposes a two-layer turtle shell matrix-based (TTSMB scheme for data hiding, in which an extra attribute presented by a 4-ary digit is assigned to each element of the turtle shell matrix with symmetrical distribution. Therefore, compared with the original TSB scheme, two more bits are embedded into each pixel pair to obtain a higher EC up to 2.5 bits per pixel (bpp. The experimental results reveal that under the condition of the same visual quality, the EC of the proposed scheme outperforms state-of-the-art data hiding schemes.

  10. Content-based Image Hiding Method for Secure Network Biometric Verification

    Directory of Open Access Journals (Sweden)

    Xiangjiu Che

    2011-08-01

    Full Text Available For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content correlation analysis to protect the network-based transmitted image. By using principal component analysis (PCA, the content correlation between the biometric image and the cover image is firstly analyzed. Then based on particle swarm optimization (PSO algorithm, some regions of the cover image are selected to represent the biometric image, in which the cover image can carry partial content of the biometric image. As a result of the correlation analysis, the unrepresented part of the biometric image is embedded into the cover image by using the discrete wavelet transform (DWT. Combined with human visual system (HVS model, this approach makes the hiding result perceptually invisible. The extensive experimental results demonstrate that the proposed hiding approach is robust against some common frequency and geometric attacks; it also provides an effective protection for the secure biometric verification.

  11. Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography

    Directory of Open Access Journals (Sweden)

    Wei-Liang Tai

    2018-01-01

    Full Text Available We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds data in it by using a data-hiding key. The image decryption and data extraction are independent and separable at the receiver side. Even though the receiver, who has only the data-hiding key, does not learn about the decrypted content, he can extract data from the received marked encrypted signal. However, the receiver who has only the private key cannot extract the embedded data, but he can directly decrypt the received marked encrypted signal to obtain the original image without any error. Compared with other schemes using a cipher stream to encrypt the image, the proposed scheme is more appropriate for cloud services without degrading the security level.

  12. Polycyclic Aromatic Hydrocarbons (PAHs) Content in Cattle Hides ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Vol. 21 (6) 1105-1110. Full-text Available Online at www.ajol.info and ... Keywords: Cattle hide, meat, tyre, singeing, hydrocarbons ... on the substance used as fuel for meat processing. .... through the centrifuge at 200 rpm for 5 min. The.

  13. HIDE working groups: synchrotron based system: summary

    International Nuclear Information System (INIS)

    Barton, M.Q.

    1978-01-01

    A brief overview is given of the work resulting from a one-week workshop on the use of synchrotrons in heavy ion fusion, i.e., a Heavy Ion Demonstration Experiment (HIDE). Topics discussed concerned the number of beams on target, space charge limitations, choice of ion charge state, and areas identified as needing further work

  14. Effects of gamma rays on the physical and mechanical properties of hide

    International Nuclear Information System (INIS)

    Sutrisno Puspodikoro.

    1976-01-01

    The effect of gamma rays on the physical and mechanical properties of hide has been studied, using Gammacell 220 as an irradiator. The determination of the physical and mechanical properties of the irradiated hide was carried out by Balai Penelitian Kulit (Leather Research Institute) at Yogyakarta. Experiments show that up to a certain dose of irradiation, favourable effects can be obtained, while higher doses impair the physical and mechanical properties of the leather raw materials. (author)

  15. On the Bayes risk in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2008-01-01

    Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability

  16. Efficient reversible data hiding in encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2014-09-01

    Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.

  17. Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

    Directory of Open Access Journals (Sweden)

    Mohammad S. Alam

    2012-10-01

    Full Text Available In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level.

  18. Documentation and verification required for type A packaging use

    Energy Technology Data Exchange (ETDEWEB)

    O`Brien, J.H.

    1997-07-30

    This document furnishes knowledge and methods for verifying compliance with the U.S. Department of Transportation (DOT) packaging requirements for shipping Type A quantities of radioactive material. The primary emphasis is on the requirements identified in 49 CFR 173.415(a), which states, ``Each offeror of a Specification 7A package must maintain on file for at least one year after the shipment, and shall provide to DOT on request, complete documentation of tests and an engineering evaluation of comparative data showing that the construction methods, packaging design, and materials of construction comply with that specification.`` This guidance document uses a checklist to show compliance.

  19. Documentation and verification required for type A packaging use

    International Nuclear Information System (INIS)

    O'Brien, J.H.

    1997-01-01

    This document furnishes knowledge and methods for verifying compliance with the U.S. Department of Transportation (DOT) packaging requirements for shipping Type A quantities of radioactive material. The primary emphasis is on the requirements identified in 49 CFR 173.415(a), which states, ''Each offeror of a Specification 7A package must maintain on file for at least one year after the shipment, and shall provide to DOT on request, complete documentation of tests and an engineering evaluation of comparative data showing that the construction methods, packaging design, and materials of construction comply with that specification.'' This guidance document uses a checklist to show compliance

  20. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Energy Technology Data Exchange (ETDEWEB)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C. (Iso-Ster (Pty) Ltd., Kempton Park (South Africa))

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  1. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Science.gov (United States)

    Du Plessis, TA; Russell, AE; Stevens, RCB; Galloway, AC

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  2. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    International Nuclear Information System (INIS)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C.

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem. (author)

  3. Optical multiple-image hiding based on interference and grating modulation

    International Nuclear Information System (INIS)

    He, Wenqi; Peng, Xiang; Meng, Xiangfeng

    2012-01-01

    We present a method for multiple-image hiding on the basis of interference-based encryption architecture and grating modulation. By using a modified phase retrieval algorithm, we can separately hide a number of secret images into one arbitrarily preselected host image associated with a set of phase-only masks (POMs), which are regarded as secret keys. Thereafter, a grating modulation operation is introduced to multiplex and store the different POMs into a single key mask, which is then assigned to the authorized users in privacy. For recovery, after an appropriate demultiplexing process, one can reconstruct the distributions of all the secret keys and then recover the corresponding hidden images with suppressed crosstalk. Computer simulation results are presented to validate the feasibility of our approach. (paper)

  4. HIDING TEXT IN DIGITAL IMAGES USING PERMUTATION ORDERING AND COMPACT KEY BASED DICTIONARY

    Directory of Open Access Journals (Sweden)

    Nagalinga Rajan

    2017-05-01

    Full Text Available Digital image steganography is an emerging technique in secure communication for the modern connected world. It protects the content of the message without arousing suspicion in a passive observer. A novel steganography method is presented to hide text in digital images. A compact dictionary is designed to efficiently communicate all types of secret messages. The sorting order of pixels in image blocks are chosen as the carrier of embedded information. The high correlation in image pixel values means reordering within image blocks do not cause high distortion. The image is divided into blocks and perturbed to create non repeating sequences of intensity values. These values are then sorted according to the message. At the receiver end, the message is read from the sorting order of the pixels in image blocks. Only those image blocks with standard deviation lesser than a given threshold are chosen for embedding to alleviate visual distortion. Information Security is provided by shuffling the dictionary according to a shared key. Experimental Results and Analysis show that the method is capable of hiding text with more than 4000 words in a 512×512 grayscale image with a peak signal to noise ratio above 40 decibels.

  5. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients

    Science.gov (United States)

    Zhang, Xiaoqiang; Wang, Z. Jane

    2013-10-01

    Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 10 to 10 and thus can resist brute-force attack and unauthorized detection watermark attack.

  6. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days) after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment. PMID:11455906

  7. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Directory of Open Access Journals (Sweden)

    Grønstøl H

    2001-03-01

    Full Text Available The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment.

  8. Sensor and Actuator Fault-Hiding Reconfigurable Control Design for a Four-Tank System Benchmark

    DEFF Research Database (Denmark)

    Hameed, Ibrahim; El-Madbouly, Esam I; Abdo, Mohamed I

    2015-01-01

    Invariant (LTI) system where virtual sensors and virtual actuators are used to correct faulty performance through the use of a pre-fault performance. Simulation results showed that the developed approach can handle different types of faults and able to completely and instantly recover the original system......Fault detection and compensation plays a key role to fulfill high demands for performance and security in today's technological systems. In this paper, a fault-hiding (i.e., tolerant) control scheme that detects and compensates for actuator and sensor faults in a four-tank system benchmark...

  9. Strategie del patetico e interludi circensi in Hide and Seek di Wilkie Collins

    OpenAIRE

    De Giovanni, Flora

    2013-01-01

    Starting from Victor Turner’s definitions of cultural performance and liminoid phenomena, the essay aims to analyse Wilkie Collins’s third novel, Hide and Seek (1854), which seems to be a sort of survey of the pastimes Victorian England allowed itself in the age of the increasing commodification of leisure. Though not a proper sensation novel (the genre for which Collins became famous in the 1860s), Hide and Seek draws on the conventions of melodrama, which, as Peter Brook conv...

  10. Efficacy of citrilow™ and cecure™ spray wash on the levels and prevalence of aerobic bacterials and enterobacteriaceae bacteria on cattle hides

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle skins to the inner meat and hide quality detrition from bacteria is recognized as a severe hygienic problem for commercial beef and hide processing facilities. To circumvent bacterial contamination, cattle are washed during hide p...

  11. Cross-sectional study to estimate the prevalence of enterohaemorrhagic Escherichia coli on hides of market beef cows at harvest.

    Science.gov (United States)

    Schneider, L G; Stromberg, Z R; Lewis, G L; Moxley, R A; Smith, D R

    2018-03-25

    Cattle hides are an important source of enterohaemorrhagic Escherichia coli (EHEC) carcass contamination at slaughter. Seven EHEC serogroups are adulterants in raw, non-intact beef: EHEC O26, O45, O103, O111, O121, O145 and O157. The objective of this study was to estimate the probability for hide contamination with EHEC among US market beef cows at slaughter and to test the effects of season and geographic region on prevalence of hide contamination. Hides (n = 800) of market cows were swabbed at slaughter immediately after exsanguination, prior to hide removal. Cows were sampled from two geographically distinct beef packing plants during four seasons of 2015. Cattle source was categorized by northern or southern region. Samples were tested for EHEC by a molecular screening assay. The effects of region, season and their interaction on the probability of hide contamination by each EHEC serogroup were tested in separate multilevel multivariable logistic regression models, accounting for the random effect of clustering by plant. Statistical significance was set α = .05. Of 800 total samples, at least one EHEC was detected on 630 (79%) hides. Enterohaemorrhagic E. coli O26 was detected on 129 (16%) of all hides sampled, EHEC O45 on 437 (55%), EHEC O103 on 289 (36%), EHEC O111 on 189 (24%), EHEC O121 on 140 (18%), EHEC O145 on 171 (21%) and EHEC O157 on 89 (11%). Detection of EHEC O26 and EHEC O121 was associated with season. Season and region were associated with detecting EHEC O45 and EHEC O157. Season-by-region interactions were associated with the outcome of detecting EHEC O103, EHEC O111 and EHEC O145. Season, region of origin and the interaction of these factors affect hide contamination of market beef cattle at slaughter by EHEC, and each serogroup responds to these factors uniquely. © 2018 Blackwell Verlag GmbH.

  12. Variation in the Level of Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The occurrence of hide damage light flecks and spots was determined on tanned hides from 28 herds during a period of 8 to 12 months. Light flecks and spots are described as small areas of grain loss up to 3 mm in diameter that are seen on dyed crust cattle leather. Damage was found on 75.8% of all hides. The neck and shoulders were the anatomical region with the highest prevalence of damage. Sixty-eight per cent of all hides had light flecks and spots in this region. The forelimbs and dewlap were the anatomical region with the second highest occurrence with a prevalence of 39.1%. This distribution corresponded to the known distribution of lice in cattle. No significant differences were observed in age, sex, prevalence of lice in the herd assessed in March or infestations with different lice species. The frequency of light flecks and spots varied significantly during the year. The frequency was highest in the late winter and early spring, decreased significantly during the summer and was lowest in the autumn. This variation supported the importance of lice in the development of light flecks and spots and suggested a relatively long healing period for the damages induced by lice. PMID:11455905

  13. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    Directory of Open Access Journals (Sweden)

    H. Yang

    2009-12-01

    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  14. Prey should hide more randomly when a predator attacks more persistently.

    Science.gov (United States)

    Gal, Shmuel; Alpern, Steve; Casas, Jérôme

    2015-12-06

    When being searched for and then (if found) pursued by a predator, a prey animal has a choice between choosing very randomly among hiding locations so as to be hard to find or alternatively choosing a location from which it is more likely to successfully flee if found. That is, the prey can choose to be hard to find or hard to catch, if found. In our model, capture of prey requires both finding it and successfully pursuing it. We model this dilemma as a zero-sum repeated game between predator and prey, with the eventual capture probability as the pay-off to the predator. We find that the more random hiding strategy is better when the chances of repeated pursuit, which are known to be related to area topography, are high. Our results extend earlier results of Gal and Casas, where there was at most only a single pursuit. In that model, hiding randomly was preferred by the prey when the predator has only a few looks. Thus, our new multistage model shows that the effect of more potential looks is opposite. Our results can be viewed as a generalization of search games to the repeated game context and are in accordance with observed escape behaviour of different animals. © 2015 The Author(s).

  15. 9 CFR 310.10 - Carcasses with skin or hide on; cleaning before evisceration; removal of larvae of Hypodermae...

    Science.gov (United States)

    2010-01-01

    ..., DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION... pathological skin conditions. When a carcass is to be dressed with the skin or hide left on, the skin or hide...

  16. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  17. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  18. Impact of Media Richness on Reduction of Knowledge-Hiding Behavior in Enterprises

    DEFF Research Database (Denmark)

    Labafi, Somayeh; Khajeheian, Datis; Williams, Idongesit

    2018-01-01

    in a qualitative study. Thematic analysis is used to analyze transcribed interview data from employees in a software company in Iran. The findings of the analysis show that media richness significantly impacts on organizational learning and influences on knowledge hiding behavior in employees. This article...... suggests that entrepreneurs and managers of small firms should provide employees’ access to rich media content as well as established organizational learning as part of their organizational culture.......Knowledge hiding is one of the major obstacles in the progression of organizations that hinder the use of tacit knowledge of employees. The negative impact of this behavior is more significant in enterprises and small firms because they are more reliant on knowledge of their employees...

  19. 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing

    CERN Document Server

    Tsai, Pei-Wei; Huang, Hsiang-Cheh

    2017-01-01

    This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .

  20. Matryoshka: Hiding Secret Communication in Plain Sight

    OpenAIRE

    Safaka, Iris; Fragouli, Christina; Argyraki, Katerina

    2016-01-01

    We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small -- existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of...

  1. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  2. High-capacity method for hiding data in the discrete cosine transform domain

    Science.gov (United States)

    Qazanfari, Kazem; Safabakhsh, Reza

    2013-10-01

    Steganography is the art and science of hiding data in different media such as texts, audios, images, and videos. Data hiding techniques are generally divided into two groups: spatial and frequency domain techniques. Spatial domain methods generally have low security and, as a result, are less attractive to researchers. Discrete cosine transform (DCT) is the most common transform domain used in steganography and JPEG compression. Since a large number of the DCT coefficients of JPEG images are zero, the capacity of DCT domain-based steganography methods is not very high. We present a high-capacity method for hiding messages in the DCT domain. We describe the method in two classes where the receiver has and where the receiver does not have the cover image. In each class, we consider three cases for each coefficient. By considering n coefficients, there are 3n different situations. The method embeds ⌊log2 3n⌋ bits in these n coefficients. We show that the maximum reachable capacity by our method is 58% higher than the other general steganography methods. Experimental results show that the histogram-based steganalysis methods cannot detect the stego images produced by the proposed method while the capacity is increased significantly.

  3. Preservation of bovine hide using less salt with low concentration of antiseptic, part I: effectiveness of developed formulations

    Science.gov (United States)

    Bovine raw hides are commercially cured either with high salt concentration of about half the weight of actual hide or 95% saturated brine solution. This conventional technique is very popular due to the availability of common salt (sodium chloride) and its cost effective procedure but it generates ...

  4. A Typed Text Retrieval Query Language for XML Documents.

    Science.gov (United States)

    Colazzo, Dario; Sartiani, Carlo; Albano, Antonio; Manghi, Paolo; Ghelli, Giorgio; Lini, Luca; Paoli, Michele

    2002-01-01

    Discussion of XML focuses on a description of Tequyla-TX, a typed text retrieval query language for XML documents that can search on both content and structures. Highlights include motivations; numerous examples; word-based and char-based searches; tag-dependent full-text searches; text normalization; query algebra; data models and term language;…

  5. DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Siva Shankar

    2016-08-01

    Full Text Available Digital image steganography has several applications in information security and communication. Data hiding in encrypted images ensure that both the cover image and the secret message can be recovered at the receiver end. This work presents a novel data hiding and image encryption scheme using random diffusion and Two dimensional Arnold cat mapping transform. The secret message bits are placed in the least significant bit positions of the cover image. Then a shared key is used to generate random 8 bit random integer stream and is added to the stego image in the random diffusion step. Arnold cat mapping transformation is done to scramble the pixels. The two steps of random diffusion and Arnold transform mapping are done alternatively several times to completely encrypt the image contents. The process is reversed at the receiver end to get both the secret message and the cover image with little loss. The random diffusion step overcomes the limited period of the Arnold transform. The embedding capacity of one bit per pixel is achieved. Security analysis is carried out which shows that the encryption is highly secure. The number of collisions is low thus preventing brute force attacks. The original cover image is recoverable with minimal losses.

  6. Tangible interactive system for document browsing and visualisation of multimedia data

    Science.gov (United States)

    Rytsar, Yuriy; Voloshynovskiy, Sviatoslav; Koval, Oleksiy; Deguillaume, Frederic; Topak, Emre; Startchik, Sergei; Pun, Thierry

    2006-01-01

    In this paper we introduce and develop a framework for document interactive navigation in multimodal databases. First, we analyze the main open issues of existing multimodal interfaces and then discuss two applications that include interaction with documents in several human environments, i.e., the so-called smart rooms. Second, we propose a system set-up dedicated to the efficient navigation in the printed documents. This set-up is based on the fusion of data from several modalities that include images and text. Both modalities can be used as cover data for hidden indexes using data-hiding technologies as well as source data for robust visual hashing. The particularities of the proposed robust visual hashing are described in the paper. Finally, we address two practical applications of smart rooms for tourism and education and demonstrate the advantages of the proposed solution.

  7. Hiding Information Using different lighting Color images

    Science.gov (United States)

    Majead, Ahlam; Awad, Rash; Salman, Salema S.

    2018-05-01

    The host medium for the secret message is one of the important principles for the designers of steganography method. In this study, the best color image was studied to carrying any secret image.The steganography approach based Lifting Wavelet Transform (LWT) and Least Significant Bits (LSBs) substitution. The proposed method offers lossless and unnoticeable changes in the contrast carrier color image and imperceptible by human visual system (HVS), especially the host images which was captured in dark lighting conditions. The aim of the study was to study the process of masking the data in colored images with different light intensities. The effect of the masking process was examined on the images that are classified by a minimum distance and the amount of noise and distortion in the image. The histogram and statistical characteristics of the cover image the results showed the efficient use of images taken with different light intensities in hiding data using the least important bit substitution method. This method succeeded in concealing textual data without distorting the original image (low light) Lire developments due to the concealment process.The digital image segmentation technique was used to distinguish small areas with masking. The result is that smooth homogeneous areas are less affected as a result of hiding comparing with high light areas. It is possible to use dark color images to send any secret message between two persons for the purpose of secret communication with good security.

  8. Livestock and Hides and Skins Marketing in Kenya: Problems and investment needs

    OpenAIRE

    Jabbar, Mohammad A.

    2002-01-01

    The paper briefly summarises the historical perspective on the development of livestock marketing in Kenya, current problems of livestock and hides and skins marketing, and recommends investment opportunities to improve the situation.

  9. Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

    Directory of Open Access Journals (Sweden)

    Xianyi Chen

    2018-01-01

    Full Text Available Compared to the encrypted-image-based reversible data hiding (EIRDH method, the encrypted-signals-based reversible data hiding (ESRDH technique is a novel way to achieve a greater embedding rate and better quality of the decrypted signals. Motivated by ESRDH using signal energy transfer, we propose an improved ESRDH method using code division multiplexing and value expansion. At the beginning, each pixel of the original image is divided into several parts containing a little signal and multiple equal signals. Next, all signals are encrypted by Paillier encryption. And then a large number of secret bits are embedded into the encrypted signals using code division multiplexing and value expansion. Since the sum of elements in any spreading sequence is equal to 0, lossless quality of directly decrypted signals can be achieved using code division multiplexing on the encrypted equal signals. Although the visual quality is reduced, high-capacity data hiding can be accomplished by conducting value expansion on the encrypted little signal. The experimental results show that our method is better than other methods in terms of the embedding rate and average PSNR.

  10. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  11. Information hiding technology and application analysis based on decimal expansion of irrational numbers

    Science.gov (United States)

    Liu, Xiaoyong; Lu, Pei; Shao, Jianxin; Cao, Haibin; Zhu, Zhenmin

    2017-10-01

    In this paper, an information hiding method using decimal expansion of irrational numbers to generate random phase mask is proposed. Firstly, the decimal expansion parts of irrational numbers generate pseudo-random sequences using a new coding schemed, the irrational number and start and end bit numbers were used as keys in image information hiding. Secondly, we apply the coding schemed to the double phase encoding system, the pseudo-random sequences are taken to generate random phase masks. The mean square error is used to calculate the quality of the recovered image information. Finally, two tests had been carried out to verify the security of our method; the experimental results demonstrate that the cipher image has such features, strong robustness, key sensitivity, and resistance to brute force attack.

  12. Dealing with extreme data diversity: extraction and fusion from the growing types of document formats

    Science.gov (United States)

    David, Peter; Hansen, Nichole; Nolan, James J.; Alcocer, Pedro

    2015-05-01

    The growth in text data available online is accompanied by a growth in the diversity of available documents. Corpora with extreme heterogeneity in terms of file formats, document organization, page layout, text style, and content are common. The absence of meaningful metadata describing the structure of online and open-source data leads to text extraction results that contain no information about document structure and are cluttered with page headers and footers, web navigation controls, advertisements, and other items that are typically considered noise. We describe an approach to document structure and metadata recovery that uses visual analysis of documents to infer the communicative intent of the author. Our algorithm identifies the components of documents such as titles, headings, and body content, based on their appearance. Because it operates on an image of a document, our technique can be applied to any type of document, including scanned images. Our approach to document structure recovery considers a finer-grained set of component types than prior approaches. In this initial work, we show that a machine learning approach to document structure recovery using a feature set based on the geometry and appearance of images of documents achieves a 60% greater F1- score than a baseline random classifier.

  13. The impact of a gender and business training on income hiding

    NARCIS (Netherlands)

    Bulte, Erwin H.; Lensink, Robert; Winkel, Anne B.

    2018-01-01

    We use a randomized controlled trial and behavioral game to study the extent and determinants of income hiding in rural Vietnam. We focus on a training program that aims to promote gender equality and entrepreneurship among women in poverty who are engaged in running a small business. In one

  14. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    OpenAIRE

    Kuang Tsan Lin; Sheng Lih Yeh

    2014-01-01

    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  15. Facts about Type 2

    Medline Plus

    Full Text Available ... Diabetes Research & Practice Home We Are Research Leaders World's Largest Diabetes Meeting Recent Advances Type 1 Research ... survey-loading').remove(); $('#emailsurvey').hide(); $('#emailsurveythanks').show(); } } }; /* bind any forms with the "luminateApi" class */ luminateExtend.api.bind(); }); })( ...

  16. Entry points to stimulation of expansion in hides and skins processing

    African Journals Online (AJOL)

    Only 3.4% of respondents add value to hides and skins by processing. ... For this status of the chain, it was proposed that a workable intervention model has to encompass placement of tanneries and slaughter slabs in the chain as new actors, linking chain actors, improving livestock services especially dipping, and ...

  17. Hide unhairing and characterization of commercial enzymes used in leather manufacture

    Directory of Open Access Journals (Sweden)

    A Dettmer

    2011-09-01

    Full Text Available The enzymatic treatment of hides in tannery processes is a promising technology. However, the reaction kinetics of commercial enzymes available to the leather industry are not fully understood and their activities have been mainly determined with model proteins such as casein as substrate, which are not of direct relevance for cattle hides. Therefore, it is important to determine their activities on collagen and keratin, the main proteins of skin, in order to use these enzymes in leather processing. This work describes the study of five proteases, used commercially in tanneries, to assess their ability to act upon collagen and keratin and to determine their unhairing. Results showed that all commercial enzymes tested had more activity on collagen than on keratin. Unhairing was also tested and four out of the five enzymes tested showed some unhairing activity. Optima of the temperature and pH of the enzymes were very similar for all five enzymes, with maximal activities around 55ºC and pH 9 to 12, respectively.

  18. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    Directory of Open Access Journals (Sweden)

    Ari Shawakat Tahir

    2015-12-01

    Full Text Available The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed.

  19. Hiding objects and creating illusions above a carpet filter using a Fourier optics approach.

    Science.gov (United States)

    Wu, Kedi; Wang, Guo Ping

    2010-09-13

    Invisibility carpet cloaks are usually used to hide an object beneath carpet. In this paper we propose and demonstrate a carpet filter to hide objects and create illusions above the filter by using a Fourier optics method. Instead of using transformation optics, we get electromagnetic parameters of the filter by optical transfer functions, which play the role of modulating the propagation of the scattering angular spectrum directly from an object above the filter. By further adding a functional layer onto the filter, we can even camouflage the object so that it appears to be a different object. The analytical results are confirmed by numerical simulations. Our method is completely different from the current coordinate transfer method and may provide another point of view to more clearly understand the mechanism of invisibility cloaks.

  20. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    Science.gov (United States)

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  1. Document Models

    Directory of Open Access Journals (Sweden)

    A.A. Malykh

    2017-08-01

    Full Text Available In this paper, the concept of locally simple models is considered. Locally simple models are arbitrarily complex models built from relatively simple components. A lot of practically important domains of discourse can be described as locally simple models, for example, business models of enterprises and companies. Up to now, research in human reasoning automation has been mainly concentrated around the most intellectually intensive activities, such as automated theorem proving. On the other hand, the retailer business model is formed from ”jobs”, and each ”job” can be modelled and automated more or less easily. At the same time, the whole retailer model as an integrated system is extremely complex. In this paper, we offer a variant of the mathematical definition of a locally simple model. This definition is intended for modelling a wide range of domains. Therefore, we also must take into account the perceptual and psychological issues. Logic is elitist, and if we want to attract to our models as many people as possible, we need to hide this elitism behind some metaphor, to which ’ordinary’ people are accustomed. As such a metaphor, we use the concept of a document, so our locally simple models are called document models. Document models are built in the paradigm of semantic programming. This allows us to achieve another important goal - to make the documentary models executable. Executable models are models that can act as practical information systems in the described domain of discourse. Thus, if our model is executable, then programming becomes redundant. The direct use of a model, instead of its programming coding, brings important advantages, for example, a drastic cost reduction for development and maintenance. Moreover, since the model is well and sound, and not dissolved within programming modules, we can directly apply AI tools, in particular, machine learning. This significantly expands the possibilities for automation and

  2. A REVIEW ON HEAVY METALS CONTENTS IN HIDE, SKIN AND PROCESSED LEATHERS

    Directory of Open Access Journals (Sweden)

    KOIZHAIGANOVA Meruyert

    2016-05-01

    Full Text Available Heavy metals are metals with high atomic weight which can be deposited in soil, water, plants and animals. It is generally known that mammal tissues are good bioindicators of trace elements, including heavy metals. Heavy metal analysis serves to identify and quantify the elements that are a potential hazard to the consumer after varying levels of contact. Usage area of leather is increasingly expanding in these days and it has also become a material requested and demanded by effect of fashion. Leather must protect its appearance and physical stability and also be problem-free in ecological terms and harmless to human health. There is a lack of data concerning the content of toxic elements in raw hide and skin of animals. Mainly information concerning metals content, including toxic ones, in processed leathers may be found in the literature. The aim of the present study was to review and compare the content of some heavy metals in raw hide, skin and the processed leathers in order to evaluate their accumulation and transition to the end-up product.

  3. A New Images Hiding Scheme Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    LIU Nian-sheng; GUO Dong-hui; WU Bo-xi; Parr G

    2005-01-01

    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of covert image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).

  4. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm

    Directory of Open Access Journals (Sweden)

    Ching-Yu Yang

    2012-01-01

    Full Text Available This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.

  5. Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    OpenAIRE

    de Fuentes, Jose Maria; Blasco, Jorge; González-Tablas, Ana Isabel; González-Manzano, Lorena

    2014-01-01

    Vehicular ad hoc networks (VANETs) are a new communication scenario in which vehicles take an active part. Real-time reporting of misbehaving vehicles by surrounding ones is enabled by in-vehicle sensors and VANETs. Thus, sensors allow detecting the misbehavior whereas VANETs allow sending the report to the authority. Nevertheless, these reports should pass unnoticed by the reported driver to avoid his/her potential reprisals. Information hiding techniques could be used to allow vehicles to t...

  6. Universal Steganalysis of Data Hiding in Grayscale Images

    Institute of Scientific and Technical Information of China (English)

    HUANG Ji-feng; LIN Jia-jun

    2007-01-01

    This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy.

  7. Efficacy of Citrilow® and Cecure® spray wash on the prevalence of aerobic and enterobacteriaceae/gram negative enteric bacilli and cattle hide quality

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle to the inner meat as well as hide quality deterioration from bacteria are hygienic problems for meat and hide processing facilities. This study investigated spray wash treatments independently with two antimicrobials used in the ...

  8. Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding

    OpenAIRE

    Wu, Han-Zhou; Wang, Hong-Xia; Shi, Yun-Qing

    2016-01-01

    This paper presents a novel reversible data hiding (RDH) algorithm for gray-scaled images, in which the prediction-error of prediction error (PPE) of a pixel is used to carry the secret data. In the proposed method, the pixels to be embedded are firstly predicted with their neighboring pixels to obtain the corresponding prediction errors (PEs). Then, by exploiting the PEs of the neighboring pixels, the prediction of the PEs of the pixels can be determined. And, a sorting technique based on th...

  9. Effect of hiding places, straw and territory on agression in group-housed rabbit does

    NARCIS (Netherlands)

    Rommers, J.M.; Reuvekamp, B.F.J.; Gunnink, H.; Jong, de I.C.

    2014-01-01

    Group-housing of rabbit does may be preferred from welfare point of view. However, group-housing causes agonistic behaviour which may cause severe injuries. Severe injuries may be prevented by offering hiding places for attacked does. Providing enrichment (straw) may reduce agonistic behaviour by

  10. Prevalence and relatedness of Escherichia coli O157:H7 strains in the feces and on the hides and carcasses of U.S. meat goats at slaughter.

    Science.gov (United States)

    Jacob, M E; Foster, D M; Rogers, A T; Balcomb, C C; Sanderson, M W

    2013-07-01

    We determined the prevalences of Escherichia coli O157:H7 in feces, hide, and carcasses of meat goats at a U.S. processing plant. Prevalences were 11.1%, 2.7%, and 2.7%, respectively. Sixteen pulsed-field gel electrophoresis (PFGE) subtypes were identified among 49 E. coli O157:H7 isolates, some of which were present on multiple sample types or collection days.

  11. Book Review: No Place To Hide

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2007-03-01

    Full Text Available O'Harrow, R., Jr. (2006. No Place To Hide. New York: Free Press. 352 pages, ISBN: 0-7432-8705-3 (paper, US$26Reviewed by Gary C. Kessler (gary.kessler@champlain.eduPersonal privacy and the protection of personal identifying information are of concern to all of us. Innumerable articles and conferences address our loss of privacy, either through the sale of consumer databases or our own inattention. Opinions vary from "You have no privacy; get over it" to "This is the end of civil liberties as we know them." We teach people to safely maneuver on the Internet and minimize their exposure to bogus sites set up to steal their identity, warn users about the dangers of phishing and posting personal information on social network sites, use firewalls to protect our databases, and enact laws such as the Health Insurance Portability and Accountability Act (HIPAA and the Family Educational Rights and Privacy Act (FERPA to protect information.(see PDF for full review

  12. An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining

    OpenAIRE

    Yogendra Kumar Jain,; Vinod Kumar Yadav,; Geetika S. Panday

    2011-01-01

    The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful toolfor discovering relationships which are hidden in large database. Association rules hiding algorithms get strong and efficient performance for protecting confidential and cru...

  13. Synthesis of Citric-Acrylate Oligomer and its in-Situ Reaction with Chrome Tanned Collagen (hide powder)

    International Nuclear Information System (INIS)

    Haroun, A.A.; Masoud, R.A.; Bronco, S.; Ciardelli, F.

    2005-01-01

    The purpose of this study was to formulate the new combined system of acrylic and citric acids, which has been prepared by free radical polymerization and esterification reaction at the same time to form citric acrylate (CAC) oligomer through ester linkage and low molecular weight (Mw 2241), in compared with polyacrylic acid. The chemical structure and the reaction mechanism of this oligomer were confirmed by different spectroscopic tools (1 H , 13 C-NMR, ATR-IR), gel permeation chromatography and thermogravimetric analysis (TGA/DTA). The problem of the effect of the masking agents in the chrome tanning of the collagen and the pickling of the hide has been approached from the study of the hydrothermal and mechanical properties, using this new eco-friendly oligomer, which was carried out in-situ treated/grafted chrome tanned collagen (hide powder), and pickled hide. The microemulsion grafting copolymerization of (CAC) using 2.2-azo-bis isobutyronitrile (ABIN), via direct coupling reaction, onto the chrome tanned collagen showed that the free amino groups of the collagen were considered to be a potential site for the in-situ reaction with (CAC) oligomer. Also, using of citric-acrylate (CAC) oligomer, during chrome tanning of leather, instead of the traditional strong acids (sulfuric, hydrochloric and formic) resulted in significant improvement in chrome exhaustion and physical properties

  14. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Institute of Scientific and Technical Information of China (English)

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao

    2004-01-01

    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  15. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Directory of Open Access Journals (Sweden)

    Sha Edwin Hsing-Mean

    2002-01-01

    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  16. Optical image hiding based on chaotic vibration of deformable moiré grating

    Science.gov (United States)

    Lu, Guangqing; Saunoriene, Loreta; Aleksiene, Sandra; Ragulskis, Minvydas

    2018-03-01

    Image hiding technique based on chaotic vibration of deformable moiré grating is presented in this paper. The embedded secret digital image is leaked in a form of a pattern of time-averaged moiré fringes when the deformable cover grating vibrates according to a chaotic law of motion with a predefined set of parameters. Computational experiments are used to demonstrate the features and the applicability of the proposed scheme.

  17. Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number

    OpenAIRE

    Kohei Arai; Yuji Yamada

    2011-01-01

    An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images...

  18. The Use of Polymerized Genipin for the Stabilization of the Collagen Structure of Animal Hides

    Science.gov (United States)

    Animal hides are the major byproduct of meat industry and the collagen fibers is the main constituent. Crosslinkers play a key role in stabilizing the collagen structure for useful applications. Genipin is widely used as an ideal biological protein crosslinking agent due to its low toxicity compare...

  19. A Data Hiding Technique to Synchronously Embed Physiological Signals in H.264/AVC Encoded Video for Medicine Healthcare.

    Science.gov (United States)

    Peña, Raul; Ávila, Alfonso; Muñoz, David; Lavariega, Juan

    2015-01-01

    The recognition of clinical manifestations in both video images and physiological-signal waveforms is an important aid to improve the safety and effectiveness in medical care. Physicians can rely on video-waveform (VW) observations to recognize difficult-to-spot signs and symptoms. The VW observations can also reduce the number of false positive incidents and expand the recognition coverage to abnormal health conditions. The synchronization between the video images and the physiological-signal waveforms is fundamental for the successful recognition of the clinical manifestations. The use of conventional equipment to synchronously acquire and display the video-waveform information involves complex tasks such as the video capture/compression, the acquisition/compression of each physiological signal, and the video-waveform synchronization based on timestamps. This paper introduces a data hiding technique capable of both enabling embedding channels and synchronously hiding samples of physiological signals into encoded video sequences. Our data hiding technique offers large data capacity and simplifies the complexity of the video-waveform acquisition and reproduction. The experimental results revealed successful embedding and full restoration of signal's samples. Our results also demonstrated a small distortion in the video objective quality, a small increment in bit-rate, and embedded cost savings of -2.6196% for high and medium motion video sequences.

  20. Hide-Scrapers from Arukhlo I Settlement in Georgia (on correspondence of the shape and function of prehistoric implements

    Directory of Open Access Journals (Sweden)

    Esakia Ketevan M.

    2017-09-01

    Full Text Available The article analyses one of the primary categories of the implement complex discovered at Arukhlo I Neolithic settlement (Georgia, Kvemo Kartli Region. The stone implements discovered at the site are characterized by their great variety. Comprehensive functional research conducted by the authors demonstrated that the typological and morphological characteristics of the various categories of stone implements do not always correspond to their functions. Thus, the shapes and functions of the hide-scrapers were fully identical for 18 of 39 implements only, whereas the other tools were used for different purposes and did not feature traces of utilization. A microanalysis of their working parts allowed to determine the types of processed raw material, means of processing, and in certain cases the type of obtained articles as well. The authors made a conclusion on the importance of the comprehensive research of production inventory for the reconstruction of the characteristic features of prehistoric economy.

  1. Hiding Critical Targets in Smart Grid Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bao, Wei [Univ. of Arkansas, Fayetteville, AR (United States); Li, Qinghua

    2017-10-23

    With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromised nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.

  2. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  3. A dehydration process for ovine hide to obtain a new collagenous material

    OpenAIRE

    Ollé Otero, Lluís; Sorolla, Silvia; Casas Solé, Concepció; Bacardit Dalmases, Anna

    2014-01-01

    The aim of the present work is to develop a dehydration process for ovine hide to obtain a new collagenous material for use in the leather industry. What is obtained through this new process is a dry and very porous collagenous substrate which allows the application of tanning chemicals by immersion in aqueous solutions. When compared to existing, traditional processes, economic and environmental advantages are obtained from the use of this new material. More specifically, the new process ...

  4. Hiding Techniques for Dynamic Encryption Text based on Corner Point

    Science.gov (United States)

    Abdullatif, Firas A.; Abdullatif, Alaa A.; al-Saffar, Amna

    2018-05-01

    Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

  5. Unconventional thermal cloak hiding an object outside the cloak

    Science.gov (United States)

    Gao, Y.; Huang, J. P.

    2013-11-01

    All the thermal cloaks reported in the literature can be used to thermally hide an object inside the cloak. However, a common limitation of this kind of thermal cloaks is that the cloaked object cannot feel the external heat flow since it is located inside the cloak; thus we call these cloaks “conventional thermal cloaks”. Here we manage to overcome this limitation by exploiting a class of unconventional thermal cloaks that enable the cloaked object to feel the external heat flow. Our finite-element simulations in two dimensions show the desired cloaking effect. The underlying mechanism originates from the complementary effect of thermal metamaterials with negative thermal conductivities. This work suggests a different method to design thermal devices where heat conduction can be controlled at will.

  6. Documenting Matured Science: The BACC-Type Assessment Reports

    Science.gov (United States)

    Reckermann, M.; Omstedt, A. T.

    2016-12-01

    The BACC-type reports (BALTEX and Baltic Earth Assessment of Climate Change for the Baltic Sea region, BACC 2008 and BACC II 2015) represent an approach to assessing and making available current knowledge on regional climate change and its regional impacts on the physical, biogeochemical and biological environment (ecosystems, socio-economic sphere). The BACC assessments have originated in the BALTEX scientific research community (now Baltic Earth) and are coordinated by the International Baltic Earth Secretariat. The assessments are produced by teams of scientists from the region, led by lead authors who recruit experts from relevant topics to contribute. The report of 2015 was compiled by a different group of authors as 2008 to warrant independence of personal opinions and bias. The process is not externally funded and completely based on published scientific evidence, and not biased by political or economic interest groups. The BACC-type reports aim to bring together consolidated knowledge that has broad consensus in the scientific community, but also acknowledging issues for which contradicting opinions are found in the literature, so that no consensus can be reached ("consensus on dissensus"). An international steering committee is responsible for overlooking the process, and all manuscripts are anonymously peer-reviewed by independent international experts. Outreach to stakeholders and the public is an inherent aspect of this approach to document mature science. For the Baltic Sea, there is a close collaboration with HELCOM, the intergovernmental Baltic Marine Environment Protection Commission and the major regional science-policy interface in the Baltic Sea region. A summary for non-scientists was produced for the first BACC report and is in preparation for the second. Other BACC-type reports published are the climate report for the greater Hamburg area (published in 2011), and the NOSCCA report (North Sea Climate Change Assessment), published in 2016.

  7. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  8. Hide depilation and feather disintegration studies with keratinolytic serine protease from a novel Bacillus subtilis isolate.

    Science.gov (United States)

    Pillai, Priya; Archana, G

    2008-03-01

    Keratinases play an important role in biotechnological applications such as improvement of feather meal, enzymatic dehairing and production of amino acids or peptides from high molecular weight substrates. Bacillus subtilis P13, isolated from Vajreshwari hot spring (45-50 degrees C) near Mumbai, India, produces a neutral serine protease and has an optimum temperature of 65 degrees C. This enzyme preparation was keratinolytic in nature and could disintegrate whole chicken feathers, except for the remnants of shafts. The enzyme preparation also exhibited depilation of goat hides with the recovery of intact animal hair. The enzyme preparation could release peptides from ground feathers and bring about their weight reduction; however, similar action on hair was relatively weak. A single major PMSF-sensitive protease band could be detected upon zymogram analysis, indicating that a single enzyme may be responsible for feather degradation and hide depilation. The importance of these findings in the biotechnological application for feather and leather industries is discussed.

