WorldWideScience

Sample records for hide processing system

  1. Hiding dependence-discovery of F-hiding laws and system laws

    Institute of Scientific and Technical Information of China (English)

    Zhou Houyong; Huang Shunliang; Shi Kaiquan

    2009-01-01

    Function one direction S-rough sets have dynamic characteristics and law characteristics. By using the function one direction S-rough sets, this article presents the concepts of the f-hiding law, F-hiding law, f-hiding law dependence and F-hiding law dependence. Based on the concepts above, this article proposes the hiding-dependence theorem of f-hiding laws, the hiding-dependence theorem of F-hiding laws, the hiding-dependence separation theorem, the hiding dependencs-discovery principle of unknown laws. Finally, the application of the hiding dependence of hiding laws in the discovery of system laws is given.

  2. Short term preservation of hide using vacuum: influence on properties of hide and of processed leather.

    Science.gov (United States)

    Gudro, Ilze; Valeika, Virgilijus; Sirvaitytė, Justa

    2014-01-01

    The objective of this work was to investigate vacuum influence on hide preservation time and how it affects hide structure. It was established that vacuum prolongs the storage time without hide tissue putrefaction up to 21 days when the storage temperature is 4°C. The microorganisms act for all storage times, but the action is weak and has no observable influence on the quality of hide during the time period mentioned. The hide shrinkage temperature decrease is negligible, which shows that breaking of intermolecular bonds does not occur. Optical microscopy, infrared spectroscopy and differential scanning calorimetry also did not show any structural changes which can influence the quality of leather produced from such hide. The qualitative indexes of wet blue processed under laboratory conditions and of leather produced during industrial trials are presented. Indexes such as chromium compounds exhaustion, content of chromium in leather, content of soluble matter in dichloromethane, strength properties, and shrinkage temperature were determined. Properties of the leather produced from vacuumed hide under industrial conditions conformed to the requirements of shoe upper leather.

  3. Legionnaires' Hiding in Hospital, Nursing Home Plumbing Systems: CDC

    Science.gov (United States)

    ... gov/news/fullstory_166302.html Legionnaires' Hiding in Hospital, Nursing Home Plumbing Systems: CDC Effective water management, sanitation programs can reduce the risk of exposure to this deadly bacteria To use the sharing ...

  4. Video Data Hiding for Managing Privacy Information in Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Hail MichaelW

    2009-01-01

    Full Text Available From copyright protection to error concealment, video data hiding has found usage in a great number of applications. In this work, we introduce the detailed framework of using data hiding for privacy information preservation in a video surveillance environment. To protect the privacy of individuals in a surveillance video, the images of selected individuals need to be erased, blurred, or re-rendered. Such video modifications, however, destroy the authenticity of the surveillance video. We propose a new rate-distortion-based compression-domain video data hiding algorithm for the purpose of storing that privacy information. Using this algorithm, we can safeguard the original video as we can reverse the modification process if proper authorization can be established. The proposed data hiding algorithm embeds the privacy information in optimal locations that minimize the perceptual distortion and bandwidth expansion due to the embedding of privacy data in the compressed domain. Both reversible and irreversible embedding techniques are considered within the proposed framework and extensive experiments are performed to demonstrate the effectiveness of the techniques.

  5. 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing

    CERN Document Server

    Tsai, Pei-Wei; Huang, Hsiang-Cheh

    2017-01-01

    This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .

  6. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  7. Information Hiding based Trusted Computing System Design

    Science.gov (United States)

    2014-07-18

    and the environment where the system operates (electrical network frequency signals), and how to improve the trust in a wireless sensor network with...the system (silicon PUF) and the environment where the system operates (ENF signals). We also study how to improve the trust in a wireless sensor...Harbin Institute of Technology, Shenzhen , China, May 26, 2013. (Host: Prof. Aijiao Cui) 13) “Designing Trusted Energy-Efficient Circuits and Systems

  8. HIDE & SEEK: End-to-end packages to simulate and process radio survey data

    Science.gov (United States)

    Akeret, J.; Seehars, S.; Chang, C.; Monstein, C.; Amara, A.; Refregier, A.

    2017-01-01

    As several large single-dish radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these datasets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system-from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing single-dish radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single-dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal. The two packages can be used separately or together depending on the application. Their modular and flexible nature allows easy adaptation to other instruments and datasets. We describe the basic architecture of the two packages and examine in detail the noise and RFI modeling in HIDE, as well as the implementation of gain calibration and RFI mitigation in SEEK. We then apply HIDE &SEEK to forward-model a Galactic survey in the frequency range 990-1260 MHz based on data taken at the Bleien Observatory. For this survey, we expect to cover 70% of the full sky and achieve a median signal-to-noise ratio of approximately 5-6 in the cleanest channels including systematic uncertainties. However, we also point out the potential challenges of high RFI contamination and baseline removal when examining the early data from the Bleien Observatory. The fully documented HIDE &SEEK packages are available at http://hideseek.phys.ethz.ch/ and are published

  9. Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography

    CERN Document Server

    Sarmah, Dipti Kapoor

    2010-01-01

    Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptography techniques available; among them AES is one of the most powerful techniques. In Steganography we have various techniques in different domains like spatial domain, frequency domain etc. to hide the message. It is very difficult to detect hidden message in frequency domain and for this domain we use various transformations like DCT, FFT and Wavelets etc. In this project we are developing a system where we develop a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module. In Cryptography we are using AES algorithm to encrypt a message and a part of the message is hidden in DCT of an image; remaining part of the message is used to generate two secret keys which make this system highly secured. Keyword: Cryptography, Steganography, S...

  10. HIDE & SEEK: End-to-End Packages to Simulate and Process Radio Survey Data

    CERN Document Server

    Akeret, Joel; Chang, Chihway; Monstein, Christian; Amara, Adam; Refregier, Alexandre

    2016-01-01

    As several large radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these data sets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system - from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal....

  11. A REVIEW ON HEAVY METALS CONTENTS IN HIDE, SKIN AND PROCESSED LEATHERS

    Directory of Open Access Journals (Sweden)

    KOIZHAIGANOVA Meruyert

    2016-05-01

    Full Text Available Heavy metals are metals with high atomic weight which can be deposited in soil, water, plants and animals. It is generally known that mammal tissues are good bioindicators of trace elements, including heavy metals. Heavy metal analysis serves to identify and quantify the elements that are a potential hazard to the consumer after varying levels of contact. Usage area of leather is increasingly expanding in these days and it has also become a material requested and demanded by effect of fashion. Leather must protect its appearance and physical stability and also be problem-free in ecological terms and harmless to human health. There is a lack of data concerning the content of toxic elements in raw hide and skin of animals. Mainly information concerning metals content, including toxic ones, in processed leathers may be found in the literature. The aim of the present study was to review and compare the content of some heavy metals in raw hide, skin and the processed leathers in order to evaluate their accumulation and transition to the end-up product.

  12. Evaluation of bacteriophage application to cattle in lairage at beef processing plants to reduce Escherichia coli O157:H7 prevalence on hides and carcasses

    Science.gov (United States)

    Escherichia coli O157:H7 is a major food safety concern for the beef industry. Several studies have provided evidence that cattle hides are the main source of beef carcass contamination during processing and that reductions in the E. coli O157:H7 load on the hides of cattle entering processing faci...

  13. Sensor and Actuator Fault-Hiding Reconfigurable Control Design for a Four-Tank System Benchmark

    DEFF Research Database (Denmark)

    Hameed, Ibrahim; El-Madbouly, Esam I; Abdo, Mohamed I

    2015-01-01

    Fault detection and compensation plays a key role to fulfill high demands for performance and security in today's technological systems. In this paper, a fault-hiding (i.e., tolerant) control scheme that detects and compensates for actuator and sensor faults in a four-tank system benchmark...... Invariant (LTI) system where virtual sensors and virtual actuators are used to correct faulty performance through the use of a pre-fault performance. Simulation results showed that the developed approach can handle different types of faults and able to completely and instantly recover the original system...

  14. HIDE: HI Data Emulator

    Science.gov (United States)

    Akeret, Joel; Seehars, Sebastian; Chang, Chihway; Monstein, Christian; Amara, Adam; Refregier, Alexandre

    2016-07-01

    HIDE (HI Data Emulator) forward-models the process of collecting astronomical radio signals in a single dish radio telescope instrument and outputs pixel-level time-ordered-data. Written in Python, HIDE models the noise and RFI modeling of the data and with its companion code SEEK (ascl:1607.020) provides end-to-end simulation and processing of radio survey data.

  15. Hiding Information under Speech

    Science.gov (United States)

    2005-12-12

    as it arrives in real time, and it disappears as fast as it arrives. Furthermore, our cognitive process for translating audio sounds to the meaning... steganography , whose goal is to make the embedded data completely undetectable. In addi- tion, we must dismiss the idea of hiding data by using any...therefore, an image has more room to hide data; and (2) speech steganography has not led to many money-making commercial businesses. For these two

  16. Hiding the system from the user: Moving from complex mental models to elegant metaphors

    Energy Technology Data Exchange (ETDEWEB)

    Curtis W. Nielsen; David J. Bruemmer

    2007-08-01

    In previous work, increased complexity of robot behaviors and the accompanying interface design often led to operator confusion and/or a fight for control between the robot and operator. We believe the reason for the conflict was that the design of the interface and interactions presented too much of the underlying robot design model to the operator. Since the design model includes the implementation of sensors, behaviors, and sophisticated algorithms, the result was that the operator’s cognitive efforts were focused on understanding the design of the robot system as opposed to focusing on the task at hand. This paper illustrates how this very problem emerged at the INL and how the implementation of new metaphors for interaction has allowed us to hide the design model from the user and allow the user to focus more on the task at hand. Supporting the user’s focus on the task rather than on the design model allows increased use of the system and significant performance improvement in a search task with novice users.

  17. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  18. A Block Based Adaptive Video Data Hiding Method Using Forbidden Zone Data Hiding

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2013-01-01

    -Data hiding is a process of embedding information into some sort of host media. Especially video data hiding has become an important research topic as it is complex when compared data hiding process in other media. This paper proposes a new method based on erasure correction capability of RA codes...... using forbidden zone data hiding. This method finds suitable host signals that are useful for data hiding. The proposed method also overcomes the problems of frame drop and inserts attacks. The simulation results reveal that this video data hiding framework can be used in data hiding applications...... of the real world. Key Words – RA codes, selective embedding, watermarking, forbidden zone data hiding, simulation, selective embedding, erasure handling, block partitioning...

  19. Alkali-free method of hide preparation for tanning

    Directory of Open Access Journals (Sweden)

    V. Valeika

    2012-06-01

    Full Text Available Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming up to strongly acid (pickling. This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. During both processes, unhairing and oxidative treatment, the opening of the derma structure occurs: 13.3-14.6g of non-collagen proteins are removed and amount of dermatan sulphate decreases by 35%. The hide obtained can be chromed directly after the above processes and subsequent treatment with sodium chloride solution omitted conventional pickling. The pH of the hide varies in the range of 8.3-3.7 during the processes of preparation for tanning.

  20. Authenticity of identification and processing experience of donkey hide gelatin%阿胶的真伪鉴别以及炮制经验

    Institute of Scientific and Technical Information of China (English)

    张萍

    2015-01-01

    阿胶是有改善男女生育、调节月经、恢复元气等功效,能够促进造血功能,升高白细胞,提高自身免疫力等功能,对免疫力低下患者或癌症患者有着重要的作用,还可以促进凝血和降低血管通透性,提高对钙的吸收,预防骨质疏松疾病,是骨折患者较佳的补品。由于阿胶的应用范围较广,有些不法商贩弄虚作假,严重扰乱了阿胶市场,给消费者带来了较大伤害,因此,掌握阿胶的真伪鉴别方法至关重要,本文对阿胶的真伪鉴别以及炮制经验进行总结。%Donkey hide gelatin has the function of improving male and female fertility,regulating menstruation,recovering vitality and so on.It can promote the hematopoietic function,elevate the white blood cells,improve the autoimmunity,and it plays an important role on the immunocompromised patients or cancer patients.On the side,it can promote coagulation and reduce vascular permeability,enhance the absorption of calcium,prevent osteoporosis.It is a better tonic for patients with fracture.Because the application range of donkey hide gelatin is wide,some unscrupulous traders have falsification and seriously disrupte the donkey hide gelatin market to bring a greater harm on consumers.Therefore,it is great importance to grasp the authenticity of identification method of donkey hide gelatin.In this paper,the author summarizes the authenticity of identification and processing experience of donkey hide gelatin.

  1. Research on the methods of optical image hiding based on double random phase encoding and digital holography

    Science.gov (United States)

    Xu, Hongsheng; Sang, Nong

    2011-12-01

    Optical information hiding system has many features such as high processing speed, high parallel, high encryption dimension and high speed of optical transformation and related operations, more advantages than digital method in some way. But it has not adequate security, and enough combination with techniques of digital image processing. So on basis of analyzing existing image hiding and analyzing techniques, we give out the idea. We should adopt idea of virtual optics on the way of all-digital simulation to do research of optical image hiding and analyzing methods based on optical image processing technique especially technique of double random phase encoding and digital holography.

  2. Recent Advances in Information Hiding and Applications

    CERN Document Server

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao

    2013-01-01

    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  3. Reversible Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Dhananjay Yadav

    2012-03-01

    Full Text Available Reversible data hiding is a technique that is used to hide data inside an image. The data is hidden in such a way that the exact or original data is not visible. The hidden data can be retrieved as and when required. There are several methods that are used in reversible data hiding techniques like Watermarking, Lossless embedding and encryption. In this paper we present a review of reversible watermarking techniques and show different methods that are used to get reversible data hiding technique with higher embedding capacity and invisible objects. Watermark need not be hidden. Watermarking can be applied to 1. Images, 2. Text, 3. Audio/video, 4. Software.

  4. Planets and Stellar Activity: Hide and Seek in the CoRoT-7 system

    CERN Document Server

    Haywood, R D; Queloz, D; Barros, S C C; Deleuil, M; Fares, R; Gillon, M; Lanza, A F; Lovis, C; Moutou, C; Pepe, F; Pollacco, D; Santerne, A; Segransan, D; Unruh, Y C

    2014-01-01

    Since the discovery of the transiting super-Earth CoRoT-7b, several investigations have yielded different results for the number and masses of planets present in the system, mainly owing to the star's high level of activity. We re-observed CoRoT-7 in January 2012 with both HARPS and CoRoT, so that we now have the benefit of simultaneous radial-velocity and photometric data. This allows us to use the off-transit variations in the star's light curve to estimate the radial-velocity variations induced by the suppression of convective blueshift and the flux blocked by starspots. To account for activity-related effects in the radial-velocities which do not have a photometric signature, we also include an additional activity term in the radial-velocity model, which we treat as a Gaussian process with the same covariance properties (and hence the same frequency structure) as the light curve. Our model was incorporated into a Monte Carlo Markov Chain in order to make a precise determination of the orbits of CoRoT-7b a...

  5. Performance Analysis of Data Hiding in MPEG-4 AAC Audio

    Institute of Scientific and Technical Information of China (English)

    XU Shuzheng; ZHANG Peng; WANG Pengjun; YANG Huazhong

    2009-01-01

    A high capacity data hiding technique was developed for compressed digital audio.As perceptual audio coding has become the accepted technology for storage and transmission of audio signals,compressed audio information hiding enables robust,imperceptible transmission of data within audio signals,thus allowing valuable information to be attached to the content,such as the song title,lyrics,composer's name,and artist or property rights related data.This paper describes simultaneous low bitrate encoding and information hiding for highly compressed audio signals.The information hiding is implemented in the quantization process of the audio content which improves robustness,signal quality,and security.The imperceptibility of the embedded data is ensured based on the masking property of the human auditory system (HAS).The robustness and security are evaluated by various attacking algorithms.Tests with an extended MPEG4 advanced audio coding (AAC) encoder confirm that the method is robust to the regular and singular groups method (RS) and sample pair analysis (SPA) attacks as well as other statistical steganalysis method attacks.

  6. Hiding Planets Behind a Big Friend: Mutual Inclinations of Multi-Planet Systems with External Companions

    CERN Document Server

    Lai, Dong

    2016-01-01

    The {\\it Kepler} mission has detected thousands of planetary systems with 1-7 transiting planets packed within 0.7~au from their host stars. There is an apparent excess of single-transit planet systems that cannot be explained by transit geometries alone, when a single planetary mutual inclination dispersion is assumed. This suggests that the observed compact planetary systems have at least two different architectures. We present a scenario where the "Kepler dichotomy" can be explained by the action of an external giant planet (or stellar) companion misaligned with the inner multi-planet system. The external companion excites mutual inclinations of the inner planets, causing such systems to appear as "Kepler singles" in transit surveys. We derive approximate analytic expressions (in various limiting regimes), calibrated with numerical calculations, for the mutual inclination excitations for various planetary systems and perturber properties (mass $m_p$, semi-major axis $a_p$ and inclination $\\theta_p$). In ge...

  7. 计算机系统信息隐藏反取证技术%Data Hiding and Anti-Forensic on Modern Computer System

    Institute of Scientific and Technical Information of China (English)

    李佟鸿; 王宁; 刘志军

    2013-01-01

    研究了现代计算机系统信息隐藏的各种可能方式.运用HPA和DCO、隐藏分区等技术分析了磁盘驱动的数据隐藏,运用簇分配、Slack空间等技术分析了NTFS文件系统的各种信息隐藏方法,以及各种方法可能的检测手段.分析各种隐藏技术作为计算机反取证手段,给计算机取证带来的巨大影响.%This paper discusses some of the possible ways to hide data on modern computer systems.Using HPA and DCO,hidden partition and other technical analysis of the disk drive data hidden.Using the cluster distribution,Slack space and so on technical discusses some of the methods that can be used to hide data in NTFS and analysis techniques that can be used to detect and recover hidden data.The exploration of the different hiding technology can be used as computer anti-forensics means,to the great impacts of computer forensics.

  8. Hiding Planets behind a Big Friend: Mutual Inclinations of Multi-planet Systems with External Companions

    Science.gov (United States)

    Lai, Dong; Pu, Bonan

    2017-01-01

    The Kepler mission has detected thousands of planetary systems with one to seven transiting planets packed within 0.7 au from their host stars. There is an apparent excess of single-transit planet systems that cannot be explained by transit geometries alone, when a single planetary mutual inclination dispersion is assumed. This suggests that the observed compact planetary systems have at least two different architectures. We present a scenario where the “Kepler dichotomy” may be explained by the action of an external giant planet or stellar companion misaligned with the inner multi-planet system. The external companion excites mutual inclinations of the inner planets, causing such systems to appear as “Kepler singles” in transit surveys. We derive approximate analytic expressions (in various limiting regimes), calibrated with numerical calculations, for the mutual inclination excitations for various planetary systems and perturber properties (mass mp, semimajor axis ap, and inclination {θ }p). In general, the excited mutual inclination increases with {m}p/{a}p3 and {θ }p, though secular resonances may lead to large mutual inclinations even for small {θ }p. We discuss the implications of our results for understanding the dynamical history of transiting planet systems with known external perturbers.

  9. My Research Is Militants Most Secrecy. Human Killing Death Body Hide and Militants Exceptional Clone System.

    OpenAIRE

    Mohammad Abdul Khaleak

    2016-01-01

    : I know about the top most secret matter of the militants. All militants are exceptional clone. The process of cloning will never be disclosed by the militants. Jinn/Fairy is one kind of species. I have seen the Jinn/Fairy many times. Some men know. Some men have seen the Jinn/Fairy. Jinn is male and fairy is female. Jinn/Fairy can take shape of any man. Then can’t see in day light, do not have any teeth in mouth, no nails hands and legs fingers. Then in the thumb there is one bone in phalan...

  10. Hiding in plain sight: record-breaking compact stellar systems in the Sloan Digital Sky Survey

    CERN Document Server

    Sandoval, Michael A; Romanowsky, Aaron J; Strader, Jay; Choi, Jieun; Jennings, Zachary G; Conroy, Charlie; Brodie, Jean P; Foster, Caroline; Villaume, Alexa; Norris, Mark A; Janz, Joachim; Forbes, Duncan A

    2015-01-01

    Motivated by the recent, serendipitous discovery of the densest known galaxy, M60-UCD1, we present two initial findings from a follow-up search, using the Sloan Digital Sky Survey, Subaru/Suprime-Cam and Hubble Space Telescope imaging, and SOAR/Goodman spectroscopy. The first object discovered, M59-UCD3, has a similar size to M60-UCD1 (half-light radius of r_h ~ 20 pc) but is 40% more luminous (M_V ~ -14.6), making it the new densest-known galaxy. The second, M85-HCC1, has a size like a typical globular cluster r_h ~ 1.8 pc) but is much more luminous (M_V ~ -12.5). This hypercompact cluster is by far the densest confirmed free-floating stellar system, and is equivalent to the densest known nuclear star clusters. From spectroscopy, we find that both objects are relatively young (~9 Gyr and ~3 Gyr, respectively), with metal-abundances that resemble those of galaxy centers. Their host galaxies show clear signs of large-scale disturbances, and we conclude that these dense objects are the remnant nuclei of recentl...

  11. HIDING IN PLAIN SIGHT: RECORD-BREAKING COMPACT STELLAR SYSTEMS IN THE SLOAN DIGITAL SKY SURVEY

    Energy Technology Data Exchange (ETDEWEB)

    Sandoval, Michael A.; Vo, Richard P.; Romanowsky, Aaron J. [Department of Physics and Astronomy, San José State University, One Washington Square, San Jose, CA 95192 (United States); Strader, Jay [Department of Physics and Astronomy, Michigan State University, East Lansing, MI 48824 (United States); Choi, Jieun; Conroy, Charlie [Harvard–Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States); Jennings, Zachary G.; Villaume, Alexa [Department of Astronomy and Astrophysics, University of California, Santa Cruz, CA 95064 (United States); Brodie, Jean P. [University of California Observatories, 1156 High Street, Santa Cruz, CA 95064 (United States); Foster, Caroline [Australian Astronomical Observatory, P.O. Box 915, North Ryde, NSW 1670 (Australia); Norris, Mark A. [Max Planck Institut für Astronomie, Königstuhl 17, D-69117, Heidelberg (Germany); Janz, Joachim; Forbes, Duncan A. [Centre for Astrophysics and Supercomputing, Swinburne University, Hawthorn, VIC 3122 (Australia)

    2015-07-20

    Motivated by the recent, serendipitous discovery of the densest known galaxy, M60-UCD1, we present two initial findings from a follow-up search, using the Sloan Digital Sky Survey, Subaru/Suprime-Cam, and Hubble Space Telescope imaging, and SOuthern Astrophysical Research (SOAR)/Goodman spectroscopy. The first object discovered, M59-UCD3, has a similar size to M60-UCD1 (half-light radius of r{sub h} ∼ 20 pc) but is 40% more luminous (M{sub V} ∼ −14.6), making it the new densest-known galaxy. The second, M85-HCC1, has a size like a typical globular cluster (GC; r{sub h} ∼ 1.8 pc) but is much more luminous (M{sub V} ∼ −12.5). This hypercompact cluster is by far the densest confirmed free-floating stellar system, and is equivalent to the densest known nuclear star clusters. From spectroscopy, we find that both objects are relatively young (∼9 and ∼3 Gyr, respectively), with metal-abundances that resemble those of galaxy centers. Their host galaxies show clear signs of large-scale disturbances, and we conclude that these dense objects are the remnant nuclei of recently accreted galaxies. M59-UCD3 is an ideal target for follow-up with high-resolution imaging and spectroscopy to search for an overweight central supermassive black hole as was discovered in M60-UCD1. These findings also emphasize the potential value of ultra-compact dwarfs and massive GCs as tracers of the assembly histories of galaxies.

  12. An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography

    CERN Document Server

    Mukhopadhyay, Debajyoti; Ghosh, Surjya; Biswas, Sudipto; Chakraborty, Poulami

    2011-01-01

    A crypto system can be used to encrypt messages sent between two communicating parties so that an eavesdropper who overhears the encrypted messages will not be able to decode them. The paper mainly concentrates on the method in which the substitution technique of steganography can been used to hide data in a 24-bit bitmap file. Popular audio hiding techniques based on methods of steganography is also discussed here.

  13. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  14. Hide receives the Bowie Medal

    Science.gov (United States)

    Dickey, Jean O.; Hide, Raymond

    The 1997 William Bowie Medal, given by AGU for outstanding contributions to fundamental geophysics and for unselfish cooperation in research, was presented to Raymond Hide at the AGU Spring Meeting Honor Ceremony on May 28 in Baltimore. The award citation and Hide's response are given here.

  15. Analysis of Information Hiding Capacity in the Multiple Antennas Coding Channel System%多天线编码信道系统中的信息隐藏容量分析

    Institute of Scientific and Technical Information of China (English)

    卢苗; 陈立全

    2012-01-01

    在分析信道编码和信息隐藏技术相结合的基础上,提出了Alamouti编码多天线系统中的基于LDPC码的信息隐藏方案,理论推导了单天线编码信道及多天线编码信道系统中的信息隐藏容量上限,并进行数值验算和MATLAB仿真验证.实验结果表明,较之单天线编码信道,基于多天线编码信道的信息隐藏容量有明显的提高.%Based on analysis of the combination between channel coding technologies and information hiding technologies, an information hiding scheme based on LDPC codes is proposed, which is implemented in Alamouti coding MIMO system. A theoretical analysis about information hiding capacities of the coding channel system and multi-antennas coding channel system is presented. Then,it evaluates the proposed scheme by numerical analyses and MATLAB simulations. Compared with the single antenna channel coding system experimental results show that the information hiding capacity based on multiple antenna channel coding system is improved significant.

  16. 进口皮毛集中加工地炭疽污染情况调查%Investigation of Anthrax Contamination at Imported Raw Hides and Wool Centralized Processing Place

    Institute of Scientific and Technical Information of China (English)

    顾志军; 朱磊; 沈炜; 沈涛

    2015-01-01

    随着我国生皮、羊毛进口量的逐年增加,国外炭疽疫情随皮毛传入我国的风险也在不断加大。为掌握炭疽随进口皮毛传入的情况,采集进口皮毛集中加工地区最有可能感染炭疽的土壤、水和从业人员血清样本进行检测。结果显示,土壤样本和水样均呈阴性;从业人员血清样本阳性率为23.9%,显著高于普通人群的阳性率(1.6%),表明进口皮毛加工从业人员存在感染炭疽的可能。本文针对上述情况提出了防控炭疽的建议。%While the import volume of raw hides and wool increased year by year in China,the risk of anthrax spread-ing into China is increasing. To grasp the introduction of anthrax with imported raw hides,the samples of soil,water and personal serum of the workers on raw hides and wool processing places with high risk of anthrax contamination were collected and tested. The results showed all soil samples and water samples were negative,and the positive rate of serum samples from workers was 23.9% which was significantly higher than the general population(1.6%). It indicated that it was possible for the workers who processed imported raw hide and wool to be infected with anthrax. Based on the above situation,some prevention and control suggestions of anthrax were proposed.

  17. Joint data-hiding and rate-distortion optimization for H.264/AVC videos

    Science.gov (United States)

    Lin, Yih-Chuan; Li, Jung-Hong

    2012-07-01

    We address video data-hiding on the context-adaptive variable-length coding domain of the H.264/AVC standard. It is challenging to maintain a minimum variation of rate-distortion performance when hiding data in compressed videos by slightly modifying one or more transform coefficients of prediction residual data. The fluctuant variation of rate-distortion performance is especially serious in the case of hiding data in H.264/AVC compressed videos due to the thorough use of various prediction modes. Most current video data-hiding schemes concentrate on hiding messages in video intra (I)-frames to mitigate performance degradation at the expense of limited hiding capacity and applicability. Unlike most previous video data-hiding schemes, this paper considers data-hiding schemes on both I- and predicted (P)-frames of videos. We first investigate the possible ways used to suppress the significant degradation of the rate-distortion performance for hiding data in H.264/AVC videos. Based on the investigation, a hybrid video data-hiding scheme is designed to perform the classification of 4×4 residual blocks according to the characteristics of each block and to hide message data differently in each classified block in order to reduce the performance degradation caused by the data-hiding process. The block classification is based on the magnitude of the last non-zero coefficient and the coefficient difference energy of each block to select suitable blocks that are capable of contributing less degradation of coding performance for hiding additional messages. Moreover, the proposed data-hiding algorithm is incorporated with the rate-distortion optimization loop of the H.264/AVC encoder to provide further degradation suppression on the output bit-rate and decoded quality. From experiments on several well-known test videos, it can be seen that the proposed data-hiding scheme demonstrates improved efficiency on video quality and output bit-rate compared to other similar methods.

  18. Estimation of Information Hiding Algorithms and Parameters

    Science.gov (United States)

    2007-02-21

    growing false positives. 15. SUBJECT TERMS Information hiding, reverse-engineering, steganography , steganalysis, watermarking 16. SECURITY...specialist in breaking a covert communication system given very little information. Since it is likely for steganography to be used on very large...multimedia files, e.g. audio and video, there are substantial issues to be addressed on the implementation end of such a system as well as the theoretical

  19. [Rapid quantification of total nitrogen and end-point determination of hide melting in manufacturing of donkey-hide gelatin].

    Science.gov (United States)

    Han, Hai-Fan; Zhang, Lu; Zhang, Yan; Li, Wen-Long; Qu, Hai-Bin

    2014-03-01

    Hide melting presents itself as one of the most critical processes in the production of donkey-hide gelatin. Here a NIR-based method was established for the rapid analysis of in-process hide melting solutions as well as for end-point determination of this process. Near infrared (NIR) spectra of hide melting solutions were collected in transflective mode. With the contents of total nitrogen determined by the Kjeldahl method as reference values, partial least squares regression (PLSR) was employed to build calibration models between NIR spectra and total nitrogen. Model parameters including wavelength range and PLS factors were optimized to achieve best model performance. Based on the contents of total nitrogen predicted by calibration model, end point of hide melting was determined. The constructed PLS model gave a high correlation coefficient (R2) of 0.991 3 and a root mean square error of prediction (RMSEP) of 0.807 g x L(-1). With the predicted total nitrogen and predefined limit, decisions concerning the proper times of melting were made. This research demonstrated that NIR transflectance spectroscopy could be used to expeditiously determine the contents of total nitrogen which was subsequently chosen as the indictor for determining the end-point of hide melting. The proposed procedure may help avoid unnecessary raw material or energy consumption.

  20. Information Hiding Using Improper Frame Padding

    CERN Document Server

    Jankowski, Bartosz; Szczypiorski, Krzysztof

    2010-01-01

    Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors' best knowledge it is the first information hiding solution which represents interprotocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication. PadSteg utilizes ARP and TCP protocols together with an Etherleak vulnerability (improper Ethernet frame padding) to facilitate secret communication for hidden groups in LANs (Local Area Networks). Basing on real network traces we confirm that PadSteg is feasible in today's networks and we estimate what steganographic bandwidth is achievable while limiting the chance of disclosure. We also point at possible countermeasures against PadSteg.

  1. Fully Traversable Wormholes Hiding Charge

    CERN Document Server

    Guendelman, Eduardo

    2012-01-01

    The charge-hiding effect by a wormhole, which was studied for the case where gravity/gauge-field system is self-consistently interacting with a charged lightlike brane (LLB) as a matter source, is now studied for the case of a time like brane. From the demand that no surfaces of infinite coordinate time redshift appear in the problem we are lead now to a completly traversable wormhole space, according to not only the traveller that goes through the wormhole (as was the case for the LLB), but also to a static external observer, this requires negative surface energy density for the shell sitting at the throat of the wormhole. We study a gauge field subsystem which is of a special non-linear form containing a square-root of the Maxwell term and which previously has been shown to produce a QCD-like confining gauge field dynamics in flat space-time. The condition of finite energy of the system or asymptotic flatness on one side of the wormhole implies that the charged object sitting at the wormhole throat expels a...

  2. Function S-rough sets and security-authentication of hiding law

    Institute of Scientific and Technical Information of China (English)

    SHI KaiQuan; ZHAO JianLi

    2008-01-01

    Function S-rough sets are defined by R-function equivalence class,which have dynamic characteristic.Function S-rough sets have dynamic characteristic,law characteristic and law-hiding characteristic.Function S-rough sets can generate f-hiding law and f-hiding law.By engrafting,crossing,and penetrating between the information security theory and function S-rough sets,the security hiding and the authentication of f-hiding law and f-hiding law are given respectively in this paper.The fusion and share between function S-rough sets and information secu-rity theory is a new research direction of the application of information law in in-formation system.

  3. A secure and robust information hiding technique for covert communication

    Science.gov (United States)

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.

    2015-08-01

    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  4. Information Hiding Techniques: A Tutorial Review

    CERN Document Server

    Thampi, Sabu M

    2008-01-01

    The purpose of this tutorial is to present an overview of various information hiding techniques. A brief history of steganography is provided along with techniques that were used to hide information. Text, image and audio based information hiding techniques are discussed. This paper also provides a basic introduction to digital watermarking.

  5. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    Directory of Open Access Journals (Sweden)

    Ari Shawakat Tahir

    2015-12-01

    Full Text Available The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed.

  6. Data Hiding in JPEG Images

    Directory of Open Access Journals (Sweden)

    Sushil Kumar

    2009-07-01

    Full Text Available Steganography has been an important subject since peoplestarted communicating in writing. Steganography meanshiding a secret message (the embedded messagewithin a larger one (source cover in such a way that anobserver cannot detect the presence of contents of thehidden message. Today the growth in the informationtechnology, especially in computer networks such asInternet, Mobile communication, and Digital Multimediaapplications such as Digital camera, handset video etc. hasopened new opportunities in scientific and commercialapplications. But this progress has also led to many seriousproblems such as hacking, duplications and malevolentusage of digital information. Steganography finds its role inattempt to address these growing concerns. We know that,with the use of steganographic techniques, it is possible tohide information within digital audio, images and video fileswhich is perceptually and statistically undetectable. Themethod of embedding secret message (which can be plaintext, cipher text, or even images is usually based onreplacing bits of useless or unused data in the source cover(can be audio files, sound, text, Disk space, hidden partition,network packets, digital images, software, or circuitry.There are two common methods of embedding: Spatialembedding in which messages are inserted into the LSBs ofimage pixels, and Transform embedding in which a messageis embedded by modifying frequency coefficients of thecover image (result is called the stego-image.Transformembedding methods are found to be in general more robustthan the Spatial embedding methods which are susceptibleto image-processing type of attacks. However with respectto steganography robustness is not a critical property but theperceptibility (i.e., whether the source cover is distorted byembedding information to a visually unacceptable level.There is another important issue of steganography, namely,capacity, i.e., how much information can be embeddedrelative to its

  7. A Security Enhanced Robust Steganography Algorithm for Data Hiding

    Directory of Open Access Journals (Sweden)

    Siddharth Singh

    2012-05-01

    Full Text Available In this paper, a new robust steganography algorithm based on discrete cosine transform (DCT, Arnold transform and chaotic system is proposed. The chaotic system is used to generate a random sequence to be used for spreading data in the middle frequency band DCT coefficient of the cover image. The security is further enhanced by scrambling the secret data using Arnold Cat map before embedding. The recovery process is blind. A series of experiments is conducted to prove the security and robustness of the proposed algorithm. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression, addition of noise, low pass filtering and cropping attacks as compared to other existing algorithms for data hiding in the DCT domain.

  8. Formal approaches to information hiding: An analysis of interactive systems, statistical disclosure control, and refinement of specifications

    Science.gov (United States)

    Armijo, Kenneth Miguel

    an optimal value that would enhance heat transport performance by maximizing the critical heat flux (CHF) condition, while reducing the evaporator wall superheat. A 45% fill ratio was found to have the lowest overall superheat and highest thermal conductance by as much as 7.5W/K, as well as an enhanced CHF condition of 114.8W/cm2. A heat pipe analytical model, that characterizes binary mixture pool boiling is also presented, which was developed based on modeling efforts presented in studies 1 and 2. Model results with a 45% liquid charge ratio were found to provide good correspondence with the experimental data with an average rms evaporator vaporization heat flux deviation of 6.5%. The final study of this investigation assesses the cooling of single and dual-junction solar cells with the inclined, gravity-assisted, brass heat pipe, with a 0.05M 2-propanol/water mixture. Thermal behavior of this heat pipe solar collector system was investigated theoretically and semi-empirically through experimentation of varying input heat loads from attached strip-heaters to simulate waste heat production of single-junction monocrystalline silicon (Si), and tandem multijunction GaInP/GaAs solar cells. It was also found that the 45% liquid charge was capable of achieving the lowest superheat levels and highest critical heat flux (CHF) condition of 114.8 W/cm2, at a predicted solar concentration of 162 suns. Solar cell semiconductor theory was employed to evaluate the effects of increasing temperature and solar concentration on solar cell performance. Results showed that a combined PV/heat pipe system had a 1.7% higher electrical efficiency, at a concentration ratio 132 suns higher than a stand-alone PV system. The dual-junction system also exhibited enhanced performance at elevated system temperatures with a 2.1% greater electrical efficiency, at an operational concentration level of 560 suns higher than a stand-alone PV system. Waste heat recovery analysis of the silicon solar cell

  9. Parallel steganography framework for hiding a color image inside stereo images

    Science.gov (United States)

    Munoz-Ramirez, David O.; Ponomaryov, Volodymyr I.; Reyes-Reyes, Rogelio; Cruz-Ramos, Clara

    2017-05-01

    In this work, a robust steganography framework to hide a color image into a stereo images is proposed. The embedding algorithm is performed via Discrete Cosine Transform (DCT) and Quantization Index Modulation-Dither Modulation (QIM-DM) hiding the secret data. Additionally, the Arnold's Cat Map Transform is applied in order to scramble the secret color image, guaranteeing better security and robustness of the proposed system. Novel framework has demonstrated better performance against JPEG compression attacks among other existing approaches. Besides, the proposed algorithm is developed taking into account the parallel paradigm in order to be implemented in multi-core CPU increasing the processing speed. The results obtained by the proposed framework show high values of PSNR and SSIM, which demonstrate imperceptibility and sufficient robustness against JPEG compression attacks.

  10. Hiding image to video: A new approach of LSB replacement

    Directory of Open Access Journals (Sweden)

    Saurabh Singh,

    2010-12-01

    Full Text Available Steganography has become great area of interest for researchers as need for secure transaction of information is increasing day by day. Information may be text, image, audio or video. Steganography is a technique in which required information is hided in any other information such that the second information does not change significantly and it appears the same as original. This paper presents a novel approach of hiding image in a video. The proposed algorithm is replacing one LSB of each pixel in video frames. It becomes very difficult for intruder to guess that an image is hidden in the video as individual frames are very difficult to analyze in a video running at 30 frames per second. The process of analysis has been made more difficult by hiding each row of image pixels in multiple frames of the video, so intruder cannot even try to unhide image until he get full video.

  11. EFFICIENT METHOD FOR HIDING DATA BY PIXEL INTENSITY

    Directory of Open Access Journals (Sweden)

    M.Shobana

    2013-02-01

    Full Text Available Data communication substructure has become more universal that there is absolutely no favoritism between different types of data in the carry plane of communication with each and every one skilled to carry it through the public data networks. Steganography technique is used to hide or embed data into an image or audio or video. Here the cover object used is an image. In the existing method for hiding and extraction of information from the given image three kinds of algorithm are used, based on its data and index channel of an image. In the proposed system, three kinds of hiding technique are implemented with some modifications in the logic level. Third algorithm is designed using color channels, based on its intensity. This technique would boost up the number of bits embedding in the image. The accomplishment of all the three algorithms are analyzed and the efficient one is taken into consideration while implementing in FPGA.

  12. Competitively coupled maps for hiding secret visual information

    Science.gov (United States)

    Vaidelys, M.; Ziaukas, P.; Ragulskis, M.

    2016-02-01

    A novel digital image hiding scheme based on competitively coupled maps is presented in this paper. Self-organizing patterns produced by an array of non-diffusively coupled nonlinear maps are exploited to conceal the secret. The secret image is represented in the form of a dot-skeleton representation and is embedded into a spatially homogeneous initial state far below the noise level. Self-organizing patterns leak the secret image at a predefined set of system parameters. Computational experiments are used to demonstrate the effectiveness and the security of the proposed image hiding scheme.

  13. Minimax eigenvector decomposition for data hiding

    Science.gov (United States)

    Davidson, Jennifer

    2005-09-01

    Steganography is the study of hiding information within a covert channel in order to transmit a secret message. Any public media such as image data, audio data, or even file packets, can be used as a covert channel. This paper presents an embedding algorithm that hides a message in an image using a technique based on a nonlinear matrix transform called the minimax eigenvector decomposition (MED). The MED is a minimax algebra version of the well-known singular value decomposition (SVD). Minimax algebra is a matrix algebra based on the algebraic operations of maximum and addition, developed initially for use in operations research and extended later to represent a class of nonlinear image processing operations. The discrete mathematical morphology operations of dilation and erosion, for example, are contained within minimax algebra. The MED is much quicker to compute than the SVD and avoids the numerical computational issues of the SVD because the operations involved only integer addition, subtraction, and compare. We present the algorithm to embed data using the MED, show examples applied to image data, and discuss limitations and advantages as compared with another similar algorithm.

  14. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  15. Video Steganography: Text Hiding In Video By LSB Substitution

    Directory of Open Access Journals (Sweden)

    Kamred Udham Singh

    2014-05-01

    Full Text Available The development of high speed computer networks and Internet has increased the easiness of Information Communication. In contrast with Analog media and Digital media provide several different advantages such as high quality, simple editing, high loyalty copying and authenticity. But in the field of data communication this type of development has increased the fear of sneaking the data while sending data from the sender to the receiver. Due to this reason Information Security is main problem of Data Communication. Steganography plays an important role in field of Information Security. Video and images are very common choice for hiding data. It is very important for effective and successful embedding process to select appropriate pixels in the video frames, which are used to store the secret data. We use video based Steganography because of large size and memory requirements. Hiding information in a carrier file we use least significant bit (LSB insertion technique. In Least significant bit (LSB insertion technique, for hiding information we change LSB of video file with the information bits .This paper will focus on hiding information in specific frames of the video and in specific position of the frame by LSB substitution.

  16. Information Hiding and Countermeasures%信息隐藏技术及其攻击方法

    Institute of Scientific and Technical Information of China (English)

    吴树峰; 黄刘生; 卢继军; 陈国良

    2003-01-01

    Information Hiding Technology has a long history. With the development of Digital Technology,it has become a newly evolved discipline and a hot research area. Since the first Information Hiding Workshop held in 1996 ,thetechnology has been widely applied to areas such as multimedia ,signal processing and protection of software Intellectual Property,but the research work in secure communication is relatively fewer. Based on success of developing asteganography tool for communication,this article summarizes the current progress in the research of InformationHiding Technology systematically, and analyzes possible countermeasures against various Information Hiding techniques.

  17. Linear and Nonlinear Oblivious Data Hiding

    Directory of Open Access Journals (Sweden)

    Akansu Ali N

    2004-01-01

    Full Text Available The majority of the existing data hiding schemes are based on the direct-sequence (DS modulation where a low-power random sequence is embedded into the original cover signal to represent hidden information. In this paper, we investigate linear and nonlinear modulation approaches in digital data hiding. One typical DS modulation algorithm is explored and its optimal oblivious detector is derived. The results expose its poor cover noise suppression as the hiding signature signal always has much lower energy than the cover signal. A simple nonlinear algorithm, called set partitioning, is proposed and its performance is analyzed. Analysis and simulation studies further demonstrate improvements over the existing schemes.

  18. Steganography Algorithm to Hide Secret Message inside an Image

    CERN Document Server

    Ibrahim, Rosziati

    2011-01-01

    In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (SIS) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.

  19. Hiding Information into Palette-Based Image

    Institute of Scientific and Technical Information of China (English)

    WU Hong-tao; ZHU Bo-cheng; YANG Yi-xian

    2005-01-01

    After pointing out the weakness of the known palette-based image information hiding by palette matrix,a new spacial effective robust information hiding algorithm is proposed,which can resist the operation of ‘select all’,‘copy’,‘paste’ from cover to original,and can resist gently modification the palette matrix,and can resist the image format changed between true color image and palette-based image.The hiding capacity can reach 25% of the number of pixel index matrix.Due to the advisement of information hiding security an update algorithm is proposed at the end of the paper,with the capacity reduced and vision effect increased.

  20. 'Medical Tattoos' Help Hide Surgical Scars

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_161132.html 'Medical Tattoos' Help Hide Surgical Scars Pigments can restore more ... scars from cancer surgeries may benefit from "medical tattoos" that can help restore some of the skin's ...

  1. ENTROPY BASED DATA HIDING ON DOCUMENT IMAGES APPLIED ON DRDM APPROACH

    Directory of Open Access Journals (Sweden)

    Sadia Aslam

    2013-03-01

    Full Text Available This paper presents a data hiding application for document images providing security. Document images should be in bitmap format as well as grayscale in nature otherwise the developed system will automatically change it to grayscale. The system accepts any grayscale document image as an input and applies the developed technique on it. Developed technique is based on Entropy Based that selects the suitable areas in an image for that data insertion purpose. Output produced by the system is the processed document that is data embedded. Processed document should not look different from the original image means its visual quality should be high. The system is successfully tested for the test cases generated to check the effectiveness, quality and validation of the system. The system is developed using Matlab 7.7.0 (R2008b for the development of front end as well as the back end.

  2. Robust color image hiding method in DCT domain

    Institute of Scientific and Technical Information of China (English)

    LI Qing-zhong; YU Chen; CHU Dong-sheng

    2006-01-01

    This paper presents a robust color image hiding method based on YCbCr color system in discrete cosine transform (DCT) domain,which can hide a secret color image behind a public color cover image and is compatible with the international image compression standard of JPEG.To overcome the grave distortion problem in the restored secret image,this paper proposes a new embedding scheme consisting of reasonable partition of a pixel value and sign embedding.Moreover,based on human visual system (HVS) and fuzzy theory,this paper also presents a fuzzy classification method for DCT sub-blocks to realize the adaptive selection of embedding strength.The experimental results show that the maximum distortion error in pixel value for the extracted secret image is ±1.And the color cover image can provide good quality after embedding large amount of data.

