WorldWideScience

Sample records for hide show additional

  1. Efficient Information Hiding Based on Theory of Numbers

    Directory of Open Access Journals (Sweden)

    Yanjun Liu

    2018-01-01

    Full Text Available Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hiding scheme based on the combination of Chinese remainder theorem (CRT and a new extraction function is proposed. By the proposed scheme, the cover image is divided into non-overlapping pixel groups for embedding to increase the embedding capacity. Experimental results show that the embedding capacity of the proposed scheme is significantly higher (greater than 2.5 bpp than previously proposed schemes while ensuring very good visual quality of the stego image. In addition, security analysis is given to show that the proposed scheme can resist visual attack.

  2. Short term preservation of hide using vacuum: influence on properties of hide and of processed leather.

    Science.gov (United States)

    Gudro, Ilze; Valeika, Virgilijus; Sirvaitytė, Justa

    2014-01-01

    The objective of this work was to investigate vacuum influence on hide preservation time and how it affects hide structure. It was established that vacuum prolongs the storage time without hide tissue putrefaction up to 21 days when the storage temperature is 4°C. The microorganisms act for all storage times, but the action is weak and has no observable influence on the quality of hide during the time period mentioned. The hide shrinkage temperature decrease is negligible, which shows that breaking of intermolecular bonds does not occur. Optical microscopy, infrared spectroscopy and differential scanning calorimetry also did not show any structural changes which can influence the quality of leather produced from such hide. The qualitative indexes of wet blue processed under laboratory conditions and of leather produced during industrial trials are presented. Indexes such as chromium compounds exhaustion, content of chromium in leather, content of soluble matter in dichloromethane, strength properties, and shrinkage temperature were determined. Properties of the leather produced from vacuumed hide under industrial conditions conformed to the requirements of shoe upper leather.

  3. Optical hiding with visual cryptography

    Science.gov (United States)

    Shi, Yishi; Yang, Xiubo

    2017-11-01

    We propose an optical hiding method based on visual cryptography. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof and image-covered, leading to the high security. During the extraction process, the covered phase-keys are illuminated with laser beams and then incoherently superimposed to extract the hidden information directly by human vision, without complicated optical implementations and any additional computation, resulting in the convenience of extraction. Also, the phase-keys are manufactured as the diffractive optical elements that are robust to the attacks, such as the blocking and the phase-noise. Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.

  4. An Image Encryption Method Based on Bit Plane Hiding Technology

    Institute of Scientific and Technical Information of China (English)

    LIU Bin; LI Zhitang; TU Hao

    2006-01-01

    A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane of several different open images. And then a new hiding image is acquired by a nesting "Exclusive-OR" operation on those images obtained from the first step. At last, by employing image fusion technique, the final hiding result is achieved. The experimental result shows that the method proposed in this paper is effective.

  5. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  6. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients

    Science.gov (United States)

    Zhang, Xiaoqiang; Wang, Z. Jane

    2013-10-01

    Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 10 to 10 and thus can resist brute-force attack and unauthorized detection watermark attack.

  7. Image hiding using optical interference

    Science.gov (United States)

    Zhang, Yan; Wang, Weining

    2010-09-01

    Optical image encryption technology has attracted a lot of attentions due to its large capacitance and fast speed. In conventional image encryption methods, the random phase masks are used as encryption keys to encode the images into white noise distribution. Therefore, this kind of methods requires interference technology to record complex amplitude and is vulnerable to attack techniques. The image hiding methods which employ the phase retrieve algorithm to encode the images into two or more phase masks are proposed, the hiding process is carried out within a computer using iterative algorithm. But the iterative algorithms are time consumed. All method mentioned above are based on the optical diffraction of the phase masks. In this presentation, a new optical image hiding method based on optical interference is proposed. The coherence lights which pass through two phase masks are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are design analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the novelty of the new proposed methods. This method can be expanded for double images hiding.

  8. Effect of Some Sudanese Traditional Hot Iron Branding on Cattle Hide Quality

    Directory of Open Access Journals (Sweden)

    Rehab Eltejani Abdelkarim

    2016-12-01

    Full Text Available This study was designed in order to assess and evaluate the effect of hot iron branding on cattle hide quality. 62 shapes of hot iron branding were detected and classified. Branding damage was evaluated depending on: purpose of application, location in the animal body, branding area, tribe which applied and hide degree. The results showed that, Baggara tribes branding were causing the greater damage on cattle hides; where 71.4% of its brands placed in the abdominal and animal back area (middle of the hide; in proportion to Misseriya Zuraq tribes (68.4%. According to the location of branding, the less tribe that causing damages to the cattle hides were Darfur tribes (14.3%. In terms of branding area Darfur tribes were causing the most branding damages where 42.8% of its brands on cattle hides were between 20-30cm, followed by Baggara tribes where 57.1% of its brands were between 10-20cm then Misseriya Zuraq tribes by 52.6%, and finally North Kordofan tribes of 37.5%. grading of cattle hides depending on the presence of the brand marks the study revealed that, Misseriya Zuraq tribe's brands were obtained the highest percentage (89.4% of the rejected hides (Scarto= 4 and 5 grades, when compared with North Kordofan tribes (87.5%. For commercial reason brand's were mostly done in the area of 5-10cm but, their effect on cattle hide quality was greater, where 81% of the hides were classified as Scarto.

  9. Hackers in Hiding:

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2016-01-01

    On several occasions Michel Foucault advocated a methodological turn towards what he called a ‘happy positivism’. Foucault’s emphasis on the surface does not deny the importance of structures of hiding, but understands it as a game in which the structures of hiding are viewed as contingently given....... In this paper, I will analyse the conflict between the hacker movement and the field of corporate interests. I argue that the introduction of graphical user interfaces and the maintaining of copyright interests are the contingent background of the ongoing conflict. By bracketing the analyses of hidden...

  10. Optical image hiding based on interference

    Science.gov (United States)

    Zhang, Yan; Wang, Bo

    2009-11-01

    Optical image processing has been paid a lot of attentions recently due to its large capacitance and fast speed. Many image encryption and hiding technologies have been proposed based on the optical technology. In conventional image encryption methods, the random phase masks are usually used as encryption keys to encode the images into random white noise distribution. However, this kind of methods requires interference technology such as holography to record complex amplitude. Furthermore, it is vulnerable to attack techniques. The image hiding methods employ the phase retrieve algorithm to encode the images into two or more phase masks. The hiding process is carried out within a computer and the images are reconstructed optically. But the iterative algorithms need a lot of time to hide the image into the masks. All methods mentioned above are based on the optical diffraction of the phase masks. In this presentation, we will propose a new optical image hiding method based on interference. The coherence lights pass through two phase masks and are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are designed analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the validity of the new proposed methods.

  11. Sensitive plant (Mimosa pudica hiding time depends on individual and state

    Directory of Open Access Journals (Sweden)

    Sarah Reed-Guy

    2017-07-01

    Full Text Available The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  12. Selective Redundancy Removal: A Framework for Data Hiding

    Directory of Open Access Journals (Sweden)

    Ugo Fiore

    2010-02-01

    Full Text Available Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs. Such redundancy may be removed by means of optimization software. Redundancy removal, if applied selectively, enables information hiding. This work introduces Selective Redundancy Removal (SRR as a framework for hiding data. An example application of the framework is given in terms of hiding information in HTML documents. Non-uniformity across documents may raise alarms. Nevertheless, selective application of optimization techniques might be due to the legitimate use of optimization software not supporting all the optimization methods, or configured to not use all of them.

  13. Reflections on Quantum Data Hiding

    Science.gov (United States)

    Winter, Andreas

    Quantum data hiding, originally invented as a limitation on local operations and classical communications (LOCC) in distinguishing globally orthogonal states, is actually a phenomenon arising generically in statistics whenever comparing a `strong' set of measurements (i.e., decision rules) with a `weak' one. The classical statistical analogue of this would be secret sharing, in which two perfectly distinguishable multi-partite hypotheses appear to be indistinguishable when accessing only a marginal. The quantum versions are richer in that for example LOCC allows for state tomography, so the states cannot be come perfectly indistinguishable but only nearly so, and hence the question is one of efficiency. I will discuss two concrete examples and associated sets of problems: 1. Gaussian operations and classical computation (GOCC): Not very surprisingly, GOCC cannot distinguish optimally even two coherent states of a single mode. Here we find states, each a mixture of multi-mode coherent states, which are almost perfectly distinguishable by suitable measurements, by when restricted to GOCC, i.e. linear optics and post-processing, the states appear almost identical. The construction is random and relies on coding arguments. Open questions include whether there one can give a constructive version of the argument, and whether for instance even thermal states can be used, or how efficient the hiding is. 2. Local operation and classical communication (LOCC): It is well-known that in a bipartite dxd-system, asymptotically logd bits can be hidden. Here we show for the first time, using the calculus of min-entropies, that this is asymptotically optimal. In fact, we get bounds on the data hiding capacity of any preparation system; these are however not always tight. While it is known that data hiding by separable states is possible (i.e. the state preparation can be done by LOCC), it is open whether the optimal information efficiency of (asymptotically) log d bits can be

  14. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  15. Recent Advances in Information Hiding and Applications

    CERN Document Server

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao

    2013-01-01

    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  16. Alkali-free method of hide preparation for tanning

    Directory of Open Access Journals (Sweden)

    V. Valeika

    2012-06-01

    Full Text Available Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming up to strongly acid (pickling. This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. During both processes, unhairing and oxidative treatment, the opening of the derma structure occurs: 13.3-14.6g of non-collagen proteins are removed and amount of dermatan sulphate decreases by 35%. The hide obtained can be chromed directly after the above processes and subsequent treatment with sodium chloride solution omitted conventional pickling. The pH of the hide varies in the range of 8.3-3.7 during the processes of preparation for tanning.