  9. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding.

    Science.gov (United States)

    Wang, Xiaogang; Chen, Wen; Chen, Xudong

    2014-09-22

    We present a novel image hiding method based on phase retrieval algorithm under the framework of nonlinear double random phase encoding in fractional Fourier domain. Two phase-only masks (POMs) are efficiently determined by using the phase retrieval algorithm, in which two cascaded phase-truncated fractional Fourier transforms (FrFTs) are involved. No undesired information disclosure, post-processing of the POMs or digital inverse computation appears in our proposed method. In order to achieve the reduction in key transmission, a modified image hiding method based on the modified phase retrieval algorithm and logistic map is further proposed in this paper, in which the fractional orders and the parameters with respect to the logistic map are regarded as encryption keys. Numerical results have demonstrated the feasibility and effectiveness of the proposed algorithms.

  10. An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm

    Science.gov (United States)

    Zhang, B.; Sang, Jun; Alam, Mohammad S.

    2013-03-01

    An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.

  11. What Hides Behind an Umemployment Rate: Comparing Portuguese and U.S. Unemployment

    OpenAIRE

    Olivier Blanchard; Pedro Portugal

    1998-01-01

    Over the last 15 years, Portugal and the United States have had the same average unemployment rate, about 6.5%. But behind these similar rates hide two very different labor markets. Unemployment duration in Portugal is more than three times that of the United States. Symmetrically, the flow of workers into unemployment in Portugal is, in proportion to the labor force, less than a third of what it is in the United States. Relying on evidence from Portuguese and U.S. micro data sets, we show th...

  12. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    DEFF Research Database (Denmark)

    Christandl, Matthias; Ferrara, Roberto

    2017-01-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005)]. The construction of those states was based...... on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable...

  13. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  14. A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fujisaki, Eiichiro

    2002-01-01

    We present a statistically-hiding commitment scheme allowing commitment to arbitrary size integers, based on any (Abelian) group with certain properties, most importantly, that it is hard for the committer to compute its order. We also give efficient zero-knowledge protocols for proving knowledge...... input is chosen by the (possibly cheating) prover. -  - Our results apply to any group with suitable properties. In particular, they apply to a much larger class of RSA moduli than the safe prime products proposed in [14] - Potential examples include RSA moduli, class groups and, with a slight...

  15. Hiding a Heavy Higgs Boson at the 7 TeV LHC

    Energy Technology Data Exchange (ETDEWEB)

    Bai, Yang; Fan, JiJi; Hewett, JoAnne L.

    2012-03-20

    A heavy Standard Model Higgs boson is not only disfavored by electroweak precision observables but is also excluded by direct searches at the 7 TeV LHC for a wide range of masses. Here, we examine scenarios where a heavy Higgs boson can be made consistent with both the indirect constraints and the direct null searches by adding only one new particle beyond the Standard Model. This new particle should be a weak multiplet in order to have additional contributions to the oblique parameters. If it is a color singlet, we find that a heavy Higgs with an intermediate mass of 200-300 GeV can decay into the new states, suppressing the branching ratios for the standard model modes, and thus hiding a heavy Higgs at the LHC. If the new particle is also charged under QCD, the Higgs production cross section from gluon fusion can be reduced significantly due to the new colored particle one-loop contribution. Current collider constraints on the new particles allow for viable parameter space to exist in order to hide a heavy Higgs boson. We categorize the general signatures of these new particles, identify favored regions of their parameter space and point out that discovering or excluding them at the LHC can provide important indirect information for a heavy Higgs. Finally, for a very heavy Higgs boson, beyond the search limit at the 7 TeV LHC, we discuss three additional scenarios where models would be consistent with electroweak precision tests: including an additional vector-like fermion mixing with the top quark, adding another U(1) gauge boson and modifying triple-gauge boson couplings.

  16. Transitioning Existing Content: inferring organisation-specific documents

    Directory of Open Access Journals (Sweden)

    Arijit Sengupta

    2000-11-01

    Full Text Available A definition for a document type within an organization represents an organizational norm about the way the organizational actors represent products and supporting evidence of organizational processes. Generating a good organization-specific document structure is, therefore, important since it can capture a shared understanding among the organizational actors about how certain business processes should be performed. Current tools that generate document type definitions focus on the underlying technology, emphasizing tags created in a single instance document. The tools, thus, fall short of capturing the shared understanding between organizational actors about how a given document type should be represented. We propose a method for inferring organization-specific document structures using multiple instance documents as inputs. The method consists of heuristics that combine individual document definitions, which may have been compiled using standard algorithms. We propose a number of heuristics utilizing artificial intelligence and natural language processing techniques. As the research progresses, the heuristics will be tested on a suite of test cases representing multiple instance documents for different document types. The complete methodology will be implemented as a research prototype

  17. A semantic medical multimedia retrieval approach using ontology information hiding.

    Science.gov (United States)

    Guo, Kehua; Zhang, Shigeng

    2013-01-01

    Searching useful information from unstructured medical multimedia data has been a difficult problem in information retrieval. This paper reports an effective semantic medical multimedia retrieval approach which can reflect the users' query intent. Firstly, semantic annotations will be given to the multimedia documents in the medical multimedia database. Secondly, the ontology that represented semantic information will be hidden in the head of the multimedia documents. The main innovations of this approach are cross-type retrieval support and semantic information preservation. Experimental results indicate a good precision and efficiency of our approach for medical multimedia retrieval in comparison with some traditional approaches.

  18. 76 FR 66311 - Draft Documents To Support Submission of an Electronic Common Technical Document; Availability

    Science.gov (United States)

    2011-10-26

    ...] Draft Documents To Support Submission of an Electronic Common Technical Document; Availability AGENCY... making regulatory submissions in electronic format using the electronic Common Technical Document (eCTD....S. regional document type definition, version 3.0) and ``Comprehensive Table of Contents Headings...

  19. Antibacterial activities of leave extracts as bactericides for soaking of skin or hide

    Science.gov (United States)

    Suparno, Ono; Panandita, Tania; Afifah, Amalia; Marimin; Purnawati, Rini

    2018-03-01

    Antibacteria, a subtance inhibiting the growth of bacteria, can be obtained from tropical-almond (Terminalia catappa), morinda (Morinda citrifolia), and white leadtree (Leucaena leucocephala) plants, since the plants have phytochemical content functioning as antibacterial agent. Commonly, part of plant that contains higher antibacterial substances is its leaf. The objectives of this study were to determine antibacterial activity of tropical-almond, morinda, and white leadtree leaves extracts, and to analyse the potency of the three extracts as natural bactericide for soaking of skin or hide. The responses measured in this study were phytochemical contents, total flavonoid, tannin content, the inhibition zone, the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Phytochemical contents containing the three leaves extracts were alkaloid, flavonoid, tannin, saponin, phenolic, and glycoside. Total flavonoid and tannin contents of the three extracts were tropical-almond extract of 1.14 % and 1.51 %, respectively; morinda extract of 0.61 % and 0.36 %, respectively; and white leadtree extract of 0.60 % and 4.82 %, respectively. White leadtree leaf extract gave the highest inhibition zone against B. subtilis, S. aureus and E. coli, i.e. 1.50, 1.3, and 1.65 cm, respectively; and the lowest MIC and MBC against B. subtilis, S. aureus and E. coli, i.e. 1500, 3000, and 1500 μg/ml, respectively. Therefore, the white leadtree leave extract had more potential as bactericide for soaking of skin or hide compared to those of the tropical-almond and morinda leaves extracts.

  20. Analysis Of Aspects Of Messages Hiding In Text Environments

    Directory of Open Access Journals (Sweden)

    Afanasyeva Olesya

    2015-09-01

    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  1. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  2. Criteria Document for B-plant's Surveillance and Maintenance Phase Safety Basis Document

    International Nuclear Information System (INIS)

    SCHWEHR, B.A.

    1999-01-01

    This document is required by the Project Hanford Managing Contractor (PHMC) procedure, HNF-PRO-705, Safety Basis Planning, Documentation, Review, and Approval. This document specifies the criteria that shall be in the B Plant surveillance and maintenance phase safety basis in order to obtain approval of the DOE-RL. This CD describes the criteria to be addressed in the S and M Phase safety basis for the deactivated Waste Fractionization Facility (B Plant) on the Hanford Site in Washington state. This criteria document describes: the document type and format that will be used for the S and M Phase safety basis, the requirements documents that will be invoked for the document development, the deactivated condition of the B Plant facility, and the scope of issues to be addressed in the S and M Phase safety basis document

  3. Alien invasions and the game of hide and seek in Patagonia.

    Directory of Open Access Journals (Sweden)

    Martin Lindegren

    Full Text Available The introduction, establishment and spread of alien species is a major threat to biodiversity and the provision of ecosystem services for human wellbeing. In order to reduce further loss of biodiversity and maintain productive and sustainable ecosystems, understanding the ecological mechanisms underlying species invasions and avoiding potentially harmful effects on native communities is urgently needed, but largely lacking. We here demonstrate, by means of hydroacoustics and advanced spatial modelling, how native fish species as a result of previous exposure to native predators may successfully respond to invasive novel predators through a complicated game of hide and seek, minimizing spatio-temporal overlap with predators, and potentially facilitating coexistence between native prey species (Galaxiids and introduced novel predators (Salmonids in a deep Andean lake, Patagonia.

  4. Documenting pharmacist interventions on an intranet.

    Science.gov (United States)

    Simonian, Armen I

    2003-01-15

    The process of developing and implementing an intranet Web site for clinical intervention documentation is described. An inpatient pharmacy department initiated an organizationwide effort to improve documentation of interventions by pharmacists at its seven hospitals to achieve real-time capture of meaningful benchmarking data. Standardization of intervention types would allow the health system to contrast and compare medication use, process improvement, and patient care initiatives among its hospitals. After completing a needs assessment and reviewing current methodologies, a computerized tracking tool was developed in-house and integrated with the organization's intranet. Representatives from all hospitals agreed on content and functionality requirements for the Web site. The site was completed and activated in February 2002. Before this Web site was established, the most documented intervention types were Renal Adjustment and Clarify Dose, with a daily average of four and three, respectively. After site activation, daily averages for Renal Adjustment remained unchanged, but Clarify Dose is now documented nine times per day. Drug Information and i.v.-to-p.o. intervention types, which previously averaged less than one intervention per day, are now documented an average of four times daily. Approximately 91% of staff pharmacists are using this site. Future plans for this site include enhanced accessibility to the site with wireless personal digital assistants. The design and implementation of an intranet Web site to document pharmacists' interventions doubled the rate of intervention documentation and standardized the intervention types among hospitals in the health system.

  5. No place to hide: when shame causes proselfs to cooperate.

    Science.gov (United States)

    Declerck, Carolyn Henriette; Boone, Christophe; Kiyonari, Toko

    2014-01-01

    Shame is considered a social emotion with action tendencies that elicit socially beneficial behavior. Yet, unlike other social emotions, prior experimental studies do not indicate that incidental shame boosts prosocial behavior. Based on the affect as information theory, we hypothesize that incidental feelings of shame can increase cooperation, but only for self-interested individuals, and only in a context where shame is relevant with regards to its action tendency. To test this hypothesis, cooperation levels are compared between a simultaneous prisoner's dilemma (where "defect" may result from multiple motives) and a sequential prisoner's dilemma (where "second player defect" is the result of intentional greediness). As hypothesized, shame positively affected proselfs in a sequential prisoner's dilemma. Hence ashamed proselfs become inclined to cooperate when they believe they have no way to hide their greediness, and not necessarily because they want to make up for earlier wrong-doing.

  6. Characterization of biofilms produced by Escherichia coli O157 isolated from cattle hides

    Science.gov (United States)

    Milojević, L.; Velebit, B.; Baltić, T.; Nikolić, A.; Mitrović, R.; Đorđević, V.

    2017-09-01

    This study aimed to investigate possibility E. coli O157 from cattle hides to produced biofilms. We had 28 suspect primoisolates and 17 were confirmed to be E. coli O157. Biofilm production test showed that more than 50% of this isolates did not produce biofilm. From the other half of the isolates, 5 of them were weakly adherent, 3 were moderately adherent. Since E. coli O157 are one of the main foodborne hazards in meat processing industry and the discovery that some of them can produce moderately adherent biofilms, request necessity of strict implementation of HACCP procedures to prevent further expansion this pathogen.

  7. Principles of reusability of XML-based enterprise documents

    Directory of Open Access Journals (Sweden)

    Roman Malo

    2010-01-01

    Full Text Available XML (Extensible Markup Language represents one of flexible platforms for processing enterprise documents. Its simple syntax and powerful software infrastructure for processing this type of documents is a guarantee for high interoperability of individual documents. XML is today one of technologies influencing all aspects of ICT area.In the paper questions and basic principles of reusing XML-based documents are described in the field of enterprise documents. If we use XML databases or XML data types for storing these types of documents then partial redundancy could be expected due to possible documents’ similarity. This similarity can be found especially in documents’ structure and also in documents’ content and its elimination is necessary part of data optimization.The main idea of the paper is focused to possibilities how to think about dividing complex XML docu­ments into independent fragments that can be used as standalone documents and how to process them.Conclusions could be applied within software tools working with XML-based structured data and documents as document management systems or content management systems.

  8. Suitability of the RGB Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Ante Poljicak

    2010-06-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data  hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  9. Test and evaluation document for DOT Specification 7A Type A Packaging. Revision 3

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-01-30

    The US Department of Energy (DOE) has been conducting, through several of its operating contractors, an evaluation and testing program to qualify Type A radioactive material packagings per US Department of Transportation (DOT) Specification 7A (DOT-7A) of the Code of Federal Regulations (CFR), Title 49, Part 178 (49 CFR 178). The program is currently administered by the DOE, Office of Facility Safety Analysis, DOE/EH-32, at DOE-Headquarters (DOE-HQ) in Germantown, Maryland. This document summarizes the evaluation and testing performed for all of the packagings successfully qualified in this program.

  10. Test and evaluation document for DOT Specification 7A Type A Packaging. Revision 3

    International Nuclear Information System (INIS)

    1996-01-01

    The US Department of Energy (DOE) has been conducting, through several of its operating contractors, an evaluation and testing program to qualify Type A radioactive material packagings per US Department of Transportation (DOT) Specification 7A (DOT-7A) of the Code of Federal Regulations (CFR), Title 49, Part 178 (49 CFR 178). The program is currently administered by the DOE, Office of Facility Safety Analysis, DOE/EH-32, at DOE-Headquarters (DOE-HQ) in Germantown, Maryland. This document summarizes the evaluation and testing performed for all of the packagings successfully qualified in this program

  11. 48 CFR 1415.406 - Documentation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Documentation. 1415.406 Section 1415.406 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Contract Pricing 1415.406 Documentation. ...

  12. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  13. Sandia Software Guidelines, Volume 2. Documentation

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-09-01

    This volume is one in a series of Sandia Software Guidelines intended for use in producing quality software within Sandia National Laboratories. In consonance with the IEEE Standards for software documentation, this volume provides guidance in the selection of an adequate document set for a software project and example formats for many types of software documentation. A tutorial on life cycle documentation is also provided. Extended document thematic outlines and working examples of software documents are available on electronic media as an extension of this volume.

  14. Effect of acanthocephalan parasites on hiding behaviour in two species of shore crabs.

    Science.gov (United States)

    Latham, A D M; Poulin, R

    2002-12-01

    The effect of acanthocephalan parasites (Profilicollis spp.) on the hiding behaviour during low tide of two species of shore crabs (intermediate hosts), Macrophthalmus hirtipes (Brachyura: Ocypodidae) and Hemigrapsus crenulatus (Brachyura: Grapsidae), was examined at Blueskin Bay, South Island, New Zealand. Exposed M. hirtipes were found to have significantly higher infection levels than did hidden conspecifics. This pattern was not observed for H. crenulatus. Mean cystacanth numbers were found to be considerably higher in M. hirtipes than H. crenulatus. Crabs exposed at low tide are at a greater risk of predation by definitive shorebird hosts than are hidden conspecifics. Preferential manipulation of one intermediate host species over another could influence diversity within ecosystems.

  15. Nuclear power plants documentation system

    International Nuclear Information System (INIS)

    Schwartz, E.L.

    1991-01-01

    Since the amount of documents (type and quantity) necessary for the entire design of a NPP is very large, this implies that an overall and detailed identification, filling and retrieval system shall be implemented. This is even more applicable to the FINAL QUALITY DOCUMENTATION of the plant, as stipulated by IAEA Safety Codes and related guides. For such a purpose it was developed a DOCUMENTATION MANUAL, which describes in detail the before mentioned documentation system. Here we present the expected goals and results which we have to reach for Angra 2 and 3 Project. (author)

  16. Document Organization Using Kohonen's Algorithm.

    Science.gov (United States)

    Guerrero Bote, Vicente P.; Moya Anegon, Felix de; Herrero Solana, Victor

    2002-01-01

    Discussion of the classification of documents from bibliographic databases focuses on a method of vectorizing reference documents from LISA (Library and Information Science Abstracts) which permits their topological organization using Kohonen's algorithm. Analyzes possibilities of this type of neural network with respect to the development of…

  17. Contextualizing Data Warehouses with Documents

    DEFF Research Database (Denmark)

    Perez, Juan Manuel; Berlanga, Rafael; Aramburu, Maria Jose

    2008-01-01

    warehouse with a document warehouse, resulting in a contextualized warehouse. Thus, the user first selects an analysis context by supplying some keywords. Then, the analysis is performed on a novel type of OLAP cube, called an R-cube, which is materialized by retrieving and ranking the documents...

  18. Hide out return test and blowndown crud composition under ETA chemistry

    International Nuclear Information System (INIS)

    Chocron, Mauricio; Rodriguez, Ivanna; Saucedo, Ramona; Rodriguez-Aliciardi, Matias; Montes, Juan

    2012-09-01

    Among the techniques recommended for the surveillance of the Steam Generators (SGs) are (i) the follow-up of the corrosion products in the Feed Water and Blown down water and the corresponding accumulation mass balance and (ii) The follow-up of ionic impurities normally present in the main condensate and feed water that can enter the cycle either by condenser leakages or even by the make-up water. This is so, no matter how well the the cycle is constructed or the make-up water plant behaves given the continuous phase change present in it and the subsequent concentration. A synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in the deposits creating a potentially risky environment for the steam generator tubes. Hide out return determination consists in the measurement of the concentration of ions, anions and cations, present in the blown-down water which are eluted during the shutdown along with the reduction of power and temperature. The integrated value provides figures to perform several evaluations like: (i) how well the make-up water plant has performed during the cycle, (ii) presence of condenser in leakages, (iii) amount of deposits present in the steam generator and (iv) it allows to estimate the chemistry in operation inside the steam generator liquid phase inside the sludge pile. Embalse, a CANDU 6 pressurized heavy water reactor located in Cordoba Province, Argentina, is close to reach the end-of-design-life and a project of life extension is currently ongoing. There, also the chemistry in the BOP has been modified from Morpholine to Ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of steam generator internals and new steam generators will be installed. It is of interest then to set up a hide-out return procedure and analysis of blown down crud collected during the shut down as a base line for the second period of operation

  19. Hiding the interior region of core-shell nanoparticles with quantum invisible cloaks

    Science.gov (United States)

    Lee, Jeng Yi; Lee, Ray-Kuang

    2014-04-01

    Based on the scattering cancellation, we provide a method not only making a nanoparticle nearly invisible, but also hiding its interior region from the outside probing matter wave. By applying the interplay among the nodal points of partial waves along with the concept of streamline in fluid dynamics for probability flux, a quantum invisible cloak to the electron transport in a host semiconductor is demonstrated by simultaneously guiding the probability flux outside a hidden region and keeping the total scattering cross section negligible. As the probability flux vanishes in the interior region, one can embed any materials inside a multiple core-shell nanoparticle without affecting physical observables from the outside. Our results reveal the possibility to design a protection shield layer for fragile interior parts from the impact of transport electrons.

  20. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Directory of Open Access Journals (Sweden)

    Vishakha Kelkar

    2017-01-01

    Full Text Available In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient’s information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image.

  1. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Science.gov (United States)

    Tuckley, Kushal

    2017-01-01

    In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient's information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB) obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image. PMID:29104744

  2. An Improved Information Hiding Method Based on Sparse Representation

    Directory of Open Access Journals (Sweden)

    Minghai Yao

    2015-01-01

    Full Text Available A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.

  3. PMK-2 the Hungarian integral type test facility. Documentations, publications and archivations of experiments

    International Nuclear Information System (INIS)

    Perneczky, L.; Guba, A.; Ezsoel, G.; Toth, I.; Szabados, L.

    2002-01-01

    The PMK-2 experimental facility at the KFKI-AEKI, Budapest, is a full pressure, scaled down model of the primary and partly the secondary circuit of the Paks NPP, which is equipped with four VVER-440/213-type reactors. Since the start-up of the facility altogether 48 experiments have been performed for groups of transients as follows: one- and two-phase natural circulation, loss of coolant accidents, special plant transients and experiments in support of accident management procedures. The results have been used for the validation of thermal-hydraulic system codes for VVER applications. Following the experiments a detailed documentation and archiving activity - using an optimised data storage - was required to preserve the essential information and to assure these for a widely utilisation for the international nuclear community. In the publication list related to the facility and the experiments for the moment altogether 280 items - documents, articles in periodicals, papers in proceedings and research reports - in six languages were collected. The paper gives an overview on this activity including the participation in the EU CERTA-TN programme, where AEKI introduced representative databases of two PMK-2 tests in the STRESA Network.(author)

  4. Digitization of medical documents: an X-Windows application for fast scanning.

    Science.gov (United States)

    Muñoz, A; Salvador, C H; Gonzalez, M A; Dueñas, A

    1992-01-01

    This paper deals with digitization, using a commercial scanner, of medical documents as still images for introduction into a computer-based Information System. Document management involves storing, editing and transmission. This task has usually been approached from the perspective of the difficulties posed by radiologic images because of their indisputable qualitative and quantitative significance. However, healthcare activities require the management of many other types of documents and involve the requirements of numerous users. One key to document management will be the availability of a digitizer to deal with the greatest possible number of different types of documents. This paper describes the relevant aspects of documents and the technical specifications that digitizers must fulfill. The concept of document type is introduced as the ideal set of digitizing parameters for a given document. The use of document type parameters can drastically reduce the time the user spends in scanning sessions. Presentation is made of an application based on Unix, X-Windows and OSF/Motif, with a GPIB interface, implemented around the document type concept. Finally, the results of the evaluation of the application are presented, focusing on the user interface, as well as on the viewing of color images in an X-Windows environment and the use of lossy algorithms in the compression of medical images.

  5. Lifecycle management for nuclear engineering project documents

    International Nuclear Information System (INIS)

    Zhang Li; Zhang Ming; Zhang Ling

    2010-01-01

    The nuclear engineering project documents with great quantity and various types of data, in which the relationships of each document are complex, the edition of document update frequently, are managed difficultly. While the safety of project even the nuclear safety is threatened seriously by the false documents and mistakes. In order to ensure the integrality, veracity and validity of project documents, the lifecycle theory of document is applied to build documents center, record center, structure and database of document lifecycle management system. And the lifecycle management is used to the documents of nuclear engineering projects from the production to pigeonhole, to satisfy the quality requirement of nuclear engineering projects. (authors)

  6. Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function

    Directory of Open Access Journals (Sweden)

    Najme Maleki

    2014-07-01

    Full Text Available This paper presents two adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Our adaptive scheme is based on the concept of human vision sensitivity, so the pixels in edge areas than to smooth areas can tolerate much more changes without making visible distortion for human eyes. In our adaptive scheme, the average differencing value of four neighborhood pixels into a block via a threshold secret key determines whether current block is located in edge or smooth area. Pixels in the edge areas are embedded by Q-bit of secret data with a larger value of Q than that of pixels placed in smooth areas. Also in this scholar, we represent one non-adaptive data hiding algorithm. Our non-adaptive scheme, via an error reduction procedure, produces a high visual quality for stego-image. The proposed schemes present several advantages. 1-of aspects the embedding capacity and visual quality of stego-image are scalable. In other words, the embedding rate as well as the image quality can be scaled for practical applications 2-the high embedding capacity with minimal visual distortion can be achieved, 3-our methods require little memory space for secret data embedding and extracting phases, 4-secret keys have used to protect of the embedded secret data. Thus, level of security is high, 5-the problem of overflow or underflow does not occur. Experimental results indicated that the proposed adaptive scheme significantly is superior to the currently existing scheme, in terms of stego-image visual quality, embedding capacity and level of security and also our non-adaptive method is better than other non-adaptive methods, in view of stego-image quality. Results show which our adaptive algorithm can resist against the RS steganalysis attack.

  7. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    Science.gov (United States)

    Christandl, Matthias; Ferrara, Roberto

    2017-12-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005), 10.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.

  8. Document reconstruction by layout analysis of snippets

    Science.gov (United States)

    Kleber, Florian; Diem, Markus; Sablatnig, Robert

    2010-02-01

    Document analysis is done to analyze entire forms (e.g. intelligent form analysis, table detection) or to describe the layout/structure of a document. Also skew detection of scanned documents is performed to support OCR algorithms that are sensitive to skew. In this paper document analysis is applied to snippets of torn documents to calculate features for the reconstruction. Documents can either be destroyed by the intention to make the printed content unavailable (e.g. tax fraud investigation, business crime) or due to time induced degeneration of ancient documents (e.g. bad storage conditions). Current reconstruction methods for manually torn documents deal with the shape, inpainting and texture synthesis techniques. In this paper the possibility of document analysis techniques of snippets to support the matching algorithm by considering additional features are shown. This implies a rotational analysis, a color analysis and a line detection. As a future work it is planned to extend the feature set with the paper type (blank, checked, lined), the type of the writing (handwritten vs. machine printed) and the text layout of a snippet (text size, line spacing). Preliminary results show that these pre-processing steps can be performed reliably on a real dataset consisting of 690 snippets.

  9. SRS ecology: Environmental information document

    Energy Technology Data Exchange (ETDEWEB)

    Wike, L.D.; Shipley, R.W.; Bowers, J.A. [and others

    1993-09-01

    The purpose of this Document is to provide a source of ecological information based on the exiting knowledge gained from research conducted at the Savannah River Site. This document provides a summary and synthesis of ecological research in the three main ecosystem types found at SRS and information on the threatened and endangered species residing there.

  10. SRS ecology: Environmental information document

    International Nuclear Information System (INIS)

    Wike, L.D.; Shipley, R.W.; Bowers, J.A.

    1993-09-01

    The purpose of this Document is to provide a source of ecological information based on the exiting knowledge gained from research conducted at the Savannah River Site. This document provides a summary and synthesis of ecological research in the three main ecosystem types found at SRS and information on the threatened and endangered species residing there

  11. Best Entry Points for Structured Document Retrieval - Part II: Types, Usage and Effectiveness

    DEFF Research Database (Denmark)

    Reid, Jane; Lalmas, Mounia; Finesilver, Karen

    2006-01-01

    Structured document retrieval makes use of document components as the basis of the retrieval process, rather than complete documents. The inherent relationships between these components make it vital to support users' natural browsing behaviour in order to offer effective and efficient access...

  12. Growing electronic documents created by researchers

    Directory of Open Access Journals (Sweden)

    Monika Weiss

    2017-05-01

    Full Text Available In the contemporary world technology is an indispensable element, both in personal and professional sphere. Despite the fact, that we do not attach significance to it in our everyday lives, the technological development engulfed us and still reminds us about that. In the face of dynamically growing digitization there occurred a new form of document – an electronic document. The study concerns the growing electronic documentation among researchers working at the Nicolaus Copernicus University in Toruń. The analysis of surveys and interviews resulted in thesis, that researchers use e-document more frequently than analog documentation. Flexibility and accessibility of this type of documents become a problem in personal papers which will be archived in the future – maybe in most part in the form of electronic documentation.

  13. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    OpenAIRE

    El-Monem, Farouk Abd; Hussain, Ahmed I.; Nashy, EL-Shahat H.A.; El-Wahhab, Hamada Abd; Naser, Abd El-Rahman M.

    2014-01-01

    Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA) and butyl acrylate (BA). The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leat...

  14. Document image retrieval through word shape coding.

    Science.gov (United States)

    Lu, Shijian; Li, Linlin; Tan, Chew Lim

    2008-11-01

    This paper presents a document retrieval technique that is capable of searching document images without OCR (optical character recognition). The proposed technique retrieves document images by a new word shape coding scheme, which captures the document content through annotating each word image by a word shape code. In particular, we annotate word images by using a set of topological shape features including character ascenders/descenders, character holes, and character water reservoirs. With the annotated word shape codes, document images can be retrieved by either query keywords or a query document image. Experimental results show that the proposed document image retrieval technique is fast, efficient, and tolerant to various types of document degradation.

  15. 78 FR 10181 - Documents To Support Submission of an Electronic Common Technical Document; Availability

    Science.gov (United States)

    2013-02-13

    .... regional document type definition, version 3.1), and ``Comprehensive Table of Contents Headings and... characterization of promotional marketing and advertising material, and facilitate automated processing of...

  16. Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload

    Directory of Open Access Journals (Sweden)

    Zhaoxia Yin

    2014-01-01

    Full Text Available This paper proposes a separable reversible data-hiding scheme in encrypted image which offers high payload and error-free data extraction. The cover image is partitioned into nonoverlapping blocks and multigranularity encryption is applied to obtain the encrypted image. The data hider preprocesses the encrypted image and randomly selects two basic pixels in each block to estimate the block smoothness and indicate peak points. Additional data are embedded into blocks in the sorted order of block smoothness by using local histogram shifting under the guidance of the peak points. At the receiver side, image decryption and data extraction are separable and can be free to choose. Compared to previous approaches, the proposed method is simpler in calculation while offering better performance: larger payload, better embedding quality, and error-free data extraction, as well as image recovery.

  17. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2015-01-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. (paper)

  18. 45 CFR 641.16 - Preparation of environmental documents, generally.

    Science.gov (United States)

    2010-10-01

    ... affect climate and weather patterns; (3) May adversely affect air or water quality; (4) May affect... knowledge and expertise. (e) Type of environmental document. The type of environmental document required... bases for much of the year, and the need to obtain items or materials requiring long lead times), it may...

  19. Development of digital library system on regulatory documents for nuclear power plants

    International Nuclear Information System (INIS)

    Lee, K. H.; Kim, K. J.; Yoon, Y. H.; Kim, M. W.; Lee, J. I.

    2001-01-01

    The main objective of this study is to establish nuclear regulatory document retrieval system based on internet. With the advancement of internet and information processing technology, information management patterns are going through a new paradigm. Getting along the current of the time, it is general tendency to transfer paper-type documents into electronic-type documents through document scanning and indexing. This system consists of nuclear regulatory documents, nuclear safety documents, digital library, and information system with index and full text

  20. Project W-320, 241-C-106 sluicing supporting documentation bibliography

    International Nuclear Information System (INIS)

    Bailey, J.W.

    1998-01-01

    This supporting document has been prepared to make the listing of documentation used to develop, or in support of Project W-320, readily retrievable. All documents are sorted by document number and list the document type. Tank 241-C-106 has been included on the High Heat Load Watch List

  1. Quality control of the documentation process in electronic economic activities

    Directory of Open Access Journals (Sweden)

    Krutova A.S.

    2017-06-01

    Full Text Available It is proved that the main tool that will provide adequate information resources e economic activities of social and economic relations are documenting quality control processes as the basis of global information space. Directions problems as formation evaluation information resources in the process of documentation, namely development tools assess the efficiency of the system components – qualitative assessment; development of mathematical modeling tools – quantitative evaluation. A qualitative assessment of electronic documentation of economic activity through exercise performance, efficiency of communication; document management efficiency; effectiveness of flow control operations; relationship management effectiveness. The concept of quality control process documents electronically economic activity to components which include: the level of workflow; forms adequacy of information; consumer quality documents; quality attributes; type of income data; condition monitoring systems; organizational level process documentation; attributes of quality, performance quality consumer; type of management system; type of income data; condition monitoring systems. Grounded components of the control system electronic document subjects of economic activity. Detected components IT-audit management system economic activity: compliance audit; audit of internal control; detailed multilevel analysis; corporate risk assessment methodology. The stages and methods of processing electronic transactions economic activity during condition monitoring of electronic economic activity.

  2. An Algorithm for Data Hiding in Radiographic Images and ePHI/R Application

    Directory of Open Access Journals (Sweden)

    Aqsa Rashid

    2018-01-01

    Full Text Available Telemedicine is the use of Information and Communication Technology (ICT for clinical health care from a distance. The exchange of radiographic images and electronic patient health information/records (ePHI/R for diagnostic purposes has the risk of confidentiality, ownership identity, and authenticity. In this paper, a data hiding technique for ePHI/R is proposed. The color information in the cover image is used for key generation, and stego-images are produced with ideal case. As a result, the whole stego-system is perfectly secure. This method includes the features of watermarking and steganography techniques. The method is applied to radiographic images. For the radiographic images, this method resembles watermarking, which is an ePHI/R data system. Experiments show promising results for the application of this method to radiographic images in ePHI/R for both transmission and storage purpose.

  3. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

    Directory of Open Access Journals (Sweden)

    Tzu-Chuen Lu

    2017-10-01

    Full Text Available The concept of a dual-image based scheme in information sharing consists of concealing secret messages in two cover images; only someone who has both stego-images can extract the secret messages. In 2015, Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit to reduce the distortion of the stego-image. Then, in 2016, Lu et al. used a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. Because the folding strategy can obviously reduce the value, the proposed scheme includes the folding operation twice to further decrease the reduced digit. We use a frequency-based encoding strategy to encode a secret message and then use the block folding technique by performing the center-folding operation twice to embed secret messages. An indicator is needed to identify the sequence number of the folding operation. The proposed scheme collects several indicators to produce a combined code and hides the code in a pixel to reduce the size of the indicators. The experimental results show that the proposed method can achieve higher image quality under the same embedding rate or higher payload, which is better than other methods.

  4. Documentation of spectrom-32

    International Nuclear Information System (INIS)

    Callahan, G.D.; Fossum, A.F.; Svalstad, D.K.

    1989-01-01

    SPECTROM-32 is a finite element program for analyzing two-dimensional and axisymmetric inelastic thermomechanical problems related to the geological disposal of nuclear waste. The code is part of the SPECTROM series of special-purpose computer programs that are being developed by RE/SPEC Inc. to address many unique rock mechanics problems encountered in analyzing radioactive wastes stored in geologic formations. This document presents the theoretical basis for the mathematical models, the finite element formulation and solution procedure of the program, a description of the input data for the program, verification problems, and details about program support and continuing documentation. The computer code documentation is intended to satisfy the requirements and guidelines outlined in the document entitled Final Technical Position on Documentation of Computer Codes for High-Level Waste Management. The principal component models used in the program involve thermoelastic, thermoviscoelastic, thermoelastic-plastic, and thermoviscoplastic types of material behavior. Special material considerations provide for the incorporation of limited-tension material behavior and consideration of jointed material behavior. Numerous program options provide the capabilities for various boundary conditions, sliding interfaces, excavation, backfill, arbitrary initial stresses, multiple material domains, load incrementation, plotting database storage and access of results, and other features unique to the geologic disposal of radioactive wastes. Numerous verification problems that exercise many of the program options and illustrate the required data input and printed results are included in the documentation

  5. Using color management in color document processing

    Science.gov (United States)

    Nehab, Smadar

    1995-04-01

    Color Management Systems have been used for several years in Desktop Publishing (DTP) environments. While this development hasn't matured yet, we are already experiencing the next generation of the color imaging revolution-Device Independent Color for the small office/home office (SOHO) environment. Though there are still open technical issues with device independent color matching, they are not the focal point of this paper. This paper discusses two new and crucial aspects in using color management in color document processing: the management of color objects and their associated color rendering methods; a proposal for a precedence order and handshaking protocol among the various software components involved in color document processing. As color peripherals become affordable to the SOHO market, color management also becomes a prerequisite for common document authoring applications such as word processors. The first color management solutions were oriented towards DTP environments whose requirements were largely different. For example, DTP documents are image-centric, as opposed to SOHO documents that are text and charts centric. To achieve optimal reproduction on low-cost SOHO peripherals, it is critical that different color rendering methods are used for the different document object types. The first challenge in using color management of color document processing is the association of rendering methods with object types. As a result of an evolutionary process, color matching solutions are now available as application software, as driver embedded software and as operating system extensions. Consequently, document processing faces a new challenge, the correct selection of the color matching solution while avoiding duplicate color corrections.

  6. On the typography of flight-deck documentation

    Science.gov (United States)

    Degani, Asaf

    1992-01-01

    Many types of paper documentation are employed on the flight-deck. They range from a simple checklist card to a bulky Aircraft Flight Manual (AFM). Some of these documentations have typographical and graphical deficiencies; yet, many cockpit tasks such as conducting checklists, way-point entry, limitations and performance calculations, and many more, require the use of these documents. Moreover, during emergency and abnormal situations, the flight crews' effectiveness in combating the situation is highly dependent on such documentation; accessing and reading procedures has a significant impact on flight safety. Although flight-deck documentation are an important (and sometimes critical) form of display in the modern cockpit, there is a dearth of information on how to effectively design these displays. The object of this report is to provide a summary of the available literature regarding the design and typographical aspects of printed matter. The report attempts 'to bridge' the gap between basic research about typography, and the kind of information needed by designers of flight-deck documentation. The report focuses on typographical factors such as type-faces, character height, use of lower- and upper-case characters, line length, and spacing. Some graphical aspects such as layout, color coding, fonts, and character contrast are also discussed. In addition, several aspects of cockpit reading conditions such as glare, angular alignment, and paper quality are addressed. Finally, a list of recommendations for the graphical design of flight-deck documentation is provided.

  7. 77 FR 46763 - Documents to Support Submission of an Electronic Common Technical Document; Availability

    Science.gov (United States)

    2012-08-06

    ... document type definition (DTD), version 3.0) and ``Comprehensive Table of Contents Headings and Hierarchy... promotional marketing and advertising material, and to facilitate automated processing of submissions. In... backbone files specification. ``Comprehensive Table of Contents Headings and Hierarchy, version 2.0...

  8. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  9. A novel attack method about double-random-phase-encoding-based image hiding method

    Science.gov (United States)

    Xu, Hongsheng; Xiao, Zhijun; Zhu, Xianchen

    2018-03-01

    By using optical image processing techniques, a novel text encryption and hiding method applied by double-random phase-encoding technique is proposed in the paper. The first step is that the secret message is transformed into a 2-dimension array. The higher bits of the elements in the array are used to fill with the bit stream of the secret text, while the lower bits are stored specific values. Then, the transformed array is encoded by double random phase encoding technique. Last, the encoded array is embedded on a public host image to obtain the image embedded with hidden text. The performance of the proposed technique is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient.

  10. Segmentation of complex document

    Directory of Open Access Journals (Sweden)

    Souad Oudjemia

    2014-06-01

    Full Text Available In this paper we present a method for segmentation of documents image with complex structure. This technique based on GLCM (Grey Level Co-occurrence Matrix used to segment this type of document in three regions namely, 'graphics', 'background' and 'text'. Very briefly, this method is to divide the document image, in block size chosen after a series of tests and then applying the co-occurrence matrix to each block in order to extract five textural parameters which are energy, entropy, the sum entropy, difference entropy and standard deviation. These parameters are then used to classify the image into three regions using the k-means algorithm; the last step of segmentation is obtained by grouping connected pixels. Two performance measurements are performed for both graphics and text zones; we have obtained a classification rate of 98.3% and a Misclassification rate of 1.79%.

  11. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    Directory of Open Access Journals (Sweden)

    A.A. Mohamed

    2014-07-01

    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.

  12. Documentation of Cultural Heritage Objects

    Directory of Open Access Journals (Sweden)

    Jon Grobovšek

    2013-09-01

    the needs of potential users. Inadequate archiving may cause irreversible damage to documents. It is unreasonable to store data in a format which could not be read by future generations. In spite of high capacity of data bases the aspect of long term archiving of analogue documents should not be neglected. The past is being stored for the future, including different methods of storing various types of historical archives.

  13. 48 CFR 15.406-3 - Documenting the negotiation.

    Science.gov (United States)

    2010-10-01

    ... negotiation. 15.406-3 Section 15.406-3 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Contract Pricing 15.406-3 Documenting the negotiation. (a) The contracting officer shall document in the contract file the principal elements of the...

  14. Document Delivery: Evaluating the Options.

    Science.gov (United States)

    Ward, Suzanne M.

    1997-01-01

    Discusses options available to libraries for document delivery. Topics include users' needs; cost; copyright compliance; traditional interlibrary loan; types of suppliers; selection criteria, including customer service; new developments in interlibrary loan, including outsourcing arrangements; and the need to evaluate suppliers. (LRW)

  15. Management Documentation: Indicators & Good Practice at Cultural Heritage Places

    Science.gov (United States)

    Eppich, R.; Garcia Grinda, J. L.