  3. Hiding robot inertia using resonance.

    Science.gov (United States)

    Vallery, Heike; Duschau-Wicke, Alexander; Riener, Robert

    2010-01-01

    To enable compliant training modes with a rehabilitation robot, an important prerequisite is that any undesired human-robot interaction forces caused by robot dynamics must be avoided, either by an appropriate mechanical design or by compensating control strategies. Our recently proposed control scheme of "Generalized Elasticities" employs potential fields to compensate for robot dynamics, including inertia, beyond what can be done using closed-loop force control. In this paper, we give a simple mechanical equivalent using the example of the gait rehabilitation robot Lokomat. The robot consists of an exoskeleton that is attached to a frame around the patient's pelvis. This frame is suspended by a springloaded parallelogram structure. The mechanism allows vertical displacement while providing almost constant robot gravity compensation. However, inertia of the device when the patient's pelvis moves up and down remains a source of large interaction forces, which are reflected in increased ground reaction forces. Here, we investigate an alternative suspension: To hide not only gravity, but also robot inertia during vertical pelvis motion, we suspend the robot frame by a stiff linear spring that allows the robot to oscillate vertically at an eigenfrequency close to the natural gait frequency. This mechanism reduces human-robot interaction forces, which is demonstrated in pilot experimental results.

  4. Hiding a Realistic Object Using a Broadband Terahertz Invisibility Cloak

    CERN Document Server

    Zhou, Fan; Cao, Wei; Stuart, Colin T; Gu, Jianqiang; Zhang, Weili; Sun, Cheng

    2011-01-01

    The invisibility cloak has been a long-standing dream for many researchers over the decades. The introduction of transformational optics has revitalized this field by providing a general method to design material distributions to hide the subject from detection. By transforming space and light propagation, a three-dimensional (3D) object is perceived as having a reduced number of dimensions, in the form of points, lines, and thin sheets, making it "undetectable" judging from the scattered field. Although a variety of cloaking devices have been reported at microwave and optical frequencies, the spectroscopically important Terahertz (THz) domain remains unexplored. Moreover, due to the difficulties in fabricating cloaking devices that are optically large in all three dimensions, hiding realistic 3D objects has yet to be demonstrated. Here, we report the first experimental demonstration of a 3D THz cloaking device fabricated using a scalable Projection Microstereolithography process. The cloak operates at a broa...

  5. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  6. Optical image hiding based on computational ghost imaging

    Science.gov (United States)

    Wang, Le; Zhao, Shengmei; Cheng, Weiwen; Gong, Longyan; Chen, Hanwu

    2016-05-01

    Imaging hiding schemes play important roles in now big data times. They provide copyright protections of digital images. In the paper, we propose a novel image hiding scheme based on computational ghost imaging to have strong robustness and high security. The watermark is encrypted with the configuration of a computational ghost imaging system, and the random speckle patterns compose a secret key. Least significant bit algorithm is adopted to embed the watermark and both the second-order correlation algorithm and the compressed sensing (CS) algorithm are used to extract the watermark. The experimental and simulation results show that the authorized users can get the watermark with the secret key. The watermark image could not be retrieved when the eavesdropping ratio is less than 45% with the second-order correlation algorithm, whereas it is less than 20% with the TVAL3 CS reconstructed algorithm. In addition, the proposed scheme is robust against the 'salt and pepper' noise and image cropping degradations.

  7. Hiding an image in cascaded Fresnel digital holograms

    Institute of Scientific and Technical Information of China (English)

    Shaogeng Deng; Liren Liu; Haitao Lang; Weiqing Pan; Dong Zhao

    2006-01-01

    @@ A system of two separated computer-generated holograms termed cascaded Fresnel digital holography (CFDH) is proposed and its application to hiding information is demonstrated by a computer simulation experiment. The technique is that the reconstructed image is the result of the wave Fresnel diffractionof two sub-holograms located at different distances from the imaging plane along the illuminating beam. The two sub-holograms are generated by an iterative algorithm based on the projection onto convex sets. In the application to the hiding of optical information, the information to be hidden is encoded into thesub-hologram which is multiplied by the host image in the input plane, the other sub-hologram in the filterplane is used for the deciphering key, the hidden image can be reconstructed in the imaging plane of the CFDH setup.

  8. High Capacity data hiding using LSB Steganography and Encryption

    Directory of Open Access Journals (Sweden)

    Shamim Ahmed Laskar

    2013-01-01

    Full Text Available The network provides a method of communication to distribute information to the masses. With the growthof data communication over computer network, the security of information has become a major issue.Steganography and cryptography are two different data hiding techniques. Steganography hides messagesinside some other digital media. Cryptography, on the other hand obscures the content of the message. Wepropose a high capacity data embedding approach by the combination of Steganography andcryptography. In the process a message is first encrypted using transposition cipher method and then theencrypted message is embedded inside an image using LSB insertion method. The combination of these twomethods will enhance the security of the data embedded. This combinational methodology will satisfy therequirements such as capacity, security and robustness for secure data transmission over an open channel.A comparative analysis is made to demonstrate the effectiveness of the proposed method by computingMean square error (MSE and Peak Signal to Noise Ratio (PSNR. We analyzed the data hiding techniqueusing the image performance parameters like Entropy, Mean and Standard Deviation. The stego imagesare tested by transmitting them and the embedded data are successfully extracted by the receiver. The mainobjective in this paper is to provide resistance against visual and statistical attacks as well as highcapacity.

  9. Experimental Test of Quantum No-Hiding Theorem

    CERN Document Server

    Samal, Jharana Rani; Kumar, Anil

    2010-01-01

    Linearity and unitarity are two fundamental tenets of quantum theory. Any consequence that follows from these must be respected in the quantum world. The no-cloning theorem and the no-deleting theorem are the consequences of the linearity and the unitarity. Together with the stronger no-cloning theorem they provide permanence to quantum information, thus, suggesting that in the quantum world information can neither be created nor be destroyed. In this sense quantum information is robust, but at the same time it is also fragile because any interaction with the environment may lead to loss of information. Recently, another fundamental theorem was proved, namely, the no-hiding theorem that addresses precisely the issue of information loss. It says that if any physical process leads to bleaching of quantum information from the original system, then it must reside in the rest of the universe with no information being hidden in the correlation between these two subsystems. This has applications in quantum teleporta...

  10. Hiding Data in Images Using New Random Technique

    Directory of Open Access Journals (Sweden)

    Obaida Mohammad Awad Al-Hazaimeh

    2012-07-01

    Full Text Available Steganography is the art of hiding the fact that communication is taking place by hiding information in other information. In the field of Data Communication, Steganography play a major role. The transmission of information via the Internet may expose it to detect and theft. Some solution to be discussed is how to passing information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. We focus on the Least Significant Bit (LSB technique which is the most common Steganographic technique is employed in this paper. An improvement to this technique is suggested by randomly inserting the bits of the message in the image to produce more secured system. In this paper, the security goals were enhanced via a proposed cryptosystems to maintain the security on the Cover-image. The proposed solution consists of a simple, but strong to hiding the text data and the human eye would be unable to notice the hidden data in the Stego-image.

  11. Steganography An Art of Hiding Data

    CERN Document Server

    Channalli, Shashikala

    2009-01-01

    In today's world the art of sending & displaying the hidden information especially in public places, has received more attention and faced many challenges. Therefore, different methods have been proposed so far for hiding information in different cover media. In this paper a method for hiding of information on the billboard display is presented. It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. In this paper we propose a new form of steganography, on-line hiding of information on the output screens of the instrument. This method can be used for announcing a secret message in public place. It can be extended to other means such as electronic advertising board around sports stadium, railway station or airport. This method of steganography is very similar to image steganography and video steganography. Pr...

  12. Reversible Data Hiding Based on DNA Computing

    Directory of Open Access Journals (Sweden)

    Bin Wang

    2017-01-01

    Full Text Available Biocomputing, especially DNA, computing has got great development. It is widely used in information security. In this paper, a novel algorithm of reversible data hiding based on DNA computing is proposed. Inspired by the algorithm of histogram modification, which is a classical algorithm for reversible data hiding, we combine it with DNA computing to realize this algorithm based on biological technology. Compared with previous results, our experimental results have significantly improved the ER (Embedding Rate. Furthermore, some PSNR (peak signal-to-noise ratios of test images are also improved. Experimental results show that it is suitable for protecting the copyright of cover image in DNA-based information security.

  13. Automated process planning system

    Science.gov (United States)

    Mann, W.

    1978-01-01

    Program helps process engineers set up manufacturing plans for machined parts. System allows one to develop and store library of similar parts characteristics, as related to particular facility. Information is then used in interactive system to help develop manufacturing plans that meet required standards.

  14. Modified Approach for Hiding Sensitive Association Rules for Preserving Privacy in Database

    Directory of Open Access Journals (Sweden)

    Tania Banerjee

    2014-03-01

    Full Text Available Data mining is the process of analyzing large database to find useful patterns. The term pattern refers to the items which are frequently occurring in set of transaction. The frequent patterns are used to find association between sets of item. The efficiency of mining association rules and confidentiality of association rule is becoming one of important area of knowledge discovery in database. This paper is organized into two sections. In the system Apriori algorithm is being presented that efficiently generates association rules. These reduces unnecessary database scan at time of forming frequent large item sets .We have tried to give contribution to improved Apriori algorithm by hiding sensitive association rules which are generated by applying improved Apriori algorithm on supermarket database. In this paper we have used novel approach that strategically modifies few transactions in transaction database to decrease support and confidence of sensitive rule without producing any side effects. Thus in the paper we have efficiently generated frequent item set sets by applying Improved Apriori algorithm and generated association rules by applying minimum support and minimum confidence and then we went one step further to identify sensitive rules and tried to hide them without any side effects to maintain integrity of data without generating spurious rules.

  15. Preparation of biobased sponges from un-tanned hides

    Science.gov (United States)

    One of our research endeavors to address ongoing challenges faced by the U.S. hide and leather industries is to develop innovative uses and novel biobased products from hides to improve prospective markets and to secure a viable future for hides and leather industries. We had previously investigate...

  16. Hiding an Inconvenient Truth : Lies and Vagueness

    NARCIS (Netherlands)

    Serra Garcia, M.; van Damme, E.E.C.; Potters, J.J.M.

    2010-01-01

    When truth conflicts with e¢ ciency, can verbal communication destroy efficiency? Or are lies or vagueness used to hide inconvenient truths? We consider a sequential 2-player public good game in which the leader has private information about the value of the public good. This value can be low, high,

  17. Hiding levitating objects above a ground plane

    DEFF Research Database (Denmark)

    Zhang, Jingjing; Luo, Yu; Mortensen, Asger

    2010-01-01

    An approach to hiding objects levitating above a conducting sheet is suggested in this paper. The proposed device makes use of isotropic negative-refractive-index materials without extreme material parameters, and creates an illusion of a remote conducting sheet. Numerical simulations are perform...

  18. An Approach to Hide Secret Speech Information

    Institute of Scientific and Technical Information of China (English)

    WU Zhi-jun; DUAN Hai-xin; LI Xing

    2006-01-01

    This paper presented an approach to hide secret speech information in code excited linear prediction(CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information hiding and extracting for the purpose of secure speech communication. The secret speech is coded in 2.4Kb/s mixed excitation linear prediction (MELP), which is embedded in CELP type public speech. The ABS algorithm adopts speech synthesizer in speech coder. Speech embedding and coding are synchronous, i.e. a fusion of speech information data of public and secret. The experiment of embedding 2.4 Kb/s MELP secret speech in G.728 scheme coded public speech transmitted via public switched telephone network (PSTN) shows that the proposed approach satisfies the requirements of information hiding, meets the secure communication speech quality constraints, and achieves high hiding capacity of average 3.2 Kb/s with an excellent speech quality and complicating speakers' recognition.

  19. Quartz resonator processing system

    Science.gov (United States)

    Peters, Roswell D. M.

    1983-01-01

    Disclosed is a single chamber ultra-high vacuum processing system for the oduction of hermetically sealed quartz resonators wherein electrode metallization and sealing are carried out along with cleaning and bake-out without any air exposure between the processing steps. The system includes a common vacuum chamber in which is located a rotatable wheel-like member which is adapted to move a plurality of individual component sets of a flat pack resonator unit past discretely located processing stations in said chamber whereupon electrode deposition takes place followed by the placement of ceramic covers over a frame containing a resonator element and then to a sealing stage where a pair of hydraulic rams including heating elements effect a metallized bonding of the covers to the frame.

  20. An Internal Data Non-hiding Type Real-time Kernel and its Application to the Mechatronics Controller

    Science.gov (United States)

    Yoshida, Toshio

    For the mechatronics equipment controller that controls robots and machine tools, high-speed motion control processing is essential. The software system of the controller like other embedded systems is composed of three layers software such as real-time kernel layer, middleware layer, and application software layer on the dedicated hardware. The application layer in the top layer is composed of many numbers of tasks, and application function of the system is realized by the cooperation between these tasks. In this paper we propose an internal data non-hiding type real-time kernel in which customizing the task control is possible only by change in the program code of the task side without any changes in the program code of real-time kernel. It is necessary to reduce the overhead caused by the real-time kernel task control for the speed-up of the motion control of the mechatronics equipment. For this, customizing the task control function is needed. We developed internal data non-cryptic type real-time kernel ZRK to evaluate this method, and applied to the control of the multi system automatic lathe. The effect of the speed-up of the task cooperation processing was able to be confirmed by combined task control processing on the task side program code using an internal data non-hiding type real-time kernel ZRK.

  1. Association Rule Hiding Techniques for Privacy Preserving Data Mining: A Study

    Directory of Open Access Journals (Sweden)

    Gayathiri P

    2015-12-01

    Full Text Available Association rule mining is an efficient data mining technique that recognizes the frequent items and associative rule based on a market basket data analysis for large set of transactional databases. The probability of most frequent data item occurrence of the transactional data items are calculated to present the associative rule that represents the habits of buying products of the customers in demand. Identifying associative rules of a transactional database in data mining may expose the confidentiality and privacy of an organization and individual. Privacy Preserving Data Mining (PPDM is a solution for privacy threats in data mining. This issue is solved using Association Rule Hiding (ARH techniques in Privacy Preserving Data Mining (PPDM. This research work on Association Rule Hiding technique in data mining performs the generation of sensitive association rules by the way of hiding based on the transactional data items. The property of hiding rules not the data makes the sensitive rule hiding process is a minimal side effects and higher data utility technique.

  2. 基于多小波变换与QAR编码的信息隐藏算法%Information Hiding Algorithm based on Multi-wavelet Transform and QAR Coding System

    Institute of Scientific and Technical Information of China (English)

    杨涛; 任帅; 索丽; 娄棕棕; 张弢; 慕德俊

    2016-01-01

    Aiming at the contradiction of between invisibility and robustness and at the lack of error-detecting capacity for common information hiding algorithms, a novel algorithm based on multi-wavelet transform and QAR coding system is proposed. The digital image carrier in this scheme is preprocessed with CARDBAL2, GHM transform andlαβ color space translation, and then, the secret information coded by QAR system is embedded into preprocessed carrier for production of a stego image, thus to realize secure communication of the confidential information. The experimental results indicate that the proposed algorithm exhibits clear superiorities in invisibility, robustness and the sensitivity for distortion.%针对信息隐藏算法中常见的不可见性和鲁棒性相矛盾且不具备检错能力的缺点,提出一种新的基于多小波变换与QAR编码的信息隐藏算法.该算法利用CARDBAL2多小波变换、GHM多小波变换和lαβ颜色空间转换等方法对数字图像载体进行预处理,再将经过QAR(Quotient and remainder)编码的秘密信息嵌入到预处理后的载体图像中以生成含秘图像,从而达到将秘密信息安全传输的目的.实验结果显示,算法的优势在于其不可见性、鲁棒性和感知篡改性.

  3. The study results steganography hiding messages in image files as vehicle security software

    Directory of Open Access Journals (Sweden)

    D. O. Navrotskyi

    2012-11-01

    Full Text Available Synergetics of steganographic and cryptographic encryption algorithms, which provide a solid security foundation, is presented in this paper. Hiding messages systems in spatial and frequency domain image are compared and studied by the author. The following questions: Compression scheme JPEG , JPEG – transformation structure, Practical recommendations for hiding data to image files, The method of least significant bits (spatial domain and the DCT coefficients values relative replacement method (frequency domain, Packing and unpacking the hidden message, Visual distortion image changing system parameters are considered.

  4. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  5. A Novel Image Data Hiding Scheme with Diamond Encoding

    Directory of Open Access Journals (Sweden)

    Wu Hsien-Chu

    2009-01-01

    Full Text Available A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The proposed method is the extension of the exploiting modification direction (EMD embedding scheme. First, the process of embedding partitions the cover image into nonoverlapping blocks of two consecutive pixels and transforms the secret messages to a series of -ary digits. For each block, the diamond encoding technique is applied to calculate the diamond characteristic value, and one secret -ary digit is concealed into the diamond characteristic value. The diamond characteristic value is modified to secret digit and it can be obtained by adjusting pixel values in a block. This scheme is designed in such a way that the distortion of each block after diamond encoding is never out of the embedding parameter , and the block capacity is equal to . The diamond encoding provides an easy way to produce a more perceptible result than those yielded by simple least-significant-bit substitution methods. The embedded secret data can be extracted without the original cover image. Experimental results have demonstrated that the proposed method is capable of hiding more secret data while keeping the stego-image quality degradation imperceptible.

  6. S-rough sets and the discovery of F-hiding knowledge

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Singular rough sets (S-rough sets) have three classes of forms: one-directional S-rough sets, dual of one-directional S-rough sets, and two-directional S-rough sets. Dynamic, hereditary, mnemonic, and hiding properties are the basic characteristics of S-rough sets. By using the S-rough sets, the concepts of f-hiding knowledge, F-hiding knowledge, hiding degree, and hiding dependence degree are given. Then, both the hiding theorem and the hiding dependence theorem of hiding knowledge are proposed. Finally, an application of hiding knowledge is discussed.

  7. Mother-young recognition in goitered gazelle during hiding period.

    Science.gov (United States)

    Blank, D A; Yang, W

    2017-09-01

    The mother-young recognition process is crucial for the growth and survival of progeny. In "follower" ungulate species, vocal and visual cues have been found to play a leading role in the mother-young identification process from the first days postpartum, with olfactory cues also important in establishing the initial selective mother-young bond immediately after birth. In "hider" species, however, much less has been documented of mother-young recognition behaviors, especially in their natural habitat. In this paper, we investigated this process in goitered gazelle (Gazella subgutturosa), a typical hider species, in its native environment in Kazakhstan. Over the course of our study period, we investigated the behaviors of 257 females with twins and 158 females with singles through visual observations. We found that within the first month after birth, when females spend only a short time with their young, mothers recognized their fawns using mostly olfactory cues, while vision was used to locate their hiding offspring. Fawns vocalized very rarely, producing only distress calls that did not seem intended for individual identification. Licking of young by their mothers was observed frequently, not only during the first week after birth, when this action was very important for fawn stimulation for a number of physiological functions, but for several weeks after (until one month of age), when licking lost its physiological importance and likely became more of a recognition procedure. Fawns did not recognize their mothers at all, either through vision or vocalizations, since during their first weeks after birth, they responded to any gazelle that approached their hiding area. By a month after birth, when mothers and fawns began to stay together for longer periods of time, their recognition process became more enhanced, and in addition to olfactory cues, the mother and her young began to use more and more visual cues for longer distance identification, as well as

  8. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  9. Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

    Directory of Open Access Journals (Sweden)

    Alawi A. Al-Saggaf

    2013-04-01

    Full Text Available By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS, in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statistical hiding (the advisory gets almost no statistically advantages about the secret message. The efficiency of our scheme offers different security assurance, and the trusted third party is not involved in the exchange of commitment.The characteristic of our scheme makes it useful for biometrics systems. If the biometrics template is compromised, then there is no way to use it directly again even in secure biometrics systems. This paper combines biometrics and OFCS to achieve biometric protection scheme using smart cards with renewability of protected biometrics template property.

  10. Augmented Reality Marker Hiding with Texture Deformation.

    Science.gov (United States)

    Kawai, Norihiko; Sato, Tomokazu; Nakashima, Yuta; Yokoya, Naokazu

    2016-10-19

    Augmented reality (AR) marker hiding is a technique to visually remove AR markers in a real-time video stream. A conventional approach transforms a background image with a homography matrix calculated on the basis of a camera pose and overlays the transformed image on an AR marker region in a real-time frame, assuming that the AR marker is on a planar surface. However, this approach may cause discontinuities in textures around the boundary between the marker and its surrounding area when the planar surface assumption is not satisfied. This paper proposes a method for AR marker hiding without discontinuities around texture boundaries even under nonplanar background geometry without measuring it. For doing this, our method estimates the dense motion in the marker's background by analyzing the motion of sparse feature points around it, together with a smooth motion assumption, and deforms the background image according to it. Our experiments demonstrate the effectiveness of the proposed method in various environments with different background geometries and textures.

  11. SAR processing using SHARC signal processing systems

    Science.gov (United States)

    Huxtable, Barton D.; Jackson, Christopher R.; Skaron, Steve A.

    1998-09-01

    Synthetic aperture radar (SAR) is uniquely suited to help solve the Search and Rescue problem since it can be utilized either day or night and through both dense fog or thick cloud cover. Other papers in this session, and in this session in 1997, describe the various SAR image processing algorithms that are being developed and evaluated within the Search and Rescue Program. All of these approaches to using SAR data require substantial amounts of digital signal processing: for the SAR image formation, and possibly for the subsequent image processing. In recognition of the demanding processing that will be required for an operational Search and Rescue Data Processing System (SARDPS), NASA/Goddard Space Flight Center and NASA/Stennis Space Center are conducting a technology demonstration utilizing SHARC multi-chip modules from Boeing to perform SAR image formation processing.

  12. Enhancement of LSB based Steganography for Hiding Image in Audio

    OpenAIRE

    Pradeep Kumar Singh; R.K.Aggrawal

    2010-01-01

    In this paper we will take an in-depth look on steganography by proposing a new method of Audio Steganography. Emphasize will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method for data hiding in audio.

  13. Selective Redundancy Removal: A Framework for Data Hiding

    Directory of Open Access Journals (Sweden)

    Ugo Fiore

    2010-02-01

    Full Text Available Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs. Such redundancy may be removed by means of optimization software. Redundancy removal, if applied selectively, enables information hiding. This work introduces Selective Redundancy Removal (SRR as a framework for hiding data. An example application of the framework is given in terms of hiding information in HTML documents. Non-uniformity across documents may raise alarms. Nevertheless, selective application of optimization techniques might be due to the legitimate use of optimization software not supporting all the optimization methods, or configured to not use all of them.

  14. Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures

    CERN Document Server

    Mazurczyk, Wojciech; Zander, Sebastian; Houmansadr, Amir; Szczypiorski, Krzysztof

    2016-01-01

    Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background. Information Hiding In Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures begins with introducing data concealment methods and their evolution. Chapter two discusses the existing terminology and describes the model for hidden communication and related communication scenarios. Chapters three to five present the main classes of information hiding in communication networks accompanied by a discussion of their robustness and undetectability. The book concludes with a discussion of potential countermeasures against information hiding techniques, which includes different types of mechanisms for the detection, limitation and prevention of covert co munication channels.

  15. Processed Products Database System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Collection of annual data on processed seafood products. The Division provides authoritative advice, coordination and guidance on matters related to the collection,...

  16. An efficient steganography method for hiding patient confidential information.

    Science.gov (United States)

    Al-Dmour, Hayat; Al-Ani, Ahmed; Nguyen, Hung

    2014-01-01

    This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI).

  17. Personal Investigations Processing System

    Data.gov (United States)

    US Agency for International Development — PIPS is a system that maintains the Security/Suitability Investigations Index (SII) for OPM. It contains over 11 million background investigation records of Federal...

  18. Where is hbar Hiding in Entropic Gravity?

    CERN Document Server

    Chen, Pisin

    2011-01-01

    The entropic gravity scenario recently proposed by Erik Verlinde reproduced the Newton's law of purely classical gravity yet the key assumptions of this approach all have quantum mechanical origins. This is atypical for emergent phenomena in physics, where the underlying, more fundamental physics often reveals itself as corrections to the leading classical behavior. So one naturally wonders: where is hbar hiding in entropic gravity? To address this question, we first revisit the idea of holographic screen as well as entropy and its variation law in order to obtain a self-consistent approach to the problem. Next we argue that when dealing with quantum gravity issues the generalized uncertainty principle (GUP) should be the more appropriate foundation. Indeed based on GUP it has been demonstrated that the black hole Bekenstein entropy area law must be modified not only in the strong but also in the weak gravity regime. In the weak gravity limit, such a GUP modified entropy exhibits a logarithmic correction term...

  19. Hiding Quantum Information in the Perfect Code

    CERN Document Server

    Shaw, Bilal A

    2010-01-01

    We present and analyze a protocol for quantum steganography where the sender (Alice) encodes her steganographic information into the error syndromes of the perfect (five-qubit) quantum error-correcting code, and sends it to the receiver (Bob) over a depolarizing channel. Alice and Bob share a classical secret key, and hide quantum information in such a way that to an eavesdropper (Eve) without access to the secret key, the quantum message looks like an innocent codeword with a typical sequence of quantum errors. We calculate the average rate of key consumption, and show how the protocol improves in performance as information is spread over multiple codeword blocks. Alice and Bob utilize different encodings to optimize the average number of steganographic bits that they can send to each other while matching the error statistics of the depolarizing channel.

  20. Multimedia Data Hiding and Authentication via Halftoning and Coordinate Projection

    Directory of Open Access Journals (Sweden)

    Wu Chai Wah

    2002-01-01

    Full Text Available We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is demonstrated. The image authentication scheme is based on the data hiding scheme and can detect, localize, and repair the tampered area of the image. Furthermore, the self-repairing feature of the authentication scheme has a hologram-like quality; any portion of the image can be used to reconstruct the entire image, with a greater quality of reconstruction as the portion size increases.

  1. Mechanical properties of biobased films prepared from collagen solutions derived from bovine hides

    Science.gov (United States)

    The most valuable byproducts of the meat packing industry are hides. The U.S. is the world’s 3rd largest hide producing country and currently produces approximately 35 million cattle hides annually. Due to fierce competition in global markets, the American leather and hides industry is facing chal...

  2. Development of animation processing system

    Energy Technology Data Exchange (ETDEWEB)

    Kato, Katsumi [Nuclear Energy Data Center, Tokai, Ibaraki (Japan); Watanabe, Tadashi; Machida, Masahiko; Kaburaki, Hideo

    1995-03-01

    Computer and network environment for image processing has been developed and maintained by the computing and information systems center under the course of establishing a distributed processing environment. A server workstation was introduced for image processing. An animation processing system, in which simulation results are consecutively visualized on the server workstation and automatically recorded on a video tape, has been developed. In this report, a system construction, visualization in the workstation using a visualization tool, control of video tape recorder and workstation, and production of animation video are described with some examples. (author).

  3. Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory

    Science.gov (United States)

    de Paor, A. M.

    Hide (Nonlinear Processes in Geophysics, 1998) has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ɛ has the value 1 is proved via the Popov theorem from feedback system stability theory.

  4. 针对Ghost还原的木马隐蔽驻留技术研究%Research on Trojan Horse Hiding and Residence Technology According to Ghost Restoration

    Institute of Scientific and Technical Information of China (English)

    郑成; 王轶骏; 薛质

    2012-01-01

    Ghost reduction system is widely used in the computer system restoration, this technology is easy to use while contains certain safety hidden trouble. This paper first describes Ghost image file format, and tells of its analytical process and principles. And on this basis, this paper draws out the Trojan hiding and residence technology of the Ghost image reduction system, and analyzes the realization of command line tool which can penetrate the Ghost image file. This tool reads and analyzes Ghost image file, and then writes in the back door to their files, thus to realize the Trojan horse hiding and residence. This paper finally puts forth how to prevent and detect the hiding and residing Trojan by this method, and thus to ensure the integrity and safety of restored system.%Ghost还原系统已经被广泛应用于计算机的系统还原,该技术在使用方便的同时,也存在着安全隐患。文中首先介绍了Ghost映像文件的格式,并阐述其解析的过程和原理。然后在此基础上引出针对Ghost还原系统映像的木马隐蔽驻留技术,并剖析了所实现的Ghost映像文件穿越的命令行工具。该工具读取解析Ghost映像文件,然后往其中写入后门文件来实现木马的隐蔽驻留。最后提出了如何预防和检测利用该方法隐蔽驻留的木马,确保系统还原后的完整和安全。

  5. The new inter process communication middle-ware for the ATLAS Trigger and Data Acquisition system

    CERN Document Server

    Kolos, Serguei; The ATLAS collaboration

    2016-01-01

    The ATLAS Trigger & Data Acquisition (TDAQ) project was started almost twenty years ago with the aim of providing scalable distributed data collection system for the experiment. While the software dealing with physics data flow was implemented by directly using the low-level communication protocols, like TCP and UDP, the control and monitoring infrastructure services for the TDAQ system were implemented on top of the CORBA communication middle-ware. CORBA provides a high-level object oriented abstraction for the inter process communication, hiding communication complexity from the developers. This approach speeds up and simplifies development of communication services but incurs some extra cost in terms of performance and resources overhead. Our experience of using CORBA for control and monitoring data exchange in the distributed TDAQ system was very successful, mostly due to the outstanding quality of the CORBA brokers, which have been used in the project: omniORB for C++ and JacORB for Java. However, du...

  6. The new inter process communication middle-ware for the ATLAS Trigger and Data Acquisition system

    CERN Document Server

    Kolos, Serguei; The ATLAS collaboration

    2016-01-01

    The ATLAS Trigger & Data Acquisition (TDAQ) project was started almost twenty years ago with the aim of providing scalable distributed data collection system for the experiment. While the software dealing with physics data flow was implemented by directly using the low-level communication protocols, like TCP and UDP, the control and monitoring infrastructure services for the TDAQ system were implemented on top of the CORBA communication middle-ware. CORBA provides a high-level object oriented abstraction for the inter process communication, hiding communication complexity from the developers. This approach speeds up and simplifies development of communication services but incurs some extra cost in terms of performance and resources overhead. Our experience of using CORBA for control and monitoring data exchange in the distributed TDAQ system was very successful, mostly due to the outstanding quality of the CORBA brokers, which have been used in the project: omniORB for C++ and JacORB for Java. However, du...

  7. Hide and New in the Pi-Calculus

    Directory of Open Access Journals (Sweden)

    Marco Giunti

    2012-08-01

    Full Text Available In this paper, we enrich the pi-calculus with an operator for confidentiality (hide, whose main effect is to restrict the access to the object of the communication, thus representing confidentiality in a natural way. The hide operator is meant for local communication, and it differs from new in that it forbids the extrusion of the name and hence has a static scope. Consequently, a communication channel in the scope of a hide can be implemented as a dedicated channel, and it is more secure than one in the scope of a new. To emphasize the difference, we introduce a spy context that represents a side-channel attack and breaks some of the standard security equations for new. To formally reason on the security guarantees provided by the hide construct, we introduce an observational theory and establish stronger equivalences by relying on a proof technique based on bisimulation semantics.

  8. A Data-reversible Hiding Algorithm in WSNs

    Directory of Open Access Journals (Sweden)

    Jia CHEN

    2013-09-01

    Full Text Available In view of the phenomenon that data-hiding algorithm is easy to be detected by inspecting tool SPAM when carrying information, random insertion and histogram modification are adapted in the data hiding. A data-reversible hiding algorithm in WSNs is put forward. By collecting and referring sub-graph, calculating data fusion algorithm that can protect the data’s completion and privacy and analyzing the reversible hiding data algorithm research, the inspection of SPAM. Finally MATLAB7.0 exploitation is adopted to stimulate the analysis of experiment. The result shows that compared with Kim algorithm, the algorithm is safer to prevent the SPAM inspection and is more suitable for information transfer.

  9. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Institute of Scientific and Technical Information of China (English)

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao

    2004-01-01

    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  10. Suitability of the RGB Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Ante Poljicak

    2010-06-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data  hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  11. Suitability of the rgb Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Lidija Mandić

    2010-01-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  12. A Simple Image Encoding Method with Data Lossless Information Hiding

    OpenAIRE

    Zhi-Hui Wang; Chin-Chen Chang; Ming-Chu Li; Tzu-Chuen Lu

    2011-01-01

    In this paper, we propose a simple reversible data hiding method in the spatial domain for block truncation coding (BTC) compressed grayscale images. The BTC method compresses a block of a grayscale image to a bitmap and a pair of quantization numbers. The proposed method first embeds secret bits into a block by changing the order of those two quantization numbers. The compression rate is not enlarged by this embedding scheme. To further improve the hiding capacity, the proposed method embeds...

  13. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  14. A chaos-based approach for information hiding security

    OpenAIRE

    Bahi, Jacques M.; Guyeux, Christophe

    2010-01-01

    This paper introduces a new framework for data hiding security. Contrary to the existing ones, the approach introduced here is not based on probability theory. In this paper, a scheme is considered as secure if its behavior is proven unpredictable. The objective of this study is to enrich the existing notions of data hiding security with a new rigorous and practicable one. This new definition of security is based on the notion of topological chaos. It could be used to reinforce the confidence...

  15. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  16. Let’s play hide and seek!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    This week, we would like you to play a small online game called “Virtual Hide & Seek”. The rules are simple: some of our colleagues have published some sensitive or confidential documents on CERN’s central services like Indico, CDS, EDMS or TWiki, as well as on our many websites. Your mission, should you choose to accept it: find them!   If you provide us with documents marked “confidential”, “classified”, “sensitive”, or containing plain text operational passwords, you can win a book on computer security. There are only few conditions: these documents must be visible from outside CERN, must not require a CERN account in order to access them, and must not belong to you or have a direct link with your work. Have fun! But seriously, are you sure that your documents are really properly protected? We regularly find confidential documents stored on one of the CERN central  services and w...

  17. Book Review: No Place To Hide

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2007-03-01

    Full Text Available O'Harrow, R., Jr. (2006. No Place To Hide. New York: Free Press. 352 pages, ISBN: 0-7432-8705-3 (paper, US$26Reviewed by Gary C. Kessler (gary.kessler@champlain.eduPersonal privacy and the protection of personal identifying information are of concern to all of us. Innumerable articles and conferences address our loss of privacy, either through the sale of consumer databases or our own inattention. Opinions vary from "You have no privacy; get over it" to "This is the end of civil liberties as we know them." We teach people to safely maneuver on the Internet and minimize their exposure to bogus sites set up to steal their identity, warn users about the dangers of phishing and posting personal information on social network sites, use firewalls to protect our databases, and enact laws such as the Health Insurance Portability and Accountability Act (HIPAA and the Family Educational Rights and Privacy Act (FERPA to protect information.(see PDF for full review

  18. Steganographic Approach for Data Hiding using LSB Techniques

    Directory of Open Access Journals (Sweden)

    Baluram Nagaria , Ashish Parikh ,Sandeep Mandliya ,Neeraj shrivastav

    2012-12-01

    Full Text Available Today’s all the multimedia work done via internet so it’s an urgent need to protect the data from malicious attacks. This lead to the research in the area of Digital watermarking and cryptography which intends to protect the copyright information of the intellectuals. In this paper a DCT based steganography scheme is proposed which provides higher resistance to image processing attacks such as JPEG compression, noise, rotation, translation etc Steganography has been implemented In MATLAB7.6 using basic image processing techniques. Steganography is the technique of hiding confidential information within any media. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information But we have design a simulator in which we have transmit our data via mail or LAN. For securing the data, this will be password protected. For design this simulator we have encrypted our data and after that without password we will not decrypted the data. Our all conclusion is that we will secure our information. The difference between the two is in the appearance in the processed output; the output of Steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention. In this paper, we have tried to elucidate the different approaches towards implementation of Steganography using ‘multimedia’ file (text, static image, audio and video and Network IP datagram as cover.

  19. The potency of plant extracts as antimicrobials for the skin or hide preservation

    Science.gov (United States)

    Suparno, Ono; Afifah, Amalia; Panandita, Tania; Marimin, Purnawati, Rini

    2017-03-01

    Preservation of skin or hide uses antimicrobial that will be disposed in wastewater in the skin or hide processing resulting in the environmental pollution. Extracts of some types of plants contain some antimicrobial substances which are potential to be used as biocides for the preservation of skin or hide and are more environmentally friendly. The objectives of this study were to determine the phytochemical contents of moringa, cucumber tree or wuluh starfruit, cherry, and white leadtree or lamtoro leaves and to analyse the antibacterial activities of the plant extracts against microorganisms that cause spoilage of skin or hide. Phytochemical constituents of the dried plant leaves were extracted by 70% ethanol. The resulting extracts were analysed their phytochemical contents and antimicrobial activities against gram negative and gram positive bacteria (inhibition zone test) by well diffusion method, the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Phytochemical test showed that the four leaf extracts contained alkaloids, saponins, tannins, flavonoids, steroids, and glycosides. The inhibition zones of the extracts against Escherichia coli were 5 mm for moringa leaf, 6 mm for cucumber tree leaf, 12 mm for cherry leaf, and 17 mm for white leadtree leaf. Inhibition zone of the extracts against Staphylococcus aureus were 2.5 mm for moringa leaf, 7 mm for cucumber tree leaf, 7.3 mm for cherry leaf, and 13 mm for white leadtree leaf. Inhibition zones of the extracts against Bacillus subtilis were 8 mm for moringa leaf, 9 mm for cucumber tree starfruit leaf, 14 mm for cherry leaf, and 15 mm for white leadtree leaf. The best MIC and MBC tests were demonstrated by white leadtree leaf extract against E. coli found at concentration of 1500 µg/ml, against S. aureus at concentration of 3000 µg/ml, and against B. subtilis at concentration of 3000 µg/ml. The ethanol extract of white leadtree leaf had the best antibacterial activity

  20. Mars Aqueous Processing System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Mars Aqueous Processing System (MAPS) is a novel technology for recovering oxygen, iron, and other constituents from lunar and Mars soils. The closed-loop...

  1. Mars Aqueous Processing System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Mars Aqueous Processing System (MAPS) is an innovative method to produce useful building materials from Martian regolith. Acids and bases produced from the regolith...

  2. Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression.

    Science.gov (United States)

    Zhang, Weiming; Hu, Xiaocheng; Li, Xiaolong; Yu, Nenghai

    2013-07-01

    State-of-the-art schemes for reversible data hiding (RDH) usually consist of two steps: first construct a host sequence with a sharp histogram via prediction errors, and then embed messages by modifying the histogram with methods, such as difference expansion and histogram shift. In this paper, we focus on the second stage, and propose a histogram modification method for RDH, which embeds the message by recursively utilizing the decompression and compression processes of an entropy coder. We prove that, for independent identically distributed (i.i.d.) gray-scale host signals, the proposed method asymptotically approaches the rate-distortion bound of RDH as long as perfect compression can be realized, i.e., the entropy coder can approach entropy. Therefore, this method establishes the equivalency between reversible data hiding and lossless data compression. Experiments show that this coding method can be used to improve the performance of previous RDH schemes and the improvements are more significant for larger images.

  3. Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms

    Directory of Open Access Journals (Sweden)

    Xu-Ren Luo

    2011-05-01

    Full Text Available In recent years, reversible data hiding has attracted much more attention than before. Reversibilitysignifies that the original media can be recovered without any loss from the marked media afterextracting the embedded message. This paper presents a new method that adopts two-level wavelettransform and exploits the feature of large wavelet coefficient variance to achieve the goal of highcapacity with imperceptibility. Our method differs from those of previous ones in which the waveletcoefficients histogram not gray-level histogram is manipulated. Besides, clever shifting rules areintroduced into histogram to avoid the decimal problem in pixel values after recovery to achievereversibility. With small alteration of the wavelet coefficients in the embedding process, and therefore lowvisual distortion is obtained in the marked image. In addition, an important feature of our design is thatthe use of threshold is much different from previous studies. The results indicate that our design issuperior to many other state-of-the-art reversible data hiding schemes.

  4. Handbook of signal processing systems

    CERN Document Server

    Deprettere, Ed; Leupers, Rainer; Takala, Jarmo

    2013-01-01

    Handbook of Signal Processing Systems is organized in three parts. The first part motivates representative applications that drive and apply state-of-the art methods for design and implementation of signal processing systems; the second part discusses architectures for implementing these applications; the third part focuses on compilers and simulation tools, describes models of computation and their associated design tools and methodologies. This handbook is an essential tool for professionals in many fields and researchers of all levels.

  5. Confidential Data Hiding Using Wavlet Based Ecg Stegnography

    Directory of Open Access Journals (Sweden)

    Malashree K S

    2014-05-01

    Full Text Available With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as Point-of-Care (PoC applications in hospitals around the world. Therefore, huge amount of ECG signal collected by Body Sensor Networks (BSNs from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level etc. and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data is being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this project, a wavelet based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest.

  6. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Directory of Open Access Journals (Sweden)

    Andreas Wilke

    Full Text Available Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  7. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Science.gov (United States)

    Wilke, Andreas; Minich, Steven; Panis, Megane; Langen, Tom A; Skufca, Joseph D; Todd, Peter M

    2015-01-01

    Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed) patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching) times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  8. Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation

    Directory of Open Access Journals (Sweden)

    Marghny Mohamed

    2011-01-01

    Full Text Available The least significant bit (LSB embedding method is one of the most commonly used techniques; it targets the LSB'sof the host image to hide the data. This paper deals with three main steganography challenges (i.e. capacity, imperceptibility,and security. This is achieved by hybrid data hiding scheme incorporates LSB technique with a key-permutation method. Thepaper also proposes an optimal key permutation method using genetic algorithms for best key selection. Both normal andoptimized methods are tested with standard images, varying both data size as well as key space. Final experimental resultsshow decrement in computation time when increasing number of keys, at the same time system security improves.

  9. A data hiding approach for the self-security of iris recognition

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Attacks to biometric data are the primary danger to the self-security of biometrics.To improve the iris feature template data security,a data hiding approach based on bit streams is proposed,in which an iris feature template is embedded into a face image. The proposed approach is applicable to present dominant techniques of iris recognition.With the low computation cost and the zero decoding-error-rate,this data hiding approach,embedding target biometric data into other biometric data for improving the security of target data in identity recognition,data storage and transmission,can deceive attackers more effectively.Furthermore,it does not degrade the iris recognition performances.Experimental results prove that the proposed approach can be used to protect iris feature templates and enhance the security of the iris recognition system itself.

  10. GIPSY : Groningen Image Processing System

    NARCIS (Netherlands)

    Allen, R. J.; Ekers, R. D.; Terlouw, J. P.; Vogelaar, M. G. R.

    2011-01-01

    GIPSY is an acronym of Groningen Image Processing SYstem. It is a highly interactive software system for the reduction and display of astronomical data. It supports multi-tasking using a versatile user interface, it has an advanced data structure, a powerful script language and good display faciliti

  11. Ding-you System in Political Struggle of Song Dynasty--Taking“Liding Hides Funeral” and“Shi Songzhi Qifu Accident” for Example%宋朝丁忧制度与政治斗争--以“李定匿丧”与史嵩之起复事件”为例

    Institute of Scientific and Technical Information of China (English)

    丁建军; 贾亚方

    2013-01-01

    Ding-you system is an important ancient Chinese ritual. Encountered lineal ascendant died, people kept in home mourning, and officials have to voluntarily apply for leave mourning for three years. But addicted to power and position, some officials would make a contrary of “filial piety” behavior, such as seeking Mourning or “Qifu”, even hide funeral. In the Song Dynasty, this lack of filial piety acts not only would have been criticized by public opinion, it would also been criticized by rivals, so that Ding-you system has become an weapon of party struggles. In the incident of Li Ding hide mourning and Shi Songzhi seeking Qifu, this phenomenon becomes most outstanding.%丁忧制度是中国古代一项重要的礼制,即遇到直系尊亲逝世时,人们要居家守丧,官员更是要主动申请离职守丧三年。但因为贪恋权位,一些官员便做出有悖“孝道”的行为,即营求夺情或起复,甚至匿丧。在宋朝,官员的这种不孝行为不仅会遭到社会舆论的抨击,更会成为反对派攻击的把柄,从而使丁忧制度成为宋朝党争的利器,这在李定匿丧和史嵩之营求起复事件中表现得最为突出。

  12. Hiding Two Binary Images in Grayscale BMP Image via Five Modulus Method

    Directory of Open Access Journals (Sweden)

    Firas A. Jassim

    2014-05-01

    Full Text Available The aim of this study is to hide two binary BMP images in a single BMP grayscale image. The widespread technique in image steganography is to hide one image (stego image into another (cover image. The proposed novel method is to hide two binary images into one grayscale bitmap cover image. First of all, the proposed technique starts with transforming all grayscale cover image pixels into multiples of five using Five Modulus Method (FMM. Clearly, any modulus of five is either 0, 1, 2, 3, or 4. The transformed FMM cover image could be treated as a good host for carrying data. Obviously, it is known that the pixel value for the binary image is either 0 or 1. Therefore, by concatenating the two binary images, the composite results are 00, 01, 10 and 11. In fact, these concatenated values could be mapped using simple mapping that assigns a positive integer value such as 1 for 00, 2 for 01, 3 for 10 and 4 for 11. Consequently, a new matrix will be constructed that contains a number varying from 1 to 4 only. Fortunately, the four integer values are the same as the previously mentioned reminders of division by 5, hence, adding these four integers to the transformed FMM cover image. On the recipient side, a reverse process will be implemented to extract the two binary images. In terms of PSNR values, the cover image and the two extracted stego images have acceptable PSNR values, which yields that the proposed method is very efficient in information hiding.

  13. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    Directory of Open Access Journals (Sweden)

    H. Yang

    2009-12-01

    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  14. Turbine Blade Image Processing System

    Science.gov (United States)

    Page, Neal S.; Snyder, Wesley E.; Rajala, Sarah A.

    1983-10-01

    A vision system has been developed at North Carolina State University to identify the orientation and three dimensional location of steam turbine blades that are stacked in an industrial A-frame cart. The system uses a controlled light source for structured illumination and a single camera to extract the information required by the image processing software to calculate the position and orientation of a turbine blade in real time.