  17. Multiple-image hiding using super resolution reconstruction in high-frequency domains

    Science.gov (United States)

    Li, Xiao-Wei; Zhao, Wu-Xiang; Wang, Jun; Wang, Qiong-Hua

    2017-12-01

    In this paper, a robust multiple-image hiding method using the computer-generated integral imaging and the modified super-resolution reconstruction algorithm is proposed. In our work, the host image is first transformed into frequency domains by cellular automata (CA), to assure the quality of the stego-image, the secret images are embedded into the CA high-frequency domains. The proposed method has the following advantages: (1) robustness to geometric attacks because of the memory-distributed property of elemental images, (2) increasing quality of the reconstructed secret images as the scheme utilizes the modified super-resolution reconstruction algorithm. The simulation results show that the proposed multiple-image hiding method outperforms other similar hiding methods and is robust to some geometric attacks, e.g., Gaussian noise and JPEG compression attacks.

  18. Alkali-free method of hide preparation for tanning

    OpenAIRE

    Valeika, V.; Beleska, K.; Sirvaityte, J.

    2012-01-01

    Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming) up to strongly acid (pickling). This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. D...

  19. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  20. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Directory of Open Access Journals (Sweden)

    Andreas Wilke

    Full Text Available Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  1. Effects of gamma rays on the physical and mechanical properties of hide

    International Nuclear Information System (INIS)

    Sutrisno Puspodikoro.

    1976-01-01

    The effect of gamma rays on the physical and mechanical properties of hide has been studied, using Gammacell 220 as an irradiator. The determination of the physical and mechanical properties of the irradiated hide was carried out by Balai Penelitian Kulit (Leather Research Institute) at Yogyakarta. Experiments show that up to a certain dose of irradiation, favourable effects can be obtained, while higher doses impair the physical and mechanical properties of the leather raw materials. (author)

  2. Unitary embedding for data hiding with the SVD

    Science.gov (United States)

    Bergman, Clifford; Davidson, Jennifer

    2005-03-01

    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  3. Children and Robots Learning to Play Hide and Seek

    National Research Council Canada - National Science Library

    Trafton, J. G; Schultz, Alan C; Perznowski, Dennis; Bugajska, Magdalena D; Adams, William; Cassimatis, Nicholas L; Brock, Derek P

    2006-01-01

    ...., containment, under) and use that information to play a credible game of hide and seek. They model this hypothesis within the ACT-R cognitive architecture and put the model on a robot, which is able to mimic the child's hiding behavior. They also take the "hiding" model and use it as the basis for a "seeking" model. They suggest that using the same representations and procedures that a person uses allows better interaction between the human and robotic system.

  4. Efficient reversible data hiding in encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2014-09-01

    Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.

  5. Mechanical properties of biobased films prepared from collagen solutions derived from bovine hides

    Science.gov (United States)

    The most valuable byproducts of the meat packing industry are hides. The U.S. is the world’s 3rd largest hide producing country and currently produces approximately 35 million cattle hides annually. Due to fierce competition in global markets, the American leather and hides industry is facing chal...

  6. The Costs of Hiding and Faking Emotions: The Case of Extraverts and Introverts.

    Science.gov (United States)

    Seger-Guttmann, Tali; Medler-Liraz, Hana

    2016-01-01

    The present study examined the moderation effects of extraversion on the relationships between hiding and faking emotions, perceived satisfaction from intimate relationships, and reported physical health concerns. Four hundred and four Israeli participants, who were all involved in intimate relationships at the time of the study, responded to the Extraversion scale from the Big-Five Inventory, the DEELS to measure hiding and faking emotions, the SELF to assess physical health concerns, and the short version of the ENRICH to evaluate perceived satisfaction with intimate relationships. The mean age was 32.3 years (SD = 8.2); and the average length of time as a couple was 7.8 years (SD = 8.2). Of the participants, 198 were married (48.5%). The findings indicate that the effect of hiding negative emotions was stronger for perceived satisfaction with intimate relationships and physical health concerns than that for faking positive emotions. Extraverts who showed a higher frequency of hiding their negative emotions were significantly less satisfied with their relationships than introverts and they also tended to report more concerns with their physical health. These results were not found when extraverts reported a high frequency of faking positive emotions. These results are discussed in the context of the trait-behavior-concordance model and stress the importance of distinguishing faking from hiding.

  7. Information Hiding In Digital Video Using DCT, DWT and CvT

    Science.gov (United States)

    Abed Shukur, Wisam; Najah Abdullah, Wathiq; Kareem Qurban, Luheb

    2018-05-01

    The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the Normalized cross Correlation (NC). The experiments shows the error ratio of the proposed technique is (8%) while accuracy ratio is (92%) when the Curvelet Transform (CvT) is used, but compared with Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT), the error rates are 11% and 14% respectively, while the accuracy ratios are (89%) and (86%) respectively. So, the experiments shows the Poisson noise gives better results than other types of noises, while the speckle noise gives worst results compared with other types of noises. The proposed technique has been established by using MATLAB R2016a programming language.

  8. Perception of Stakeholders to the Proposed Ban on Cow Hide ...

    African Journals Online (AJOL)

    User

    Keywords: Cow hide consumption, cow hide value chain, ponmo .... value chain;. 2. identify sources of information of the respondents on the proposed ban; ..... the health risk associated with the consumption of ponmo may favour its proposed.

  9. Efficient hiding of confidential high-utility itemsets with minimal side effects

    Science.gov (United States)

    Lin, Jerry Chun-Wei; Hong, Tzung-Pei; Fournier-Viger, Philippe; Liu, Qiankun; Wong, Jia-Wei; Zhan, Justin

    2017-11-01

    Privacy preserving data mining (PPDM) is an emerging research problem that has become critical in the last decades. PPDM consists of hiding sensitive information to ensure that it cannot be discovered by data mining algorithms. Several PPDM algorithms have been developed. Most of them are designed for hiding sensitive frequent itemsets or association rules. Hiding sensitive information in a database can have several side effects such as hiding other non-sensitive information and introducing redundant information. Finding the set of itemsets or transactions to be sanitised that minimises side effects is an NP-hard problem. In this paper, a genetic algorithm (GA) using transaction deletion is designed to hide sensitive high-utility itemsets for PPUM. A flexible fitness function with three adjustable weights is used to evaluate the goodness of each chromosome for hiding sensitive high-utility itemsets. To speed up the evolution process, the pre-large concept is adopted in the designed algorithm. It reduces the number of database scans required for verifying the goodness of an evaluated chromosome. Substantial experiments are conducted to compare the performance of the designed GA approach (with/without the pre-large concept), with a GA-based approach relying on transaction insertion and a non-evolutionary algorithm, in terms of execution time, side effects, database integrity and utility integrity. Results demonstrate that the proposed algorithm hides sensitive high-utility itemsets with fewer side effects than previous studies, while preserving high database and utility integrity.

  10. Intersectional Analysis in Critical Mathematics Education Research: A Response to Figure Hiding

    Science.gov (United States)

    Bullock, Erika C.

    2018-01-01

    In this chapter, I use figure hiding as a metaphor representing the processes of exclusion and suppression that critical mathematics education (CME) seeks to address. Figure hiding renders identities and modes of thought in mathematics education and mathematics education research invisible. CME has a commitment to addressing figure hiding by…

  11. Perspective taking and theory of mind in hide and seek.

    Science.gov (United States)

    Street, Chris N H; Bischof, Walter F; Kingstone, Alan

    2018-01-01

    Does theory of mind play a significant role in where people choose to hide an item or where they search for an item that has been hidden? Adapting Anderson's "Hide-Find Paradigm" Anderson et al. (Action, Perception and Performance, 76, 907-913, 2014) participants viewed homogenous or popout visual arrays on a touchscreen table. Their task was to indicate where in the array they would hide an item, or to search for an item that had been hidden, by either a friend or a foe. Critically, participants believed that their sitting location at the touchtable was the same as-or opposite to-their partner's location. Replicating Anderson et al., participants tended to (1) select items nearer to themselves on homogenous displays, and this bias was stronger for a friend than foe; and (2) select popout items, and again, more for a friend than foe. These biases were observed only when participants believed that they shared the same physical perspective as their partner. Collectively, the data indicate that theory of mind plays a significant role in hiding and finding, and demonstrate that the hide-find paradigm is a powerful tool for investigating theory of mind in adults.

  12. Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

    Directory of Open Access Journals (Sweden)

    Mohammad S. Alam

    2012-10-01

    Full Text Available In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level.

  13. High-capacity method for hiding data in the discrete cosine transform domain

    Science.gov (United States)

    Qazanfari, Kazem; Safabakhsh, Reza

    2013-10-01

    Steganography is the art and science of hiding data in different media such as texts, audios, images, and videos. Data hiding techniques are generally divided into two groups: spatial and frequency domain techniques. Spatial domain methods generally have low security and, as a result, are less attractive to researchers. Discrete cosine transform (DCT) is the most common transform domain used in steganography and JPEG compression. Since a large number of the DCT coefficients of JPEG images are zero, the capacity of DCT domain-based steganography methods is not very high. We present a high-capacity method for hiding messages in the DCT domain. We describe the method in two classes where the receiver has and where the receiver does not have the cover image. In each class, we consider three cases for each coefficient. By considering n coefficients, there are 3n different situations. The method embeds ⌊log2 3n⌋ bits in these n coefficients. We show that the maximum reachable capacity by our method is 58% higher than the other general steganography methods. Experimental results show that the histogram-based steganalysis methods cannot detect the stego images produced by the proposed method while the capacity is increased significantly.