    2015-08-01

    Documentation for cultural heritage places usually refers to describing the physical attributes, surrounding context, condition or environment; most of the time with images, graphics, maps or digital 3D models in their various forms with supporting textural information. Just as important as this type of information is the documentation of managerial attributes. How do managers of cultural heritage places collect information related to financial or economic well-being? How are data collected over time measured, and what are significant indicators for improvement? What quality of indicator is good enough? Good management of cultural heritage places is essential for conservation longevity, preservation of values and enjoyment by the public. But how is management documented? The paper will describe the research methodology, selection and description of attributes or indicators related to good management practice. It will describe the criteria for indicator selection and why they are important, how and when they are collected, by whom, and the difficulties in obtaining this information. As importantly it will describe how this type of documentation directly contributes to improving conservation practice. Good practice summaries will be presented that highlight this type of documentation including Pamplona and Ávila, Spain and Valletta, Malta. Conclusions are drawn with preliminary recommendations for improvement of this important aspect of documentation. Documentation of this nature is not typical and presents a unique challenge to collect, measure and communicate easily. However, it is an essential category that is often ignored yet absolutely essential in order to conserve cultural heritage places.

  16. Designing Documents for People to Use

    Directory of Open Access Journals (Sweden)

    David Sless

    Full Text Available This article reports on the work of Communication Research Institute (CRI, an international research center specializing in communication and information design. With the support of government, regulators, industry bodies, and business—and with the participation of people and their advocates—CRI has worked on over 200 public document design projects since it began as a small unit in 1985. CRI investigates practical methods and achievable standards for designing digital and paper public documents, including forms; workplace procedural notices; bills, letters, and emails sent by organizations; labels and instructions that accompany products and services; and legal and financial documents and contracts. CRI has written model grammars for the document types it designs, and the cumulative data from CRI projects has led to a set of systematic methods for designing public-use documents to a high standard. Through research, design, publishing, and advocacy, CRI works to measurably improve the ordinary documents we all have to use. Keywords: Information design, Design methods, Design standards, Communication design, Design diagnostic testing, Design research

  17. Hiding effort to gain a competitive advantage: Evidence from China.

    Science.gov (United States)

    Zhao, Li; Heyman, Gail D

    2018-06-01

    Previous studies with Western populations have shown that adolescents' tendency to downplay their academic effort is affected by two kinds of motives: ability-related motives (e.g., to appear competent) and social approval motives (e.g., to be popular). In this research, we test for the presence of additional competition-related motives in China, a culture placing strong emphasis on academic competition. Study 1 (N = 150) showed that, in response to a scenario in which a hard-working high-school junior hid effort from classmates, the most highly endorsed explanation was "to influence others to work less hard to maintain a competitive advantage." Study 2 (N = 174) revealed that competition-related explanations were endorsed relatively more often when the speaker and audience had similar academic rankings. This tendency was most evident when both speaker and audience were top performers, and when this was the case, participants' desire to demonstrate superiority over others was a positive predictor of endorsement of competition-related motives. Study 3 (N = 137) verified that competition-related motives were more strongly endorsed among Chinese participants than U.S. These results suggest that at least in cultures that emphasize academic competition and in contexts where competition is salient, hiding effort is often about attempting to gain strategic advantage. © 2016 International Union of Psychological Science.

  18. Varsity letters documenting modern colleges and universities

    CERN Document Server

    Samuels, Helen Willa

    1998-01-01

    A study of the functions of colleges and universities, Varsity Letters is intended to aid those responsible for the documentation of these institutions. Samuels offers specific advice about the records of modern colleges and universities and proposes a method to ensure their adequate documentation. She also offers a method to analyze and plan the preservation of records for any type of institution.

  19. 48 CFR 215.406-3 - Documenting the negotiation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Documenting the negotiation. 215.406-3 Section 215.406-3 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Contract Pricing 215.406-3 Documenting the...

  20. STANDARDIZATION OF MEDICAL DOCUMENT FLOW: PRINCIPLES AND FEATURES

    Directory of Open Access Journals (Sweden)

    Melentev Vladimir Anatolevich

    2013-04-01

    Full Text Available In presented article the questions connected with the general concepts and bases of functioning of document flow in borders of any economic object (the enterprise, establishment, the organization are considered. Gostirovanny definition of document flow, classification of types of documentary streams is given. The basic principles of creation of document flow, following which are considered allows to create optimum structure документопотока and nature of movement of documents; interrelation of external and internal influences. Further basic elements of medical document flow are considered; the main problems of medical document flow being, besides, major factors, distinguishing medical document flow from document flow of manufacturing enterprises or other economic objects are specified. From consideration of these problems the conclusion about an initial stage of their decision - standardization of the medical document flow, being, besides, is drawn by the first stage of creation of a common information space of medical branch.

  1. Development of methods for the neutron activation analysis to the determination of essential and toxic trace elements of biological and environmental samples: application of enzyme activity of raw hides

    International Nuclear Information System (INIS)

    Sipos, T.; Nagy, L.G.; Toeroek, G.; Kollar, J.

    1974-01-01

    Investigations on the post mortem enzymatic processes pointed out the fact, that significant deviations can be observed in the extent and in the results of the autolytic transformations occurring during the storage of raw hide. A neutron activation analysis procedure, based on a semiautomated radiochemical separation procedure and scintillation gamma spectrometry, was selected for the determination of some trace elements. Six trace elements, Cu, Mn, Zn, Au, As, and Cr, and one minor component,Br, were detected and/or determined in the concentration region of 0,1-10 3 ppM. According to preliminary investigations evaluated at the time being, concentration differences of some orders of magnitude were obtained for some trace elements: copper, zinc and manganese, whereas the concentration of bromine remained practically constant. These findings seem to correlate with large differences in appearance due to different enzyme activities in the raw hides

  2. 76 FR 24507 - HUD Multifamily Rental Project Closing Documents: Notice Announcing Final Approved Documents and...

    Science.gov (United States)

    2011-05-02

    ... transactions, although these are familiar roles in commercial lending transactions. Accordingly, HUD has... advantage of this language is that it identifies the specific, longstanding, and familiar types of... the documents, HUD is limiting its role and giving lenders more ability to address any problems that...

  3. Document clustering methods, document cluster label disambiguation methods, document clustering apparatuses, and articles of manufacture

    Science.gov (United States)

    Sanfilippo, Antonio [Richland, WA; Calapristi, Augustin J [West Richland, WA; Crow, Vernon L [Richland, WA; Hetzler, Elizabeth G [Kennewick, WA; Turner, Alan E [Kennewick, WA

    2009-12-22

    Document clustering methods, document cluster label disambiguation methods, document clustering apparatuses, and articles of manufacture are described. In one aspect, a document clustering method includes providing a document set comprising a plurality of documents, providing a cluster comprising a subset of the documents of the document set, using a plurality of terms of the documents, providing a cluster label indicative of subject matter content of the documents of the cluster, wherein the cluster label comprises a plurality of word senses, and selecting one of the word senses of the cluster label.

  4. Extremely secure identification documents

    International Nuclear Information System (INIS)

    Tolk, K.M.; Bell, M.

    1997-09-01

    The technology developed in this project uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals or alter existing documents to allow their use by unauthorized individuals. This process can be used to produce many types of identification documents with much higher security than any currently in use. The system is demonstrated using a security badge as an example. This project focused on the technologies requiring development in order to make the approach viable with existing badge printing and laminating technologies. By far the most difficult was the image processing required to verify that the picture on the badge had not been altered. Another area that required considerable work was the high density printed data storage required to get sufficient data on the badge for verification of the picture. The image processing process was successfully tested, and recommendations are included to refine the badge system to ensure high reliability. A two dimensional data array suitable for printing the required data on the badge was proposed, but testing of the readability of the array had to be abandoned due to reallocation of the budgeted funds by the LDRD office

  5. Costly hide and seek pays: unexpected consequences of deceit in a social dilemma

    International Nuclear Information System (INIS)

    Szolnoki, Attila; Perc, Matjaž

    2014-01-01

    Deliberate deceptiveness intended to gain an advantage is commonplace in human and animal societies. In a social dilemma, an individual may only pretend to be a cooperator to elicit cooperation from others, while in reality he is a defector. With this as motivation, we study a simple variant of the evolutionary prisoner's dilemma game entailing deceitful defectors and conditional cooperators that lifts the veil on the impact of such two-faced behavior. Defectors are able to hide their true intentions at a personal cost, while conditional cooperators are probabilistically successful at identifying defectors and act accordingly. By focusing on the evolutionary outcomes in structured populations, we observe a number of unexpected and counterintuitive phenomena. We show that deceitful behavior may fare better if it is costly, and that a higher success rate of identifying defectors does not necessarily favor cooperative behavior. These results are rooted in the spontaneous emergence of cycling dominance and spatial patterns that give rise to fascinating phase transitions, which in turn reveal the hidden complexity behind the evolution of deception. (paper)

  6. A New Wavelet-Based Document Image Segmentation Scheme

    Institute of Scientific and Technical Information of China (English)

    赵健; 李道京; 俞卞章; 耿军平

    2002-01-01

    The document image segmentation is very useful for printing, faxing and data processing. An algorithm is developed for segmenting and classifying document image. Feature used for classification is based on the histogram distribution pattern of different image classes. The important attribute of the algorithm is using wavelet correlation image to enhance raw image's pattern, so the classification accuracy is improved. In this paper document image is divided into four types: background, photo, text and graph. Firstly, the document image background has been distingusished easily by former normally method; secondly, three image types will be distinguished by their typical histograms, in order to make histograms feature clearer, each resolution' s HH wavelet subimage is used to add to the raw image at their resolution. At last, the photo, text and praph have been devided according to how the feature fit to the Laplacian distrbution by -X2 and L. Simulations show that classification accuracy is significantly improved. The comparison with related shows that our algorithm provides both lower classification error rates and better visual results.

  7. Analysis of the bacterial diversity existing on animal hide and wool: development of a preliminary PCR-restriction fragment length polymorphism fingerprint database for identifying isolates.

    Science.gov (United States)

    Chen, Yu; Gao, Hongwei; Zhang, Yanming; Deng, Mingjun; Wu, Zhenxing; Zhu, Laihua; Duan, Qing; Xu, Biao; Liang, Chengzhu; Yue, Zhiqin; Xiao, Xizhi

    2012-01-01

    Twenty-one bacterial strains were isolated from imported cattle hide and rabbit wool using two types of media, nutrient broth, and nutrient broth with serum. The bacteria identified were Brevibacillus laterosporus, Leclercia adecarboxylata, Peptococcus niger, Bacillus circulans, Raoultella ornithinolytica, Bacillus subtilis, Bacillus cereus, Bacillus thermobacillus, Bacillus choshinensis, Bacillus sphaericus, Acinetobacter haemolyticus, Sphingomonas paucimobilis, Bacillus thuringiensis, Staphylococcus intermedius, Mycobacteria, Moraxella, Klebsiella pneumoniae, Ralstonia pickettii, Staphylococcus chromogenes, Comamonas testosteroni, and Cupriavidus pauculus. The 16s rDNA gene of each bacterium was amplified using the universal primers 27f and 1492r. The amplicons were digested with AvaI, BamHI, BgII, DraI, EcoRI, EcoRV, HindIII, HinfI, HpaI, PstI, SmaI, TaqII, XbaI, XmaI, AluI, XhoI, and PvuI individually. A specific fingerprint from the PCR-restriction fragment length polymorphism method based on 16s rDNA was obtained for each bacterium. The results showed that the method developed was useful not only for bacterial identification but also for the etiological investigation of pathogens in imported animal hair and wool.

  8. Facing the Grim Realities in CBI: Copyright and Documentation.

    Science.gov (United States)

    Kearsley, Greg P.

    This paper focuses on two major issues in the third stage of the implementation and dissemination process for computer based instruction (CBI)--copyright and documentation. The purpose, special problems, and different approaches or methods of copywriting and documenting CBI materials are discussed. Tables outline the types of information required…

  9. Content accessibility of Web documents: Overview of concepts and needed standards

    DEFF Research Database (Denmark)

    Alapetite, A.

    2006-01-01

    The concept of Web accessibility refers to a combined set of measures, namely, how easily and how efficiently different types of users may make use of a given service. While some recommendations for accessibility are focusing on people with variousspecific disabilities, this document seeks...... to broaden the scope to any type of user and any type of use case. The document provides an introduction to some required concepts and technical standards for designing accessible Web sites. A brief review of thelegal requirements in a few countries for Web accessibility complements the recommendations...

  10. Multi-font printed Mongolian document recognition system

    Science.gov (United States)

    Peng, Liangrui; Liu, Changsong; Ding, Xiaoqing; Wang, Hua; Jin, Jianming

    2009-01-01

    Mongolian is one of the major ethnic languages in China. Large amount of Mongolian printed documents need to be digitized in digital library and various applications. Traditional Mongolian script has unique writing style and multi-font-type variations, which bring challenges to Mongolian OCR research. As traditional Mongolian script has some characteristics, for example, one character may be part of another character, we define the character set for recognition according to the segmented components, and the components are combined into characters by rule-based post-processing module. For character recognition, a method based on visual directional feature and multi-level classifiers is presented. For character segmentation, a scheme is used to find the segmentation point by analyzing the properties of projection and connected components. As Mongolian has different font-types which are categorized into two major groups, the parameter of segmentation is adjusted for each group. A font-type classification method for the two font-type group is introduced. For recognition of Mongolian text mixed with Chinese and English, language identification and relevant character recognition kernels are integrated. Experiments show that the presented methods are effective. The text recognition rate is 96.9% on the test samples from practical documents with multi-font-types and mixed scripts.

  11. Patent documentation - comparison of two MT strategies

    DEFF Research Database (Denmark)

    Offersgaard, Lene; Povlsen, Claus

    2007-01-01

    This paper focuses on two matters: A comparison of how two different MT strategies manage translating the text type of patent documentation and a survey of what is needed to transform a MT research prototype system to a translation application for patent texts. The two MT strategies is represented....... The distinctive text type of patents pose special demands for machine translation and these aspects are discussed based on linguistic observations with focus on the users point of view. Two main demands are automatic pre processing of the documents and implementation of a module which in a flexible and user......-friendly manner offers the opportunity to extend the lexical coverage of the system. These demands and the comparison of the two MT strategies are discussed on the basis of proofread patents....

  12. PSA applications. Good practices and documentation

    International Nuclear Information System (INIS)

    Dewailly, J.; Magne, L.

    1997-10-01

    In this paper, it is shown what the condensed documentation of the main strategic choices and technical assumptions related to a PSA could contain: how to select the internal and external initiating events, how the detail the plant configuration and the general organization of the plant and operating staff, how to highlight the assumptions related to physical models, etc. The proposals in this documentation are based on the R and D D's experience with PSA (construction of PSA models, use of PSA models for operation or maintenance, PSA tools). This document also presents different types of rules or recommendations related to PSA modelling for various applications involved in nuclear power plant operating. Finally, the paper stresses the main difficulties encountered (appropriate use of uncertainties, communication of PSA results to non-specialist users) and it also outlines some prospects for the future. (author)

  13. F-Area Seepage Basins: Environmental information document

    International Nuclear Information System (INIS)

    Corbo, P.; Killian, T.H.; Kolb, N.L.; Marine, I.W.

    1986-12-01

    This document provides environmental information on postulated closure options for the F-Area Seepage Basins at the Savannah River Plant and was developed as background technical documentation for the Department of Energy's proposed Environmental Impact Statement (EIS) on waste management activities for groundwater protection at the plant. The results of groundwater and atmospheric pathway analyses, accident analysis, and other environmental assessments discussed in this document are based upon a conservative analysis of all foreseeable scenarios as defined by the National Environmental Policy Act (40 CFR 1502.22). The scenarios do not necessarily represent actual environmental conditions. This document is not meant to represent or be used as a regulatory closure plan or other regulatory sufficient document. Technical assistance in the environmental analyses of waste site closures was provided by Clemson University; GeoTrans, Inc.; JBF Associates, Inc.; S.S. Papadopulos and Associates Inc.; Radiological Assessments Corporation; Rogers and Associates Engineering Corporation; Science Applications International Corporation; C.B. Shedrow Environmental Consultants, Inc.; Exploration Software; and Verbatim Typing and Editing

  14. Birth Control Explorer

    Science.gov (United States)

    Menu Sex Ed Ask Us Anything Videos Games & Quizzes Connect Search About Find a Health Center X Sort by Advanced Search Show/Hide Content Types Article Game Poll Q&A Series Quiz Video Leave un-checked to search all types Search Sex Ed by Topic show topics hide topics Birth ...

  15. US Department of Transportation (DOT) Spec 7A Type A evaluation document: Spec 17C 55-gal steel drum with RWMC/SWEPP drum venting system carbon filter assembly

    International Nuclear Information System (INIS)

    Edling, D.A.

    1986-01-01

    As part of MRC-Mound's responsibility to coordinate DOE Spec 7A Type A Packaging testing, evaluation, and utilization, this document evaluates per 49CFR 173.415(a) the SWEPP packaging system: DOT Spec 17C steel drums - 30, 55 and 83-gal; High Density Polyethylene (HDPE) liners; and SWEPP DVS Filter Assemblies (two configurations) as a US DOT Spec 7A Type A packaging. A variety of Type A performance testing was done on: DOT Spec 17C 55-gal steel drums; DOT Spec 17C 55-gal steel drums with HDPE liners; and DOT Spec 17C 55-gal steel drums with ''Nucfil'' filters as part of MRC-Mound's Type A Packaging Evaluation Program funded by DOE/HQ, DP-4, Security Evaluations. The subject SWEPP packaging incorporates modifications to the ''Nucfil'' filter and installation assembly previously tested in conjunction with the Spec 17C 55-gal drums. Thus, additional testing was required on the new filter installation in order to evaluate the entire packaging system. This document presents the test data to demonstrate the SWEPP packaging system's performance against the DOT 7A Type A requirements

  16. A Model of Electronic Document Management System for Limited Partnership

    OpenAIRE

    Faiqunisa, Faiqunisa; Nugroho, Eko; Santosa, Paulus Insap

    2013-01-01

    Both types of documents, electronic and non-electronic are a major component supporting activities. In addition to the documents, communications capabilities to employees and managers effectively with other stakeholders are one of the important key achievements of organizational goals. LP. XYZ is one of the Consultants in the field of Information Technology, but the storage and management of electronic documents and archives themselves carried on a server without a management information sy...

  17. Documenting indigenous knowledge about Africa's traditional ...

    African Journals Online (AJOL)

    This article examines the global debates about indigenous knowledge and Africa's traditional medicine. It explores whether it is possible to document all the elements of indigenous knowledge about Africa's traditional medicine that is used for the treatment of diverse forms of sickness. Certain types of Africa's traditional ...

  18. Quality assurance application in the documentation of nuclear research reactor

    International Nuclear Information System (INIS)

    Nababan, N.

    1999-01-01

    For each nuclear research reactor a document control system should be established and should be provide for preparation, review, approval, issuance, distribution, revision and validation (where appropriate) of documents essential to the management, performance and verification of work. In the document control system the responsibilities for each participating organization or individual should be defined in writing. The types of document include, but are not limited to document comprising the QA program, safety requirements, maintenance and operating procedures, inspection instructions, inspection and test reports, assessment reports, drawings, data files, calculations, specifications, computer codes, purchase orders and related documents, vendor supplied documents and work instruction. Management should identify the need for documents and should provide guidance to the organizations and people preparing them. The guidance should cover the status, scope and contents and the policies, standards and codes witch apply. It should also explain the need for feedback of experience. Plant modification or the results of assessments could also give rise to the need for a new document

  19. INFORMATION SYSTEM OF AUTOMATION OF PREPARATION EDUCATIONAL PROCESS DOCUMENTS

    Directory of Open Access Journals (Sweden)

    V. A. Matyushenko

    2016-01-01

    Full Text Available Information technology is rapidly conquering the world, permeating all spheres of human activity. Education is not an exception. An important direction of information of education is the development of university management systems. Modern information systems improve and facilitate the management of all types of activities of the institution. The purpose of this paper is development of system, which allows automating process of formation of accounting documents. The article describes the problem of preparation of the educational process documents. Decided to project and create the information system in Microsoft Access environment. The result is four types of reports obtained by using the developed system. The use of this system now allows you to automate the process and reduce the effort required to prepare accounting documents. All reports was implement in Microsoft Excel software product and can be used for further analysis and processing.

  20. Learning Document Semantic Representation with Hybrid Deep Belief Network

    Directory of Open Access Journals (Sweden)

    Yan Yan

    2015-01-01

    it is also an effective way to remove noise from the different document representation type; the DBN can enhance extract abstract of the document in depth, making the model learn sufficient semantic representation. At the same time, we explore different input strategies for semantic distributed representation. Experimental results show that our model using the word embedding instead of single word has better performance.

  1. A database for TMT interface control documents

    Science.gov (United States)

    Gillies, Kim; Roberts, Scott; Brighton, Allan; Rogers, John

    2016-08-01

    The TMT Software System consists of software components that interact with one another through a software infrastructure called TMT Common Software (CSW). CSW consists of software services and library code that is used by developers to create the subsystems and components that participate in the software system. CSW also defines the types of components that can be constructed and their roles. The use of common component types and shared middleware services allows standardized software interfaces for the components. A software system called the TMT Interface Database System was constructed to support the documentation of the interfaces for components based on CSW. The programmer describes a subsystem and each of its components using JSON-style text files. A command interface file describes each command a component can receive and any commands a component sends. The event interface files describe status, alarms, and events a component publishes and status and events subscribed to by a component. A web application was created to provide a user interface for the required features. Files are ingested into the software system's database. The user interface allows browsing subsystem interfaces, publishing versions of subsystem interfaces, and constructing and publishing interface control documents that consist of the intersection of two subsystem interfaces. All published subsystem interfaces and interface control documents are versioned for configuration control and follow the standard TMT change control processes. Subsystem interfaces and interface control documents can be visualized in the browser or exported as PDF files.

  2. SGHWR - quality assurance documentation

    International Nuclear Information System (INIS)

    Garrard, R.S.; Caulfield, J.

    1976-01-01

    The quality assurance program for a modern power station such as an SGHWR type reactor plant must include a record of quality achievement. The case history record which is evidence of the actual quality of the plant and is a data bank of design, manufacture, and results of inspections and tests, is described. Documentation distribution, which keeps all key areas informed of plant item quality status, and the retrieval and storage of information, are briefly discussed. (U.K.)

  3. Who Has Used Internal Company Documents for Biomedical and Public Health Research and Where Did They Find Them?

    OpenAIRE

    Wieland, L. Susan; Rutkow, Lainie; Vedula, S. Swaroop; Kaufmann, Christopher N.; Rosman, Lori M.; Twose, Claire; Mahendraratnam, Nirosha; Dickersin, Kay

    2014-01-01

    OBJECTIVE: To describe the sources of internal company documents used in public health and healthcare research. METHODS: We searched PubMed and Embase for articles using internal company documents to address a research question about a health-related topic. Our primary interest was where authors obtained internal company documents for their research. We also extracted information on type of company, type of research question, type of internal documents, and funding source. RESULTS: Our search...

  4. Restricted evaluation of Trichodectes canis (Phthiraptera: Trichodectidae detection methods in Alaska gray wolves

    Directory of Open Access Journals (Sweden)

    Theresa M. Woldstad

    2014-12-01

    Full Text Available Trichodectes canis (Phthiraptera: Trichodectidae was first documented on Alaska (USA gray wolves (Canis lupus on the Kenai Peninsula in 1981. In subsequent years, numerous wolves exhibited visually apparent, moderate to severe infestations. Currently, the Alaska Department of Fish and Game utilizes visual inspection, histopathology, and potassium hydroxide (KOH hide digestion for T. canis detection. Our objective was to determine optimal sampling locations for T. canis detection. Wolf hides were subjected to lice enumeration using KOH hide digestion. Thirty nine of the 120 wolves examined had lice. Of these 39, total louse burdens ranged from 14 to an extrapolated 80,000. The hides of 12 infested animals were divided into 10 cm by 10 cm subsections and the lice enumerated on a subsection from each of four regions: neck; shoulder; groin; and rump. Combining the data from these 12 wolves, the highest mean proportions of the total louse burdens on individual wolves were found on the rump and differed significantly from the lowest mean proportion on the neck. However, examination of the four subsections failed to detect all infested wolves. Hides from 16 of the 39 infested animals were cut into left and right sides, and each side then cut into four, approximately equal sections: neck and shoulder; chest; abdomen; and rump. Half hides were totally digested from 11 wolves, and whole hides from 5. For these 21 half hides, the highest mean proportions of total louse burdens were found on the rump, and this section had the highest sensitivity for louse detection, regardless of burden. However, removal of this large section from a hide would likely be opposed by hunters and trappers.

  5. Integrated system for automated financial document processing

    Science.gov (United States)

    Hassanein, Khaled S.; Wesolkowski, Slawo; Higgins, Ray; Crabtree, Ralph; Peng, Antai

    1997-02-01

    A system was developed that integrates intelligent document analysis with multiple character/numeral recognition engines in order to achieve high accuracy automated financial document processing. In this system, images are accepted in both their grayscale and binary formats. A document analysis module starts by extracting essential features from the document to help identify its type (e.g. personal check, business check, etc.). These features are also utilized to conduct a full analysis of the image to determine the location of interesting zones such as the courtesy amount and the legal amount. These fields are then made available to several recognition knowledge sources such as courtesy amount recognition engines and legal amount recognition engines through a blackboard architecture. This architecture allows all the available knowledge sources to contribute incrementally and opportunistically to the solution of the given recognition query. Performance results on a test set of machine printed business checks using the integrated system are also reported.

  6. Who has used internal company documents for biomedical and public health research and where did they find them?

    Science.gov (United States)

    Wieland, L Susan; Rutkow, Lainie; Vedula, S Swaroop; Kaufmann, Christopher N; Rosman, Lori M; Twose, Claire; Mahendraratnam, Nirosha; Dickersin, Kay

    2014-01-01

    To describe the sources of internal company documents used in public health and healthcare research. We searched PubMed and Embase for articles using internal company documents to address a research question about a health-related topic. Our primary interest was where authors obtained internal company documents for their research. We also extracted information on type of company, type of research question, type of internal documents, and funding source. Our searches identified 9,305 citations of which 357 were eligible. Scanning of reference lists and consultation with colleagues identified 4 additional articles, resulting in 361 included articles. Most articles examined internal tobacco company documents (325/361; 90%). Articles using documents from pharmaceutical companies (20/361; 6%) were the next most common. Tobacco articles used documents from repositories; pharmaceutical documents were from a range of sources. Most included articles relied upon internal company documents obtained through litigation (350/361; 97%). The research questions posed were primarily about company strategies to promote or position the company and its products (326/361; 90%). Most articles (346/361; 96%) used information from miscellaneous documents such as memos or letters, or from unspecified types of documents. When explicit information about study funding was provided (290/361 articles), the most common source was the US-based National Cancer Institute. We developed an alternative and more sensitive search targeted at identifying additional research articles using internal pharmaceutical company documents, but the search retrieved an impractical number of citations for review. Internal company documents provide an excellent source of information on health topics (e.g., corporate behavior, study data) exemplified by articles based on tobacco industry documents. Pharmaceutical and other industry documents appear to have been less used for research, indicating a need for funding for

  7. ELECTRICAL POWER SYSTEM DESCRIPTION DOCUMENT

    Energy Technology Data Exchange (ETDEWEB)

    M. Maniyar

    2004-06-22

    The purpose of this revision of the System Description Document (SDD) is to establish requirements that drive the design of the electrical power system and their bases to allow the design effort to proceed to License Application. This SDD is a living document that will be revised at strategic points as the design matures over time. This SDD identifies the requirements and describes the system design as they exist at this time, with emphasis on those attributes of the design provided to meet the requirements. This SDD has been developed to be an engineering tool for design control. Accordingly, the primary audience are design engineers. This type of SDD leads and follows the design process. It leads the design process with regard to the flow down of upper tier requirements onto the system. Knowledge of these requirements is essential to performing the design process. This SDD follows the design with regard to the description of the system. The description provided in the SDD is a reflection of the results of the design process to date. Functional and operational requirements applicable to this system are obtained from ''Project Functional and Operational Requirements'' (F&OR) (Siddoway, 2003). Other requirements to support the design process have been taken from higher level requirements documents such as ''Project Design Criteria Document'' (PDC) (Doraswamy 2004), the fire hazards analyses, and the preclosure safety analysis. The above mentioned low-level documents address ''Project Requirements Document'' (PRD) (Canori and Leitner 2003) requirements. This SDD includes several appendices with supporting information. Appendix B lists key system charts, diagrams, drawings, and lists; and Appendix C is a list of system procedures.

  8. World energy projection system: Model documentation

    Science.gov (United States)

    1992-06-01

    The World Energy Project System (WEPS) is an accounting framework that incorporates projects from independently documented models and assumptions about the future energy intensity of economic activity (ratios of total energy consumption divided by gross domestic product) and about the rate of incremental energy requirements met by hydropower, geothermal, coal, and natural gas to produce projections of world energy consumption published annually by the Energy Information Administration (EIA) in the International Energy Outlook (IEO). Two independently documented models presented in Figure 1, the Oil Market Simulation (OMS) model and the World Integrated Nuclear Evaluation System (WINES), provide projections of oil and nuclear power consumption published in the IEO. Output from a third independently documented model, and the International Coal Trade Model (ICTM), is not published in the IEO but is used in WEPS as a supply check on projections of world coal consumption produced by WEPS and published in the IEO. A WEPS model of natural gas production documented in this report provides the same type of implicit supply check on the WEPS projections of world natural gas consumption published in the IEO. Two additional models are included in Figure 1, the OPEC Capacity model and the Non-OPEC Oil Production model. These WEPS models provide inputs to the OMS model and are documented in this report.

  9. World energy projection system: Model documentation

    International Nuclear Information System (INIS)

    1992-06-01

    The World Energy Project System (WEPS) is an accounting framework that incorporates projects from independently documented models and assumptions about the future energy intensity of economic activity (ratios of total energy consumption divided by gross domestic product) and about the rate of incremental energy requirements met by hydropower, geothermal, coal, and natural gas to produce projections of world energy consumption published annually by the Energy Information Administration (EIA) in the International Energy Outlook (IEO) (Figure 1). Two independently documented models presented in Figure 1, the Oil Market Simulation (OMS) model and the World Integrated Nuclear Evaluation System (WINES) provide projections of oil and nuclear power consumption published in the IEO. Output from a third independently documented model, and the International Coal Trade Model (ICTM), is not published in the IEO but is used in WEPS as a supply check on projections of world coal consumption produced by WEPS and published in the IEO. A WEPS model of natural gas production documented in this report provides the same type of implicit supply check on the WEPS projections of world natural gas consumption published in the IEO. Two additional models are included in Figure 1, the OPEC Capacity model and the Non-OPEC Oil Production model. These WEPS models provide inputs to the OMS model and are documented in this report

  10. State Of The Art In Digital Steganography Focusing ASCII Text Documents

    OpenAIRE

    Rafat, Khan Farhan; Sher, Muhammad

    2010-01-01

    Digitization of analogue signals has opened up new avenues for information hiding and the recent advancements in the telecommunication field has taken up this desire even further. From copper wire to fiber optics, technology has evolved and so are ways of covert channel communication. By "Covert" we mean "anything not meant for the purpose for which it is being used". Investigation and detection of existence of such cover channel communication has always remained a serious concern of informat...

  11. Chlamydia pneumoniae hides inside apoptotic neutrophils to silently infect and propagate in macrophages.

    Directory of Open Access Journals (Sweden)

    Jan Rupp

    Full Text Available BACKGROUND: Intracellular pathogens have developed elaborate strategies for silent infection of preferred host cells. Chlamydia pneumoniae is a common pathogen in acute infections of the respiratory tract (e.g. pneumonia and associated with chronic lung sequelae in adults and children. Within the lung, alveolar macrophages and polymorph nuclear neutrophils (PMN are the first line of defense against bacteria, but also preferred host phagocytes of chlamydiae. METHODOLOGY/PRINCIPAL FINDINGS: We could show that C. pneumoniae easily infect and hide inside neutrophil granulocytes until these cells become apoptotic and are subsequently taken up by macrophages. C. pneumoniae infection of macrophages via apoptotic PMN results in enhanced replicative activity of chlamydiae when compared to direct infection of macrophages, which results in persistence of the pathogen. Inhibition of the apoptotic recognition of C. pneumoniae infected PMN using PS- masking Annexin A5 significantly lowered the transmission of chlamydial infection to macrophages. Transfer of apoptotic C. pneumoniae infected PMN to macrophages resulted in an increased TGF-ss production, whereas direct infection of macrophages with chlamydiae was characterized by an enhanced TNF-alpha response. CONCLUSIONS/SIGNIFICANCE: Taken together, our data suggest that C. pneumoniae uses neutrophil granulocytes to be silently taken up by long-lived macrophages, which allows for efficient propagation and immune protection within the human host.

  12. Improved Optical Document Security Techniques Based on Volume Holography and Lippmann Photography

    Science.gov (United States)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, ID cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is need for a higher degree of security on such documents and this chapter covers new techniques to make improved mass-produced or personalized OVDs.

  13. New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography

    Science.gov (United States)

    Bjelkhagen, Hans I.

    Optical variable devices (OVDs), such as holograms, are now common in the field of document security. Up until now mass-produced embossed holograms or other types of mass-produced OVDs are used not only for banknotes but also for personalized documents, such as passports, identification cards, travel documents, driving licenses, credit cards, etc. This means that identical OVDs are used on documents issued to individuals. Today, there is a need for a higher degree of security on such documents and this chapter covers new techniques to make personalized OVDs.

  14. Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2015-05-01

    A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  15. Who has used internal company documents for biomedical and public health research and where did they find them?

    Directory of Open Access Journals (Sweden)

    L Susan Wieland

    Full Text Available OBJECTIVE: To describe the sources of internal company documents used in public health and healthcare research. METHODS: We searched PubMed and Embase for articles using internal company documents to address a research question about a health-related topic. Our primary interest was where authors obtained internal company documents for their research. We also extracted information on type of company, type of research question, type of internal documents, and funding source. RESULTS: Our searches identified 9,305 citations of which 357 were eligible. Scanning of reference lists and consultation with colleagues identified 4 additional articles, resulting in 361 included articles. Most articles examined internal tobacco company documents (325/361; 90%. Articles using documents from pharmaceutical companies (20/361; 6% were the next most common. Tobacco articles used documents from repositories; pharmaceutical documents were from a range of sources. Most included articles relied upon internal company documents obtained through litigation (350/361; 97%. The research questions posed were primarily about company strategies to promote or position the company and its products (326/361; 90%. Most articles (346/361; 96% used information from miscellaneous documents such as memos or letters, or from unspecified types of documents. When explicit information about study funding was provided (290/361 articles, the most common source was the US-based National Cancer Institute. We developed an alternative and more sensitive search targeted at identifying additional research articles using internal pharmaceutical company documents, but the search retrieved an impractical number of citations for review. CONCLUSIONS: Internal company documents provide an excellent source of information on health topics (e.g., corporate behavior, study data exemplified by articles based on tobacco industry documents. Pharmaceutical and other industry documents appear to have been

  16. ELECTRICAL SUPPORT SYSTEM DESCRIPTION DOCUMENT

    International Nuclear Information System (INIS)

    Roy, S.

    2004-01-01

    The purpose of this revision of the System Design Description (SDD) is to establish requirements that drive the design of the electrical support system and their bases to allow the design effort to proceed to License Application. This SDD is a living document that will be revised at strategic points as the design matures over time. This SDD identifies the requirements and describes the system design as they exist at this time, with emphasis on those attributes of the design provided to meet the requirements. This SDD has been developed to be an engineering tool for design control. Accordingly, the primary audience/users are design engineers. This type of SDD both ''leads'' and ''trails'' the design process. It leads the design process with regard to the flow down of upper tier requirements onto the system. Knowledge of these requirements is essential in performing the design process. The SDD trails the design with regard to the description of the system. The description provided in the SDD is a reflection of the results of the design process to date. Functional and operational requirements applicable to electrical support systems are obtained from the ''Project Functional and Operational Requirements'' (F andOR) (Siddoway 2003). Other requirements to support the design process have been taken from higher-level requirements documents such as the ''Project Design Criteria Document'' (PDC) (Doraswamy 2004), and fire hazards analyses. The above-mentioned low-level documents address ''Project Requirements Document'' (PRD) (Canon and Leitner 2003) requirements. This SDD contains several appendices that include supporting information. Appendix B lists key system charts, diagrams, drawings, and lists, and Appendix C includes a list of system procedures

  17. SALES DOCUMENTS IN PURCHASE AND SALE TRANSACTIONS OF STEAM COAL IN POLAND

    OpenAIRE

    Anna Galik

    2015-01-01

    This article describes sales documents in purchase and sale transactions of steam coal in Poland. In relation to introducing the excise tax on steam coal at the beginning in 2012, additional requirements appeared in documents during the sale of goods. Now the seller is obliged to issue various documents depending on the type of the buyer and the destination of goods. The article presents the coal sales documents for households, companies with no tax payment and companies with tax payment. The...

  18. Wood evidence : proper collection, documentation, and storage of wood evidence from a crime scene

    Science.gov (United States)

    Alex Wiedenhoeft

    2006-01-01

    Wood can be found at crime scenes in many forms: as a murder weapon, as material used to hide a body, or as trace evidence from forced entry or vandalism. In the course of my work at the Forest Products Laboratory, Center for Wood Anatomy Research, I have been part of several forensic investigations that were adversely affected by inappropriate procedures used to...

  19. Verifying the integrity of hardcopy document using OCR

    CSIR Research Space (South Africa)

    Mthethwa, Sthembile

    2018-03-01

    Full Text Available stream_source_info Mthethwa_20042_2018.pdf.txt stream_content_type text/plain stream_size 7349 Content-Encoding UTF-8 stream_name Mthethwa_20042_2018.pdf.txt Content-Type text/plain; charset=UTF-8 Verifying the Integrity...) of the document to be defined. Each text in the meta-template is labelled with a unique identifier, which makes it easier for the process of validation. The meta-template consist of two types of text; normal text and validation text (important text that must...

  20. Semantic Annotation of Unstructured Documents Using Concepts Similarity

    Directory of Open Access Journals (Sweden)

    Fernando Pech

    2017-01-01

    Full Text Available There is a large amount of information in the form of unstructured documents which pose challenges in the information storage, search, and retrieval. This situation has given rise to several information search approaches. Some proposals take into account the contextual meaning of the terms specified in the query. Semantic annotation technique can help to retrieve and extract information in unstructured documents. We propose a semantic annotation strategy for unstructured documents as part of a semantic search engine. In this proposal, ontologies are used to determine the context of the entities specified in the query. Our strategy for extracting the context is focused on concepts similarity. Each relevant term of the document is associated with an instance in the ontology. The similarity between each of the explicit relationships is measured through the combination of two types of associations: the association between each pair of concepts and the calculation of the weight of the relationships.

  1. The Effects of Tabular-Based Content Extraction on Patent Document Clustering

    Directory of Open Access Journals (Sweden)

    Michael W. Berry

    2012-10-01

    Full Text Available Data can be represented in many different ways within a particular document or set of documents. Hence, attempts to automatically process the relationships between documents or determine the relevance of certain document objects can be problematic. In this study, we have developed software to automatically catalog objects contained in HTML files for patents granted by the United States Patent and Trademark Office (USPTO. Once these objects are recognized, the software creates metadata that assigns a data type to each document object. Such metadata can be easily processed and analyzed for subsequent text mining tasks. Specifically, document similarity and clustering techniques were applied to a subset of the USPTO document collection. Although our preliminary results demonstrate that tables and numerical data do not provide quantifiable value to a document’s content, the stage for future work in measuring the importance of document objects within a large corpus has been set.

  2. 36 CFR 1235.48 - What documentation must agencies transfer with electronic records?

    Science.gov (United States)

    2010-07-01

    ... documentation for the following types of electronic records: (i) E-mail messages with attachments; (ii) Scanned... agencies transfer with electronic records? 1235.48 Section 1235.48 Parks, Forests, and Public Property... agencies transfer with electronic records? (a) General. Agencies must transfer documentation adequate to...

  3. Preparation of safety and regulatory document for BARC Facilities

    International Nuclear Information System (INIS)

    Prasad, S.S.; Jayarajan, K.

    2017-01-01

    In India, the necessary codes and safety guidelines for achieving the safety objectives are provided by the Atomic Energy Regulatory Board (AERB), which are in conformity with the principles of radiation protection as formulated by the International Council of Radiation Protection (ICRP) and International Atomic Energy Agency (IAEA). The same is followed by BARC Safety Council (BSC), which is the regulatory body for the BARC facilities. In addition to all types of fuel cycle facilities, BSC regulates safety of many types of conventional facilities. Many such types of facilities and projects are not under the regulatory purview of AERB. Therefore, the Council has also initiated a programme for development and publication of safety documents for installations in BARC in the fields/ topics yet not addressed by IAEA or AERB. This makes the task pioneering, as some of the areas taken up for defining the regulatory requirements are new, where standard regulatory documents are not available

  4. ELECTRICAL SUPPORT SYSTEM DESCRIPTION DOCUMENT

    Energy Technology Data Exchange (ETDEWEB)

    S. Roy

    2004-06-24

    The purpose of this revision of the System Design Description (SDD) is to establish requirements that drive the design of the electrical support system and their bases to allow the design effort to proceed to License Application. This SDD is a living document that will be revised at strategic points as the design matures over time. This SDD identifies the requirements and describes the system design as they exist at this time, with emphasis on those attributes of the design provided to meet the requirements. This SDD has been developed to be an engineering tool for design control. Accordingly, the primary audience/users are design engineers. This type of SDD both ''leads'' and ''trails'' the design process. It leads the design process with regard to the flow down of upper tier requirements onto the system. Knowledge of these requirements is essential in performing the design process. The SDD trails the design with regard to the description of the system. The description provided in the SDD is a reflection of the results of the design process to date. Functional and operational requirements applicable to electrical support systems are obtained from the ''Project Functional and Operational Requirements'' (F&OR) (Siddoway 2003). Other requirements to support the design process have been taken from higher-level requirements documents such as the ''Project Design Criteria Document'' (PDC) (Doraswamy 2004), and fire hazards analyses. The above-mentioned low-level documents address ''Project Requirements Document'' (PRD) (Canon and Leitner 2003) requirements. This SDD contains several appendices that include supporting information. Appendix B lists key system charts, diagrams, drawings, and lists, and Appendix C includes a list of system procedures.