  15. Handbook of signal processing systems

    CERN Document Server

    Bhattacharyya, Shuvra S; Leupers, Rainer; Takala, Jarmo

    2010-01-01

    The Handbook is organized in four parts. The first part motivates representative applications that drive and apply state-of-the art methods for design and implementation of signal processing systems; the second part discusses architectures for implementing these applications; the third part focuses on compilers and simulation tools; and the fourth part describes models of computation and their associated design tools and methodologies.

  16. VLSI mixed signal processing system

    Science.gov (United States)

    Alvarez, A.; Premkumar, A. B.

    1993-01-01

    An economical and efficient VLSI implementation of a mixed signal processing system (MSP) is presented in this paper. The MSP concept is investigated and the functional blocks of the proposed MSP are described. The requirements of each of the blocks are discussed in detail. A sample application using active acoustic cancellation technique is described to demonstrate the power of the MSP approach.

  17. Capacity bounds and constructions for reversible data-hiding

    Science.gov (United States)

    Kalker, Ton; Willems, Frans M. J.

    2003-06-01

    An undesirable side effect of many watermarking and data-hiding schemes is that the host signal into which auxiliary data is embedded is distorted. Finding an optimal balance between the amount of information embedded and the induced distortion is therefore an active field of research. In recent years, with the rediscovery of Costa's seminal paper Writing on Dirty Paper, there has been considerable progress in understanding the fundamental limits of the capacity versus distortion of watermarking and data-hiding schemes. For some applications, however, no distortion resulting from auxiliary data, however small, is allowed. In these cases the use of reversible data-hiding methods provide a way out. A reversible data-hiding scheme is defined as a scheme that allows complete and blind restoration (i.e. without additional signaling) of the original host data. Practical reversible data-hiding schemes have been proposed by Fridrich et al., but little attention has been paid to the theoretical limits. Some first results on the capacity of reversible watermarking schemes have been derived. The reversible schemes considered in most previous papers have a highly fragile nature: in those schemes, changing a single bit in the watermarked data would prohibit recovery of both the original host signal as well as the embedded auxiliary data. It is the purpose of this paper to repair this situation and to provide some first results on the limits of robust reversible data-hiding. Admittedly, the examples provided in this paper are toy examples, but they are indicative of more practical schemes that will be presented in subsequent papers.

  18. Selective adsorption of tannins onto hide collagen fibres

    Institute of Scientific and Technical Information of China (English)

    LIAO; Xuepin(廖学品); LU; Zhongbing(陆忠兵); SHI; Bi(石碧)

    2003-01-01

    Hide collagen of animals is used to prepare adsorbent material and its adsorption properties to tannins are investigated. It is indicated that the collagen fibres has excellent adsorption selectivity and high adsorption capacity to tannins. The adsorption rate of tannins is more than 90% whilst less than 10% of functional components are retained by the adsorbent. The adsorption mechanism of tannins onto hide collagen fibres is hydrogen-bonding association. Freundlich model can be used to describe the adsorption isotherms, and the pseudo-second-order rate model can be used to describe adsorption kinetics.

  19. Forward Osmosis System And Process

    KAUST Repository

    Duan, Jintang

    2013-08-22

    A forward osmosis fluid purification system includes a cross-flow membrane module with a membrane, a channel on each side of the membrane which allows a feed solution and a draw solution to flow through separately, a feed side, a draw side including a draw solute, where the draw solute includes an aryl sulfonate salt. The system can be used in a process to extract water from impure water, such as wastewater or seawater. The purified water can be applied to arid land.

  20. Condensation Processes in Geothermal Systems

    Science.gov (United States)

    Norman, D. I.; Moore, J. N.

    2005-12-01

    We model condensation processes in geothermal systems to understand how this process changes fluid chemistry. We assume two processes operate in geothermal systems: 1) condensation of a vapor phase derived by boiling an aqueous geothermal fluid into a cool near surface water and 2) condensation of a magmatic vapor by a deep circulating meteoric thermal fluid. It is assumed that the condensation process has two stages. Initially the condensing fluid is under saturated in gaseous species. Condensation of the vapor phase continues until the pressure on the fluid equals the sum of the partial pressures of water and the dissolved gaseous species. At that time bubbles flux through the condensing fluid. In time the fluid and fluxing gas phase come to equilibrium. Calculation shows that during the second stage of the condensation process the liquid phase becomes enriched in more soluble gaseous species like CO2 and H2S, and depleted in less soluble species like CH4 and N2. Stage 2 condensation processes can therefore be monitored by ratios of more and less condensable species like CO2/N2. Condensation of vapor released by boiling geothermal fluids results in liquids with high concentrations of H2S and CO2 like is seen in geothermal system steam-heated waters. Condensation of a magmatic vapor into circulating meteoric water has been proposed, but not well demonstrated. We compare to our models the Cerro Prieto, Mexico gas analysis data set collected over twelve years time by USGS personnel. It was assumed for modeling that the Cerro Prieto geothermal fluids are circulating meteoritic fluids with N2/Ar ratios about 40 to which is added a magmatic vapor with N2/Ar ratio = 400. The Cerro Prieto analyses show a strong correlation between N2/Ar and CO2/N2 as predicted by calculation. Two dimensional image plots of well N2/Ar + CO2/N2 show a bull's-eye pattern on the geothermal field. Image plots of analyses collected over a year or less time show N2/Ar and CO2/N2 hot spots

  1. Fundamentals of process intensification: A process systems engineering view

    DEFF Research Database (Denmark)

    Babi, Deenesh Kavi; Sales Cruz, Alfonso Mauricio; Gani, Rafiqul

    2016-01-01

    This chapter gives an overview of the fundamentals of process intensification from a process systems engineering point of view. The concept of process intensification, including process integration, is explained together with the drivers for applying process intensification, which can be achieved...... intensification using a systems approach....

  2. XCPU2 process management system

    Energy Technology Data Exchange (ETDEWEB)

    Ionkov, Latchesar [Los Alamos National Laboratory; Van Hensbergen, Eric [IBM AUSTIN RESEARCH LAB

    2009-01-01

    Xcpu2 is a new process management system that allows the users to specify custom file system for a running job. Most cluster management systems enforce single software distribution running on all nodes. Xcpu2 allows programs running on the cluster to work in environment identical to the user's desktop, using the same versions of the libraries and tools the user installed locally, and accessing the configuration file in the same places they are located on the desktop. Xcpu2 builds on our earlier work with the Xcpu system. Like Xcpu, Xcpu2's process management interface is represented as a set of files exported by a 9P file server. It supports heterogeneous clusters and multiple head nodes. Unlike Xcpu, it uses pull instead of push model. In this paper we describe the Xcpu2 clustering model, its operation and how the per-job filesystem configuration can be used to solve some of the common problems when running a cluster.

  3. NDMAS System and Process Description

    Energy Technology Data Exchange (ETDEWEB)

    Larry Hull

    2012-10-01

    Experimental data generated by the Very High Temperature Reactor Program need to be more available to users in the form of data tables on Web pages that can be downloaded to Excel or in delimited text formats that can be used directly for input to analysis and simulation codes, statistical packages, and graphics software. One solution that can provide current and future researchers with direct access to the data they need, while complying with records management requirements, is the Nuclear Data Management and Analysis System (NDMAS). This report describes the NDMAS system and its components, defines roles and responsibilities, describes the functions the system performs, describes the internal processes the NDMAS team uses to carry out the mission, and describes the hardware and software used to meet Very High Temperature Reactor Program needs.

  4. 9 CFR 95.6 - Untanned hides and skins; importations permitted subject to restrictions.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Untanned hides and skins; importations... ENTRY INTO THE UNITED STATES § 95.6 Untanned hides and skins; importations permitted subject to restrictions. Hides or skins offered for importation which do not meet the conditions or requirements of §...

  5. 9 CFR 95.5 - Untanned hides and skins; requirements for unrestricted entry.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Untanned hides and skins; requirements... ENTRY INTO THE UNITED STATES § 95.5 Untanned hides and skins; requirements for unrestricted entry. Untanned hides and/or skins of cattle, buffalo, sheep, goats, other ruminants, and swine which do not...

  6. The physical properties, morphology and viscoelasticity of biobased sponges prepared from un-tanned hides

    Science.gov (United States)

    One of our research endeavors to address ongoing challenges faced by the U.S. hide and leather industries is to develop innovative uses and novel biobased products from hides to improve prospective markets and to secure a viable future for hides and leather industries. We had previously investigate...

  7. The prediction of leather mechanical properties from airborne ultrasonic testing of hides

    Science.gov (United States)

    High quality, clean, and well-preserved hides are paramount for competitiveness in both domestic and export markets. Currently, hides are visually inspected and ranked for quality and sale price, which is not reliable when hair is present on the hides. Advanced technologies are needed to nondestru...

  8. DCT Based Secret Image Hiding In Video Sequence

    Directory of Open Access Journals (Sweden)

    M. Suresh Kumar

    2014-08-01

    Full Text Available Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave. As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.

  9. Hide And Seek GPS And Geocaching In The Classroom

    Science.gov (United States)

    Lary, Lynn M.

    2004-01-01

    In short, geocaching is a high-tech, worldwide treasure hunt (geocaches can now be found in more than 180 countries) where a person hides a cache for others to find. Generally, the cache is some type of waterproof container that contains a log book and an assortment of goodies, such as lottery tickets, toys, photo books for cachers to fill with…

  10. Powdered hide model for vegetable tanning II. hydrolyzable tannin

    Science.gov (United States)

    Vegetable tannages employ both condensed and hydrolyzable tannins. As part of our exploration of tanning mechanisms, we reported last year on interactions of the condensed tannin, quebracho, with powdered hide. In this study, the interactions of chestnut extract, a hydrolyzable tannin, with powdere...

  11. Near Reversible Data Hiding Scheme for images using DCT

    Directory of Open Access Journals (Sweden)

    T. Bhaskar

    2015-11-01

    Full Text Available Certain level of modifications to the original content can be acceptable. These schemes are called nearreversible. It has emerging application in remote sensing. In remote sensing application the image is captured while monitoring the damaged regions in the natural disasters such as tsunami, volcanic eruption, etc. Instead of more alterations to the pixels or coefficients here we go for less alterations , low hiding capacity and complexity that exhibit while reversible data hiding. There exist a few near reversible hiding schemes which address the limitations to the triangular trade-off that exists between capacity, robustness and visual quality characteristics. However, for achieving better vision of image, there is a need for near reversible data hiding schemes. Therefore, the traditional metric PSNR are not sufficient to assess the distorted image when the data is embedded in image for assessing the better visual quality of the image with hidden data we present a HVS based metrics like PSNR-HVS, MSSIM. Using DCT evaluates the overall image quality

  12. PALM and STORM: what hides beyond the Rayleigh limit?

    CSIR Research Space (South Africa)

    Henriques, R

    2009-06-01

    Full Text Available -1 Biotechnol. J. 2009, 4, 846?857 Review PALM and STORM: What hides beyond the Rayleigh limit? Ricardo Henriques1 and Musa M. Mhlanga1,2 1 Gene Expression and Biophysics Unit, Instituto de Medicina Molecular, Faculdade de Medicina Universidade de...

  13. Quiz Games as a model for Information Hiding

    OpenAIRE

    Bank, Bernd; Heintz, Joos; Matera, Guillermo; Montana, Jose L.; Pardo, Luis M.; Paredes, Andres Rojas

    2015-01-01

    We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game. It allows in a uniform way to prove exponential lower bounds for several complexity problems of elimination theory.

  14. Frequent Itemset Hiding Algorithm Using Frequent Pattern Tree Approach

    Science.gov (United States)

    Alnatsheh, Rami

    2012-01-01

    A problem that has been the focus of much recent research in privacy preserving data-mining is the frequent itemset hiding (FIH) problem. Identifying itemsets that appear together frequently in customer transactions is a common task in association rule mining. Organizations that share data with business partners may consider some of the frequent…

  15. Frequent Itemset Hiding Algorithm Using Frequent Pattern Tree Approach

    Science.gov (United States)

    Alnatsheh, Rami

    2012-01-01

    A problem that has been the focus of much recent research in privacy preserving data-mining is the frequent itemset hiding (FIH) problem. Identifying itemsets that appear together frequently in customer transactions is a common task in association rule mining. Organizations that share data with business partners may consider some of the frequent…

  16. Understanding Process Performance Measurement Systems

    Directory of Open Access Journals (Sweden)

    Ljubica MilanoviÊ Glavan

    2011-01-01

    Full Text Available The purpose of this paper is to analyze the current state of Process Performance Measurement Systems (PPMS by means of a systematic review of literature. The PPMS literature is reviewed using a systematic approach. Based on an extensive literature review only twelve articles that contain the term PPMS in the title were found. The literature analysis showed that PPMS is a relatively new topic in the area of performance measurement. In order to understand PPMS, it was crucial to explain the concepts of business process management, business performance measurement and Performance Measurement System (PMS which are well known and used in the literature and practice. PPMS is a special type of PMS that should be used in process-oriented organizations. Limitations of this research lie in the fact that all the conclusions were derived only from the literature, not empirical research. The results presented in the paper continue towards providing an updated overview of the current state of performance measurement, especially PPMS in order to identify the existing research gaps on which ongoing and future research efforts regarding this topic can be focused.

  17. Dynamic security assessment processing system

    Science.gov (United States)

    Tang, Lei

    The architecture of dynamic security assessment processing system (DSAPS) is proposed to address online dynamic security assessment (DSA) with focus of the dissertation on low-probability, high-consequence events. DSAPS upgrades current online DSA functions and adds new functions to fit into the modern power grid. Trajectory sensitivity analysis is introduced and its applications in power system are reviewed. An index is presented to assess transient voltage dips quantitatively using trajectory sensitivities. Then the framework of anticipatory computing system (ACS) for cascading defense is presented as an important function of DSAPS. ACS addresses various security problems and the uncertainties in cascading outages. Corrective control design is automated to mitigate the system stress in cascading progressions. The corrective controls introduced in the dissertation include corrective security constrained optimal power flow, a two-stage load control for severe under-frequency conditions, and transient stability constrained optimal power flow for cascading outages. With state-of-the-art computing facilities to perform high-speed extended-term time-domain simulation and optimization for large-scale systems, DSAPS/ACS efficiently addresses online DSA for low-probability, high-consequence events, which are not addressed by today's industrial practice. Human interference is reduced in the computationally burdensome analysis.

  18. A systems process of reinforcement.

    Science.gov (United States)

    Sudakov, K V

    1997-01-01

    Functional systems theory was used to consider the process of reinforcement of the actions on the body of reinforcing factors, i.e., the results of behavior satisfying the body's original needs. The systems process of reinforcement includes reverse afferentation entering the CNS from receptors acted upon by various parameters of the desired results, and mechanisms for comparing reverse afferentation with the apparatus which accepts the results of the action and the corresponding emotional component. A tight interaction between reinforcement and the dominant motivation is generated on the basis of the hologram principle. Reinforcement forms an apparatus for predicting a desired result, i.e. a result-of-action acceptor. Reinforcement procedures significant changes in the activities of individual neurons in the various brain structures involved in dominant motivation, transforming their spike activity for a burst pattern to regular discharges; there are also molecular changes in neuron properties. After preliminary reinforcement, the corresponding motivation induces the ribosomal system of neurons to start synthesizing special effector molecules, which organize molecular engrams of the acceptor of the action's result. Sensory mechanisms of reinforcement are considered, with particular reference to the information role of emotions.

  19. [The systems process of reinforcement].

    Science.gov (United States)

    Sudakov, K V

    1996-01-01

    The process of reinforcement is considered in the context of the general theory of functional systems as an important part of behavioural act organization closely interacting with the dominant motivation. It is shown that reinforcement substantially changes the activities of separate neurons in different brain structures involved in dominant motivation. After a preliminary reinforcement under the influence of corresponding motivation the ribosomal apparatus of neurons begins to synthesize special molecular engrams of the action acceptor. The sensory mechanisms of reinforcement and, especially, the role of emotions are considered in details in the paper.

  20. The effect of media on knowledge hiding in entrepreneurial firms

    DEFF Research Database (Denmark)

    Labafi, Somayeh; Khajeheian, Datis; Williams, Idongesit

    2017-01-01

    in a qualitative study. Thematic analysis is used to analyze transcribed interview data from employees in a software company in Iran. The findings of the analysis show that media richness significantly impacts on organizational learning and influences on knowledge hiding behavior in employees. This article...... suggests that entrepreneurs and managers of small firms should provide employees’ access to rich media content as well as established organizational learning as part of their organizational culture........ For this reason, factors that influence on the tendency of employees to expose and use their knowledge would be appreciated by managers of organizations. This paper investigates the effect of the media on knowledge hiding in organizations. The investigation is done with the aid of a conceptual framework...

  1. A New Audio Steganography System Based on Auto-Key Generator

    Directory of Open Access Journals (Sweden)

    Inas Jawad Kadhim

    2012-01-01

    Full Text Available Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.In this paper, a new Least Significant Bit (LSB nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested system used self crypto-hiding pseudo random key generator. The auto-key generator has purposes to investigate the encryption and embedding processes .The hiding results shows no noise in the stego-wave file after embedding process, also no difference in size is found between the original wave audio file and stego-wave file.

  2. A NEW APPROACH FOR HIDING DATA USING B-BOX

    Directory of Open Access Journals (Sweden)

    Dr. Saad Abdual azize AL_ani

    2013-11-01

    Full Text Available Digital Images and video encryption play an important role in today’s multimedia world. Many encryption schemes have been proposed to provide a security for digital images. This paper designs an efficient cryptosystem for video. Our method can achieve two goals; the first goal is to design a height security for hiding a data in video, the second goal is to design a computational complexity cryptosystem.

  3. Process algebra for Hybrid systems

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2008-01-01

    We propose a process algebra obtained by extending a combination of the process algebra with continuous relative timing from Baeten and Middelburg [Process Algebra with Timing, Springer, Chap. 4, 2002] and the process algebra with propositional signals from Baeten and Bergstra [Theoretical Computer

  4. Process algebra for hybrid systems

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2005-01-01

    We propose a process algebra obtained by extending a combination of the process algebra with continuous relative timing from Baeten and Middelburg (Process Algebra with Timing, Springer,Berlin, 2002, Chapter 4), and the process algebra with propositional signals from Baeten and Bergstra(Theoret. Com

  5. Hide unhairing and characterization of commercial enzymes used in leather manufacture

    Directory of Open Access Journals (Sweden)

    A Dettmer

    2011-09-01

    Full Text Available The enzymatic treatment of hides in tannery processes is a promising technology. However, the reaction kinetics of commercial enzymes available to the leather industry are not fully understood and their activities have been mainly determined with model proteins such as casein as substrate, which are not of direct relevance for cattle hides. Therefore, it is important to determine their activities on collagen and keratin, the main proteins of skin, in order to use these enzymes in leather processing. This work describes the study of five proteases, used commercially in tanneries, to assess their ability to act upon collagen and keratin and to determine their unhairing. Results showed that all commercial enzymes tested had more activity on collagen than on keratin. Unhairing was also tested and four out of the five enzymes tested showed some unhairing activity. Optima of the temperature and pH of the enzymes were very similar for all five enzymes, with maximal activities around 55ºC and pH 9 to 12, respectively.

  6. Unitary embedding for data hiding with the SVD

    Science.gov (United States)

    Bergman, Clifford; Davidson, Jennifer

    2005-03-01

    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  7. Steganographic Techniques of Data Hiding Using Digital Images (Review Paper

    Directory of Open Access Journals (Sweden)

    Babloo Saha

    2012-01-01

    Full Text Available Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography’s goal is to hide the very existence of embedded data so as not to arouse an eavesdropper’s suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance. applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains. It covers and integrates recent research work without going in to much detail of steganalysis, which is the art and science of defeating steganography.Defence Science Journal, 2012, 62(1, pp.11-18, DOI:http://dx.doi.org/10.14429/dsj.62.1436

  8. Data Hiding Techniques Using Prime and Natural Numbers

    CERN Document Server

    Dey, Sandipan; Bandyopadhyay, Bijoy; Sanyal, Sugata

    2010-01-01

    In this paper, a few novel data hiding techniques are proposed. These techniques are improvements over the classical LSB data hiding technique and the Fibonacci LSB data-hiding technique proposed by Battisti et al. \\cite{r1}. The classical LSB technique is the simplest, but using this technique it is possible to embed only in first few bit-planes, since image quality becomes drastically distorted when embedding in higher bit-planes. Battisti et al. \\cite{r1} proposed an improvement over this by using Fibonacci decomposition technique and generating a different set of virtual bit-planes all together, thereby increasing the number of bit-planes. In this paper, first we mathematically model and generalize this particular approach of virtual bit-plane generation. Then we propose two novel embedding techniques, both of which are special-cases of our generalized model. The first embedding scheme is based on decomposition of a number (pixel-value) in sum of prime numbers, while the second one is based on decompositi...

  9. Crisis in Amplitude Control Hides in Multistability

    Science.gov (United States)

    Li, Chunbiao; Sprott, Julien Clinton; Xing, Hongyan

    2016-12-01

    A crisis of amplitude control can occur when a system is multistable. This paper proposes a new chaotic system with a line of equilibria to demonstrate the threat to amplitude control from multistability. The new symmetric system has two coefficients for amplitude control, one of which is a partial amplitude controller, while the other is a total amplitude controller that simultaneously controls the frequency. The amplitude parameter rescales the basins of attraction and triggers a state switch among different states resulting in a failure of amplitude control to the desired state.

  10. Soliciting Performance, Hiding Bias: Whiteness and Librarianship

    Directory of Open Access Journals (Sweden)

    Angela Galvan

    2015-06-01

    Full Text Available Despite the growing body of research on our professional demographics and multi-year diversity initiatives, librarianship in the United States remains overwhelmingly white. I suggest the interview process is a series of repetitive gestures designed to mimic and reinforce white middle class values, which ultimately influence the hiring decisions—and relative lack of diversity—of librarianship as a whole. I consider how the whiteness of librarianship may manifest long before the hiring process. By identifying and interrogating the body of white, middle class values inherent to both librarianship and professional job searching, I offer suggestions to encourage an authentically diverse pool of applicants.

  11. A GAO hiding among the PAO

    DEFF Research Database (Denmark)

    McIlroy, Simon Jon; Albertsen, Mads; Stokholm-Bjerregaard, Mikkel

    Enhanced biological phosphorus removal (EBPR) is widely used to remove phosphorus from wastewater. The process relies on polyphosphate accumulating organisms (PAOs) that are able to take up phosphorus in excess of what is needed for growth, whereby phosphorus can be removed from the wastewater...

  12. Image Hiding Technology Based on DCT and Chaos%基于DCT和混沌的图像隐藏技术①

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

      提出一种基于 DCT 和混沌的图像隐藏算法。首先利用混沌系统产生混沌序列对秘密图像进行加密,然后利用DCT变换与混沌序列把秘密图像隐藏到载体图像中。实验结果表明,该算法具有良好的安全性和隐藏效果。%An improved image hiding technology based on DCT and chaos is presented. We use chaotic system to generate one chaotic sequence which is utilized to encrypt the secret image, and then we use DCT and chaotic sequence to realize the secret image hiding in the host image. Simulation results show that the algorithm has good security and hiding effect.

  13. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

    Directory of Open Access Journals (Sweden)

    Keita Emura

    2014-01-01

    Full Text Available If there are many displaced workers in a company, then a person who goes for job hunting might not select this company. That is, the number of members who quit is quite negative information. Similarly, in revocable group signature schemes, if one knows (or guesses the number of revoked users (say r, then one may guess the reason behind such circumstances, and it may lead to harmful rumors. However, no previous revocation procedure can achieve hiding r. In this paper, we propose the first revocable group signature scheme, where r is kept hidden, which we call r-hiding revocable group signature. To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.

  14. A one-time pad encryption method combining full-phase image encryption and hiding

    Science.gov (United States)

    Li, Jiaosheng; Xiong, Jiaxiang; Zhang, Qinnan; Zhong, Liyun; Zhou, Yunfei; Li, Jun; Lu, Xiaoxu

    2017-08-01

    A one-time pad encryption method combining full-phase image encryption and hiding is proposed. Firstly, original images are encoded in the phase and encrypted by phase keys loaded on the phase-only liquid crystal spatial light modulator, where the phase keys can be distributed using a quantum key distribution method. Subsequently, a host image is introduced to produce a reference wave, and overlap with an object wave to form an interferogram. Finally, based on phase-shifting interferometry, we can achieve the above encrypted image hiding. Both the simulation and experiment research demonstrate the feasibility of the proposed method, meanwhile the key and the encrypted image can be changed randomly, so the proposed system reveals the high flexibility, anti-attack ability and can be used to implement the one-time pad to achieve absolute secure transmission with the quantum key distribution method. Moreover, system security will be improved due to the fact that encryption information hidden in the host image can be treated as background noise, which does not attract the attention of the attacker.

  15. Soliciting Performance, Hiding Bias: Whiteness and Librarianship

    Directory of Open Access Journals (Sweden)

    Angela Galvan

    2015-06-01

    Full Text Available Image by Flickr user tweng (CC BY-SA 2.0 In Brief: Despite the growing body of research on our professional demographics and multi-year diversity initiatives, librarianship in the United States remains overwhelmingly white. I suggest the interview process is a series of repetitive gestures designed to mimic and reinforce white middle class values, which ultimately influence […

  16. Hiding Data in VoIP

    Science.gov (United States)

    2008-12-01

    Lecture Notes in Computer Science 3856, pp. 147-166...Multi-Agent Systems. In: R. Meersman and Z. Tari (Eds.): OTM 2008, Part II – Lecture Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin... Notes in Computer Science (LNCS) 5332, Springer-Verlag Berlin Heidelberg, Proc. of OnTheMove Federated Conferences and Workshops: The

  17. Applications of text processing using natural processing system in Printer

    Science.gov (United States)

    Saito, Tadashi

    DAI NIPPON PRINTING CO., Ltd. developed a natural language processing system for the automatic indexing and assorting readable kana characters to kanji characters, which is called ruby. This system based on the automatic indexing system called INDEXER produced by NTT Communications and Information Processing Laboratories and NTT Data Communications Co., Ltd. This paper describes some applications using the system. This system creates kana characters for kanji characters which is useful for address books, name lists and books. Further we apply this system for an automatic indexing on CD-ROM.

  18. NASA System Engineering Design Process

    Science.gov (United States)

    Roman, Jose

    2011-01-01

    This slide presentation reviews NASA's use of systems engineering for the complete life cycle of a project. Systems engineering is a methodical, disciplined approach for the design, realization, technical management, operations, and retirement of a system. Each phase of a NASA project is terminated with a Key decision point (KDP), which is supported by major reviews.

  19. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    Science.gov (United States)

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  20. Secure Reversible Data Hiding in Encrypted Images by Allocating Memory before Encryption via Security keys

    Directory of Open Access Journals (Sweden)

    Priya Jambhulkar

    2015-11-01

    Full Text Available Digital image and information embedding system have number of important multimedia applications. Recently, attention is paid to reversible data hiding (RDH in encrypted images is more, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content’s confidentiality. RDH is a technique used to hide data inside image for high security in such a way that original data is not visible. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose another method in which we simply encrypt an image without its header by using our own algorithm. And thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.

  1. Temporal cloak with large fractional hiding window at telecommunication data rate

    Science.gov (United States)

    Zhou, Feng; Dong, Jianji; Yan, Siqi; Yang, Ting

    2017-04-01

    We design and experimentally investigate a temporal cloak scheme using ultrashort pulse compression and time-domain Fraunhofer diffraction. An input continuous-wave probe beam is compressed to ultrashort pulse train based on self-phase modulation effect and chirp compensation using single mode fiber. Accordingly, wide temporal gaps appear to act as the cloaking windows. The train of ultrashort pulses can be converted to continuous wave after experiencing enough dispersion, indicating that the temporal gaps are closed. Thus, any time events will be hidden in the temporal gaps from observers. In our study, we demonstrated a temporal cloak system, which is able to hide 88% of the whole time period and cloak pseudorandom digital data at a bitrate of 10 Gbit/s. The relationships of cloaking window fraction versus pump power and the condition of cloaking off are also investigated. These results present a new feasible way towards obtaining a high-fractional cloaking window at telecommunication data rate and hiding real-world messages.

  2. Change Mining in Adaptive Process Management Systems

    NARCIS (Netherlands)

    Günther, Christian W.; Rinderle, S.B.; Reichert, M.U.; van der Aalst, Wil

    2006-01-01

    The wide-spread adoption of process-aware information systems has resulted in a bulk of computerized information about real-world processes. This data can be utilized for process performance analysis as well as for process improvement. In this context process mining offers promising perspectives. So

  3. Cryptic cuckoo eggs hide from competing cuckoos.

    Science.gov (United States)

    Gloag, Ros; Keller, Laurie-Anne; Langmore, Naomi E

    2014-10-07

    Interspecific arms races between cuckoos and their hosts have produced remarkable examples of mimicry, with parasite eggs evolving to match host egg appearance and so evade removal by hosts. Certain bronze-cuckoo species, however, lay eggs that are cryptic rather than mimetic. These eggs are coated in a low luminance pigment that camouflages them within the dark interiors of hosts' nests. We investigated whether cuckoo egg crypsis is likely to have arisen from the same coevolutionary processes known to favour egg mimicry. We added high and low luminance-painted eggs to the nests of large-billed gerygones (Gerygone magnirostris), a host of the little bronze-cuckoo (Chalcites minutillus). Gerygones rarely rejected either egg type, and did not reject natural cuckoo eggs. Cuckoos, by contrast, regularly removed an egg from clutches before laying their own and were five times more likely to remove a high luminance model than its low luminance counterpart. Given that we found one-third of all parasitized nests were exploited by multiple cuckoos, our results suggest that competition between cuckoos has been the key selective agent for egg crypsis. In such intraspecific arms races, crypsis may be favoured over mimicry because it can reduce the risk of egg removal to levels below chance.

  4. Hiding message into DNA sequence through DNA coding and chaotic maps.

    Science.gov (United States)

    Liu, Guoyan; Liu, Hongjun; Kadir, Abdurahman

    2014-09-01

    The paper proposes an improved reversible substitution method to hide data into deoxyribonucleic acid (DNA) sequence, and four measures have been taken to enhance the robustness and enlarge the hiding capacity, such as encode the secret message by DNA coding, encrypt it by pseudo-random sequence, generate the relative hiding locations by piecewise linear chaotic map, and embed the encoded and encrypted message into a randomly selected DNA sequence using the complementary rule. The key space and the hiding capacity are analyzed. Experimental results indicate that the proposed method has a better performance compared with the competing methods with respect to robustness and capacity.

  5. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Directory of Open Access Journals (Sweden)

    Sha Edwin Hsing-Mean

    2002-01-01

    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  6. A New Images Hiding Scheme Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    LIU Nian-sheng; GUO Dong-hui; WU Bo-xi; Parr G

    2005-01-01

    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of covert image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).

  7. Text Hiding Based on True Color Image Classification

    OpenAIRE

    Shahd Abdul-Rhman Hasso

    2012-01-01

    In this work a new approach was built to apply k-means algorithm on true colored images (24bit images) which are usually treated by researchers as three image (RGB) that are classified to 15 class maximum only. We find the true image as 24 bit and classify it to more than 15 classes. As we know k-means algorithm classify images to many independent classes or features and we could increase the class number therefore we could hide information in the classes or features that have minimum number ...

  8. Approaches to Computer Modeling of Phosphate Hide-Out.

    Science.gov (United States)

    1984-06-28

    phosphate acts as a buffer to keep pH at a value above which acid corrosion occurs . and below which caustic corrosion becomes significant. Difficulties are...ionization of dihydrogen phosphate : HIPO - + + 1PO, K (B-7) H+ + - £Iao 1/1, (B-8) H , PO4 - + O- - H0 4 + H20 K/Kw (0-9) 19 * Such zero heat...OF STANDARDS-1963-A +. .0 0 0 9t~ - 4 NRL Memorandum Report 5361 4 Approaches to Computer Modeling of Phosphate Hide-Out K. A. S. HARDY AND J. C

  9. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  10. Process automatization in system administration

    OpenAIRE

    Petauer, Janja

    2013-01-01

    The aim of the thesis is to present automatization of user management in company Studio Moderna. The company has grown exponentially in recent years, that is why we needed to find faster, easier and cheaper way of man- aging user accounts. We automatized processes of creating, changing and removing user accounts within Active Directory. We prepared user interface inside of existing application, used Java Script for drop down menus, wrote script in scripting programming langu...

  11. Vision Systems Illuminate Industrial Processes

    Science.gov (United States)

    2013-01-01

    When NASA designs a spacecraft to undertake a new mission, innovation does not stop after the design phase. In many cases, these spacecraft are firsts of their kind, requiring not only remarkable imagination and expertise in their conception but new technologies and methods for their manufacture. In the realm of manufacturing, NASA has from necessity worked on the cutting-edge, seeking new techniques and materials for creating unprecedented structures, as well as capabilities for reducing the cost and increasing the efficiency of existing manufacturing technologies. From friction stir welding enhancements (Spinoff 2009) to thermoset composites (Spinoff 2011), NASA s innovations in manufacturing have often transferred to the public in ways that enable the expansion of the Nation s industrial productivity. NASA has long pursued ways of improving upon and ensuring quality results from manufacturing processes ranging from arc welding to thermal coating applications. But many of these processes generate blinding light (hence the need for special eyewear during welding) that obscures the process while it is happening, making it difficult to monitor and evaluate. In the 1980s, NASA partnered with a company to develop technology to address this issue. Today, that collaboration has spawned multiple commercial products that not only support effective manufacturing for private industry but also may support NASA in the use of an exciting, rapidly growing field of manufacturing ideal for long-duration space missions.

  12. Applied signal processing concepts, circuits, and systems

    CERN Document Server

    Hamdy, Nadder

    2008-01-01

    Introduction What are Signals? Signal parameters Why Signal processing? Analog vs. Digital Signal processing Practical Signal processing Systems Analog Signal Processing Amplitude Shaping Frequency Spectrum Shaping Phase Errors Correction Waveform Generation Analog Filter Design Describing Equations Design Procedures Filter Specifications Approximations to the Ideal Response Realization Practical RC-Filters Design Switched Capacitor Filter Realization Design examples Data Converters Introduction A typical DSP System Specifications of Data Converters Sampling Samp

  13. Peruvian Weapon System Acquisition Process

    Science.gov (United States)

    1990-12-01

    for comparable weaponry, one dear advantage the Soviet Union offers a Third World client is the speed with which it can fill an arms order. This... client states. Finally and possibly more importantly, arms trading allows the Soviets to have access to strategic regions. There are indications that...include system development, implemetation and start up costo . Some may occur during the opetting life cycle. Normally, nonrecurring costs include

  14. Software Defined Common Processing System (SDCPS) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Coherent Logix, Incorporated (CLX) proposes the development of a Software Defined Common Processing System (SDCPS) that leverages the inherent advantages of an...

  15. Software Defined Common Processing System (SDCPS) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Coherent Logix, Incorporated proposes the Software Defined Common Processing System (SDCPS) program to facilitate the development of a Software Defined Radio...

  16. Data Security by Preprocessing the Text with Secret Hiding

    Directory of Open Access Journals (Sweden)

    Ajit Singh

    2012-06-01

    Full Text Available With the advent of the Internet, an open forum, the massive increase in the data travel across networkmake an issue for secure transmission. Cryptography is the term that involves many encryption method to make data secure. But the transmission of the secure data is an intricate task. Steganography here comes with effect of transmission without revealing the secure data. The research paper provide the mechanism which enhance the security of data by using a crypto+stegano combination to increase the security level without knowing the fact that some secret data is sharing across networks. In the firstphase data is encrypted by manipulating the text using the ASCII codes and some random generated strings for the codes by taking some parameters. Steganography related to cryptography forms the basisfor many data hiding techniques. The data is encrypted using a proposed approach and then hide the message in random N images with the help of perfect hashing scheme which increase the security of the message before sending across the medium. Thus the sending and receiving of message will be safe and secure with an increased confidentiality.

  17. A Study of Various Steganographic Techniques Used for Information Hiding

    Directory of Open Access Journals (Sweden)

    C.P.Sumathi

    2013-12-01

    Full Text Available The art of information hiding has received much att ention in the recent years as security of informati on has become a big concern in this internet era. As shari ng of sensitive information via a common communicat ion channel has become inevitable, Steganography – the art and science of hiding information has gained much attention. We are also surrounded by a world of secret communi cation, where people of all types are transmitting information as innocent as an encrypte d credit card number to an online-store and as insidious as a terrorist plot to hijackers. Stegano graphy derives from the Greek word steganos, meanin g covered or secret, and graphy (writing or drawing [1]. Steganography is a technology where modern da ta compression, information theory, spread spectrum, a nd cryptography technologies are brought together t o satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various tec hniques used in steganography and to identify areas in which thi s technique can be applied, so that the human race can be benefited at large

  18. Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography

    CERN Document Server

    Ganesh, Vijay; Rinard, Martin

    2012-01-01

    We propose a novel approach to improving software security called Cryptographic Path Hardening, which is aimed at hiding security vulnerabilities in software from attackers through the use of provably secure and obfuscated cryptographic devices to harden paths in programs. By "harden" we mean that certain error-checking if-conditionals in a given program P are replaced by equivalent" we mean that adversaries cannot use semi-automatic program analysis techniques to reason about the hardened program paths and thus cannot discover as-yet-unknown errors along those paths, except perhaps through black-box dictionary attacks or random testing (which we can never prevent). Other than these unpreventable attack methods, we can make program analysis aimed at error-finding "provably hard" for a resource-bounded attacker, in the same sense that cryptographic schemes are hard to break. Unlike security-through-obscurity, in Cryptographic Path Hardening we use provably-secure crypto devices to hide errors and our mathemati...

  19. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  20. Integrated Monitoring System of Production Processes

    Directory of Open Access Journals (Sweden)

    Oborski Przemysław

    2016-12-01

    Full Text Available Integrated monitoring system for discrete manufacturing processes is presented in the paper. The multilayer hardware and software reference model was developed. Original research are an answer for industry needs of the integration of information flow in production process. Reference model corresponds with proposed data model based on multilayer data tree allowing to describe orders, products, processes and save monitoring data. Elaborated models were implemented in the integrated monitoring system demonstrator developed in the project. It was built on the base of multiagent technology to assure high flexibility and openness on applying intelligent algorithms for data processing. Currently on the base of achieved experience an application integrated monitoring system for real production system is developed. In the article the main problems of monitoring integration are presented, including specificity of discrete production, data processing and future application of Cyber-Physical-Systems. Development of manufacturing systems is based more and more on taking an advantage of applying intelligent solutions into machine and production process control and monitoring. Connection of technical systems, machine tools and manufacturing processes monitoring with advanced information processing seems to be one of the most important areas of near future development. It will play important role in efficient operation and competitiveness of the whole production system. It is also important area of applying in the future Cyber-Physical-Systems that can radically improve functionally of monitoring systems and reduce the cost of its implementation.

  1. Weak Markov Processes as Linear Systems

    CERN Document Server

    Gohm, Rolf

    2012-01-01

    A noncommutative Fornasini-Marchesini system (a multi-variable version of a linear system) can be realized within a weak Markov process (a model for quantum evolution). For a discrete time parameter this is worked out systematically as a theory of representations of structure maps of a system by a weak process. We introduce subprocesses and quotient processes which can be described naturally by a suitable category of weak processes. A corresponding notion of cascade for processes induces a represented cascade of systems. We study the control theoretic notion of observability which turns out to be particularly interesting in connection with a cascade structure. As an application we gain new insights into stationary Markov chains where observability for the system is closely related to asymptotic completeness in the scattering theory of the chain. This motivates a general definition of asymptotic completeness in the category of weak processes.

  2. Improving Process Heating System Performance v3

    Energy Technology Data Exchange (ETDEWEB)

    None

    2016-04-11

    Improving Process Heating System Performance: A Sourcebook for Industry is a development of the U.S. Department of Energy (DOE) Advanced Manufacturing Office (AMO) and the Industrial Heating Equipment Association (IHEA). The AMO and IHEA undertook this project as part of an series of sourcebook publications developed by AMO on energy-consuming industrial systems, and opportunities to improve performance. Other topics in this series include compressed air systems, pumping systems, fan systems, steam systems, and motors and drives

  3. 9 CFR 95.24 - Methods for disinfection of hides, skins, and other materials.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Methods for disinfection of hides... ENTRY INTO THE UNITED STATES § 95.24 Methods for disinfection of hides, skins, and other materials... subjected to disinfection by methods found satisfactory and approved from time to time by the Deputy...

  4. A method for removing adobe-type manure from hides using an oxidizing agent

    Science.gov (United States)

    Adobe-type (hardened) manure attached to bovine hair is a major source of meat contamination, hide quality deterioration, and devalued leather products. Therefore, it is important to develop cleaning solutions that can rapidly remove adobe-type manure to improve the quality of hides delivered to tan...

  5. Tactical deception to hide sexual behaviour : macaques use distance, not visibility

    NARCIS (Netherlands)

    Overduin-de Vries, A. M.; Spruijt, B. M.; de Vries, H.; Sterck, E. H. M.

    2015-01-01

    Although tactical deception (TD) may be employed to hide sexual behaviour, there is as yet no firm evidence for it. Hiding may be guided by cognitive mechanisms consistent with either no, low or high level TD, such as exploiting male peripheral positions (no TD), creating distance (TD level 1) or hi

  6. A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement

    Directory of Open Access Journals (Sweden)

    Khushboo Lapa Patwari

    2016-09-01

    Full Text Available In present world demand of high quality images, security of the information on internet is one of the most important issues of research. Data hiding is a method of hiding a useful information by embedding it on another image (cover image to provide security and only the authorize person is able to extract the original information from the embedding data. This paper is a review which describes several different algorithms for Reversible Data Hiding (RDH. Previous literature has shown that histogram modification, histogram equalization (HE and interpolation are the most common methods for data hiding. To improve security these methods are used in encrypted images. This paper is a comprehensive study of all the major reversible data hiding approaches implemented as found in the literature.

  7. Launch processing system concept to reality

    Science.gov (United States)

    Bailey, W. W.

    1985-01-01

    The Launch Processing System represents Kennedy Space Center's role in providing a major integrated hardware and software system for the test, checkout and launch of a new space vehicle. Past programs considered the active flight vehicle to ground interfaces as part of the flight systems and therefore the related ground system was provided by the Development Center. The major steps taken to transform the Launch Processing System from a concept to reality with the successful launches of the Shuttle Programs Space Transportation System are addressed.

  8. Sticky continuous processes have consistent price systems

    DEFF Research Database (Denmark)

    Bender, Christian; Pakkanen, Mikko; Sayit, Hasanjan

    Under proportional transaction costs, a price process is said to have a consistent price system, if there is a semimartingale with an equivalent martingale measure that evolves within the bid-ask spread. We show that a continuous, multi-asset price process has a consistent price system, under arb...

  9. Low-cost LANDSAT processing system

    Science.gov (United States)

    Faust, N. L.; Hooper, N. J.; Spann, G. W.

    1980-01-01

    LANDSAT analysis system is assembled from commercially available components at relatively low cost. Small-scale system is put together for price affordable for state agencies and universities. It processes LANDSAT data for subscene areas on repetitive basis. Amount of time required for processing decreases linearly with number of classifications desired. Computer programs written in FORTRAN IV are available for analyzing data.

  10. Gaussian process based recursive system identification

    Science.gov (United States)

    Prüher, Jakub; Šimandl, Miroslav

    2014-12-01

    This paper is concerned with the problem of recursive system identification using nonparametric Gaussian process model. Non-linear stochastic system in consideration is affine in control and given in the input-output form. The use of recursive Gaussian process algorithm for non-linear system identification is proposed to alleviate the computational burden of full Gaussian process. The problem of an online hyper-parameter estimation is handled using proposed ad-hoc procedure. The approach to system identification using recursive Gaussian process is compared with full Gaussian process in terms of model error and uncertainty as well as computational demands. Using Monte Carlo simulations it is shown, that the use of recursive Gaussian process with an ad-hoc learning procedure offers converging estimates of hyper-parameters and constant computational demands.

  11. HIDES spectroscopy of bright detached eclipsing binaries from the $Kepler$ field - I. Single-lined objects

    CERN Document Server

    Hełminiak, K G; Kambe, E; Kozłowski, S K; Sybilski, P; Ratajczak, M; Maehara, H; Konacki, M

    2016-01-01

    We present results of our spectroscopic observations of nine detached eclipsing binaries (DEBs), selected from the $Kepler$ Eclipsing Binary Catalog, that only show one set of spectral lines. Radial velocities (RVs) were calculated from the high resolution spectra obtained with the HIDES instrument, attached to the 1.88-m telescope at the Okayama Astrophysical Observatory, and from the public APOGEE archive. In our sample we found five single-lined binaries, with one component dominating the spectrum. The orbital and light curve solutions were found for four of them, and compared with isochrones, in order to estimate absolute physical parameters and evolutionary status of the components. For the fifth case we only update the orbital parameters, and estimate the properties of the unseen star. Two other systems show orbital motion with a period known from the eclipse timing variations (ETVs). For these we obtained parameters of outer orbits, by translating the ETVs to RVs of the centre of mass of the eclipsing ...

  12. Perfectly secure steganography: Hiding information in the quantum noise of a photograph

    Science.gov (United States)

    Sanguinetti, Bruno; Traverso, Giulia; Lavoie, Jonathan; Martin, Anthony; Zbinden, Hugo

    2016-01-01

    We show that it is possible to hide information perfectly within a photograph. The proposed protocol works by selecting each pixel value from two images that differ only by shot noise. Pixel values are never modified, but only selected, making the resulting stego image provably indistinguishable from an untampered image, and the protocol provably secure. We demonstrate that a perfect steganographic protocol is also a perfectly secure cryptographic protocol, and therefore has at least the same requirements: a truly random key as long as the message. In our system, we use a second image as the key, satisfying length requirements, and the randomness is provided by the naturally occurring quantum noise which is dominant in images taken with modern sensors. We conclude that, given a photograph, it is impossible to tell whether it contains any hidden information.