  14. Dynamics and driving forces of hides, skins, leather and leather ...

    African Journals Online (AJOL)

    Footwear and leather goods are constrained by lack of factories, competition from used goods, synthetic plastics and uninformed market. Investment in hides, skins and leather industry supported by training programmes has potential to generate great monetary revenue. Keywords: Hides, skin, leather, value chain, slaughter ...

  15. Effects of dehydration methods on characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  16. Market structure and performance of value chain actors in hides and ...

    African Journals Online (AJOL)

    Market structure and performance of value chain actors in hides and skins processing and marketing in Nigeria. ... There was high performance in hides and skins processing and marketing in Nigeria. ... EMAIL FULL TEXT EMAIL FULL TEXT

  17. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  18. Family networks and income hiding

    NARCIS (Netherlands)

    Beekman, Gonne; Gatto, Marcel; Nillesen, Eleonora

    2015-01-01

    This study investigates the relationship between family network density and income hiding in rural Liberia. We link people's behaviour in a modified lottery experiment and a time preference game to detailed information about their family networks. We find that individuals with a dense family

  19. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  20. Impact of Media Richness on Reduction of Knowledge-Hiding Behavior in Enterprises

    DEFF Research Database (Denmark)

    Labafi, Somayeh; Khajeheian, Datis; Williams, Idongesit

    2018-01-01

    in a qualitative study. Thematic analysis is used to analyze transcribed interview data from employees in a software company in Iran. The findings of the analysis show that media richness significantly impacts on organizational learning and influences on knowledge hiding behavior in employees. This article...... suggests that entrepreneurs and managers of small firms should provide employees’ access to rich media content as well as established organizational learning as part of their organizational culture.......Knowledge hiding is one of the major obstacles in the progression of organizations that hinder the use of tacit knowledge of employees. The negative impact of this behavior is more significant in enterprises and small firms because they are more reliant on knowledge of their employees...

  1. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  2. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  3. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    Directory of Open Access Journals (Sweden)

    H. Yang

    2009-12-01

    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  4. Prey should hide more randomly when a predator attacks more persistently.

    Science.gov (United States)

    Gal, Shmuel; Alpern, Steve; Casas, Jérôme

    2015-12-06

    When being searched for and then (if found) pursued by a predator, a prey animal has a choice between choosing very randomly among hiding locations so as to be hard to find or alternatively choosing a location from which it is more likely to successfully flee if found. That is, the prey can choose to be hard to find or hard to catch, if found. In our model, capture of prey requires both finding it and successfully pursuing it. We model this dilemma as a zero-sum repeated game between predator and prey, with the eventual capture probability as the pay-off to the predator. We find that the more random hiding strategy is better when the chances of repeated pursuit, which are known to be related to area topography, are high. Our results extend earlier results of Gal and Casas, where there was at most only a single pursuit. In that model, hiding randomly was preferred by the prey when the predator has only a few looks. Thus, our new multistage model shows that the effect of more potential looks is opposite. Our results can be viewed as a generalization of search games to the repeated game context and are in accordance with observed escape behaviour of different animals. © 2015 The Author(s).

  5. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization

    Science.gov (United States)

    Bajaj, Ruchika; Bedi, Punam; Pal, S. K.

    Steganography is an art of hiding information in such a way that prevents the detection of hidden messages. Besides security of data, the quantity of data that can be hidden in a single cover medium, is also very important. We present a secure data hiding scheme with high embedding capacity for messages of variable length based on Particle Swarm Optimization. This technique gives the best pixel positions in the cover image, which can be used to hide the secret data. In the proposed scheme, k bits of the secret message are substituted into k least significant bits of the image pixel, where k varies from 1 to 4 depending on the message length. The proposed scheme is tested and results compared with simple LSB substitution, uniform 4-bit LSB hiding (with PSO) for the test images Nature, Baboon, Lena and Kitty. The experimental study confirms that the proposed method achieves high data hiding capacity and maintains imperceptibility and minimizes the distortion between the cover image and the obtained stego image.

  6. Effects of dehydration methods on the characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  7. Information hiding technique

    Science.gov (United States)

    Younger, Michael; Budulas, Peter P.; Young, Stuart H.

    2002-08-01

    Spread spectrum communication techniques have been recognized as a viable method to gain an advantage in interference environments. Many military-oriented systems have been initiated, and some civil systems have been attempted. Spread spectrum allows the ability to hide the signal of interest below or in the noise floor, so as not to be detected. A spread spectrum system is one in which the transmitted signal is spread over a wide frequency band, much wider, in fact, than the minimum bandwidth required to transmit the information being sent. We at Army Research Lab (ARL) are proposing using the same technique on the Internet with port hopping. The information would be transmitted in data packets over multiple ports. The port used would vary per packet or per session basis. This port hopping gives you and the recipients the ability to take datagram's and spread them out over a multitude of ports. This will hide information among the Internet noise. This will allow trusted communications between the transmitter and receiver because of the port coding sequence. There are 64K possible ports to span datagram. Jamming of transmission would be limiting the ability of the sniffer/listener. Also, the listener will find it difficult to use a man in the middle attach, since the data will be spread over multiple ports and only the receiver and transmitter will know the specific port sequencing for the datagram.

  8. Succession of hide-seek and pursuit-evasion at heterogeneous locations.

    Science.gov (United States)

    Gal, Shmuel; Casas, Jérôme

    2014-05-06

    Many interactions between searching agents and their elusive targets are composed of a succession of steps, whether in the context of immune systems, predation or counterterrorism. In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit-escape. Our aim is to link these two processes, usually analysed separately and with different models, in a single game theory context. We define a matrix game in which a searcher looks at a fixed number of discrete locations only once each searching for a hider, which can escape with varying probabilities according to its location. The value of the game is the overall probability of capture after k looks. The optimal search and hide strategies are described. If a searcher looks only once into any of the locations, an optimal hider chooses it's hiding place so as to make all locations equally attractive. This optimal strategy remains true as long as the number of looks is below an easily calculated threshold; however, above this threshold, the optimal position for the hider is where it has the highest probability of escaping once spotted.

  9. An evaluation of selected methods for the decontamination of cattle hides prior to skinning.

    Science.gov (United States)

    Small, A; Wells-Burr, B; Buncic, S

    2005-02-01

    The effectiveness of different decontamination treatments in reducing microbial loads on cattle hides was assessed. The 10-s hide treatments were conducted using a wet-and-dry vacuum cleaner filled with one of the liquids (heated to 50 °C) indicated below, followed or not by 10-min drying in the air. Also, the hide was clipped, followed or not by 10-s singeing using a hand-held blowtorch. Before and after each decontamination treatment, the hide was sampled (100 cm(2) areas) by a sponge-swabbing method to compare the total viable counts of bacteria (TVC). The largest bacterial reduction (Psanitizer solution (10% Betane Plus) resulted in significant reductions of 1.80 (Peffects. Since hide contamination is associated with microbial contamination of the carcasses, the results indicate that post-killing/pre-skinning hide decontamination (used alone, or in combination with carcass decontamination) has a potential to improve microbial meat safety. Nevertheless, further research is required to optimise the efficacy of these treatments in the reduction of specific pathogens under commercial conditions.

  10. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  11. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  12. Hide unhairing and characterization of commercial enzymes used in leather manufacture

    Directory of Open Access Journals (Sweden)

    A Dettmer

    2011-09-01

    Full Text Available The enzymatic treatment of hides in tannery processes is a promising technology. However, the reaction kinetics of commercial enzymes available to the leather industry are not fully understood and their activities have been mainly determined with model proteins such as casein as substrate, which are not of direct relevance for cattle hides. Therefore, it is important to determine their activities on collagen and keratin, the main proteins of skin, in order to use these enzymes in leather processing. This work describes the study of five proteases, used commercially in tanneries, to assess their ability to act upon collagen and keratin and to determine their unhairing. Results showed that all commercial enzymes tested had more activity on collagen than on keratin. Unhairing was also tested and four out of the five enzymes tested showed some unhairing activity. Optima of the temperature and pH of the enzymes were very similar for all five enzymes, with maximal activities around 55ºC and pH 9 to 12, respectively.

  13. Reversible data hiding for image based on histogram modification of wavelet coefficients

    NARCIS (Netherlands)

    Liang, Xiaoping; Wu, Xiaoyun; Huang, Jiwu; Hao, Y.; Liu, J.; Wang, Y.; Cheung, Y.; Yin, H.; Jiao, L.; Ma, J.; Jiao, Y.C.

    2005-01-01

    Reversible data hiding has drawn intensive attention recently. Reversibility means to embed data into digital media and restore the original media from marked media losslessly. Reversible data hiding technique is desired in sensitive applications that require no permanent loss of signal fidelity. In

  14. Hiding and Searching Strategies of Adult Humans in a Virtual and a Real-Space Room

    Science.gov (United States)

    Talbot, Katherine J.; Legge, Eric L. G.; Bulitko, Vadim; Spetch, Marcia L.

    2009-01-01

    Adults searched for or cached three objects in nine hiding locations in a virtual room or a real-space room. In both rooms, the locations selected by participants differed systematically between searching and hiding. Specifically, participants moved farther from origin and dispersed their choices more when hiding objects than when searching for…

  15. DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Siva Shankar

    2016-08-01

    Full Text Available Digital image steganography has several applications in information security and communication. Data hiding in encrypted images ensure that both the cover image and the secret message can be recovered at the receiver end. This work presents a novel data hiding and image encryption scheme using random diffusion and Two dimensional Arnold cat mapping transform. The secret message bits are placed in the least significant bit positions of the cover image. Then a shared key is used to generate random 8 bit random integer stream and is added to the stego image in the random diffusion step. Arnold cat mapping transformation is done to scramble the pixels. The two steps of random diffusion and Arnold transform mapping are done alternatively several times to completely encrypt the image contents. The process is reversed at the receiver end to get both the secret message and the cover image with little loss. The random diffusion step overcomes the limited period of the Arnold transform. The embedding capacity of one bit per pixel is achieved. Security analysis is carried out which shows that the encryption is highly secure. The number of collisions is low thus preventing brute force attacks. The original cover image is recoverable with minimal losses.