  5. New findings on object permanence: A developmental difference between two types of occlusion.

    Science.gov (United States)

    Moore, M Keith; Meltzoff, Andrew N

    1999-11-01

    Manual search for totally occluded objects was investigated in 10-, 12- and 14-month-old infants. Infants responded to two types of total hiding in different ways, supporting the inference that object permanence is not a once-and-for-all attainment. Occlusion of an object by movement of a screen over it was solved at an earlier age than occlusion in which an object was carried under the screen. This dissociation was not explained by motivation, motor skill or means-ends coordination, because for both tasks the same object was hidden in the same place under the same screen and required the same uncovering response. This dissociation generalized across an experimentally manipulated change in recovery means-infants removed cloths while seated at a table in Expt 1 and were required to crawl through 3-D space to displace semi-rigid pillows in Expt 2. Further analysis revealed that emotional response varied as a function of hiding, suggesting an affective correlate of infant cognition. There are four empirical findings to account for: developmental change, task dissociation, generalization of the effects across recovery means, and emotional reactions. An identity-development theory is proposed explaining these findings in terms of infants' understanding of object identity and the developmental relationship between object identity and object permanence. Object identity is seen as a necessary precursor to the development of object permanence.

  6. Spent Nuclear Fuel Project document control and Records Management Program Description

    International Nuclear Information System (INIS)

    MARTIN, B.M.

    2000-01-01

    The Spent Nuclear Fuel (SNF) Project document control and records management program, as defined within this document, is based on a broad spectrum of regulatory requirements, Department of Energy (DOE) and Project Hanford and SNF Project-specific direction and guidance. The SNF Project Execution Plan, HNF-3552, requires the control of documents and management of records under the auspices of configuration control, conduct of operations, training, quality assurance, work control, records management, data management, engineering and design control, operational readiness review, and project management and turnover. Implementation of the controls, systems, and processes necessary to ensure compliance with applicable requirements is facilitated through plans, directives, and procedures within the Project Hanford Management System (PHMS) and the SNF Project internal technical and administrative procedures systems. The documents cited within this document are those which directly establish or define the SNF Project document control and records management program. There are many peripheral documents that establish requirements and provide direction pertinent to managing specific types of documents that, for the sake of brevity and clarity, are not cited within this document

  7. Analysis of hide-out return and the composition of the steam generators' combined blowdown under ethanolamine chemistry

    International Nuclear Information System (INIS)

    Rodriguez Aliciardi, M; Belloni, M; Croatto, F; Ferrari, F; Herrera, C; Mendizabal, M; Montes, J; Saucedo, R; Rodriguez, I; Chocron, M

    2012-01-01

    Among the techniques recommended for the surveillance of the steam generators (SG's) are (i) the follow-up of the corrosion products in the feed water and blown-down water and the corresponding accumulation mass balance and (ii) the follow-up of the ionic impurities normally present in the main condensate and feed water that can enter in the cycle either through condenser leakages or even with the make-up water. This is, no matter how well the cycle is constructed or the make-up water plant behaves, given the continuous phase change present in the cycle, a concentration equilibrium is established. Moreover, a synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in crevices and deposits creating a potentially corrosion risky environment for the SG's tubes. Hide-out return determination consists in the measurement of ions' concentrations, present in the blown-down water which are eluted in the shutdown during the power and temperature reduction. The integrated values allow graphical representations for performing several evaluations like: (i) the performance make-up water plant during a period, (ii) the presence of condenser in-leakages, (iii) the SG's deposits estimation and (iv) the internal chemistry of the SG's liquid phase inside the sludge pile. CNE, a CANDU 6 pressurized heavy-water reactor (PHWR) located in Embalse, Cordoba Province, Argentina, is close to reach the end-of-design-life and a life extension project is currently ongoing. In the plant also the chemistry of the BOP has been modified from a morpholine to an ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of SG's internals and new SG's will be installed. Then, it is of interest to set up a hide-out return procedure and analysis of the combined blown-down crud collected during the shut down as a base line for the second period of

  8. Computerising documentation

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    The nuclear power generation industry is faced with public concern and government pressures over safety, efficiency and risk. Operators throughout the industry are addressing these issues with the aid of a new technology - technical document management systems (TDMS). Used for strategic and tactical advantage, the systems enable users to scan, archive, retrieve, store, edit, distribute worldwide and manage the huge volume of documentation (paper drawings, CAD data and film-based information) generated in building, maintaining and ensuring safety in the UK's power plants. The power generation industry has recognized that the management and modification of operation critical information is vital to the safety and efficiency of its power plants. Regulatory pressure from the Nuclear Installations Inspectorate (NII) to operate within strict safety margins or lose Site Licences has prompted the need for accurate, up-to-data documentation. A document capture and management retrieval system provides a powerful cost-effective solution, giving rapid access to documentation in a tightly controlled environment. The computerisation of documents and plans is discussed in this article. (Author)

  9. Mixed waste characterization reference document

    International Nuclear Information System (INIS)

    1997-09-01

    Waste characterization and monitoring are major activities in the management of waste from generation through storage and treatment to disposal. Adequate waste characterization is necessary to ensure safe storage, selection of appropriate and effective treatment, and adherence to disposal standards. For some wastes characterization objectives can be difficult and costly to achieve. The purpose of this document is to evaluate costs of characterizing one such waste type, mixed (hazardous and radioactive) waste. For the purpose of this document, waste characterization includes treatment system monitoring, where monitoring is a supplement or substitute for waste characterization. This document establishes a cost baseline for mixed waste characterization and treatment system monitoring requirements from which to evaluate alternatives. The cost baseline established as part of this work includes costs for a thermal treatment technology (i.e., a rotary kiln incinerator), a nonthermal treatment process (i.e., waste sorting, macronencapsulation, and catalytic wet oxidation), and no treatment (i.e., disposal of waste at the Waste Isolation Pilot Plant (WIPP)). The analysis of improvement over the baseline includes assessment of promising areas for technology development in front-end waste characterization, process equipment, off gas controls, and monitoring. Based on this assessment, an ideal characterization and monitoring configuration is described that minimizes costs and optimizes resources required for waste characterization

  10. Policies on documentation and disciplinary action in hospital pharmacies after a medication error.

    Science.gov (United States)

    Bauman, A N; Pedersen, C A; Schommer, J C; Griffith, N L

    2001-06-15

    Hospital pharmacies were surveyed about policies on medication error documentation and actions taken against pharmacists involved in an error. The survey was mailed to 500 randomly selected hospital pharmacy directors in the United States. Data were collected on the existence of medication error reporting policies, what types of errors were documented and how, and hospital demographics. The response rate was 28%. Virtually all of the hospitals had policies and procedures for medication error reporting. Most commonly, documentation of oral and written reprimand was placed in the personnel file of a pharmacist involved in an error. One sixth of respondents had no policy on documentation or disciplinary action in the event of an error. Approximately one fourth of respondents reported that suspension or termination had been used as a form of disciplinary action; legal action was rarely used. Many respondents said errors that caused harm (42%) or death (40%) to the patient were documented in the personnel file, but 34% of hospitals did not document errors in the personnel file regardless of error type. Nearly three fourths of respondents differentiated between errors caught and not caught before a medication leaves the pharmacy and between errors caught and not caught before administration to the patient. More emphasis is needed on documentation of medication errors in hospital pharmacies.

  11. Extractive Summarisation of Medical Documents

    Directory of Open Access Journals (Sweden)

    Abeed Sarker

    2012-09-01

    Full Text Available Background Evidence Based Medicine (EBM practice requires practitioners to extract evidence from published medical research when answering clinical queries. Due to the time-consuming nature of this practice, there is a strong motivation for systems that can automatically summarise medical documents and help practitioners find relevant information. Aim The aim of this work is to propose an automatic query-focused, extractive summarisation approach that selects informative sentences from medical documents. MethodWe use a corpus that is specifically designed for summarisation in the EBM domain. We use approximately half the corpus for deriving important statistics associated with the best possible extractive summaries. We take into account factors such as sentence position, length, sentence content, and the type of the query posed. Using the statistics from the first set, we evaluate our approach on a separate set. Evaluation of the qualities of the generated summaries is performed automatically using ROUGE, which is a popular tool for evaluating automatic summaries. Results Our summarisation approach outperforms all baselines (best baseline score: 0.1594; our score 0.1653. Further improvements are achieved when query types are taken into account. Conclusion The quality of extractive summarisation in the medical domain can be significantly improved by incorporating domain knowledge and statistics derived from a specialised corpus. Such techniques can therefore be applied for content selection in end-to-end summarisation systems.

  12. The New Logic of Hypertext: Electronic Documents, Literary Theory, and Air Force Publications

    Science.gov (United States)

    1996-12-01

    today insist that "true" or "completely realized" hypertext systems must be "constructive"--they must exhibit those same reader-empowering features...dangerous fagade hiding the essential interconnectedness of all texts. Derrida , perhaps the leading voice of the deconstructionist critics (and a writer...to it.... ( Derrida , 1979:83-84) The deconstructionists were committed to breaking down the deceptive "boundaries" that appeared to isolate a text from

  13. WikiHyperGlossary (WHG): an information literacy technology for chemistry documents.

    Science.gov (United States)

    Bauer, Michael A; Berleant, Daniel; Cornell, Andrew P; Belford, Robert E

    2015-01-01

    The WikiHyperGlossary is an information literacy technology that was created to enhance reading comprehension of documents by connecting them to socially generated multimedia definitions as well as semantically relevant data. The WikiHyperGlossary enhances reading comprehension by using the lexicon of a discipline to generate dynamic links in a document to external resources that can provide implicit information the document did not explicitly provide. Currently, the most common method to acquire additional information when reading a document is to access a search engine and browse the web. This may lead to skimming of multiple documents with the novice actually never returning to the original document of interest. The WikiHyperGlossary automatically brings information to the user within the current document they are reading, enhancing the potential for deeper document understanding. The WikiHyperGlossary allows users to submit a web URL or text to be processed against a chosen lexicon, returning the document with tagged terms. The selection of a tagged term results in the appearance of the WikiHyperGlossary Portlet containing a definition, and depending on the type of word, tabs to additional information and resources. Current types of content include multimedia enhanced definitions, ChemSpider query results, 3D molecular structures, and 2D editable structures connected to ChemSpider queries. Existing glossaries can be bulk uploaded, locked for editing and associated with multiple social generated definitions. The WikiHyperGlossary leverages both social and semantic web technologies to bring relevant information to a document. This can not only aid reading comprehension, but increases the users' ability to obtain additional information within the document. We have demonstrated a molecular editor enabled knowledge framework that can result in a semantic web inductive reasoning process, and integration of the WikiHyperGlossary into other software technologies, like

  14. FTC advertising substantiation program. Household products manufacturers. Documentation of Toshiba America, Inc

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    The report contains documentation in support of claims that the Toshiba Microwave Oven can cook any and all types of food satisfactorily with a 75% savings in energy usage and cost, regardless of the size of a household. (Portions of this document are not fully legible) (Color illustrations reproduced in black and white)

  15. Verifying design patterns in Hoare Type Theory

    DEFF Research Database (Denmark)

    Svendsen, Kasper; Buisse, Alexandre; Birkedal, Lars

    In this technical report we document our experiments formally verifying three design patterns in Hoare Type Theory.......In this technical report we document our experiments formally verifying three design patterns in Hoare Type Theory....

  16. INFORMATION DOCUMENTS – PRIMORDIAL INSTRUMENTS IN TOURIST COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Denisa PARPANDEL

    2010-01-01

    Full Text Available Tourist information proved to have an important influence on the choice of holiday destinations. An important category of promotional means used tourism as a source of information is a tourist information documents in which graphical advertising has a great importance. In a harmonious combination between an informative text and a picture suggestive of its different forms (flyers, brochures, catalogs, guides and tourist maps, posters and billboards, advertisements in the press visualize products of interest. This article highlights the importance of tourism information documents on the selection of destination, the requirements and recommendations for their design and the need arrangement advertisement to increase its impact on potential tourists. Tour operators in cooperation with advertising agency, choosing one means of communication and advertising medium itself, according to market research conducted, the production capacity or area of interest to prepare an advertising campaign, the level of tariffs and the type of benefits offered, the type of tourism product offered and the target market segment targeted.

  17. A Case Study in Business Writing: An Examination of Documents Written by Executives and Managers.

    Science.gov (United States)

    Gallion, Leona M.; Kavan, C. Bruce

    1994-01-01

    Examines the types of documents written by 23 executives/managers in 2 different companies, finding that the most frequently written documents are memorandums and letters. Notes implications for business writing courses. Suggests that students be required to prepare a wide variety of documents in business writing courses. (SR)

  18. Documentation Service

    International Nuclear Information System (INIS)

    Charnay, J.; Chosson, L.; Croize, M.; Ducloux, A.; Flores, S.; Jarroux, D.; Melka, J.; Morgue, D.; Mottin, C.

    1998-01-01

    This service assures the treatment and diffusion of the scientific information and the management of the scientific production of the institute as well as the secretariat operation for the groups and services of the institute. The report on documentation-library section mentions: the management of the documentation funds, search in international databases (INIS, Current Contents, Inspects), Pret-Inter service which allows accessing documents through DEMOCRITE network of IN2P3. As realizations also mentioned are: the setup of a video, photo database, the Web home page of the institute's library, follow-up of digitizing the document funds by integrating the CD-ROMs and diskettes, electronic archiving of the scientific production, etc

  19. Cultural diversity: blind spot in medical curriculum documents, a document analysis.

    Science.gov (United States)

    Paternotte, Emma; Fokkema, Joanne P I; van Loon, Karsten A; van Dulmen, Sandra; Scheele, Fedde

    2014-08-22

    Cultural diversity among patients presents specific challenges to physicians. Therefore, cultural diversity training is needed in medical education. In cases where strategic curriculum documents form the basis of medical training it is expected that the topic of cultural diversity is included in these documents, especially if these have been recently updated. The aim of this study was to assess the current formal status of cultural diversity training in the Netherlands, which is a multi-ethnic country with recently updated medical curriculum documents. In February and March 2013, a document analysis was performed of strategic curriculum documents for undergraduate and postgraduate medical education in the Netherlands. All text phrases that referred to cultural diversity were extracted from these documents. Subsequently, these phrases were sorted into objectives, training methods or evaluation tools to assess how they contributed to adequate curriculum design. Of a total of 52 documents, 33 documents contained phrases with information about cultural diversity training. Cultural diversity aspects were more prominently described in the curriculum documents for undergraduate education than in those for postgraduate education. The most specific information about cultural diversity was found in the blueprint for undergraduate medical education. In the postgraduate curriculum documents, attention to cultural diversity differed among specialties and was mainly superficial. Cultural diversity is an underrepresented topic in the Dutch documents that form the basis for actual medical training, although the documents have been updated recently. Attention to the topic is thus unwarranted. This situation does not fit the demand of a multi-ethnic society for doctors with cultural diversity competences. Multi-ethnic countries should be critical on the content of the bases for their medical educational curricula.

  20. Hiding in plain sight: communication theory in implementation science.

    Science.gov (United States)

    Manojlovich, Milisa; Squires, Janet E; Davies, Barbara; Graham, Ian D

    2015-04-23

    ignoring a key contributor to implementation intervention success. When conceptualized as a transformational process, the focus of communication moves to shared understanding and is grounded in human interactions and the way we go about constructing knowledge. Instead of hiding in plain sight, we suggest explicitly acknowledging the role that communication plays in our implementation efforts. By using both paradigms, we can investigate when communication facilitates implementation, when it does not, and how to improve it so that our implementation and clinical interventions are embraced by clinicians and patients alike.

  1. Orbitmpi Documentation

    International Nuclear Information System (INIS)

    Lowe, Lisa L.

    2000-01-01

    Orbitmpi is a parallelized version of Roscoe White's Orbit code. The code has been parallelized using MPI, which makes it portable to many types of machines. The guidelines used for the parallelization were to increase code performance with minimal changes to the code's original structure. This document gives a general description of how the parallel sections of the code run. It discusses the changes made to the original code and comments on the general procedure for future additions to Orbitmpi, as well as describing the effects of a parallelized random number generator on the code's output. Finally, the scaling results from Hecate and from Puffin are presented. Hecate is a 64-processor Origin 2000 machine, with MIPS R12000 processors and 16GB of memory, and Puffin is a PC cluster with 9 dual-processor 450 MHz Pentium III (18 processors max.), with 100Mbits ethernet communication

  2. The Finnish background report for the EC documentation of best available techniques for tanning industry

    Energy Technology Data Exchange (ETDEWEB)

    Kustula, V.; Salo, H.; Witick, A.; Kaunismaa, P.

    2000-08-01

    The objective of this document is to identify best available techniques (BAT) for the reduction of emissions and energy use in the tanning industry in Finland. The leather tanning industry in Finland has long traditions, dating back for centuries, but today there are only nine tanneries of any importance left. The tanneries vary in size from small, family-owned ones to large on a Finnish scale, with a staff of about 70 persons. The production of finished leather in even the largest tannery in Finland is well below the production limit (12 tonnes finished leather a day) mentioned in the IPPC-directive (96/61/EC). The range of products manufactured by the Finnish leather industry is large and includes processed leather for, e.g. footwear, clothing, furniture and intermediate products, e.g. wet-blue and crust. The hides and skins of cows, lamb, elk, reindeer and occasionally skins from other animals, e.g. horses are the main raw materials used. Some of the tanneries carry out only a part of the processing and sell their products in a treated, but not finished state. Tanneries which undertake only a part of the preparation process are reviewed in this document as well. Because of the varying size of the Finnish tanneries, the quality and quantity of emissions and environmental impacts vary considerably. The parameters used by the authorities are suspended solids (SS), biological oxygen demand (BOD), and chromium and sulphide concentration in the effluents. The quantity of waste and waste water generated is also subject to assessment by the authorities. Direct regulation of emissions is practised in Finland by issuing permits containing emission limit values. Major waste streams generated are sludge from waste water treatment plants, animal residues from the beamhouse stage, residues from tanned leather and chemicals used. Various ways of residue separation and consequently reuse and recovery are practised in most Finnish tanneries. The proteinaceous residues from the

  3. Subject (of documents)

    DEFF Research Database (Denmark)

    Hjørland, Birger

    2017-01-01

    This article presents and discuss the concept “subject” or subject matter (of documents) as it has been examined in library and information science (LIS) for more than 100 years. Different theoretical positions are outlined and it is found that the most important distinction is between document......-oriented views versus request-oriented views. The document-oriented view conceive subject as something inherent in documents, whereas the request-oriented view (or the policy based view) understand subject as an attribution made to documents in order to facilitate certain uses of them. Related concepts...

  4. 16 CFR 1025.14 - Form and filing of documents.

    Science.gov (United States)

    2010-01-01

    ... in size. Print shall not be less than standard elite or 12 point type. Pages shall be fastened in the upper left corner or along the left margin. (3) Documents that fail to comply with this section may be...

  5. 32 CFR 70.10 - Complaints concerning decisional documents and index entries.

    Science.gov (United States)

    2010-07-01

    ... declining to list that aspect of the service record as an issue. (v) Guidance as to other types of complaints. The following guidance governs other specified types of complaints: (A) The Stipulation of... noted in the decisional document or index entries: (Authentication) Attachment 2—Joint Service Review...

  6. FTC advertising substantiation program. Household products manufacturers. Documentation of Hakuhodo Advertising America, Inc

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    The report contains documentation in support of claims that the Toshiba Microwave Oven can cook any and all types of food satisfactorily with a 75% savings in energy usage and cost, regardless of the size of a household. (Portions of this document are not fully legible)

  7. Analyzing THE PLACE FOR THE EVENT-type Metonymies from the Perspective of Negative Evaluative Factors

    Directory of Open Access Journals (Sweden)

    Nami Arimitsu

    Full Text Available This paper has two objectives. First, by analyzing THE PLACE FOR THE EVENT-type metonymies, this paper points out that it is mainly negative events that are expressed by this type of metonymy. Second, this paper reveals the motivations of those THE PLACE FOR THE EVENT-type metonymies that express negative events. Metonymies are widely investigated along with the views of Lakoff and Johnson (1980, and their oppositional semantic aspects are pointed out by Voßhagen (1999. However, none of the previous studies focused on the nature of THE PLACE FOR THE EVENT-type metonymies from the perspective of negative evaluation, euphemism, and politeness. "Let's not let Thailand become another Vietnam" expresses the Vietnam War and all the tragedies behind it. Speakers refrain from expressing negative evaluative aspects from a euphemistic perspective and try to behave politely through hiding the exact expression, and listeners can also easily understand THE PLACE FOR THE EVENT-type metonymies that express negative events, since negative events are much more highly marked and intensified, as well as more prominent, than are positive ones.

  8. Reactive documentation system

    Science.gov (United States)

    Boehnlein, Thomas R.; Kramb, Victoria

    2018-04-01

    Proper formal documentation of computer acquired NDE experimental data generated during research is critical to the longevity and usefulness of the data. Without documentation describing how and why the data was acquired, NDE research teams lose capability such as their ability to generate new information from previously collected data or provide adequate information so that their work can be replicated by others seeking to validate their research. Despite the critical nature of this issue, NDE data is still being generated in research labs without appropriate documentation. By generating documentation in series with data, equal priority is given to both activities during the research process. One way to achieve this is to use a reactive documentation system (RDS). RDS prompts an operator to document the data as it is generated rather than relying on the operator to decide when and what to document. This paper discusses how such a system can be implemented in a dynamic environment made up of in-house and third party NDE data acquisition systems without creating additional burden on the operator. The reactive documentation approach presented here is agnostic enough that the principles can be applied to any operator controlled, computer based, data acquisition system.

  9. Starlink Document Styles

    Science.gov (United States)

    Lawden, M. D.

    This document describes the various styles which are recommended for Starlink documents. It also explains how to use the templates which are provided by Starlink to help authors create documents in a standard style. This paper is concerned mainly with conveying the ``look and feel" of the various styles of Starlink document rather than describing the technical details of how to produce them. Other Starlink papers give recommendations for the detailed aspects of document production, design, layout, and typography. The only style that is likely to be used by most Starlink authors is the Standard style.

  10. CASK/MSC/WP PREPARATION SYSTEM DESCRIPTION DOCUMENT

    International Nuclear Information System (INIS)

    S. Drummond

    2005-01-01

    The purpose of this system description document (SDD) is to establish requirements that drive the design of the Cask/MSC/WP preparation system and their bases to allow the design effort to proceed to license application. This SDD is a living document that will be revised at strategic points as the design matures over time. This SDD identifies the requirements and describes the system design, as they exist at this time, with emphasis on those attributes of the design provided to meet the requirements. This SDD has been developed to be an engineering tool for design control. Accordingly, the primary audience and users are design engineers. This type of SDD both leads and trails the design process. It leads the design process with regard to the flow down of upper tier requirements onto the system. Knowledge of these requirements is essential in performing the design process. This SDD trails the design with regard to the description of the system. The description provided in the SDD is a reflection of the results of the design process to date. This SDD addresses the ''Project Requirements Document'' (PRD) (Canori and Leitner 2003 [DIRS 166275]) requirements. Additional PRD requirements may be cited, as applicable, to drive the design of specific aspects of the system, with justifications provided in the basis. Functional and operational requirements applicable to this system are obtained from the ''Project Functional and Operational Requirements'' (F and OR) (Curry 2004 [DIRS 170557]) document. Other requirements to support the design process have been taken from higher-level requirements documents such as the ''Project Design Criteria Document'' (PDC) (BSC 2004 [DIRS 171599]) and the preclosure safety analyses

  11. Document understanding for a broad class of documents

    NARCIS (Netherlands)

    Aiello, Marco; Monz, Christof; Todoran, Leon; Worring, Marcel

    2002-01-01

    We present a document analysis system able to assign logical labels and extract the reading order in a broad set of documents. All information sources, from geometric features and spatial relations to the textual features and content are employed in the analysis. To deal effectively with these

  12. Validation of a hot water rinse and lactic acid spray in combination with scaling for treating hide-on carcasses to control biotype I strains of Escherichia coli used as surrogates for Shiga toxin-producing E. coli

    Science.gov (United States)

    Scalding of hide-on bob veal carcasses with or without standard scalding chemical agents typically used for hogs, followed by an 82.2degreeC hot water wash and lactic acid spray (applied at ambient temperature) prior to chilling, was evaluated to determine its effectiveness in reducing the levels of...

  13. Environmental enrichment choices of shelter cats.

    Science.gov (United States)

    Ellis, J J; Stryhn, H; Spears, J; Cockram, M S

    2017-08-01

    Choices made by cats between different types of environmental enrichment may help shelters to prioritize how to most effectively enrich cat housing, especially when limited by space or funds. This study investigates the environmental enrichment use of cats in a choice test. Twenty-six shelter cats were kept singularly in choice chambers for 10days. Each chamber had a central area and four centrally-linked compartments containing different types of environmental enrichment: 1) an empty control, 2) a prey-simulating toy, 3) a perching opportunity, and 4) a hiding opportunity. Cat movement between compartments was quantitatively recorded using a data-logger. Enriched compartments were visited significantly more frequently during the light period than during the dark period. Cats spent a significantly greater percentage of time in the hiding compartment (median=55%, IQR=46) than in the toy compartment (median=2%, IQR=9), or in the empty control compartment (median=4%, IQR=4). These results provide additional evidence to support the value of a hiding box to cats housed in a novel environment, in that they choose hiding relative to other types of environmental enrichment. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. 48 CFR 1515.305-71 - Documentation of proposal evaluation.

    Science.gov (United States)

    2010-10-01

    ... AGENCY CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Source Selection 1515.305-71... actual or potential personal conflicts of interest, and are in compliance with the Office of Government... an actual or potential organizational conflict of interest. (d) Any documentation related to...

  15. Generic safety documentation model

    International Nuclear Information System (INIS)

    Mahn, J.A.

    1994-04-01

    This document is intended to be a resource for preparers of safety documentation for Sandia National Laboratories, New Mexico facilities. It provides standardized discussions of some topics that are generic to most, if not all, Sandia/NM facilities safety documents. The material provides a ''core'' upon which to develop facility-specific safety documentation. The use of the information in this document will reduce the cost of safety document preparation and improve consistency of information

  16. [Familial combined hyperlipidemia: consensus document].

    Science.gov (United States)

    Mata, Pedro; Alonso, Rodrigo; Ruíz-Garcia, Antonio; Díaz-Díaz, Jose L; González, Noemí; Gijón-Conde, Teresa; Martínez-Faedo, Ceferino; Morón, Ignacio; Arranz, Ezequiel; Aguado, Rocío; Argueso, Rosa; Perez de Isla, Leopoldo

    2014-10-01

    Familial combined hyperlipidemia (FCH) is a frequent disorder associated with premature coronary artery disease. It is transmitted in an autosomal dominant manner, although there is not a unique gene involved. The diagnosis is performed using clinical criteria, and variability in lipid phenotype and family history of hyperlipidemia are necessaries. Frequently, the disorder is associated with type2 diabetes mellitus, arterial hypertension and central obesity. Patients with FCH are considered as high cardiovascular risk and the lipid target is an LDL-cholesterol <100mg/dL, and <70mg/dL if cardiovascular disease or type 2 diabetes are present. Patients with FCH require lipid lowering treatment using potent statins and sometimes, combined lipid-lowering treatment. Identification and management of other cardiovascular risk factors as type 2 diabetes and hypertension are fundamental to reduce cardiovascular disease burden. This document gives recommendations for the diagnosis and global treatment of patients with FCH directed to specialists and general practitioners. Copyright © 2014 Sociedad Española de Médicos de Atención Primaria (SEMERGEN). Publicado por Elsevier España. All rights reserved.

  17. Defense Partnerships: Documenting Trends and Emerging Topics for Action

    Science.gov (United States)

    2015-03-01

    between the air force research lab and antelope Valley College (aVC) results in increases in number of scientists, engi- neers, and technicians from...guiding document, tool, or resource should address best prac- tices for project valuation , what types of formalized arrangements are acceptable, and

  18. WIPP documentation plan

    International Nuclear Information System (INIS)

    Plung, D.L.; Montgomery, T.T.; Glasstetter, S.R.

    1986-01-01

    In support of the programs at the Waste Isolation Pilot Plant (WIPP), the Publications and Procedures Section developed a documentation plan that provides an integrated document hierarchy; further, this plan affords several unique features: 1) the format for procedures minimizes the writing responsibilities of the technical staff and maximizes use of the writing and editing staff; 2) review cycles have been structured to expedite the processing of documents; and 3) the numbers of documents needed to support the program have been appreciably reduced

  19. CASK/MSC/WP PREPARATION SYSTEM DESCRIPTION DOCUMENT

    Energy Technology Data Exchange (ETDEWEB)

    S. Drummond

    2005-04-12

    The purpose of this system description document (SDD) is to establish requirements that drive the design of the Cask/MSC/WP preparation system and their bases to allow the design effort to proceed to license application. This SDD is a living document that will be revised at strategic points as the design matures over time. This SDD identifies the requirements and describes the system design, as they exist at this time, with emphasis on those attributes of the design provided to meet the requirements. This SDD has been developed to be an engineering tool for design control. Accordingly, the primary audience and users are design engineers. This type of SDD both leads and trails the design process. It leads the design process with regard to the flow down of upper tier requirements onto the system. Knowledge of these requirements is essential in performing the design process. This SDD trails the design with regard to the description of the system. The description provided in the SDD is a reflection of the results of the design process to date. This SDD addresses the ''Project Requirements Document'' (PRD) (Canori and Leitner 2003 [DIRS 166275]) requirements. Additional PRD requirements may be cited, as applicable, to drive the design of specific aspects of the system, with justifications provided in the basis. Functional and operational requirements applicable to this system are obtained from the ''Project Functional and Operational Requirements'' (F&OR) (Curry 2004 [DIRS 170557]) document. Other requirements to support the design process have been taken from higher-level requirements documents such as the ''Project Design Criteria Document'' (PDC) (BSC 2004 [DIRS 171599]) and the preclosure safety analyses.

  20. 2002 reference document; Document de reference 2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    This 2002 reference document of the group Areva, provides information on the society. Organized in seven chapters, it presents the persons responsible for the reference document and for auditing the financial statements, information pertaining to the transaction, general information on the company and share capital, information on company operation, changes and future prospects, assets, financial position, financial performance, information on company management and executive board and supervisory board, recent developments and future prospects. (A.L.B.)

  1. A two-sided academic landscape: snapshot of highly-cited documents in Google Scholar (1950-2013

    Directory of Open Access Journals (Sweden)

    Alberto Martín-Martín

    2016-12-01

    Full Text Available The main objective of this paper is to identify and define the core characteristics of the set of highly-cited documents in Google Scholar (document types, language, free availability, sources, and number of versions, on the hypothesis that the wide coverage of this search engine may provide a different portrait of these documents with respect to that offered by traditional bibliographic databases. To do this, a query per year was carried out from 1950 to 2013 identifying the top 1,000 documents retrieved from Google Scholar and obtaining a final sample of 64,000 documents, of which 40% provided a free link to full-text. The results obtained show that the average highly-cited document is a journal or book article (62% of the top 1% most cited documents of the sample, written in English (92.5% of all documents and available online in PDF format (86.0% of all documents. Yet, the existence of errors should be noted, especially when detecting duplicates and linking citations properly. Nonetheless, the fact that the study focused on highly cited papers minimizes the effects of these limitations. Given the high presence of books and, to a lesser extent, of other document types (such as proceedings or reports, the present research concludes that the Google Scholar data offer an original and different vision of the most influential academic documents (measured from the perspective of their citation count, a set composed not only of strictly scientific material (journal articles but also of academic material in its broadest sense.

  2. Semantic Document Library: A Virtual Research Environment for Documents, Data and Workflows Sharing

    Science.gov (United States)

    Kotwani, K.; Liu, Y.; Myers, J.; Futrelle, J.

    2008-12-01

    The Semantic Document Library (SDL) was driven by use cases from the environmental observatory communities and is designed to provide conventional document repository features of uploading, downloading, editing and versioning of documents as well as value adding features of tagging, querying, sharing, annotating, ranking, provenance, social networking and geo-spatial mapping services. It allows users to organize a catalogue of watershed observation data, model output, workflows, as well publications and documents related to the same watershed study through the tagging capability. Users can tag all relevant materials using the same watershed name and find all of them easily later using this tag. The underpinning semantic content repository can store materials from other cyberenvironments such as workflow or simulation tools and SDL provides an effective interface to query and organize materials from various sources. Advanced features of the SDL allow users to visualize the provenance of the materials such as the source and how the output data is derived. Other novel features include visualizing all geo-referenced materials on a geospatial map. SDL as a component of a cyberenvironment portal (the NCSA Cybercollaboratory) has goal of efficient management of information and relationships between published artifacts (Validated models, vetted data, workflows, annotations, best practices, reviews and papers) produced from raw research artifacts (data, notes, plans etc.) through agents (people, sensors etc.). Tremendous scientific potential of artifacts is achieved through mechanisms of sharing, reuse and collaboration - empowering scientists to spread their knowledge and protocols and to benefit from the knowledge of others. SDL successfully implements web 2.0 technologies and design patterns along with semantic content management approach that enables use of multiple ontologies and dynamic evolution (e.g. folksonomies) of terminology. Scientific documents involved with

  3. Documenting Employee Conduct

    Science.gov (United States)

    Dalton, Jason

    2009-01-01

    One of the best ways for a child care program to lose an employment-related lawsuit is failure to document the performance of its employees. Documentation of an employee's performance can provide evidence of an employment-related decision such as discipline, promotion, or discharge. When properly implemented, documentation of employee performance…

  4. Health physics documentation

    International Nuclear Information System (INIS)

    Stablein, G.

    1980-01-01

    When dealing with radioactive material the health physicist receives innumerable papers and documents within the fields of researching, prosecuting, organizing and justifying radiation protection. Some of these papers are requested by the health physicist and some are required by law. The scope, quantity and deposit periods of the health physics documentation at the Karlsruhe Nuclear Research Center are presented and rationalizing methods discussed. The aim of this documentation should be the application of physics to accident prevention, i.e. documentation should protect those concerned and not the health physicist. (H.K.)

  5. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    Directory of Open Access Journals (Sweden)

    Farouk Abd El-Monem

    2017-05-01

    Full Text Available Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA and butyl acrylate (BA. The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leather were studied and evaluated using SEM, shrinkage temperature and the mechanical properties of the pre-tanned leather. The results showed that, the prepared polymers A & C are the best polymers in improving the physical properties of the treated leather. Furthermore, the shrinkage temperature and the mechanical properties of the tanned leather were improved. In addition, a significant enhancement in the texture of the leather treated by the polymers was noticed as proved by scanning electron microscopy (SEM.

  6. Fourier transform infrared spectroscopy and chemometrics for the characterization and discrimination of writing/photocopier paper types: Application in forensic document examinations.

    Science.gov (United States)

    Kumar, Raj; Kumar, Vinay; Sharma, Vishal

    2017-01-05

    The aim of the present work is to explore the non-destructive application of ATR-FTIR technique for characterization and discrimination of paper samples which could be helpful to give forensic aid in resolving legal cases. Twenty-four types of paper brands were purchased from local market in and around Chandigarh, India. All the paper samples were subjected to ATR-FTIR analysis from 400 to 4000cm(-1) wavenumber range. The qualitative feature and Chemometrics of the obtained spectral data are used for characterization and discrimination. Characterization is achieved by matching the peaks with standards of cellulose and inorganic fillers, a usual constituents of paper. Three different regions of IR, i.e. 400-2000cm(-1), 2000-4000cm(-1) and 400-4000cm(-1) were selected for differentiation by Chemometrics analysis. The discrimination is achieved on the basis of three principal components, i.e. PC 1, PC 2 and PC 3. It is observed that maximum discrimination was procured in the wave number range of i.e. 2000-4000cm(-1). Discriminating power was calculated on the basis of qualitative features as well, and it is found that the discrimination of paper samples was better achieved by Chemometrics analysis rather than qualitative features. The discriminating power by Chemometrics is 99.64% and which is larger as ever achieved by any group for present number of samples. The present result confirms that this study will be highly useful in forensic document examination work in the legal cases, where the authenticity of the document is challenged. The results are completely analytical and, therefore, overcome the problem encounter in traditional routine light/radiation scanning methods which are still in practice by various questioned document laboratories. Copyright © 2016 Elsevier B.V. All rights reserved.

  7. Fourier transform infrared spectroscopy and chemometrics for the characterization and discrimination of writing/photocopier paper types: Application in forensic document examinations

    Science.gov (United States)

    Kumar, Raj; Kumar, Vinay; Sharma, Vishal

    2017-01-01

    The aim of the present work is to explore the non-destructive application of ATR-FTIR technique for characterization and discrimination of paper samples which could be helpful to give forensic aid in resolving legal cases. Twenty-four types of paper brands were purchased from local market in and around Chandigarh, India. All the paper samples were subjected to ATR-FTIR analysis from 400 to 4000 cm- 1 wavenumber range. The qualitative feature and Chemometrics of the obtained spectral data are used for characterization and discrimination. Characterization is achieved by matching the peaks with standards of cellulose and inorganic fillers, a usual constituents of paper. Three different regions of IR, i.e. 400-2000 cm- 1, 2000-4000 cm- 1 and 400-4000 cm- 1 were selected for differentiation by Chemometrics analysis. The discrimination is achieved on the basis of three principal components, i.e. PC 1, PC 2 and PC 3. It is observed that maximum discrimination was procured in the wave number range of i.e. 2000-4000 cm- 1. Discriminating power was calculated on the basis of qualitative features as well, and it is found that the discrimination of paper samples was better achieved by Chemometrics analysis rather than qualitative features. The discriminating power by Chemometrics is 99.64% and which is larger as ever achieved by any group for present number of samples. The present result confirms that this study will be highly useful in forensic document examination work in the legal cases, where the authenticity of the document is challenged. The results are completely analytical and, therefore, overcome the problem encounter in traditional routine light/radiation scanning methods which are still in practice by various questioned document laboratories.

  8. What makes papers visible on social media? An analysis of various document characteristics

    Energy Technology Data Exchange (ETDEWEB)

    Zahedi, Z.; Costas, R.; Lariviere, V.; Haustein, S.

    2016-07-01

    In this study we have investigated the relationship between different document characteristics and the number of Mendeley readership counts, tweets, Facebook posts, mentions in blogs and mainstream media for 1.3 million papers published in journals covered by the Web of Science (WoS). It aims to demonstrate that how factors affecting various social media-based indicators differ from those influencing citations and which document types are more popular across different platforms. Our results highlight the heterogeneous nature of altmetrics, which encompasses different types of uses and user groups engaging with research on social media. (Author)

  9. Analysis of Documentation Speed Using Web-Based Medical Speech Recognition Technology: Randomized Controlled Trial.

    Science.gov (United States)

    Vogel, Markus; Kaisers, Wolfgang; Wassmuth, Ralf; Mayatepek, Ertan

    2015-11-03

    Clinical documentation has undergone a change due to the usage of electronic health records. The core element is to capture clinical findings and document therapy electronically. Health care personnel spend a significant portion of their time on the computer. Alternatives to self-typing, such as speech recognition, are currently believed to increase documentation efficiency and quality, as well as satisfaction of health professionals while accomplishing clinical documentation, but few studies in this area have been published to date. This study describes the effects of using a Web-based medical speech recognition system for clinical documentation in a university hospital on (1) documentation speed, (2) document length, and (3) physician satisfaction. Reports of 28 physicians were randomized to be created with (intervention) or without (control) the assistance of a Web-based system of medical automatic speech recognition (ASR) in the German language. The documentation was entered into a browser's text area and the time to complete the documentation including all necessary corrections, correction effort, number of characters, and mood of participant were stored in a database. The underlying time comprised text entering, text correction, and finalization of the documentation event. Participants self-assessed their moods on a scale of 1-3 (1=good, 2=moderate, 3=bad). Statistical analysis was done using permutation tests. The number of clinical reports eligible for further analysis stood at 1455. Out of 1455 reports, 718 (49.35%) were assisted by ASR and 737 (50.65%) were not assisted by ASR. Average documentation speed without ASR was 173 (SD 101) characters per minute, while it was 217 (SD 120) characters per minute using ASR. The overall increase in documentation speed through Web-based ASR assistance was 26% (P=.04). Participants documented an average of 356 (SD 388) characters per report when not assisted by ASR and 649 (SD 561) characters per report when assisted

  10. Source document for waste area groupings at Oak Ridge National Laboratory, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    Osborne, P.L.; Kuhaida, A.J., Jr.