  13. Multidisciplinary systems engineering architecting the design process

    CERN Document Server

    Crowder, James A; Demijohn, Russell

    2016-01-01

    This book presents Systems Engineering from a modern, multidisciplinary engineering approach, providing the understanding that all aspects of systems design, systems, software, test, security, maintenance and the full life-cycle must be factored in to any large-scale system design; up front, not factored in later. It lays out a step-by-step approach to systems-of-systems architectural design, describing in detail the documentation flow throughout the systems engineering design process. It provides a straightforward look and the entire systems engineering process, providing realistic case studies, examples, and design problems that will enable students to gain a firm grasp on the fundamentals of modern systems engineering.  Included is a comprehensive design problem that weaves throughout the entire text book, concluding with a complete top-level systems architecture for a real-world design problem.

  14. The Farm Processing System at CDF

    Institute of Scientific and Technical Information of China (English)

    JaroslayAntos; MarianBabik; 等

    2001-01-01

    At Fermilab's CDF farm a modular and highly scalable software and control system for processing,reprocessing,Monte Carlo generation and many other tasks has been created.The system is called FPS(Farm Processing System).This system consists of independent software components and allows modifications to suit other types of processing as well.FPS is accompanied with fully featured monitoring and control interfaces,including web statistics displays and a multiplatform Java control interface that allow easy management and control.The system also features automatic error recovery procedures with early warnings that allow smooth running.A general overview of the software desing along with a description of the features and limitations of the system and its components will be presented.Run 2 experience with the system will be giver as well.

  15. A Novel Encryption Frame for Medical Image with Watermark Based on Hyperchaotic System

    Directory of Open Access Journals (Sweden)

    Shun Zhang

    2014-01-01

    Full Text Available An encryption frame of medical image with watermark based on hyperchaotic system is proposed in this paper. Medical information, such as the patients’ private information, data needed for diagnosis, and information for authentication or protection of medical files, is embedded into the regions of interest (ROI in medical images with a high capacity difference-histogram-based reversible data-hiding scheme. After that, the watermarked medical images are encrypted with hyperchaotic systems. In the receiving end, the receiver with encryption key can decrypt the image to get similar images for diagnosis. If the receiver has the key for data hiding at the same time, he/she can extract the embedded private information and reversibly recover the original medical image. Experiments and analyses demonstrate that high embedding capacity and low distortion have been achieved in the process of data hiding, and, at the same time, high security has been acquired in the encryption phase.

  16. Image Processing in Intelligent Medical Robotic Systems

    Directory of Open Access Journals (Sweden)

    Shashev Dmitriy

    2016-01-01

    Full Text Available The paper deals with the use of high-performance computing systems with the parallel-operation architecture in intelligent medical systems, such as medical robotic systems, based on a computer vision system, is an automatic control system with the strict requirements, such as high reliability, accuracy and speed of performance. It shows the basic block-diagram of an automatic control system based on a computer vision system. The author considers the possibility of using a reconfigurable computing environment in such systems. The design principles of the reconfigurable computing environment allows to improve a reliability, accuracy and performance of whole system many times. The article contains the brief overview and the theory of the research, demonstrates the use of reconfigurable computing environments for the image preprocessing, namely morphological image processing operations. Present results of the successful simulation of the reconfigurable computing environment and implementation of the morphological image processing operations on the test image in the MATLAB Simulink.

  17. Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory

    Directory of Open Access Journals (Sweden)

    A. M. de Paor

    1998-01-01

    Full Text Available Hide (Nonlinear Processes in Geophysics, 1998 has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ε has the value 1 is proved via the Popov theorem from feedback system stability theory.

  18. Hiding Secret Information in Movie Clip: A Steganographic Approach

    CERN Document Server

    Sahoo, G

    2011-01-01

    Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the internet. One of the key methods for establishing hidden communication is steganography. Modern day steganography mainly deals with hiding information within files like image, text, html, binary files etc. These file contains small irrelevant information that can be substituted for small secret data. To store a high capacity secret data these carrier files are not very supportive. To overcome the problem of storing the high capacity secret data with the utmost security fence, we have proposed a novel methodology for concealing a voluminous data with high levels of security wall by using movie clip as a carrier file.

  19. Analysis Of Aspects Of Messages Hiding In Text Environments

    Directory of Open Access Journals (Sweden)

    Afanasyeva Olesya

    2015-09-01

    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  20. Reversible Data Hiding In Encrypted Images Using Improved Encryption Technique

    Directory of Open Access Journals (Sweden)

    Balika J. Chelliah

    2015-11-01

    Full Text Available Recently more and more attention is paid to reversible data hiding (RDH in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content‟s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be some errors on data extraction and/or image restoration. In this paper we propose a different scheme which attains real reversibility by reserving room before encryption with a traditional RDH algorithm, and then encrypting the data and embedding the data in the encrypted image, which is encrypted using a new proposed algorithm. The proposed method can achieve real reversibility that is data extraction and image recoveries are free of any error.

  1. Reversible Data Hiding In Encrypted Images Using Improved Encryption Technique

    Directory of Open Access Journals (Sweden)

    Mr. Balika J. Chelliah

    2014-03-01

    Full Text Available Recently more and more attention is paid to reversible data hiding (RDH in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content‟s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be some errors on data extraction and/or image restoration. In this paper we propose a different scheme which attains real reversibility by reserving room before encryption with a traditional RDH algorithm, and then encrypting the data and embedding the data in the encrypted image, which is encrypted using a new proposed algorithm. The proposed method can achieve real reversibility that is data extraction and image recoveries are free of any error.

  2. Accountable Metadata-Hiding Escrow: A Group Signature Case Study

    Directory of Open Access Journals (Sweden)

    Kohlweiss Markulf

    2015-06-01

    Full Text Available A common approach to demands for lawful access to encrypted data is to allow a trusted third party (TTP to gain access to private data. However, there is no way to verify that this trust is well placed as the TTP may open all messages indiscriminately. Moreover, existing approaches do not scale well when, in addition to the content of the conversation, one wishes to hide one’s identity. Given the importance of metadata this is a major problem. We propose a new approach in which users can retroactively verify cryptographically whether they were wiretapped. As a case study, we propose a new signature scheme that can act as an accountable replacement for group signatures, accountable forward and backward tracing signatures.

  3. Universal Steganalysis of Data Hiding in Grayscale Images

    Institute of Scientific and Technical Information of China (English)

    HUANG Ji-feng; LIN Jia-jun

    2007-01-01

    This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy.

  4. A Lossless Data Hiding Technique based on AES-DWT

    Directory of Open Access Journals (Sweden)

    Gustavo Fernandaacute;ndez Torres2

    2012-09-01

    Full Text Available In this paper we propose a new data hiding technique. The new technique uses steganography and cryptography on images with a size of 256x256 pixels and an 8-bit grayscale format. There are design restrictions such as a fixed-size cover image, and reconstruction without error of the hidden image. The steganography technique uses a Haar-DWT (Discrete Wavelet Transform with hard thresholding and LSB (Less Significant Bit technique on the cover image. The algorithms used for compressing and ciphering the secret image are lossless JPG and AES, respectively. The proposed technique is used to generate a stego image which provides a double type of security that is robust against attacks. Results are reported for different thresholds levels in terms of PSNR.

  5. Multi-Bit Data Hiding Scheme for Compressing Secret Messages

    Directory of Open Access Journals (Sweden)

    Wen-Chung Kuo

    2015-11-01

    Full Text Available The goal of data hiding techniques usually considers two issues, embedding capacity and image quality. Consequently, in order to achieve high embedding capacity and good image quality, a data hiding scheme combining run-length encoding (RLE with multi-bit embedding is proposed in this paper. This work has three major contributions. First, the embedding capacity is increased 62% because the secret message is compressed before embedding into the cover image. Secondly, the proposed scheme keeps the multi-bit generalized exploiting modification direction (MGEMD characteristics, which are effective to reduce modified pixels in the cover image and to maintain good stego image quality. Finally, the proposed scheme can prevent modern steganalysis methods, such as RS steganalysis and SPAM (subtractive pixel adjacency matrix, and is compared to MiPOD (minimizing the power of the optimal detector scheme. From our simulation results and security discussions, we have the following results: First, there are no perceivable differences between the cover images and stego images from human inspection. For example, the average PSNR of stego images is about 44.61 dB when the secret message (80,000 bits is embedded for test cover images (such as airplane, baboon, Lena of size 512×512. Secondly, Appl. Sci. 2015, 5 1034 on average, 222,087 pixels were not modified after embedding for the cover image. That is to say, 12% less pixels are modified as compared to the MGEMD method. From the performance discussions, the proposed scheme achieves high embedding capacity and good image quality, but also maintains stego image security.

  6. The message processing and distribution system development

    Science.gov (United States)

    Whitten, K. L.

    1981-06-01

    A historical approach is used in presenting the life cycle development of the Navy's message processing and distribution system beginning with the planning phase and ending with the integrated logistic support phase. Several maintenance problems which occurred after the system was accepted for fleet use were examined to determine if they resulted from errors in the acquisition process. The critical decision points of the acquisition process are examined and constructive recommendations are made for avoiding the problems which hindered the successful development of this system.

  7. Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes

    Directory of Open Access Journals (Sweden)

    Divya Ann Luke

    2014-06-01

    Full Text Available The wireless networks are more sensitive to the Denial-of-Service (DoS attacks. The existing system is based on Spread Spectrum (SS. This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. The main attack present in the wireless network is the selective jamming attack. This type of attack mainly focuses a single node termed as target node. Attacker always tries to block the message sent by the target node. This leads to the Denial-of-Service attack. We are proposing a new method to prevent the selective jamming attack in an internalthreat model. A wormhole is used, which will generate an alarm to indicate the presence of jammer and sent IP address of jammer node to all other nodes in the network. Using a method called packet hiding, we can send message through the network even though a jammer is present. This method is based on the technique called Strong Hiding Commitment Scheme (SHCS. Here, the access point in a network region becomes the wormhole whenever it finds out any node that violates the rules in a particular network region. That node is then considered as a jammer node. The wormhole send s IP address of jammer to all other nodes. Wormhole then prevents the jamming activity of the jammer by encrypting the source ID of message along with the message packet.So that the jammer is unable to identify its target node and the source can forward its message safely through jammer node itself

  8. ISP: an optimal out-of-core image-set processing streaming architecture for parallel heterogeneous systems.

    Science.gov (United States)

    Ha, Linh Khanh; Krüger, Jens; Dihl Comba, João Luiz; Silva, Cláudio T; Joshi, Sarang

    2012-06-01

    Image population analysis is the class of statistical methods that plays a central role in understanding the development, evolution, and disease of a population. However, these techniques often require excessive computational power and memory that are compounded with a large number of volumetric inputs. Restricted access to supercomputing power limits its influence in general research and practical applications. In this paper we introduce ISP, an Image-Set Processing streaming framework that harnesses the processing power of commodity heterogeneous CPU/GPU systems and attempts to solve this computational problem. In ISP, we introduce specially designed streaming algorithms and data structures that provide an optimal solution for out-of-core multiimage processing problems both in terms of memory usage and computational efficiency. ISP makes use of the asynchronous execution mechanism supported by parallel heterogeneous systems to efficiently hide the inherent latency of the processing pipeline of out-of-core approaches. Consequently, with computationally intensive problems, the ISP out-of-core solution can achieve the same performance as the in-core solution. We demonstrate the efficiency of the ISP framework on synthetic and real datasets.

  9. Oscillating systems with cointegrated phase processes

    DEFF Research Database (Denmark)

    Østergaard, Jacob; Rahbek, Anders; Ditlevsen, Susanne

    2017-01-01

    We present cointegration analysis as a method to infer the network structure of a linearly phase coupled oscillating system. By defining a class of oscillating systems with interacting phases, we derive a data generating process where we can specify the coupling structure of a network that resemb......We present cointegration analysis as a method to infer the network structure of a linearly phase coupled oscillating system. By defining a class of oscillating systems with interacting phases, we derive a data generating process where we can specify the coupling structure of a network...

  10. Sensitive plant (Mimosa pudica) hiding time depends on individual and state.

    Science.gov (United States)

    Reed-Guy, Sarah; Gehris, Connor; Shi, Meng; Blumstein, Daniel T

    2017-01-01

    The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  11. Sensitive plant (Mimosa pudica hiding time depends on individual and state

    Directory of Open Access Journals (Sweden)

    Sarah Reed-Guy

    2017-07-01

    Full Text Available The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  12. Human-Systems Integration Processes (HSIP) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — In FY12, this project removed the commercial-specific content from the Commercial Human-Systems Integration Design Processes (CHSIP), identified gaps in the...

  13. A dynamically reconfigurable data stream processing system

    Energy Technology Data Exchange (ETDEWEB)

    Nogiec, J.M.; Trombly-Freytag, K.; /Fermilab

    2004-11-01

    This paper describes a component-based framework for data stream processing that allows for configuration, tailoring, and runtime system reconfiguration. The system's architecture is based on a pipes and filters pattern, where data is passed through routes between components. A network of pipes and filters can be dynamically reconfigured in response to a preplanned sequence of processing steps, operator intervention, or a change in one or more data streams. This framework provides several mechanisms supporting dynamic reconfiguration and can be used to build static data stream processing applications such as monitoring or data acquisition systems, as well as self-adjusting systems that can adapt their processing algorithm, presentation layer, or data persistency layer in response to changes in input data streams.

  14. A plasma process monitor/control system

    Energy Technology Data Exchange (ETDEWEB)

    Stevenson, J.O.; Ward, P.P.; Smith, M.L. [Sandia National Labs., Albuquerque, NM (United States); Markle, R.J. [Advanced Micro Devices, Inc., Austin, TX (United States)

    1997-08-01

    Sandia National Laboratories has developed a system to monitor plasma processes for control of industrial applications. The system is designed to act as a fully automated, sand-alone process monitor during printed wiring board and semiconductor production runs. The monitor routinely performs data collection, analysis, process identification, and error detection/correction without the need for human intervention. The monitor can also be used in research mode to allow process engineers to gather additional information about plasma processes. The plasma monitor can perform real-time control of support systems known to influence plasma behavior. The monitor can also signal personnel to modify plasma parameters when the system is operating outside of desired specifications and requires human assistance. A notification protocol can be selected for conditions detected in the plasma process. The Plasma Process Monitor/Control System consists of a computer running software developed by Sandia National Laboratories, a commercially available spectrophotometer equipped with a charge-coupled device camera, an input/output device, and a fiber optic cable.

  15. Interactive data-processing system for metallurgy

    Science.gov (United States)

    Rathz, T. J.

    1978-01-01

    Equipment indicates that system can rapidly and accurately process metallurgical and materials-processing data for wide range of applications. Advantages include increase in contract between areas on image, ability to analyze images via operator-written programs, and space available for storing images.

  16. Teaching Information Systems Development via Process Variants

    Science.gov (United States)

    Tan, Wee-Kek; Tan, Chuan-Hoo

    2010-01-01

    Acquiring the knowledge to assemble an integrated Information System (IS) development process that is tailored to the specific needs of a project has become increasingly important. It is therefore necessary for educators to impart to students this crucial skill. However, Situational Method Engineering (SME) is an inherently complex process that…

  17. The Purpose and Processes of Educational Systems.

    Science.gov (United States)

    Johnson, William L.; Johnson, Annabel M.

    1995-01-01

    A synthesis of the purposes of North American educational systems and processes of administering educational systems derived from research literature was affirmed through surveys of several thousand administrators. A study involving over 10,000 students and their teachers found effective-school organization to be a powerful predictor of student…

  18. Agents-based distributed processes control systems

    Directory of Open Access Journals (Sweden)

    Adrian Gligor

    2011-12-01

    Full Text Available Large industrial distributed systems have revealed a remarkable development in recent years. We may note an increase of their structural and functional complexity, at the same time with those on requirements side. These are some reasons why there are involvednumerous researches, energy and resources to solve problems related to these types of systems. The paper addresses the issue of industrial distributed systems with special attention being given to the distributed industrial processes control systems. A solution for a distributed process control system based on mobile intelligent agents is presented.The main objective of the proposed system is to provide an optimal solution in terms of costs, maintenance, reliability and flexibility. The paper focuses on requirements, architecture, functionality and advantages brought by the proposed solution.

  19. Power systems signal processing for smart grids

    CERN Document Server

    Ribeiro, Paulo Fernando; Ribeiro, Paulo Márcio; Cerqueira, Augusto Santiago

    2013-01-01

    With special relation to smart grids, this book provides clear and comprehensive explanation of how Digital Signal Processing (DSP) and Computational Intelligence (CI) techniques can be applied to solve problems in the power system. Its unique coverage bridges the gap between DSP, electrical power and energy engineering systems, showing many different techniques applied to typical and expected system conditions with practical power system examples. Surveying all recent advances on DSP for power systems, this book enables engineers and researchers to understand the current state of the art a

  20. Process monitoring using ultrasonic sensor systems.

    Science.gov (United States)

    Henning, Bernd; Rautenberg, Jens

    2006-12-22

    Continuous in-line measurement of substance concentration in liquid mixtures is valuable in improving industrial processes in terms of material properties, energy efficiency and process safety. Ultrasonic sensor systems meet the practical requirements of a chemical sensor quite well. Currently ultrasonic sensor systems are widely used as acoustic chemical sensors to measure concentration of selected substances or to monitor the course of polymerisation, crystallisation or fermentation processes. Useable acoustic properties for the characterisation of liquid mixtures are sound velocity, sound absorption and acoustic impedance. This contribution will give a short overview of the state of the art and several trends for the use of ultrasonic sensor systems in process applications. Novel investigations show the very promising possibility to analyse liquid multi-phase mixtures like suspensions, emulsions and dispersions.

  1. Air conditioning for data processing system areas

    Directory of Open Access Journals (Sweden)

    Hernando Camacho García

    2011-06-01

    Full Text Available The appropiate selection of air conditioners for data processing system areas requires the knowledge of the environmental desing conditions, the air conditioning systems succssfully used computer and the cooling loads to handle. This work contains information about a wide variety of systems designed for computer room applications. a complete example of calculation to determine the amount of heat to be removed for satisfactory operation, is also included.

  2. Waste receiving and processing plant control system; system design description

    Energy Technology Data Exchange (ETDEWEB)

    LANE, M.P.

    1999-02-24

    The Plant Control System (PCS) is a heterogeneous computer system composed of numerous sub-systems. The PCS represents every major computer system that is used to support operation of the Waste Receiving and Processing (WRAP) facility. This document, the System Design Description (PCS SDD), includes several chapters and appendices. Each chapter is devoted to a separate PCS sub-system. Typically, each chapter includes an overview description of the system, a list of associated documents related to operation of that system, and a detailed description of relevant system features. Each appendice provides configuration information for selected PCS sub-systems. The appendices are designed as separate sections to assist in maintaining this document due to frequent changes in system configurations. This document is intended to serve as the primary reference for configuration of PCS computer systems. The use of this document is further described in the WRAP System Configuration Management Plan, WMH-350, Section 4.1.

  3. Information processing systems, reasoning modules, and reasoning system design methods

    Energy Technology Data Exchange (ETDEWEB)

    Hohimer, Ryan E.; Greitzer, Frank L.; Hampton, Shawn D.

    2015-08-18

    Information processing systems, reasoning modules, and reasoning system design methods are described. According to one aspect, an information processing system includes working memory comprising a semantic graph which comprises a plurality of abstractions, wherein the abstractions individually include an individual which is defined according to an ontology and a reasoning system comprising a plurality of reasoning modules which are configured to process different abstractions of the semantic graph, wherein a first of the reasoning modules is configured to process a plurality of abstractions which include individuals of a first classification type of the ontology and a second of the reasoning modules is configured to process a plurality of abstractions which include individuals of a second classification type of the ontology, wherein the first and second classification types are different.

  4. Information processing systems, reasoning modules, and reasoning system design methods

    Energy Technology Data Exchange (ETDEWEB)

    Hohimer, Ryan E.; Greitzer, Frank L.; Hampton, Shawn D.

    2016-08-23

    Information processing systems, reasoning modules, and reasoning system design methods are described. According to one aspect, an information processing system includes working memory comprising a semantic graph which comprises a plurality of abstractions, wherein the abstractions individually include an individual which is defined according to an ontology and a reasoning system comprising a plurality of reasoning modules which are configured to process different abstractions of the semantic graph, wherein a first of the reasoning modules is configured to process a plurality of abstractions which include individuals of a first classification type of the ontology and a second of the reasoning modules is configured to process a plurality of abstractions which include individuals of a second classification type of the ontology, wherein the first and second classification types are different.

  5. Information processing systems, reasoning modules, and reasoning system design methods

    Science.gov (United States)

    Hohimer, Ryan E; Greitzer, Frank L; Hampton, Shawn D

    2014-03-04

    Information processing systems, reasoning modules, and reasoning system design methods are described. According to one aspect, an information processing system includes working memory comprising a semantic graph which comprises a plurality of abstractions, wherein the abstractions individually include an individual which is defined according to an ontology and a reasoning system comprising a plurality of reasoning modules which are configured to process different abstractions of the semantic graph, wherein a first of the reasoning modules is configured to process a plurality of abstractions which include individuals of a first classification type of the ontology and a second of the reasoning modules is configured to process a plurality of abstractions which include individuals of a second classification type of the ontology, wherein the first and second classification types are different.

  6. Architecture for Survivable System Processing (ASSP)

    Science.gov (United States)

    Wood, Richard J.

    1991-11-01

    The Architecture for Survivable System Processing (ASSP) Program is a multi-phase effort to implement Department of Defense (DOD) and commercially developed high-tech hardware, software, and architectures for reliable space avionics and ground based systems. System configuration options provide processing capabilities to address Time Dependent Processing (TDP), Object Dependent Processing (ODP), and Mission Dependent Processing (MDP) requirements through Open System Architecture (OSA) alternatives that allow for the enhancement, incorporation, and capitalization of a broad range of development assets. High technology developments in hardware, software, and networking models, address technology challenges of long processor life times, fault tolerance, reliability, throughput, memories, radiation hardening, size, weight, power (SWAP) and security. Hardware and software design, development, and implementation focus on the interconnectivity/interoperability of an open system architecture and is being developed to apply new technology into practical OSA components. To insure for widely acceptable architecture capable of interfacing with various commercial and military components, this program provides for regular interactions with standardization working groups (e.g.) the International Standards Organization (ISO), American National Standards Institute (ANSI), Society of Automotive Engineers (SAE), and Institute of Electrical and Electronic Engineers (IEEE). Selection of a viable open architecture is based on the widely accepted standards that implement the ISO/OSI Reference Model.

  7. STUDY ON AUDIO INFORMATION HIDING METHOD BASED ON MODIFIED PHASE PARTITION

    Institute of Scientific and Technical Information of China (English)

    Tong Ming; Hao Chongyang; Liu Xiaojun; Chen Yanpu

    2005-01-01

    Hiding efficiency of traditional audio information hiding methods is always low since the sentience similarity cannot be guaranteed. A new audio information hiding method is proposed in this letter which can impose the insensitivity with the audio phase for auditory and realize the information hiding through specific algorithm in order to modify local phase within the auditory perception. The algorithm is to introduce the operation of "set 1" and "set 0" for every phase vectors, then the phases must lie on the boundary of a phase area after modified. If it lies on "1" boundary, it comes by set 1 operation. If it lies on "0" boundary, it comes by set 0 operation. The results show that, compared with the legacy method, the proposed method has better auditory similarity, larger information embedding capacity and lower code error rate. As a kind of blind detect method, it fits for application scenario without channel interference.

  8. An evaluation of selected methods for the decontamination of cattle hides prior to skinning.

    Science.gov (United States)

    Small, A; Wells-Burr, B; Buncic, S

    2005-02-01

    The effectiveness of different decontamination treatments in reducing microbial loads on cattle hides was assessed. The 10-s hide treatments were conducted using a wet-and-dry vacuum cleaner filled with one of the liquids (heated to 50 °C) indicated below, followed or not by 10-min drying in the air. Also, the hide was clipped, followed or not by 10-s singeing using a hand-held blowtorch. Before and after each decontamination treatment, the hide was sampled (100 cm(2) areas) by a sponge-swabbing method to compare the total viable counts of bacteria (TVC). The largest bacterial reduction (Psanitizer solution (10% Betane Plus) resulted in significant reductions of 1.80 (Pefficacy of these treatments in the reduction of specific pathogens under commercial conditions.

  9. Motivation to hide emotion and children's understanding of the distinction between real and apparent emotions.

    Science.gov (United States)

    Gosselin, Pierre; Warren, Madeleine; Diotte, Michèle

    2002-12-01

    The authors investigated the extent to which children's understanding of the distinction between real and apparent emotions varied according to the motivation to hide emotions. Children, aged 6-7 and 10-11 years, were read stories designed to elicit either prosocial or self-protective motivated display rules and were asked to predict the facial expressions the protagonists would make to hide felt emotions. Children were found to understand the distinction between real and apparent emotions very well, independently of the type of motivation. Contrary to predictions, boys understood this distinction better than did girls when the motivation to hide positive emotions was prosocial. Children perceived neutralization as the most appropriate strategy to hide felt emotions, followed by masking.

  10. Insight into error hiding: exploration of nursing students' achievement goal orientations.

    Science.gov (United States)

    Dunn, Karee E

    2014-02-01

    An estimated 50% of medication errors go unreported, and error hiding is costly to hospitals and patients. This study explored one issue that may facilitate error hiding. Descriptive statistics were used to examine nursing students' achievement goal orientations in a high-fidelity simulation course. Results indicated that although this sample of nursing students held high mastery goal orientations, they also held moderate levels of performance-approach and performance-avoidance goal orientations. These goal orientations indicate that this sample is at high risk for error hiding, which places the benefits that are typically gleaned from a strong mastery orientation at risk. Understanding variables, such as goal orientation, that can be addressed in nursing education to reduce error hiding is an area of research that needs to be further explored. This article discusses the study results and evidence-based instructional practices for this sample's achievement goal orientation profile.

  11. 16 CFR 1630.61 - Hide carpets and rugs-alternative washing procedure.

    Science.gov (United States)

    2010-01-01

    ... natural “lay” of the hair structure for ten complete strokes. (8) Place test specimen in a circulating... wool or hair attached to the hide with no synthetic fibers and (2) have been treated with a fire...

  12. 16 CFR 1631.61 - Hide carpets and rugs-alternative washing procedure.

    Science.gov (United States)

    2010-01-01

    ... natural “lay” of the hair structure for ten complete strokes. (8) Place test specimen in a circulating... wool or hair attached to the hide with no synthetic fibers and (2) have been treated with a fire...

  13. Improving industrial process control systems security

    CERN Document Server

    Epting, U; CERN. Geneva. TS Department

    2004-01-01

    System providers are today creating process control systems based on remote connectivity using internet technology, effectively exposing these systems to the same threats as corporate computers. It is becoming increasingly difficult and costly to patch/maintain the technical infrastructure monitoring and control systems to remove these vulnerabilities. A strategy including risk assessment, security policy issues, service level agreements between the IT department and the controls engineering groups must be defined. In addition an increased awareness of IT security in the controls system engineering domain is needed. As consequence of these new factors the control system architectures have to take into account security requirements, that often have an impact on both operational aspects as well as on the project and maintenance cost. Manufacturers of industrial control system equipment do however also propose progressively security related solutions that can be used for our active projects. The paper discusses ...

  14. Data processing system of GA and PPPL

    Energy Technology Data Exchange (ETDEWEB)

    Oshima, Takayuki [Japan Atomic Energy Research Inst., Naka, Ibaraki (Japan). Naka Fusion Research Establishment

    2001-11-01

    Results of research in 1997 to General Atomics (GA) and Princeton Plasma Physics Laboratory (PPPL) are reported. The author visited the computer system of fusion group in GA. He joined the tokamak experiment in DIII-D, especially on the demonstration of the remote experiment inside U.S., and investigated the data processing system of DIII-D and the computer network, etc. After the visit to GA, He visited PPPL and exchanged the information about the equipment of remote experiment between JAERI and PPPL based on the US-Japan fusion energy research cooperation. He also investigated the data processing system of TFTR tokamak, the computer network and so on. Results of research of the second visit to GA in 2000 are also reported, which describes a rapid progress of each data processing equipment by the advance on the computer technology in just three years. (author)

  15. Arabic Natural Language Processing System Code Library

    Science.gov (United States)

    2014-06-01

    Adelphi, MD 20783-1197 This technical note provides a brief description of a Java library for Arabic natural language processing ( NLP ) containing code...for training and applying the Arabic NLP system described in the paper "A Cross-Task Flexible Transition Model for Arabic Tokenization, Affix...processing, NLP , Java, code 14 Stephen C. Tratz (301) 394-2305Unclassified Unclassified Unclassified UU ii Contents 1. Introduction 1 2. File Overview 1 3

  16. Expert systems in the process industries

    Science.gov (United States)

    Stanley, G. M.

    1992-01-01

    This paper gives an overview of industrial applications of real-time knowledge based expert systems (KBES's) in the process industries. After a brief overview of the features of a KBES useful in process applications, the general roles of KBES's are covered. A particular focus is diagnostic applications, one of the major applications areas. Many applications are seen as an expansion of supervisory control. The lessons learned from numerous online applications are summarized.

  17. Integrated Virtual Assembly Process Planning System

    Institute of Scientific and Technical Information of China (English)

    LIU Jianhua; HOU Weiwei; HOU Weiwei; SHANG Wei; SHANG Wei; NING Ruxin; NING Ruxin

    2009-01-01

    Assembly process planning(APP) for complicated products is a time-consuming and difficult work with conventional method. Virtual assembly process planning(VAPP) provides engineers a new and efficiency way. Previous studies in VAPP are almost isolated and dispersive, and have not established a whole understanding and discussed key realization techniques of VAPP from a systemic and integrated view. The integrated virtual assembly process planning(IVAPP) system is a new virtual reality based engineering application, which offers engineers an efficient, intuitive, immersive and integrated method for assembly process planning in a virtual environment. Based on analysis the information integration requirement of VAPP, the architecture of IVAPP is proposed. Through the integrated structure, IVAPP system can realize information integration and workflow controlling. In order to model the assembly process in IVAPP, a hierarchical assembly task list(HATL) is presented, in which different assembly tasks for assembling different components are organized into a hierarchical list. A process-oriented automatic geometrical constraint recognition algorithm(AGCR) is proposed, so that geometrical constraints between components can be automatically recognized during the process of interactive assembling. At the same time, a progressive hierarchical reasoning(PHR) model is discussed. AGCR and PHR will greatly reduce the interactive workload. A discrete control node model(DCNM) for cable harness assembly planning in IVAPP is detailed. DCNM converts a cable harness into continuous flexed line segments connected by a series of section center points, and designs can realize cable harness planning through controlling those control nodes. Mechanical assemblies (such as transmission case and engine of automobile) are used to illustrate the feasibility of the proposed method and algorithms. The application of IVAPP system reveals advantages over the traditional assembly process planning method

  18. System Runs Analysis with Process Mining

    Directory of Open Access Journals (Sweden)

    S. A. Shershakov

    2015-01-01

    Full Text Available Information systems (IS produce numerous traces and logs at runtime. In the context of SOA-based (service-oriented architecture IS, these logs contain details about sequences of process and service calls. Modern application monitoring and error tracking tools provide only rather straightforward log search and filtering functionality. However, “clever” analysis of the logs is highly useful, since it can provide valuable insights into the system architecture, interaction of business domains and services. Here we took runs event logs (trace data of a big booking system and discovered architectural guidelines violations and common anti-patterns. We applied mature process mining techniques for discovery and analysis of these logs. The aims of process mining are to discover, analyze, and improve processes on the basis of IS behavior recorded as event logs. In several specific examples, we show successful applications of process mining to system runtime analysis and motivate further research in this area.The article is published in the authors’ wording.

  19. Telemedicine optoelectronic biomedical data processing system

    Science.gov (United States)

    Prosolovska, Vita V.

    2010-08-01

    The telemedicine optoelectronic biomedical data processing system is created to share medical information for the control of health rights and timely and rapid response to crisis. The system includes the main blocks: bioprocessor, analog-digital converter biomedical images, optoelectronic module for image processing, optoelectronic module for parallel recording and storage of biomedical imaging and matrix screen display of biomedical images. Rated temporal characteristics of the blocks defined by a particular triggering optoelectronic couple in analog-digital converters and time imaging for matrix screen. The element base for hardware implementation of the developed matrix screen is integrated optoelectronic couples produced by selective epitaxy.

  20. Process Identification through Test on Cryogenic System

    CERN Document Server

    Pezzetti, M; Chadli, M; Coppier, H

    2008-01-01

    UNICOS (UNified Industrial Control System) is the CERN object-based control standard for the cryogenics of the LHC and its experiments. It includes a variety of embedded functions, dedicated to the specific cryogenic processes. To enlarge the capabilities of the standard it is proposed to integrate the parametrical identification step in the control system of large scale cryogenic plants. Different methods of parametrical identification have been tested and the results were combined to obtain a better model. The main objective of the work is to find a compromise between an easy-to-use solution and a good level of process identification model. The study focuses on identification protocol for large delayed system, the measurement consistency and correlation between different inputs and outputs. Furthermore the paper describes in details, the results and the tests carried out on parametrical identification investigations with large scale systems.

  1. Haptic teleoperation systems signal processing perspective

    CERN Document Server

    Lee, Jae-young

    2015-01-01

    This book examines the signal processing perspective in haptic teleoperation systems. This text covers the topics of prediction, estimation, architecture, data compression, and error correction that can be applied to haptic teleoperation systems. The authors begin with an overview of haptic teleoperation systems, then look at a Bayesian approach to haptic teleoperation systems. They move onto a discussion of haptic data compression, haptic data digitization and forward error correction.   ·         Presents haptic data prediction/estimation methods that compensate for unreliable networks   ·         Discusses haptic data compression that reduces haptic data size over limited network bandwidth and haptic data error correction that compensate for packet loss problem   ·         Provides signal processing techniques used with existing control architectures.

  2. DNA-based cryptographic methods for data hiding in DNA media.

    Science.gov (United States)

    Marwan, Samiha; Shawish, Ahmed; Nagaty, Khaled

    2016-12-01

    Information security can be achieved using cryptography, steganography or a combination of them, where data is firstly encrypted using any of the available cryptography techniques and then hid into any hiding medium. Recently, the famous genomic DNA has been introduced as a hiding medium, known as DNA steganography, due to its notable ability to hide huge data sets with a high level of randomness and hence security. Despite the numerous cryptography techniques, to our knowledge only the vigenere cipher and the DNA-based playfair cipher have been combined with the DNA steganography, which keeps space for investigation of other techniques and coming up with new improvements. This paper presents a comprehensive analysis between the DNA-based playfair, vigenere, RSA and the AES ciphers, each combined with a DNA hiding technique. The conducted analysis reports the performance diversity of each combined technique in terms of security, speed, hiding capacity in addition to both key size and data size. Moreover, this paper proposes a modification of the current combined DNA-based playfair cipher technique, which makes it not only simple and fast but also provides a significantly higher hiding capacity and security. The conducted extensive experimental studies confirm such outstanding performance in comparison with all the discussed combined techniques. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Hiding effort to gain a competitive advantage: Evidence from China.

    Science.gov (United States)

    Zhao, Li; Heyman, Gail D

    2016-06-06

    Previous studies with Western populations have shown that adolescents' tendency to downplay their academic effort is affected by two kinds of motives: ability-related motives (e.g., to appear competent) and social approval motives (e.g., to be popular). In this research, we test for the presence of additional competition-related motives in China, a culture placing strong emphasis on academic competition. Study 1 (N = 150) showed that, in response to a scenario in which a hard-working high-school junior hid effort from classmates, the most highly endorsed explanation was "to influence others to work less hard to maintain a competitive advantage." Study 2 (N = 174) revealed that competition-related explanations were endorsed relatively more often when the speaker and audience had similar academic rankings. This tendency was most evident when both speaker and audience were top performers, and when this was the case, participants' desire to demonstrate superiority over others was a positive predictor of endorsement of competition-related motives. Study 3 (N = 137) verified that competition-related motives were more strongly endorsed among Chinese participants than U.S. These results suggest that at least in cultures that emphasize academic competition and in contexts where competition is salient, hiding effort is often about attempting to gain strategic advantage. © 2016 International Union of Psychological Science.

  4. An expert system for natural language processing

    Science.gov (United States)

    Hennessy, John F.

    1988-01-01

    A solution to the natural language processing problem that uses a rule based system, written in OPS5, to replace the traditional parsing method is proposed. The advantage to using a rule based system are explored. Specifically, the extensibility of a rule based solution is discussed as well as the value of maintaining rules that function independently. Finally, the power of using semantics to supplement the syntactic analysis of a sentence is considered.

  5. Material Processing Laser Systems For Manufacturing

    Science.gov (United States)

    Taeusch, David R.; Ruselowski, John M.

    1986-11-01

    Raycon Corporation is a builder of quality machine tools. Combining this with applications expertise to produce high technology production machinery systems using EDM, lasers and other processing methods to solve our customers' production problems is our product. The company has several standard laser machine systems which can be constructed from standard building blocks. The number of axes and travel, the controller requirements, and the required laser type, size and manufacturer are discussed with our customers, and the system to meet their needs is decided upon. These requirements are then built into a processing system for manufacturing use. Several of these systems which are in the field are described, and their purposes and how they accomplish their task are explained. Also, types of YAG and C02 lasers available are described and their optimum use explained. Some specific examples of type versus applications are: YAG low-divergence lasers for trepanning heat-resistant alloys for jet engine turbines; YAG oscillator-amplifier lasers for percussion drilling of cooling holes in jet engine turbine blades; and several special laser machine systems for processing automotive parts are discussed. A few words on laser safety are included to allay some common fears concerning the use of laser technology in the factory environment.

  6. The IUE Final Archive Processing System

    Science.gov (United States)

    Imhoff, C. L.; Dunn, N.; Fireman, G. F.; Levay, K. L.; Meylan, T.; Nichols, J.; Michalitsianos, A.

    1993-12-01

    The IUE Project has begun the task of reprocessing all IUE data using significantly enhanced reduction algorithms and calibrations. In order to perform this task in a timely, reliable manner, we have developed the IUE Final Archive Processing System. The system runs on a DECstation 5000, using Fortran software embedded in portable MIDAS. The processing queue is driven by a commercial relational database. The database interface allows the system to access the enhanced IUE database, which is resident on a second DECstation 5000 (see poster by Levay et al.). The system runs automatically, with little operator intervention. Built-in quality assurance software detects virtually all input or processing problems. In addition, a fraction of the images, including all those with quality assurance warnings, are screened by the staff. The screening system, known as the Post-Production Verification (PPV) system, uses a widget-based graphics user interface written in IDL. It allows one to display and inspect the MIDAS and FITS files, review the FITS headers and other text files, and record the results in the IUE database. Images which have passed quality assurance are then delivered to NASA's National Space Science Data Center, which makes the data available to the astronomical community. This work has been supported under NASA contract NAS5-31230 to Computer Sciences Corp.

  7. Features, Events, and Processes: system Level

    Energy Technology Data Exchange (ETDEWEB)

    D. McGregor

    2004-10-15

    The purpose of this analysis report is to evaluate and document the inclusion or exclusion of the system-level features, events, and processes (FEPs) with respect to modeling used to support the total system performance assessment for the license application (TSPA-LA). A screening decision, either Included or Excluded, is given for each FEP along with the technical basis for screening decisions. This information is required by the U.S. Nuclear Regulatory Commission (NRC) at 10 CFR 63.113 (d, e, and f) (DIRS 156605). The system-level FEPs addressed in this report typically are overarching in nature, rather than being focused on a particular process or subsystem. As a result, they are best dealt with at the system level rather than addressed within supporting process-level or subsystem-level analyses and models reports. The system-level FEPs also tend to be directly addressed by regulations, guidance documents, or assumptions listed in the regulations; or are addressed in background information used in development of the regulations. For included FEPs, this analysis summarizes the implementation of the FEP in the TSPA-LA (i.e., how the FEP is included). For excluded FEPs, this analysis provides the technical basis for exclusion from the TSPA-LA (i.e., why the FEP is excluded). The initial version of this report (Revision 00) was developed to support the total system performance assessment for site recommendation (TSPA-SR). This revision addresses the license application (LA) FEP List (DIRS 170760).

  8. A Security Enhanced Robust Steganography Algorithm for Data Hiding

    OpenAIRE

    Siddharth Singh; Tanveer J. Siddiqui

    2012-01-01

    In this paper, a new robust steganography algorithm based on discrete cosine transform (DCT), Arnold transform and chaotic system is proposed. The chaotic system is used to generate a random sequence to be used for spreading data in the middle frequency band DCT coefficient of the cover image. The security is further enhanced by scrambling the secret data using Arnold Cat map before embedding. The recovery process is blind. A series of experiments is conducted to prove the security and robust...

  9. Currency Recognition System Using Image Processing

    Directory of Open Access Journals (Sweden)

    S. M. Saifullah

    2015-11-01

    Full Text Available In the last few years a great technological advances in color printing, duplicating and scanning, counterfeiting problems have become more serious. In past only authorized printing house has the ability to make currency paper, but now a days it is possible for anyone to print fake bank note with the help of modern technology such as computer, laser printer. Fake notes are burning questions in almost every country. Like others country Bangladesh has also hit really heard and has become a very acute problem. Therefore there is a need to design a currency recognition system that can easily make a difference between real and fake banknote and the process will time consuming. Our system describes an approach for verification of Bangladeshi currency banknotes. The currency will be verified by using image processing techniques. The approach consists of a number of components including image processing, image segmentation, feature extraction, comparing images. The system is designed by MATLAB. Image processing involves changing the nature of an image in order to improve its pictorial information for human interpretation. The image processing software is a collection of functions that extends the capability of the MATLAB numeric computing environment. The result will be whether currency is real or fake.

  10. System and process for biomass treatment

    Science.gov (United States)

    Dunson, Jr., James B; Tucker, III, Melvin P; Elander, Richard T; Lyons, Robert C

    2013-08-20

    A system including an apparatus is presented for treatment of biomass that allows successful biomass treatment at a high solids dry weight of biomass in the biomass mixture. The design of the system provides extensive distribution of a reactant by spreading the reactant over the biomass as the reactant is introduced through an injection lance, while the biomass is rotated using baffles. The apparatus system to provide extensive assimilation of the reactant into biomass using baffles to lift and drop the biomass, as well as attrition media which fall onto the biomass, to enhance the treatment process.

  11. Microprocessor systems for industrial process control

    Science.gov (United States)

    Lesh, F. H.

    1980-01-01

    Six computers operate synchronously and are interconnected by three independent data buses. Processors control one subsystem. Some can control buses to transfer data at 1 megabit per second. Every 2.5 msec each processor examines list of things to do during next interval. This spacecraft control system could be adapted for controlling complex industrial processes.

  12. Emulsification with microstructured systems : process principles

    NARCIS (Netherlands)

    Zwan, van der E.A.

    2008-01-01

    The aim of this thesis is to elucidate the underlying processes and mechanisms that determine the droplet size of emulsions produced with microstructured systems, such as premix microstructure homogenization and microchannel emulsification. The ultimate goal is to describe these methods based on det

  13. 图像隐藏算法的MATLAB实现%Realization of image hiding algorithm based on MATLAB

    Institute of Scientific and Technical Information of China (English)

    宫海梅

    2016-01-01

    根据HVS的特性,人类视觉系统对高位信号敏感,去掉图像最低几个位并不会造成画面质量的明显下降,视觉系统就无法感觉到信号的存在,提出了四比特图像信息替换算法实现图像隐藏,运用MATLAB软件进行算法实现,嵌入信息后的载体图像与原始图像视觉效果基本一致,有效解决了图像信息隐藏问题。%According to the characteristics of HVS, The human visual system is sensitive to the high signal. To remove the image of the least number of bits does not cause a significant decline in the quality of picture, the visual system can not feel the existence of the signal. In this paper, four bit image information replacement algorithm is proposed to realize the image hiding, MATLAB software is used to realize the algorithm. The carrier image after embedding information is basically consistent with the original image, effectively solve the problem of image information hiding.

  14. Process control systems: integrated for future process technologies

    Science.gov (United States)

    Botros, Youssry; Hajj, Hazem M.

    2003-06-01

    Process Control Systems (PCS) are becoming more crucial to the success of Integrated Circuit makers due to their direct impact on product quality, cost, and Fab output. The primary objective of PCS is to minimize variability by detecting and correcting non optimal performance. Current PCS implementations are considered disparate, where each PCS application is designed, deployed and supported separately. Each implementation targets a specific area of control such as equipment performance, wafer manufacturing, and process health monitoring. With Intel entering the nanometer technology era, tighter process specifications are required for higher yields and lower cost. This requires areas of control to be tightly coupled and integrated to achieve the optimal performance. This requirement can be achieved via consistent design and deployment of the integrated PCS. PCS integration will result in several benefits such as leveraging commonalities, avoiding redundancy, and facilitating sharing between implementations. This paper will address PCS implementations and focus on benefits and requirements of the integrated PCS. Intel integrated PCS Architecture will be then presented and its components will be briefly discussed. Finally, industry direction and efforts to standardize PCS interfaces that enable PCS integration will be presented.

  15. Topic: Catchment system dynamics: Processes and feedbacks

    Science.gov (United States)

    Keesstra, Saskia

    2015-04-01

    In this meeting we can talk about my main expertise: the focus of my research ocus revolves around understanding catchment system dynamics in a holistic way by incorporating both processes on hillslopes as well as in the river channel. Process knowledge enables explanation of the impact of natural and human drivers on the catchment systems and which consequences these drivers have for water and sediment connectivity. Improved understanding of the catchment sediment and water dynamics will empower sustainable land and river management and mitigate soil threats like erosion and off-side water and sediment accumulation with the help of nature's forces. To be able to understand the system dynamics of a catchment, you need to study the catchment system in a holistic way. In many studies only the hillslopes or even plots are studied; or only the channel. However, these systems are connected and should be evaluated together. When studying a catchment system any intervention to the system will create both on- as well as off sites effects, which should especially be taken into account when transferring science into policy regulations or management decisions.