  16. Hiding Information Using different lighting Color images

    Science.gov (United States)

    Majead, Ahlam; Awad, Rash; Salman, Salema S.

    2018-05-01

    The host medium for the secret message is one of the important principles for the designers of steganography method. In this study, the best color image was studied to carrying any secret image.The steganography approach based Lifting Wavelet Transform (LWT) and Least Significant Bits (LSBs) substitution. The proposed method offers lossless and unnoticeable changes in the contrast carrier color image and imperceptible by human visual system (HVS), especially the host images which was captured in dark lighting conditions. The aim of the study was to study the process of masking the data in colored images with different light intensities. The effect of the masking process was examined on the images that are classified by a minimum distance and the amount of noise and distortion in the image. The histogram and statistical characteristics of the cover image the results showed the efficient use of images taken with different light intensities in hiding data using the least important bit substitution method. This method succeeded in concealing textual data without distorting the original image (low light) Lire developments due to the concealment process.The digital image segmentation technique was used to distinguish small areas with masking. The result is that smooth homogeneous areas are less affected as a result of hiding comparing with high light areas. It is possible to use dark color images to send any secret message between two persons for the purpose of secret communication with good security.

  17. Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

    Directory of Open Access Journals (Sweden)

    Xianyi Chen

    2018-01-01

    Full Text Available Compared to the encrypted-image-based reversible data hiding (EIRDH method, the encrypted-signals-based reversible data hiding (ESRDH technique is a novel way to achieve a greater embedding rate and better quality of the decrypted signals. Motivated by ESRDH using signal energy transfer, we propose an improved ESRDH method using code division multiplexing and value expansion. At the beginning, each pixel of the original image is divided into several parts containing a little signal and multiple equal signals. Next, all signals are encrypted by Paillier encryption. And then a large number of secret bits are embedded into the encrypted signals using code division multiplexing and value expansion. Since the sum of elements in any spreading sequence is equal to 0, lossless quality of directly decrypted signals can be achieved using code division multiplexing on the encrypted equal signals. Although the visual quality is reduced, high-capacity data hiding can be accomplished by conducting value expansion on the encrypted little signal. The experimental results show that our method is better than other methods in terms of the embedding rate and average PSNR.

  18. An information hiding method based on LSB and tent chaotic map

    Science.gov (United States)

    Song, Jianhua; Ding, Qun

    2011-06-01

    In order to protect information security more effectively, a novel information hiding method based on LSB and Tent chaotic map was proposed, first the secret message is Tent chaotic encrypted, and then LSB steganography is executed for the encrypted message in the cover-image. Compared to the traditional image information hiding method, the simulation results indicate that the method greatly improved in imperceptibility and security, and acquired good results.

  19. Hiding levitating objects above a ground plane

    DEFF Research Database (Denmark)

    Zhang, Jingjing; Luo, Yu; Mortensen, Asger

    2010-01-01

    An approach to hiding objects levitating above a conducting sheet is suggested in this paper. The proposed device makes use of isotropic negative-refractive-index materials without extreme material parameters, and creates an illusion of a remote conducting sheet. Numerical simulations are perform...

  20. A method for removing adobe-type manure from hides using an oxidizing agent

    Science.gov (United States)

    Adobe-type (hardened) manure attached to bovine hair is a major source of meat contamination, hide quality deterioration, and devalued leather products. Therefore, it is important to develop cleaning solutions that can rapidly remove adobe-type manure to improve the quality of hides delivered to tan...

  1. Motivation to hide emotion and children's understanding of the distinction between real and apparent emotions.

    Science.gov (United States)

    Gosselin, Pierre; Warren, Madeleine; Diotte, Michèle

    2002-12-01

    The authors investigated the extent to which children's understanding of the distinction between real and apparent emotions varied according to the motivation to hide emotions. Children, aged 6-7 and 10-11 years, were read stories designed to elicit either prosocial or self-protective motivated display rules and were asked to predict the facial expressions the protagonists would make to hide felt emotions. Children were found to understand the distinction between real and apparent emotions very well, independently of the type of motivation. Contrary to predictions, boys understood this distinction better than did girls when the motivation to hide positive emotions was prosocial. Children perceived neutralization as the most appropriate strategy to hide felt emotions, followed by masking.

  2. Hiding a Heavy Higgs Boson at the 7 TeV LHC

    Energy Technology Data Exchange (ETDEWEB)

    Bai, Yang; Fan, JiJi; Hewett, JoAnne L.

    2012-03-20

    A heavy Standard Model Higgs boson is not only disfavored by electroweak precision observables but is also excluded by direct searches at the 7 TeV LHC for a wide range of masses. Here, we examine scenarios where a heavy Higgs boson can be made consistent with both the indirect constraints and the direct null searches by adding only one new particle beyond the Standard Model. This new particle should be a weak multiplet in order to have additional contributions to the oblique parameters. If it is a color singlet, we find that a heavy Higgs with an intermediate mass of 200-300 GeV can decay into the new states, suppressing the branching ratios for the standard model modes, and thus hiding a heavy Higgs at the LHC. If the new particle is also charged under QCD, the Higgs production cross section from gluon fusion can be reduced significantly due to the new colored particle one-loop contribution. Current collider constraints on the new particles allow for viable parameter space to exist in order to hide a heavy Higgs boson. We categorize the general signatures of these new particles, identify favored regions of their parameter space and point out that discovering or excluding them at the LHC can provide important indirect information for a heavy Higgs. Finally, for a very heavy Higgs boson, beyond the search limit at the 7 TeV LHC, we discuss three additional scenarios where models would be consistent with electroweak precision tests: including an additional vector-like fermion mixing with the top quark, adding another U(1) gauge boson and modifying triple-gauge boson couplings.

  3. Probability of error in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2007-01-01

    Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the

  4. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: RVO:67985998 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  5. A New Images Hiding Scheme Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    LIU Nian-sheng; GUO Dong-hui; WU Bo-xi; Parr G

    2005-01-01

    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of covert image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).

  6. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: PRVOUK-P23 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  7. Data Hiding Based on a Two-Layer Turtle Shell Matrix

    Directory of Open Access Journals (Sweden)

    Xiao-Zhu Xie

    2018-02-01

    Full Text Available Data hiding is a technology that embeds data into a cover carrier in an imperceptible way while still allowing the hidden data to be extracted accurately from the stego-carrier, which is one important branch of computer science and has drawn attention of scholars in the last decade. Turtle shell-based (TSB schemes have become popular in recent years due to their higher embedding capacity (EC and better visual quality of the stego-image than most of the none magic matrices based (MMB schemes. This paper proposes a two-layer turtle shell matrix-based (TTSMB scheme for data hiding, in which an extra attribute presented by a 4-ary digit is assigned to each element of the turtle shell matrix with symmetrical distribution. Therefore, compared with the original TSB scheme, two more bits are embedded into each pixel pair to obtain a higher EC up to 2.5 bits per pixel (bpp. The experimental results reveal that under the condition of the same visual quality, the EC of the proposed scheme outperforms state-of-the-art data hiding schemes.

  8. Content-based Image Hiding Method for Secure Network Biometric Verification

    Directory of Open Access Journals (Sweden)

    Xiangjiu Che

    2011-08-01

    Full Text Available For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content correlation analysis to protect the network-based transmitted image. By using principal component analysis (PCA, the content correlation between the biometric image and the cover image is firstly analyzed. Then based on particle swarm optimization (PSO algorithm, some regions of the cover image are selected to represent the biometric image, in which the cover image can carry partial content of the biometric image. As a result of the correlation analysis, the unrepresented part of the biometric image is embedded into the cover image by using the discrete wavelet transform (DWT. Combined with human visual system (HVS model, this approach makes the hiding result perceptually invisible. The extensive experimental results demonstrate that the proposed hiding approach is robust against some common frequency and geometric attacks; it also provides an effective protection for the secure biometric verification.

  9. Universal Steganalysis of Data Hiding in Grayscale Images

    Institute of Scientific and Technical Information of China (English)

    HUANG Ji-feng; LIN Jia-jun

    2007-01-01

    This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy.

  10. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  11. Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography

    Directory of Open Access Journals (Sweden)

    Wei-Liang Tai

    2018-01-01

    Full Text Available We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds data in it by using a data-hiding key. The image decryption and data extraction are independent and separable at the receiver side. Even though the receiver, who has only the data-hiding key, does not learn about the decrypted content, he can extract data from the received marked encrypted signal. However, the receiver who has only the private key cannot extract the embedded data, but he can directly decrypt the received marked encrypted signal to obtain the original image without any error. Compared with other schemes using a cipher stream to encrypt the image, the proposed scheme is more appropriate for cloud services without degrading the security level.

  12. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Institute of Scientific and Technical Information of China (English)

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao

    2004-01-01

    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  13. Polycyclic Aromatic Hydrocarbons (PAHs) Content in Cattle Hides ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Vol. 21 (6) 1105-1110. Full-text Available Online at www.ajol.info and ... Keywords: Cattle hide, meat, tyre, singeing, hydrocarbons ... on the substance used as fuel for meat processing. .... through the centrifuge at 200 rpm for 5 min. The.

  14. HIDE working groups: synchrotron based system: summary

    International Nuclear Information System (INIS)

    Barton, M.Q.