    1996-09-01

    This document serves as a source document for Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and other types of documents developed for and pertaining to Environmental Restoration (ER) Program activities at Oak Ridge National Laboratory (ORNL). It contains descriptions of the (1) regulatory requirements for the ORR ER Program, (2) Oak Ridge Reservation (ORR) ER Program, (3) ORNL site history and characterization, and (4) history and characterization of Waste Area Groupings (WAGS) 1-20. This document was created to save time, effort, and money for persons and organizations drafting documents for the ER Program and to improve consistency in the documents prepared for the program. By eliminating the repetitious use of selected information about the program, this document will help reduce the time and costs associated with producing program documents. By serving as a benchmark for selected information about the ER Program, this reference will help ensure that information presented in future documents is accurate and complete

  11. Influence of Therapeutic Ceftiofur Treatments of Feedlot Cattle on Fecal and Hide Prevalences of Commensal Escherichia coli Resistant to Expanded-Spectrum Cephalosporins, and Molecular Characterization of Resistant Isolates

    Science.gov (United States)

    Griffin, Dee; Kuehn, Larry A.; Brichta-Harhay, Dayna M.

    2013-01-01

    In the United States, the blaCMY-2 gene contained within incompatibility type A/C (IncA/C) plasmids is frequently identified in extended-spectrum-cephalosporin-resistant (ESCr) Escherichia coli strains from both human and cattle sources. Concerns have been raised that therapeutic use of ceftiofur in cattle may increase the prevalence of ESCr E. coli. We report that herd ESCr E. coli fecal and hide prevalences throughout the residency of cattle at a feedlot, including during the period of greatest ceftiofur use at the feedlot, were either not significantly different (P ≥ 0.05) or significantly less (P E. coli shedding that follows ceftiofur injection abated, ceftiofur-injected cattle were no more likely than untreated members of the same herd to shed ESCr E. coli. Pulsed-field gel electrophoresis (PFGE) genotyping, antibiotic resistance phenotyping, screening for presence of the blaCMY-2 gene, and plasmid replicon typing were performed on 312 ESCr E. coli isolates obtained during six sampling periods spanning the 10-month residence of cattle at the feedlot. The identification of only 26 unique PFGE genotypes, 12 of which were isolated during multiple sampling periods, suggests that clonal expansion of feedlot-adapted blaCMY-2 E. coli strains contributed more to the persistence of blaCMY-2 than horizontal transfer of IncA/C plasmids between E. coli strains at this feedlot. We conclude that therapeutic use of ceftiofur at this cattle feedlot did not significantly increase the herd prevalence of ESCr E. coli. PMID:23354706

  12. Standardization Documents

    Science.gov (United States)

    2011-08-01

    Specifications and Standards; Guide Specifications; CIDs; and NGSs . Learn. Perform. Succeed. STANDARDIZATION DOCUMENTS Federal Specifications Commercial...national or international standardization document developed by a private sector association, organization, or technical society that plans ...Maintain lessons learned • Examples: Guidance for application of a technology; Lists of options Learn. Perform. Succeed. DEFENSE HANDBOOK

  13. Survey Report – State Of The Art In Digital Steganography Focusing ASCII Text Documents

    OpenAIRE

    Khan Farhan Rafat; Muhammad Sher

    2010-01-01

    Digitization of analogue signals has opened up new avenues for information hiding and the recent advancements in the telecommunication field has taken up this desire even further. From copper wire to fiber optics, technology has evolved and so are ways of covert channel communication. By “Covert” we mean “anything not meant for the purpose for which it is being used”. Investigation and detection of existence of such cover channel communication has always remained a serious concern of informat...

  14. Using UML and Petri nets for visualization of business document flow

    Directory of Open Access Journals (Sweden)

    Ivana Rábová

    2012-01-01

    Full Text Available The article deals with two principles of business workflow modeling, Petri nets and UML notation, that are the acceptable approaches to business modeling and can be used also for business documents workflow. The special type of Petri nets, WF-nets and UML activity diagrams are used in this article and both modeling ways are presented on the concrete business workflow and then there are presented and specified their advantage and disadvantage for business documents flows. At beginning it is explained the word workflow in context business documents, its features, principles and using in business environment. After that it is clarified that the UML is OMG’s most-used specification, and the way the world models not only application structure, behavior, and architecture, but also business process, workflows and data structure. Activity diagram UML is good way to show how different workflows in the business are managed, how they start, go and stop. Diagrams also show many different decision paths that can be taken from start to finish. State charts can be used as a detail the transitions or changes of states when documents can go through in the business. They show how a documents moves from one state to another and the rules that govern that change. Petri-nets offer a graphical notation for stepwise processes that include choice, iteration, and concurrent execution. Unlike UML Petri nets have an exact mathematical definition of their execution semantics, with a well-developed mathematical theory for process analysis. In the article there are modeled a special type of Petri nets, the WF-nets. The practical part of article incorporates two models of concrete business documents workflows presented in these notations, their comparison and recommendation for using these diagrams in business process management.

  15. The Advancement of Public Awareness, Concerning TRU Waste Characterization, Using a Virtual Document

    International Nuclear Information System (INIS)

    West, T. B.; Burns, T. P.; Estill, W. G.; Riggs, M. J.; Taggart, D. P.; Punjak, W. A.

    2002-01-01

    Building public trust and confidence through openness is a goal of the DOE Carlsbad Field Office for the Waste Isolation Pilot Plant (WIPP). The objective of the virtual document described in this paper is to give the public an overview of the waste characterization steps, an understanding of how waste characterization instrumentation works, and the type and amount of data generated from a batch of drums. The document is intended to be published on a web page and/or distributed at public meetings on CDs. Users may gain as much information as they desire regarding the transuranic (TRU) waste characterization program, starting at the highest level requirements (drivers) and progressing to more and more detail regarding how the requirements are met. Included are links to: drivers (which include laws, permits and DOE Orders); various characterization steps required for transportation and disposal under WIPP's Hazardous Waste Facility Permit; physical/chemical basis for each characterization method; types of data produced; and quality assurance process that accompanies each measurement. Examples of each type of characterization method in use across the DOE complex are included. The original skeleton of the document was constructed in a PowerPoint presentation and included descriptions of each section of the waste characterization program. This original document had a brief overview of Acceptable Knowledge, Non-Destructive Examination, Non-Destructive Assay, Small Quantity sites, and the National Certification Team. A student intern was assigned the project of converting the document to a virtual format and to discuss each subject in depth. The resulting product is a fully functional virtual document that works in a web browser and functions like a web page. All documents that were referenced, linked to, or associated, are included on the virtual document's CD. WIPP has been engaged in a variety of Hazardous Waste Facility Permit modification activities. During the

  16. A DOCUMENT PAUL AUSTER’S NEW YORK TRILOGY

    Directory of Open Access Journals (Sweden)

    Natalia N. Smirnova

    2017-03-01

    Full Text Available The article deals with the way a literary work “creates” a document out of itself, on the example of Paul Auster’s novels. A document here is the report of a character, a private detective who is watching another character (a writer but also the book of a fictional writer who is writing a story of the detective who is watching him, and eventually the book about this whole story. In this case, the search for the other, watching him, is inevitably associated with the search for oneself, self-observation. Biography becomes autobiography, e.g. a document rather than a narrative based on a document. This story becomes projected on the story of Don Quixote (of which “some” Paul Auster, a fictional writer, is writing an essay. The Other is a landmark in the vast desert of fictional worlds where Paul Auster’s Don Quixote wanders alongside other characters of the trilogy. The author may not return from his endless journey through imaginary worlds; his life does not belong to either real life or fiction. He gives life to his characters while remaining invisible himself. Paul Auster’s The New York Trilogy explores such existential situation where the only evidence of the author’s life is a document left by his character. The author leaves a documentary record of a kind about his own existence. It this sense, literature is a document of life and of the endless search for a reason to the existence of an individual who, being not equal to him- or herself, is always the other and never a type or a template.

  17. XML and its impact on content and structure in electronic health care documents.

    Science.gov (United States)

    Sokolowski, R.; Dudeck, J.

    1999-01-01

    Worldwide information networks have the requirement that electronic documents must be easily accessible, portable, flexible and system-independent. With the development of XML (eXtensible Markup Language), the future of electronic documents, health care informatics and the Web itself are about to change. The intent of the recently formed ASTM E31.25 subcommittee, "XML DTDs for Health Care", is to develop standard electronic document representations of paper-based health care documents and forms. A goal of the subcommittee is to work together to enhance existing levels of interoperability among the various XML/SGML standardization efforts, products and systems in health care. The ASTM E31.25 subcommittee uses common practices and software standards to develop the implementation recommendations for XML documents in health care. The implementation recommendations are being developed to standardize the many different structures of documents. These recommendations are in the form of a set of standard DTDs, or document type definitions that match the electronic document requirements in the health care industry. This paper discusses recent efforts of the ASTM E31.25 subcommittee. PMID:10566338

  18. Process Technical Basis Documentation Diagram for a solid-waste processing facility

    International Nuclear Information System (INIS)

    Benar, C.J.; Petersen, C.A.

    1994-02-01

    The Process Technical Basis Documentation Diagram is for a solid-waste processing facility that could be designed to treat, package, and certify contact-handled mixed low-level waste for permanent disposal. The treatment processes include stabilization using cementitious materials and immobilization using a polymer material. The Diagram identifies several engineering/demonstration activities that would confirm the process selection and process design. An independent peer review was conducted at the request of Westinghouse Hanford Company to determine the technical adequacy of the technical approach for waste form development. The peer review panel provided comments and identified documents that it felt were needed in the Diagram as precedence for Title I design. The Diagram is a visual tool to identify traceable documentation of key activities, including those documents suggested by the peer review, and to show how they relate to each other. The Diagram is divided into three sections: (1) the Facility section, which contains documents pertaining to the facility design, (2) the Process Demonstration section, which contains documents pertaining to the process engineering/demonstration work, and 3) the Regulatory section, which contains documents describing the compliance strategy for each acceptance requirement for each feed type, and how this strategy will be implemented

  19. Synthesis document on the long time behavior of packages: operational document ''bituminous'' 2204

    International Nuclear Information System (INIS)

    Tiffreau, C.

    2004-09-01

    This document is realized in the framework of the law of 1991 on the radioactive wastes management. The 2004 synthesis document on long time behavior of bituminous sludges packages is constituted by two documents, the reference document and the operational document. This paper presents the operational model describing the water alteration of the packages and the associated radioelements release, as the gas term source and the swelling associated to the self-irradiation and the bituminous radiolysis. (A.L.B.)

  20. Hiding the tobacco power wall reduces cigarette smoking risk in adolescents: using an experimental convenience store to assess tobacco regulatory options at retail point-of-sale.

    Science.gov (United States)

    Shadel, William G; Martino, Steven C; Setodji, Claude M; Scharf, Deborah M; Kusuke, Daniela; Sicker, Angela; Gong, Min

    2015-11-23

    This experiment tested whether changing the location or visibility of the tobacco power wall in a life sized replica of a convenience store had any effect on adolescents' susceptibility to future cigarette smoking. The study was conducted in the RAND StoreLab (RSL), a life sized replica of a convenience store that was developed to experimentally evaluate how changing aspects of tobacco advertising displays in retail point-of-sale environments influences tobacco use risk and behaviour. A randomised, between-subjects experimental design with three conditions that varied the location or visibility of the tobacco power wall within the RSL was used. The conditions were: cashier (the tobacco power wall was located in its typical position behind the cash register counter); sidewall (the tobacco power wall was located on a sidewall away from the cash register); or hidden (the tobacco power wall was located behind the cashier but was hidden behind an opaque wall). The sample included 241 adolescents. Hiding the tobacco power wall significantly reduced adolescents' susceptibility to future cigarette smoking compared to leaving it exposed (ie, the cashier condition; p=0.02). Locating the tobacco power wall on a sidewall away from the cashier had no effect on future cigarette smoking susceptibility compared to the cashier condition (p=0.80). Hiding the tobacco power wall at retail point-of-sale locations is a strong regulatory option for reducing the impact of the retail environment on cigarette smoking risk in adolescents. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  1. Securing XML Documents

    Directory of Open Access Journals (Sweden)

    Charles Shoniregun

    2004-11-01

    Full Text Available XML (extensible markup language is becoming the current standard for establishing interoperability on the Web. XML data are self-descriptive and syntax-extensible; this makes it very suitable for representation and exchange of semi-structured data, and allows users to define new elements for their specific applications. As a result, the number of documents incorporating this standard is continuously increasing over the Web. The processing of XML documents may require a traversal of all document structure and therefore, the cost could be very high. A strong demand for a means of efficient and effective XML processing has posed a new challenge for the database world. This paper discusses a fast and efficient indexing technique for XML documents, and introduces the XML graph numbering scheme. It can be used for indexing and securing graph structure of XML documents. This technique provides an efficient method to speed up XML data processing. Furthermore, the paper explores the classification of existing methods impact of query processing, and indexing.

  2. Technical approach document

    International Nuclear Information System (INIS)

    1988-04-01

    This document describes the general technical approaches and design criteria adopted by the US Department of Energy (DOE) in order to implement Remedial Action Plans (RAPs) and final designs that comply with EPS standards. This document is a revision to the original document. Major revisions were made to the sections in riprap selection and sizing, and ground-water; only minor revisions were made to the remainder of the document. The US Nuclear Regulatory Commission (NRC) has prepared a Standard Review Plan (NRC-SRP) which describes factors to be considered by the NRC in approving the RAP. Sections 3.0, 4.0, 5.0, and 7.0 of this document are arranged under the same headings as those used in the NRC-SRP. This approach is adopted in order to facilitate joint use of the documents. Section 2.0 (not included in the NRC-SRP) discusses design considerations; Section 3.0 describes surface-water hydrology and erosion control; Section 4.0 describes geotechnical aspects of pile design; Section 5.0 discusses the Alternate Site Selection Process; Section 6.0 deals with radiological issues (in particular, the design of the radon barrier); Section 7.0 discusses protection of groundwater resources; and Section 8.0 discusses site design criteria for the RAC

  3. SALES DOCUMENTS IN PURCHASE AND SALE TRANSACTIONS OF STEAM COAL IN POLAND

    Directory of Open Access Journals (Sweden)

    Anna Galik

    2015-06-01

    Full Text Available This article describes sales documents in purchase and sale transactions of steam coal in Poland. In relation to introducing the excise tax on steam coal at the beginning in 2012, additional requirements appeared in documents during the sale of goods. Now the seller is obliged to issue various documents depending on the type of the buyer and the destination of goods. The article presents the coal sales documents for households, companies with no tax payment and companies with tax payment. The purpose of this article is to present complicated and time-consuming procedures during the sale of goods, as a result of the current excise tax on steam coal. In conclusion the author identify new solutions that are beneficial for the seller and the buyer.

  4. Experimental determination of chosen document elements parameters from raster graphics sources

    Directory of Open Access Journals (Sweden)

    Jiří Rybička

    2010-01-01

    Full Text Available Visual appearance of documents and their formal quality is considered to be as important as the content quality. Formal and typographical quality of documents can be evaluated by an automated system that processes raster images of documents. A document is described by a formal model that treats a page as an object and also as a set of elements, whereas page elements include text and graphic object. All elements are described by their parameters depending on elements’ type. For future evaluation, mainly text objects are important. This paper describes the experimental determination of chosen document elements parameters from raster images. Techniques for image processing are used, where an image is represented as a matrix of dots and parameter values are extracted. Algorithms for parameter extraction from raster images were designed and were aimed mainly at typographical parameters like indentation, alignment, font size or spacing. Algorithms were tested on a set of 100 images of paragraphs or pages and provide very good results. Extracted parameters can be directly used for typographical quality evaluation.

  5. Enterprise Document Management

    Data.gov (United States)

    US Agency for International Development — The function of the operation is to provide e-Signature and document management support for Acquisition and Assisitance (A&A) documents including vouchers in...

  6. Tank Monitoring and Document control System (TMACS) As Built Software Design Document

    International Nuclear Information System (INIS)

    GLASSCOCK, J.A.

    2000-01-01

    This document describes the software design for the Tank Monitor and Control System (TMACS). This document captures the existing as-built design of TMACS as of November 1999. It will be used as a reference document to the system maintainers who will be maintaining and modifying the TMACS functions as necessary. The heart of the TMACS system is the ''point-processing'' functionality where a sample value is received from the field sensors and the value is analyzed, logged, or alarmed as required. This Software Design Document focuses on the point-processing functions

  7. Documents issued by the french ministry of foreign affairs and international development

    CERN Multimedia

    2015-01-01

    New provisions and reminder In the interests of simplifying administrative procedures and formalities, the French Ministry of Foreign Affairs and International Development (hereinafter referred to as “the MAE”) and CERN have decided that members of the CERN personnel domiciled in France, whether of French nationality or long-term residents1, will no longer be issued with an AR- or FR-type “attestation de fonctions”. The MAE also wishes to remind members of the personnel of the following rules concerning the documents that it issues and to point out that compliance with these rules is essential for the proper operation of all international organisations established in France.  This notification replaces the one that appeared in issue 19/2006 of the Bulletin (ref. CERN/DSU-DO/RH/13173/Rev.2). 1.         Types of document and use a)   Special CD-, FI- and AT-type residence ...

  8. CNEA's quality system documentation

    International Nuclear Information System (INIS)

    Mazzini, M.M.; Garonis, O.H.

    1998-01-01

    Full text: To obtain an effective and coherent documentation system suitable for CNEA's Quality Management Program, we decided to organize the CNEA's quality documentation with : a- Level 1. Quality manual. b- Level 2. Procedures. c-Level 3. Qualities plans. d- Level 4: Instructions. e- Level 5. Records and other documents. The objective of this work is to present a standardization of the documentation of the CNEA's quality system of facilities, laboratories, services, and R and D activities. Considering the diversity of criteria and formats for elaboration the documentation by different departments, and since ultimately each of them generally includes the same quality management policy, we proposed the elaboration of a system in order to improve the documentation, avoiding unnecessary time wasting and costs. This will aloud each sector to focus on their specific documentation. The quality manuals of the atomic centers fulfill the rule 3.6.1 of the Nuclear Regulatory Authority, and the Safety Series 50-C/SG-Q of the International Atomic Energy Agency. They are designed by groups of competent and highly trained people of different departments. The normative procedures are elaborated with the same methodology as the quality manuals. The quality plans which describe the organizational structure of working group and the appropriate documentation, will asses the quality manuals of facilities, laboratories, services, and research and development activities of atomic centers. The responsibilities for approval of the normative documentation are assigned to the management in charge of the administration of economic and human resources in order to fulfill the institutional objectives. Another improvement aimed to eliminate unnecessary invaluable processes is the inclusion of all quality system's normative documentation in the CNEA intranet. (author) [es

  9. Changing Landscapes in Documentation Efforts: Civil Society Documentation of Serious Human Rights Violations

    Directory of Open Access Journals (Sweden)

    Brianne McGonigle Leyh

    2017-04-01

    Full Text Available Wittingly or unwittingly, civil society actors have long been faced with the task of documenting serious human rights violations. Thirty years ago, such efforts were largely organised by grassroots movements, often with little support or funding from international actors. Sharing information and best practices was difficult. Today that situation has significantly changed. The purpose of this article is to explore the changing landscape of civil society documentation of serious human rights violations, and what that means for standardising and professionalising documentation efforts. Using the recent Hisséne Habré case as an example, this article begins by looking at how civil society documentation can successfully influence an accountability process. Next, the article touches upon barriers that continue to impede greater documentation efforts. The article examines the changing landscape of documentation, focusing on technological changes and the rise of citizen journalism and unofficial investigations, using Syria as an example, as well as on the increasing support for documentation efforts both in Syria and worldwide. The changing landscape has resulted in the proliferation of international documentation initiatives aimed at providing local civil society actors guidelines and practical assistance on how to recognise, collect, manage, store and use information about serious human rights violations, as well as on how to minimise the risks associated with the documentation of human rights violations. The recent initiatives undertaken by international civil society, including those by the Public International Law & Policy Group, play an important role in helping to standardise and professionalise documentation work and promote the foundational principles of documentation, namely the ‘do no harm’ principle, and the principles of informed consent and confidentiality. Recognising the drawback that greater professionalisation may bring, it

  10. Imaginary Documentary: reflecting upon contemporary documental photography Documentário Imaginário: reflexões sobre a fotografia documental contemporânea

    Directory of Open Access Journals (Sweden)

    Kátia Hallak Lombardi

    2008-01-01

    Full Text Available This article pursues the idea of an Imaginary Documentary – a possible new inflexion on the practices of contemporary documental photography. The text establishes its theoretical foundations through a forthcoming approach of the discussions about documental photography to the concept of imaginary, by Gilbert Durand, and the notion of Imaginary Museum, by André Malraux. Photographers that are part of documental photography history are the elected objects in which we shall confront the potentialities of the Imaginary Documentary. Este artigo tem como propósito buscar a estruturação da idéia de Documentário Imaginário – uma possível inflexão na prática da fotografia documental contemporânea. O texto assenta suas bases teóricas por meio da aproximação de reflexões sobre a fotografia documental ao conceito de imaginário em Gilbert Durand e à noção de Museu Imaginário de André Malraux. Fotógrafos que fazem parte da história da fotografia documental são os objetos eleitos para aferir as potencialidades do Documentário Imaginário.

  11. Threat Based Risk Assessment for Enterprise Networks

    Science.gov (United States)

    2016-02-15

    devastating insider attacks, Edward Snowden exfiltrated 1.7 million documents from the National Security Agency [1]. That same year, the security company...Weller-Fahy, and Tamara Yu. References 1. G. Greenwald, No Place to Hide: Edward Snowden , the NSA, and the U.S. Surveillance State. London: Hamish

  12. Optical image-hiding method with false information disclosure based on the interference principle and partial-phase-truncation in the fractional Fourier domain

    International Nuclear Information System (INIS)

    Dai, Chaoqing; Wang, Xiaogang; Zhou, Guoquan; Chen, Junlang

    2014-01-01

    An image-hiding method based on the optical interference principle and partial-phase-truncation in the fractional Fourier domain is proposed. The primary image is converted into three phase-only masks (POMs) using an analytical algorithm involved partial-phase-truncation and a fast random pixel exchange process. A procedure of a fake silhouette for a decryption key is suggested to reinforce the encryption and give a hint of the position of the key. The fractional orders of FrFT effectively enhance the security of the system. In the decryption process, the POM with false information and the other two POMs are, respectively, placed in the input and fractional Fourier planes to recover the primary image. There are no unintended information disclosures and iterative computations involved in the proposed method. Simulation results are presented to verify the validity of the proposed approach. (letters)

  13. Document management in engineering construction

    International Nuclear Information System (INIS)

    Liao Bing

    2008-01-01

    Document management is one important part of systematic quality management, which is one of the key factors to ensure the construction quality. In the engineering construction, quality management and document management shall interwork all the time, to ensure the construction quality. Quality management ensures that the document is correctly generated and adopted, and thus the completeness, accuracy and systematicness of the document satisfy the filing requirements. Document management ensures that the document is correctly transferred during the construction, and various testimonies such as files and records are kept for the engineering construction and its quality management. This paper addresses the document management in the engineering construction based on the interwork of the quality management and document management. (author)

  14. CORPORATE DOCUMENTS AND FILES: FROM THE DAY-BY-DAY ORGANIZATION TO THE EFFECTIVE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Elisabeth Adriana Dudziak

    2010-09-01

    Full Text Available The aim of this paper is to present and discuss the process of planning, organization and management of business archives and documents from the standpoint of the professional of executive secretary. It begins from the introduction to current scenario with focus on global dynamics, the service demands and the essential role of executive secretary in the company. It presents a theoretical review of key concepts and standards internationally adopted. The sets out the need of carry more than the simple organization of archives, management of documents and archives. Based on this premise, we present conceptual bases for implantation of a Service of Documentation and Archive, main document types in companies, and criteria of classification and document custody temporality. We discuss about the importance of strategic planning, tactical and operational management of archives. Finally, we present a description of the steps of the implantation of an Archive and Documentation Service, and the code of ethics of document manager.

  15. Document Level Assessment of Document Retrieval Systems in a Pairwise System Evaluation

    Science.gov (United States)

    Rajagopal, Prabha; Ravana, Sri Devi

    2017-01-01

    Introduction: The use of averaged topic-level scores can result in the loss of valuable data and can cause misinterpretation of the effectiveness of system performance. This study aims to use the scores of each document to evaluate document retrieval systems in a pairwise system evaluation. Method: The chosen evaluation metrics are document-level…

  16. Shoulder dystocia documentation: an evaluation of a documentation training intervention.

    Science.gov (United States)

    LeRiche, Tammy; Oppenheimer, Lawrence; Caughey, Sharon; Fell, Deshayne; Walker, Mark

    2015-03-01

    To evaluate the quality and content of nurse and physician shoulder dystocia delivery documentation before and after MORE training in shoulder dystocia management skills and documentation. Approximately 384 charts at the Ottawa Hospital General Campus involving a diagnosis of shoulder dystocia between the years of 2000 and 2006 excluding the training year of 2003 were identified. The charts were evaluated for 14 key components derived from a validated instrument. The delivery notes were then scored based on these components by 2 separate investigators who were blinded to delivery note author, date, and patient identification to further quantify delivery record quality. Approximately 346 charts were reviewed for physician and nurse delivery documentation. The average score for physician notes was 6 (maximum possible score of 14) both before and after the training intervention. The nurses' average score was 5 before and after the training intervention. Negligible improvement was observed in the content and quality of shoulder dystocia documentation before and after nurse and physician training.

  17. Understanding and Detecting Supporting Arguments of Diverse Types

    OpenAIRE

    Hua, Xinyu; Wang, Lu

    2017-01-01

    We investigate the problem of sentence-level supporting argument detection from relevant documents for user-specified claims. A dataset containing claims and associated citation articles is collected from online debate website idebate.org. We then manually label sentence-level supporting arguments from the documents along with their types as study, factual, opinion, or reasoning. We further characterize arguments of different types, and explore whether leveraging type information can facilita...

  18. Tank Monitoring and Document control System (TMACS) As Built Software Design Document

    Energy Technology Data Exchange (ETDEWEB)

    GLASSCOCK, J.A.

    2000-01-27

    This document describes the software design for the Tank Monitor and Control System (TMACS). This document captures the existing as-built design of TMACS as of November 1999. It will be used as a reference document to the system maintainers who will be maintaining and modifying the TMACS functions as necessary. The heart of the TMACS system is the ''point-processing'' functionality where a sample value is received from the field sensors and the value is analyzed, logged, or alarmed as required. This Software Design Document focuses on the point-processing functions.

  19. Toward Documentation of Program Evolution

    DEFF Research Database (Denmark)

    Vestdam, Thomas; Nørmark, Kurt

    2005-01-01

    The documentation of a program often falls behind the evolution of the program source files. When this happens it may be attractive to shift the documentation mode from updating the documentation to documenting the evolution of the program. This paper describes tools that support the documentatio....... It is concluded that our approach can help revitalize older documentation, and that discovery of the fine grained program evolution steps help the programmer in documenting the evolution of the program....

  20. Web document engineering

    International Nuclear Information System (INIS)

    White, B.

    1996-05-01

    This tutorial provides an overview of several document engineering techniques which are applicable to the authoring of World Wide Web documents. It illustrates how pre-WWW hypertext research is applicable to the development of WWW information resources

  1. Knowledge Graphs as Context Models: Improving the Detection of Cross-Language Plagiarism with Paraphrasing

    OpenAIRE

    Franco-Salvador, Marc; Gupta, Parth; Rosso, Paolo

    2013-01-01

    Cross-language plagiarism detection attempts to identify and extract automatically plagiarism among documents in different languages. Plagiarized fragments can be translated verbatim copies or may alter their structure to hide the copying, which is known as paraphrasing and is more difficult to detect. In order to improve the paraphrasing detection, we use a knowledge graph-based approach to obtain and compare context models of document fragments in different languages. Experimental results i...

  2. Documents preparation and review

    International Nuclear Information System (INIS)

    1999-01-01

    Ignalina Safety Analysis Group takes active role in assisting regulatory body VATESI to prepare various regulatory documents and reviewing safety reports and other documentation presented by Ignalina NPP in the process of licensing of unit 1. The list of main documents prepared and reviewed is presented

  3. Documentation: Records and Reports.

    Science.gov (United States)

    Akers, Michael J

    2017-01-01

    This article deals with documentation to include the beginning of documentation, the requirements of Good Manufacturing Practice reports and records, and the steps that can be taken to minimize Good Manufacturing Practice documentation problems. It is important to remember that documentation for 503a compounding involves the Formulation Record, Compounding Record, Standard Operating Procedures, Safety Data Sheets, etc. For 503b outsourcing facilities, compliance with Current Good Manufacturing Practices is required, so this article is applicable to them. For 503a pharmacies, one can see the development and modification of Good Manufacturing Practice and even observe changes as they are occurring in 503a documentation requirements and anticipate that changes will probably continue to occur. Copyright© by International Journal of Pharmaceutical Compounding, Inc.

  4. Implementation of a Document Management System in an Operating Nuclear Power Plan

    International Nuclear Information System (INIS)

    Martinez Ladron de Guevara, J.

    1996-01-01

    The difficulty of implementing a document management system in an operating nuclear power plant basically lies in the high volume of information to be handled, in the different storage devices used and in the complexity of relations existing between the documentation and the physical elements of the facility. The documentation used in a power plant, mainly technical, is often stored on different devices (paper, microfilm, aperture cards, test files, vector files, raster files, etc) and usually features various identification criteria (engineering, manufacturing, plant staff, etc). Consequently, the system must be aimed at the management of multiformatted documentation, providing appropriate means of identification, capture and display for each case. The document management system must satisfy all information needs of each department of the plant, and should be adapted to the work cycles of the plant. Moreover, it should be integrated into other computer application in operation (maintenance, operation, procurement, etc), so that links can be established between the documentation and configuration elements. Although this is a complex procedure in operating power plants, there are integrating tools that facilitate the gradual implementation of this type of system. (Author)

  5. Instructions for submittal and control of FFTF design documents and design related documentation

    International Nuclear Information System (INIS)

    Grush, R.E.

    1976-10-01

    This document provides the system and requirements for management of FFTF technical data prepared by Westinghouse Hanford (HEDL), and design contractors, the construction contractor and lower tier equipment suppliers. Included in this document are provisions for the review, approval, release, change control, and accounting of FFTF design disclosure and base documentation. Also included are provisions for submittal of other design related documents for review and approval consistent with applicable requirements of RDT-Standard F 2-2, ''Quality Assurance Program Requirements.''

  6. Milestone Completion Report WBS 1.3.5.05 ECP/VTK-m FY17Q2 [MS-17/01] Better Dynamic Types Design SDA05-1

    Energy Technology Data Exchange (ETDEWEB)

    Moreland, Kenneth D.

    2017-04-01

    The FY17Q2 milestone of the ECP/VTK-m project, which is the first milestone, includes the completion of design documents for the introduction of virtual methods into the VTK-m framework. Specifically, the ability from within the code of a device (e.g. GPU or Xeon Phi) to jump to a virtual method specified at run time. This change will enable us to drastically reduce the compile time and the executable code size for the VTK-m library. Our first design introduced the idea of adding virtual functions to classes that are used during algorithm execution. (Virtual methods were previously banned from the so called execution environment.) The design was straightforward. VTK-m already has the generic concepts of an “array handle” that provides a uniform interface to memory of different structures and an “array portal” that provides generic access to said memory. These array handles and portals use C++ templating to adjust them to different memory structures. This composition provides a powerful ability to adapt to data sources, but requires knowing static types. The proposed design creates a template specialization of an array portal that decorates another array handle while hiding its type. In this way we can wrap any type of static array handle and then feed it to a single compiled instance of a function. The second design focused on the mechanics of implementing virtual methods on parallel devices with a focus on CUDA. Our initial experiments on CUDA showed a very large overhead for using virtual C++ classes with virtual methods, the standard approach. Instead, we are using an alternate method provided by C that uses function pointers. With the completion of this milestone, we are able to move to the implementation of objects with virtual (like) methods. The upshot will be much faster compile times and much smaller library/executable sizes.

  7. Documenting clinical pharmacist intervention before and after the introduction of a web-based tool.

    Science.gov (United States)

    Nurgat, Zubeir A; Al-Jazairi, Abdulrazaq S; Abu-Shraie, Nada; Al-Jedai, Ahmed

    2011-04-01

    To develop a database for documenting pharmacist intervention through a web-based application. The secondary endpoint was to determine if the new, web-based application provides any benefits with regards to documentation compliance by clinical pharmacists and ease of calculating cost savings compared with our previous method of documenting pharmacist interventions. A tertiary care hospital in Saudi Arabia. The documentation of interventions using a web-based documentation application was retrospectively compared with previous methods of documentation of clinical pharmacists' interventions (multi-user PC software). The number and types of interventions recorded by pharmacists, data mining of archived data, efficiency, cost savings, and the accuracy of the data generated. The number of documented clinical interventions increased from 4,926, using the multi-user PC software, to 6,840 for the web-based application. On average, we observed 653 interventions per clinical pharmacist using the web-based application, which showed an increase compared to an average of 493 interventions using the old multi-user PC software. However, using a paired Student's t-test there was no statistical significance difference between the two means (P = 0.201). Using a χ² test, which captured management level and the type of system used, we found a strong effect of management level (P educational level and the number of interventions documented (P = 0.045). The mean ± SD time required to document an intervention using the web-based application was 66.55 ± 8.98 s. Using the web-based application, 29.06% of documented interventions resulted in cost-savings, while using the multi-user PC software only 4.75% of interventions did so. The majority of cost savings across both platforms resulted from the discontinuation of unnecessary drugs and a change in dosage regimen. Data collection using the web-based application was consistently more complete when compared to the multi-user PC software

  8. Extended Subject Access to Hypertext Online Documentation. Part III: The Document-Boundaries Problem.

    Science.gov (United States)

    Girill, T. R.

    1991-01-01

    This article continues the description of DFT (Document, Find, Theseus), an online documentation system that provides computer-managed on-demand printing of software manuals as well as the interactive retrieval of reference passages. Document boundaries in the hypertext database are discussed, search vocabulary complexities are described, and text…

  9. Defects in UV-vis-NIR reflectance spectra as method for forgery detections in writing documents

    Energy Technology Data Exchange (ETDEWEB)

    Somma, F; Aloe, P; Schirripa Spagnolo, G

    2010-11-01

    Documents have taken up a very important place in our society. Frauds committed in connection with documents are not at all uncommon, and, in fact, represent a very large domain of the forensic science called 'questioned documents'. In the field of forensic examination of questioned documents, the legitimacy of an ink entry is often an essential question. A common type of forgery consists in materially altering an existing writing or adding a new writing. These changes can be characterized by means of optical spectroscopy. The aim of this work is to perform the UV-vis-NIR reflectance spectrophotometry to analyze a range of blue and black commercial ballpoint pens, in order to investigate the discriminating abilities of the different inks found on the same document.

  10. Synthesis document on the long life behavior of packages: reference operational document ''CSD-C'' 2004

    International Nuclear Information System (INIS)

    Helie, M.

    2004-12-01

    This document is realized in the framework of the law of 1991 on the radioactive wastes management. The 2004 synthesis document on long time behavior of standard packages of compacted wastes is constituted by two documents, the reference document and the operational document. This paper presents the operational model describing the packages alteration by the water and the associated radionuclide release. (A.L.B.)

  11. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ General - CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. LHC Symposiums Management - CB - MB - FB - FMC Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2006 Annual reviews are posted.   CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat a...

  12. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ General - CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. LHC Symposiums Management - CB - MB - FB - FMC Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2006 Annual reviews are posted. CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat about the natu...

  13. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ General - CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. LHC Symposiums Management - CB - MB - FB - FMC Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2006 Annual reviews are posted. CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat about the natur...

  14. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ Management- CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. Management - CB - MB - FB Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2007 Annual reviews are posted. CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat about the nature of em¬pl...

  15. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ Management- CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. Management - CB - MB - FB Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2007 Annual reviews are posted. CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat about the nature of employment and ...

  16. CMS DOCUMENTATION

    CERN Multimedia

    CMS TALKS AT MAJOR MEETINGS The agenda and talks from major CMS meetings can now be electronically accessed from the iCMS Web site. The following items can be found on: http://cms.cern.ch/iCMS/ General - CMS Weeks (Collaboration Meetings), CMS Weeks Agendas The talks presented at the Plenary Sessions. LHC Symposiums Management - CB - MB - FB - FMC Agendas and minutes are accessible to CMS members through their AFS account (ZH). However some linked documents are restricted to the Board Members. FB documents are only accessible to FB members. LHCC The talks presented at the ‘CMS Meetings with LHCC Referees’ are available on request from the PM or MB Country Representative. Annual Reviews The talks presented at the 2006 Annual reviews are posted. CMS DOCUMENTS It is considered useful to establish information on the first employment of CMS doctoral students upon completion of their theses. Therefore it is requested that Ph.D students inform the CMS Secretariat about the na...

  17. Embedding the shapes of regions of interest into a Clinical Document Architecture document.

    Science.gov (United States)

    Minh, Nguyen Hai; Yi, Byoung-Kee; Kim, Il Kon; Song, Joon Hyun; Binh, Pham Viet

    2015-03-01

    Sharing a medical image visually annotated by a region of interest with a remotely located specialist for consultation is a good practice. It may, however, require a special-purpose (and most likely expensive) system to send and view them, which is an unfeasible solution in developing countries such as Vietnam. In this study, we design and implement interoperable methods based on the HL7 Clinical Document Architecture and the eXtensible Markup Language Stylesheet Language for Transformation standards to seamlessly exchange and visually present the shapes of regions of interest using web browsers. We also propose a new integration architecture for a Clinical Document Architecture generator that enables embedding of regions of interest and simultaneous auto-generation of corresponding style sheets. Using the Clinical Document Architecture document and style sheet, a sender can transmit clinical documents and medical images together with coordinate values of regions of interest to recipients. Recipients can easily view the documents and display embedded regions of interest by rendering them in their web browser of choice. © The Author(s) 2014.

  18. The management of online resources and long-term saving of electronic documents by transfer into the digital space

    Directory of Open Access Journals (Sweden)

    Marius Daniel MAREŞ

    2011-12-01

    The electronic archive refers to the electronic storage system, along with the totality of electronic-type stored documents, while using as storage support any environment that can support storing and from which an electronic document can be presented.

  19. Television system for verification and documentation of treatment fields during intraoperative radiation therapy

    International Nuclear Information System (INIS)

    Fraass, B.A.; Harrington, F.S.; Kinsella, T.J.; Sindelar, W.F.

    1983-01-01

    Intraoperative radiation therapy (IORT) involves direct treatment of tumors or tumor beds with large single doses of radiation. The verification of the area to be treated before irradiation and the documentation of the treated area are critical for IORT, just as for other types of radiation therapy. A television system which allows the target area to be directly imaged immediately before irradiation has been developed. Verification and documentation of treatment fields has made the IORT television system indispensable

  20. Human Document Project

    NARCIS (Netherlands)

    de Vries, Jeroen; Abelmann, Leon; Manz, A; Elwenspoek, Michael Curt

    2012-01-01

    “The Human Document Project‿ is a project which tries to answer all of the questions related to preserving information about the human race for tens of generations of humans to come or maybe even for a future intelligence which can emerge in the coming thousands of years. This document mainly

  1. LCS Content Document Application

    Science.gov (United States)

    Hochstadt, Jake

    2011-01-01

    My project at KSC during my spring 2011 internship was to develop a Ruby on Rails application to manage Content Documents..A Content Document is a collection of documents and information that describes what software is installed on a Launch Control System Computer. It's important for us to make sure the tools we use everyday are secure, up-to-date, and properly licensed. Previously, keeping track of the information was done by Excel and Word files between different personnel. The goal of the new application is to be able to manage and access the Content Documents through a single database backed web application. Our LCS team will benefit greatly with this app. Admin's will be able to login securely to keep track and update the software installed on each computer in a timely manner. We also included exportability such as attaching additional documents that can be downloaded from the web application. The finished application will ease the process of managing Content Documents while streamlining the procedure. Ruby on Rails is a very powerful programming language and I am grateful to have the opportunity to build this application.

  2. NoSQL: collection document and cloud by using a dynamic web query form

    Science.gov (United States)

    Abdalla, Hemn B.; Lin, Jinzhao; Li, Guoquan

    2015-07-01

    Mongo-DB (from "humongous") is an open-source document database and the leading NoSQL database. A NoSQL (Not Only SQL, next generation databases, being non-relational, deal, open-source and horizontally scalable) presenting a mechanism for storage and retrieval of documents. Previously, we stored and retrieved the data using the SQL queries. Here, we use the MonogoDB that means we are not utilizing the MySQL and SQL queries. Directly importing the documents into our Drives, retrieving the documents on that drive by not applying the SQL queries, using the IO BufferReader and Writer, BufferReader for importing our type of document files to my folder (Drive). For retrieving the document files, the usage is BufferWriter from the particular folder (or) Drive. In this sense, providing the security for those storing files for what purpose means if we store the documents in our local folder means all or views that file and modified that file. So preventing that file, we are furnishing the security. The original document files will be changed to another format like in this paper; Binary format is used. Our documents will be converting to the binary format after that direct storing in one of our folder, that time the storage space will provide the private key for accessing that file. Wherever any user tries to discover the Document files means that file data are in the binary format, the document's file owner simply views that original format using that personal key from receive the secret key from the cloud.