  16. FLIPS: Friendly Lisp Image Processing System

    Science.gov (United States)

    Gee, Shirley J.

    1991-08-01

    The Friendly Lisp Image Processing System (FLIPS) is the interface to Advanced Target Detection (ATD), a multi-resolutional image analysis system developed by Hughes in conjunction with the Hughes Research Laboratories. Both menu- and graphics-driven, FLIPS enhances system usability by supporting the interactive nature of research and development. Although much progress has been made, fully automated image understanding technology that is both robust and reliable is not a reality. In situations where highly accurate results are required, skilled human analysts must still verify the findings of these systems. Furthermore, the systems often require processing times several orders of magnitude greater than that needed by veteran personnel to analyze the same image. The purpose of FLIPS is to facilitate the ability of an image analyst to take statistical measurements on digital imagery in a timely fashion, a capability critical in research environments where a large percentage of time is expended in algorithm development. In many cases, this entails minor modifications or code tinkering. Without a well-developed man-machine interface, throughput is unduly constricted. FLIPS provides mechanisms which support rapid prototyping for ATD. This paper examines the ATD/FLIPS system. The philosophy of ATD in addressing image understanding problems is described, and the capabilities of FLIPS are discussed, along with a description of the interaction between ATD and FLIPS. Finally, an overview of current plans for the system is outlined.

  17. Small Interactive Image Processing System (SMIPS) system description

    Science.gov (United States)

    Moik, J. G.

    1973-01-01

    The Small Interactive Image Processing System (SMIPS) operates under control of the IBM-OS/MVT operating system and uses an IBM-2250 model 1 display unit as interactive graphic device. The input language in the form of character strings or attentions from keys and light pen is interpreted and causes processing of built-in image processing functions as well as execution of a variable number of application programs kept on a private disk file. A description of design considerations is given and characteristics, structure and logic flow of SMIPS are summarized. Data management and graphic programming techniques used for the interactive manipulation and display of digital pictures are also discussed.

  18. Color Image Processing and Object Tracking System

    Science.gov (United States)

    Klimek, Robert B.; Wright, Ted W.; Sielken, Robert S.

    1996-01-01

    This report describes a personal computer based system for automatic and semiautomatic tracking of objects on film or video tape, developed to meet the needs of the Microgravity Combustion and Fluids Science Research Programs at the NASA Lewis Research Center. The system consists of individual hardware components working under computer control to achieve a high degree of automation. The most important hardware components include 16-mm and 35-mm film transports, a high resolution digital camera mounted on a x-y-z micro-positioning stage, an S-VHS tapedeck, an Hi8 tapedeck, video laserdisk, and a framegrabber. All of the image input devices are remotely controlled by a computer. Software was developed to integrate the overall operation of the system including device frame incrementation, grabbing of image frames, image processing of the object's neighborhood, locating the position of the object being tracked, and storing the coordinates in a file. This process is performed repeatedly until the last frame is reached. Several different tracking methods are supported. To illustrate the process, two representative applications of the system are described. These applications represent typical uses of the system and include tracking the propagation of a flame front and tracking the movement of a liquid-gas interface with extremely poor visibility.

  19. Model systems for life processes on Mars

    Science.gov (United States)

    Mitz, M. A.

    1974-01-01

    In the evolution of life forms nonphotosynthetic mechanisms are developed. The question remains whether a total life system could evolve which is not dependent upon photosynthesis. In trying to visualize life on other planets, the photosynthetic process has problems. On Mars, the high intensity of light at the surface is a concern and alternative mechanisms need to be defined and analyzed. In the UV search for alternate mechanisms, several different areas may be identified. These involve activated inorganic compounds in the atmosphere, such as the products of photodissociation of carbon dioxide and the organic material which may be created by natural phenomena. In addition, a life system based on the pressure of the atmospheric constituents, such as carbon dioxide, is a possibility. These considerations may be important for the understanding of evolutionary processes of life on another planet. Model systems which depend on these alternative mechanisms are defined and related to presently planned and future planetary missions.

  20. A process planning system for cold extrusion

    Directory of Open Access Journals (Sweden)

    SANTOSH KUMAR,

    2010-12-01

    Full Text Available A Process Planning system ProEx-Cold is developed for extrusion shapes to eliminate the tedious and expensive procedure of trial and correction of a proper die and the process. The system has three modules as: feature recognition, upper bound analysis and 3D graphics generation & display using OpenGL application engine. The input parameters to the proposed CAPP system includes: die type, billet TYPE & material, geometrical details of the product, ram speed,reduction, friction condition and billet condition etc. to influence parameters like production rate, extrusion ram pressure etc. C-programming, OpenGL graphics and Visual C++ editor has been used to implement ProEx-Cold.

  1. Systemic analysis of the caulking assembly process

    Directory of Open Access Journals (Sweden)

    Rodean Claudiu

    2017-01-01

    Full Text Available The present paper highlights the importance of a caulking process which is nowadays less studied in comparison with the growing of its usage in the automotive industry. Due to the fact that the caulking operation is used in domains with high importance such as shock absorbers and brake systems there comes the demand of this paper to detail the parameters which characterize the process, viewed as input data and output data, and the requirements asked for the final product. The paper presents the actual measurement methods used for analysis the performance of the caulking assembly. All this parameters leads to an analysis algorithm of performance established for the caulking process which it is used later in the paper for an experimental research. The study is a basis from which it will be able to go to further researches in order to optimize the following processing.

  2. Process simulation in digital camera system

    Science.gov (United States)

    Toadere, Florin

    2012-06-01

    The goal of this paper is to simulate the functionality of a digital camera system. The simulations cover the conversion from light to numerical signal and the color processing and rendering. We consider the image acquisition system to be linear shift invariant and axial. The light propagation is orthogonal to the system. We use a spectral image processing algorithm in order to simulate the radiometric properties of a digital camera. In the algorithm we take into consideration the transmittances of the: light source, lenses, filters and the quantum efficiency of a CMOS (complementary metal oxide semiconductor) sensor. The optical part is characterized by a multiple convolution between the different points spread functions of the optical components. We use a Cooke triplet, the aperture, the light fall off and the optical part of the CMOS sensor. The electrical part consists of the: Bayer sampling, interpolation, signal to noise ratio, dynamic range, analog to digital conversion and JPG compression. We reconstruct the noisy blurred image by blending different light exposed images in order to reduce the photon shot noise, also we filter the fixed pattern noise and we sharpen the image. Then we have the color processing blocks: white balancing, color correction, gamma correction, and conversion from XYZ color space to RGB color space. For the reproduction of color we use an OLED (organic light emitting diode) monitor. The analysis can be useful to assist students and engineers in image quality evaluation and imaging system design. Many other configurations of blocks can be used in our analysis.

  3. Process and control systems for composites manufacturing

    Science.gov (United States)

    Tsiang, T. H.; Wanamaker, John L.

    1992-01-01

    A precise control of composite material processing would not only improve part quality, but it would also directly reduce the overall manufacturing cost. The development and incorporation of sensors will help to generate real-time information for material processing relationships and equipment characteristics. In the present work, the thermocouple, pressure transducer, and dielectrometer technologies were investigated. The monitoring sensors were integrated with the computerized control system in three non-autoclave fabrication techniques: hot-press, self contained tool (self heating and pressurizing), and pressure vessel). The sensors were implemented in the parts and tools.

  4. Sedimentation process and design of settling systems

    CERN Document Server

    De, Alak

    2017-01-01

    This book is designed to serve as a comprehensive source of information of sedimentation processes and design of settling systems, especially as applied to design of such systems in civil and environmental engineering. The book begins with an introduction to sedimentation as a whole and goes on to cover the development and details of various settling theories. The book traces the chronological developments of the comprehensive knowledge of settling studies and design of settling systems from 1889.A new concept of 'Velocity Profile Theorem', tool for settling problem analysis, has been employed to the analysis of the phenomenon of short circuiting. Complete theory of tube settling has been developed and its application to the computation of residual solids from the assorted solids through the same has been demonstrated. Experimental verification of the tube settling theory has also been presented. Field-oriented compatible design and operation methodology of settling system has been developed from the detailed...

  5. Computer performance optimization systems, applications, processes

    CERN Document Server

    Osterhage, Wolfgang W

    2013-01-01

    Computing power performance was important at times when hardware was still expensive, because hardware had to be put to the best use. Later on this criterion was no longer critical, since hardware had become inexpensive. Meanwhile, however, people have realized that performance again plays a significant role, because of the major drain on system resources involved in developing complex applications. This book distinguishes between three levels of performance optimization: the system level, application level and business processes level. On each, optimizations can be achieved and cost-cutting p

  6. Smart Parking System with Image Processing Facility

    Directory of Open Access Journals (Sweden)

    M.O. Reza

    2012-04-01

    Full Text Available Smart Parking Systems obtain information about available parking spaces, process it and then place the car at a certain position. A prototype of the parking assistance system based on the proposed architecture was constructed here. The adopted hardware, software, and implementation solutions in this prototype construction are described in this paper. The effective circular design is introduced here having rack-pinion special mechanism which is used to lift and place the car in the certain position. The design of rack pinion mechanism is also simulated using AUTODESK INVENTOR and COMSOL software.

  7. Security of legacy process control systems : Moving towards secure process control systems

    NARCIS (Netherlands)

    Oosterink, M.

    2012-01-01

    This white paper describes solutions which organisations may use to improve the security of their legacy process control systems. When we refer to a legacy system, we generally refer to old methodologies, technologies, computer systems or applications which are still in use, despite the fact that ne

  8. Security of legacy process control systems : Moving towards secure process control systems

    NARCIS (Netherlands)

    Oosterink, M.

    2012-01-01

    This white paper describes solutions which organisations may use to improve the security of their legacy process control systems. When we refer to a legacy system, we generally refer to old methodologies, technologies, computer systems or applications which are still in use, despite the fact that

  9. Modeling delayed processes in biological systems

    Science.gov (United States)

    Feng, Jingchen; Sevier, Stuart A.; Huang, Bin; Jia, Dongya; Levine, Herbert

    2016-09-01

    Delayed processes are ubiquitous in biological systems and are often characterized by delay differential equations (DDEs) and their extension to include stochastic effects. DDEs do not explicitly incorporate intermediate states associated with a delayed process but instead use an estimated average delay time. In an effort to examine the validity of this approach, we study systems with significant delays by explicitly incorporating intermediate steps. We show that such explicit models often yield significantly different equilibrium distributions and transition times as compared to DDEs with deterministic delay values. Additionally, different explicit models with qualitatively different dynamics can give rise to the same DDEs revealing important ambiguities. We also show that DDE-based predictions of oscillatory behavior may fail for the corresponding explicit model.

  10. Systems perspectives on mRNA processing

    Institute of Scientific and Technical Information of China (English)

    Adrienne E McKee; Pamela A Silver

    2007-01-01

    The application of genomic technologies to the study of mRNA processing is increasingly conducted in metazoan organisms in order to understand the complex events that occur during and after transcription. Large-scale systems analyses of mRNA-protein interactions and mRNA dynamics have revealed specificity in mRNA transcription, splicing, transport, translation, and turnover, and have begun to make connections between the different layers of mRNA processing. Here, we review global studies of post-transcriptional processes and discuss the challenges facing our understanding of mRNA regulation in metazoan organisms. In parallel, we examine genome-scale investigations that have expanded our knowledge of RNA-binding proteins and the networks of mRNAs that they regulate.

  11. Digital image hiding technology based on information%基于数字图像的信息隐藏技术探究

    Institute of Scientific and Technical Information of China (English)

    任师迁

    2013-01-01

    In the process of information society,information has become an important resource for social development.With the rapid development of Internet,more and more information is transmitted through the network,the confidentiality,authenticity,the integrity of the information has become a research focus. Introduces the technologies of information hiding in the image concept,classification and development of information hiding technology,vector quantization is analyzed in detail,and points out the development trend of information hiding technology.%  在社会信息化的进程中,信息已经成为社会发展的重要资源。随着互联网的快速发展,越来越多的信息通过网络进行传播,信息的保密性、真实性、完整性逐渐成为研究焦点。介绍了图像中信息隐藏技术的概念、分类和发展,对矢量量化信息隐藏技术进行了重点分析,指出了信息隐藏技术的发展趋势。

  12. Graphics Processing Units for HEP trigger systems

    Science.gov (United States)

    Ammendola, R.; Bauce, M.; Biagioni, A.; Chiozzi, S.; Cotta Ramusino, A.; Fantechi, R.; Fiorini, M.; Giagu, S.; Gianoli, A.; Lamanna, G.; Lonardo, A.; Messina, A.; Neri, I.; Paolucci, P. S.; Piandani, R.; Pontisso, L.; Rescigno, M.; Simula, F.; Sozzi, M.; Vicini, P.

    2016-07-01

    General-purpose computing on GPUs (Graphics Processing Units) is emerging as a new paradigm in several fields of science, although so far applications have been tailored to the specific strengths of such devices as accelerator in offline computation. With the steady reduction of GPU latencies, and the increase in link and memory throughput, the use of such devices for real-time applications in high-energy physics data acquisition and trigger systems is becoming ripe. We will discuss the use of online parallel computing on GPU for synchronous low level trigger, focusing on CERN NA62 experiment trigger system. The use of GPU in higher level trigger system is also briefly considered.

  13. Integrated system for automated financial document processing

    Science.gov (United States)

    Hassanein, Khaled S.; Wesolkowski, Slawo; Higgins, Ray; Crabtree, Ralph; Peng, Antai

    1997-02-01

    A system was developed that integrates intelligent document analysis with multiple character/numeral recognition engines in order to achieve high accuracy automated financial document processing. In this system, images are accepted in both their grayscale and binary formats. A document analysis module starts by extracting essential features from the document to help identify its type (e.g. personal check, business check, etc.). These features are also utilized to conduct a full analysis of the image to determine the location of interesting zones such as the courtesy amount and the legal amount. These fields are then made available to several recognition knowledge sources such as courtesy amount recognition engines and legal amount recognition engines through a blackboard architecture. This architecture allows all the available knowledge sources to contribute incrementally and opportunistically to the solution of the given recognition query. Performance results on a test set of machine printed business checks using the integrated system are also reported.

  14. Graphics Processing Units for HEP trigger systems

    Energy Technology Data Exchange (ETDEWEB)

    Ammendola, R. [INFN Sezione di Roma “Tor Vergata”, Via della Ricerca Scientifica 1, 00133 Roma (Italy); Bauce, M. [INFN Sezione di Roma “La Sapienza”, P.le A. Moro 2, 00185 Roma (Italy); University of Rome “La Sapienza”, P.lee A.Moro 2, 00185 Roma (Italy); Biagioni, A. [INFN Sezione di Roma “La Sapienza”, P.le A. Moro 2, 00185 Roma (Italy); Chiozzi, S.; Cotta Ramusino, A. [INFN Sezione di Ferrara, Via Saragat 1, 44122 Ferrara (Italy); University of Ferrara, Via Saragat 1, 44122 Ferrara (Italy); Fantechi, R. [INFN Sezione di Pisa, Largo B. Pontecorvo 3, 56127 Pisa (Italy); CERN, Geneve (Switzerland); Fiorini, M. [INFN Sezione di Ferrara, Via Saragat 1, 44122 Ferrara (Italy); University of Ferrara, Via Saragat 1, 44122 Ferrara (Italy); Giagu, S. [INFN Sezione di Roma “La Sapienza”, P.le A. Moro 2, 00185 Roma (Italy); University of Rome “La Sapienza”, P.lee A.Moro 2, 00185 Roma (Italy); Gianoli, A. [INFN Sezione di Ferrara, Via Saragat 1, 44122 Ferrara (Italy); University of Ferrara, Via Saragat 1, 44122 Ferrara (Italy); Lamanna, G., E-mail: gianluca.lamanna@cern.ch [INFN Sezione di Pisa, Largo B. Pontecorvo 3, 56127 Pisa (Italy); INFN Laboratori Nazionali di Frascati, Via Enrico Fermi 40, 00044 Frascati (Roma) (Italy); Lonardo, A. [INFN Sezione di Roma “La Sapienza”, P.le A. Moro 2, 00185 Roma (Italy); Messina, A. [INFN Sezione di Roma “La Sapienza”, P.le A. Moro 2, 00185 Roma (Italy); University of Rome “La Sapienza”, P.lee A.Moro 2, 00185 Roma (Italy); and others

    2016-07-11

    General-purpose computing on GPUs (Graphics Processing Units) is emerging as a new paradigm in several fields of science, although so far applications have been tailored to the specific strengths of such devices as accelerator in offline computation. With the steady reduction of GPU latencies, and the increase in link and memory throughput, the use of such devices for real-time applications in high-energy physics data acquisition and trigger systems is becoming ripe. We will discuss the use of online parallel computing on GPU for synchronous low level trigger, focusing on CERN NA62 experiment trigger system. The use of GPU in higher level trigger system is also briefly considered.

  15. Novel serine keratinase from Caldicoprobacter algeriensis exhibiting outstanding hide dehairing abilities.

    Science.gov (United States)

    Bouacem, Khelifa; Bouanane-Darenfed, Amel; Zaraî Jaouadi, Nadia; Joseph, Manon; Hacene, Hocine; Ollivier, Bernard; Fardeau, Marie-Laure; Bejar, Samir; Jaouadi, Bassem

    2016-05-01

    The current paper reports on the purification of an extracellular thermostable keratinase (KERCA) produced from Caldicoprobacter algeriensis strain TH7C1(T), a thermophilic, anaerobic bacterium isolated from a hydrothermal hot spring in Algeria. The maximum keratinase activity recorded after 24-h of incubation at 50 °C was 21000 U/ml. The enzyme was purified by ammonium sulfate precipitation-dialysis and heat treatment (2h at 50 °C) followed by UNO Q-6 FPLC anion exchange chromatography, and submitted to biochemical characterization assays. Matrix assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF/MS) analysis revealed that the purified enzyme was a monomer with a molecular mass of 33246.10 Da. The sequence of the 23 N-terminal residues of KERCA showed high homology with those of bacterial keratinases. Optimal activity was achieved at pH 7 and 50 °C. The enzyme was completely inhibited by phenylmethanesulfonyl fluoride (PMSF) and diiodopropyl fluorophosphates (DFP), which suggests that it belongs to the serine keratinase family. KERCA displayed higher levels of hydrolysis and catalytic efficiency than keratinase KERQ7 from Bacillus tequilensis strain Q7. These properties make KERCA a potential promising and eco-friendly alternative to the conventional chemicals used for the dehairing of goat, sheep, and bovine hides in the leather processing industry.

  16. The Costs of Hiding and Faking Emotions: The Case of Extraverts and Introverts.

    Science.gov (United States)

    Seger-Guttmann, Tali; Medler-Liraz, Hana

    2016-01-01

    The present study examined the moderation effects of extraversion on the relationships between hiding and faking emotions, perceived satisfaction from intimate relationships, and reported physical health concerns. Four hundred and four Israeli participants, who were all involved in intimate relationships at the time of the study, responded to the Extraversion scale from the Big-Five Inventory, the DEELS to measure hiding and faking emotions, the SELF to assess physical health concerns, and the short version of the ENRICH to evaluate perceived satisfaction with intimate relationships. The mean age was 32.3 years (SD = 8.2); and the average length of time as a couple was 7.8 years (SD = 8.2). Of the participants, 198 were married (48.5%). The findings indicate that the effect of hiding negative emotions was stronger for perceived satisfaction with intimate relationships and physical health concerns than that for faking positive emotions. Extraverts who showed a higher frequency of hiding their negative emotions were significantly less satisfied with their relationships than introverts and they also tended to report more concerns with their physical health. These results were not found when extraverts reported a high frequency of faking positive emotions. These results are discussed in the context of the trait-behavior-concordance model and stress the importance of distinguishing faking from hiding.

  17. Biointervention makes leather processing greener: an integrated cleansing and tanning system.

    Science.gov (United States)

    Thanikaivelan, Palanisamy; Rao, Jonnalagadda Raghava; Nair, Balachandran Unni; Ramasami, Thirumalachari

    2003-06-01

    The do-undo methods adopted in conventional leather processing generate huge amounts of pollutants. In other words, conventional methods employed in leather processing subject the skin/hide to wide variations in pH. Pretanning and tanning processes alone contribute more than 90% of the total pollution from leather processing. Included in this is a great deal of solid wastes such as lime and chrome sludge. In the approach described here, the hair and flesh removal as well as fiber opening have been achieved using biocatalysts at pH 8.0 for cow hides. This was followed by a pickle-free chrome tanning, which does not require a basification step. Hence, this tanning technique involves primarily three steps, namely, dehairing, fiber opening, and tanning. It has been found that the extent of hair removal, opening up of fiber bundles, and penetration and distribution of chromium are comparable to that produced by traditional methods. This has been substantiated through scanning electron microscopic, stratigraphic chrome distribution analysis, and softness measurements. Performance of the leathers is shown to be on par with conventionally processed leathers through physical and hand evaluation. Importantly, softness of the leathers is numerically proven to be comparable with that of control. The process also demonstrates reduction in chemical oxygen demand load by 80%, total solids load by 85%, and chromium load by 80% as compared to the conventional process, thereby leading toward zero discharge. The input-output audit shows that the biocatalytic three-step tanning process employs a very low amount of chemicals, thereby reducing the discharge by 90% as compared to the conventional multistep processing. Furthermore, it is also demonstrated that the process is technoeconomically viable.

  18. Advances in Packaging Methods, Processes and Systems

    Directory of Open Access Journals (Sweden)

    Nitaigour Premchand Mahalik

    2014-10-01

    Full Text Available The food processing and packaging industry is becoming a multi-trillion dollar global business. The reason is that the recent increase in incomes in traditionally less economically developed countries has led to a rise in standards of living that includes a significantly higher consumption of packaged foods. As a result, food safety guidelines have been more stringent than ever. At the same time, the number of research and educational institutions—that is, the number of potential researchers and stakeholders—has increased in the recent past. This paper reviews recent developments in food processing and packaging (FPP, keeping in view the aforementioned advancements and bearing in mind that FPP is an interdisciplinary area in that materials, safety, systems, regulation, and supply chains play vital roles. In particular, the review covers processing and packaging principles, standards, interfaces, techniques, methods, and state-of-the-art technologies that are currently in use or in development. Recent advances such as smart packaging, non-destructive inspection methods, printing techniques, application of robotics and machineries, automation architecture, software systems and interfaces are reviewed.

  19. Disease processes as hybrid dynamical systems

    Directory of Open Access Journals (Sweden)

    Pietro Liò

    2012-08-01

    Full Text Available We investigate the use of hybrid techniques in complex processes of infectious diseases. Since predictive disease models in biomedicine require a multiscale approach for understanding the molecule-cell-tissue-organ-body interactions, heterogeneous methodologies are often employed for describing the different biological scales. Hybrid models provide effective means for complex disease modelling where the action and dosage of a drug or a therapy could be meaningfully investigated: the infection dynamics can be classically described in a continuous fashion, while the scheduling of multiple treatment discretely. We define an algebraic language for specifying general disease processes and multiple treatments, from which a semantics in terms of hybrid dynamical system can be derived. Then, the application of control-theoretic tools is proposed in order to compute the optimal scheduling of multiple therapies. The potentialities of our approach are shown in the case study of the SIR epidemic model and we discuss its applicability on osteomyelitis, a bacterial infection affecting the bone remodelling system in a specific and multiscale manner. We report that formal languages are helpful in giving a general homogeneous formulation for the different scales involved in a multiscale disease process; and that the combination of hybrid modelling and control theory provides solid grounds for computational medicine.

  20. Stochastic transport processes in discrete biological systems

    CERN Document Server

    Frehland, Eckart

    1982-01-01

    These notes are in part based on a course for advanced students in the applications of stochastic processes held in 1978 at the University of Konstanz. These notes contain the results of re­ cent studies on the stochastic description of ion transport through biological membranes. In particular, they serve as an introduction to an unified theory of fluctuations in complex biological transport systems. We emphasize that the subject of this volume is not to introduce the mathematics of stochastic processes but to present a field of theoretical biophysics in which stochastic methods are important. In the last years the study of membrane noise has become an important method in biophysics. Valuable information on the ion transport mechanisms in membranes can be obtained from noise analysis. A number of different processes such as the opening and closing of ion channels have been shown to be sources of the measured current or voltage fluctuations. Bio­ logical 'transport systems can be complex. For example, the tr...

  1. A simple method to hide data loggers safely in observation wells.

    Science.gov (United States)

    Lorenzen, Gunnar; Sprenger, Christoph; Pekdeger, Asaf

    2011-01-01

    Submersible data loggers are widely used for groundwater monitoring, but their application often runs the risk of hardware and data loss through vandalism or theft. During a field study in India, the authors of this article experienced that well locks attract the attention of unauthorized persons and do not provide secure protection in unattended areas. To minimize the risk of losing data loggers, a cheap and simple solution has been invented to hide the instruments and associated attachments below the ground surface, inside observation wells. It relies on attaching the logger to a length of small-diameter pipe that is submerged at the bottom of the well, instead of attaching it to the top of the well. The small-diameter pipe with the logger is connected to a small bottle containing a magnet that floats on the water surface of the well and can be recovered using another bottle also with a magnet. A logger that is concealed in this way is difficult to detect and access without knowledge of the method and adequate removal tools. The system was tested and successfully applied for monitoring shallow observation wells at three field sites in Greater Delhi, India. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  2. Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs

    Institute of Scientific and Technical Information of China (English)

    TANG ChunMing; PEI DingYi; WANG XiaoFeng; LIU ZhuoJun

    2008-01-01

    A delegateable signature scheme (DSS) which was first introduced by Barak is mainly based on the non-interactive zero-knowledge proof (NIZK) for preventing the signing verifier from telling which witness (i.e., restricted subset) is being used. However, the scheme is not significantly efficient due to the difficulty of constructing NIZK. We first show that a non-Interactive witness indistinguishable (NIWI) proof sys-tern and a non-interactive witness hiding (NIWH) proof system are easier and more efficient proof models than NIZK in some cases. Furthermore, the witnesses em-ployed in these two protocols (NIWI and NIWT) cannot also be distinguished by the verifiers. Combined with the Σ-protocol, we then construct NlWl and NIWH proofs for any NP statement under the existence of one-way functions and show that each proof is different from those under the existence of trapdoor permutations. Finally, based on our NIWI and NIWH proofs, we construct delegateable signature schemes under the existence of one-way functions, which are more efficient than Barak's scheme under the existence of trapdoor permutations.

  3. HIDES spectroscopy of bright detached eclipsing binaries from the Kepler field - I. Single-lined objects

    Science.gov (United States)

    Hełminiak, K. G.; Ukita, N.; Kambe, E.; Kozłowski, S. K.; Sybilski, P.; Ratajczak, M.; Maehara, H.; Konacki, M.

    2016-09-01

    We present results of our spectroscopic observations of nine detached eclipsing binaries (DEBs), selected from the Kepler Eclipsing Binary Catalog, that only show one set of spectral lines. Radial velocities (RVs) were calculated from the high-resolution spectra obtained with the HIgh-Dispersion Echelle Spectrograph (HIDES) instrument, attached to the 1.88-m telescope at the Okayama Astrophysical Observatory, and from the public Apache Point Observatory Galactic Evolution Experiment archive. In our sample, we found five single-lined binaries, with one component dominating the spectrum. The orbital and light-curve solutions were found for four of them, and compared with isochrones, in order to estimate absolute physical parameters and evolutionary status of the components. For the fifth case, we only update the orbital parameters, and estimate the properties of the unseen star. Two other systems show orbital motion with a period known from the eclipse timing variations (ETVs). For these we obtained parameters of outer orbits, by translating the ETVs to RVs of the centre of mass of the eclipsing binary, and combining with the RVs of the outer star. Of the two remaining ones, one is most likely a blend of a faint background DEB with a bright foreground star, which lines we see in the spectra, and the last case is possibly a quadruple bearing a sub-stellar mass object. Where possible, we compare our results with literature, especially with results from asteroseismology. We also report possible detections of solar-like oscillations in our RVs.

  4. Fault Detection and Control of Process Systems

    Directory of Open Access Journals (Sweden)

    Vu Trieu Minh

    2007-01-01

    Full Text Available This paper develops a stochastic hybrid model-based control system that can determine online the optimal control actions, detect faults quickly in the control process, and reconfigure the controller accordingly using interacting multiple-model (IMM estimator and generalized predictive control (GPC algorithm. A fault detection and control system consists of two main parts: the first is the fault detector and the second is the controller reconfiguration. This work deals with three main challenging issues: design of fault model set, estimation of stochastic hybrid multiple models, and stochastic model predictive control of hybrid multiple models. For the first issue, we propose a simple scheme for designing faults for discrete and continuous random variables. For the second issue, we consider and select a fast and reliable fault detection system applied to the stochastic hybrid system. Finally, we develop a stochastic GPC algorithm for hybrid multiple-models controller reconfiguration with soft switching signals based on weighted probabilities. Simulations for the proposed system are illustrated and analyzed.

  5. NASA Human System Risk Assessment Process

    Science.gov (United States)

    Francisco, D.; Romero, E.

    2016-01-01

    NASA utilizes an evidence based system to perform risk assessments for the human system for spaceflight missions. The center of this process is the multi-disciplinary Human System Risk Board (HSRB). The HSRB is chartered from the Chief Health and Medical Officer (OCHMO) at NASA Headquarters. The HSRB reviews all human system risks via an established comprehensive risk and configuration management plan based on a project management approach. The HSRB facilitates the integration of human research (terrestrial and spaceflight), medical operations, occupational surveillance, systems engineering and many other disciplines in a comprehensive review of human system risks. The HSRB considers all factors that influence human risk. These factors include pre-mission considerations such as screening criteria, training, age, sex, and physiological condition. In mission factors such as available countermeasures, mission duration and location and post mission factors such as time to return to baseline (reconditioning), post mission health screening, and available treatments. All of the factors influence the total risk assessment for each human risk. The HSRB performed a comprehensive review of all potential inflight medical conditions and events and over the course of several reviews consolidated the number of human system risks to 30, where the greatest emphasis is placed for investing program dollars for risk mitigation. The HSRB considers all available evidence from human research and, medical operations and occupational surveillance in assessing the risks for appropriate mitigation and future work. All applicable DRMs (low earth orbit for 6 and 12 months, deep space for 30 days and 1 year, a lunar mission for 1 year, and a planetary mission for 3 years) are considered as human system risks are modified by the hazards associated with space flight such as microgravity, exposure to radiation, distance from the earth, isolation and a closed environment. Each risk has a summary

  6. Electrochemical decontamination system for actinide processing gloveboxes

    Energy Technology Data Exchange (ETDEWEB)

    Wedman, D.E.; Lugo, J.L.; Ford, D.K.; Nelson, T.O.; Trujillo, V.L.; Martinez, H.E.

    1998-03-01

    An electrolytic decontamination technology has been developed and successfully demonstrated at Los Alamos National Laboratory (LANL) for the decontamination of actinide processing gloveboxes. The technique decontaminates the interior surfaces of stainless steel gloveboxes utilizing a process similar to electropolishing. The decontamination device is compact and transportable allowing it to be placed entirely within the glovebox line. In this way, decontamination does not require the operator to wear any additional personal protective equipment and there is no need for additional air handling or containment systems. Decontamination prior to glovebox decommissioning reduces the potential for worker exposure and environmental releases during the decommissioning, transport, and size reduction procedures which follow. The goal of this effort is to reduce contamination levels of alpha emitting nuclides for a resultant reduction in waste level category from High Level Transuranic (TRU) to low Specific Activity (LSA, less than or equal 100 nCi/g). This reduction in category results in a 95% reduction in disposal and disposition costs for the decontaminated gloveboxes. The resulting contamination levels following decontamination by this method are generally five orders of magnitude below the LSA specification. Additionally, the sodium sulfate based electrolyte utilized in the process is fully recyclable which results in the minimum of secondary waste. The process bas been implemented on seven gloveboxes within LANL`s Plutonium Facility at Technical Area 55. Of these gloveboxes, two have been discarded as low level waste items and the remaining five have been reused.

  7. System and process for upgrading hydrocarbons

    Energy Technology Data Exchange (ETDEWEB)

    Bingham, Dennis N.; Klingler, Kerry M.; Smith, Joseph D.; Turner, Terry D.; Wilding, Bruce M.

    2015-08-25

    In one embodiment, a system for upgrading a hydrocarbon material may include a black wax upgrade subsystem and a molten salt gasification (MSG) subsystem. The black wax upgrade subsystem and the MSG subsystem may be located within a common pressure boundary, such as within a pressure vessel. Gaseous materials produced by the MSG subsystem may be used in the process carried out within the black wax upgrade subsystem. For example, hydrogen may pass through a gaseous transfer interface to interact with black wax feed material to hydrogenate such material during a cracking process. In one embodiment, the gaseous transfer interface may include one or more openings in a tube or conduit which is carrying the black wax material. A pressure differential may control the flow of hydrogen within the tube or conduit. Related methods are also disclosed.

  8. Swath mapping system processing: Bathymetry and cartography

    Science.gov (United States)

    Bourillet, J. F.; Edy, C.; Rambert, F.; Satra, C.; Loubrieu, B.

    1996-06-01

    During swath mapping cruises various geophysical data were collected. Bathymetry, imagery and other geophysical information require specialised post-processing. Dedicated software enables post-processing and visualisation of each type of data. A graphic interface collects the files and exports them to a CAD system for cleaning and for adding extra information. The huge amount of soundings from multibeam echo sounder systems and the very particular sampling along and across the ship's track demand powerful software such as TRISMUS provides. Major steps in the processing are the merging of raw soundings with navigation corrected if necessary, the cleaning of soundings with a band-pass filter and the gridding of the data to obtain a Digital Terrain Model. Despite care and real time filtering during the acquisition phase, some errors persist and appear as abnormal patterns on contoured maps. It is often difficult to distinguish the origins of the errors and consequently to correct them in a deterministic way. But the analysis and description of typical patterns allows errors to be classified into five groups — sounding, profile, overlap area, surveyed area or gridding artefact — and in some cases to adopt specific processing techniques to reduce or cancel undesirable effects. Merging bathymetric maps and sonar mosaics can be achieved with IMAGEM or with the high level graphic interface MFEDIT. Since dedicated software splits the information up into different layers, the operator can manage the layers according to the information he wants on the final document. Additional information such as seismic reflection data and interpretation, geological logs and legends, can be imported or created as extra layers.

  9. The snow system: A decentralized medical data processing system.

    Science.gov (United States)

    Bellika, Johan Gustav; Henriksen, Torje Starbo; Yigzaw, Kassaye Yitbarek

    2015-01-01

    Systems for large-scale reuse of electronic health record data is claimed to have the potential to transform the current health care delivery system. In principle three alternative solutions for reuse exist: centralized, data warehouse, and decentralized solutions. This chapter focuses on the decentralized system alternative. Decentralized systems may be categorized into approaches that move data to enable computations or move computations to the where data is located to enable computations. We describe a system that moves computations to where the data is located. Only this kind of decentralized solution has the capabilities to become ideal systems for reuse as the decentralized alternative enables computation and reuse of electronic health record data without moving or exposing the information to outsiders. This chapter describes the Snow system, which is a decentralized medical data processing system, its components and how it has been used. It also describes the requirements this kind of systems need to support to become sustainable and successful in recruiting voluntary participation from health institutions.

  10. System and process for dissolution of solids

    Energy Technology Data Exchange (ETDEWEB)

    Liezers, Martin; Farmer, III, Orville T.

    2017-10-10

    A system and process are disclosed for dissolution of solids and "difficult-to-dissolve" solids. A solid sample may be ablated in an ablation device to generate nanoscale particles. Nanoparticles may then swept into a coupled plasma device operating at atmospheric pressure where the solid nanoparticles are atomized. The plasma exhaust may be delivered directly into an aqueous fluid to form a solution containing the atomized and dissolved solids. The composition of the resulting solution reflects the composition of the original solid sample.

  11. Processing and Linguistics Properties of Adaptable Systems

    Directory of Open Access Journals (Sweden)

    Dumitru TODOROI

    2006-01-01

    Full Text Available Continuation and development of the research in Adaptable Programming Initialization [Tod-05.1,2,3] is presented. As continuation of [Tod-05.2,3] in this paper metalinguistic tools used in the process of introduction of new constructions (data, operations, instructions and controls are developed. The generalization schemes of evaluation of adaptable languages and systems are discussed. These results analogically with [Tod-05.2,3] are obtained by the team, composed from the researchers D. Todoroi [Tod-05.4], Z. Todoroi [ZTod-05], and D. Micusa [Mic-03]. Presented results will be included in the book [Tod-06].

  12. Managing Communication Latency-Hiding at Runtime for Parallel Programming Languages and Libraries

    CERN Document Server

    Kristensen, Mads Ruben Burgdorff

    2012-01-01

    This work introduces a runtime model for managing communication with support for latency-hiding. The model enables non-computer science researchers to exploit communication latency-hiding techniques seamlessly. For compiled languages, it is often possible to create efficient schedules for communication, but this is not the case for interpreted languages. By maintaining data dependencies between scheduled operations, it is possible to aggressively initiate communication and lazily evaluate tasks to allow maximal time for the communication to finish before entering a wait state. We implement a heuristic of this model in DistNumPy, an auto-parallelizing version of numerical Python that allows sequential NumPy programs to run on distributed memory architectures. Furthermore, we present performance comparisons for eight benchmarks with and without automatic latency-hiding. The results shows that our model reduces the time spent on waiting for communication as much as 27 times, from a maximum of 54% to only 2% of t...

  13. Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)

    CERN Document Server

    Jain, Dhyanendra

    2012-01-01

    Association rule mining is an important data-mining technique that finds interesting association among a large set of data items. Since it may disclose patterns and various kinds of sensitive knowledge that are difficult to find otherwise, it may pose a threat to the privacy of discovered confidential information. Such information is to be protected against unauthorized access. Many strategies had been proposed to hide the information. Some use distributed databases over several sites, data perturbation, clustering, and data distortion techniques. Hiding sensitive rules problem, and still not sufficiently investigated, is the requirement to balance the confidentiality of the disclosed data with the legitimate needs of the user. The proposed approach uses the data distortion technique where the position of the sensitive items is altered but its support is never changed. The size of the database remains the same. It uses the idea of representative rules to prune the rules first and then hides the sensitive rule...

  14. SOFC system with integrated catalytic fuel processing

    Energy Technology Data Exchange (ETDEWEB)

    Finnerty, C.; Tompsett, G.A.; Kendall, K.; Ormerod, R.M. [Birchall Centre for Inorganic Chemistry and Materials Science, Keele Univ. (United Kingdom)

    2000-03-01

    In recent years, there has been much interest in the development of solid oxide fuel cell technology operating directly on hydrocarbon fuels. The development of a catalytic fuel processing system, which is integrated with the solid oxide fuel cell (SOFC) power source is outlined here. The catalytic device utilises a novel three-way catalytic system consisting of an in situ pre-reformer catalyst, the fuel cell anode catalyst and a platinum-based combustion catalyst. The three individual catalytic stages have been tested in a model catalytic microreactor. Both temperature-programmed and isothermal reaction techniques have been applied. Results from these experiments were used to design the demonstration SOFC unit. The apparatus used for catalytic characterisation can also perform in situ electrochemical measurements as described in previous papers [C.M. Finnerty, R.H. Cunningham, K. Kendall, R.M. Ormerod, Chem. Commun. (1998) 915-916; C.M. Finnerty, N.J. Coe, R.H. Cunningham, R.M. Ormerod, Catal. Today 46 (1998) 137-145]. This enabled the performance of the SOFC to be determined at a range of temperatures and reaction conditions, with current output of 290 mA cm{sup -2} at 0.5 V, being recorded. Methane and butane have been evaluated as fuels. Thus, optimisation of the in situ partial oxidation pre-reforming catalyst was essential, with catalysts producing high H{sub 2}/CO ratios at reaction temperatures between 873 K and 1173 K being chosen. These included Ru and Ni/Mo-based catalysts. Hydrocarbon fuels were directly injected into the catalytic SOFC system. Microreactor measurements revealed the reaction mechanisms as the fuel was transported through the three-catalyst device. The demonstration system showed that the fuel processing could be successfully integrated with the SOFC stack. (orig.)

  15. SOFC system with integrated catalytic fuel processing

    Science.gov (United States)

    Finnerty, Caine; Tompsett, Geoff. A.; Kendall, Kevin; Ormerod, R. Mark

    In recent years, there has been much interest in the development of solid oxide fuel cell technology operating directly on hydrocarbon fuels. The development of a catalytic fuel processing system, which is integrated with the solid oxide fuel cell (SOFC) power source is outlined here. The catalytic device utilises a novel three-way catalytic system consisting of an in situ pre-reformer catalyst, the fuel cell anode catalyst and a platinum-based combustion catalyst. The three individual catalytic stages have been tested in a model catalytic microreactor. Both temperature-programmed and isothermal reaction techniques have been applied. Results from these experiments were used to design the demonstration SOFC unit. The apparatus used for catalytic characterisation can also perform in situ electrochemical measurements as described in previous papers [C.M. Finnerty, R.H. Cunningham, K. Kendall, R.M. Ormerod, Chem. Commun. (1998) 915-916; C.M. Finnerty, N.J. Coe, R.H. Cunningham, R.M. Ormerod, Catal. Today 46 (1998) 137-145]. This enabled the performance of the SOFC to be determined at a range of temperatures and reaction conditions, with current output of 290 mA cm -2 at 0.5 V, being recorded. Methane and butane have been evaluated as fuels. Thus, optimisation of the in situ partial oxidation pre-reforming catalyst was essential, with catalysts producing high H 2/CO ratios at reaction temperatures between 873 K and 1173 K being chosen. These included Ru and Ni/Mo-based catalysts. Hydrocarbon fuels were directly injected into the catalytic SOFC system. Microreactor measurements revealed the reaction mechanisms as the fuel was transported through the three-catalyst device. The demonstration system showed that the fuel processing could be successfully integrated with the SOFC stack.

  16. Onboard Image Processing System for Hyperspectral Sensor

    Directory of Open Access Journals (Sweden)

    Hiroki Hihara

    2015-09-01

    Full Text Available Onboard image processing systems for a hyperspectral sensor have been developed in order to maximize image data transmission efficiency for large volume and high speed data downlink capacity. Since more than 100 channels are required for hyperspectral sensors on Earth observation satellites, fast and small-footprint lossless image compression capability is essential for reducing the size and weight of a sensor system. A fast lossless image compression algorithm has been developed, and is implemented in the onboard correction circuitry of sensitivity and linearity of Complementary Metal Oxide Semiconductor (CMOS sensors in order to maximize the compression ratio. The employed image compression method is based on Fast, Efficient, Lossless Image compression System (FELICS, which is a hierarchical predictive coding method with resolution scaling. To improve FELICS’s performance of image decorrelation and entropy coding, we apply a two-dimensional interpolation prediction and adaptive Golomb-Rice coding. It supports progressive decompression using resolution scaling while still maintaining superior performance measured as speed and complexity. Coding efficiency and compression speed enlarge the effective capacity of signal transmission channels, which lead to reducing onboard hardware by multiplexing sensor signals into a reduced number of compression circuits. The circuitry is embedded into the data formatter of the sensor system without adding size, weight, power consumption, and fabrication cost.

  17. Automated control system for a mashing process

    Science.gov (United States)

    Teterin, E.; Rudnickiy, V.

    2015-10-01

    The goal of this paper is to describe a system for a mashing process, which is the first part of brewing beer. The mashing is a procedure where the fermentable (and some nonfermentable) sugars are extracted from malts. The program part based on LabVIEW, which is used to control NI CompactRIO. The main target of the project is to reach a predefined levels of the temperatures and maintain it during the pauses. When the necessary break time is ended the system is ready to go to the new value. The precise control of the temperatures during the breaks is one of the critical factors that define the texture and alcohol content of the beer. The system has two tanks with resistors PT'00 in both of them, heat exchanger (coil), heater and pump. The first tank has heating element in order to rise the temperature in the other one. This project has practical solution with all explanations and graphs which are proven working ability of this control system.

  18. Onboard Image Processing System for Hyperspectral Sensor.

    Science.gov (United States)

    Hihara, Hiroki; Moritani, Kotaro; Inoue, Masao; Hoshi, Yoshihiro; Iwasaki, Akira; Takada, Jun; Inada, Hitomi; Suzuki, Makoto; Seki, Taeko; Ichikawa, Satoshi; Tanii, Jun

    2015-09-25

    Onboard image processing systems for a hyperspectral sensor have been developed in order to maximize image data transmission efficiency for large volume and high speed data downlink capacity. Since more than 100 channels are required for hyperspectral sensors on Earth observation satellites, fast and small-footprint lossless image compression capability is essential for reducing the size and weight of a sensor system. A fast lossless image compression algorithm has been developed, and is implemented in the onboard correction circuitry of sensitivity and linearity of Complementary Metal Oxide Semiconductor (CMOS) sensors in order to maximize the compression ratio. The employed image compression method is based on Fast, Efficient, Lossless Image compression System (FELICS), which is a hierarchical predictive coding method with resolution scaling. To improve FELICS's performance of image decorrelation and entropy coding, we apply a two-dimensional interpolation prediction and adaptive Golomb-Rice coding. It supports progressive decompression using resolution scaling while still maintaining superior performance measured as speed and complexity. Coding efficiency and compression speed enlarge the effective capacity of signal transmission channels, which lead to reducing onboard hardware by multiplexing sensor signals into a reduced number of compression circuits. The circuitry is embedded into the data formatter of the sensor system without adding size, weight, power consumption, and fabrication cost.