    1978-01-01

    A brief overview is given of the work resulting from a one-week workshop on the use of synchrotrons in heavy ion fusion, i.e., a Heavy Ion Demonstration Experiment (HIDE). Topics discussed concerned the number of beams on target, space charge limitations, choice of ion charge state, and areas identified as needing further work

  15. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Directory of Open Access Journals (Sweden)

    Sha Edwin Hsing-Mean

    2002-01-01

    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  16. On the Bayes risk in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2008-01-01

    Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability

  17. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Energy Technology Data Exchange (ETDEWEB)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C. (Iso-Ster (Pty) Ltd., Kempton Park (South Africa))

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  18. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Science.gov (United States)

    Du Plessis, TA; Russell, AE; Stevens, RCB; Galloway, AC

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  19. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    International Nuclear Information System (INIS)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C.

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem. (author)

  20. Optical multiple-image hiding based on interference and grating modulation

    International Nuclear Information System (INIS)

    He, Wenqi; Peng, Xiang; Meng, Xiangfeng

    2012-01-01

    We present a method for multiple-image hiding on the basis of interference-based encryption architecture and grating modulation. By using a modified phase retrieval algorithm, we can separately hide a number of secret images into one arbitrarily preselected host image associated with a set of phase-only masks (POMs), which are regarded as secret keys. Thereafter, a grating modulation operation is introduced to multiplex and store the different POMs into a single key mask, which is then assigned to the authorized users in privacy. For recovery, after an appropriate demultiplexing process, one can reconstruct the distributions of all the secret keys and then recover the corresponding hidden images with suppressed crosstalk. Computer simulation results are presented to validate the feasibility of our approach. (paper)

  1. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days) after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment. PMID:11455906

  2. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Directory of Open Access Journals (Sweden)

    Grønstøl H

    2001-03-01

    Full Text Available The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment.

  3. Strategie del patetico e interludi circensi in Hide and Seek di Wilkie Collins

    OpenAIRE

    De Giovanni, Flora

    2013-01-01

    Starting from Victor Turner’s definitions of cultural performance and liminoid phenomena, the essay aims to analyse Wilkie Collins’s third novel, Hide and Seek (1854), which seems to be a sort of survey of the pastimes Victorian England allowed itself in the age of the increasing commodification of leisure. Though not a proper sensation novel (the genre for which Collins became famous in the 1860s), Hide and Seek draws on the conventions of melodrama, which, as Peter Brook conv...

  4. Efficacy of citrilow™ and cecure™ spray wash on the levels and prevalence of aerobic bacterials and enterobacteriaceae bacteria on cattle hides

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle skins to the inner meat and hide quality detrition from bacteria is recognized as a severe hygienic problem for commercial beef and hide processing facilities. To circumvent bacterial contamination, cattle are washed during hide p...

  5. Cross-sectional study to estimate the prevalence of enterohaemorrhagic Escherichia coli on hides of market beef cows at harvest.

    Science.gov (United States)

    Schneider, L G; Stromberg, Z R; Lewis, G L; Moxley, R A; Smith, D R

    2018-03-25

    Cattle hides are an important source of enterohaemorrhagic Escherichia coli (EHEC) carcass contamination at slaughter. Seven EHEC serogroups are adulterants in raw, non-intact beef: EHEC O26, O45, O103, O111, O121, O145 and O157. The objective of this study was to estimate the probability for hide contamination with EHEC among US market beef cows at slaughter and to test the effects of season and geographic region on prevalence of hide contamination. Hides (n = 800) of market cows were swabbed at slaughter immediately after exsanguination, prior to hide removal. Cows were sampled from two geographically distinct beef packing plants during four seasons of 2015. Cattle source was categorized by northern or southern region. Samples were tested for EHEC by a molecular screening assay. The effects of region, season and their interaction on the probability of hide contamination by each EHEC serogroup were tested in separate multilevel multivariable logistic regression models, accounting for the random effect of clustering by plant. Statistical significance was set α = .05. Of 800 total samples, at least one EHEC was detected on 630 (79%) hides. Enterohaemorrhagic E. coli O26 was detected on 129 (16%) of all hides sampled, EHEC O45 on 437 (55%), EHEC O103 on 289 (36%), EHEC O111 on 189 (24%), EHEC O121 on 140 (18%), EHEC O145 on 171 (21%) and EHEC O157 on 89 (11%). Detection of EHEC O26 and EHEC O121 was associated with season. Season and region were associated with detecting EHEC O45 and EHEC O157. Season-by-region interactions were associated with the outcome of detecting EHEC O103, EHEC O111 and EHEC O145. Season, region of origin and the interaction of these factors affect hide contamination of market beef cattle at slaughter by EHEC, and each serogroup responds to these factors uniquely. © 2018 Blackwell Verlag GmbH.

  6. Variation in the Level of Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The occurrence of hide damage light flecks and spots was determined on tanned hides from 28 herds during a period of 8 to 12 months. Light flecks and spots are described as small areas of grain loss up to 3 mm in diameter that are seen on dyed crust cattle leather. Damage was found on 75.8% of all hides. The neck and shoulders were the anatomical region with the highest prevalence of damage. Sixty-eight per cent of all hides had light flecks and spots in this region. The forelimbs and dewlap were the anatomical region with the second highest occurrence with a prevalence of 39.1%. This distribution corresponded to the known distribution of lice in cattle. No significant differences were observed in age, sex, prevalence of lice in the herd assessed in March or infestations with different lice species. The frequency of light flecks and spots varied significantly during the year. The frequency was highest in the late winter and early spring, decreased significantly during the summer and was lowest in the autumn. This variation supported the importance of lice in the development of light flecks and spots and suggested a relatively long healing period for the damages induced by lice. PMID:11455905

  7. Traceability System Model for Quality Gelatin Raw Material of Cattle Hides

    Directory of Open Access Journals (Sweden)

    S Nur

    2010-09-01

    Full Text Available Several criteria must be accomplished within the provision of quality products in terms of the types of materials, the processing methods and effort to get it. Traceability system involves various parties that have different needs and goals in the process of supplying raw materials. Hence, there is a need for institutional systems engineering that can organize and manage the tracking process, the procurement of raw materials that guarantee the origin of gelatin raw materials, and facilitate the industry and customer to create a standardized quality of product. The purpose of the study formulates the institutional tracking models of gelatin raw material from cattle hide based on various criteria and assessment of the expert opinion. The methods used in this study were Interpretative structural modeling to formulate a representation of institutional tracking efficiently and analytical hierarchy process to determine the tracking strategy of industrial gelatin raw materials from cowhide. The results obtained from the study were some key elements of institutional tracking model for industrial gelatin raw materials from cowhide and the traceability strategies for industrial raw materials from cattle hide gelatin Indonesia. (Animal Production 12(3: 190-198 (2010 Key Words: traceability, institutional model, cattle hide, gelatin

  8. 9 CFR 310.10 - Carcasses with skin or hide on; cleaning before evisceration; removal of larvae of Hypodermae...

    Science.gov (United States)

    2010-01-01

    ..., DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION... pathological skin conditions. When a carcass is to be dressed with the skin or hide left on, the skin or hide...

  9. What Hides Behind an Umemployment Rate: Comparing Portuguese and U.S. Unemployment

    OpenAIRE

    Olivier Blanchard; Pedro Portugal

    1998-01-01

    Over the last 15 years, Portugal and the United States have had the same average unemployment rate, about 6.5%. But behind these similar rates hide two very different labor markets. Unemployment duration in Portugal is more than three times that of the United States. Symmetrically, the flow of workers into unemployment in Portugal is, in proportion to the labor force, less than a third of what it is in the United States. Relying on evidence from Portuguese and U.S. micro data sets, we show th...

  10. Synthesis of Citric-Acrylate Oligomer and its in-Situ Reaction with Chrome Tanned Collagen (hide powder)

    International Nuclear Information System (INIS)

    Haroun, A.A.; Masoud, R.A.; Bronco, S.; Ciardelli, F.

    2005-01-01

    The purpose of this study was to formulate the new combined system of acrylic and citric acids, which has been prepared by free radical polymerization and esterification reaction at the same time to form citric acrylate (CAC) oligomer through ester linkage and low molecular weight (Mw 2241), in compared with polyacrylic acid. The chemical structure and the reaction mechanism of this oligomer were confirmed by different spectroscopic tools (1 H , 13 C-NMR, ATR-IR), gel permeation chromatography and thermogravimetric analysis (TGA/DTA). The problem of the effect of the masking agents in the chrome tanning of the collagen and the pickling of the hide has been approached from the study of the hydrothermal and mechanical properties, using this new eco-friendly oligomer, which was carried out in-situ treated/grafted chrome tanned collagen (hide powder), and pickled hide. The microemulsion grafting copolymerization of (CAC) using 2.2-azo-bis isobutyronitrile (ABIN), via direct coupling reaction, onto the chrome tanned collagen showed that the free amino groups of the collagen were considered to be a potential site for the in-situ reaction with (CAC) oligomer. Also, using of citric-acrylate (CAC) oligomer, during chrome tanning of leather, instead of the traditional strong acids (sulfuric, hydrochloric and formic) resulted in significant improvement in chrome exhaustion and physical properties

  11. HIDE & SEEK: End-to-end packages to simulate and process radio survey data

    Science.gov (United States)

    Akeret, J.; Seehars, S.; Chang, C.; Monstein, C.; Amara, A.; Refregier, A.