  3. The changes in caregivers' perceptions about the quality of information and benefits of nursing documentation associated with the introduction of an electronic documentation system in a nursing home.

    Science.gov (United States)

    Munyisia, Esther N; Yu, Ping; Hailey, David

    2011-02-01

    To date few studies have compared nursing home caregivers' perceptions about the quality of information and benefits of nursing documentation in paper and electronic formats. With the increased interest in the use of information technology in nursing homes, it is important to obtain information on the benefits of newer approaches to nursing documentation so as to inform investment, organisational and care service decisions in the aged care sector. This study aims to investigate caregivers' perceptions about the quality of information and benefits of nursing documentation before and after the introduction of an electronic documentation system in a nursing home. A self-administered questionnaire survey was conducted three months before, and then six, 18 and 31 months after the introduction of an electronic documentation system. Further evidence was obtained through informal discussions with caregivers. Scores for questionnaire responses showed that the benefits of the electronic documentation system were perceived by the caregivers as provision of more accurate, legible and complete information, and reduction of repetition in data entry, with consequential managerial benefits. However, caregivers' perceptions of relevance and reliability of information, and of their communication and decision-making abilities were perceived to be similar either using an electronic or a paper-based documentation system. Improvement in some perceptions about the quality of information and benefits of nursing documentation was evident in the measurement conducted six months after the introduction of the electronic system, but were not maintained 18 or 31 months later. The electronic documentation system was perceived to perform better than the paper-based system in some aspects, with subsequent benefits to management of aged care services. In other areas, perceptions of additional benefits from the electronic documentation system were not maintained. In a number of attributes, there

  4. Foreign patent documentation and information research

    International Nuclear Information System (INIS)

    Wang Tongsheng; Wu Xianfeng; Liu Jia; Cao Jifen; Song Tianbao; Feng Beiyuan; Zhang Baozhu

    2014-01-01

    Patent documentations are important scientific and technical documentations, which gather legal information, technical information and economic information together. According to WIPO forecasts, making full use of patent documentation can save 40% of research funding and 60% of the study period. Foreign patent documentations are the world's most valuable patent documentations, and many original technologies that have significant influence are first disclosed in foreign patent documentation. Studying and making use of foreign patent documentations can improve our starting point of scientific and technological innovation, and reduce the research investment. This paper analyzes foreign patent documentation and, combining with the actual development of nuclear technology in our country, makes specific recommendations for patent documentation research. (authors)

  5. La Documentation photographique

    Directory of Open Access Journals (Sweden)

    Magali Hamm

    2009-03-01

    Full Text Available La Documentation photographique, revue destinée aux enseignants et étudiants en histoire-géographie, place l’image au cœur de sa ligne éditoriale. Afin de suivre les évolutions actuelles de la géographie, la collection propose une iconographie de plus en plus diversifiée : cartes, photographies, mais aussi caricatures, une de journal ou publicité, toutes étant considérées comme un document géographique à part entière. Car l’image peut se faire synthèse ; elle peut au contraire montrer les différentes facettes d’un objet ; souvent elle permet d’incarner des phénomènes géographiques. Associées à d’autres documents, les images aident les enseignants à initier leurs élèves à des raisonnements géographiques complexes. Mais pour apprendre à les lire, il est fondamental de les contextualiser, de les commenter et d’interroger leur rapport au réel.The Documentation photographique, magazine dedicated to teachers and students in History - Geography, places the image at the heart of its editorial line. In order to follow the evolutions of Geography, the collection presents a more and more diversified iconography: maps, photographs, but also drawings or advertisements, all this documents being considered as geographical ones. Because image can be a synthesis; on the contrary it can present the different facets of a same object; often it enables to portray geographical phenomena. Related to other documents, images assist the teachers in the students’ initiation to complex geographical reasoning. But in order to learn how to read them, it is fundamental to contextualize them, comment them and question their relations with reality.

  6. Multiple sclerosis documentation system (MSDS): moving from documentation to management of MS patients.

    Science.gov (United States)

    Ziemssen, Tjalf; Kempcke, Raimar; Eulitz, Marco; Großmann, Lars; Suhrbier, Alexander; Thomas, Katja; Schultheiss, Thorsten

    2013-09-01

    The long disease duration of multiple sclerosis and the increasing therapeutic options require a individualized therapeutic approach which should be carefully documented over years of observation. To switch from MS documentation to an innovative MS management, new computer- and internet-based tools could be implemented as we could demonstrate with the novel computer-based patient management system "multiple sclerosis management system 3D" (MSDS 3D). MSDS 3D allows documentation and management of visit schedules and mandatory examinations via defined study modules by integration of data input from various sources (patients, attending physicians and MS nurses). It provides forms for the documentation of patient visits as well as clinical and diagnostic findings. Information can be collected via interactive touch screens. Specific modules allow the management of highly efficacious treatments as natalizumab or fingolimod. MSDS can be used to transfer the documented data to databases as, e.g. the registry of the German MS society or REGIMS. MSDS has already been implemented successfully in clinical practice and is currently being evaluated in a multicenter setting. High-quality management and documentation are crucial for improvements in clinical practice and research work.

  7. Application of Laser Scanning for Creating Geological Documentation

    Directory of Open Access Journals (Sweden)

    Buczek Michał

    2018-01-01

    Full Text Available A geological documentation is based on the analyses obtained from boreholes, geological exposures, and geophysical methods. It consists of text and graphic documents, containing drilling sections, vertical crosssections through the deposit and various types of maps. The surveying methods (such as LIDAR can be applied in measurements of exposed rock layers, presented in appendices to the geological documentation. The laser scanning allows obtaining a complete profile of exposed surfaces in a short time and with a millimeter accuracy. The possibility of verifying the existing geological cross-section with laser scanning was tested on the example of the AGH experimental mine. The test field is built of different lithological rocks. Scans were taken from a single station, under favorable measuring conditions. The analysis of the signal intensity allowed to divide point cloud into separate geological layers. The results were compared with the geological profiles of the measured object. The same approach was applied to the data from the Vietnamese hard coal open pit mine Coc Sau. The thickness of exposed coal bed deposits and gangue layers were determined from the obtained data (point cloud in combination with the photographs. The results were compared with the geological cross-section.

  8. SRS ECOLOGY ENVIRONMENTAL INFORMATION DOCUMENT

    Energy Technology Data Exchange (ETDEWEB)

    Wike, L; Doug Martin, D; Eric Nelson, E; Nancy Halverson, N; John Mayer, J; Michael Paller, M; Rodney Riley, R; Michael Serrato, M

    2006-03-01

    The SRS Ecology Environmental Information Document (EEID) provides a source of information on the ecology of Savannah River Site (SRS). The SRS is a U.S. Department of Energy (DOE)--owned property on the upper Atlantic Coastal Plain of South Carolina, centered approximately 40 kilometers (25 miles) southeast of Augusta, Georgia. The entire site was designated a National Environmental Research Park in 1972 by the Atomic Energy Commission, the predecessor of DOE. This document summarizes and synthesizes ecological research and monitoring conducted on the three main types of ecosystems found at SRS: terrestrial, wetland and aquatic. It also summarizes the available information on the threatened and endangered species found on the Savannah River Site. SRS is located along the Savannah River and encompasses an area of 80,267 hectares (310 square miles) in three South Carolina counties. It contains diverse habitats, flora, and fauna. Habitats include upland terrestrial areas, wetlands, streams, reservoirs, and the adjacent Savannah River. These diverse habitats support a variety of plants and animals, including many commercially or recreationally valuable species and several rare, threatened, or endangered species. Soils are the basic terrestrial resource, influencing the development of terrestrial biological communities. Many different soils exist on the SRS, from hydric to well-drained, and from sand to clay. In general, SRS soils are predominantly well-drained loamy sands.

  9. Registration document 2005; Document de reference 2005

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This reference document of Gaz de France provides information and data on the Group activities in 2005: financial informations, business, activities, equipments factories and real estate, trade, capital, organization charts, employment, contracts and research programs. (A.L.B.)

  10. Documentation design for probabilistic risk assessment

    International Nuclear Information System (INIS)

    Parkinson, W.J.; von Herrmann, J.L.

    1985-01-01

    This paper describes a framework for documentation design of probabilistic risk assessment (PRA) and is based on the EPRI document NP-3470 ''Documentation Design for Probabilistic Risk Assessment''. The goals for PRA documentation are stated. Four audiences are identified which PRA documentation must satisfy, and the documentation consistent with the needs of the various audiences are discussed, i.e., the Summary Report, the Executive Summary, the Main Report, and Appendices. The authors recommend the documentation specifications discussed herein as guides rather than rigid definitions

  11. Text mining in the classification of digital documents

    Directory of Open Access Journals (Sweden)

    Marcial Contreras Barrera

    2016-11-01

    Full Text Available Objective: Develop an automated classifier for the classification of bibliographic material by means of the text mining. Methodology: The text mining is used for the development of the classifier, based on a method of type supervised, conformed by two phases; learning and recognition, in the learning phase, the classifier learns patterns across the analysis of bibliographical records, of the classification Z, belonging to library science, information sciences and information resources, recovered from the database LIBRUNAM, in this phase is obtained the classifier capable of recognizing different subclasses (LC. In the recognition phase the classifier is validated and evaluates across classification tests, for this end bibliographical records of the classification Z are taken randomly, classified by a cataloguer and processed by the automated classifier, in order to obtain the precision of the automated classifier. Results: The application of the text mining achieved the development of the automated classifier, through the method classifying documents supervised type. The precision of the classifier was calculated doing the comparison among the assigned topics manually and automated obtaining 75.70% of precision. Conclusions: The application of text mining facilitated the creation of automated classifier, allowing to obtain useful technology for the classification of bibliographical material with the aim of improving and speed up the process of organizing digital documents.

  12. Multimodal document management in radiotherapy

    International Nuclear Information System (INIS)

    Fahrner, H.; Kirrmann, S.; Roehner, F.; Schmucker, M.; Hall, M.; Heinemann, F.

    2013-01-01

    Background and purpose: After incorporating treatment planning and the organisational model of treatment planning in the operating schedule system (BAS, 'Betriebsablaufsystem'), complete document qualities were embedded in the digital environment. The aim of this project was to integrate all documents independent of their source (paper-bound or digital) and to make content from the BAS available in a structured manner. As many workflow steps as possible should be automated, e.g. assigning a document to a patient in the BAS. Additionally it must be guaranteed that at all times it could be traced who, when, how and from which source documents were imported into the departmental system. Furthermore work procedures should be changed that the documentation conducted either directly in the departmental system or from external systems can be incorporated digitally and paper document can be completely avoided (e.g. documents such as treatment certificate, treatment plans or documentation). It was a further aim, if possible, to automate the removal of paper documents from the departmental work flow, or even to make such paper documents superfluous. In this way patient letters for follow-up appointments should automatically generated from the BAS. Similarly patient record extracts in the form of PDF files should be enabled, e.g. for controlling purposes. Method: The available document qualities were analysed in detail by a multidisciplinary working group (BAS-AG) and after this examination and assessment of the possibility of modelling in our departmental workflow (BAS) they were transcribed into a flow diagram. The gathered specifications were implemented in a test environment by the clinical and administrative IT group of the department of radiation oncology and subsequent to a detailed analysis introduced into clinical routine. Results: The department has succeeded under the conditions of the aforementioned criteria to embed all relevant documents in the departmental

  13. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  14. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications.

    Science.gov (United States)

    Loan, Nazir A; Parah, Shabir A; Sheikh, Javaid A; Akhoon, Jahangir A; Bhat, Ghulam M

    2017-09-01

    A high capacity and semi-reversible data hiding scheme based on Pixel Repetition Method (PRM) and hybrid edge detection for scalable medical images has been proposed in this paper. PRM has been used to scale up the small sized image (seed image) and hybrid edge detection ensures that no important edge information is missed. The scaled up version of seed image has been divided into 2×2 non overlapping blocks. In each block there is one seed pixel whose status decides the number of bits to be embedded in the remaining three pixels of that block. The Electronic Patient Record (EPR)/data have been embedded by using Least Significant and Intermediate Significant Bit Substitution (ISBS). The RC4 encryption has been used to add an additional security layer for embedded EPR/data. The proposed scheme has been tested for various medical and general images and compared with some state of art techniques in the field. The experimental results reveal that the proposed scheme besides being semi-reversible and computationally efficient is capable of handling high payload and as such can be used effectively for electronic healthcare applications. Copyright © 2017. Published by Elsevier Inc.

  15. The development of clinical document standards for semantic interoperability in china.

    Science.gov (United States)

    Yang, Peng; Pan, Feng; Liu, Danhong; Xu, Yongyong; Wan, Yi; Tu, Haibo; Tang, Xuejun; Hu, Jianping

    2011-12-01

    This study is aimed at developing a set of data groups (DGs) to be employed as reusable building blocks for the construction of the eight most common clinical documents used in China's general hospitals in order to achieve their structural and semantic standardization. The Diagnostics knowledge framework, the related approaches taken from the Health Level Seven (HL7), the Integrating the Healthcare Enterprise (IHE), and the Healthcare Information Technology Standards Panel (HITSP) and 1,487 original clinical records were considered together to form the DG architecture and data sets. The internal structure, content, and semantics of each DG were then defined by mapping each DG data set to a corresponding Clinical Document Architecture data element and matching each DG data set to the metadata in the Chinese National Health Data Dictionary. By using the DGs as reusable building blocks, standardized structures and semantics regarding the clinical documents for semantic interoperability were able to be constructed. Altogether, 5 header DGs, 48 section DGs, and 17 entry DGs were developed. Several issues regarding the DGs, including their internal structure, identifiers, data set names, definitions, length and format, data types, and value sets, were further defined. Standardized structures and semantics regarding the eight clinical documents were structured by the DGs. This approach of constructing clinical document standards using DGs is a feasible standard-driven solution useful in preparing documents possessing semantic interoperability among the disparate information systems in China. These standards need to be validated and refined through further study.

  16. Engineering Documentation and Data Control

    Science.gov (United States)

    Matteson, Michael J.; Bramley, Craig; Ciaruffoli, Veronica

    2001-01-01

    Mississippi Space Services (MSS) the facility services contractor for NASA's John C. Stennis Space Center (SSC), is utilizing technology to improve engineering documentation and data control. Two identified improvement areas, labor intensive documentation research and outdated drafting standards, were targeted as top priority. MSS selected AutoManager(R) WorkFlow from Cyco software to manage engineering documentation. The software is currently installed on over 150 desctops. The outdated SSC drafting standard was written for pre-CADD drafting methods, in other words, board drafting. Implementation of COTS software solutions to manage engineering documentation and update the drafting standard resulted in significant increases in productivity by reducing the time spent searching for documents.

  17. Comparison of historical documents for writership

    Science.gov (United States)

    Ball, Gregory R.; Pu, Danjun; Stritmatter, Roger; Srihari, Sargur N.

    2010-01-01

    Over the last century forensic document science has developed progressively more sophisticated pattern recognition methodologies for ascertaining the authorship of disputed documents. These include advances not only in computer assisted stylometrics, but forensic handwriting analysis. We present a writer verification method and an evaluation of an actual historical document written by an unknown writer. The questioned document is compared against two known handwriting samples of Herman Melville, a 19th century American author who has been hypothesized to be the writer of this document. The comparison led to a high confidence result that the questioned document was written by the same writer as the known documents. Such methodology can be applied to many such questioned documents in historical writing, both in literary and legal fields.

  18. Human Infrastructure Detection and Exploitation (HIDE)

    Science.gov (United States)

    2009-11-01

    7  Figure 4. Picture of the fluxgate magnetometer and the coil-type magnetic sensor...may also be used to detect the usage of computer monitors. We used two different B-field sensors (figure 4), namely, (1) a fluxgate magnetometer ...collected at 256 samples per second. The three-axis fluxgate magnetometer used was an Applied Physics Systems Model 1540. It has the sensitivity

  19. What is hiding behind ontogenic d13C variations in mollusk shells: New insights from scallops.

    Science.gov (United States)

    Chauvaud, L.; Lorrain, A.; Gillikin, D. P.; Thebault, J.; Paulet, Y.; Strand, O.; Blamart, D.; Guarini, J.; Clavier, J.

    2008-12-01

    We examined d13Ccalcite variations along scallop shells (Pecten maximus) sampled in Norway, France and Spain. Time series of shell calcite d13C show a consistent pattern of decreasing d13C with age. This almost linear d13C trend reflects an increasing contribution of metabolic CO2 to skeletal carbonate throughout ontogeny. We have removed this ontogenic trend to try to extract other information from our shell calcite d13C dataset. Scallops from the Bay of Brest (western Brittany, France) were then used to interpret the data as many environmental parameters were available for this site. d13Ccalcite variations were compared to d13C of dissolved inorganic carbon (DIC) and Chl a. The detrended calcite d13C profiles seem to follow a seasonal pattern, but surprisingly are inversely related to the d13C DIC and chlorophyll a concentrations measured within the water column. Theses results suggest that shell d13C variations are not controlled by isotopic variation of DIC. Since scallops eat phytoplankton and microphytobenthos cells, and, as a consequence respire organic mater largely depleted in 13C, we therefore suggest that in mollusk suspension feeders the shell d13Ccalcite might still be used to track the annual number of phytoplankton blooms when d13C values of calcite are detrended. We must consider this trend as a potential biological filter hiding precious environmental records.

  20. Transportation System Requirements Document

    International Nuclear Information System (INIS)

    1993-09-01

    This Transportation System Requirements Document (Trans-SRD) describes the functions to be performed by and the technical requirements for the Transportation System to transport spent nuclear fuel (SNF) and high-level radioactive waste (HLW) from Purchaser and Producer sites to a Civilian Radioactive Waste Management System (CRWMS) site, and between CRWMS sites. The purpose of this document is to define the system-level requirements for Transportation consistent with the CRWMS Requirement Document (CRD). These requirements include design and operations requirements to the extent they impact on the development of the physical segments of Transportation. The document also presents an overall description of Transportation, its functions, its segments, and the requirements allocated to the segments and the system-level interfaces with Transportation. The interface identification and description are published in the CRWMS Interface Specification

  1. Applications for electronic documents

    International Nuclear Information System (INIS)

    Beitel, G.A.

    1995-01-01

    This paper discusses the application of electronic media to documents, specifically Safety Analysis Reports (SARs), prepared for Environmental Restoration and Waste Management (ER ampersand WM) programs being conducted for the Department of Energy (DOE) at the Idaho National Engineering Laboratory (INEL). Efforts are underway to upgrade our document system using electronic format. To satisfy external requirements (DOE, State, and Federal), ER ampersand WM programs generate a complement of internal requirements documents including a SAR and Technical Safety Requirements along with procedures and training materials. Of interest, is the volume of information and the difficulty in handling it. A recently prepared ER ampersand WM SAR consists of 1,000 pages of text and graphics; supporting references add 10,000 pages. Other programmatic requirements documents consist of an estimated 5,000 pages plus references

  2. The systematic profiling of false identity documents: method validation and performance evaluation using seizures known to originate from common and different sources.

    Science.gov (United States)

    Baechler, Simon; Terrasse, Vincent; Pujol, Jean-Philippe; Fritz, Thibaud; Ribaux, Olivier; Margot, Pierre

    2013-10-10

    False identity documents constitute a potential powerful source of forensic intelligence because they are essential elements of transnational crime and provide cover for organized crime. In previous work, a systematic profiling method using false documents' visual features has been built within a forensic intelligence model. In the current study, the comparison process and metrics lying at the heart of this profiling method are described and evaluated. This evaluation takes advantage of 347 false identity documents of four different types seized in two countries whose sources were known to be common or different (following police investigations and dismantling of counterfeit factories). Intra-source and inter-sources variations were evaluated through the computation of more than 7500 similarity scores. The profiling method could thus be validated and its performance assessed using two complementary approaches to measuring type I and type II error rates: a binary classification and the computation of likelihood ratios. Very low error rates were measured across the four document types, demonstrating the validity and robustness of the method to link documents to a common source or to differentiate them. These results pave the way for an operational implementation of a systematic profiling process integrated in a developed forensic intelligence model. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  3. Regional training course on safe transport of radioactive material. Folder documentation

    International Nuclear Information System (INIS)

    1999-01-01

    Folder including documentation distributed to the participants to the International Atomic Energy Agency (IAEA) Regional Training Course on Safe Transport of Radioactive Material organised by the IAEA in co-operation with the Government of Argentina through the Nuclear Regulatory Authority, held in Buenos Aires, Argentina, 13 September -1 October 1999. The course was intended to people from IAEA Member States in the Latin American and Caribbean region. The instruction language was spanish and some lectures was delivered in english. The documentation was Spanish and some lectures was delivered in English. The documentation was in Spanish and included: copies of transparencies used during lectures, exercises of application, main training document (introduction; shipments of radioactive material; applicable regulations; basic principles; scope and objective of the IAEA Transport Regulations; package design requirements; type of packages and their contents limits; Q system; special form radioactive material requirements; radiation protection requirements; fissile material transport requirements; controls, contamination, radiation level, transport index; operational and administrative requirements; consignors' responsibilities; approval certificates, transport under special arrangements; emergency planning and procedures; physical protection aspects during transport. Guidelines for consignors, radiation detectors, complement to the training manual on main changes included in the 1996 Edition of IAEA Transport Regulations

  4. The Vicinity of Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    between program development tools.  In the central part of the paper we introduce a mapping of documentation flow between program development tools.  In addition we discuss a set of locally developed tools which is related to program documentation.  The use of test cases as examples in an interface......Program documentation plays a vital role in almost all programming processes.  Program documentation flows between separate tools of a modularized environment, and in between the components of an integrated development environment as well.  In this paper we discuss the flow of program documentation...... documentation tool is a noteworthy and valuable contribution to the documentation flow.  As an additional contribution we identify several circular relationships which illustrate feedback of documentation to the program editor from other tools in the development environment....

  5. Forensic document analysis using scanning microscopy

    Science.gov (United States)

    Shaffer, Douglas K.

    2009-05-01

    The authentication and identification of the source of a printed document(s) can be important in forensic investigations involving a wide range of fraudulent materials, including counterfeit currency, travel and identity documents, business and personal checks, money orders, prescription labels, travelers checks, medical records, financial documents and threatening correspondence. The physical and chemical characterization of document materials - including paper, writing inks and printed media - is becoming increasingly relevant for law enforcement agencies, with the availability of a wide variety of sophisticated commercial printers and copiers which are capable of producing fraudulent documents of extremely high print quality, rendering these difficult to distinguish from genuine documents. This paper describes various applications and analytical methodologies using scanning electron miscoscopy/energy dispersive (x-ray) spectroscopy (SEM/EDS) and related technologies for the characterization of fraudulent documents, and illustrates how their morphological and chemical profiles can be compared to (1) authenticate and (2) link forensic documents with a common source(s) in their production history.

  6. Improving collaborative documentation in CMS

    International Nuclear Information System (INIS)

    Lassila-Perini, Kati; Salmi, Leena

    2010-01-01

    Complete and up-to-date documentation is essential for efficient data analysis in a large and complex collaboration like CMS. Good documentation reduces the time spent in problem solving for users and software developers. The scientists in our research environment do not necessarily have the interests or skills of professional technical writers. This results in inconsistencies in the documentation. To improve the quality, we have started a multidisciplinary project involving CMS user support and expertise in technical communication from the University of Turku, Finland. In this paper, we present possible approaches to study the usability of the documentation, for instance, usability tests conducted recently for the CMS software and computing user documentation.

  7. Using of Hyperbranched Poly(amidoamine) as Pretanning Agent for Leather

    OpenAIRE

    Ibrahim, Amal Amin; Youssef, Moshera S. A.; Nashy, El-Shahat H. A.; Eissa, Mohamed M.

    2013-01-01

    Although chrome is considered as the major tanning agent in the production of all types of hides and leather worldwide, it represents a serious source of environmental pollution. Therefore, polyamidoamine hyperbranched polymer (HPAM) was involved in pretanning of the depickled hides to enhance the chromium uptake during the tanning process. The key parameters which affect the exhaustion and fixation of chrome tan including shrinkage temperature of the tanned leather were studied. The results ...

  8. An integrated pest management program as a pests control strategy ...

    African Journals Online (AJOL)

    Phukubje, Justice

    and document analysis tools. The findings of the survey revealed a significant ..... equipment, materials and know- how, cockroach control can be a ... and birds. • They go through the four life cycle stages of egg, larva, pupa, and imago (adult). • Always do a thorough inspection of collection; fleas can hide under mats with fur.

  9. Assessment of LANL asbestos waste management documentation

    International Nuclear Information System (INIS)

    Davis, K.D.; Hoevemeyer, S.S.; Stirrup, T.S.; Jennrich, E.A.; Lund, D.M.

    1991-04-01

    The intent of this effort is to evaluate the Los Alamos National Laboratory (LANL) Waste Acceptance Criteria (WAC) for asbestos to determine if it meets applicable DOE, EPA, and OSHA requirements. There are numerous regulations that provide specific guidelines on the management of asbestos waste. An annotated outline for a generic asbestos WAC was developed using the type of information specified by 5820.2A. The outline itself is included in Appendix A. The major elements that should be addressed by the WAC were determined to be as follows: Waste Forms; Waste Content/Concentration; Waste Packaging; and Waste Documentation/Certification

  10. Robust Adaptive Thresholder For Document Scanning Applications

    Science.gov (United States)

    Hsing, To R.

    1982-12-01

    In document scanning applications, thresholding is used to obtain binary data from a scanner. However, due to: (1) a wide range of different color backgrounds; (2) density variations of printed text information; and (3) the shading effect caused by the optical systems, the use of adaptive thresholding to enhance the useful information is highly desired. This paper describes a new robust adaptive thresholder for obtaining valid binary images. It is basically a memory type algorithm which can dynamically update the black and white reference level to optimize a local adaptive threshold function. The results of high image quality from different types of simulate test patterns can be obtained by this algorithm. The software algorithm is described and experiment results are present to describe the procedures. Results also show that the techniques described here can be used for real-time signal processing in the varied applications.

  11. Recommended HSE-7 documents hierarchy

    International Nuclear Information System (INIS)

    Klein, R.B.; Jennrich, E.A.; Lund, D.M.; Danna, J.G.; Davis, K.D.; Rutz, A.C.

    1990-01-01

    This report recommends a hierarchy of waste management documents at Los Alamos National Laboratory (LANL or ''Laboratory''). The hierarchy addresses documents that are required to plan, implement, and document waste management programs at Los Alamos. These documents will enable the waste management group and the six sections contained within that group to satisfy requirements that are imposed upon them by the US Department of Energy (DOE), DOE Albuquerque Operations, US Environmental Protection Agency, various State of New Mexico agencies, and Laboratory management

  12. Documentation of torture victims, assessment of the start procedure for medico-legal documentation.

    Science.gov (United States)

    Mandel, Lene; Worm, Lise

    2007-01-01

    A Pilot Study was performed at the Rehabilitation and Research Centre for Torture Victims (RCT) in Copenhagen in order to explore the possibilities for adding a medico-legal documentation component to the rehabilitation of torture victims already taking place. It describes the process and results on implementing medico-legal documentation in a rehabilitative setting. A modified version of the Guidelines in the Istanbul Protocol was developed on the basis of the review of literature and current practices described in "Documentation of torture victims, implementation of medico-legal protocols". The modified guidelines were tested on five clients. The aim was twofold: 1) To assess the client's attitude towards the idea of adding a documentation component to the rehabilitation process and: 2) To assess the practical circumstances of implementing the Istanbul Protocol in the everyday life of a rehabilitation centre. Results show that all five clients were positive towards the project and found comfort in being able to contribute to the fight against impunity. Also, the Pilot Study demonstrated that a large part of the medico-legal documentation was already obtained in the rehabilitation process. It was however not accessible due to lack of systematization and a data registering system. There are thus important synergies in collecting data for rehabilitation and documentation but a joint database system is necessary to realize these synergies.

  13. TRANSPORTATION SYSTEM REQUIREMENTS DOCUMENT

    International Nuclear Information System (INIS)

    2004-01-01

    This document establishes the Transportation system requirements for the U.S. Department of Energy's (DOE's) Civilian Radioactive Waste Management System (CRWMS). These requirements are derived from the Civilian Radioactive Waste Management System Requirements Document (CRD). The Transportation System Requirements Document (TSRD) was developed in accordance with LP-3.1Q-OCRWM, Preparation, Review, and Approval of Office of National Transportation Level-2 Baseline Requirements. As illustrated in Figure 1, the TSRD forms a part of the DOE Office of Civilian Radioactive Waste Management (OCRWM) Technical Baseline

  14. Information hiding techniques for infrared images: exploring the state-of-the art and challenges

    Science.gov (United States)

    Pomponiu, Victor; Cavagnino, Davide; Botta, Marco; Nejati, Hossein

    2015-10-01

    The proliferation of Infrared technology and imaging systems enables a different perspective to tackle many computer vision problems in defense and security applications. Infrared images are widely used by the law enforcement, Homeland Security and military organizations to achieve a significant advantage or situational awareness, and thus is vital to protect these data against malicious attacks. Concurrently, sophisticated malware are developed which are able to disrupt the security and integrity of these digital media. For instance, illegal distribution and manipulation are possible malicious attacks to the digital objects. In this paper we explore the use of a new layer of defense for the integrity of the infrared images through the aid of information hiding techniques such as watermarking. In this context, we analyze the efficiency of several optimal decoding schemes for the watermark inserted into the Singular Value Decomposition (SVD) domain of the IR images using an additive spread spectrum (SS) embedding framework. In order to use the singular values (SVs) of the IR images with the SS embedding we adopt several restrictions that ensure that the values of the SVs will maintain their statistics. For both the optimal maximum likelihood decoder and sub-optimal decoders we assume that the PDF of SVs can be modeled by the Weibull distribution. Furthermore, we investigate the challenges involved in protecting and assuring the integrity of IR images such as data complexity and the error probability behavior, i.e., the probability of detection and the probability of false detection, for the applied optimal decoders. By taking into account the efficiency and the necessary auxiliary information for decoding the watermark, we discuss the suitable decoder for various operating situations. Experimental results are carried out on a large dataset of IR images to show the imperceptibility and efficiency of the proposed scheme against various attack scenarios.

  15. Technical approach document

    International Nuclear Information System (INIS)

    1989-12-01

    The Uranium Mill Tailings Radiation Control Act (UMTRCA) of 1978, Public Law 95-604 (PL95-604), grants the Secretary of Energy the authority and responsibility to perform such actions as are necessary to minimize radiation health hazards and other environmental hazards caused by inactive uranium mill sites. This Technical Approach Document (TAD) describes the general technical approaches and design criteria adopted by the US Department of Energy (DOE) in order to implement remedial action plans (RAPS) and final designs that comply with EPA standards. It does not address the technical approaches necessary for aquifer restoration at processing sites; a guidance document, currently in preparation, will describe aquifer restoration concerns and technical protocols. This document is a second revision to the original document issued in May 1986; the revision has been made in response to changes to the groundwater standards of 40 CFR 192, Subparts A--C, proposed by EPA as draft standards. New sections were added to define the design approaches and designs necessary to comply with the groundwater standards. These new sections are in addition to changes made throughout the document to reflect current procedures, especially in cover design, water resources protection, and alternate site selection; only minor revisions were made to some of the sections. Sections 3.0 is a new section defining the approach taken in the design of disposal cells; Section 4.0 has been revised to include design of vegetated covers; Section 8.0 discusses design approaches necessary for compliance with the groundwater standards; and Section 9.0 is a new section dealing with nonradiological hazardous constituents. 203 refs., 18 figs., 26 tabs

  16. Probing the crucial role of Leu31 and Thr33 of the Bacillus pumilus CBS alkaline protease in substrate recognition and enzymatic depilation of animal hide.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    Full Text Available The sapB gene, encoding Bacillus pumilus CBS protease, and seven mutated genes (sapB-L31I, sapB-T33S, sapB-N99Y, sapB-L31I/T33S, sapB-L31I/N99Y, sapB-T33S/N99Y, and sapB-L31I/T33S/N99Y were overexpressed in protease-deficient Bacillus subtilis DB430 and purified to homogeneity. SAPB-N99Y and rSAPB displayed the highest levels of keratinolytic activity, hydrolysis efficiency, and enzymatic depilation. Interestingly, and at the semi-industrial scale, rSAPB efficiently removed the hair of goat hides within a short time interval of 8 h, thus offering a promising opportunity for the attainment of a lime and sulphide-free depilation process. The efficacy of the process was supported by submitting depilated pelts and dyed crusts to scanning electron microscopic analysis, and the results showed well opened fibre bundles and no apparent damage to the collagen layer. The findings also revealed better physico-chemical properties and less effluent loads, which further confirmed the potential candidacy of the rSAPB enzyme for application in the leather industry to attain an ecofriendly process of animal hide depilation. More interestingly, the findings on the substrate specificity and kinetic properties of the enzyme using the synthetic peptide para-nitroanilide revealed strong preferences for an aliphatic amino-acid (valine at position P1 for keratinases and an aromatic amino-acid (phenylalanine at positions P1/P4 for subtilisins. Molecular modeling suggested the potential involvement of a Leu31 residue in a network of hydrophobic interactions, which could have shaped the S4 substrate binding site. The latter could be enlarged by mutating L31I, fitting more easily in position P4 than a phenylalanine residue. The molecular modeling of SAPB-T33S showed a potential S2 subside widening by a T33S mutation, thus suggesting its importance in substrate specificity.

  17. Document organization by means of graphs

    Directory of Open Access Journals (Sweden)

    Santa Vallejo Figueroa

    2016-12-01

    Full Text Available Nowadays documents are the main way to represent information and knowledge in several domains. Continuously users store documents in hard disk or online media according to some personal organization based on topics, but such documents can contain one or more topics. This situation makes hard to access documents when is required. The current search engines are based on the name of file or content, but where the desired term or terms must match exactly as are in the content. In this paper, a method for organize documents by means of graphs is proposed, taking into account the topics of the documents. For this a graph for each document is generated taking into account synonyms, semantic related terms, hyponyms, and hypernyms of nouns and verbs contained in documents. The proposal have been compares against Google Desktop and LogicalDoc with interesting results.

  18. Improving Precision of Types

    DEFF Research Database (Denmark)

    Winther, Johnni

    Types in programming languages provide a powerful tool for the programmer to document the code so that a large aspect of the intent can not only be presented to fellow programmers but also be checked automatically by compilers. The precision with which types model the behavior of programs...... is crucial to the quality of these automated checks, and in this thesis we present three different improvements to the precision of types in three different aspects of the Java programming language. First we show how to extend the type system in Java with a new type which enables the detection of unintended...

  19. Audit of Orthopaedic Surgical Documentation

    Directory of Open Access Journals (Sweden)

    Fionn Coughlan

    2015-01-01

    Full Text Available Introduction. The Royal College of Surgeons in England published guidelines in 2008 outlining the information that should be documented at each surgery. St. James’s Hospital uses a standard operation sheet for all surgical procedures and these were examined to assess documentation standards. Objectives. To retrospectively audit the hand written orthopaedic operative notes according to established guidelines. Methods. A total of 63 operation notes over seven months were audited in terms of date and time of surgery, surgeon, procedure, elective or emergency indication, operative diagnosis, incision details, signature, closure details, tourniquet time, postop instructions, complications, prosthesis, and serial numbers. Results. A consultant performed 71.4% of procedures; however, 85.7% of the operative notes were written by the registrar. The date and time of surgery, name of surgeon, procedure name, and signature were documented in all cases. The operative diagnosis and postoperative instructions were frequently not documented in the designated location. Incision details were included in 81.7% and prosthesis details in only 30% while the tourniquet time was not documented in any. Conclusion. Completion and documentation of operative procedures were excellent in some areas; improvement is needed in documenting tourniquet time, prosthesis and incision details, and the location of operative diagnosis and postoperative instructions.

  20. ENDF/B summary documentation

    International Nuclear Information System (INIS)

    Kinsey, R.

    1979-07-01

    This publication provides a localized source of descriptions for the evaluations contained in the ENDF/B Library. The summary documentation presented is intended to be a more detailed description than the (File 1) comments contained in the computer readable data files, but not so detailed as the formal reports describing each ENDF/B evaluation. The summary documentations were written by the CSEWB (Cross Section Evaluation Working Group) evaluators and compiled by NNDC (National Nuclear Data Center). This edition includes documentation for materials found on ENDF/B Version V tapes 501 to 516 (General Purpose File) excluding tape 504. ENDF/B-V also includes tapes containing partial evaluations for the Special Purpose Actinide (521, 522), Dosimetry (531), Activation (532), Gas Production (533), and Fission Product (541-546) files. The materials found on these tapes are documented elsewhere. Some of the evaluation descriptions in this report contain cross sections or energy level information

  1. The investigation of crimes refering to forgery of documents and possession of forged documents

    OpenAIRE

    Kotovienė, Danutė

    2011-01-01

    THE INVESTIGATION OF CRIMES REFERING TO FORGERY OF DOCUMENTS AND POSSESSION OF FORGED DOCUMENTS Constantly improving informational technologies more and more get into our daily routine: nowadays it is widely spread internet payments, purchases, signing on-line agreements using electronic signatures. However, paper documents or other made of appropriate materials, which have material evidence, still have a very significant impact on our life. Its convey different aspects of states’ public work...

  2. Self-authentication of value documents

    Science.gov (United States)

    Hayosh, Thomas D.

    1998-04-01

    To prevent fraud it is critical to distinguish an authentic document from a counterfeit or altered document. Most current technologies rely on difficult-to-print human detectable features which are added to a document to prevent illegal reproduction. Fraud detection is mostly accomplished by human observation and is based upon the examiner's knowledge, experience and time allotted for examination of a document. Another approach to increasing the security of a value document is to add a unique property to each document. Data about that property is then encoded on the document itself and finally secured using a public key based digital signature. In such a scheme, machine readability of authenticity is possible. This paper describes a patent-applied-for methodology using the unique property of magnetic ink printing, magnetic remanence, that provides for full self- authentication when used with a recordable magnetic stripe for storing a digital signature and other document data. Traditionally the authenticity of a document is determined by physical examination for color, background printing, paper texture, printing resolution, and ink characteristics. On an initial level, there may be numerous security features present on a value document but only a few can be detected and evaluated by the untrained individual. Because security features are normally not standardized except on currency, training tellers and cashiers to do extensive security evaluation is not practical, even though these people are often the only people who get a chance to closely examine the document in a payment system which is back-end automated. In the context of this paper, one should be thinking about value documents such as commercial and personal checks although the concepts presented here can easily be applied to travelers cheques, credit cards, event tickets, passports, driver's licenses, motor vehicle titles, and even currency. For a practical self-authentication system, the false alarms

  3. 2002 reference document

    International Nuclear Information System (INIS)

    2002-01-01

    This 2002 reference document of the group Areva, provides information on the society. Organized in seven chapters, it presents the persons responsible for the reference document and for auditing the financial statements, information pertaining to the transaction, general information on the company and share capital, information on company operation, changes and future prospects, assets, financial position, financial performance, information on company management and executive board and supervisory board, recent developments and future prospects. (A.L.B.)

  4. Document retrieval on repetitive string collections.

    Science.gov (United States)

    Gagie, Travis; Hartikainen, Aleksi; Karhu, Kalle; Kärkkäinen, Juha; Navarro, Gonzalo; Puglisi, Simon J; Sirén, Jouni

    2017-01-01

    Most of the fastest-growing string collections today are repetitive, that is, most of the constituent documents are similar to many others. As these collections keep growing, a key approach to handling them is to exploit their repetitiveness, which can reduce their space usage by orders of magnitude. We study the problem of indexing repetitive string collections in order to perform efficient document retrieval operations on them. Document retrieval problems are routinely solved by search engines on large natural language collections, but the techniques are less developed on generic string collections. The case of repetitive string collections is even less understood, and there are very few existing solutions. We develop two novel ideas, interleaved LCPs and precomputed document lists , that yield highly compressed indexes solving the problem of document listing (find all the documents where a string appears), top- k document retrieval (find the k documents where a string appears most often), and document counting (count the number of documents where a string appears). We also show that a classical data structure supporting the latter query becomes highly compressible on repetitive data. Finally, we show how the tools we developed can be combined to solve ranked conjunctive and disjunctive multi-term queries under the simple [Formula: see text] model of relevance. We thoroughly evaluate the resulting techniques in various real-life repetitiveness scenarios, and recommend the best choices for each case.

  5. Triangular clustering in document networks

    Energy Technology Data Exchange (ETDEWEB)

    Cheng Xueqi; Ren Fuxin [Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190 (China); Zhou Shi [Department of Computer Science, University College London, Malet Place, London WC1E 6BT (United Kingdom); Hu Maobin [School of Engineering Science, University of Science and Technology of China, Hefei 230026 (China)], E-mail: cxq@ict.ac.cn, E-mail: renfuxin@software.ict.ac.cn, E-mail: s.zhou@adastral.ucl.ac.uk, E-mail: humaobin@ustc.edu.cn

    2009-03-15

    Document networks have the characteristic that a document node, e.g. a webpage or an article, carries meaningful content. Properties of document networks are not only affected by topological connectivity between nodes, but are also strongly influenced by the semantic relation between the content of the nodes. We observed that document networks have a large number of triangles and a high value clustering coefficient. Also there is a strong correlation between the probability of formation of a triangle and the content similarity among the three nodes involved. We propose the degree-similarity product (DSP) model, which well reproduces these properties. The model achieves this by using a preferential attachment mechanism that favours the linkage between nodes that are both popular and similar. This work is a step forward towards a better understanding of the structure and evolution of document networks.