  19. Comment on "Selective adsorption of tannins onto hide collagen fibres"

    Institute of Scientific and Technical Information of China (English)

    Yuh-Shan; Ho

    2005-01-01

    In a recent publication by Liao et al.[1], the section 1.3 Modeling of adsorption kinetics, authors mentioned a pseudo- second-order model from eq. (3) to eq. (5). In fact, the second order kinetic expression for the adsorption systems of divalent metal ions using sphagnum moss peat has been reported by Ho[2]. In order to distinguish the kinetics equation based on adsorption capacity of solid from concentration of solution, Ho's second order rate expression has been named pseudo-second order[2-5]. The most frequently cited papers were published in Chemical Engineering Journal[3], Process Biochemistry[4] and Water Research[5].……

  20. Comment on "Selective adsorption of tannins onto hide collagen fibres"

    Institute of Scientific and Technical Information of China (English)

    Yuh-Shan Ho

    2005-01-01

    @@ In a recent publication by Liao et al.[1], the section 1.3 Modeling of adsorption kinetics, authors mentioned a pseudo- second-order model from eq. (3) to eq. (5). In fact, the second order kinetic expression for the adsorption systems of divalent metal ions using sphagnum moss peat has been reported by Ho[2]. In order to distinguish the kinetics equation based on adsorption capacity of solid from concentration of solution, Ho's second order rate expression has been named pseudo-second order[2-5]. The most frequently cited papers were published in Chemical Engineering Journal[3], Process Biochemistry[4] and Water Research[5].

  1. Information Processing in Auto-regulated Systems

    Directory of Open Access Journals (Sweden)

    Karl Javorszky

    2003-06-01

    Full Text Available Abstract: We present a model of information processing which is based on two concurrent ways of describing the world, where a description in one of the languages limits the possibilities for realisations in the other language. The two describing dimensions appear in our common sense as dichotomies of perspectives: subjective - objective; diversity - similarity; individual - collective. We abstract from the subjective connotations and treat the test theoretical case of an interval on which several concurrent categories can be introduced. We investigate multidimensional partitions as potential carriers of information and compare their efficiency to that of sequenced carriers. We regard the same assembly once as a contemporary collection, once as a longitudinal sequence and find promising inroads towards understanding information processing by auto-regulated systems. Information is understood to point out that what is the case from among alternatives, which could be the case. We have translated these ideas into logical operations on the set of natural numbers and have found two equivalence points on N where matches between sequential and commutative ways of presenting a state of the world can agree in a stable fashion: a flip-flop mechanism is envisioned. By following this new approach, a mathematical treatment of some poignant biomathematical problems is allowed. Also, the concepts presented in this treatise may well have relevance and applications within the information processing and the theory of language fields.

  2. A statistical hiding algorithm based on self-similar network traffic

    Institute of Scientific and Technical Information of China (English)

    SHA Xue-jun; XU Yu-bin; QIANG Wei

    2008-01-01

    Although the encryption of network packets significantly increases privacy, the density of the traffic can still provide useful information to the observer, and maybe results in the breach of confidentiality. In this paper, we address issues related to hiding information in self-similar network, which is proved to be similar with modem communication network. And a statistical hiding algorithm is proposed for traffic padding. The figures and the comparison of Hurst Parameters before and after traffic padding, show the effective performance of the algorithm.

  3. Reliable Transmission of Audio Streams in Lossy Channels Using Application Level Data Hiding

    Directory of Open Access Journals (Sweden)

    Parag Agarwal

    2008-12-01

    Full Text Available The paper improves the reliability of audio streams in a lossy channel. The mechanism groups audio data samples into source and carrier sets. The carrier set carry the information about the source set which is encoded using data hiding methodology - quantization index modulation. At the receiver side, a missing source data sample can be reconstructed using the carrier set and the remaining source set. Based on reliability constraints a hybrid design combining interleaving and data hiding is presented. Experiments show an improved reliability as compared to forward error correction and interleaving.

  4. INDICATOR AND PATHOGENIC MICROORGANISMS CONTAMINATION OF HIDE OF CATTLE PRESENTED TO FOR SLAUGHTER AND CONTAMINATION OF THE RESULTANT CARCASSES

    Directory of Open Access Journals (Sweden)

    G. Liuzzo

    2011-01-01

    Full Text Available Foodborne pathogens including Escherichia coli O157:H7, Salmonella spp. and Campylobacter spp., can enter the meat chain at multiple points. Animals with excessively dirty hides will represent a risk of cross-contaminations during transport, in the slaughtered house environment and during dressing procedures. The aim of this work was to investigate the relationship among hygiene indicator microorganisms (Enterobacteriaceae and Escherichia coli count, in hide and carcass of cattle presented for slaughter, and different hide cleanliness level in two abattoir (R and F and estimate the prevalence of pathogens Escherichia coli O157:H7, Salmonella spp and Campylobacter spp. in hide and carcass of dirty animals. The results showed that hide Escherichia coli and Enterobacteriaceae count were significantly higher in dirty animals than in clean animals (P<0,05, but carcass contamination were significantly higher in dirty animals than in clean animals only in R abattoir. Escherichia coli O 157:H7 was detected in 19 samples of hide (40,4%, and 2 samples of carcass. Campylobacter jejuni was isolated in 13 samples of hide (25,5% and one sample of carcass. Salmonella spp. were not found in all the samples of hide and carcass.

  5. Integration mockup and process material management system

    Science.gov (United States)

    Verble, Adas James, Jr.

    1992-01-01

    Work to define and develop a full scale Space Station Freedom (SSF) mockup with the flexibility to evolve into future designs, to validate techniques for maintenance and logistics and verify human task allocations and support trade studies is described. This work began in early 1985 and ended in August, 1991. The mockups are presently being used at MSFC in Building 4755 as a technology and design testbed, as well as for public display. Micro Craft also began work on the Process Material Management System (PMMS) under this contract. The PMMS simulator was a sealed enclosure for testing to identify liquids, gaseous, particulate samples, and specimen including, urine, waste water, condensate, hazardous gases, surrogate gasses, liquids, and solids. The SSF would require many trade studies to validate techniques for maintenance and logistics and verify system task allocations; it was necessary to develop a full scale mockup which would be representative of current SSF design with the ease of changing those designs as the SSF design evolved and changed. The tasks defined for Micro Craft were to provide the personnel, services, tools, and materials for the SSF mockup which would consist of four modules, nodes, interior components, and part task mockups of MSFC responsible engineering systems. This included the Engineering Control and Life Support Systems (ECLSS) testbed. For the initial study, the mockups were low fidelity, soft mockups of graphics art bottle, and other low cost materials, which evolved into higher fidelity mockups as the R&D design evolved, by modifying or rebuilding, an important cost saving factor in the design process. We designed, fabricated, and maintained the full size mockup shells and support stands. The shells consisted of cylinders, end cones, rings, longerons, docking ports, crew airlocks, and windows. The ECLSS required a heavier cylinder to support the ECLSS systems test program. Details of this activity will be covered. Support stands were

  6. Thermionic power system power processing and control

    Science.gov (United States)

    Metcalf, Kenneth J.

    1992-01-01

    Thermionic power systems are being considered for space-based miltary applications because of their survivability and high efficiency. Under the direction of the Air Force, conceptual designs were generated for two thermionic power systems to determine preliminary system performance data and direct future component development. This paper discusses the power processing and control (PP&C) subsystem that conditions the thermionic converter power and controls the operation of the reactor and thermionic converter subsystems. The baseline PP&C design and design options are discussed, mass and performance data are provided, and technology needs are identified. The impact on PP&C subsystem mass and efficiency of alternate power levels and boom lengths is also presented. The baseline PP&C subsystem is lightweight and reliable, and it uses proven design concepts to minimize development and testing time. However, the radiation dosages specified in the program research and development announcement (PRDA) are 10 to 100 times the capabilities of present semiconductor devices. While these levels are aggressive, they are considered to be achievable by 1995 if the Air Force and other government agencies continue to actively develop radiation resistant electronics devices for military applications.

  7. Nematodes ultrastructure: complex systems and processes.

    Science.gov (United States)

    Basyoni, Maha M A; Rizk, Enas M A

    2016-12-01

    Nematode worms are among the most ubiquitous organisms on earth. They include free-living forms as well as parasites of plants, insects, humans and other animals. Recently, there has been an explosion of interest in nematode biology, including the area of nematode ultrastructure. Nematodes are round with a body cavity. They have one way guts with a mouth at one end and an anus at the other. They have a pseudocoelom that is lined on one side with mesoderm and on the other side with endoderm. It appears that the cuticle is a very complex and evolutionarily plastic feature with important functions involving protection, body movement and maintaining shape. They only have longitudinal muscles so; they seem to thrash back and forth. While nematodes have digestive, reproductive, nervous and excretory systems, they do not have discrete circulatory or respiratory systems. Nematodes use chemosensory and mechanosensory neurons embedded in the cuticle to orient and respond to a wide range of environmental stimuli. Adults are made up of roughly 1000 somatic cells and hundreds of those cells are typically associated with the reproductive systems. Nematodes ultrastructure seeks to provide studies which enable their use as models for diverse biological processes including; human diseases, immunity, host-parasitic interactions and the expression of phylogenomics. The latter has, however, not been brought into a single inclusive entity. Consequently, in the current review we tried to provide a comprehensive approach to the current knowledge available for nematodes ultrastructures.

  8. Control-based Scheduling in a Distributed Stream Processing System

    OpenAIRE

    2006-01-01

    Stream processing systems receive continuous streams of messages with raw information and produce streams of messages with processed information. The utility of a stream-processing system depends, in part, on the accuracy and timeliness of the output. Streams in complex event processing systems are processed on distributed systems; several steps are taken on different processors to process each incoming message, and messages may be enqueued between steps. This paper de...

  9. ENGINEERED BARRIER SYSTEM FEATURES, EVENTS AND PROCESSES

    Energy Technology Data Exchange (ETDEWEB)

    Jaros, W.

    2005-08-30

    The purpose of this report is to evaluate and document the inclusion or exclusion of engineered barrier system (EBS) features, events, and processes (FEPs) with respect to models and analyses used to support the total system performance assessment for the license application (TSPA-LA). A screening decision, either Included or Excluded, is given for each FEP along with the technical basis for exclusion screening decisions. This information is required by the U.S. Nuclear Regulatory Commission (NRC) at 10 CFR 63.114 (d, e, and f) [DIRS 173273]. The FEPs addressed in this report deal with those features, events, and processes relevant to the EBS focusing mainly on those components and conditions exterior to the waste package and within the rock mass surrounding emplacement drifts. The components of the EBS are the drip shield, waste package, waste form, cladding, emplacement pallet, emplacement drift excavated opening (also referred to as drift opening in this report), and invert. FEPs specific to the waste package, cladding, and drip shield are addressed in separate FEP reports: for example, ''Screening of Features, Events, and Processes in Drip Shield and Waste Package Degradation'' (BSC 2005 [DIRS 174995]), ''Clad Degradation--FEPs Screening Arguments (BSC 2004 [DIRS 170019]), and Waste-Form Features, Events, and Processes'' (BSC 2004 [DIRS 170020]). For included FEPs, this report summarizes the implementation of the FEP in the TSPA-LA (i.e., how the FEP is included). For excluded FEPs, this analysis provides the technical basis for exclusion from TSPA-LA (i.e., why the FEP is excluded). This report also documents changes to the EBS FEPs list that have occurred since the previous versions of this report. These changes have resulted due to a reevaluation of the FEPs for TSPA-LA as identified in Section 1.2 of this report and described in more detail in Section 6.1.1. This revision addresses updates in Yucca Mountain Project

  10. Efficient audio signal processing for embedded systems

    Science.gov (United States)

    Chiu, Leung Kin

    As mobile platforms continue to pack on more computational power, electronics manufacturers start to differentiate their products by enhancing the audio features. However, consumers also demand smaller devices that could operate for longer time, hence imposing design constraints. In this research, we investigate two design strategies that would allow us to efficiently process audio signals on embedded systems such as mobile phones and portable electronics. In the first strategy, we exploit properties of the human auditory system to process audio signals. We designed a sound enhancement algorithm to make piezoelectric loudspeakers sound ”richer" and "fuller." Piezoelectric speakers have a small form factor but exhibit poor response in the low-frequency region. In the algorithm, we combine psychoacoustic bass extension and dynamic range compression to improve the perceived bass coming out from the tiny speakers. We also developed an audio energy reduction algorithm for loudspeaker power management. The perceptually transparent algorithm extends the battery life of mobile devices and prevents thermal damage in speakers. This method is similar to audio compression algorithms, which encode audio signals in such a ways that the compression artifacts are not easily perceivable. Instead of reducing the storage space, however, we suppress the audio contents that are below the hearing threshold, therefore reducing the signal energy. In the second strategy, we use low-power analog circuits to process the signal before digitizing it. We designed an analog front-end for sound detection and implemented it on a field programmable analog array (FPAA). The system is an example of an analog-to-information converter. The sound classifier front-end can be used in a wide range of applications because programmable floating-gate transistors are employed to store classifier weights. Moreover, we incorporated a feature selection algorithm to simplify the analog front-end. A machine

  11. Signal processing by the endosomal system.

    Science.gov (United States)

    Villaseñor, Roberto; Kalaidzidis, Yannis; Zerial, Marino

    2016-04-01

    Cells need to decode chemical or physical signals from their environment in order to make decisions on their fate. In the case of signalling receptors, ligand binding triggers a cascade of chemical reactions but also the internalization of the activated receptors in the endocytic pathway. Here, we highlight recent studies revealing a new role of the endosomal network in signal processing. The diversity of entry pathways and endosomal compartments is exploited to regulate the kinetics of receptor trafficking, and interactions with specific signalling adaptors and effectors. By governing the spatio-temporal distribution of signalling molecules, the endosomal system functions analogously to a digital-analogue computer that regulates the specificity and robustness of the signalling response.

  12. Assessing biosphere feedbacks on Earth System Processes

    Science.gov (United States)

    McElwain, Jennifer

    2016-04-01

    The evolution and ecology of plant life has been shaped by the direct and indirect influence of plate tectonics. Climatic change and environmental upheaval associated with the emplacement of large igneous provinces have triggered biosphere level ecological change, physiological modification and pulses of both extinction and origination. This talk will investigate the influence of large scale changes in atmospheric composition on plant ecophysiology at key intervals of the Phanerozoic. Furthermore, I will assess the extent to which plant ecophysiological response can in turn feedback on earth system processes such as the global hydrological cycle and biogeochemical cycling of nitrogen and carbon. Palaeo-atmosphere simulation experiments, palaeobotanical data and recent historical (last 50 years) data-model comparison will be used to address the extent to which plant physiological responses to atmospheric CO2 can modulate global climate change via biosphere level feedback.

  13. Dynamics of ranking processes in complex systems.

    Science.gov (United States)

    Blumm, Nicholas; Ghoshal, Gourab; Forró, Zalán; Schich, Maximilian; Bianconi, Ginestra; Bouchaud, Jean-Philippe; Barabási, Albert-László

    2012-09-21

    The world is addicted to ranking: everything, from the reputation of scientists, journals, and universities to purchasing decisions is driven by measured or perceived differences between them. Here, we analyze empirical data capturing real time ranking in a number of systems, helping to identify the universal characteristics of ranking dynamics. We develop a continuum theory that not only predicts the stability of the ranking process, but shows that a noise-induced phase transition is at the heart of the observed differences in ranking regimes. The key parameters of the continuum theory can be explicitly measured from data, allowing us to predict and experimentally document the existence of three phases that govern ranking stability.

  14. Range Query Processing in Multidisk Systems

    Institute of Scientific and Technical Information of China (English)

    李建中

    1992-01-01

    In order to reduce the disk access time,a database can be stored on several simultaneously accessible disks.In this paper,we are concerned with the dynamic d-attribute database allocation problem for range queries,An allocation method,called coordinate moule allocation method,is proposed to allocate data in a d-attribute database among disks so that the maximum disk accessing concurrency can be achieved for range queries.Our analysis and experiments show that the method achieves the optimum or near-optimum parallelism for range queries.The paper offers the conditions under which the method is optimal .The worst case bounds of the performance of the method are also given.In addition,the parallel algorithm of processing range queries in described at the end of the paper.The method has been used in the statistic and scientific database management system whic is being designed by us.

  15. AHTR Refueling Systems and Process Description

    Energy Technology Data Exchange (ETDEWEB)

    Varma, V.K.; Holcomb, D.E.; Bradley, E.C.; Zaharia, N.M.; Cooper, E.J.

    2012-07-15

    The Advanced High-Temperature Reactor (AHTR) is a design concept for a central station-type [1500 MW(e)] Fluoride salt–cooled High-temperature Reactor (FHR) that is currently undergoing development by Oak Ridge National Laboratory for the US. Department of Energy, Office of Nuclear Energy’s Advanced Reactor Concepts program. FHRs, by definition, feature low-pressure liquid fluoride salt cooling, coated-particle fuel, a high-temperature power cycle, and fully passive decay heat rejection. The overall goal of the AHTR development program is to demonstrate the technical feasibility of FHRs as low-cost, large-size power producers while maintaining full passive safety. The AHTR is approaching a preconceptual level of maturity. An initial integrated layout of its major systems, structures, and components (SSCs), and an initial, high-level sequence of operations necessary for constructing and operating the plant is nearing completion. An overview of the current status of the AHTR concept has been recently published [1], and a report providing a more detailed overview of the AHTR structures and mechanical systems is currently in preparation. This report documents the refueling components and processes envisioned at this early development phase. The report is limited to the refueling aspects of the AHTR and does not include overall reactor or power plant design information. The report, however, does include a description of the materials envisioned for the various components and the instrumentation necessary to control the refueling process. The report begins with an overview of the refueling strategy. Next a mechanical description of the AHTR fuel assemblies and core is provided. The reactor vessel upper assemblies are then described. Following this the refueling path structures and the refueling mechanisms and components are described. The sequence of operations necessary to fuel and defuel the reactor is then discussed. The report concludes with a discussion of the

  16. AHTR Refueling Systems and Process Description

    Energy Technology Data Exchange (ETDEWEB)

    Varma, Venugopal Koikal [ORNL; Holcomb, David Eugene [ORNL; Bradley, Eric Craig [ORNL; Zaharia, Nathaniel M [ORNL; Cooper, Eliott J [ORNL

    2012-07-01

    The Advanced High-Temperature Reactor (AHTR) is a design concept for a central station-type [1500 MW(e)] Fluoride salt-cooled High-temperature Reactor (FHR) that is currently undergoing development by Oak Ridge National Laboratory for the US. Department of Energy, Office of Nuclear Energy's Advanced Reactor Concepts program. FHRs, by definition, feature low-pressure liquid fluoride salt cooling, coated-particle fuel, a high-temperature power cycle, and fully passive decay heat rejection. The overall goal of the AHTR development program is to demonstrate the technical feasibility of FHRs as low-cost, large-size power producers while maintaining full passive safety. The AHTR is approaching a preconceptual level of maturity. An initial integrated layout of its major systems, structures, and components (SSCs), and an initial, high-level sequence of operations necessary for constructing and operating the plant is nearing completion. An overview of the current status of the AHTR concept has been recently published and a report providing a more detailed overview of the AHTR structures and mechanical systems is currently in preparation. This report documents the refueling components and processes envisioned at this early development phase. The report is limited to the refueling aspects of the AHTR and does not include overall reactor or power plant design information. The report, however, does include a description of the materials envisioned for the various components and the instrumentation necessary to control the refueling process. The report begins with an overview of the refueling strategy. Next a mechanical description of the AHTR fuel assemblies and core is provided. The reactor vessel upper assemblies are then described. Following this the refueling path structures and the refueling mechanisms and components are described. The sequence of operations necessary to fuel and defuel the reactor is then discussed. The report concludes with a discussion of the

  17. NASA's Earth Science Data Systems Standards Process

    Science.gov (United States)

    Ullman, R.; Enloe, Y.

    2006-12-01

    Starting in January 2004, NASA instituted a set of internal working groups to develop ongoing recommendations for the continuing broad evolution of Earth Science Data Systems development and management within NASA. One of these Data Systems Working Groups is called the Standards Process Group (SPG). This group's goal is to facilitate broader use of standards that have proven implementation and operational benefit to NASA Earth science by facilitating the approval of proposed standards and directing the evolution of standards. We have found that the candidate standards that self defined communities are proposing for approval to the SPG are one of 3 types: (1) A NASA community developed standard used within at least one self defined community where the proposed standard has not been approved or adopted by an external standards organization and where new implementations are expected to be developed from scratch, using the proposed standard as the implementation specification; (2) A NASA community developed standard used within at least one self defined community where the proposed standard has not been approved or adopted by an external standards organization and where new implementations are not expected to be developed from scratch but use existing software libraries or code;. (3) A standard already approved by an external standards organization but is being proposed for use for the NASA Earth science community. There are 3 types of reviews potentially needed to evaluate a proposed standard: (1) A detailed technical review to determine the quality, accuracy, and clarity of the proposed specification and where a detailed technical review ensures that implementers can use the proposed standard as an implementation specification for any future implementations with confidence; (2) A "usefulness" user review that determines if the proposed standard is useful or helpful or necessary to the user to carry out his work; (3) An operational review that evaluates if the

  18. Microbial assessment of an upward and downward dehiding technique in a commercial beef processing plant.

    Science.gov (United States)

    Kennedy, Thomas G; Giotis, Efstathios S; McKevitt, Aideen I

    2014-08-01

    Preventing microbial contamination during dehiding is challenging, and skinning methods are of critical importance for the hygienic status of beef carcasses. Two skinning methods are usually employed: upward hide pulling (UHP) and downward hide pulling (DHP). This study has compared the microbiological contamination of carcasses using both systems in a beef processing plant in the process of changing its dehiding method from UHP to DHP. 100 cm(2) areas from eight carcass sites (ham, chuck, rump, bung, flank, brisket, shin and neck) were sampled on 36 skinned carcasses dehided by each technique. Total viable counts (TVCs) and Enterobacteriaceae counts for each site were determined. No significant differences were observed in total (pooled-samples) carcass contamination regardless of the method used. However, significant differences (pHACCP pre-requisite programmes, and are not necessarily associated with the skinning method per se.

  19. Hiding an Inconvenient Truth : Lies and Vagueness (Revision of DP 2008-107)

    NARCIS (Netherlands)

    Serra Garcia, M.; van Damme, E.E.C.; Potters, J.J.M.

    2010-01-01

    When truth conflicts with efficiency, can verbal communication destroy efficiency? Or are lies or vagueness used to hide inconvenient truths? We consider a sequential 2-player public good game in which the leader has private information about the value of the public good. This value can be low, high

  20. Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

    Directory of Open Access Journals (Sweden)

    Rhythm Katira

    2013-04-01

    Full Text Available The rise in the use of internet, secure transmission of the data has become an utmost priority. Steganography makes the data invisible by hiding it in the multimedia such as image, audio or video file and thereby covering for its existence. In this project we use prediction error (PE technique steganography and Least Significant Bit (LSB substitution method to hide data in the image. As we do PE expansion method it can lead to expansion of pixels like it can lead to pixel value above 255. In order to solve this problem, we restricted the pixel values between 15 and 240.The PSNR was high at low threshold values. The hiding capacity increased with increase in threshold with a reasonable decrease in PSNR. There was 2dB difference then other methods because of high data hiding capacity. Also we have used knight’s tour for increasing the security of data hidden. In comparison to other methodology, this methodology proves to be better and more effective.

  1. A NOVEL APPROACH OF SECURE COMMUNICATION BASED ON THE TECHNIQUE OF SPEECH INFORMATION HIDING

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    The proposed secure communication approach adopts the proposed algorithm of Analysis-BySynthesis (ABS) speech information hiding to establish a Secret Speech Subliminal Channel (SSSC) for speech secure communication over PSTN (Public Switched Telephone Network), and employs the algorithm of ABS speech information extracting to recovery the secret information. This approach is more reliable, covert and securable than traditional and chaotic secure communication.

  2. Effect of hiding places, straw and territory on agression in group-housed rabbit does

    NARCIS (Netherlands)

    Rommers, J.M.; Reuvekamp, B.F.J.; Gunnink, H.; Jong, de I.C.

    2014-01-01

    Group-housing of rabbit does may be preferred from welfare point of view. However, group-housing causes agonistic behaviour which may cause severe injuries. Severe injuries may be prevented by offering hiding places for attacked does. Providing enrichment (straw) may reduce agonistic behaviour by at

  3. Theory of Neural Information Processing Systems

    Energy Technology Data Exchange (ETDEWEB)

    Galla, Tobias [Abdus Salam International Centre for Theoretical Physics and INFM/CNR SISSA-Unit, Strada Costiera 11, I-34014 Trieste (Italy)

    2006-04-07

    It is difficult not to be amazed by the ability of the human brain to process, to structure and to memorize information. Even by the toughest standards the behaviour of this network of about 10{sup 11} neurons qualifies as complex, and both the scientific community and the public take great interest in the growing field of neuroscience. The scientific endeavour to learn more about the function of the brain as an information processing system is here a truly interdisciplinary one, with important contributions from biology, computer science, physics, engineering and mathematics as the authors quite rightly point out in the introduction of their book. The role of the theoretical disciplines here is to provide mathematical models of information processing systems and the tools to study them. These models and tools are at the centre of the material covered in the book by Coolen, Kuehn and Sollich. The book is divided into five parts, providing basic introductory material on neural network models as well as the details of advanced techniques to study them. A mathematical appendix complements the main text. The range of topics is extremely broad, still the presentation is concise and the book well arranged. To stress the breadth of the book let me just mention a few keywords here: the material ranges from the basics of perceptrons and recurrent network architectures to more advanced aspects such as Bayesian learning and support vector machines; Shannon's theory of information and the definition of entropy are discussed, and a chapter on Amari's information geometry is not missing either. Finally the statistical mechanics chapters cover Gardner theory and the replica analysis of the Hopfield model, not without being preceded by a brief introduction of the basic concepts of equilibrium statistical physics. The book also contains a part on effective theories of the macroscopic dynamics of neural networks. Many dynamical aspects of neural networks are usually hard

  4. Information hiding techniques for infrared images: exploring the state-of-the art and challenges

    Science.gov (United States)

    Pomponiu, Victor; Cavagnino, Davide; Botta, Marco; Nejati, Hossein

    2015-10-01

    The proliferation of Infrared technology and imaging systems enables a different perspective to tackle many computer vision problems in defense and security applications. Infrared images are widely used by the law enforcement, Homeland Security and military organizations to achieve a significant advantage or situational awareness, and thus is vital to protect these data against malicious attacks. Concurrently, sophisticated malware are developed which are able to disrupt the security and integrity of these digital media. For instance, illegal distribution and manipulation are possible malicious attacks to the digital objects. In this paper we explore the use of a new layer of defense for the integrity of the infrared images through the aid of information hiding techniques such as watermarking. In this context, we analyze the efficiency of several optimal decoding schemes for the watermark inserted into the Singular Value Decomposition (SVD) domain of the IR images using an additive spread spectrum (SS) embedding framework. In order to use the singular values (SVs) of the IR images with the SS embedding we adopt several restrictions that ensure that the values of the SVs will maintain their statistics. For both the optimal maximum likelihood decoder and sub-optimal decoders we assume that the PDF of SVs can be modeled by the Weibull distribution. Furthermore, we investigate the challenges involved in protecting and assuring the integrity of IR images such as data complexity and the error probability behavior, i.e., the probability of detection and the probability of false detection, for the applied optimal decoders. By taking into account the efficiency and the necessary auxiliary information for decoding the watermark, we discuss the suitable decoder for various operating situations. Experimental results are carried out on a large dataset of IR images to show the imperceptibility and efficiency of the proposed scheme against various attack scenarios.

  5. ENGINEERED BARRIER SYSTEM FEATURES, EVENTS, AND PROCESSES

    Energy Technology Data Exchange (ETDEWEB)

    na

    2005-05-30

    This analysis report is one of the technical reports containing documentation of the Environmental Radiation Model for Yucca Mountain, Nevada (ERMYN), a biosphere model supporting the total system performance assessment (TSPA) for the license application (LA) for the Yucca Mountain repository. This analysis report describes the development of biosphere dose conversion factors (BDCFs) for the volcanic ash exposure scenario, and the development of dose factors for calculating inhalation dose during volcanic eruption. A graphical representation of the documentation hierarchy for the ERMYN is presented in Figure 1 - 1. This figure shows the interrelationships among the products (i.e., analysis and model reports) developed for biosphere modeling and provides an understanding of how this analysis report contributes to biosphere modeling. This report is one of two reports that develop biosphere BDCFs, which are input parameters for the TSPA model. The ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) describes in detail the ERMYN conceptual model and mathematical model. The input parameter reports, shown to the right of the Biosphere Model Report in Figure 1-1, contain detailed descriptions of the model input parameters, their development and the relationship between the parameters and specific features, events and processes (FEPs). This report describes biosphere model calculations and their output, the BDCFs, for the volcanic ash exposure scenario. This analysis receives direct input from the outputs of the ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) and from the five analyses that develop parameter values for the biosphere model (BSC 2005 [DIRS 172827]; BSC 2004 [DIRS 169672]; BSC 2004 [DIRS 169673]; BSC 2004 [DIRS 169458]; and BSC 2004 [DIRS 169459]). The results of this report are further analyzed in the ''Biosphere Dose Conversion Factor Importance and Sensitivity Analysis'' (Figure 1 - 1). The

  6. Annuitants Added to the Annuity Roll Processing System (ARPS)

    Data.gov (United States)

    Office of Personnel Management — Small table showing the total Civil Service Retirement System (CSRS) and Federal Employees Retirement System (FERS) Annuitants added to the Annuity Roll Processing...

  7. Digital processing system for developing countries

    Science.gov (United States)

    Nanayakkara, C.; Wagner, H.

    1977-01-01

    An effort was undertaken to perform simple digital processing tasks using pre-existing general purpose digital computers. An experimental software package, LIGMALS, was obtained and modified for this purpose. The resulting software permits basic processing tasks to be performed including level slicing, gray mapping and ratio processing. The experience gained in this project indicates a possible direction which may be used by other developing countries to obtain digital processing capabilities.

  8. Another language, another place: to hide or be found?

    Science.gov (United States)

    Antinucci, Giuseppina

    2004-10-01

    The author examines some specific features of the analytic encounter when both patient and analyst are émigrés from the same cultural and linguistic background. This can result in splitting processes that operate silently and are difficult to reach, but can also provide rich material, as they offer the couple the opportunity to work through the pain and the guilt over what is lost--ultimately the lost mother--murdered and betrayed. Working through the split faces the analyst with important technical considerations, bearing in mind that the shared cultural identity can conceal itself in the more undifferentiated features of the couple's psyche and be projected on to the setting. As such, it needs to be put to analytic scrutiny if the treatment is to avoid a stalemate. These are specific cultural defences deployed in the problematic existential encounter with the foreigner/other within oneself. Using clinical material from two cases, the author shows how the couple's access to a dual linguistic signifying system can enrich the analytic dialogue, but can also result in enactment. Careful monitoring of the transference-countertransference relationship is essential to the progress of the analytic work.

  9. Data processing for water monitoring system

    Science.gov (United States)

    Monford, L.; Linton, A. T.

    1978-01-01

    Water monitoring data acquisition system is structured about central computer that controls sampling and sensor operation, and analyzes and displays data in real time. Unit is essentially separated into two systems: computer system, and hard wire backup system which may function separately or with computer.

  10. Standardization of Information Systems Development Processes and Banking Industry Adaptations

    OpenAIRE

    Tuna Ozcer; Zuhal Tanrikulu

    2011-01-01

    This paper examines the current system development processes of three major Turkish banks in terms of compliance to internationally accepted system development and software engineering standards to determine the common process problems of banks. After an in-depth investigation into system development and software engineering standards, related process-based standards were selected. Questions were then prepared covering the whole system development process by applying the classical Waterfall l...

  11. Second International Conference on Communications, Signal Processing, and Systems

    CERN Document Server

    Mu, Jiasong; Wang, Wei; Liang, Qilian; Pi, Yiming

    2014-01-01

    The Proceedings of The Second International Conference on Communications, Signal Processing, and Systems provides the state-of-art developments of Communications, Signal Processing, and Systems. The conference covered such topics as wireless communications, networks, systems, signal processing for communications. This book is a collection of contributions coming out of The Second International Conference on Communications, Signal Processing, and Systems (CSPS) held September 2013 in Tianjin, China.

  12. Modeling and Advanced Control for Sustainable Process Systems

    Science.gov (United States)

    This book chapter introduces a novel process systems engineering framework that integrates process control with sustainability assessment tools for the simultaneous evaluation and optimization of process operations. The implemented control strategy consists of a biologically-insp...

  13. AIRSAR Automated Web-based Data Processing and Distribution System

    Science.gov (United States)

    Chu, Anhua; vanZyl, Jakob; Kim, Yunjin; Lou, Yunling; Imel, David; Tung, Wayne; Chapman, Bruce; Durden, Stephen

    2005-01-01

    In this paper, we present an integrated, end-to-end synthetic aperture radar (SAR) processing system that accepts data processing requests, submits processing jobs, performs quality analysis, delivers and archives processed data. This fully automated SAR processing system utilizes database and internet/intranet web technologies to allow external users to browse and submit data processing requests and receive processed data. It is a cost-effective way to manage a robust SAR processing and archival system. The integration of these functions has reduced operator errors and increased processor throughput dramatically.

  14. INFORMATION SUPPORT TRANSPORTATION PROCESS MULTIMODAL SYSTEM

    Directory of Open Access Journals (Sweden)

    N. A. Filippova

    2015-02-01

    Full Text Available Background: is to improve information support for the organization and functioning of multimodal systems delive-ry modes of transport in the northern regions of the Russian Federation on the basis of the development of theoretical and methodological and practical provisions, criteria, methods and mathematical models.Method or methodology of the work: a methodology placement vehicle logistics center (TLC in the Nordic region, providing links all transport modes involved in the delivery of energy, developed a model to optimize the parameters of the transport network, used for traffic, the most effective schemes of delivery of goods in multimodal report, taking into account the specifics of the Nordic region, and funding.Results: Studies have applied and may be used by the fe-deral and regional authorities and management in the deve-lopment of integrated programs for energy-Northern regions. Proposed in the theoretical research and methodological approaches are one way to increase the efficiency of the delivery of goods in the event of a little predictable situations on the route, TLC and transhipment points. The developed techniques are used and can be used to improve the northern region of the process control of cargo delivery.Conclusion: Therefore, based on the analysis of the status of the issue, it is quite obvious that the very topical area of optimization of the transport needs of the region to ensure the development and implementation of methods to improve the efficiency and quality of freight traffic by improving organizational structures and technology traffic control all transport space in the region.

  15. 21 CFR 864.9145 - Processing system for frozen blood.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Processing system for frozen blood. 864.9145... Blood and Blood Products § 864.9145 Processing system for frozen blood. (a) Identification. A processing system for frozen blood is a device used to glycerolize red blood cells prior to freezing to...

  16. 3rd International Conference on Communications, Signal Processing, and Systems

    CERN Document Server

    Liang, Qilian; Wang, Wei; Zhang, Baoju; Pi, Yiming

    2015-01-01

    The Proceedings of The Third International Conference on Communications, Signal Processing, and Systems provides the state-of-art developments of communications, signal processing, and systems. This book is a collection of contributions from the conference and covers such topics as wireless communications, networks, systems, and signal processing for communications. The conference was held July 2014 in Hohhot, Inner Mongolia, China.

  17. Biocatalytic process development using microfluidic miniaturized systems

    DEFF Research Database (Denmark)

    Krühne, Ulrich; Heintz, Søren; Ringborg, Rolf Hoffmeyer

    2014-01-01

    The increasing interest in biocatalytic processes means there is a clear need for a new systematic development paradigm which encompasses both protein engineering and process engineering. This paper argues that through the use of a new microfluidic platform, data can be collected more rapidly...... and integrated with process modeling, can provide the basis for validating a reduced number of potential processes. The miniaturized platform should use a smaller reagent inventory and make better use of precious biocatalysts. The EC funded BIOINTENSE project will use ω-transaminase based synthesis of chiral...

  18. Process integration: Cooling water systems design

    CSIR Research Space (South Africa)

    Gololo, KV

    2010-10-01

    Full Text Available This paper presents a technique for grassroot design of cooling water system for wastewater minimization which incorporates the performances of the cooling towers involved. The study focuses mainly on cooling systems consisting of multiple cooling...

  19. Localised processing power for CAMAC systems

    CERN Document Server

    Iselin, F Christoph; Ponting, P

    1975-01-01

    Implantation of localised processors in a system can often enhance the efficacy of CAMAC. Some typical localised processors are presented and an indication given of how appropriate positioning within a CAMAC system can minimize the effect of some of the restrictive characteristics of source data and system configuration. (6 refs).

  20. Processing in (linear) systems with stochastic input

    Science.gov (United States)

    Nutu, Catalin Silviu; Axinte, Tiberiu

    2016-12-01

    The paper is providing a different approach to real-world systems, such as micro and macro systems of our real life, where the man has little or no influence on the system, either not knowing the rules of the respective system or not knowing the input of the system, being thus mainly only spectator of the system's output. In such a system, the input of the system and the laws ruling the system could be only "guessed", based on intuition or previous knowledge of the analyzer of the respective system. But, as we will see in the paper, it exists also another, more theoretical and hence scientific way to approach the matter of the real-world systems, and this approach is mostly based on the theory related to Schrödinger's equation and the wave function associated with it and quantum mechanics as well. The main results of the paper are regarding the utilization of the Schrödinger's equation and related theory but also of the Quantum mechanics, in modeling real-life and real-world systems.

  1. Comparison of methods for the enumeration of enterohemorrhagic Escherichia coli from veal hides and carcasses

    Directory of Open Access Journals (Sweden)

    Brandon E Luedtke

    2015-09-01

    Full Text Available The increased association of enterohemorrhagic Escherichia coli (EHEC with veal calves has led the United States Department of Agriculture Food Safety and Inspection Service to report results of veal meat contaminated with the Top 7 serogroups separately from beef cattle. However, detection methods that can also provide concentration for determining the prevalence and abundance of EHEC associated with veal are lacking. Here we compared the ability of qPCR and a molecular based most probable number assay (MPN to detect and enumerate EHEC from veal hides at the abattoir and the resulting pre-intervention carcasses. In addition, digital PCR (dPCR was used to analyze select samples. The qPCR assay was able to enumerate total EHEC in 32% of the hide samples with a range of approximately 34 to 91,412 CFUs/100 cm2 (95% CI 4-113,460 CFUs/100 cm2. Using the MPN assay, total EHEC was enumerable in 48% of the hide samples and ranged from approximately 1 to greater than 17,022 CFUs/100 cm2 (95% CI 0.4-72,000 CFUs/100 cm2. The carcass samples had lower amounts of EHEC with a range of approximately 4 to 275 CFUs/100 cm2 (95% CI 3-953 CFUs/100 cm2 from 17% of samples with an enumerable amount of EHEC by qPCR. For the MPN assay, the carcass samples ranged from 0.1 to 1 CFUs/100 cm2 (95% CI 0.02-4 CFUs/100 cm2 from 29% of the samples. The correlation coefficient between the qPCR and MPN enumeration methods indicated a moderate relation (R2=0.39 for the hide samples while the carcass samples had no relation (R2=0.002, which was likely due to most samples having an amount of total EHEC below the reliable limit of quantification for qPCR. Interestingly, after enrichment, 81% of the hide samples and 94% of the carcass samples had a detectable amount of total EHEC by qPCR. From our analysis, the MPN assay provided a higher percentage of enumerable hide and carcass samples, however determining an appropriate dilution range and the limited throughput offer additional

  2. Processing information system for highly specialized information in corporate networks

    Science.gov (United States)

    Petrosyan, M. O.; Kovalev, I. V.; Zelenkov, P. V.; Brezitskaya, VV; Prohorovich, G. A.

    2016-11-01

    The new structure for formation system and management system for highly specialized information in corporate systems is offered. The main distinguishing feature of this structure is that it involves the processing of multilingual information in a single user request.

  3. Processes, Forms Of Sport Management System

    Directory of Open Access Journals (Sweden)

    Gheorghe Jinga

    2013-05-01

    Full Text Available The process of instructing the sportsmen has always been a complex and thorough activity, that requests profundity, professional sensitivity and bonding. The main characters in this process are played by managers, coaches, trainers, methodists, psychologists, sociologists, technicians who establish and hand over theoretical knowledge, abilitiesand skills for the sportsmen. In this way is being created the environment for instructing and highlighting the physical, technical, tactical and psychic potential of the participants in competitions. The training process of the sportsmen is more and more headed towards the integral and deep internalization of the instructive components, based on the interconnections between the elements of modern sport science.

  4. Power system operations: State estimation distributed processing

    Science.gov (United States)

    Ebrahimian, Mohammad Reza

    We present an application of a robust and fast parallel algorithm to power system state estimation with minimal amount of modifications to existing state estimators presently in place using the Auxiliary Problem Principle. We demonstrate its effectiveness on IEEE test systems, the Electric Reliability Counsel of Texas (ERCOT), and the Southwest Power Pool (SPP) systems. Since state estimation formulation may lead to an ill-conditioned system, we provide analytical explanations of the effects of mixtures of measurements on the condition of the state estimation information matrix. We demonstrate the closeness of the analytical equations to condition of several test case systems including IEEE RTS-96 and IEEE 118 bus systems. The research on the condition of the state estimation problem covers the centralized as well as distributed state estimation.

  5. Reliable High Performance Processing System (RHPPS) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — NASA's exploration, science, and space operations systems are critically dependent on the hardware technologies used in their implementation. Specifically, the...

  6. National Recordal System IK holder catalogue process

    CSIR Research Space (South Africa)

    Pretorius, R

    2011-11-01

    Full Text Available and Culture in Mexico. [3] Eriksson, Mats; Niitamo, Veli-Pekka; Kulkki Seija. 2005 State of the art in utilizing Living Labs approach to user centric ICT innovation ? a European approach. Figure 3: NRS catalogue process ...

  7. Digital signal processing in communication systems

    CERN Document Server

    Frerking, Marvin E

    1994-01-01

    An engineer's introduction to concepts, algorithms, and advancements in Digital Signal Processing. This lucidly written resource makes extensive use of real-world examples as it covers all the important design and engineering references.

  8. Intelligent Signal Processing for Detection System Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Fu, C Y; Petrich, L I; Daley, P F; Burnham, A K

    2004-06-18

    A wavelet-neural network signal processing method has demonstrated approximately tenfold improvement in the detection limit of various nitrogen and phosphorus compounds over traditional signal-processing methods in analyzing the output of a thermionic detector attached to the output of a gas chromatograph. A blind test was conducted to validate the lower detection limit. All fourteen of the compound spikes were detected when above the estimated threshold, including all three within a factor of two above. In addition, two of six were detected at levels 1/2 the concentration of the nominal threshold. We would have had another two correct hits if we had allowed human intervention to examine the processed data. One apparent false positive in five nulls was traced to a solvent impurity, whose presence was identified by running a solvent aliquot evaporated to 1% residual volume, while the other four nulls were properly classified. We view this signal processing method as broadly applicable in analytical chemistry, and we advocate that advanced signal processing methods be applied as directly as possible to the raw detector output so that less discriminating preprocessing and post-processing does not throw away valuable signal.

  9. Intelligent Signal Processing for Detection System Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Fu, C Y; Petrich, L I; Daley, P F; Burnham, A K

    2004-12-05

    A wavelet-neural network signal processing method has demonstrated approximately tenfold improvement over traditional signal-processing methods for the detection limit of various nitrogen and phosphorus compounds from the output of a thermionic detector attached to a gas chromatograph. A blind test was conducted to validate the lower detection limit. All fourteen of the compound spikes were detected when above the estimated threshold, including all three within a factor of two above the threshold. In addition, two of six spikes were detected at levels of 1/2 the concentration of the nominal threshold. Another two of the six would have been detected correctly if we had allowed human intervention to examine the processed data. One apparent false positive in five nulls was traced to a solvent impurity, whose presence was subsequently identified by analyzing a solvent aliquot evaporated to 1% residual volume, while the other four nulls were properly classified. We view this signal processing method as broadly applicable in analytical chemistry, and we advocate that advanced signal processing methods should be applied as directly as possible to the raw detector output so that less discriminating preprocessing and post-processing does not throw away valuable signal.

  10. The Use of Data Hiding technology in IOT Security%数据隐藏技术在物联网安全中的应用探索

    Institute of Scientific and Technical Information of China (English)

    金洪颖

    2014-01-01

    由于物联网感知前端射频识别系统的工作环境是完全开放的,因此应答器和读写器之间的通信是在完全没有保护的情况下进行的。这就使得物联网用户的信息安全和个人隐私面对着各种各样的威胁。使用高级加密算法的应答器和读写器双向认证协议由于硬件实现成本高而限制了它在物联网中的应用范围。该文通过在应答器和读写器的双向认证过程中引入数据隐藏算法来确保信息传输过程中的安全性,并对其应用的可行性进行分析。%Due to the fully open working environment of Radio frequency identification system ,the communication between tag and reader is exposed to all kinds of threats. Further, IOT user’s information and their personal privacy are dangerous. Because of the high cost of hardware implementation, using advanced encryption algorithm to carry out two-way authentication among readers and tags limits its application in the IOT. In this paper, we introduce data hiding algorithm to ensure the security of infor-mation transmission among readers and tags through the whole tow-way authentication process. Finally, the feasibility of the scheme was analyzed.

  11. Research and development of process innovation design oriented web-based process case base system

    Directory of Open Access Journals (Sweden)

    Guo Xin

    2015-01-01

    Full Text Available Process innovation is very significant for an enterprise to lower cost, improve product quality and win competitive advantage. In order to inspire designers to realize innovation design, this paper has proposed a concept of process innovation design regarding Web process case base system model. To be specific, it constructs system mainline through the realization of technique and application flow, determines system architecture by combining process case base and cognition method and establishes links among principles, innovation approaches and process cases on this basis. The process case prototype system is established under the model of browser/server, and 5 kinds of search models, i.e. processing methods, processing focus, design depth, innovation approaches and user-defined model are integrated. This paper has demonstrated case base backstage realization and management methods, showcased system interface and demonstrated its effectiveness in process design based on actual cases.