    2017-01-01

    As several large single-dish radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these datasets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system-from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing single-dish radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single-dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal. The two packages can be used separately or together depending on the application. Their modular and flexible nature allows easy adaptation to other instruments and datasets. We describe the basic architecture of the two packages and examine in detail the noise and RFI modeling in HIDE, as well as the implementation of gain calibration and RFI mitigation in SEEK. We then apply HIDE &SEEK to forward-model a Galactic survey in the frequency range 990-1260 MHz based on data taken at the Bleien Observatory. For this survey, we expect to cover 70% of the full sky and achieve a median signal-to-noise ratio of approximately 5-6 in the cleanest channels including systematic uncertainties. However, we also point out the potential challenges of high RFI contamination and baseline removal when examining the early data from the Bleien Observatory. The fully documented HIDE &SEEK packages are available at http://hideseek.phys.ethz.ch/ and are published

  12. Unconventional thermal cloak hiding an object outside the cloak

    Science.gov (United States)

    Gao, Y.; Huang, J. P.

    2013-11-01

    All the thermal cloaks reported in the literature can be used to thermally hide an object inside the cloak. However, a common limitation of this kind of thermal cloaks is that the cloaked object cannot feel the external heat flow since it is located inside the cloak; thus we call these cloaks “conventional thermal cloaks”. Here we manage to overcome this limitation by exploiting a class of unconventional thermal cloaks that enable the cloaked object to feel the external heat flow. Our finite-element simulations in two dimensions show the desired cloaking effect. The underlying mechanism originates from the complementary effect of thermal metamaterials with negative thermal conductivities. This work suggests a different method to design thermal devices where heat conduction can be controlled at will.

  13. Hiding Critical Targets in Smart Grid Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bao, Wei [Univ. of Arkansas, Fayetteville, AR (United States); Li, Qinghua

    2017-10-23

    With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromised nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.

  14. Suggested Method for Encryption and Hiding ‎Image using LCG and LSB

    Directory of Open Access Journals (Sweden)

    Atheer Hussein Zyara

    2017-12-01

    Full Text Available Maintaining the confidentiality of the data of the very important areas in computer applications , Where many researchers work in the fields of concealment and encryption . So in this research we are working on the combining of the two methods , where confidential data is encrypted by using  a proposed method , Then the cover is encrypted (regular image by LCG algorithm (which generates a series of random numbers to generate the encrypted cover (irregular image , After that ,we hide the encrypted data in encrypted cover by depending on the LSB technique, then we convert the irregular image into regular image and thereby getting  hidden data in random locations in the  cover image  , This method is characterized by flexibility in terms of the possibility of hiding the different  types of confidential data in different types of media , and durability as that data be hidden in random locations and this  what distinguishes the proposed algorithm , and the results showed high security, because the data is hidden in random locations in encrypted image then convert to the original regular image For clarification of the proposed algorithm , it has been applied on a digital image of the gray type using MATLAB language  by using the efficiency scales PSNR and MSE

  15. 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing

    CERN Document Server

    Tsai, Pei-Wei; Huang, Hsiang-Cheh

    2017-01-01

    This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .

  16. Matryoshka: Hiding Secret Communication in Plain Sight

    OpenAIRE

    Safaka, Iris; Fragouli, Christina; Argyraki, Katerina

    2016-01-01

    We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small -- existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of...

  17. Preservation of bovine hide using less salt with low concentration of antiseptic, part I: effectiveness of developed formulations

    Science.gov (United States)

    Bovine raw hides are commercially cured either with high salt concentration of about half the weight of actual hide or 95% saturated brine solution. This conventional technique is very popular due to the availability of common salt (sodium chloride) and its cost effective procedure but it generates ...

  18. An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm

    Science.gov (United States)

    Zhang, B.; Sang, Jun; Alam, Mohammad S.

    2013-03-01

    An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.

  19. HIDING TEXT IN DIGITAL IMAGES USING PERMUTATION ORDERING AND COMPACT KEY BASED DICTIONARY

    Directory of Open Access Journals (Sweden)

    Nagalinga Rajan

    2017-05-01

    Full Text Available Digital image steganography is an emerging technique in secure communication for the modern connected world. It protects the content of the message without arousing suspicion in a passive observer. A novel steganography method is presented to hide text in digital images. A compact dictionary is designed to efficiently communicate all types of secret messages. The sorting order of pixels in image blocks are chosen as the carrier of embedded information. The high correlation in image pixel values means reordering within image blocks do not cause high distortion. The image is divided into blocks and perturbed to create non repeating sequences of intensity values. These values are then sorted according to the message. At the receiver end, the message is read from the sorting order of the pixels in image blocks. Only those image blocks with standard deviation lesser than a given threshold are chosen for embedding to alleviate visual distortion. Information Security is provided by shuffling the dictionary according to a shared key. Experimental Results and Analysis show that the method is capable of hiding text with more than 4000 words in a 512×512 grayscale image with a peak signal to noise ratio above 40 decibels.

  20. Livestock and Hides and Skins Marketing in Kenya: Problems and investment needs

    OpenAIRE

    Jabbar, Mohammad A.

    2002-01-01

    The paper briefly summarises the historical perspective on the development of livestock marketing in Kenya, current problems of livestock and hides and skins marketing, and recommends investment opportunities to improve the situation.

  1. Hiding effort to gain a competitive advantage: Evidence from China.

    Science.gov (United States)

    Zhao, Li; Heyman, Gail D

    2018-06-01

    Previous studies with Western populations have shown that adolescents' tendency to downplay their academic effort is affected by two kinds of motives: ability-related motives (e.g., to appear competent) and social approval motives (e.g., to be popular). In this research, we test for the presence of additional competition-related motives in China, a culture placing strong emphasis on academic competition. Study 1 (N = 150) showed that, in response to a scenario in which a hard-working high-school junior hid effort from classmates, the most highly endorsed explanation was "to influence others to work less hard to maintain a competitive advantage." Study 2 (N = 174) revealed that competition-related explanations were endorsed relatively more often when the speaker and audience had similar academic rankings. This tendency was most evident when both speaker and audience were top performers, and when this was the case, participants' desire to demonstrate superiority over others was a positive predictor of endorsement of competition-related motives. Study 3 (N = 137) verified that competition-related motives were more strongly endorsed among Chinese participants than U.S. These results suggest that at least in cultures that emphasize academic competition and in contexts where competition is salient, hiding effort is often about attempting to gain strategic advantage. © 2016 International Union of Psychological Science.

  2. Physicochemical Properties of Gelatin Extracted from Buffalo Hide Pretreated with Different Acids.

    Science.gov (United States)

    Mulyani, Sri; Setyabudi, Francis M C Sigit; Pranoto, Yudi; Santoso, Umar

    2017-01-01

    The acid pretreatment of collagen molecules disrupts their crosslinks and assists in the release of acid-soluble proteins, fats, and other components. Generally, to achieve optimum extraction efficiency, strong acids may be used at a lower acid concentration compared to weak acids. This study aimed to determine the yield and physicochemical properties of gelatins extracted from buffalo hides pretreated with different acids. Hides were extracted with hydrochloric, citric, and acetic acids at concentrations of 0.3, 0.6, 0.9, 1.2, and 1.5 M. A completely randomized design and the least significant difference test were used in the experimental design, and all measurements were performed in triplicate. The highest yield (29.17%) was obtained from pretreatment with 0.9 M HCl. The gel strength did not differ significantly ( p >0.05) according to acid type (280.26-259.62 g Bloom), and the highest viscosity was obtained from the 0.6 M citric acid pretreatment. All the gelatins contained α- and β-chain components and several degraded peptides (24-66 kDa). The color and Fourier-transform infrared spectrum of the gelatin extracted using 0.9 M HCl were similar to those of commercial bovine skin gelatin. In general, the physicochemical properties of the gelatin complied with the industry standard set by the Gelatin Manufacturers Institute of America, revealing that buffalo hide could serve as a potential alternative source of gelatin.

  3. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  4. Information hiding technology and application analysis based on decimal expansion of irrational numbers

    Science.gov (United States)

    Liu, Xiaoyong; Lu, Pei; Shao, Jianxin; Cao, Haibin; Zhu, Zhenmin

    2017-10-01

    In this paper, an information hiding method using decimal expansion of irrational numbers to generate random phase mask is proposed. Firstly, the decimal expansion parts of irrational numbers generate pseudo-random sequences using a new coding schemed, the irrational number and start and end bit numbers were used as keys in image information hiding. Secondly, we apply the coding schemed to the double phase encoding system, the pseudo-random sequences are taken to generate random phase masks. The mean square error is used to calculate the quality of the recovered image information. Finally, two tests had been carried out to verify the security of our method; the experimental results demonstrate that the cipher image has such features, strong robustness, key sensitivity, and resistance to brute force attack.

  5. Sensor and Actuator Fault-Hiding Reconfigurable Control Design for a Four-Tank System Benchmark

    DEFF Research Database (Denmark)

    Hameed, Ibrahim; El-Madbouly, Esam I; Abdo, Mohamed I

    2015-01-01

    Invariant (LTI) system where virtual sensors and virtual actuators are used to correct faulty performance through the use of a pre-fault performance. Simulation results showed that the developed approach can handle different types of faults and able to completely and instantly recover the original system......Fault detection and compensation plays a key role to fulfill high demands for performance and security in today's technological systems. In this paper, a fault-hiding (i.e., tolerant) control scheme that detects and compensates for actuator and sensor faults in a four-tank system benchmark...

  6. The impact of a gender and business training on income hiding

    NARCIS (Netherlands)

    Bulte, Erwin H.; Lensink, Robert; Winkel, Anne B.

    2018-01-01

    We use a randomized controlled trial and behavioral game to study the extent and determinants of income hiding in rural Vietnam. We focus on a training program that aims to promote gender equality and entrepreneurship among women in poverty who are engaged in running a small business. In one

  7. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    OpenAIRE

    Kuang Tsan Lin; Sheng Lih Yeh

    2014-01-01

    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  8. Suitability of the RGB Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Ante Poljicak

    2010-06-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data  hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  9. Entry points to stimulation of expansion in hides and skins processing

    African Journals Online (AJOL)

    Only 3.4% of respondents add value to hides and skins by processing. ... For this status of the chain, it was proposed that a workable intervention model has to encompass placement of tanneries and slaughter slabs in the chain as new actors, linking chain actors, improving livestock services especially dipping, and ...