  6. ENDF/B summary documentation

    Energy Technology Data Exchange (ETDEWEB)

    Kinsey, R. (comp.)

    1979-07-01

    This publication provides a localized source of descriptions for the evaluations contained in the ENDF/B Library. The summary documentation presented is intended to be a more detailed description than the (File 1) comments contained in the computer readable data files, but not so detailed as the formal reports describing each ENDF/B evaluation. The summary documentations were written by the CSEWB (Cross Section Evaluation Working Group) evaluators and compiled by NNDC (National Nuclear Data Center). This edition includes documentation for materials found on ENDF/B Version V tapes 501 to 516 (General Purpose File) excluding tape 504. ENDF/B-V also includes tapes containing partial evaluations for the Special Purpose Actinide (521, 522), Dosimetry (531), Activation (532), Gas Production (533), and Fission Product (541-546) files. The materials found on these tapes are documented elsewhere. Some of the evaluation descriptions in this report contain cross sections or energy level information. (RWR)

  7. Economic assessment and pathogenic bacteria inhibition of bovine hide presoaking solutions formulated with enzymes that can remove adobe-type manure

    Science.gov (United States)

    The presoaking formulations that have recently been developed are effective in removing the damaging adobe type bovine manure and eco-friendly because the ingredients used are recycled and required only a quarter of the amount of biocide and surfactant that the industry is commonly using. The goal ...

  8. Customer Communication Document

    Science.gov (United States)

    2009-01-01

    This procedure communicates to the Customers of the Automation, Robotics and Simulation Division (AR&SD) Dynamics Systems Test Branch (DSTB) how to obtain services of the Six-Degrees-Of-Freedom Dynamic Test System (SDTS). The scope includes the major communication documents between the SDTS and its Customer. It established the initial communication and contact points as well as provides the initial documentation in electronic media for the customer. Contact the SDTS Manager (SM) for the names of numbers of the current contact points.

  9. The development of AECB regulatory documents

    International Nuclear Information System (INIS)

    Joyce, M.

    1981-01-01

    This document describes the Atomic Energy Control Board's (AECB) approach to the development and preparation of regulatory documents. The principal factors that have shaped the AECB'a regulatory approach are identified as background to the evolution of regulatory documents as are a number of current influences that affect the present and future development of these documents. Also described are the process by which regulatory documents are prepared and published and the points of contact between this process and the Canadian Standards Association program for nuclear standards. (author)

  10. NILDE, Network Inter Library Document Exchange: An Italian Document Delivery System

    Science.gov (United States)

    Brunetti, F.; Gasperini, A.; Mangiaracina, S.

    2007-10-01

    This poster presents NILDE, a document delivery system supporting the exchange of documents via the internet. The system has been set up by the Central Library of the National Research Council of Bologna (Italy) in order to make use of new internet technology, to promote cooperation between Italian university libraries and research libraries, and to achieve quick response times in satisfying DD requests. The Arcetri Astrophysical Observatory Library was the first astronomical library to join the NILDE project from its earliest days in 2002. Many were the reasons for this choice: automation of the DD processes, security and reliability of the network, creation of usage statistics and reports, reduction of DD System management costs and so on. This work describes the benefits of NILDE and discusses the role of an organized document delivery system as an important tool to cope with the difficult constraints of the publishing market.

  11. IDC System Specification Document.

    Energy Technology Data Exchange (ETDEWEB)

    Clifford, David J.

    2014-12-01

    This document contains the system specifications derived to satisfy the system requirements found in the IDC System Requirements Document for the IDC Reengineering Phase 2 project. Revisions Version Date Author/Team Revision Description Authorized by V1.0 12/2014 IDC Reengineering Project Team Initial delivery M. Harris

  12. INFCE plenary conference documents

    International Nuclear Information System (INIS)

    This document consists of the reports to the First INFCE Plenary Conference (November 1978) by the Working Groups a Plenary Conference of its actions and decisions, the Communique of the Final INFCE Plenary Conference (February 1980), and a list of all documents in the IAEA depository for INFCE

  13. Utility-preserving privacy protection of textual healthcare documents.

    Science.gov (United States)

    Sánchez, David; Batet, Montserrat; Viejo, Alexandre

    2014-12-01

    The adoption of ITs by medical organisations makes possible the compilation of large amounts of healthcare data, which are quite often needed to be released to third parties for research or business purposes. Many of this data are of sensitive nature, because they may include patient-related documents such as electronic healthcare records. In order to protect the privacy of individuals, several legislations on healthcare data management, which state the kind of information that should be protected, have been defined. Traditionally, to meet with current legislations, a manual redaction process is applied to patient-related documents in order to remove or black-out sensitive terms. This process is costly and time-consuming and has the undesired side effect of severely reducing the utility of the released content. Automatic methods available in the literature usually propose ad-hoc solutions that are limited to protect specific types of structured information (e.g. e-mail addresses, social security numbers, etc.); as a result, they are hardly applicable to the sensitive entities stated in current regulations that do not present those structural regularities (e.g. diseases, symptoms, treatments, etc.). To tackle these limitations, in this paper we propose an automatic sanitisation method for textual medical documents (e.g. electronic healthcare records) that is able to protect, regardless of their structure, sensitive entities (e.g. diseases) and also those semantically related terms (e.g. symptoms) that may disclose the former ones. Contrary to redaction schemes based on term removal, our approach improves the utility of the protected output by replacing sensitive terms with appropriate generalisations retrieved from several medical and general-purpose knowledge bases. Experiments conducted on highly sensitive documents and in coherency with current regulations on healthcare data privacy show promising results in terms of the practical privacy and utility of the

  14. Maury Documentation

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Supporting documentation for the Maury Collection of marine observations. Includes explanations from Maury himself, as well as guides and descriptions by the U.S....

  15. Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images

    Directory of Open Access Journals (Sweden)

    Mehdi Hussain

    2016-05-01

    Full Text Available The goal of image steganographic methods considers three main key issues: high embedding capacity, good visual symmetry/quality, and security. In this paper, a hybrid data hiding method combining the right-most digit replacement (RMDR with an adaptive least significant bit (ALSB is proposed to provide not only high embedding capacity but also maintain a good visual symmetry. The cover-image is divided into lower texture (symmetry patterns and higher texture (asymmetry patterns areas and these textures determine the selection of RMDR and ALSB methods, respectively, according to pixel symmetry. This paper has three major contributions. First, the proposed hybrid method enhanced the embedding capacity due to efficient ALSB utilization in the higher texture areas of cover images. Second, the proposed hybrid method maintains the high visual quality because RMDR has the closest selection process to generate the symmetry between stego and cover pixels. Finally, the proposed hybrid method is secure against statistical regular or singular (RS steganalysis and pixel difference histogram steganalysis because RMDR is capable of evading the risk of RS detection attacks due to pixel digits replacement instead of bits. Extensive experimental tests (over 1500+ cover images are conducted with recent least significant bit (LSB-based hybrid methods and it is demonstrated that the proposed hybrid method has a high embedding capacity (800,019 bits while maintaining good visual symmetry (39.00% peak signal-to-noise ratio (PSNR.

  16. A Document Imaging Technique for Implementing Electronic Loan Approval Process

    Directory of Open Access Journals (Sweden)

    J. Manikandan

    2015-04-01

    Full Text Available The image processing is one of the leading technologies of computer applications. Image processing is a type of signal processing, the input for image processor is an image or video frame and the output will be an image or subset of image [1]. Computer graphics and computer vision process uses an image processing techniques. Image processing systems are used in various environments like medical fields, computer-aided design (CAD, research fields, crime investigation fields and military fields. In this paper, we proposed a document image processing technique, for establishing electronic loan approval process (E-LAP [2]. Loan approval process has been tedious process, the E-LAP system attempts to reduce the complexity of loan approval process. Customers have to login to fill the loan application form online with all details and submit the form. The loan department then processes the submitted form and then sends an acknowledgement mail via the E-LAP to the requested customer with the details about list of documents required for the loan approval process [3]. The approaching customer can upload the scanned copies of all required documents. All this interaction between customer and bank take place using an E-LAP system.

  17. Document control system as an integral part of RA documentation database application

    International Nuclear Information System (INIS)

    Steljic, M.M; Ljubenov, V.Lj. . E-mail address of corresponding author: milijanas@vin.bg.ac.yu; Steljic, M.M.)

    2005-01-01

    The decision about the final shutdown of the RA research reactor in Vinca Institute has been brought in 2002, and therefore the preparations for its decommissioning have begun. All activities are supervised by the International Atomic Energy Agency (IAEA), which also provides technical and experts' support. This paper describes the document control system is an integral part of the existing RA documentation database. (author)

  18. Differences in reporting of analyses in internal company documents versus published trial reports: comparisons in industry-sponsored trials in off-label uses of gabapentin.

    Directory of Open Access Journals (Sweden)

    S Swaroop Vedula

    Full Text Available BACKGROUND: Details about the type of analysis (e.g., intent to treat [ITT] and definitions (i.e., criteria for including participants in the analysis are necessary for interpreting a clinical trial's findings. Our objective was to compare the description of types of analyses and criteria for including participants in the publication (i.e., what was reported with descriptions in the corresponding internal company documents (i.e., what was planned and what was done. Trials were for off-label uses of gabapentin sponsored by Pfizer and Parke-Davis, and documents were obtained through litigation. METHODS AND FINDINGS: For each trial, we compared internal company documents (protocols, statistical analysis plans, and research reports, all unpublished, with publications. One author extracted data and another verified, with a third person verifying discordant items and a sample of the rest. Extracted data included the number of participants randomized and analyzed for efficacy, and types of analyses for efficacy and safety and their definitions (i.e., criteria for including participants in each type of analysis. We identified 21 trials, 11 of which were published randomized controlled trials, and that provided the documents needed for planned comparisons. For three trials, there was disagreement on the number of randomized participants between the research report and publication. Seven types of efficacy analyses were described in the protocols, statistical analysis plans, and publications, including ITT and six others. The protocol or publication described ITT using six different definitions, resulting in frequent disagreements between the two documents (i.e., different numbers of participants were included in the analyses. CONCLUSIONS: Descriptions of analyses conducted did not agree between internal company documents and what was publicly reported. Internal company documents provide extensive documentation of methods planned and used, and trial

  19. Representation of Social History Factors Across Age Groups: A Topic Analysis of Free-Text Social Documentation.

    Science.gov (United States)

    Lindemann, Elizabeth A; Chen, Elizabeth S; Wang, Yan; Skube, Steven J; Melton, Genevieve B

    2017-01-01

    As individuals age, there is potential for dramatic changes in the social and behavioral determinants that affect health status and outcomes. The importance of these determinants has been increasingly recognized in clinical decision-making. We sought to characterize how social and behavioral health determinants vary in different demographic groups using a previously established schema of 28 social history types through both manual analysis and automated topic analysis of social documentation in the electronic health record across the population of an entire integrated healthcare system. Our manual analysis generated 8,335 annotations over 1,400 documents, representing 24 (86%) social history types. In contrast, automated topic analysis generated 22 (79%) social history types. A comparative evaluation demonstrated both similarities and differences in coverage between the manual and topic analyses. Our findings validate the widespread nature of social and behavioral determinants that affect health status over populations of individuals over their lifespan.

  20. EDF Group - 2010 Reference Document

    International Nuclear Information System (INIS)

    2011-04-01

    Beside the accounts of EDF for 2008 and 2009, this voluminous document presents persons in charge, legal account auditors, and how risks are managed within the company. It gives an overview of EDF activities, of its organization, of its assets. It presents and discusses its financial situation and results, indicates the main contracts, and proposes other documents concerning the company. Many documents and reports are provided in appendix

  1. A University Library Creates a Digital Repository for Documenting and Disseminating Community Engagement

    Science.gov (United States)

    Miller, William A.; Billings, Marilyn

    2012-01-01

    Digital repositories are new tools for documenting the accumulated scholarly work produced at academic institutions and disseminating that material broadly via the internet. Digital repositories support all file types and can be adapted to meet the custom design specifications of individual institutions. A section for community engagement…

  2. Interface control document between Analytical Services and Solid Waste Disposal Division

    International Nuclear Information System (INIS)

    Venetz, T.J.

    1995-01-01

    This interface control document (ICD) between Analytical Services and Solid Waste Disposal (SWD) establishes a baseline description of the support needed and the wastes that will require management as part of the interface between the two divisions. It is important that each division has a clear understanding of the other division's expectations regarding levels and type of support needed. This ICD deals with the waste sampling support needed by SWD and the waste generated by the specified analytical laboratories. The baseline description of wastes includes waste volumes, characteristics and shipping schedules, which will be used to plan the proper support requirements. The laboratories included in this document are 222-S Laboratory Facility, the Waste Sampling and Characterization Facility (WSCF) and the Chemical Engineering Laboratory. These three facilities provide support to the entire site and are not associated with one major program/facility. The laboratories associated with major facilities or programs such as Engineering/Environmental Development Laboratory at K Basins Operation are not within the scope of this document

  3. Civilian Radioactive Waste Management System Requirements Document

    International Nuclear Information System (INIS)

    1992-12-01

    This document specifies the top-level requirements for the Civilian Radioactive Waste Management System (CRWMS). The document is referred to herein as the CRD, for CRWMS Requirements document. The OCRWM System Engineering Management Plan (SEMP) establishes the technical document hierarchy (hierarchy of technical requirements and configuration baseline documents) for the CRWMS program. The CRD is the top-level document in this hierarchy. The immediate subordinate documents are the System Requirements Documents (SRDS) for the four elements of the CRWMS and the Interface Specification (IFS). The four elements of the CRWMS are the Waste Acceptance System, the Transportation System, the Monitored Retrievable Storage (MRS) System and the Mined Geologic Disposal System (MGDS). The Interface Specification describes the six inter-element interfaces between the four elements. This hierarchy establishes the requirements to be addressed by the design of the system elements. Many of the technical requirements for the CRWMS are documented in a variety of Federal regulations, DOE directives and other Government documentation. It is the purpose of the CRD to establish the technical requirements for the entire program. In doing so, the CRD summarizes source documentation for requirements that must be addressed by the program, specifies particular requirements, and documents derived requirements that are not covered in regulatory and other Government documentation, but are necessary to accomplish the mission of the CRWMS. The CRD defines the CRWMS by identifying the top-level functions the elements must perform (These top-level functions were derived using functional analysis initially documented in the Physical System Requirements (PSR) documents). The CRD also defines the top-level physical architecture of the system and allocates the functions and requirements to the architectural elements of the system

  4. Targeted Query Expansions as a Method for Searching Mixed Quality Digitized Cultural Heritage Documents

    NARCIS (Netherlands)

    Keskustalo, H.; Kettunen, K.; Kumpulainen, S.; Ferro, N.; Silvello, G.; Järvelin, A.; Kekäläinen, J.; Arvola, P.; Saastamoinen, M.; Sormunen, E.; Järvelin, K.

    2015-01-01

    Digitization of cultural heritage is a huge ongoing effort in many countries. In digitized historical documents, words may occur in different surface forms due to three types of variation - morphological variation, historical variation, and errors in optical character recognition (OCR). Because

  5. Patterns for Effectively Documenting Frameworks

    Science.gov (United States)

    Aguiar, Ademar; David, Gabriel

    Good design and implementation are necessary but not sufficient pre-requisites for successfully reusing object-oriented frameworks. Although not always recognized, good documentation is crucial for effective framework reuse, and often hard, costly, and tiresome, coming with many issues, especially when we are not aware of the key problems and respective ways of addressing them. Based on existing literature, case studies and lessons learned, the authors have been mining proven solutions to recurrent problems of documenting object-oriented frameworks, and writing them in pattern form, as patterns are a very effective way of communicating expertise and best practices. This paper presents a small set of patterns addressing problems related to the framework documentation itself, here seen as an autonomous and tangible product independent of the process used to create it. The patterns aim at helping non-experts on cost-effectively documenting object-oriented frameworks. In concrete, these patterns provide guidance on choosing the kinds of documents to produce, how to relate them, and which contents to include. Although the focus is more on the documents themselves, rather than on the process and tools to produce them, some guidelines are also presented in the paper to help on applying the patterns to a specific framework.

  6. Indian Language Document Analysis and Understanding

    Indian Academy of Sciences (India)

    documents would contain text of more than one script (for example, English, Hindi and the ... O'Gorman and Govindaraju provides a good overview on document image ... word level in bilingual documents containing Roman and Tamil scripts.

  7. PROCESS DOCUMENTATION: A MODEL FOR KNOWLEDGE MANAGEMENT IN ORGANIZATIONS.

    Science.gov (United States)

    Haddadpoor, Asefeh; Taheri, Behjat; Nasri, Mehran; Heydari, Kamal; Bahrami, Gholamreza

    2015-10-01

    Continuous and interconnected processes are a chain of activities that turn the inputs of an organization to its outputs and help achieve partial and overall goals of the organization. These activates are carried out by two types of knowledge in the organization called explicit and implicit knowledge. Among these, implicit knowledge is the knowledge that controls a major part of the activities of an organization, controls these activities internally and will not be transferred to the process owners unless they are present during the organization's work. Therefore the goal of this study is identification of implicit knowledge and its integration with explicit knowledge in order to improve human resources management, physical resource management, information resource management, training of new employees and other activities of Isfahan University of Medical Science. The project for documentation of activities in department of health of Isfahan University of Medical Science was carried out in several stages. First the main processes and related sub processes were identified and categorized with the help of planning expert. The categorization was carried out from smaller processes to larger ones. In this stage the experts of each process wrote down all their daily activities and organized them into general categories based on logical and physical relations between different activities. Then each activity was assigned a specific code. The computer software was designed after understanding the different parts of the processes, including main and sup processes, and categorization, which will be explained in the following sections. The findings of this study showed that documentation of activities can help expose implicit knowledge because all of inputs and outputs of a process along with the length, location, tools and different stages of the process, exchanged information, storage location of the information and information flow can be identified using proper

  8. Electronic Document Management Using Inverted Files System

    Science.gov (United States)

    Suhartono, Derwin; Setiawan, Erwin; Irwanto, Djon

    2014-03-01

    The amount of documents increases so fast. Those documents exist not only in a paper based but also in an electronic based. It can be seen from the data sample taken by the SpringerLink publisher in 2010, which showed an increase in the number of digital document collections from 2003 to mid of 2010. Then, how to manage them well becomes an important need. This paper describes a new method in managing documents called as inverted files system. Related with the electronic based document, the inverted files system will closely used in term of its usage to document so that it can be searched over the Internet using the Search Engine. It can improve document search mechanism and document save mechanism.

  9. Electronic Document Management Using Inverted Files System

    Directory of Open Access Journals (Sweden)

    Suhartono Derwin

    2014-03-01

    Full Text Available The amount of documents increases so fast. Those documents exist not only in a paper based but also in an electronic based. It can be seen from the data sample taken by the SpringerLink publisher in 2010, which showed an increase in the number of digital document collections from 2003 to mid of 2010. Then, how to manage them well becomes an important need. This paper describes a new method in managing documents called as inverted files system. Related with the electronic based document, the inverted files system will closely used in term of its usage to document so that it can be searched over the Internet using the Search Engine. It can improve document search mechanism and document save mechanism.

  10. Technical basis document for internal dosimetry

    International Nuclear Information System (INIS)

    Hickman, D.P.

    1991-01-01

    This document provides the technical basis for the Chem-Nuclear Geotech (Geotech) internal dosimetry program. Geotech policy describes the intentions of the company in complying with radiation protection standards and the as low as reasonably achievable (ALARA) program. It uses this policy and applicable protection standards to derive acceptable methods and levels of bioassay to assure compliance. The models and computational methods used are described in detail within this document. FR-om these models, dose- conversion factors and derived limits are computed. These computations are then verified using existing documentation and verification information or by demonstration of the calculations used to obtain the dose-conversion factors and derived limits. Recommendations for methods of optimizing the internal dosimetry program to provide effective monitoring and dose assessment for workers are provided in the last section of this document. This document is intended to be used in establishing an accredited dosimetry program in accordance with expected Department of Energy Laboratory Accreditation Program (DOELAP) requirements for the selected radionuclides provided in this document, including uranium mill tailing mixtures. Additions and modifications to this document and procedures derived FR-om this document are expected in the future according to changes in standards and changes in programmatic mission

  11. Specifications for human factors guiding documents

    Energy Technology Data Exchange (ETDEWEB)

    Rhodes, W; Szlapetis, I; MacGregor, C [Rhodes and Associates Inc., Toronto, ON (Canada)

    1995-04-01

    This report specifies the content, function and appearance of three proposed human factors guiding documents to be used by the Atomic Energy Control board and its licensees. These three guiding documents, to be developed at a later date, are: (a) Human Factors Process Guide; (b) Human Factors Activities Guide; and (c) Human Factors Design Integration Guide. The specifications were developed by examining the best documents as identified in a previous contract with the AECB (Review of Human Factors Guidelines and Methods by W. Rhodes, I. Szlapetis et al. 1992), and a brief literature review. The best features and content were selected from existing documents and used to develop specifications for the guiding documents. The developer of the actual guides would use these specifications to produce comprehensive and consolidated documents at a later date. (author). 128 ref., 7 figs.

  12. Specifications for human factors guiding documents

    International Nuclear Information System (INIS)

    Rhodes, W.; Szlapetis, I.; MacGregor, C.

    1995-04-01

    This report specifies the content, function and appearance of three proposed human factors guiding documents to be used by the Atomic Energy Control board and its licensees. These three guiding documents, to be developed at a later date, are: (a) Human Factors Process Guide; (b) Human Factors Activities Guide; and (c) Human Factors Design Integration Guide. The specifications were developed by examining the best documents as identified in a previous contract with the AECB (Review of Human Factors Guidelines and Methods by W. Rhodes, I. Szlapetis et al. 1992), and a brief literature review. The best features and content were selected from existing documents and used to develop specifications for the guiding documents. The developer of the actual guides would use these specifications to produce comprehensive and consolidated documents at a later date. (author). 128 ref., 7 figs

  13. Model documentation report: Industrial sector demand module of the National Energy Modeling System

    International Nuclear Information System (INIS)

    1997-01-01

    This report documents the objectives, analytical approach, and development of the National Energy Modeling System (NEMS) Industrial Demand Model. The report catalogues and describes model assumptions, computational methodology, parameter estimation techniques, and model source code. This document serves three purposes. First, it is a reference document providing a detailed description of the NEMS Industrial Model for model analysts, users, and the public. Second, this report meets the legal requirement of the Energy Information Administration (EIA) to provide adequate documentation in support of its models. Third, it facilitates continuity in model development by providing documentation from which energy analysts can undertake model enhancements, data updates, and parameter refinements as future projects. The NEMS Industrial Demand Model is a dynamic accounting model, bringing together the disparate industries and uses of energy in those industries, and putting them together in an understandable and cohesive framework. The Industrial Model generates mid-term (up to the year 2015) forecasts of industrial sector energy demand as a component of the NEMS integrated forecasting system. From the NEMS system, the Industrial Model receives fuel prices, employment data, and the value of industrial output. Based on the values of these variables, the Industrial Model passes back to the NEMS system estimates of consumption by fuel types

  14. Evaluating Process Improvement Courses of Action Through Modeling and Simulation

    Science.gov (United States)

    2017-09-16

    calculate the impact of subsystem manufacturing tolerance to the final product reliability (Yassine & Falkenburg, 1999, pp. 223-234). Steward...Estimate Product Development Time. Proceedings of DETC󈨦 (pp. 1- 10). Atlanta: ASME Design Engineering Techincal Conferences. Choo, H. J., Hammond, J...Whitney, D. (2002). Information Hiding in Product Development: The Design Churn Effect. Cambridge: January. 99 REPORT DOCUMENTATION PAGE Form

  15. The Temptation of Documentation: Potential and Challenges of Videographic Documentation and Interpretation

    Directory of Open Access Journals (Sweden)

    Marie Winckler

    2014-02-01

    Full Text Available Insights into the civic education classroom can be gained through videographic documentation. Videographic material offers, as I argue in this article, great possibilities: Through a reconstructive approach insights into dimensions of civic education such as spatial organisation, symbolic representation and non-verbal communication may emerge. In this way, a deeper understanding of informal political learning in school can be obtained. These aspects have not yet been considered in depth with videographic documentation primarily employed to date in teacher training contexts and lesson evaluation. The case study I present here was inspired by the documentary method and both the potential and limitations of videographic interpretation are discussed in this context. The study also suggests that what is not offered by videographic documentation includes insights into the individual and collective integration of experiences in civic education lessons.

  16. SANSMIC design document.

    Energy Technology Data Exchange (ETDEWEB)

    Weber, Paula D. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Rudeen, David Keith [GRAM, Inc., Albuquerque, NM (United States)

    2015-07-01

    The United States Strategic Petroleum Reserve (SPR) maintains an underground storage system consisting of caverns that were leached or solution mined in four salt domes located near the Gulf of Mexico in Texas and Louisiana. The SPR comprises more than 60 active caverns containing approximately 700 million barrels of crude oil. Sandia National Labo- ratories (SNL) is the geotechnical advisor to the SPR. As the most pressing need at the inception of the SPR was to create and fill storage volume with oil, the decision was made to leach the caverns and fill them simultaneously (leach-fill). Therefore, A.J. Russo developed SANSMIC in the early 1980s which allows for a transient oil-brine interface (OBI) making it possible to model leach-fill and withdrawal operations. As the majority of caverns are currently filled to storage capacity, the primary uses of SANSMIC at this time are related to the effects of small and large withdrawals, expansion of existing caverns, and projecting future pillar to diameter ratios. SANSMIC was identified by SNL as a priority candidate for qualification. This report continues the quality assurance (QA) process by documenting the "as built" mathematical and numerical models that comprise this document. The pro- gram flow is outlined and the models are discussed in detail. Code features that were added later or were not documented previously have been expounded. No changes in the code's physics have occurred since the original documentation (Russo, 1981, 1983) although recent experiments may yield improvements to the temperature and plume methods in the future.

  17. Modeling Documents with Event Model

    Directory of Open Access Journals (Sweden)

    Longhui Wang

    2015-08-01

    Full Text Available Currently deep learning has made great breakthroughs in visual and speech processing, mainly because it draws lessons from the hierarchical mode that brain deals with images and speech. In the field of NLP, a topic model is one of the important ways for modeling documents. Topic models are built on a generative model that clearly does not match the way humans write. In this paper, we propose Event Model, which is unsupervised and based on the language processing mechanism of neurolinguistics, to model documents. In Event Model, documents are descriptions of concrete or abstract events seen, heard, or sensed by people and words are objects in the events. Event Model has two stages: word learning and dimensionality reduction. Word learning is to learn semantics of words based on deep learning. Dimensionality reduction is the process that representing a document as a low dimensional vector by a linear mode that is completely different from topic models. Event Model achieves state-of-the-art results on document retrieval tasks.

  18. GUI-Based Document Access via SATCOMMS: Online Electronic Document Retrieval at the European Telecommunications Satellite Organization EUTELSAT.

    Science.gov (United States)

    Burton, Adrian P.

    1995-01-01

    Discusses accessing online electronic documents at the European Telecommunications Satellite Organization (EUTELSAT). Highlights include off-site paper document storage, the document management system, benefits, the EUTELSAT Standard IBM Access software, implementation, the development process, and future enhancements. (AEF)

  19. Quantum Digital Signatures for Unconditional Safe Authenticity Protection of Medical Documentation

    Directory of Open Access Journals (Sweden)

    Arkadiusz Liber

    2015-12-01

    Full Text Available Modern medical documentation appears most often in an online form which requires some digital methods to ensure its confidentiality, integrity and authenticity. The document authenticity may be secured with the use of a signature. A classical handwritten signature is directly related to its owner by his/her psychomotor character traits. Such a signature is also connected with the material it is written on, and a writing tool. Because of these properties, a handwritten signature reflects certain close material bonds between the owner and the document. In case of modern digital signatures, the document authentication has a mathematical nature. The verification of the authenticity becomes the verification of a key instead of a human. Since 1994 it has been known that classical digital signature algorithms may not be safe because of the Shor’s factorization algorithm. To implement the modern authenticity protection of medical data, some new types of algorithms should be used. One of the groups of such algorithms is based on the quantum computations. In this paper, the analysis of the current knowledge status of Quantum Digital Signature protocols, with its basic principles, phases and common elements such as transmission, comparison and encryption, was outlined. Some of the most promising protocols for signing digital medical documentation, that fulfill the requirements for QDS, were also briefly described. We showed that, a QDS protocol with QKD components requires the equipment similar to the equipment used for a QKD, for its implementation, which is already commercially available. If it is properly implemented, it provides the shortest lifetime of qubits in comparison to other protocols. It can be used not only to sign classical messages but probably it could be well adopted to implement unconditionally safe protection of medical documentation in the nearest future, as well.

  20. Personalized Metaheuristic Clustering Onto Web Documents

    Institute of Scientific and Technical Information of China (English)

    Wookey Lee

    2004-01-01

    Optimal clustering for the web documents is known to complicated cornbinatorial Optimization problem and it is hard to develop a generally applicable oplimal algorithm. An accelerated simuIated arlneaIing aIgorithm is developed for automatic web document classification. The web document classification problem is addressed as the problem of best describing a match between a web query and a hypothesized web object. The normalized term frequency and inverse document frequency coefficient is used as a measure of the match. Test beds are generated on - line during the search by transforming model web sites. As a result, web sites can be clustered optimally in terms of keyword vectofs of corresponding web documents.

  1. 10 CFR 21.31 - Procurement documents.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Procurement documents. 21.31 Section 21.31 Energy NUCLEAR REGULATORY COMMISSION REPORTING OF DEFECTS AND NONCOMPLIANCE Procurement Documents § 21.31 Procurement documents. Each individual, corporation, partnership, dedicating entity, or other entity subject to the...

  2. Document flow segmentation for business applications

    Science.gov (United States)

    Daher, Hani; Belaïd, Abdel

    2013-12-01

    The aim of this paper is to propose a document flow supervised segmentation approach applied to real world heterogeneous documents. Our algorithm treats the flow of documents as couples of consecutive pages and studies the relationship that exists between them. At first, sets of features are extracted from the pages where we propose an approach to model the couple of pages into a single feature vector representation. This representation will be provided to a binary classifier which classifies the relationship as either segmentation or continuity. In case of segmentation, we consider that we have a complete document and the analysis of the flow continues by starting a new document. In case of continuity, the couple of pages are assimilated to the same document and the analysis continues on the flow. If there is an uncertainty on whether the relationship between the couple of pages should be classified as a continuity or segmentation, a rejection is decided and the pages analyzed until this point are considered as a "fragment". The first classification already provides good results approaching 90% on certain documents, which is high at this level of the system.

  3. Traceability Method for Software Engineering Documentation

    OpenAIRE

    Nur Adila Azram; Rodziah Atan

    2012-01-01

    Traceability has been widely discussed in research area. It has been one of interest topic to be research in software engineering. Traceability in software documentation is one of the interesting topics to be research further. It is important in software documentation to trace out the flow or process in all the documents whether they depends with one another or not. In this paper, we present a traceability method for software engineering documentation. The objective of this research is to fac...

  4. Areva - 2011 Reference document; Areva - Document de reference 2011

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    After having indicated the person responsible of this document and the legal account auditors, and provided some financial information, this document gives an overview of the different risk factors existing in the company: law risks, industrial and environmental risks, operational risks, risks related to large projects, market and liquidity risks. Then, after having recalled the history and evolution of the company and the evolution of its investments over the last five years, it proposes an overview of Areva's activities on the markets of nuclear energy and renewable energies, of its clients and suppliers, of its strategy, of the activities of its different departments. Other information are provided: company's flow chart, estate properties (plants, equipment), an analysis of its financial situation, its research and development policy, the present context, profit previsions or estimations, management organization and operation

  5. Document image analysis: A primer

    Indian Academy of Sciences (India)

    R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22

    (1) Typical documents in today's office are computer-generated, but even so, inevitably by different computers and ... different sizes, from a business card to a large engineering drawing. Document analysis ... Whether global or adaptive ...

  6. Are PDF Documents Accessible?

    Directory of Open Access Journals (Sweden)

    Mireia Ribera Turró

    2008-09-01

    Full Text Available Adobe PDF is one of the most widely used formats in scientific communications and in administrative documents. In its latest versions it has incorporated structural tags and improvements that increase its level of accessibility. This article reviews the concept of accessibility in the reading of digital documents and evaluates the accessibility of PDF according to the most widely established standards.

  7. A document processing pipeline for annotating chemical entities in scientific documents.

    Science.gov (United States)

    Campos, David; Matos, Sérgio; Oliveira, José L

    2015-01-01

    The recognition of drugs and chemical entities in text is a very important task within the field of biomedical information extraction, given the rapid growth in the amount of published texts (scientific papers, patents, patient records) and the relevance of these and other related concepts. If done effectively, this could allow exploiting such textual resources to automatically extract or infer relevant information, such as drug profiles, relations and similarities between drugs, or associations between drugs and potential drug targets. The objective of this work was to develop and validate a document processing and information extraction pipeline for the identification of chemical entity mentions in text. We used the BioCreative IV CHEMDNER task data to train and evaluate a machine-learning based entity recognition system. Using a combination of two conditional random field models, a selected set of features, and a post-processing stage, we achieved F-measure results of 87.48% in the chemical entity mention recognition task and 87.75% in the chemical document indexing task. We present a machine learning-based solution for automatic recognition of chemical and drug names in scientific documents. The proposed approach applies a rich feature set, including linguistic, orthographic, morphological, dictionary matching and local context features. Post-processing modules are also integrated, performing parentheses correction, abbreviation resolution and filtering erroneous mentions using an exclusion list derived from the training data. The developed methods were implemented as a document annotation tool and web service, freely available at http://bioinformatics.ua.pt/becas-chemicals/.

  8. EFFICIENT ADAPTIVE STEGANOGRAPHY FOR COLOR IMAGESBASED ON LSBMR ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. Sharmila

    2012-02-01

    Full Text Available Steganography is the art of hiding the fact that communication is taking place, by hiding information in other medium. Many different carrier file formats can be used, but digital images are the most popular because of their frequent use on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques. The Least Significant Bit (LSB based approach is a simplest type of steganographic algorithm. In all the existing approaches, the decision of choosing the region within a cover image is performed without considering the relationship between image content and the size of secret message. Thus, the plain regions in the cover will be ruin after data hiding even at a low data rate. Hence choosing the edge region for data hiding will be a solution. Many algorithms are deal with edges in images for data hiding. The Paper 'Edge adaptive image steganography based on LSBMR algorithm' is a LSB steganography presented the results of algorithms on gray-scale images only. This paper presents the results of analyzing the performance of edge adaptive steganography for colored images (JPEG. The algorithms have been slightly modified for colored image implementation and are compared on the basis of evaluation parameters like peak signal noise ratio (PSNR and mean square error (MSE. This method can select the edge region depending on the length of secret message and difference between two consecutive bits in the cover image. For length of message is short, only small edge regions are utilized while on leaving other region as such. When the data rate increases, more regions can be used adaptively for data hiding by adjusting the parameters. Besides this, the message is encrypted using efficient cryptographic algorithm which further increases the security.

  9. 10 CFR 71.113 - Document control.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Document control. 71.113 Section 71.113 Energy NUCLEAR....113 Document control. The licensee, certificate holder, and applicant for a CoC shall establish measures to control the issuance of documents such as instructions, procedures, and drawings, including...

  10. Assessing theory of mind nonverbally in those with intellectual disability and ASD: the penny hiding game.

    Science.gov (United States)

    San José Cáceres, Antonia; Keren, Noa; Booth, Rhonda; Happé, Francesca

    2014-10-01

    Individuals with autism spectrum disorder (ASD) and low intellectual/language abilities are often omitted from experimental studies because of the challenges of testing these individuals. It is vital to develop appropriate and accessible tasks so that this significant part of the spectrum is not neglected. The theory of mind (ToM) has been extensively assessed in ASD, predominantly in relatively high-functioning individuals with reasonable language skills. This study aims to assess the ToM abilities of a sample of 132 participants with intellectual disability (ID) with and without ASD, matched in verbal mental age (VMA) and chronological age, using a naturalistic and nonverbal deception task: the Penny Hiding Game (PHG). The relationship between performance on the PHG and everyday adaptation was also studied. The PHG proved accessible to most participants, suggesting its suitability for use with individuals with low cognitive skills, attentional problems, and limited language. The ASD + ID group showed significantly more PHG errors, and fewer tricks, than the ID group. PHG performance correlated with Vineland adaptation scores for both groups. VMA was a major predictor of passing the task in both groups, and participants with ASD + ID required, on average, 2 years higher VMA than those with ID only, to achieve the same level of PHG success. VMA moderated the association between PHG performance and real-life social skills for the ASD + ID more than the ID group, suggesting that severely impaired individuals with ASD may rely on verbal ability to overcome their social difficulties, whereas individuals with ID alone may use more intuitive social understanding both in the PHG and everyday situations. © 2014 International Society for Autism Research, Wiley Periodicals, Inc.

  11. 10 CFR 72.152 - Document control.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Document control. 72.152 Section 72.152 Energy NUCLEAR... Document control. The licensee, applicant for a license, certificate holder, and applicant for a CoC shall establish measures to control the issuance of documents such as instructions, procedures, and drawings...

  12. Let Documents Talk to Each Other: A Computer Model for Connection of Short Documents.

    Science.gov (United States)

    Chen, Z.

    1993-01-01

    Discusses the integration of scientific texts through the connection of documents and describes a computer model that can connect short documents. Information retrieval and artificial intelligence are discussed; a prototype system of the model is explained; and the model is compared to other computer models. (17 references) (LRW)

  13. Automatic de-identification of textual documents in the electronic health record: a review of recent research

    Directory of Open Access Journals (Sweden)

    South Brett R

    2010-08-01

    Full Text Available Abstract Background In the United States, the Health Insurance Portability and Accountability Act (HIPAA protects the confidentiality of patient data and requires the informed consent of the patient and approval of the Internal Review Board to use data for research purposes, but these requirements can be waived if data is de-identified. For clinical data to be considered de-identified, the HIPAA "Safe Harbor" technique requires 18 data elements (called PHI: Protected Health Information to be removed. The de-identification of narrative text documents is often realized manually, and requires significant resources. Well aware of these issues, several authors have investigated automated de-identification of narrative text documents from the electronic health record, and a review of recent research in this domain is presented here. Methods This review focuses on recently published research (after 1995, and includes relevant publications from bibliographic queries in PubMed, conference proceedings, the ACM Digital Library, and interesting publications referenced in already included papers. Results The literature search returned more than 200 publications. The majority focused only on structured data de-identification instead of narrative text, on image de-identification, or described manual de-identification, and were therefore excluded. Finally, 18 publications describing automated text de-identification were selected for detailed analysis of the architecture and methods used, the types of PHI detected and removed, the external resources used, and the types of clinical documents targeted. All text de-identification systems aimed to identify and remove person names, and many included other types of PHI. Most systems used only one or two specific clinical document types, and were mostly based on two different groups of methodologies: pattern matching and machine learning. Many systems combined both approaches for different types of PHI, but the

  14. Automatic de-identification of textual documents in the electronic health record: a review of recent research.

    Science.gov (United States)

    Meystre, Stephane M; Friedlin, F Jeffrey; South, Brett R; Shen, Shuying; Samore, Matthew H

    2010-08-02

    In the United States, the Health Insurance Portability and Accountability Act (HIPAA) protects the confidentiality of patient data and requires the informed consent of the patient and approval of the Internal Review Board to use data for research purposes, but these requirements can be waived if data is de-identified. For clinical data to be considered de-identified, the HIPAA "Safe Harbor" technique requires 18 data elements (called PHI: Protected Health Information) to be removed. The de-identification of narrative text documents is often realized manually, and requires significant resources. Well aware of these issues, several authors have investigated automated de-identification of narrative text documents from the electronic health record, and a review of recent research in this domain is presented here. This review focuses on recently published research (after 1995), and includes relevant publications from bibliographic queries in PubMed, conference proceedings, the ACM Digital Library, and interesting publications referenced in already included papers. The literature search returned more than 200 publications. The majority focused only on structured data de-identification instead of narrative text, on image de-identification, or described manual de-identification, and were therefore excluded. Finally, 18 publications describing automated text de-identification were selected for detailed analysis of the architecture and methods used, the types of PHI detected and removed, the external resources used, and the types of clinical documents targeted. All text de-identification systems aimed to identify and remove person names, and many included other types of PHI. Most systems used only one or two specific clinical document types, and were mostly based on two different groups of methodologies: pattern matching and machine learning. Many systems combined both approaches for different types of PHI, but the majority relied only on pattern matching, rules, and

  15. The Application Of Open-Source And Free Photogrammetric Software For The Purposes Of Cultural Heritage Documentation

    Directory of Open Access Journals (Sweden)

    Bartoš Karol

    2014-07-01

    Full Text Available The documentation of cultural heritage is an essential part of appropriate care of historical monuments, representing a part of our history. At present, it represents the current issue, for which considerable funds are being spent, as well as for the documentation of immovable historical monuments in a form of castle ruins, among the others. Non-contact surveying technologies - terrestrial laser scanning and digital photogrammetry belong to the most commonly used technologies, by which suitable documentation can be obtained, however their use may be very costly. In recent years, various types of software products and web services based on the SfM (or MVS method and developed as open-source software, or as a freely available and free service, relying on the basic principles of photogrammetry and computer vision, have started to get into the spotlight. By using the services and software, acquired digital images of a given object can be processed into a point cloud, serving directly as a final output or as a basis for further processing. The aim of this paper, based on images of various objects of the Slanec castle ruins obtained by the DSLR Pentax K5, is to assess the suitability of different types of open-source and free software and free web services and their reliability in terms of surface reconstruction and photo-texture quality for the purposes of castle ruins documentation.