  12. An Attribute-Based Signcryption Scheme and Its Application in Information Hiding

    Institute of Scientific and Technical Information of China (English)

    PENG Changgen; WANG Weiru; TIAN Youliang; YUAN Zhilong

    2016-01-01

    In order to provide a secure, reliable and flexible way to hide information, a new attribute-based signcryption scheme based on ciphertext-policy and its se-curity proof are presented. This scheme not only can simul-taneously fulfil both authentication and confidentiality in an efficient way, but also implements a hierarchical decryp-tion in one group and also between different groups accord-ing to user’s authority (different users satisfying the same access structure can be considered as a group). We provide a solution to information hiding using our proposed scheme which can embed ciphertext into a carrier. Because the hi-erarchical decryption property, different users will obtain different message from the same carrier. Illegal user can not get any information without private key because mes-sage existed in the carrier is ciphertext. Such solution can be applied in sharing important message under the public network.

  13. New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files

    CERN Document Server

    Alanazi, Hamdan O; Zaidan, B B; Jalab, Hamid A; AL-Ani, Zaidoon Kh

    2010-01-01

    With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important, Another problem with digital document and video is that undetectable modifications can be made with very simple and widely available equipment, which put the digital material for evidential purposes under question .With the large flood of information and the development of the digital format Information hiding considers one of the techniques which used to protect the important information. The main goals for this paper, provides a general overview of the New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files.

  14. A new method for high-capacity information hiding in video robust against temporal desynchronization

    Science.gov (United States)

    Mitekin, Vitaly; Fedoseev, Victor A.

    2015-02-01

    This paper presents a new method for high-capacity information hiding in digital video and algorithms of embedding and extraction of hidden information based on this method. These algorithms do not require temporal synchronization to provide robustness against both malicious and non-malicious frame dropping (temporal desynchronization). At the same time, due to randomized distribution of hidden information bits across the video frames, the proposed method allows to increase the hiding capacity proportionally to the number of frames used for information embedding. The proposed method is also robust against "watermark estimation" attack aimed at estimation of hidden information without knowing the embedding key or non-watermarked video. Presented experimental results demonstrate declared features of this method.

  15. C#实现窗口自动隐藏%Form Automatically Hide with C#

    Institute of Scientific and Technical Information of China (English)

    涂显政

    2012-01-01

      该文介绍了如何利用C#语言,实现靠屏边窗口自动隐藏及鼠标指向后自动弹出。%  Mark a form with C#, the form can automatically hide when it close the edge of screen and it can recover to nor⁃mal when mouse point on it.

  16. File Hide Method Based on Drive Stack Unit%基于驱动堆栈单元的文件隐藏方法

    Institute of Scientific and Technical Information of China (English)

    何耀彬; 李祥和; 孙岩

    2011-01-01

    为能在操作系统的驱动级实现新的文件隐藏点,对传统的文件系统过滤驱动原理和驱动数据堆栈单元结构进行分析.通过修改驱动堆栈单元的结构和完成例程,配合修改I/O请求包的传递方法,实现2种驱动级文件隐藏的方法.使用该2种方法的文件可以在系统中实现深度隐藏,使得操作系统无法查询,也不能通过正常途径访问.%In order to get new file hidden points in drive-level of system, the principle of File System Filter Driver(FSFD) and the structure of driver stack location are analyzed. Through making some changes in driver stack location's structure and CompletionRoutine, besides modifying the I/O Requst Packet(IRP) delivery method, two methods to hide files are implemented. Hidden files using these methods achieve depth hide. They can not be queried by system or be accessed through normal channels.

  17. Cooling water systems design using process integration

    CSIR Research Space (South Africa)

    Gololo, KV

    2010-09-01

    Full Text Available Cooling water systems are generally designed with a set of heat exchangers arranged in parallel. This arrangement results in higher cooling water flowrate and low cooling water return temperature thus reducing cooling tower efficiency. Previous...

  18. System Engineering Process Realization Toolkit Project

    Data.gov (United States)

    National Aeronautics and Space Administration — NASA faces many systems engineering challenges as it seeks to conduct exploration and science missions concurrently. One such challenge is implementing a repeatable...

  19. Parallel and distributed processing: applications to power systems

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Felix; Murphy, Liam [California Univ., Berkeley, CA (United States). Dept. of Electrical Engineering and Computer Sciences

    1994-12-31

    Applications of parallel and distributed processing to power systems problems are still in the early stages. Rapid progress in computing and communications promises a revolutionary increase in the capacity of distributed processing systems. In this paper, the state-of-the art in distributed processing technology and applications is reviewed and future trends are discussed. (author) 14 refs.,1 tab.

  20. Influence Business Process On The Quality Of Accounting Information System

    Directory of Open Access Journals (Sweden)

    Meiryani

    2015-01-01

    Full Text Available Abstract The purpose of this study was to determine the influence of business process to the quality of the accounting information system. This study aims to examine the influence of business process on the quality of the information system of accounting information system. The study was theoritical research which considered the roles of business process on quality of accounting information system which use secondary data collection. The results showed that the business process have a significant effect on the quality of accounting information systems.

  1. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  2. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients

    Science.gov (United States)

    Zhang, Xiaoqiang; Wang, Z. Jane

    2013-10-01

    Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 10 to 10 and thus can resist brute-force attack and unauthorized detection watermark attack.

  3. Pengaruh hide poison dan formalin terhadap sifat kulit dalam pengawet kulit kambing secara dikeringkan

    Directory of Open Access Journals (Sweden)

    Ignatius Sunaryo

    1991-06-01

    Full Text Available The objective of this study is know the effect of ide poison and formaline in the dried curing of goat skin. This study used 199 goat skins that were devided into seven groups od curing. Each group consisted of 17 goat skins. Those groups were : 3 groups of dried curing by hide poison of 0,1%, 0,3% and 0,5%; 3 groups of dried curing by formaline of 1%, 3% and 5%; and 1 groups of dried curing without any preserevation agent as control. After having stored for about 4 months, those skins then to be analized. Physical and chemical analysis werw carried out to evaluate the quality of the skin. Completely randomized design by Duncan’s test was used to analyze the dta. Based on this statistical analysis we can know that: the effect of hide poson in the dried curing of goat skins was the best. The quality of goat skins that were cured by hide poison was as follows : - the average tensile strength was the highest (886,30 kg/CM2, - the average of stretch was the lowest (14,50%, - the average iof hardness was the highest (201,90 kg/2,54 Cm, - the water content was the lowest (20%, and the damage was the smallest (10%.

  4. Design a Weight Based sorting distortion algorithm using Association rule Hiding for Privacy Preserving Data mining

    Directory of Open Access Journals (Sweden)

    R.Sugumar

    2011-12-01

    Full Text Available The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful tool for discovering relationships which are hidden in large database. Association rules hiding algorithms get strong an efficient performance for protecting confidential and crucial data. Data modification and rule hiding is one of the most important approaches for secure data. The objective of the proposed Weight Based Sorting Distortion (WBSD algorithm is to distort certain data which satisfies a particular sensitive rule. Then hide those transactions which support a sensitive rule and assigns them a priority and sorts them in ascending order according to the priority value of each rule. Then it uses these weights to compute the priority value for each transaction according to how weak the rule is that a transaction supports. Data distortion is one of the important methods to avoid this kind of scalability issues

  5. Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition

    Directory of Open Access Journals (Sweden)

    Hyunho Kang

    2015-03-01

    Full Text Available In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria for robust watermarks. In this study, we developed an information hiding method that satisfies the IHC evaluation criteria. The proposed method uses the difference of the frequency coefficients derived from a discrete cosine transform or a discrete wavelet transform. The algorithm employs a statistical analysis to find the best positions in the frequency domains for watermark insertion. In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem (511,31,109 code to error correct the watermark bits and the BCH (63,16,11 code as the sync signal to withstand JPEG (Joint Photographic Experts Group compression and cropping attacks. Our experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression. It should be noted that after the second compression, the file size should be less than 1 25 of the original size to satisfy the IHC evaluation criteria.

  6. Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images.

    Science.gov (United States)

    Al-Qershi, Osamah M; Khoo, Bee Ee

    2011-02-01

    Authenticating medical images using watermarking techniques has become a very popular area of research, and some works in this area have been reported worldwide recently. Besides authentication, many data-hiding techniques have been proposed to conceal patient's data into medical images aiming to reduce the cost needed to store data and the time needed to transmit data when required. In this paper, we present a new hybrid watermarking scheme for DICOM images. In our scheme, two well-known techniques are combined to gain the advantages of both and fulfill the requirements of authentication and data hiding. The scheme divides the images into two parts, the region of interest (ROI) and the region of non-interest (RONI). Patient's data are embedded into ROI using a reversible technique based on difference expansion, while tamper detection and recovery data are embedded into RONI using a robust technique based on discrete wavelet transform. The experimental results show the ability of hiding patient's data with a very good visual quality, while ROI, the most important area for diagnosis, is retrieved exactly at the receiver side. The scheme also shows some robustness against certain levels of salt and pepper and cropping noise.

  7. Efficient blind decoders for additive spread spectrum embedding based data hiding

    Science.gov (United States)

    Valizadeh, Amir; Wang, Z. Jane

    2012-12-01

    This article investigates efficient blind watermark decoding approaches for hidden messages embedded into host images, within the framework of additive spread spectrum (SS) embedding based for data hiding. We study SS embedding in both the discrete cosine transform and the discrete Fourier transform (DFT) domains. The contributions of this article are multiple-fold: first, we show that the conventional SS scheme could not be applied directly into the magnitudes of the DFT, and thus we present a modified SS scheme and the optimal maximum likelihood (ML) decoder based on the Weibull distribution is derived. Secondly, we investigate the improved spread spectrum (ISS) embedding, an improved technique of the traditional additive SS, and propose the modified ISS scheme for information hiding in the magnitudes of the DFT coefficients and the optimal ML decoders for ISS embedding are derived. We also provide thorough theoretical error probability analysis for the aforementioned decoders. Thirdly, sub-optimal decoders, including local optimum decoder (LOD), generalized maximum likelihood (GML) decoder, and linear minimum mean square error (LMMSE) decoder, are investigated to reduce the required prior information at the receiver side, and their theoretical decoding performances are derived. Based on decoding performances and the required prior information for decoding, we discuss the preferred host domain and the preferred decoder for additive SS-based data hiding under different situations. Extensive simulations are conducted to illustrate the decoding performances of the presented decoders.

  8. Sneak analysis applied to process systems

    Science.gov (United States)

    Whetton, Cris

    Traditional safety analyses, such as HAZOP, FMEA, FTA, and MORT, are less than effective at identifying hazards resulting from incorrect 'flow' - whether this be flow of information, actions, electric current, or even the literal flow of process fluids. Sneak Analysis (SA) has existed since the mid nineteen-seventies as a means of identifying such conditions in electric circuits; in which area, it is usually known as Sneak Circuit Analysis (SCA). This paper extends the ideas of Sneak Circuit Analysis to a general method of Sneak Analysis applied to process plant. The methods of SA attempt to capitalize on previous work in the electrical field by first producing a pseudo-electrical analog of the process and then analyzing the analog by the existing techniques of SCA, supplemented by some additional rules and clues specific to processes. The SA method is not intended to replace any existing method of safety analysis; instead, it is intended to supplement such techniques as HAZOP and FMEA by providing systematic procedures for the identification of a class of potential problems which are not well covered by any other method.

  9. SAR Systems and Related Signal Processing

    NARCIS (Netherlands)

    Hoogeboom, P.; Dekker, R.J.; Otten, M.P.G.

    1996-01-01

    Synthetic Aperture Radar (SAR) is today a valuable source of remote sensing information. SAR is a side-looking imaging radar and operates from airborne and spacebome platforms. Coverage, resolution and image quality are strongly influenced by the platform. SAR processing can be performed on standard

  10. SAR Systems and Related Signal Processing

    NARCIS (Netherlands)

    Hoogeboom, P.; Dekker, R.J.; Otten, M.P.G.

    1996-01-01

    Synthetic Aperture Radar (SAR) is today a valuable source of remote sensing information. SAR is a side-looking imaging radar and operates from airborne and spacebome platforms. Coverage, resolution and image quality are strongly influenced by the platform. SAR processing can be performed on standard

  11. VICAR-DIGITAL image processing system

    Science.gov (United States)

    Billingsley, F.; Bressler, S.; Friden, H.; Morecroft, J.; Nathan, R.; Rindfleisch, T.; Selzer, R.

    1969-01-01

    Computer program corrects various photometic, geometric and frequency response distortions in pictures. The program converts pictures to a number of elements, with each elements optical density quantized to a numerical value. The translated picture is recorded on magnetic tape in digital form for subsequent processing and enhancement by computer.

  12. A Robust Process Analytical Technology (PAT) System Design for Crystallization Processes

    DEFF Research Database (Denmark)

    Abdul Samad, Noor Asma Fazli Bin; Sin, Gürkan; Gernaey, Krist

    2013-01-01

    for generation of the supersaturation setpoint for a supersaturation controller, a tool for design of a process monitoring and control system (also called Process Analytical Technology (PAT) system) as well as a tool for performing uncertainty and sensitivity analysis of the PAT system design. The uncertainty......A generic computer-aided framework for systematic design of a process monitoring and control system for crystallization processes has been developed to study various aspects of crystallization operations. The design framework contains a generic multidimensional modelling framework, a tool...... crystallization process to achieve the target crystal size distribution (CSD) in the presence of parametric uncertainties....

  13. Mask alignment system for semiconductor processing

    Energy Technology Data Exchange (ETDEWEB)

    Webb, Aaron P.; Carlson, Charles T.; Weaver, William T.; Grant, Christopher N.

    2017-02-14

    A mask alignment system for providing precise and repeatable alignment between ion implantation masks and workpieces. The system includes a mask frame having a plurality of ion implantation masks loosely connected thereto. The mask frame is provided with a plurality of frame alignment cavities, and each mask is provided with a plurality of mask alignment cavities. The system further includes a platen for holding workpieces. The platen may be provided with a plurality of mask alignment pins and frame alignment pins configured to engage the mask alignment cavities and frame alignment cavities, respectively. The mask frame can be lowered onto the platen, with the frame alignment cavities moving into registration with the frame alignment pins to provide rough alignment between the masks and workpieces. The mask alignment cavities are then moved into registration with the mask alignment pins, thereby shifting each individual mask into precise alignment with a respective workpiece.

  14. Internet-based intelligent information processing systems

    CERN Document Server

    Tonfoni, G; Ichalkaranje, N S

    2003-01-01

    The Internet/WWW has made it possible to easily access quantities of information never available before. However, both the amount of information and the variation in quality pose obstacles to the efficient use of the medium. Artificial intelligence techniques can be useful tools in this context. Intelligent systems can be applied to searching the Internet and data-mining, interpreting Internet-derived material, the human-Web interface, remote condition monitoring and many other areas. This volume presents the latest research on the interaction between intelligent systems (neural networks, adap

  15. A heuristic algorithm for quick hiding of association rules

    Directory of Open Access Journals (Sweden)

    Maryam Fouladfar

    Full Text Available Increasing use of data mining process and extracting of association rules caused the introduction of privacy preserving in data mining. A complete publication of the database is inconsistent with security policies and it would result in disclosure of some ...

  16. Design and development of expert system for controlling sintering process

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    The general structure of expert system for controlling sintering process has been proposed. It includes knowledge base, inference engine, data acquisition system, learning system, knowledge base management system, explanation system and so on. The control functions consist of sintering chemical composition control centered on basicity and sintering process state control centered on permeability. The adaptive prediction of sintering chemical composition, the control strategy centered on basicity, the control strategy centered on permeability, the judgement of permeability and the prediction of burn through point were studied. The software of system, which includes about 1000 expert rules, was successfully applied in off-line control of sintering process in a sintering plant.

  17. A SYSTEM DESIGN PROCESS TAILORED FOR REVERSE ENGINEERING AND REENGINEERING

    Directory of Open Access Journals (Sweden)

    Tae-Hun Yoon

    2010-10-01

    Full Text Available This paper discusses a system design process using a reverse engineering. The Reverse Engineering Approach, if possible, is a cost-effective and easy approach to be used in a system design. All industries use this approach consciously or unconsciously to reduce system development risks. It can be a part of formal process, simple requirement reuse, or adoption of industry standards. The reverse engineering approach can be considered as an effective system design method in immature system engineering environments. This paper proposes a system design process using reverse engineering which can be tailored for large complex system development projects. The proposed process composed of two stages to produce system specification generation. The reverse engineering stage is performed to define functional and physical architecture of legacy system used as reference model when they are not available. The reengineering stage takes outputs of the reverse engineering stage to define the rest of logical and physical solutions.

  18. Thermodynamics of irreversible processes in rotating systems

    NARCIS (Netherlands)

    Hooyman, G.J.; Holtan, H.; Mazur, P.; Groot, S.R. de

    1953-01-01

    The general entropy balance equation for a rotating system containing a mixture of (charged and uncharged) components is calculated and the influence of centrifugal force and Coriolis force on the entropy production is considered. From the general formalism the equations for mechanical equilibrium

  19. Processing abstract language modulates motor system activity.

    Science.gov (United States)

    Glenberg, Arthur M; Sato, Marc; Cattaneo, Luigi; Riggio, Lucia; Palumbo, Daniele; Buccino, Giovanni

    2008-06-01

    Embodiment theory proposes that neural systems for perception and action are also engaged during language comprehension. Previous neuroimaging and neurophysiological studies have only been able to demonstrate modulation of action systems during comprehension of concrete language. We provide neurophysiological evidence for modulation of motor system activity during the comprehension of both concrete and abstract language. In Experiment 1, when the described direction of object transfer or information transfer (e.g., away from the reader to another) matched the literal direction of a hand movement used to make a response, speed of responding was faster than when the two directions mismatched (an action-sentence compatibility effect). In Experiment 2, we used single-pulse transcranial magnetic stimulation to study changes in the corticospinal motor pathways to hand muscles while reading the same sentences. Relative to sentences that do not describe transfer, there is greater modulation of activity in the hand muscles when reading sentences describing transfer of both concrete objects and abstract information. These findings are discussed in relation to the human mirror neuron system.

  20. Distributive Processing Issues in Education Information Systems.

    Science.gov (United States)

    Ender, Philip B.

    This is one of a series of reports based on an ongoing reality test of systemic evaluation for instructional decision making. This feasibility study is being carried out by the Center for the Study of Evaluation with the Laboratory in School and Community Relations at a suburban Los Angeles high school (called Site A). Viewing a school as a…

  1. Very Large Scale Distributed Information Processing Systems

    Science.gov (United States)

    1991-09-27

    34Reliable Distributed Database Management", Proc. of the IEEE, May 1987, pp. 601-620. [GOTT881 Gottlob , Georg andRoberto Zicari, "Closed World Databases... Gottlob , and Gio Wiederhold, "Interfacing Relational Databases and Prolog Efficiently," in Proceedings 2nd Expert Database Systems Conference, pp. 141

  2. The Impacts of Bologna Process on European Higher Education Systems

    Directory of Open Access Journals (Sweden)

    Zafer ÇELİK

    2012-01-01

    Full Text Available This study aims to examine the impact of Bologna Process on European higher education systems. It focuses on the influences of the main components of Bologna Process (i.e., implementing two-cycle system, increasing the student and academic staffs' mobility, European Credit Transfer System, quality assurance and qualification framework on the transformation of higher education systems. Although Bologna Process is perceived as a move to increase the quality of higher education system in Turkey, there are very serious criticisms from academics, students, and businessmen to the Bologna Process in various European countries. This study claims that the Process did not achieve its goals, more importantly the main instruments of the Process (qualifications, quality assurance agency etc. brought about hyper-bureaucratization, hierarchization and standardization of European higher education systems.

  3. Control and systems concepts in the innovation process

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    Allan Kjaer is an electrical engineer who arned master's and Ph.D.degrees in control nd system identification. He then began work n control, information, and production processes in the steel industry. Leading a team of evelopers at the Danish Steel Company, Dr. Kjaer applied systems thinking to the wider issues of process and information integration to achieve a tightly integrated production and business process. His article is important because it directly shows how control-systems

  4. Summary of the International Conference on Software and System Processes

    DEFF Research Database (Denmark)

    Kuhrmann, Marco; O'Connor, Rory V.; Perry, Dewayne E.

    2016-01-01

    The International Conference on Software and Systems Process (ICSSP), continuing the success of Software Process Workshop (SPW), the Software Process Modeling and Simulation Workshop (ProSim) and the International Conference on Software Process (ICSP) conference series, has become the established...... premier event in the field of software and systems engineering processes. It provides a leading forum for the exchange of research outcomes and industrial best-practices in process development from software and systems disciplines. ICSSP 2016 was held in Austin, Texas, from 14-15 May 2016, co......-located with the 38th International Conference on Software Engineering (ICSE). The theme of mICSSP 2016 was studying "Process(es) in Action" by recognizing that the AS-Planned and AS-Practiced processes can be quite different in many ways including their ows, their complexity and the evolving needs of stakeholders...

  5. Solar energy engineering processes and systems

    CERN Document Server

    Kalogirou, Soteris A

    2013-01-01

    As perhaps the most promising of all the renewable energy sources available today, solar energy is becoming increasingly important in the drive to achieve energy independence and climate balance. This new book is the masterwork from world-renowned expert Dr. Soteris Kalogirou, who has championed solar energy for decades. The book includes all areas of solar energy engineering, from the fundamentals to the highest level of current research. The author includes pivotal subjects such as solar collectors, solar water heating, solar space heating and cooling, industrial process heat, solar desalina

  6. High risk process control system assessment methodology

    Energy Technology Data Exchange (ETDEWEB)

    Santos, Venetia [Pontificia Universidade Catolica do Rio de Janeiro (PUC-Rio), RJ (Brazil); Zamberlan, Maria Cristina [National Institute of Tehnology (INT), Rio de Janeiro, RJ (Brazil). Human Reliability and Ergonomics Research Group for the Oil, Gas and Energy Sector

    2009-07-01

    The evolution of ergonomics methodology has become necessary due to the dynamics imposed by the work environment, by the increase of the need of human cooperation and by the high interaction between various sections within a company. In the last 25 years, as of studies made in the high risk process control, we have developed a methodology to evaluate these situations that focus on the assessment of activities and human cooperation, the assessment of context, the assessment of the impact of work of other sectors in the final activity of the operator, as well as the modeling of existing risks. (author)

  7. Solar energy engineering processes and systems

    CERN Document Server

    Kalogirou, Soteris A

    2009-01-01

    As perhaps the most promising of all the renewable energy sources available today, solar energy is becoming increasingly important in the drive to achieve energy independence and climate balance. This new book is the masterwork from world-renowned expert Dr. Soteris Kalogirou, who has championed solar energy for decades. The book includes all areas of solar energy engineering, from the fundamentals to the highest level of current research. The author includes pivotal subjects such as solar collectors, solar water heating, solar space heating and cooling, industrial process heat, solar desalina

  8. Development of continuous pharmaceutical production processes supported by process systems engineering methods and tools

    DEFF Research Database (Denmark)

    Gernaey, Krist; Cervera Padrell, Albert Emili; Woodley, John

    2012-01-01

    The pharmaceutical industry is undergoing a radical transition towards continuous production processes. Systematic use of process systems engineering (PSE) methods and tools form the key to achieve this transition in a structured and efficient way....

  9. Integrated Automation System for Rare Earth Countercurrent Extraction Process

    Institute of Scientific and Technical Information of China (English)

    柴天佑; 杨辉

    2004-01-01

    Lower automation level in industrial rare-earth extraction processes results in high production cost, inconsistent product quality and great consumption of resources in China. An integrated automation system for extraction process of rare earth is proposed to realize optimal product indices, such as product purity,recycle rate and output. The optimal control strategy for output component, structure and function of the two-gradcd integrated automation system composed of the process management grade and the process control grade were discussed. This system is successfully applied to a HAB yttrium extraction production process and was found to provide optimal control, optimal operation, optimal management and remarkable benefits.

  10. 一种抗DA/AD转换攻击的音频信息隐藏算法%An Audio Information Hiding Algorithm Against Attacks from D/A and A/D Conversions

    Institute of Scientific and Technical Information of China (English)

    郑玉婷; 梁猛; 曹雅萍; 王春河; 刘继红

    2016-01-01

    在经历播放和转录的音频信息隐藏应用系统中,DA/AD变换引起的攻击是限制其性能的主要因素之一。通过分析DA/AD转换过程中音频信号线性伸缩、文件大小变化引起的失同步,提出了一种基于DCT域逐项定位的音频信息隐藏算法,实验结果表明,该算法能够有效抵抗DA/AD转换过程中的攻击,具有良好的鲁棒性。%A DA/AD transform attack resistance of audio information hiding is to pick a transcribed to the digital audio broadcast after complex DA/AD conversion process, general audio information hiding algorithm is difficult to resist the process of attack, and poor practicability. Paper analyzed before and after the audio DA/AD conversion impact and put forward relevant solutions, is presented based on the positioning of the audio frequency DCT domain audio information hiding algorithm was proposed. The experimental results show that the algorithm can effectively resist attacks from DA/AD conversion, with strong robustness.

  11. Retrofitting automated process control systems at Ukrainian power stations

    Energy Technology Data Exchange (ETDEWEB)

    B.E. Simkin; V.S. Naumchik; B.D. Kozitskii (and others) [OAO L' vovORGRES, Lviv (Ukraine)

    2008-04-15

    Approaches and principles for retrofitting automated process control systems at Ukrainian power stations are considered. The results obtained from retrofitting the monitoring and control system of Unit 9 at the Burshtyn thermal power station are described.

  12. A new process sensitivity index to identify important system processes under process model and parametric uncertainty

    Energy Technology Data Exchange (ETDEWEB)

    Dai, Heng [Pacific Northwest National Laboratory, Richland Washington USA; Ye, Ming [Department of Scientific Computing, Florida State University, Tallahassee Florida USA; Walker, Anthony P. [Environmental Sciences Division and Climate Change Science Institute, Oak Ridge National Laboratory, Oak Ridge Tennessee USA; Chen, Xingyuan [Pacific Northwest National Laboratory, Richland Washington USA

    2017-04-01

    Hydrological models are always composed of multiple components that represent processes key to intended model applications. When a process can be simulated by multiple conceptual-mathematical models (process models), model uncertainty in representing the process arises. While global sensitivity analysis methods have been widely used for identifying important processes in hydrologic modeling, the existing methods consider only parametric uncertainty but ignore the model uncertainty for process representation. To address this problem, this study develops a new method to probe multimodel process sensitivity by integrating the model averaging methods into the framework of variance-based global sensitivity analysis, given that the model averaging methods quantify both parametric and model uncertainty. A new process sensitivity index is derived as a metric of relative process importance, and the index includes variance in model outputs caused by uncertainty in both process models and model parameters. For demonstration, the new index is used to evaluate the processes of recharge and geology in a synthetic study of groundwater reactive transport modeling. The recharge process is simulated by two models that converting precipitation to recharge, and the geology process is also simulated by two models of different parameterizations of hydraulic conductivity; each process model has its own random parameters. The new process sensitivity index is mathematically general, and can be applied to a wide range of problems in hydrology and beyond.

  13. Survey of Multiple Information Hiding Techniques using Visual Cryptography

    Directory of Open Access Journals (Sweden)

    Bijoy Chhetri

    2015-10-01

    Full Text Available Information now a day‟s seems to have become abundant and the secure transmission and visualization of it has been a challenge. The major security concerns are of Authentication, Confidentiality and Data Integrity.  In regard to this, the various security methodologies have been introduced and Cryptography is one of the schemes where the information is transferred in the disguise form and only authentic user can reveal the exact information. Various Cryptographic techniques has played a very vital role in this regard, among which Visual Cryptographic System(VCS is one of such kind  where the secret data (image, text etc is encoded into multiple images and decoded using Human Visual System(HVS without having to tedious calculations and sound  knowledge of Cryptography. VC  is one of such methodology where the secret information is bifurcated into many disguise images and on super imposing these images, the original secret information is revealed, using Human Visual System(HVS unlike the traditional cryptography where lot of complex mathematical and time consuming calculation are to be performed. In this paper study of various VC techniques has been done based on number of shares, number of secret messages and types of shares in the cases of Grayscale Image.

  14. An eco-friendly method for short term preservation of skins/hides using Semecarpus anacardium nut extract.

    Science.gov (United States)

    Iyappan, Kuttalam; Ponrasu, Thangavel; Sangeethapriya, Vilvanathan; Gayathri, Vinaya Subramani; Suguna, Lonchin

    2013-09-01

    Preservation or curing of hides and skins is performed as the primary step of leather processing. Common salt is employed as the conventional agent for curing purpose. Use of salt enhances the pollution load of tannery effluent which becomes highly contaminated with increased total dissolved solids and chlorides. To overcome this hurdle, researchers are in constant search of alternative preservation techniques which are either totally void of salt or use only a meager amount of salt. In the present study, we had explored the possibility of using Semecarpus anacardium nut extract as an alternative to salt for the curing process by assessing different parameters like hair slip, putrefaction odor, volatile nitrogen content, moisture content, bacterial count, and shrinkage temperature in comparison to the salt curing method. The antibacterial property of the plant extract was also investigated. The results obtained substantiated that the nut extract of S. anacardium effectively could preserve the skins for more than a month, by its antibacterial activity along with the dehydrating property of acetone.

  15. A signal processing method for the friction-based endpoint detection system of a CMP process

    Energy Technology Data Exchange (ETDEWEB)

    Xu Chi; Guo Dongming; Jin Zhuji; Kang Renke, E-mail: xuchi_dut@163.com [Key Laboratory for Precision and Non-Traditional Machining Technology of Ministry of Education, Dalian University of Technology, Dalian 116024 (China)

    2010-12-15

    A signal processing method for the friction-based endpoint detection system of a chemical mechanical polishing (CMP) process is presented. The signal process method uses the wavelet threshold denoising method to reduce the noise contained in the measured original signal, extracts the Kalman filter innovation from the denoised signal as the feature signal, and judges the CMP endpoint based on the feature of the Kalman filter innovation sequence during the CMP process. Applying the signal processing method, the endpoint detection experiments of the Cu CMP process were carried out. The results show that the signal processing method can judge the endpoint of the Cu CMP process. (semiconductor technology)

  16. Standardization of information systems development processes and banking industry adaptations

    CERN Document Server

    Tanrikulu, Zuhal

    2011-01-01

    This paper examines the current system development processes of three major Turkish banks in terms of compliance to internationally accepted system development and software engineering standards to determine the common process problems of banks. After an in-depth investigation into system development and software engineering standards, related process-based standards were selected. Questions were then prepared covering the whole system development process by applying the classical Waterfall life cycle model. Each question is made up of guidance and suggestions from the international system development standards. To collect data, people from the information technology departments of three major banks in Turkey were interviewed. Results have been aggregated by examining the current process status of the three banks together. Problematic issues were identified using the international system development standards.

  17. Performance engineering for industrial embedded data-processing systems

    NARCIS (Netherlands)

    Hendriks, M.; Verriet, J.; Basten, T.; Brassn, M.; Dankers, R.; Laan, R.; Lint, A.; Moneva, H.; Somers, L.; Willekens, M.

    2015-01-01

    Performance is a key aspect of many embedded systems, embedded data processing systems in particular. System performance can typically only be measured in the later stages of system development. To avoid expensive re-work in the final stages of development, it is essential to have accurate performan

  18. Analysis of bilinear stochastic systems. [involving multiplicative noise processes

    Science.gov (United States)

    Willsky, A. S.; Marcus, S. I.; Martin, D. N.

    1974-01-01

    Analysis of stochastic dynamical systems that involve multiplicative (bilinear) noise processes is considered. After defining the systems of interest, the evolution of the moments of such systems, the question of stochastic stability, and estimation for bilinear stochastic systems are discussed. Both exact and approximate methods of analysis are introduced, and, in particular, the uses of Lie-theoretic concepts and harmonic analysis are discussed.

  19. Globally stable control systems for processes with input multiplicities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jietae [Kyungpook National University, Daegu (Korea, Republic of); Edgar, Thomas F. [University of Texas, Austin (United States)

    2016-02-15

    A nonlinear process with input multiplicity has two or more input values for a given output at the steady state, and the process steady state gain changes its sign as the operating point changes. A control system with integral action will be unstable when both signs of the process gain and the controller integral gain are different, and its stability region will be limited to the boundary where the process steady state gain is zero. Unlike processes with output multiplicities, feedback controllers cannot be used to correct the sign changes of process gain. To remove such stability limitation, a simple control system with parallel compensator is proposed. The parallel compensator can be easily designed based on the process steady state gain information and tuned in the field. Using the two time scale method, the stability of proposed control systems for processes with input multiplicities can be checked.

  20. SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC

    Directory of Open Access Journals (Sweden)

    Ayman Wazwaz1

    2016-08-01

    Full Text Available Security System for Data using Steganography and Cryptography (SSDSC is a set of hardware and software components that will be used to send secured documents through the internet. Some of the software will be loaded into a microcontrollers in order to increase the complexity and security. The data will be encrypted using the Advanced Encryption Standard (AES algorithm with a key from the Raspberry PI microcontroller and hide it inside an image using Least Significant Bit (LSB algorithm, the data will be invisible. The image will be transmitted and received through the internet, the receivers will extract the hidden data from the image and decrypt it to have the original data with the image. Complicating the steps of hiding and encryption will reduce the possiblity of intrusin of secured documents, and the process will be trasparent to the user to increase security without affecting the normal steps and the behavior in secured documents exchange.

  1. No place to hide: the group leader's moments of shame.

    Science.gov (United States)

    Livingston, Louisa R Powell

    2006-07-01

    Shame is a powerful, universal experience; yet because of its painful, secretive nature, it often remains an underground affect for many therapists. On behalf of our patients and ourselves, we must de-stigmatize it. My aim is to further a dialogue among group therapists about processing our own shame, by openly discussing the phenomenology and dynamics of shame. Such discussion is not easy, as shame by its nature seems almost unspeakable; yet leaders, due to the group setting, are especially at risk of having shame activated. Using a self-psychological/intersubjective approach, this paper suggests how we as therapists can become cognizant of and work with our own shame. Given the dearth of experience-near accounts of the group therapist's own shame, the author provides detailed vignettes of her own experiences with shame in the clinical setting.

  2. Process Planning Support System for Green Manufacturing and its application

    Institute of Scientific and Technical Information of China (English)

    HE Yan; LIU Fei; CAO Huajun; ZHANG Hua

    2007-01-01

    Owing to a lack of practical methods and soft- ware tools in the existing researches on green manufacturing (GM), process planning support system for green manufac- turing (GMPPSS) was developed to deal with the problems in optimization of environment-benign process planning. The GMPPSS consisted mainly of three function modules and related model repositories including: selection of process elements, optimization of process courses, and evaluation of process projects for GM. The database of the GMPPSS was used to provide plentiful information on resources consump- tion and environmental impact in manufacturing processes, which consisted of process attribute database, inventory database, machine database, tool database, and the cutting fluid database. Raw materials, secondary material consump- tion, energy consumption, and environment impacts of pro- cess planning were optimized to improve the green attribute of process planning of parts with the supports of the data- bases and model repositories. The gear processing in the machining tool factory was presented to verify the system's applicability.

  3. Interevent Correlations from Avalanches Hiding Below the Detection Threshold

    Science.gov (United States)

    Janićević, Sanja; Laurson, Lasse; Mâløy, Knut Jørgen; Santucci, Stéphane; Alava, Mikko J.

    2016-12-01

    Numerous systems ranging from deformation of materials to earthquakes exhibit bursty dynamics, which consist of a sequence of events with a broad event size distribution. Very often these events are observed to be temporally correlated or clustered, evidenced by power-law-distributed waiting times separating two consecutive activity bursts. We show how such interevent correlations arise simply because of a finite detection threshold, created by the limited sensitivity of the measurement apparatus, or used to subtract background activity or noise from the activity signal. Data from crack-propagation experiments and numerical simulations of a nonequilibrium crack-line model demonstrate how thresholding leads to correlated bursts of activity by separating the avalanche events into subavalanches. The resulting temporal subavalanche correlations are well described by our general scaling description of thresholding-induced correlations in crackling noise.

  4. Surprising structures hiding in Penrose’s future null infinity

    Science.gov (United States)

    Newman, Ezra T.

    2017-07-01

    Since the late1950s, almost all discussions of asymptotically flat (Einstein-Maxwell) space-times have taken place in the context of Penrose’s null infinity, I+. In addition, almost all calculations have used the Bondi coordinate and tetrad systems. Beginning with a known asymptotically flat solution to the Einstein-Maxwell equations, we show first, that there are other natural coordinate systems, near I+, (analogous to light-cones in flat-space) that are based on (asymptotically) shear-free null geodesic congruences (analogous to the flat-space case). Using these new coordinates and their associated tetrad, we define the complex dipole moment, (the mass dipole plus i times angular momentum), from the l  =  1 harmonic coefficient of a component of the asymptotic Weyl tensor. Second, from this definition, from the Bianchi identities and from the Bondi-Sachs mass and linear momentum, we show that there exists a large number of results—identifications and dynamics—identical to those of classical mechanics and electrodynamics. They include, among many others, {P}=M{v}+..., {L}= {r} × {P} , spin, Newton’s second law with the rocket force term (\\dotM v) and radiation reaction, angular momentum conservation and others. All these relations take place in the rather mysterious H-space rather than in space-time. This leads to the enigma: ‘why do these well known relations of classical mechanics take place in H-space?’ and ‘What is the physical meaning of H-space?’

  5. Grey systems for intelligent sensors and information processing

    Institute of Scientific and Technical Information of China (English)

    Chen Chunlin; Dong Daoyi; Chen Zonghai; Wang Haibo

    2008-01-01

    In a measurement system,new representation methods are necessary to maintain the uncertainty and to supply more powerful ability for reasoning and transformation between numerical system and symbolic system.A grey measurement system is discussed from the point of view of intelligent sensors and incomplete information processing compared with a numerical and symbolized mea8urement system.The methods of grey representation and information processing are proposed for data collection and reasoning.As a case study,multi-ultrasonic sensor systems are demonstrated to verify the effectiveness of the proposed methods.

  6. Automated business processes in outbound logistics: An information system perspective

    DEFF Research Database (Denmark)

    Tambo, Torben

    2010-01-01

    by securing a much higher quality of data and eliminating a number of defect management processes in the domain of fashion wholesale and retail. The information system perspective is used in dealing with adopting bespoke ERP development effort of creating an ERP system on the leading edge of business process...

  7. Image processing system performance prediction and product quality evaluation

    Science.gov (United States)

    Stein, E. K.; Hammill, H. B. (Principal Investigator)

    1976-01-01

    The author has identified the following significant results. A new technique for image processing system performance prediction and product quality evaluation was developed. It was entirely objective, quantitative, and general, and should prove useful in system design and quality control. The technique and its application to determination of quality control procedures for the Earth Resources Technology Satellite NASA Data Processing Facility are described.

  8. Hiding in the Shadows II: Collisional Dust as Exoplanet Markers

    CERN Document Server

    Dobinson, Jack; Lines, Stefan; Carter, Philip J; Dodson-Robinson, Sarah E; Teanby, Nick A

    2016-01-01

    Observations of the youngest planets ($\\sim$1-10 Myr for a transitional disk) will increase the accuracy of our planet formation models. Unfortunately, observations of such planets are challenging and time-consuming to undertake even in ideal circumstances. Therefore, we propose the determination of a set of markers that can pre-select promising exoplanet-hosting candidate disks. To this end, N-body simulations were conducted to investigate the effect of an embedded Jupiter mass planet on the dynamics of the surrounding planetesimal disk and the resulting creation of second generation collisional dust. We use a new collision model that allows fragmentation and erosion of planetesimals, and dust-sized fragments are simulated in a post process step including non-gravitational forces due to stellar radiation and a gaseous protoplanetary disk. Synthetic images from our numerical simulations show a bright double ring at 850 $\\mu$m for a low eccentricity planet, whereas a high eccentricity planet would produce a ch...

  9. Uric Acid for Cardiovascular Risk: Dr. Jekyll or Mr. Hide?

    Science.gov (United States)

    Vassalle, Cristina; Mazzone, Annamaria; Sabatino, Laura; Carpeggiani, Clara

    2016-02-26

    Uric acid (UA) is a potent endogenous antioxidant. However, high concentrations of this molecule have been associated with cardiovascular disease (CVD) and renal dysfunction, involving mechanisms that include oxidative stress, inflammatory processes, and endothelial injury. Experimental and in vitro results suggest that this biomarker behaves like other antioxidants, which can shift from the physiological antioxidant action to a pro-oxidizing effect according to their level and to microenvironment conditions. However, data on patients (general population or CAD cohorts) are controversial, so the debate on the role of hyperuricemia as a causative factor for CVD is still ongoing. Increasing evidence indicates UA as more meaningful to assess CVD in women, even though this aspect needs deeper investigation. It will be important to identify thresholds responsible for UA "biological shift" from protective to harmful effects in different pathological conditions, and according to possible gender-related differences. In any case, UA is a low-tech and inexpensive biomarker, generally performed at patient's hospitalization and, therefore, easily accessible information for clinicians. For these reasons, UA might represent a useful additive tool as much as a CV risk marker. Thus, in view of available evidence, progressive UA elevation with levels higher than 6 mg/dL could be considered an "alarm" for increased CV risk.

  10. HIDING IN THE SHADOWS. II. COLLISIONAL DUST AS EXOPLANET MARKERS

    Energy Technology Data Exchange (ETDEWEB)

    Dobinson, Jack; Leinhardt, Zoë M.; Lines, Stefan; Carter, Philip J. [University of Bristol, School of Physics, H. H. Wills Physics Laboratory, University of Bristol, Bristol BS8 1TL (United Kingdom); Dodson-Robinson, Sarah E. [University of Delaware, Department of Physics and Astronomy, 217 Sharp Lab, Newark, DE 19716 (United States); Teanby, Nick A. [University of Bristol, School of Earth Sciences, H. H. Wills Physics Laboratory, University of Bristol, Bristol BS8 1TL (United Kingdom)

    2016-03-20

    Observations of the youngest planets (∼1–10 Myr for a transitional disk) will increase the accuracy of our planet formation models. Unfortunately, observations of such planets are challenging and time-consuming to undertake, even in ideal circumstances. Therefore, we propose the determination of a set of markers that can preselect promising exoplanet-hosting candidate disks. To this end, N-body simulations were conducted to investigate the effect of an embedded Jupiter-mass planet on the dynamics of the surrounding planetesimal disk and the resulting creation of second-generation collisional dust. We use a new collision model that allows fragmentation and erosion of planetesimals, and dust-sized fragments are simulated in a post-process step including non-gravitational forces due to stellar radiation and a gaseous protoplanetary disk. Synthetic images from our numerical simulations show a bright double ring at 850 μm for a low-eccentricity planet, whereas a high-eccentricity planet would produce a characteristic inner ring with asymmetries in the disk. In the presence of first-generation primordial dust these markers would be difficult to detect far from the orbit of the embedded planet, but would be detectable inside a gap of planetary origin in a transitional disk.

  11. The Technique of Building a Networked Manufacturing Process Monitoring System

    Institute of Scientific and Technical Information of China (English)

    XIE Yong; ZHANG Yu; YANG Musheng

    2006-01-01

    This paper introduces the constitute, structure and the software model of a set of networked manufacturing process monitoring system, using JAVA network technique to realize a set of three layer distributed manufacturing process monitoring system which is comprised with remote manage center, manufacturing process supervision center and the units of measure and control layer such as displacement sensor, the device of temperature measure and alarm etc. The network integration of the production management layer, the process control layer and the hard ware control layer is realized via using this approach. The design using object-oriented technique based on JAVA can easily transport to different operation systems with high performance of the expansibility.

  12. SIMULATION AS A TOOL FOR PROCESS OPTIMIZATION OF LOGISTIC SYSTEMS

    Directory of Open Access Journals (Sweden)

    Radko Popovič

    2015-09-01

    Full Text Available The paper deals with the simulation of the production processes, especially module of Siemens Tecnomatix software. Tecnomatix Process Simulate is designed for building new or modifying existing production processes. The simulation created in this software has a posibility for fast testing of planned changes or improvements of the production processes. On the base of simulation you can imagine the future picture of the real production system. 3D Simulation can reflects the actual status and conditions on the running system and of course, after some improvements, it can show the possible figure of the production system.

  13. Eco-efficiency of grinding processes and systems

    CERN Document Server

    Winter, Marius

    2016-01-01

    This research monograph aims at presenting an integrated assessment approach to describe, model, evaluate and improve the eco-efficiency of existing and new grinding processes and systems. Various combinations of grinding process parameters and system configurations can be evaluated based on the eco-efficiency. The book presents the novel concept of empirical and physical modeling of technological, economic and environmental impact indicators. This includes the integrated evaluation of different grinding process and system scenarios. The book is a valuable read for research experts and practitioners in the field of eco-efficiency of manufacturing processes but the book may also be beneficial for graduate students.

  14. A new data acquisition and processing system for profiling sonar

    Institute of Scientific and Technical Information of China (English)

    XU Xiao-ka; SANG En-fang; QIAO Gang; WANG Ji-sheng

    2008-01-01

    A multi-beam chirp sonar based on IP connections and DSP processing nodes was proposed and designed to provide an expandable system with high-speed processing and mass-storage of real-time signals for multi-beam profiling sonar. The system was designed for seabed petroleum pipeline detection and orientation, and can receive echo signals and process the data in real time, refreshing the display 10 times per second. Every node of the chirp sonar connects with data processing nodes through TCP/IP.Merely by adding nodes, the system's processing ability can be increased proportionately without changing the software. System debugging and experimental testing proved the system to be practical and stable. This design provides a new method for high speed active sonar.

  15. Access Control for Monitoring System-Spanning Business Processes

    NARCIS (Netherlands)

    Bassil, S.; Reichert, M.U.; Bobrik, R.; Bauer, Th.