  10. Characterization of biofilms produced by Escherichia coli O157 isolated from cattle hides

    Science.gov (United States)

    Milojević, L.; Velebit, B.; Baltić, T.; Nikolić, A.; Mitrović, R.; Đorđević, V.

    2017-09-01

    This study aimed to investigate possibility E. coli O157 from cattle hides to produced biofilms. We had 28 suspect primoisolates and 17 were confirmed to be E. coli O157. Biofilm production test showed that more than 50% of this isolates did not produce biofilm. From the other half of the isolates, 5 of them were weakly adherent, 3 were moderately adherent. Since E. coli O157 are one of the main foodborne hazards in meat processing industry and the discovery that some of them can produce moderately adherent biofilms, request necessity of strict implementation of HACCP procedures to prevent further expansion this pathogen.

  11. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    Directory of Open Access Journals (Sweden)

    Ari Shawakat Tahir

    2015-12-01

    Full Text Available The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed.

  12. Hiding objects and creating illusions above a carpet filter using a Fourier optics approach.

    Science.gov (United States)

    Wu, Kedi; Wang, Guo Ping

    2010-09-13

    Invisibility carpet cloaks are usually used to hide an object beneath carpet. In this paper we propose and demonstrate a carpet filter to hide objects and create illusions above the filter by using a Fourier optics method. Instead of using transformation optics, we get electromagnetic parameters of the filter by optical transfer functions, which play the role of modulating the propagation of the scattering angular spectrum directly from an object above the filter. By further adding a functional layer onto the filter, we can even camouflage the object so that it appears to be a different object. The analytical results are confirmed by numerical simulations. Our method is completely different from the current coordinate transfer method and may provide another point of view to more clearly understand the mechanism of invisibility cloaks.

  13. Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload

    Directory of Open Access Journals (Sweden)

    Zhaoxia Yin

    2014-01-01

    Full Text Available This paper proposes a separable reversible data-hiding scheme in encrypted image which offers high payload and error-free data extraction. The cover image is partitioned into nonoverlapping blocks and multigranularity encryption is applied to obtain the encrypted image. The data hider preprocesses the encrypted image and randomly selects two basic pixels in each block to estimate the block smoothness and indicate peak points. Additional data are embedded into blocks in the sorted order of block smoothness by using local histogram shifting under the guidance of the peak points. At the receiver side, image decryption and data extraction are separable and can be free to choose. Compared to previous approaches, the proposed method is simpler in calculation while offering better performance: larger payload, better embedding quality, and error-free data extraction, as well as image recovery.

  14. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    Science.gov (United States)

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  15. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  16. A REVIEW ON HEAVY METALS CONTENTS IN HIDE, SKIN AND PROCESSED LEATHERS

    Directory of Open Access Journals (Sweden)

    KOIZHAIGANOVA Meruyert

    2016-05-01

    Full Text Available Heavy metals are metals with high atomic weight which can be deposited in soil, water, plants and animals. It is generally known that mammal tissues are good bioindicators of trace elements, including heavy metals. Heavy metal analysis serves to identify and quantify the elements that are a potential hazard to the consumer after varying levels of contact. Usage area of leather is increasingly expanding in these days and it has also become a material requested and demanded by effect of fashion. Leather must protect its appearance and physical stability and also be problem-free in ecological terms and harmless to human health. There is a lack of data concerning the content of toxic elements in raw hide and skin of animals. Mainly information concerning metals content, including toxic ones, in processed leathers may be found in the literature. The aim of the present study was to review and compare the content of some heavy metals in raw hide, skin and the processed leathers in order to evaluate their accumulation and transition to the end-up product.

  17. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    Directory of Open Access Journals (Sweden)

    Farouk Abd El-Monem

    2017-05-01

    Full Text Available Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA and butyl acrylate (BA. The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leather were studied and evaluated using SEM, shrinkage temperature and the mechanical properties of the pre-tanned leather. The results showed that, the prepared polymers A & C are the best polymers in improving the physical properties of the treated leather. Furthermore, the shrinkage temperature and the mechanical properties of the tanned leather were improved. In addition, a significant enhancement in the texture of the leather treated by the polymers was noticed as proved by scanning electron microscopy (SEM.

  18. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm

    Directory of Open Access Journals (Sweden)

    Ching-Yu Yang

    2012-01-01

    Full Text Available This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.

  19. Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    OpenAIRE

    de Fuentes, Jose Maria; Blasco, Jorge; González-Tablas, Ana Isabel; González-Manzano, Lorena

    2014-01-01

    Vehicular ad hoc networks (VANETs) are a new communication scenario in which vehicles take an active part. Real-time reporting of misbehaving vehicles by surrounding ones is enabled by in-vehicle sensors and VANETs. Thus, sensors allow detecting the misbehavior whereas VANETs allow sending the report to the authority. Nevertheless, these reports should pass unnoticed by the reported driver to avoid his/her potential reprisals. Information hiding techniques could be used to allow vehicles to t...

  20. Efficacy of Citrilow® and Cecure® spray wash on the prevalence of aerobic and enterobacteriaceae/gram negative enteric bacilli and cattle hide quality

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle to the inner meat as well as hide quality deterioration from bacteria are hygienic problems for meat and hide processing facilities. This study investigated spray wash treatments independently with two antimicrobials used in the ...

  1. Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding

    OpenAIRE

    Wu, Han-Zhou; Wang, Hong-Xia; Shi, Yun-Qing

    2016-01-01

    This paper presents a novel reversible data hiding (RDH) algorithm for gray-scaled images, in which the prediction-error of prediction error (PPE) of a pixel is used to carry the secret data. In the proposed method, the pixels to be embedded are firstly predicted with their neighboring pixels to obtain the corresponding prediction errors (PEs). Then, by exploiting the PEs of the neighboring pixels, the prediction of the PEs of the pixels can be determined. And, a sorting technique based on th...

  2. Effect of hiding places, straw and territory on agression in group-housed rabbit does

    NARCIS (Netherlands)

    Rommers, J.M.; Reuvekamp, B.F.J.; Gunnink, H.; Jong, de I.C.

    2014-01-01

    Group-housing of rabbit does may be preferred from welfare point of view. However, group-housing causes agonistic behaviour which may cause severe injuries. Severe injuries may be prevented by offering hiding places for attacked does. Providing enrichment (straw) may reduce agonistic behaviour by

  3. Let’s play hide and seek!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    This week, we would like you to play a small online game called “Virtual Hide & Seek”. The rules are simple: some of our colleagues have published some sensitive or confidential documents on CERN’s central services like Indico, CDS, EDMS or TWiki, as well as on our many websites. Your mission, should you choose to accept it: find them!   If you provide us with documents marked “confidential”, “classified”, “sensitive”, or containing plain text operational passwords, you can win a book on computer security. There are only few conditions: these documents must be visible from outside CERN, must not require a CERN account in order to access them, and must not belong to you or have a direct link with your work. Have fun! But seriously, are you sure that your documents are really properly protected? We regularly find confidential documents stored on one of the CERN central  services and w...

  4. Book Review: No Place To Hide

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2007-03-01

    Full Text Available O'Harrow, R., Jr. (2006. No Place To Hide. New York: Free Press. 352 pages, ISBN: 0-7432-8705-3 (paper, US$26Reviewed by Gary C. Kessler (gary.kessler@champlain.eduPersonal privacy and the protection of personal identifying information are of concern to all of us. Innumerable articles and conferences address our loss of privacy, either through the sale of consumer databases or our own inattention. Opinions vary from "You have no privacy; get over it" to "This is the end of civil liberties as we know them." We teach people to safely maneuver on the Internet and minimize their exposure to bogus sites set up to steal their identity, warn users about the dangers of phishing and posting personal information on social network sites, use firewalls to protect our databases, and enact laws such as the Health Insurance Portability and Accountability Act (HIPAA and the Family Educational Rights and Privacy Act (FERPA to protect information.(see PDF for full review

  5. An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining

    OpenAIRE

    Yogendra Kumar Jain,; Vinod Kumar Yadav,; Geetika S. Panday

    2011-01-01

    The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful toolfor discovering relationships which are hidden in large database. Association rules hiding algorithms get strong and efficient performance for protecting confidential and cru...

  6. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    Directory of Open Access Journals (Sweden)

    A.A. Mohamed

    2014-07-01

    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.

  7. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    Science.gov (United States)

    Christandl, Matthias; Ferrara, Roberto

    2017-12-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005), 10.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.

  8. An Improved Information Hiding Method Based on Sparse Representation

    Directory of Open Access Journals (Sweden)

    Minghai Yao

    2015-01-01

    Full Text Available A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.

  9. Optical image hiding based on chaotic vibration of deformable moiré grating

    Science.gov (United States)

    Lu, Guangqing; Saunoriene, Loreta; Aleksiene, Sandra; Ragulskis, Minvydas

    2018-03-01

    Image hiding technique based on chaotic vibration of deformable moiré grating is presented in this paper. The embedded secret digital image is leaked in a form of a pattern of time-averaged moiré fringes when the deformable cover grating vibrates according to a chaotic law of motion with a predefined set of parameters. Computational experiments are used to demonstrate the features and the applicability of the proposed scheme.

  10. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia)

    OpenAIRE

    Donatas Brandišauskas

    2010-01-01

    This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imp...

  11. Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number

    OpenAIRE

    Kohei Arai; Yuji Yamada

    2011-01-01

    An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images...