  16. Gestión documental, febrero 2010

    OpenAIRE

    Bustelo Ruesta, Carlota; García Morales, Elisa

    2010-01-01

    La gestió documental té com a finalitat assegurar una atenció adequada als documents creats, rebuts o gestionats per una organització com a prova de les activitats realitzades, preservant-los durant el temps què sigui necessari. Aquesta assignatura pretén proporcionar els coneixements teòrics i pràctics necessaris per a analitzar, dissenyar i implementar un sistema de gestió documental. Per aquesta raó, es centra en la gestió dels documents que una organització manté com a resultat dels seus ...

  17. Radiocarbon dating of ancient Japanese documents

    International Nuclear Information System (INIS)

    Oda, H.

    2001-01-01

    History is a reconstruction of past human activity, evidence of which is remained in the form of documents or relics. For the reconstruction of historic period, the radiocarbon dating of ancient documents provides important information. Although radiocarbon age is converted into calendar age with the calibration curve, the calibrated radiocarbon age is still different from the historical age when the document was written. The difference is known as 'old wood effect' for wooden cultural property. The discrepancy becomes more serious problem for recent sample which requires more accurate age determination. Using Tandetron accelerator mass spectrometer at Nagoya University, we have measured radiocarbon ages of Japanese ancient documents, sutras and printed books written dates of which are clarified from the paleographic standpoint. The purpose is to clarify the relation between calibrated radiocarbon age and historical age of ancient Japanese document by AMS radiocarbon dating. This paper reports 23 radiocarbon ages of ancient Japanese documents, sutras and printed books. The calibrated radiocarbon ages are in good agreement with the corresponding historical ages. It was shown by radiocarbon dating of the ancient documents that Japanese paper has little gap by 'old wood effect'; accordingly, ancient Japanese paper is a suitable sample for radiocarbon dating of recent historic period. (author)

  18. AREVA 2009 reference document; AREVA document de reference 2009

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-07-01

    This Reference Document contains information on the AREVA group's objectives, prospects and development strategies. It contains information on the markets, market shares and competitive position of the AREVA group. This information provides an adequate picture of the size of these markets and of the AREVA group's competitive position. Content: 1 - Person responsible for the Reference Document and Attestation by the person responsible for the Reference Document; 2 - Statutory and Deputy Auditors; 3 - Selected financial information; 4 - Risks: Risk management and coverage, Legal risk, Industrial and environmental risk, Operating risk, Risk related to major projects, Liquidity and market risk, Other risk; 5 - Information about the issuer: History and development, Investments; 6 - Business overview: Markets for nuclear power and renewable energies, AREVA customers and suppliers, Overview and strategy of the group, Business divisions, Discontinued operations: AREVA Transmission and Distribution; 7 - Organizational structure; 8 - Property, plant and equipment: Principal sites of the AREVA group, Environmental issues that may affect the issuer's; 9 - Analysis of and comments on the group's financial position and performance: Overview, Financial position, Cash flow, Statement of financial position, Events subsequent to year-end closing for 2009; 10 - Capital Resources; 11 - Research and development programs, patents and licenses; 12 -trend information: Current situation, Financial objectives; 13 - Profit forecasts or estimates; 14 - Administrative, management and supervisory bodies and senior management; 15 - Compensation and benefits; 16 - Functioning of corporate bodies; 17 - Employees; 18 - Principal shareholders; 19 - Transactions with related parties: French state, CEA, EDF group; 20 - Financial information concerning assets, financial positions and financial performance; 21 - Additional information: Share capital, Certificate of incorporation and

  19. 14 CFR 406.113 - Filing documents with the Docket Management System (DMS) and sending documents to the...

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Filing documents with the Docket Management System (DMS) and sending documents to the administrative law judge and Assistant Chief Counsel for... Management System (DMS) and sending documents to the administrative law judge and Assistant Chief Counsel for...

  20. Recommended documentation for computer users at ANL

    Energy Technology Data Exchange (ETDEWEB)

    Heiberger, A.A.

    1992-04-01

    Recommended Documentation for Computer Users at ANL is for all users of the services available from the Argonne National Laboratory (ANL) Computing and Telecommunications Division (CTD). This document will guide you in selecting available documentation that will best fill your particular needs. Chapter 1 explains how to use this document to select documents and how to obtain them from the CTD Document Distribution Counter. Chapter 2 contains a table that categorizes available publications. Chapter 3 gives descriptions of the online DOCUMENT command for CMS, and VAX, and the Sun workstation. DOCUMENT allows you to scan for and order documentation that interests you. Chapter 4 lists publications by subject. Categories I and IX cover publications of a general nature and publications on telecommunications and networks respectively. Categories II, III, IV, V, VI, VII, VIII, and X cover publications on specific computer systems. Category XI covers publications on advanced scientific computing at Argonne. Chapter 5 contains abstracts for each publication, all arranged alphabetically. Chapter 6 describes additional publications containing bibliographies and master indexes that the user may find useful. The appendix identifies available computer systems, applications, languages, and libraries.

  1. Can organic matter hide from decomposers in the labyrinth of soil aggregates? Micro-engineered Soil Chips challenging foraging fungi

    Science.gov (United States)

    Hammer, Edith C.; Aleklett, Kristin; Arellano Caicedo, Carlos G.; Bengtsson, Martin; Micaela Mafla Endara, Paola; Ohlsson, Pelle

    2017-04-01

    From the point of view of microorganisms, the soil environment is an enormously complex labyrinth with paths and dead-end streets, where resources and shelters are unevenly distributed. We study foraging strategies of soil organisms, especially fungi, and the possibility of physio-spatial stabilization of organic matter by "hiding" in occluded soil spaces. We manipulate growth habitat microstructure with lab-on-a-chip techniques, where we designed complex environments with channels and obstacle at dimensions of the size of hyphae, and construct them in the transparent, gas-permeable polymer PDMS. We fill those with different nutrient solutions or combine with mineral nutrient gradients, and inoculate them with soil organisms. We analyze organisms and substrates with microscopy, fluorescence microscopy and analytical chemistry. We compared different soil litter decomposers and an arbuscular mycorrhizal fungus for their ability to forage through complex air-gap structures and attempt to classify them into functional traits concerning their mycelium directionality, space-exploring approach and ability to grow through acute angles and narrow constrictions. We identified structures which are very difficult to penetrate for most species, and compounds located behind such features may thus be spatially unavailable for decomposers. We discuss our approach in comparison to soil pore space tomographic analyses and findings we made in the pore space of colonized wood biochar.

  2. DOCUMENTATION AND MONITORING OF BUILT HERITAGE IN ABU DHABI, UAE

    Directory of Open Access Journals (Sweden)

    S. Muhammad

    2013-07-01

    Full Text Available The ancient oasis-city of Al Ain in Abu Dhabi Emirate still retains the most important and outstanding cultural heritage of United Arab Emirates (UAE. The larger area of Abu Dhabi Emirate comprised of archaeological sites, cultural landscapes and historic buildings dating back to 3rd millennium to the recent pre-oil era. Traditional materials like stone, earth and palm wood were used in combination with local construction methods. For the last seven years the newly formed Abu Dhabi Tourism & Culture Authority (TCA Abu Dhabi1 has been actively involved in conservation of built heritage in Abu Dhabi Emirate with the help of its Conservation Section. Documentation prior to any conservation and restoration works is considered as a basic pre-requisite for understanding an historic building or site. It is a process which continues during the conservation of any monument and is the only accurate tool for recording information in order to understand the structure, ultimately leading to the management of cultural heritage. Application and use of tools, ranging from basic manual techniques to 3D laser scanning, based on the best practices and international guidelines the exercise will help in establishing a documentation lab with standard procedures, specifications and tools for the documentation and monitoring the built heritage of Abu Dhabi Emirate. This paper will discuss a range of case studies and will demonstrate how documentation and monitoring of the built heritage has augmented the various conservation initiatives on a variety of building types.

  3. Mined Geologic Disposal System Requirements Document

    International Nuclear Information System (INIS)

    1993-01-01

    This Mined Geologic Disposal System Requirements document (MGDS-RD) describes the functions to be performed by, and the requirements for, a Mined Geologic Disposal System (MGDS) for the permanent disposal of spent nuclear fuel (SNF) and commercial and defense high level radioactive waste (HLW) in support of the Civilian Radioactive Waste Management System (CRWMS). The development and control of the MGDS-RD is quality-affecting work and is subject to the Department of Energy (DOE) Office of Civilian Radioactive Waste Management (OCRWM) Quality Assurance Requirements Document (QARD). As part of the technical requirements baseline, it is also subject to Baseline Management Plan controls. The MGDS-RD and the other program-level requirements documents have been prepared and managed in accordance with the Technical Document Preparation Plan (TDPP) for the Preparation of System Requirements Documents

  4. XML documents cluster research based on frequent subpatterns

    Science.gov (United States)

    Ding, Tienan; Li, Wei; Li, Xiongfei

    2015-12-01

    XML data is widely used in the information exchange field of Internet, and XML document data clustering is the hot research topic. In the XML document clustering process, measure differences between two XML documents is time costly, and impact the efficiency of XML document clustering. This paper proposed an XML documents clustering method based on frequent patterns of XML document dataset, first proposed a coding tree structure for encoding the XML document, and translate frequent pattern mining from XML documents into frequent pattern mining from string. Further, using the cosine similarity calculation method and cohesive hierarchical clustering method for XML document dataset by frequent patterns. Because of frequent patterns are subsets of the original XML document data, so the time consumption of XML document similarity measure is reduced. The experiment runs on synthetic dataset and the real datasets, the experimental result shows that our method is efficient.

  5. Documentation of spectrom-41

    International Nuclear Information System (INIS)

    Svalstad, D.K.

    1989-01-01

    SPECTROM-41 is a finite element heat transfer computer program developed to analyze thermal problems related to nuclear waste disposal. The code is part of the SPECTROM (Special Purpose Engineering Codes for Thermal/ROck Mechanics) series of special purpose finite element programs that are continually being developed by RE/SPEC Inc. (RSI) to address the many unique formations. This document presents the theoretical basis for the mathematical model, the finite element formulation of the program, and a description of the input data for the program, along with details about program support and continuing documentation. The documentation is intended to satisfy the requirements and guidelines outlined in NUREG-0856. The principal component model used in the programs based on Fourier's law of conductance. Numerous program options provide the capability of considering various boundary conditions, material stratification and anisotropy, and time-dependent heat generation that are characteristic of problems involving the disposal of nuclear waste in geologic formation. Numerous verification problems are included in the documentation in addition to highlights of past and ongoing verification and validation efforts. A typical repository problem is solving using SPECTROM-41 to demonstrate the use of the program in addressing problems related to the disposal of nuclear waste

  6. Implementation Guidance Document: Properties and Types of Significant Photothermal Retinal Lesion Injuries

    Science.gov (United States)

    2017-04-17

    Include area code) (703) 432-0899 Standard Form 298 (Rev. 8/98) Prescribed 1::r;< ANSI S1d. Z39.18 Adobe Professional 7 .O Properties and Types of...are above MPE yet well below an irradiance that could cause significant retinal injuries. Estimating RSI in Practice - Some Illustrative Examples

  7. Use of an advanced document system in post-refuelling updating of nuclear power plant documentation

    International Nuclear Information System (INIS)

    Puech Suanzes, P.; Cortes Soler, M.

    1993-01-01

    This paper discusses the results of the extensive use of an advanced document system to update documentation prepared by traditional methods and affected by changes in the period between two plant refuellings. The implementation of a system for the capture, retrieval and storage of drawings using optical discs is part of a plan to modernize production and management tools and to thus achieve better control of document configuration. These processes are consequently optimized in that: 1. The deterioration of drawings is detained with the help of an identical, updated, legible, reliable support for all users. 2. The time required to update documentation is reduced. Given the large number of drawings, the implementation method should effectively combine costs and time. The document management tools ensure optical disc storage control so that from the moment a drawing resides in the system, any modification to it is made through the system utilities, thus ensuring quality and reducing schedules. The system described was used to update the electrical drawings of Almaraz Nuclear Power Plant. Changes made during the eighth refuelling of Unit I were incorporated and the time needed to issue the updated drawings was reduced by one month. (author)

  8. Technical basis document for external events

    International Nuclear Information System (INIS)

    OBERG, B.D.

    2003-01-01

    This document supports the Tank Farms Documented Safety Analysis and presents the technical basis for the FR-equencies of externally initiated accidents. The consequences of externally initiated events are discussed in other documents that correspond to the accident that was caused by the external event. The external events include aircraft crash, vehicle accident, range fire, and rail accident

  9. ENDF/B summary documentation

    International Nuclear Information System (INIS)

    Garber, D.

    1975-10-01

    Descriptions of the evaluations contained in the ENDF/B library are given. The summary documentation presented is intended to be a more detailed description than the (File 1) comments contained in the computer-readable data files, but not so detailed as the formal reports describing each ENDF/B evaluation. The documentations were written by the CSEWG evaluators and compiled by NNCSC. Selected materials which comprise this volume include from 1 H to 244 Cm

  10. NCBI Bookshelf: books and documents in life sciences and health care.

    Science.gov (United States)

    Hoeppner, Marilu A

    2013-01-01

    Bookshelf (http://www.ncbi.nlm.nih.gov/books/) is a full-text electronic literature resource of books and documents in life sciences and health care at the National Center for Biotechnology Information (NCBI). Created in 1999 with a single book as an encyclopedic reference for resources such as PubMed and GenBank, it has grown to its current size of >1300 titles. Unlike other NCBI databases, such as GenBank and Gene, which have a strict data structure, books come in all forms; they are diverse in publication types, formats, sizes and authoring models. The Bookshelf data format is XML tagged in the NCBI Book DTD (Document Type Definition), modeled after the National Library of Medicine journal article DTDs. The book DTD has been used for systematically tagging the diverse data formats of books, a move that has set the foundation for the growth of this resource. Books at NCBI followed the route of journal articles in the PubMed Central project, using the PubMed Central architectural framework, workflows and processes. Through integration with other NCBI molecular databases, books at NCBI can be used to provide reference information for biological data and facilitate its discovery. This article describes Bookshelf at NCBI: its growth, data handling and retrieval and integration with molecular databases.

  11. QCS: a system for querying, clustering and summarizing documents.

    Energy Technology Data Exchange (ETDEWEB)

    Dunlavy, Daniel M.; Schlesinger, Judith D. (Center for Computing Sciences, Bowie, MD); O' Leary, Dianne P. (University of Maryland, College Park, MD); Conroy, John M. (Center for Computing Sciences, Bowie, MD)

    2006-10-01

    Information retrieval systems consist of many complicated components. Research and development of such systems is often hampered by the difficulty in evaluating how each particular component would behave across multiple systems. We present a novel hybrid information retrieval system--the Query, Cluster, Summarize (QCS) system--which is portable, modular, and permits experimentation with different instantiations of each of the constituent text analysis components. Most importantly, the combination of the three types of components in the QCS design improves retrievals by providing users more focused information organized by topic. We demonstrate the improved performance by a series of experiments using standard test sets from the Document Understanding Conferences (DUC) along with the best known automatic metric for summarization system evaluation, ROUGE. Although the DUC data and evaluations were originally designed to test multidocument summarization, we developed a framework to extend it to the task of evaluation for each of the three components: query, clustering, and summarization. Under this framework, we then demonstrate that the QCS system (end-to-end) achieves performance as good as or better than the best summarization engines. Given a query, QCS retrieves relevant documents, separates the retrieved documents into topic clusters, and creates a single summary for each cluster. In the current implementation, Latent Semantic Indexing is used for retrieval, generalized spherical k-means is used for the document clustering, and a method coupling sentence 'trimming', and a hidden Markov model, followed by a pivoted QR decomposition, is used to create a single extract summary for each cluster. The user interface is designed to provide access to detailed information in a compact and useful format. Our system demonstrates the feasibility of assembling an effective IR system from existing software libraries, the usefulness of the modularity of the design

  12. QCS : a system for querying, clustering, and summarizing documents.

    Energy Technology Data Exchange (ETDEWEB)

    Dunlavy, Daniel M.

    2006-08-01

    Information retrieval systems consist of many complicated components. Research and development of such systems is often hampered by the difficulty in evaluating how each particular component would behave across multiple systems. We present a novel hybrid information retrieval system--the Query, Cluster, Summarize (QCS) system--which is portable, modular, and permits experimentation with different instantiations of each of the constituent text analysis components. Most importantly, the combination of the three types of components in the QCS design improves retrievals by providing users more focused information organized by topic. We demonstrate the improved performance by a series of experiments using standard test sets from the Document Understanding Conferences (DUC) along with the best known automatic metric for summarization system evaluation, ROUGE. Although the DUC data and evaluations were originally designed to test multidocument summarization, we developed a framework to extend it to the task of evaluation for each of the three components: query, clustering, and summarization. Under this framework, we then demonstrate that the QCS system (end-to-end) achieves performance as good as or better than the best summarization engines. Given a query, QCS retrieves relevant documents, separates the retrieved documents into topic clusters, and creates a single summary for each cluster. In the current implementation, Latent Semantic Indexing is used for retrieval, generalized spherical k-means is used for the document clustering, and a method coupling sentence ''trimming'', and a hidden Markov model, followed by a pivoted QR decomposition, is used to create a single extract summary for each cluster. The user interface is designed to provide access to detailed information in a compact and useful format. Our system demonstrates the feasibility of assembling an effective IR system from existing software libraries, the usefulness of the modularity of

  13. Printable, scannable biometric templates for secure documents and materials

    Science.gov (United States)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  14. CAED Document Repository

    Data.gov (United States)

    U.S. Environmental Protection Agency — Compliance Assurance and Enforcement Division Document Repository (CAEDDOCRESP) provides internal and external access of Inspection Records, Enforcement Actions, and...

  15. A Cognitive Model of Document Use during a Research Project. Study I. Document Selection.

    Science.gov (United States)

    Wang, Peiling; Soergel, Dagobert

    1998-01-01

    Proposes a model of document selection by real users of a bibliographic retrieval system. Reports on Part I of a longitudinal study of decision making on document use by academics (25 faculty and graduate students in Agricultural Economics). Examines what components are relevant to the users' decisions and what cognitive process may have occurred…

  16. Does teaching of documentation of shoulder dystocia delivery through simulation result in improved documentation in real life?

    Science.gov (United States)

    Comeau, Robyn; Craig, Catherine

    2014-03-01

    Documentation of deliveries complicated by shoulder dystocia is a valuable communication skill necessary for residents to attain during residency training. Our objective was to determine whether the teaching of documentation of shoulder dystocia in a simulation environment would translate to improved documentation of the event in an actual clinical situation. We conducted a cohort study involving obstetrics and gynaecology residents in years 2 to 5 between November 2010 and December 2012. Each resident participated in a shoulder dystocia simulation teaching session and was asked to write a delivery note immediately afterwards. They were given feedback regarding their performance of the delivery and their documentation of the events. Following this, dictated records of shoulder dystocia deliveries immediately before and after the simulation session were identified through the Meditech system. An itemized checklist was used to assess the quality of residents' dictated documentation before and after the simulation session. All eligible residents (18) enrolled in the study, and 17 met the inclusion criteria. For 10 residents (59%) documentation of a delivery with shoulder dystocia was present before and after the simulation session, for five residents (29%) it was only present before the session, and for two residents (18%) it was only present after the session. When residents were assessed as a group, there were no differences in the proportion of residents recording items on the checklist before and after the simulation session (P > 0.05 for all). Similarly, analysis of the performance of the10 residents who had dictated documentation both before and after the session showed no differences in the number of elements recorded on dictations done before and after the simulation session (P > 0.05 for all). The teaching of shoulder dystocia documentation through simulation did not result in a measurable improvement in the quality of documentation of shoulder dystocia in

  17. LEGITIMATION DOCUMENTS ISSUED BY THE FRENCH MINISTRY OF FOREIGN AFFAIRS

    CERN Multimedia

    2003-01-01

    The French Ministry of Foreign Affairs (hereinafter referred to as "MAE") has sent a reminder of the following rules relating to legitimation documents (special cards, henceforth called "special residence permits" (titres de séjour spéciaux), and attestations de fonctions) that it issues. The Ministry has specified that compliance with these rules is essential to the proper functioning of any International Organization established in France. 1. Types of document and use a) Special CD, FI and AT residence permits They serve as residence permits for members of the personnel and the members of their families who are not of French nationality and who do not have the status of permanent resident (see N.B. below). Vis-à-vis the French authorities, they serve as proof that those holding these cards enjoy the privileges and immunities provided for by the Status Agreement between CERN and France (immunity from legal process in the discharge of their duties, entitlement to drive a vehicle registered in a special ...

  18. Document image database indexing with pictorial dictionary

    Science.gov (United States)

    Akbari, Mohammad; Azimi, Reza

    2010-02-01

    In this paper we introduce a new approach for information retrieval from Persian document image database without using Optical Character Recognition (OCR).At first an attribute called subword upper contour label is defined then, a pictorial dictionary is constructed based on this attribute for the subwords. By this approach we address two issues in document image retrieval: keyword spotting and retrieval according to the document similarities. The proposed methods have been evaluated on a Persian document image database. The results have proved the ability of this approach in document image information retrieval.

  19. The recovery of pollen evidence from documents and its forensic implications.

    Science.gov (United States)

    Morgan, R M; Davies, G; Balestri, F; Bull, P A

    2013-12-01

    Three experiments were undertaken to establish the potential for forensic palynological analysis in cases of suspected document fraud. The first study tested 6 different types of paper and 9 different types of ink (n=54) and it was established that the best retainer of particulates (in this case a proxy was used in the form of UV powder) was medium biro ink and Wove and Connoisseur paper. It was found that for the different paper types 42-52% of the particulates collected were found in the ink and thus both the paper and the ink are potentially valuable sources of trace evidence in a forensic investigation. The second study sought to address the differences in the spatial distribution of particulates on documents when writing took place before or after the paper was treated with UV particulates. Ninety-six observations were made for each piece of paper tested and it was found that when the writing took place after the particulates were applied to the paper; more particulates were retained on the paper in contrast to when the writing took place before the particulate treatment. The spatial distribution of particulates was also affected, with particulates being retained in the folds of the paper when the writing took place before particulate treatment in contrast to a more erratic pattern that emerged due to the pressure of the hand of the writer when the writing took place after the particulate treatment. The third study utilised lily (Lilium) pollen grains and the findings broadly concurred with the second study. The main difference identified was when the writing took place before the particulates were applied; when UV powder was used the particulates were retained in the folds of the paper whereas this pattern was not seen to the same degree when pollen grains were used due to their 'stickier' nature. Envelopes and the pen nibs were also found to be rich sources of pollen grains after the experiments were undertaken. These studies have implications for the

  20. Piles, tabs and overlaps in navigation among documents

    DEFF Research Database (Denmark)

    Jakobsen, Mikkel Rønne; Hornbæk, Kasper

    2010-01-01

    Navigation among documents is a frequent, but ill supported activity. Overlapping or tabbed documents are widespread, but they offer limited visibility of their content. We explore variations on navigation support: arranging documents with tabs, as overlapping windows, and in piles. In an experim......Navigation among documents is a frequent, but ill supported activity. Overlapping or tabbed documents are widespread, but they offer limited visibility of their content. We explore variations on navigation support: arranging documents with tabs, as overlapping windows, and in piles....... In an experiment we compared 11 participants’ navigation with these variations and found strong task effects. Overall, overlapping windows were preferred and their structured layout worked well with some tasks. Surprisingly, tabbed documents were efficient in tasks requiring simply finding a document. Piled...... on document navigation and its support by piling....

  1. The tissue microarray data exchange specification: A document type definition to validate and enhance XML data

    Science.gov (United States)

    Nohle, David G; Ayers, Leona W

    2005-01-01

    Background The Association for Pathology Informatics (API) Extensible Mark-up Language (XML) TMA Data Exchange Specification (TMA DES) proposed in April 2003 provides a community-based, open source tool for sharing tissue microarray (TMA) data in a common format. Each tissue core within an array has separate data including digital images; therefore an organized, common approach to produce, navigate and publish such data facilitates viewing, sharing and merging TMA data from different laboratories. The AIDS and Cancer Specimen Resource (ACSR) is a HIV/AIDS tissue bank consortium sponsored by the National Cancer Institute (NCI) Division of Cancer Treatment and Diagnosis (DCTD). The ACSR offers HIV-related malignancies and uninfected control tissues in microarrays (TMA) accompanied by de-identified clinical data to approved researchers. Exporting our TMA data into the proposed API specified format offers an opportunity to evaluate the API specification in an applied setting and to explore its usefulness. Results A document type definition (DTD) that governs the allowed common data elements (CDE) in TMA DES export XML files was written, tested and evolved and is in routine use by the ACSR. This DTD defines TMA DES CDEs which are implemented in an external file that can be supplemented by internal DTD extensions for locally defined TMA data elements (LDE). Conclusion ACSR implementation of the TMA DES demonstrated the utility of the specification and allowed application of a DTD to validate the language of the API specified XML elements and to identify possible enhancements within our TMA data management application. Improvements to the specification have additionally been suggested by our experience in importing other institution's exported TMA data. Enhancements to TMA DES to remove ambiguous situations and clarify the data should be considered. Better specified identifiers and hierarchical relationships will make automatic use of the data possible. Our tool can be

  2. HANFORD SITE SOLID WASTE MANAGEMENT ENVIRONMENTAL IMPACT STATEMENT TECHNICAL INFORMATION DOCUMENT [SEC 1 THRU 4

    International Nuclear Information System (INIS)

    FRITZ, L.L.

    2004-01-01

    This Technical Information Document (TID) provides engineering data to support DOE/EIS-0286, ''Hanford Site Solid (Radioactive and Hazardous) Waste Program Environmental Impact Statement''. Assumptions and waste volumes used to calculate engineering data are also provided in this document. This chapter provides a brief description of: the Solid Waste Management Program (including a description of waste types and known characteristics of waste covered under the program), the Hanford Site (including a general discussion of the operating areas), and the alternatives analyzed. The Hanford Site Solid Waste Management Program and DOE/EIS-0286 address solid radioactive waste types generated by various activities from both onsite and offsite generators. The Environmental Restoration (ER) waste management activities are not within the scope of DOE/EIS-0286 or this TID. Activities for processing and disposal of immobilized low-activity waste (ILAW) are not within the scope of the Solid Waste Management Program and this TID

  3. Vietnamese Document Representation and Classification

    Science.gov (United States)

    Nguyen, Giang-Son; Gao, Xiaoying; Andreae, Peter

    Vietnamese is very different from English and little research has been done on Vietnamese document classification, or indeed, on any kind of Vietnamese language processing, and only a few small corpora are available for research. We created a large Vietnamese text corpus with about 18000 documents, and manually classified them based on different criteria such as topics and styles, giving several classification tasks of different difficulty levels. This paper introduces a new syllable-based document representation at the morphological level of the language for efficient classification. We tested the representation on our corpus with different classification tasks using six classification algorithms and two feature selection techniques. Our experiments show that the new representation is effective for Vietnamese categorization, and suggest that best performance can be achieved using syllable-pair document representation, an SVM with a polynomial kernel as the learning algorithm, and using Information gain and an external dictionary for feature selection.

  4. Compression of Probabilistic XML Documents

    Science.gov (United States)

    Veldman, Irma; de Keijzer, Ander; van Keulen, Maurice

    Database techniques to store, query and manipulate data that contains uncertainty receives increasing research interest. Such UDBMSs can be classified according to their underlying data model: relational, XML, or RDF. We focus on uncertain XML DBMS with as representative example the Probabilistic XML model (PXML) of [10,9]. The size of a PXML document is obviously a factor in performance. There are PXML-specific techniques to reduce the size, such as a push down mechanism, that produces equivalent but more compact PXML documents. It can only be applied, however, where possibilities are dependent. For normal XML documents there also exist several techniques for compressing a document. Since Probabilistic XML is (a special form of) normal XML, it might benefit from these methods even more. In this paper, we show that existing compression mechanisms can be combined with PXML-specific compression techniques. We also show that best compression rates are obtained with a combination of PXML-specific technique with a rather simple generic DAG-compression technique.

  5. Technical basis document for internal dosimetry

    CERN Document Server

    Hickman, D P

    1991-01-01

    This document provides the technical basis for the Chem-Nuclear Geotech (Geotech) internal dosimetry program. Geotech policy describes the intentions of the company in complying with radiation protection standards and the as low as reasonably achievable (ALARA) program. It uses this policy and applicable protection standards to derive acceptable methods and levels of bioassay to assure compliance. The models and computational methods used are described in detail within this document. FR-om these models, dose- conversion factors and derived limits are computed. These computations are then verified using existing documentation and verification information or by demonstration of the calculations used to obtain the dose-conversion factors and derived limits. Recommendations for methods of optimizing the internal dosimetry program to provide effective monitoring and dose assessment for workers are provided in the last section of this document. This document is intended to be used in establishing an accredited dosi...

  6. AVIS: analysis method for document coherence

    International Nuclear Information System (INIS)

    Henry, J.Y.; Elsensohn, O.

    1994-06-01

    The present document intends to give a short insight into AVIS, a method which permits to verify the quality of technical documents. The paper includes the presentation of the applied approach based on the K.O.D. method, the definition of quality criteria of a technical document, as well as a description of the means of valuating these criteria. (authors). 9 refs., 2 figs

  7. Storing XML Documents in Databases

    NARCIS (Netherlands)

    A.R. Schmidt; S. Manegold (Stefan); M.L. Kersten (Martin); L.C. Rivero; J.H. Doorn; V.E. Ferraggine

    2005-01-01

    textabstractThe authors introduce concepts for loading large amounts of XML documents into databases where the documents are stored and maintained. The goal is to make XML databases as unobtrusive in multi-tier systems as possible and at the same time provide as many services defined by the XML

  8. Data Hiding and Security for XML Database: A TRBAC- Based Approach

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wan-song; SUN Wei; LIU Da-xin

    2005-01-01

    In order to cope with varying protection granularity levels of XML (eXtensible Markup Language) documents, we propose a TXAC (Two-level XML Access Control) framework, in which an extended TRBAC (Temporal Role-Based Access Control) approach is proposed to deal with the dynamic XML data. With different system components,TXAC algorithm evaluates access requests efficiently by appropriate access control policy in dynamic web environment.The method is a flexible and powerful security system offering a multi-level access control solution.

  9. Waste management system requirements document

    International Nuclear Information System (INIS)

    1991-02-01

    This volume defines the top level requirements for the Mined Geologic Disposal System (MGDS). It is designed to be used in conjunction with Volume 1 of the WMSR, General System Requirements. It provides a functional description expanding the requirements allocated to the MGDS in Volume 1 and elaborates on each requirement by providing associated performance criteria as appropriate. Volumes 1 and 4 of the WMSR provide a minimum set of requirements that must be satisfied by the final MGDS design. This document sets forth specific requirements that must be fulfilled. It is not the intent or purpose of this top level document to describe how each requirement is to be satisfied in the final MGDS design. Each subsequent level of the technical document hierarchy must provide further guidance and definition as to how each of these requirements is to be implemented in the design. It is expected that each subsequent level of requirements will be significantly more detailed. Section 2 of this volume provides a functional description of the MGDS. Each function is addressed in terms of requirements, and performance criteria. Section 3 provides a list of controlling documents. Each document cited in a requirement of Chapter 2 is included in this list and is incorporated into this document as a requirement on the final system. The WMSR addresses only federal requirements (i.e., laws, regulations and DOE orders). State and local requirements are not addressed. However, it will be specifically noted at the potentially affected WMSR requirements that there could be additional or more stringent regulations imposed by a state or local requirements or administering agency over the cited federal requirements

  10. Documenting Penicillin Allergy: The Impact of Inconsistency

    Science.gov (United States)

    Shah, Nirav S.; Ridgway, Jessica P.; Pettit, Natasha; Fahrenbach, John; Robicsek, Ari

    2016-01-01

    Background Allergy documentation is frequently inconsistent and incomplete. The impact of this variability on subsequent treatment is not well described. Objective To determine how allergy documentation affects subsequent antibiotic choice. Design Retrospective, cohort study. Participants 232,616 adult patients seen by 199 primary care providers (PCPs) between January 1, 2009 and January 1, 2014 at an academic medical system. Main Measures Inter-physician variation in beta-lactam allergy documentation; antibiotic treatment following beta-lactam allergy documentation. Key Results 15.6% of patients had a reported beta-lactam allergy. Of those patients, 39.8% had a specific allergen identified and 22.7% had allergic reaction characteristics documented. Variation between PCPs was greater than would be expected by chance (all ppenicillins”) (24.0% to 58.2%) and documentation of the reaction characteristics (5.4% to 51.9%). After beta-lactam allergy documentation, patients were less likely to receive penicillins (Relative Risk [RR] 0.16 [95% Confidence Interval: 0.15–0.17]) and cephalosporins (RR 0.28 [95% CI 0.27–0.30]) and more likely to receive fluoroquinolones (RR 1.5 [95% CI 1.5–1.6]), clindamycin (RR 3.8 [95% CI 3.6–4.0]) and vancomycin (RR 5.0 [95% CI 4.3–5.8]). Among patients with beta-lactam allergy, rechallenge was more likely when a specific allergen was identified (RR 1.6 [95% CI 1.5–1.8]) and when reaction characteristics were documented (RR 2.0 [95% CI 1.8–2.2]). Conclusions Provider documentation of beta-lactam allergy is highly variable, and details of the allergy are infrequently documented. Classification of a patient as beta-lactam allergic and incomplete documentation regarding the details of the allergy lead to beta-lactam avoidance and use of other antimicrobial agents, behaviors that may adversely impact care quality and cost. PMID:26981866

  11. Optimizing the electronic health record to standardize administration and documentation of nutritional supplements.

    Science.gov (United States)

    Citty, Sandra W; Kamel, Amir; Garvan, Cynthia; Marlowe, Lee; Westhoff, Lynn

    2017-01-01

    type, amount and frequency of nutritional products (p=0.0001). ENAR represented an effective strategy to improve administration and documentation of nutritional supplements for hospitalized patients.

  12. Reactor risk reference document: Appendices A-I, Draft for comment

    International Nuclear Information System (INIS)

    1987-02-01

    This document discusses the risks of severe accidents in a set of commercial nuclear power plants. This risk is characterized by the types and frequencies of accidents leading to severe core damage, the performance of containment structures under severe accident loadings, possible radioactive releases into the environment if the containment were to fail, and the offsite consequences of such releases. A discussion of the methods used to calculate risk is provided and the principal results of the analyses of the studied plants is summarized

  13. Structure and drafting of safeguards regulatory documents

    International Nuclear Information System (INIS)

    Cole, R.J.; Bennett, C.A.; Edelhertz, H.; Wood, M.T.; Brown, R.J.; Roberts, F.P.

    1977-09-01

    This study develops hypothesis about the relation between the structure and drafting of safeguards regulatory documents and the ability of document users to understand and implement them in a way that reflects the intent and requirements of the NRC. Four decisions are needed to improve communication: (1) Should improvement of safeguards regulatory documents as communication instruments be an explicit NRC program. (2) What specific methods of communication should be the focus of improvement efforts. (3) What actions to improve communications are feasible and desirable. (4) How should the NRC divide its available effort and resources among desirable actions in order to provide the most effective communication through regulatory documents. This volume contains: introduction, conceptual bases, legal requirements, targets, choice of documents, preparation of documents, readability, and further study of recommended changes in structure and drafting

  14. Documenting the Engineering Design Process

    Science.gov (United States)

    Hollers, Brent

    2017-01-01

    Documentation of ideas and the engineering design process is a critical, daily component of a professional engineer's job. While patent protection is often cited as the primary rationale for documentation, it can also benefit the engineer, the team, company, and stakeholders through creating a more rigorously designed and purposeful solution.…

  15. Document recognition serving people with disabilities

    Science.gov (United States)

    Fruchterman, James R.

    2007-01-01

    Document recognition advances have improved the lives of people with print disabilities, by providing accessible documents. This invited paper provides perspectives on the author's career progression from document recognition professional to social entrepreneur applying this technology to help people with disabilities. Starting with initial thoughts about optical character recognition in college, it continues with the creation of accurate omnifont character recognition that did not require training. It was difficult to make a reading machine for the blind in a commercial setting, which led to the creation of a nonprofit social enterprise to deliver these devices around the world. This network of people with disabilities scanning books drove the creation of Bookshare.org, an online library of scanned books. Looking forward, the needs for improved document recognition technology to further lower the barriers to reading are discussed. Document recognition professionals should be proud of the positive impact their work has had on some of society's most disadvantaged communities.

  16. Emergency medicine resident physicians' perceptions of electronic documentation and workflow: a mixed methods study.

    Science.gov (United States)

    Neri, P M; Redden, L; Poole, S; Pozner, C N; Horsky, J; Raja, A S; Poon, E; Schiff, G; Landman, A

    2015-01-01

    To understand emergency department (ED) physicians' use of electronic documentation in order to identify usability and workflow considerations for the design of future ED information system (EDIS) physician documentation modules. We invited emergency medicine resident physicians to participate in a mixed methods study using task analysis and qualitative interviews. Participants completed a simulated, standardized patient encounter in a medical simulation center while documenting in the test environment of a currently used EDIS. We recorded the time on task, type and sequence of tasks performed by the participants (including tasks performed in parallel). We then conducted semi-structured interviews with each participant. We analyzed these qualitative data using the constant comparative method to generate themes. Eight resident physicians participated. The simulation session averaged 17 minutes and participants spent 11 minutes on average on tasks that included electronic documentation. Participants performed tasks in parallel, such as history taking and electronic documentation. Five of the 8 participants performed a similar workflow sequence during the first part of the session while the remaining three used different workflows. Three themes characterize electronic documentation: (1) physicians report that location and timing of documentation varies based on patient acuity and workload, (2) physicians report a need for features that support improved efficiency; and (3) physicians like viewing available patient data but struggle with integration of the EDIS with other information sources. We confirmed that physicians spend much of their time on documentation (65%) during an ED patient visit. Further, we found that resident physicians did not all use the same workflow and approach even when presented with an identical standardized patient scenario. Future EHR design should consider these varied workflows while trying to optimize efficiency, such as improving

  17. 13. Project Management Documentation and Communications

    DEFF Research Database (Denmark)

    Kampf, Constance Elizabeth

    2014-01-01

    This chapter discusses the relationship between documentation and communication practices in organizational contexts.......This chapter discusses the relationship between documentation and communication practices in organizational contexts....

  18. Semantic Metadata for Heterogeneous Spatial Planning Documents

    Science.gov (United States)

    Iwaniak, A.; Kaczmarek, I.; Łukowicz, J.; Strzelecki, M.; Coetzee, S.; Paluszyński, W.

    2016-09-01

    Spatial planning documents contain information about the principles and rights of land use in different zones of a local authority. They are the basis for administrative decision making in support of sustainable development. In Poland these documents are published on the Web according to a prescribed non-extendable XML schema, designed for optimum presentation to humans in HTML web pages. There is no document standard, and limited functionality exists for adding references to external resources. The text in these documents is discoverable and searchable by general-purpose web search engines, but the semantics of the content cannot be discovered or queried. The spatial information in these documents is geographically referenced but not machine-readable. Major manual efforts are required to integrate such heterogeneous spatial planning documents from various local authorities for analysis, scenario planning and decision support. This article presents results of an implementation using machine-readable semantic metadata to identify relationships among regulations in the text, spatial objects in the drawings and links to external resources. A spatial planning ontology was used to annotate different sections of spatial planning documents with semantic metadata in the Resource Description Framework in Attributes (RDFa). The semantic interpretation of the content, links between document elements and links to external resources were embedded in XHTML pages. An example and use case from the spatial planning domain in Poland is presented to evaluate its efficiency and applicability. The solution enables the automated integration of spatial planning documents from multiple local authorities to assist decision makers with understanding and interpreting spatial planning information. The approach is equally applicable to legal documents from other countries and domains, such as cultural heritage and environmental management.

  19. New Challenges of the Documentation in Media

    Directory of Open Access Journals (Sweden)

    Antonio García Jiménez

    2015-07-01

    Full Text Available This special issue, presented by index.comunicación, is focused on media related information & documentation. This field undergoes constant and profound changes, especially visible in documentation processes. A situation characterized by the existence of tablets, smartphones, applications, and by the almost achieved digitization of traditional documents, in addition to the crisis of the press business model, that involves mutations in the journalists’ tasks and in the relationship between them and Documentation. Papers included in this special issue focus on some of the concerns in this domain: the progressive autonomy of the journalist in access to information sources, the role of press offices as documentation sources, the search of information on the web, the situation of media blogs, the viability of elements of information architecture in smart TV and the development of social TV and its connection to Documentation.

  20. Documentation for the Waste Reduction Model (WARM)

    Science.gov (United States)

    This page describes the WARM documentation files and provides links to all documentation files associated with EPA’s Waste Reduction Model (WARM). The page includes a brief summary of the chapters documenting the greenhouse gas emission and energy factors.