    2007-01-01

    Integrated process support is highly desirable in environ- ments where data related to a particular (business) process are scattered over distributed and heterogeneous information systems (IS). A process monitoring component is a much-needed module in order to provide an integrated view on all these

  16. Inclusive Education as Complex Process and Challenge for School System

    Science.gov (United States)

    Al-Khamisy, Danuta

    2015-01-01

    Education may be considered as a number of processes, actions and effects affecting human being, as the state or level of the results of these processes or as the modification of the functions, institutions and social practices roles, which in the result of inclusion become new, integrated system. Thus this is very complex process. Nowadays the…

  17. Robust collaborative process interactions under system crash and network failures

    NARCIS (Netherlands)

    Wang, Lei; Wombacher, Andreas; Ferreira Pires, Luis; van Sinderen, Marten J.; Chi, Chihung

    2013-01-01

    With the possibility of system crashes and network failures, the design of robust client/server interactions for collaborative process execution is a challenge. If a business process changes its state, it sends messages to the relevant processes to inform about this change. However, server crashes

  18. Big Data Processing in Complex Hierarchical Network Systems

    CERN Document Server

    Polishchuk, Olexandr; Tyutyunnyk, Maria; Yadzhak, Mykhailo

    2016-01-01

    This article covers the problem of processing of Big Data that describe process of complex networks and network systems operation. It also introduces the notion of hierarchical network systems combination into associations and conglomerates alongside with complex networks combination into multiplexes. The analysis is provided for methods of global network structures study depending on the purpose of the research. Also the main types of information flows in complex hierarchical network systems being the basic components of associations and conglomerates are covered. Approaches are proposed for creation of efficient computing environments, distributed computations organization and information processing methods parallelization at different levels of system hierarchy.

  19. The operation technology of realtime image processing system (Datacube)

    Energy Technology Data Exchange (ETDEWEB)

    Cho, Jai Wan; Lee, Yong Bum; Lee, Nam Ho; Choi, Young Soo; Park, Soon Yong; Park, Jin Seok

    1997-02-01

    In this project, a Sparc VME-based MaxSparc system, running the solaris operating environment, is selected as the dedicated image processing hardware for robot vision applications. In this report, the operation of Datacube maxSparc system, which is high performance realtime image processing hardware, is systematized. And image flow example programs for running MaxSparc system are studied and analyzed. The state-of-the-arts of Datacube system utilizations are studied and analyzed. For the next phase, advanced realtime image processing platform for robot vision application is going to be developed. (author). 19 refs., 71 figs., 11 tabs.

  20. Industrial process system assessment: bridging process engineering and life cycle assessment through multiscale modeling.

    Science.gov (United States)

    The Industrial Process System Assessment (IPSA) methodology is a multiple step allocation approach for connecting information from the production line level up to the facility level and vice versa using a multiscale model of process systems. The allocation procedure assigns inpu...

  1. Industrial process system assessment: bridging process engineering and life cycle assessment through multiscale modeling.

    Science.gov (United States)

    The Industrial Process System Assessment (IPSA) methodology is a multiple step allocation approach for connecting information from the production line level up to the facility level and vice versa using a multiscale model of process systems. The allocation procedure assigns inpu...

  2. Using DNS amplification DDoS attack for hiding data

    Science.gov (United States)

    Mehić, M.; Voznak, M.; Safarik, J.; Partila, P.; Mikulec, M.

    2014-05-01

    This paper concerns available steganographic techniques that can be used for sending hidden data through public network. Typically, in steganographic communication it is advised to use popular/often used method for sending hidden data and amount of that data need to be high as much as possible. We confirmed this by choosing a Domain Name System (DNS) as a vital protocol of each network and choosing Distributed denial of service (DDoS) attacks that are most popular network attacks currently represented in the world. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols fields and is known for IP, UDP or TCP protocols, but has never been applied to DNS (Domain Name Server) which are the fundamental part of network communications. The second explains the usage of DNS Amplification DDoS Attack to send seamlessly data through public network. The calculation that was performed to estimate the total amount of data that can be covertly transferred by using these technique, regardless of steganalysis, is included in this paper.

  3. Optimal control of switched systems arising in fermentation processes

    CERN Document Server

    Liu, Chongyang

    2014-01-01

    The book presents, in a systematic manner, the optimal controls under different mathematical models in fermentation processes. Variant mathematical models – i.e., those for multistage systems; switched autonomous systems; time-dependent and state-dependent switched systems; multistage time-delay systems and switched time-delay systems – for fed-batch fermentation processes are proposed and the theories and algorithms of their optimal control problems are studied and discussed. By putting forward novel methods and innovative tools, the book provides a state-of-the-art and comprehensive systematic treatment of optimal control problems arising in fermentation processes. It not only develops nonlinear dynamical system, optimal control theory and optimization algorithms, but can also help to increase productivity and provide valuable reference material on commercial fermentation processes.

  4. How Workflow Systems Facilitate Business Process Reengineering and Improvement

    Directory of Open Access Journals (Sweden)

    Mohamed El Khadiri

    2012-03-01

    Full Text Available This paper investigates the relationship between workflow systems and business process reengineering and improvement. The study is based on a real case study at the “Centre Rgional dInvestissement” (CRI of Marrakech, Morocco. The CRI is entrusted to coordinate various investment projects at the regional level. Our previous work has shown that workflow system can be a basis for business process reengineering. However, for continuous process improvement, the system has shown to be insufficient as it fails to deal with exceptions and problem resolutions that informal communications provide. However, when this system is augmented with an expanded corporate memory system that includes social tools, to capture informal communication and data, we are closer to a more complete system that facilitates business process reengineering and improvement.

  5. INFORMATION SYSTEM OF AUTOMATION OF PREPARATION EDUCATIONAL PROCESS DOCUMENTS

    Directory of Open Access Journals (Sweden)

    V. A. Matyushenko

    2016-01-01

    Full Text Available Information technology is rapidly conquering the world, permeating all spheres of human activity. Education is not an exception. An important direction of information of education is the development of university management systems. Modern information systems improve and facilitate the management of all types of activities of the institution. The purpose of this paper is development of system, which allows automating process of formation of accounting documents. The article describes the problem of preparation of the educational process documents. Decided to project and create the information system in Microsoft Access environment. The result is four types of reports obtained by using the developed system. The use of this system now allows you to automate the process and reduce the effort required to prepare accounting documents. All reports was implement in Microsoft Excel software product and can be used for further analysis and processing.

  6. A systematic framework for design of process monitoring and control (PAT) systems for crystallization processes

    DEFF Research Database (Denmark)

    Abdul Samad, Noor Asma Fazli Bin; Sin, Gürkan; Gernaey, Krist

    2013-01-01

    for generation of the supersaturation set-point for supersaturation control, as well as a tool for design of a process monitoring and control system (also called Process Analytical Technology (PAT) system). This systematic design allows one to generate the necessary problem-chemical system specific model......A generic computer-aided framework for systematic design of a process monitoring and control system for crystallization processes has been developed to study various aspects of crystallization operations.The systematic design framework contains a generic crystallizer modelling toolbox, a tool......, the necessary supersaturation set-point as well as a PAT system design including implementation of monitoring tools and control strategies in order to produce the desired target product properties notably crystal size distribution (CSD) and shape for a wide range of crystallization processes. Application...

  7. A Generic Framework for Systematic Design of Process Monitoring and Control System for Crystallization Processes

    DEFF Research Database (Denmark)

    Abdul Samad, Noor Asma Fazli Bin; Meisler, Kresten Troelstrup; Sin, Gürkan

    2012-01-01

    A generic framework for systematic design of a process monitoring and control system for crystallization processes has been developed in order to obtain the desired end-product properties notably the crystal size distribution (CSD). The design framework contains a generic crystallizer modelling...... tool-box, a tool for design of operational policies as well as a tool for design of process monitoring and control systems. Through this framework, it is possible for a wide range of crystallization processes to generate the necessary problem-system specific model, the necessary operational policy...... and a Process Analytical Technology (PAT) system design including implementation of monitoring tools and control strategies in order to produce a desired product with its corresponding target properties. Application of the framework is highlighted through a case study involving the system potassium dihydrogen...

  8. Massive MIMO Systems: Signal Processing Challenges and Research Trends

    OpenAIRE

    de Lamare, R.C.

    2013-01-01

    This article presents a tutorial on multiuser multiple-antenna wireless systems with a very large number of antennas, known as massive multi-input multi-output (MIMO) systems. Signal processing challenges and future trends in the area of massive MIMO systems are presented and key application scenarios are detailed. A linear algebra approach is considered for the description of the system and data models of massive MIMO architectures. The operational requirements of massive MIMO systems are di...

  9. Process Control System Cyber Security Standards - An Overview

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2006-05-01

    The use of cyber security standards can greatly assist in the protection of process control systems by providing guidelines and requirements for the implementation of computer-controlled systems. These standards are most effective when the engineers and operators, using the standards, understand what each standard addresses. This paper provides an overview of several standards that deal with the cyber security of process measurements and control systems.

  10. Distributed System of Processing of Data of Physical Experiments

    Science.gov (United States)

    Nazarov, A. A.; Moiseev, A. N.

    2014-11-01

    Complication of physical experiments and increasing volumes of experimental data necessitate the application of supercomputer and distributed computing systems for data processing. Design and development of such systems, their mathematical modeling, and investigation of their characteristics and functional capabilities is an urgent scientific and practical problem. In the present work, the characteristics of operation of such distributed system of processing of data of physical experiments are investigated using the apparatus of theory of queuing networks.

  11. Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images

    Directory of Open Access Journals (Sweden)

    Mehdi Hussain

    2016-05-01

    Full Text Available The goal of image steganographic methods considers three main key issues: high embedding capacity, good visual symmetry/quality, and security. In this paper, a hybrid data hiding method combining the right-most digit replacement (RMDR with an adaptive least significant bit (ALSB is proposed to provide not only high embedding capacity but also maintain a good visual symmetry. The cover-image is divided into lower texture (symmetry patterns and higher texture (asymmetry patterns areas and these textures determine the selection of RMDR and ALSB methods, respectively, according to pixel symmetry. This paper has three major contributions. First, the proposed hybrid method enhanced the embedding capacity due to efficient ALSB utilization in the higher texture areas of cover images. Second, the proposed hybrid method maintains the high visual quality because RMDR has the closest selection process to generate the symmetry between stego and cover pixels. Finally, the proposed hybrid method is secure against statistical regular or singular (RS steganalysis and pixel difference histogram steganalysis because RMDR is capable of evading the risk of RS detection attacks due to pixel digits replacement instead of bits. Extensive experimental tests (over 1500+ cover images are conducted with recent least significant bit (LSB-based hybrid methods and it is demonstrated that the proposed hybrid method has a high embedding capacity (800,019 bits while maintaining good visual symmetry (39.00% peak signal-to-noise ratio (PSNR.

  12. Process of activation of a palladium catalyst system

    Science.gov (United States)

    Sobolevskiy, Anatoly; Rossin, Joseph A.; Knapke, Michael J.

    2011-08-02

    Improved processes for activating a catalyst system used for the reduction of nitrogen oxides are provided. In one embodiment, the catalyst system is activated by passing an activation gas stream having an amount of each of oxygen, water vapor, nitrogen oxides, and hydrogen over the catalyst system and increasing a temperature of the catalyst system to a temperature of at least 180.degree. C. at a heating rate of from 1-20.degree./min. Use of activation processes described herein leads to a catalyst system with superior NOx reduction capabilities.

  13. Software control and system configuration management - A process that works

    Science.gov (United States)

    Petersen, K. L.; Flores, C., Jr.

    1983-01-01

    A comprehensive software control and system configuration management process for flight-crucial digital control systems of advanced aircraft has been developed and refined to insure efficient flight system development and safe flight operations. Because of the highly complex interactions among the hardware, software, and system elements of state-of-the-art digital flight control system designs, a systems-wide approach to configuration control and management has been used. Specific procedures are implemented to govern discrepancy reporting and reconciliation, software and hardware change control, systems verification and validation testing, and formal documentation requirements. An active and knowledgeable configuration control board reviews and approves all flight system configuration modifications and revalidation tests. This flexible process has proved effective during the development and flight testing of several research aircraft and remotely piloted research vehicles with digital flight control systems that ranged from relatively simple to highly complex, integrated mechanizations.

  14. Markov Skeleton Processes and Applications to Queueing Systems

    Institute of Scientific and Technical Information of China (English)

    Zhen-ting Hou

    2002-01-01

    In this paper, we apply the backward equations of Markov skeleton processes to queueing systems.The transient distribution of the waiting time of a GI/G/1 queueing system, the transient distribution of the length of a GI/G/N queueing system and the transient distribution of the length of queueing networks are obtained.

  15. Process planning for a modular component placement system

    NARCIS (Netherlands)

    Zijm, Willem H.M.; van Harten, Aart

    1993-01-01

    This paper discusses the design of a hierarchically structured process planning system for a printed circuit board assembly line. Basically, the assembly system consists of a series of independently operating placement modules, connected by a carrierless conveyor system. Both the modules and the

  16. Integration of Management Systems: A Process Based Model

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    The paper discusses the barriers of integration of management systems (IMS). A model based on process is explored. It is indicated that integrating management systems should not ignore the characteristics of the management systems, especially scope issues. IMS needs to take into the continuous improvement.

  17. 1st International Conference on Cognitive Systems and Information Processing

    CERN Document Server

    Hu, Dewen; Liu, Huaping

    2014-01-01

    "Foundations and Practical Applications of Cognitive Systems and Information Processing" presents selected papers from the First International Conference on Cognitive Systems and Information Processing, held in Beijing, China on December 15-17, 2012 (CSIP2012). The aim of this conference is to bring together experts from different fields of expertise to discuss the state-of-the-art in artificial cognitive systems and advanced information processing, and to present new findings and perspectives on future development. This book introduces multidisciplinary perspectives on the subject areas of Cognitive Systems and Information Processing, including cognitive sciences and technology, autonomous vehicles, cognitive psychology, cognitive metrics, information fusion, image/video understanding, brain-computer interfaces, visual cognitive processing, neural computation, bioinformatics, etc. The book will be beneficial for both researchers and practitioners in the fields of Cognitive Science, Computer Science and Cogni...

  18. A COST ORIENTED SYSTEM FOR HOLE MAKING PROCESSES

    Directory of Open Access Journals (Sweden)

    Uğur PAMUKOĞLU

    2004-01-01

    Full Text Available A knowledge based system for manufacturing of various hole making processes has been developed. In the system, selection of machining methods, determination of sequences based on cutting tools for each process, determination of process time and cost analysis have been conducted. In the procedure, all available processes have been taken in to account regarding their costs and the most suitable in cost was chosen. The system generated helps facilitate determination of process time and the costs of features to be manufactured. It is especially useful for quick cost estimation. In addition to these, the system helps people who are naïve in manufacturing operations so that people could be used for the related manufacturing stages.

  19. Microscale and Nanoscale Process Systems Engineering: Challenge and Progress

    Institute of Scientific and Technical Information of China (English)

    杨友麒

    2008-01-01

    This is an overview of the development of process systems engineering (PSE) in a smaller world. Two different spatio-temporal scopes are identified for microscale and nanoscale process systems. The features and challenges for each scale are reviewed, and different methodologies used by them discussed. Comparison of these two new areas with traditional process systems engineering is described. If microscale PSE could be considered as an extension of traditional PSE, nanoscale PSE should be accepted as a new discipline which has looser connection with the extant core of chemical engineering. Since "molecular factories" is the next frontier of processing scale, nanoscale PSE will be the new theory to handle the design, simulation and operation of those active processing systems.

  20. Performance appraisal process and system facets: relationship with contextual performance.

    Science.gov (United States)

    Findley, H M; Giles, W F; Mossholder, K W

    2000-08-01

    Because appraisal-related interactions between supervisors and employees may influence more than task performance, the authors considered the potential effects of social and interpersonal processes in performance appraisal on contextual performance. They hypothesized that performance appraisal process and system facets were associated with employees' contextual performance as well as with their perceptions of appraisal accuracy. After controlling relevant variables, they found that appraisal process facets explained variance in contextual performance and perceived accuracy beyond that accounted for by the system facets. However, when the order of entry for the process and system variable sets was reversed, only for perceived appraisal accuracy, as hypothesized, did the system facets account for variance beyond that explained by the appraisal process facets.

  1. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-01

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  2. An extended process automation system : an approach based on a multi-agent system

    OpenAIRE

    Seilonen, Ilkka

    2006-01-01

    This thesis describes studies on application of multi-agent systems (acronym: MAS) to enhance process automation systems. A specification of an extended process automation system is presented. According to this specification, MAS can be used to extend the functionality of ordinary process automation systems at higher levels of control. Anticipated benefits of the specification include enhanced reconfigurability, responsiveness and flexibility properties of process automation. Previous res...

  3. Competing particle systems evolving by interacting Levy processes

    CERN Document Server

    Shkolnikov, Mykhaylo

    2010-01-01

    We consider finite and infinite systems of particles on the real line and half-line evolving in continuous time. Hereby, the particles are driven by i.i.d. Levy processes endowed with rank-dependent drift and diffusion coefficients. In the finite systems we show that the processes of gaps in the respective particle configurations possess unique invariant distributions and prove the convergence of the gap processes to the latter in the total variation distance, assuming a bound on the jumps of the Levy processes. In the infinite case we show that the gap process of the particle system on the half-line is tight for appropriate initial conditions and same drift and diffusion coefficients for all particles. Applications of such processes include the modelling of capital distributions among the ranked participants in a financial market, the stability of certain stochastic queueing and storage networks and the study of the Sherrington-Kirkpatrick model of spin glasses.

  4. Developing a lean measurement system to enhance process improvement

    Directory of Open Access Journals (Sweden)

    Lewis P.

    2013-01-01

    Full Text Available A key ingredient to underpin process improvement is a robust, reliable, repeatable measurement system. Process improvement activity needs to be supported by accurate and precise data because effective decision making, within process improvement activity, demands the use of “hard” data. One of the oldest and most established process improvement methods is Deming’s Plan-Do-Check-Act (PDCA cycle which is reliant on the check phase, a measurement activity where data is being gathered and evaluated. Recent expansions of the PDCA such as the Six-Sigma Define-Measure-Analyse-Improve-Control (DMAIC methodology place significant importance upon measurement. The DMAIC cycle incorporates the regimented requirement for the inclusion of measurement system analysis (MSA into the breakthrough strategy. The call for MSA within the DMAIC cycle is to provide the improvement activity with a robust measurement system that will ensure a pertinent level of data during any validation process. The Lean methodology is heavily centred on the removal of the seven Mudas (wastes from a manufacturing process: defects, overproduction, transportation, waiting, inventory, motion and processing. The application of lean, particularly within the manufacturing industry, has led to a perception that measurement is a waste within a manufacturing process because measurement processes identify defective products. The metrologists’ pursuit for measurement excellence could be construed as a hindrance by the “cost down” demands being perpetrated from the same organisation’s lean policy. So what possible benefits does enforcing the regimes of the lean and quality philosophies upon the measurement process have and how does this ultimately enhance the process improvement activity? The key fundamental to embed with any process improvement is the removal of waste. The process improvement techniques embedded within lean and quality concepts are extremely powerful practices in the

  5. Thermal processing system concepts and considerations for RWMC buried waste

    Energy Technology Data Exchange (ETDEWEB)

    Eddy, T.L.; Kong, P.C.; Raivo, B.D.; Anderson, G.L.

    1992-02-01

    This report presents a preliminary determination of ex situ thermal processing system concepts and related processing considerations for application to remediation of transuranic (TRU)-contaminated buried wastes (TRUW) at the Radioactive Waste Management Complex (RWMC) of the Idaho National Engineering Laboratory (INEL). Beginning with top-level thermal treatment concepts and requirements identified in a previous Preliminary Systems Design Study (SDS), a more detailed consideration of the waste materials thermal processing problem is provided. Anticipated waste stream elements and problem characteristics are identified and considered. Final waste form performance criteria, requirements, and options are examined within the context of providing a high-integrity, low-leachability glass/ceramic, final waste form material. Thermal processing conditions required and capability of key systems components (equipment) to provide these material process conditions are considered. Information from closely related companion study reports on melter technology development needs assessment and INEL Iron-Enriched Basalt (IEB) research are considered. Five potentially practicable thermal process system design configuration concepts are defined and compared. A scenario for thermal processing of a mixed waste and soils stream with essentially no complex presorting and using a series process of incineration and high temperature melting is recommended. Recommendations for applied research and development necessary to further detail and demonstrate the final waste form, required thermal processes, and melter process equipment are provided.

  6. Nonterrestrial material processing and manufacturing of large space systems

    Science.gov (United States)

    Von Tiesenhausen, G.

    1979-01-01

    Nonterrestrial processing of materials and manufacturing of large space system components from preprocessed lunar materials at a manufacturing site in space is described. Lunar materials mined and preprocessed at the lunar resource complex will be flown to the space manufacturing facility (SMF), where together with supplementary terrestrial materials, they will be final processed and fabricated into space communication systems, solar cell blankets, radio frequency generators, and electrical equipment. Satellite Power System (SPS) material requirements and lunar material availability and utilization are detailed, and the SMF processing, refining, fabricating facilities, material flow and manpower requirements are described.

  7. Advanced Manufacturing Systems in Food Processing and Packaging Industry

    Science.gov (United States)

    Shafie Sani, Mohd; Aziz, Faieza Abdul

    2013-06-01

    In this paper, several advanced manufacturing systems in food processing and packaging industry are reviewed, including: biodegradable smart packaging and Nano composites, advanced automation control system consists of fieldbus technology, distributed control system and food safety inspection features. The main purpose of current technology in food processing and packaging industry is discussed due to major concern on efficiency of the plant process, productivity, quality, as well as safety. These application were chosen because they are robust, flexible, reconfigurable, preserve the quality of the food, and efficient.

  8. Active Learning of Markov Decision Processes for System Verification

    DEFF Research Database (Denmark)

    Chen, Yingke; Nielsen, Thomas Dyhre

    2012-01-01

    of input/output observations. While alleviating the problem of manually constructing a system model, the collection/generation of observed system behaviors can also prove demanding. Consequently we seek to minimize the amount of data required. In this paper we propose an algorithm for learning...... deterministic Markov decision processes from data by actively guiding the selection of input actions. The algorithm is empirically analyzed by learning system models of slot machines, and it is demonstrated that the proposed active learning procedure can significantly reduce the amount of data required...... demanding process, and this shortcoming has motivated the development of algorithms for automatically learning system models from observed system behaviors. Recently, algorithms have been proposed for learning Markov decision process representations of reactive systems based on alternating sequences...

  9. Expert,Neural and Fuzzy Systems in Process Planning

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    Computer aided process planning (CAPP) aims at improving efficiency, quali t y, and productivity in a manufacturing concern through reducing lead-times and costs by utilizing better manufacturing practices thus improving competitiveness in the market. CAPP attempts to capture the thoughts and methods of the experie nced process planner. Variant systems are understandable, generative systems can plan new parts. Expert systems increase flexibility, fuzzy logic captures vague knowledge while neural networks learn. The combination of fuzzy, neural and exp ert system technologies is necessary to capture and utilize the process planning logic. A system that maintains the dependability and clarity of variant systems , is capable of planning new parts, and improves itself through learning is neede d by industry.

  10. Integrated Main Propulsion System Performance Reconstruction Process/Models

    Science.gov (United States)

    Lopez, Eduardo; Elliott, Katie; Snell, Steven; Evans, Michael

    2013-01-01

    The Integrated Main Propulsion System (MPS) Performance Reconstruction process provides the MPS post-flight data files needed for postflight reporting to the project integration management and key customers to verify flight performance. This process/model was used as the baseline for the currently ongoing Space Launch System (SLS) work. The process utilizes several methodologies, including multiple software programs, to model integrated propulsion system performance through space shuttle ascent. It is used to evaluate integrated propulsion systems, including propellant tanks, feed systems, rocket engine, and pressurization systems performance throughout ascent based on flight pressure and temperature data. The latest revision incorporates new methods based on main engine power balance model updates to model higher mixture ratio operation at lower engine power levels.

  11. Pre-slaughter, slaughter and post-slaughter defects of skins and hides at the Sheba Tannery and Leather Industry, Tigray region, northern Ethiopia.

    Science.gov (United States)

    Kahsay, Tesfay; Negash, Guesh; Hagos, Yohannes; Hadush, Birhanu

    2015-08-21

    Skins and hides are perishable resources that can be damaged by parasitic diseases and human error, which result in downgrading or rejection. This study was conducted to identify defect types and to determine their prevalence in pickled sheep and wet blue goat skins and wet blue hides. Each selected skin or hide was examined for defects in natural light and the defects were graded according to established quality criteria in Ethiopian standard manuals. Major defects were captured by digital photography. The major pre-slaughter defects included scratches (64.2%), cockle (ekek) (32.8%), wounds or scars (12.6%), lesions from pox or lumpy skin disease (6.1%), poor substance (5%), branding marks (2.3%) and tick bites (1.5%). The presence of grain scratches in wet blue hides (76.3%) was significantly higher than in pickled sheep (67.2%) and wet blue goat (59.1%) skins. The major slaughter defects included flay cuts or scores, holes, poor pattern and vein marks, with a higher occurrence in wet blue goat skins (28.7%; P < 0.001) than in wet blue hides (22.8%) and pickled sheep skins (11.1%). The most prevalent postslaughter defects were grain cracks (14.9%), hide beetle damage (8%), damage caused by heat or putrefaction (3.7%) and machine-induced defects (0.5%). Grain cracks (27.04%) and hide beetle damage (13.9%) in wet blue goat skins were significantly more common than in wet blue hides and pickled sheep skins. These defects cause depreciation in the value of the hides and skins. Statistically significant (P < 0.001) higher rejection rates were recorded for wet blue hides (82.9%) than for pickled sheep skins (18.3%) and wet blue goat skins (8.5%). Improved animal health service delivery, effective disease control strategies and strong collaboration between stakeholders are suggested to enhance the quality of skins and hides.

  12. APPLEPIPS /Apple Personal Image Processing System/ - An interactive digital image processing system for the Apple II microcomputer

    Science.gov (United States)

    Masuoka, E.; Rose, J.; Quattromani, M.

    1981-01-01

    Recent developments related to microprocessor-based personal computers have made low-cost digital image processing systems a reality. Image analysis systems built around these microcomputers provide color image displays for images as large as 256 by 240 pixels in sixteen colors. Descriptive statistics can be computed for portions of an image, and supervised image classification can be obtained. The systems support Basic, Fortran, Pascal, and assembler language. A description is provided of a system which is representative of the new microprocessor-based image processing systems currently on the market. While small systems may never be truly independent of larger mainframes, because they lack 9-track tape drives, the independent processing power of the microcomputers will help alleviate some of the turn-around time problems associated with image analysis and display on the larger multiuser systems.

  13. Bioregenerative Life Support Systems Test Complex (Bio-Plex) Food Processing System: A Dual System

    Science.gov (United States)

    Perchonok, Michele; Vittadini, Elena; Peterson, Laurie J.; Swango, Beverly E.; Toerne, Mary E.; Russo, Dane M. (Technical Monitor)

    2001-01-01

    A Bioregenerative Life Support Test Complex, BIO-Plex, is currently being constructed at the Johnson Space Center (JSC) in Houston, TX. This facility will attempt to answer the questions involved in developing a lunar or planetary base. The Food Processing System (FPS) of the BIO-Plex is responsible for supplying food to the crew in coordination with the chosen mission scenario. Long duration space missions require development of both a Transit Food System and of a Lunar or Planetary Food System. These two systems are intrinsically different since the first one will be utilized in the transit vehicle in microgravity conditions with mostly resupplied foods, while the second will be used in conditions of partial gravity (hypogravity) to process foods from crops grown in the facility. The Transit Food System will consist of prepackaged food of extended shelf life. It will be supplemented with salad crops that will be consumed fresh. Microgravity imposes significant limitation on the ability to handle food and allows only for minimal processing. The challenge is to develop food systems similar to the International Space Station or Shuttle Food Systems but with a shelf life of 3 - 5 years. The Lunar or Planetary Food System will allow for food processing of crops due to the presence of some gravitational force (1/6 to 1/3 that of Earth). Crops such as wheat, soybean, rice, potato, peanut, and salad crops, will be processed to final products to provide a nutritious and acceptable diet for the crew. Not only are constraints imposed on the FPS from the crops (e.g., crop variation, availability, storage and shelf-life) but also significant requirements are present for the crew meals (e.g., RDA, high quality, safety, variety). The FPS becomes a fulcrum creating the right connection from crops to crew meals while dealing with issues of integration within a closed self-regenerative system (e.g., safe processing, waste production, volumes, air contaminations, water usage, etc

  14. Web-based software system for processing bilingual digital resources

    Directory of Open Access Journals (Sweden)

    Ralitsa Dutsova

    2014-09-01

    Full Text Available Web-based software system for processing bilingual digital resourcesThe article describes a software management system developed at the Institute of Mathematics and Informatics, BAS, for the creation, storing and processing of digital language resources in Bulgarian. Independent components of the system are intended for the creation and management of bilingual dictionaries, for information retrieval and data mining from a bilingual dictionary, and for the presentation of aligned corpora. A module which connects these components is also being developed. The system, implemented as a web-application, contains tools for compilation, editing and search within all components.

  15. Extracting Process and Mapping Management for Heterogennous Systems

    Science.gov (United States)

    Hagara, Igor; Tanuška, Pavol; Duchovičová, Soňa

    2013-12-01

    A lot of papers describe three common methods of data selection from primary systems. This paper defines how to select the correct method or combinations of methods for minimizing the impact of production system and common operation. Before using any method, it is necessary to know the primary system and its databases structures for the optimal use of the actual data structure setup and the best design for ETL process. Databases structures are usually categorized into groups, which characterize their quality. The classification helps to find the ideal method for each group and thus design a solution of ETL process with the minimal impact on the data warehouse and production system.

  16. Gathering Information from Transport Systems for Processing in Supply Chains

    Science.gov (United States)

    Kodym, Oldřich; Unucka, Jakub

    2016-12-01

    Paper deals with complex system for processing information from means of transport acting as parts of train (rail or road). It focuses on automated information gathering using AutoID technology, information transmission via Internet of Things networks and information usage in information systems of logistic firms for support of selected processes on MES and ERP levels. Different kinds of gathered information from whole transport chain are discussed. Compliance with existing standards is mentioned. Security of information in full life cycle is integral part of presented system. Design of fully equipped system based on synthesized functional nodes is presented.

  17. Developing of robot flexible processing system for shipbuilding profile steel

    Institute of Scientific and Technical Information of China (English)

    姚舜; 邱涛; 楼松年; 王宏杰

    2003-01-01

    A robot flexible processing system of shipbuilding profile steel was developed. The system consists of computer integrated control and robot. An off-line programming robot was used for marking and cutting of shipbuilding profile steel. In the system the deformation and position error of profile steel can be detected by precise sensors, and figure position coordinate error resulted from profile steel deformation can be compensated by modifying traveling track of robotic arm online. The practical operation results show that the system performance can meet the needs of profile steel processing.

  18. Modular trigger processing The GCT muon and quiet bit system

    CERN Document Server

    Stettler, Matthew; Hansen, Magnus; Iles, Gregory; Jones, John; PH-EP

    2007-01-01

    The CMS Global Calorimeter Trigger system's HCAL Muon and Quiet bit reformatting function is being implemented with a novel processing architecture. This architecture utilizes micro TCA, a modern modular communications standard based on high speed serial links, to implement a processing matrix. This matrix is configurable in both logical functionality and data flow, allowing far greater flexibility than current trigger processing systems. In addition, the modular nature of this architecture allows flexibility in scale unmatched by traditional approaches. The Muon and Quiet bit system consists of two major components, a custom micro TCA backplane and processing module. These components are based on Xilinx Virtex5 and Mindspeed crosspoint switch devices, bringing together state of the art FPGA based processing and Telcom switching technologies.

  19. Models for Trustworthy Service and Process Oriented Systems

    DEFF Research Database (Denmark)

    Lopez, Hugo Andres

    2010-01-01

    thesis is that we can provide a theoretical framework based on typed concurrent process and concurrent constraint calculi for the specication, analysis and verication of service and process oriented system designs which bridges the global and local view and combines the imperative and declarative......Service and process-oriented systems promise to provide more efective business and work processes and more flexible and adaptable enterprise IT systems. However, the technologies and standards are still young and unstable, making research in their theoretical foundations increasingly important. Our...... studies focus on two dichotomies: the global/local views of service interactions, and their imperative/declarative specification. A global view of service interactions describes a process as a protocol for interactions, as e.g. an UML sequence diagram or a WS-CDL choreography. A local view describes...

  20. Statistical process control methods for expert system performance monitoring.

    Science.gov (United States)

    Kahn, M G; Bailey, T C; Steib, S A; Fraser, V J; Dunagan, W C

    1996-01-01

    The literature on the performance evaluation of medical expert system is extensive, yet most of the techniques used in the early stages of system development are inappropriate for deployed expert systems. Because extensive clinical and informatics expertise and resources are required to perform evaluations, efficient yet effective methods of monitoring performance during the long-term maintenance phase of the expert system life cycle must be devised. Statistical process control techniques provide a well-established methodology that can be used to define policies and procedures for continuous, concurrent performance evaluation. Although the field of statistical process control has been developed for monitoring industrial processes, its tools, techniques, and theory are easily transferred to the evaluation of expert systems. Statistical process tools provide convenient visual methods and heuristic guidelines for detecting meaningful changes in expert system performance. The underlying statistical theory provides estimates of the detection capabilities of alternative evaluation strategies. This paper describes a set of statistical process control tools that can be used to monitor the performance of a number of deployed medical expert systems. It describes how p-charts are used in practice to monitor the GermWatcher expert system. The case volume and error rate of GermWatcher are then used to demonstrate how different inspection strategies would perform.

  1. Risk communication strategy development using the aerospace systems engineering process

    Science.gov (United States)

    Dawson, S.; Sklar, M.

    2004-01-01

    This paper explains the goals and challenges of NASA's risk communication efforts and how the Aerospace Systems Engineering Process (ASEP) was used to map the risk communication strategy used at the Jet Propulsion Laboratory to achieve these goals.

  2. Automated Internal Revenue Processing System: A Panacea For ...

    African Journals Online (AJOL)

    Automated Internal Revenue Processing System: A Panacea For Financial Problems In Kogi State. ... West African Journal of Industrial and Academic Research ... These problems include: delay in the remittance of collected revenue to the ...

  3. Flexible Process Notations for Cross-organizational Case Management Systems

    DEFF Research Database (Denmark)

    Slaats, Tijs

    2016-01-01

    frustration and inefficiency because they do not allow workers to use their expert experience to make the best judgements on how to solve the unique challenges they are faced with. However some structuring of their work is still required to ensure that laws and business rules are being followed. IT Systems...... for process control have a large role to play in structuring and organizing such processes, however most of these systems have been developed with a focus on production work and fail to support the more flexible processes required by knowledge workers. The problem arises at the core of these systems...... of the process and techniques for runtime adaptation. This dissertation reports on the results of the Technologies for Flexible Cross-organizational Case Management Systems (FLExCMS) research project which was started in cooperation between ITU and the company Exformatics A/S. The goals of the project were...

  4. Solar System Processes Underlying Planetary Formation, Geodynamics, and the Georeactor

    CERN Document Server

    Herndon, J M

    2006-01-01

    Only three processes, operant during the formation of the Solar System, are responsible for the diversity of matter in the Solar System and are directly responsible for planetary internal-structures, including planetocentric nuclear fission reactors, and for dynamical processes, including and especially, geodynamics. These processes are: (i) Low-pressure, low-temperature condensation from solar matter in the remote reaches of the Solar System or in the interstellar medium; (ii) High-pressure, high-temperature condensation from solar matter associated with planetary-formation by raining out from the interiors of giant-gaseous protoplanets, and; (iii) Stripping of the primordial volatile components from the inner portion of the Solar System by super-intense solar wind associated with T-Tauri phase mass-ejections, presumably during the thermonuclear ignition of the Sun. As described herein, these processes lead logically, in a causally related manner, to a coherent vision of planetary formation with profound imp...

  5. An expert systems application to space base data processing

    Science.gov (United States)

    Babb, Stephen M.

    1988-01-01

    The advent of space vehicles with their increased data requirements are reflected in the complexity of future telemetry systems. Space based operations with its immense operating costs will shift the burden of data processing and routine analysis from the space station to the Orbital Transfer Vehicle (OTV). A research and development project is described which addresses the real time onboard data processing tasks associated with a space based vehicle, specifically focusing on an implementation of an expert system.

  6. An Automatic Number Plate Recognition System under Image Processing

    OpenAIRE

    Sarbjit Kaur

    2016-01-01

    Automatic Number Plate Recognition system is an application of computer vision and image processing technology that takes photograph of vehicles as input image and by extracting their number plate from whole vehicle image , it display the number plate information into text. Mainly the ANPR system consists of 4 phases: - Acquisition of Vehicle Image and Pre-Processing, Extraction of Number Plate Area, Character Segmentation and Character Recognition. The overall accuracy and efficiency of whol...

  7. The processing of information from sensors in intelligent systems

    Science.gov (United States)

    Kokovin, V. A.; Sytin, A. N.

    2017-01-01

    The article describes the processing of information obtained from sensors in intelligent systems. The paper analyzes the need of advanced treatment for a paralleling operation calculator which reduces the time of response to input events. A realization of a speculative processing algorithm in the FPGA by streaming control is based on a data flow model. This solution can be used in applications related to telecommunications networks of distributed control systems.

  8. An expert systems application to space base data processing

    Science.gov (United States)

    Babb, Stephen M.

    1988-01-01

    The advent of space vehicles with their increased data requirements are reflected in the complexity of future telemetry systems. Space based operations with its immense operating costs will shift the burden of data processing and routine analysis from the space station to the Orbital Transfer Vehicle (OTV). A research and development project is described which addresses the real time onboard data processing tasks associated with a space based vehicle, specifically focusing on an implementation of an expert system.

  9. 4th International Conference on Communications, Signal Processing, and Systems

    CERN Document Server

    Mu, Jiasong; Wang, Wei; Zhang, Baoju

    2016-01-01

    This book brings together papers presented at the 4th International Conference on Communications, Signal Processing, and Systems, which provides a venue to disseminate the latest developments and to discuss the interactions and links between these multidisciplinary fields. Spanning topics ranging from Communications, Signal Processing and Systems, this book is aimed at undergraduate and graduate students in Electrical Engineering, Computer Science and Mathematics, researchers and engineers from academia and industry as well as government employees (such as NSF, DOD, DOE, etc).

  10. Directionally hiding objects and creating illusions above a carpet-like device by reflection holography

    Science.gov (United States)

    Cheng, Qiluan; Wu, Kedi; Shi, Yile; Wang, Hui; Wang, Guo Ping

    2015-02-01

    Realization of a perfect invisibility cloak still challenges the current fabricating technologies. Most experiments, if not all, are hence focused on carpet cloaks because of their relatively low requirements to material properties. Nevertheless, present invisibility carpets are used to hide beneath objects. Here, we report a carpet-like device to directionally conceal objects and further to create illusions above it. The device is fabricated through recording a reflection hologram of objects and is used to produce a time-reversed signal to compensate for the information of the objects and further to create light field of another object so as to realize both functions of hiding the objects and creating illusions, respectively. The carpet-like device can work for macroscopic objects at visible wavelength as the distance between objects and device is at decimeter scale. Our carpet-like device to realizing invisibility and creating illusions may provide a robust way for crucial applications of magic camouflaging and anti-detection etc.

  11. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm

    Directory of Open Access Journals (Sweden)

    Ching-Yu Yang

    2012-01-01

    Full Text Available This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.

  12. Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding

    CERN Document Server

    Bahi, Jacques M; Guyeux, Christophe; Wang, Qianxue

    2011-01-01

    Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we described a generator based on chaotic iterations which behaves chaotically as defined by Devaney. In this paper which is an extension of the work presented at the conference Internet`10, the proposal is to improve the speed, the security, and the evaluation of this generator, to make its use more relevant in the Internet security context. In order to do so, a comparative study between various generators is carried out and statistical results are improved. Finally, an application in the information hiding framework is presented with details, to give an illustrative example of the use of such a gener...

  13. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  14. Double Hiding Information in Color Image File Based on Classical LSB Method

    Directory of Open Access Journals (Sweden)

    Aymen Mudheher Badr

    2014-07-01

    Full Text Available This study presents a two principles, Cryptography and Steganography, each tow methods work separately from the other to ensure a secure content. We are developed an algorithm to increase the safety and reliability of the copyrights of the images or books (etc. that published on the internet by providing a watermark image (as logo hiding inside the original file that we want product it. Firstly reading image (the logo image, convert it to binary and encrypted it by using EX-OR with a secret key and embedding it inside a gray image in the LSB (in the 1st and hiding first key in the 2nd bit and the second key in the 3rd bit, then we embedding them in the LSB of Original image in RGB to be protected. The two secret keys, first one as an encryption key and the second key using as signature (data that have been taken from the cover image (original to make sure the reliability of the image transmitted via the Internet.

  15. Analysis of multi-stage open shop processing systems

    CERN Document Server

    Eggermont, Christian; Woeginger, Gerhard J

    2011-01-01

    We study algorithmic problems in multi-stage open shop processing systems that are centered around reachability and deadlock detection questions. We characterize safe and unsafe system states. We show that it is easy to recognize system states that can be reached from the initial state (where the system is empty), but that in general it is hard to decide whether one given system state is reachable from another given system state. We show that the problem of identifying reachable deadlock states is hard in general open shop systems, but is easy in the special case where no job needs processing on more than two machines (by linear programming and matching theory), and in the special case where all machines have capacity one (by graph-theoretic arguments).

  16. Design of launch systems using continuous improvement process

    Science.gov (United States)

    Brown, Richard W.

    1995-01-01

    The purpose of this paper is to identify a systematic process for improving ground operations for future launch systems. This approach is based on the Total Quality Management (TQM) continuous improvement process. While the continuous improvement process is normally identified with making incremental changes to an existing system, it can be used on new systems if they use past experience as a knowledge base. In the case of the Reusable Launch Vehicle (RLV), the Space Shuttle operations provide many lessons. The TQM methodology used for this paper will be borrowed from the United States Air Force 'Quality Air Force' Program. There is a general overview of the continuous improvement process, with concentration on the formulation phase. During this phase critical analyses are conducted to determine the strategy and goals for the remaining development process. These analyses include analyzing the mission from the customers point of view, developing an operations concept for the future, assessing current capabilities and determining the gap to be closed between current capabilities and future needs and requirements. A brief analyses of the RLV, relative to the Space Shuttle, will be used to illustrate the concept. Using the continuous improvement design concept has many advantages. These include a customer oriented process which will develop a more marketable product and a better integration of operations and systems during the design phase. But, the use of TQM techniques will require changes, including more discipline in the design process and more emphasis on data gathering for operational systems. The benefits will far outweigh the additional effort.

  17. Signals, processes, and systems an interactive multimedia introduction to signal processing

    CERN Document Server

    Karrenberg, Ulrich

    2013-01-01

    This is a very new concept for learning Signal Processing, not only from the physically-based scientific fundamentals, but also from the didactic perspective, based on modern results of brain research. The textbook together with the DVD form a learning system that provides investigative studies and enables the reader to interactively visualize even complex processes. The unique didactic concept is built on visualizing signals and processes on the one hand, and on graphical programming of signal processing systems on the other. The concept has been designed especially for microelectronics, computer technology and communication. The book allows to develop, modify, and optimize useful applications using DasyLab - a professional and globally supported software for metrology and control engineering. With the 3rd edition, the software is also suitable for 64 bit systems running on Windows 7. Real signals can be acquired, processed and played on the sound card of your computer. The book provides more than 200 pre-pr...

  18. REVISITING THE SIMILAR PROCESS TO ENGINEER THE CONTEMPORARY SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    Ana Luísa RAMOS; José Vasconcelos FERREIRA; Jaume BARCEL(O)

    2010-01-01

    This paper addresses the present-day context of Systems Engineering,revisiting and setting up an updated framework for the SIMILAR process in order to use it to engineer the contemporary systems.The contemporary world is crowded of large interdisciplinary complex systems made of other systems,personnel,hardware,softare,information,processes,and facilities.An integrated holistic approach is crucial to develop these systems and take proper account of their multifaceted nature and numerous interrelationships.As the system's complexity and extent grow,the number of parties involved(stakeholders and shareholders)usually also raises,bringing to the interaction a considerable amount of points of view,skills,responsibilities,and interests.The Systems Engineering approach aims to tackle the complex and interdisciplinary whole of those socio-technical systems,providing the means to enable their successful realization.Its exploitation in our modern world is assuming an increasing relevance noticeable by emergent standards,academic papers,international conferences,and post-graduate programmes in the field.This work aims to provide"the picture"of modern Systems Engineering,and to update the context of the SIMILAR process model in order to use this renewed framework to engineer the challenging contemporary systems.The emerging trends in the field are also pointed-out with particular reference to the Model-Based Systems Engineering approach.

  19. Digital Signal Processing for In-Vehicle Systems and Safety

    CERN Document Server

    Boyraz, Pinar; Takeda, Kazuya; Abut, Hüseyin

    2012-01-01

    Compiled from papers of the 4th Biennial Workshop on DSP (Digital Signal Processing) for In-Vehicle Systems and Safety this edited collection features world-class experts from diverse fields focusing on integrating smart in-vehicle systems with human factors to enhance safety in automobiles. Digital Signal Processing for In-Vehicle Systems and Safety presents new approaches on how to reduce driver inattention and prevent road accidents. The material addresses DSP technologies in adaptive automobiles, in-vehicle dialogue systems, human machine interfaces, video and audio processing, and in-vehicle speech systems. The volume also features: Recent advances in Smart-Car technology – vehicles that take into account and conform to the driver Driver-vehicle interfaces that take into account the driving task and cognitive load of the driver Best practices for In-Vehicle Corpus Development and distribution Information on multi-sensor analysis and fusion techniques for robust driver monitoring and driver recognition ...

  20. Characteristics of the Audit Processes for Distributed Informatics Systems

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2009-01-01

    Full Text Available The paper contains issues regarding: main characteristics and examples of the distributed informatics systems and main difference categories among them, concepts, principles, techniques and fields for auditing the distributed informatics systems, concepts and classes of the standard term, characteristics of this one, examples of standards, guidelines, procedures and controls for auditing the distributed informatics systems. The distributed informatics systems are characterized by the following issues: development process, resources, implemented functionalities, architectures, system classes, particularities. The audit framework has two sides: the audit process and auditors. The audit process must be led in accordance with the standard specifications in the IT&C field. The auditors must meet the ethical principles and they must have a high-level of professional skills and competence in IT&C field.