  12. The Use of Polymerized Genipin for the Stabilization of the Collagen Structure of Animal Hides

    Science.gov (United States)

    Animal hides are the major byproduct of meat industry and the collagen fibers is the main constituent. Crosslinkers play a key role in stabilizing the collagen structure for useful applications. Genipin is widely used as an ideal biological protein crosslinking agent due to its low toxicity compare...

  13. A Data Hiding Technique to Synchronously Embed Physiological Signals in H.264/AVC Encoded Video for Medicine Healthcare.

    Science.gov (United States)

    Peña, Raul; Ávila, Alfonso; Muñoz, David; Lavariega, Juan

    2015-01-01

    The recognition of clinical manifestations in both video images and physiological-signal waveforms is an important aid to improve the safety and effectiveness in medical care. Physicians can rely on video-waveform (VW) observations to recognize difficult-to-spot signs and symptoms. The VW observations can also reduce the number of false positive incidents and expand the recognition coverage to abnormal health conditions. The synchronization between the video images and the physiological-signal waveforms is fundamental for the successful recognition of the clinical manifestations. The use of conventional equipment to synchronously acquire and display the video-waveform information involves complex tasks such as the video capture/compression, the acquisition/compression of each physiological signal, and the video-waveform synchronization based on timestamps. This paper introduces a data hiding technique capable of both enabling embedding channels and synchronously hiding samples of physiological signals into encoded video sequences. Our data hiding technique offers large data capacity and simplifies the complexity of the video-waveform acquisition and reproduction. The experimental results revealed successful embedding and full restoration of signal's samples. Our results also demonstrated a small distortion in the video objective quality, a small increment in bit-rate, and embedded cost savings of -2.6196% for high and medium motion video sequences.

  14. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  15. A dehydration process for ovine hide to obtain a new collagenous material

    OpenAIRE

    Ollé Otero, Lluís; Sorolla, Silvia; Casas Solé, Concepció; Bacardit Dalmases, Anna

    2014-01-01

    The aim of the present work is to develop a dehydration process for ovine hide to obtain a new collagenous material for use in the leather industry. What is obtained through this new process is a dry and very porous collagenous substrate which allows the application of tanning chemicals by immersion in aqueous solutions. When compared to existing, traditional processes, economic and environmental advantages are obtained from the use of this new material. More specifically, the new process ...

  16. Hiding Techniques for Dynamic Encryption Text based on Corner Point

    Science.gov (United States)

    Abdullatif, Firas A.; Abdullatif, Alaa A.; al-Saffar, Amna

    2018-05-01

    Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

  17. An Algorithm for Data Hiding in Radiographic Images and ePHI/R Application

    Directory of Open Access Journals (Sweden)

    Aqsa Rashid

    2018-01-01

    Full Text Available Telemedicine is the use of Information and Communication Technology (ICT for clinical health care from a distance. The exchange of radiographic images and electronic patient health information/records (ePHI/R for diagnostic purposes has the risk of confidentiality, ownership identity, and authenticity. In this paper, a data hiding technique for ePHI/R is proposed. The color information in the cover image is used for key generation, and stego-images are produced with ideal case. As a result, the whole stego-system is perfectly secure. This method includes the features of watermarking and steganography techniques. The method is applied to radiographic images. For the radiographic images, this method resembles watermarking, which is an ePHI/R data system. Experiments show promising results for the application of this method to radiographic images in ePHI/R for both transmission and storage purpose.

  18. Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function

    Directory of Open Access Journals (Sweden)

    Najme Maleki

    2014-07-01

    Full Text Available This paper presents two adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Our adaptive scheme is based on the concept of human vision sensitivity, so the pixels in edge areas than to smooth areas can tolerate much more changes without making visible distortion for human eyes. In our adaptive scheme, the average differencing value of four neighborhood pixels into a block via a threshold secret key determines whether current block is located in edge or smooth area. Pixels in the edge areas are embedded by Q-bit of secret data with a larger value of Q than that of pixels placed in smooth areas. Also in this scholar, we represent one non-adaptive data hiding algorithm. Our non-adaptive scheme, via an error reduction procedure, produces a high visual quality for stego-image. The proposed schemes present several advantages. 1-of aspects the embedding capacity and visual quality of stego-image are scalable. In other words, the embedding rate as well as the image quality can be scaled for practical applications 2-the high embedding capacity with minimal visual distortion can be achieved, 3-our methods require little memory space for secret data embedding and extracting phases, 4-secret keys have used to protect of the embedded secret data. Thus, level of security is high, 5-the problem of overflow or underflow does not occur. Experimental results indicated that the proposed adaptive scheme significantly is superior to the currently existing scheme, in terms of stego-image visual quality, embedding capacity and level of security and also our non-adaptive method is better than other non-adaptive methods, in view of stego-image quality. Results show which our adaptive algorithm can resist against the RS steganalysis attack.

  19. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  20. Hide depilation and feather disintegration studies with keratinolytic serine protease from a novel Bacillus subtilis isolate.

    Science.gov (United States)

    Pillai, Priya; Archana, G

    2008-03-01

    Keratinases play an important role in biotechnological applications such as improvement of feather meal, enzymatic dehairing and production of amino acids or peptides from high molecular weight substrates. Bacillus subtilis P13, isolated from Vajreshwari hot spring (45-50 degrees C) near Mumbai, India, produces a neutral serine protease and has an optimum temperature of 65 degrees C. This enzyme preparation was keratinolytic in nature and could disintegrate whole chicken feathers, except for the remnants of shafts. The enzyme preparation also exhibited depilation of goat hides with the recovery of intact animal hair. The enzyme preparation could release peptides from ground feathers and bring about their weight reduction; however, similar action on hair was relatively weak. A single major PMSF-sensitive protease band could be detected upon zymogram analysis, indicating that a single enzyme may be responsible for feather degradation and hide depilation. The importance of these findings in the biotechnological application for feather and leather industries is discussed.

  1. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding.

    Science.gov (United States)

    Wang, Xiaogang; Chen, Wen; Chen, Xudong

    2014-09-22

    We present a novel image hiding method based on phase retrieval algorithm under the framework of nonlinear double random phase encoding in fractional Fourier domain. Two phase-only masks (POMs) are efficiently determined by using the phase retrieval algorithm, in which two cascaded phase-truncated fractional Fourier transforms (FrFTs) are involved. No undesired information disclosure, post-processing of the POMs or digital inverse computation appears in our proposed method. In order to achieve the reduction in key transmission, a modified image hiding method based on the modified phase retrieval algorithm and logistic map is further proposed in this paper, in which the fractional orders and the parameters with respect to the logistic map are regarded as encryption keys. Numerical results have demonstrated the feasibility and effectiveness of the proposed algorithms.

  2. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Ding Qing-Yan; Zhang Shu-Hui; Chen Xiu-Bo

    2016-01-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. (paper)

  3. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    DEFF Research Database (Denmark)

    Christandl, Matthias; Ferrara, Roberto

    2017-01-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005)]. The construction of those states was based...... on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable...

  4. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2011-05-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  5. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2010-12-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  6. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  7. A novel attack method about double-random-phase-encoding-based image hiding method

    Science.gov (United States)

    Xu, Hongsheng; Xiao, Zhijun; Zhu, Xianchen

    2018-03-01

    By using optical image processing techniques, a novel text encryption and hiding method applied by double-random phase-encoding technique is proposed in the paper. The first step is that the secret message is transformed into a 2-dimension array. The higher bits of the elements in the array are used to fill with the bit stream of the secret text, while the lower bits are stored specific values. Then, the transformed array is encoded by double random phase encoding technique. Last, the encoded array is embedded on a public host image to obtain the image embedded with hidden text. The performance of the proposed technique is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient.

  8. A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fujisaki, Eiichiro

    2002-01-01

    We present a statistically-hiding commitment scheme allowing commitment to arbitrary size integers, based on any (Abelian) group with certain properties, most importantly, that it is hard for the committer to compute its order. We also give efficient zero-knowledge protocols for proving knowledge...... input is chosen by the (possibly cheating) prover. -  - Our results apply to any group with suitable properties. In particular, they apply to a much larger class of RSA moduli than the safe prime products proposed in [14] - Potential examples include RSA moduli, class groups and, with a slight...

  9. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

    Directory of Open Access Journals (Sweden)

    Tzu-Chuen Lu

    2017-10-01

    Full Text Available The concept of a dual-image based scheme in information sharing consists of concealing secret messages in two cover images; only someone who has both stego-images can extract the secret messages. In 2015, Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit to reduce the distortion of the stego-image. Then, in 2016, Lu et al. used a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. Because the folding strategy can obviously reduce the value, the proposed scheme includes the folding operation twice to further decrease the reduced digit. We use a frequency-based encoding strategy to encode a secret message and then use the block folding technique by performing the center-folding operation twice to embed secret messages. An indicator is needed to identify the sequence number of the folding operation. The proposed scheme collects several indicators to produce a combined code and hides the code in a pixel to reduce the size of the indicators. The experimental results show that the proposed method can achieve higher image quality under the same embedding rate or higher payload, which is better than other methods.

  10. A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

    Directory of Open Access Journals (Sweden)

    Milad Taleby Ahvanooey

    2018-01-01

    Full Text Available With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.

  11. Antibacterial activities of leave extracts as bactericides for soaking of skin or hide

    Science.gov (United States)

    Suparno, Ono; Panandita, Tania; Afifah, Amalia; Marimin; Purnawati, Rini

    2018-03-01

    Antibacteria, a subtance inhibiting the growth of bacteria, can be obtained from tropical-almond (Terminalia catappa), morinda (Morinda citrifolia), and white leadtree (Leucaena leucocephala) plants, since the plants have phytochemical content functioning as antibacterial agent. Commonly, part of plant that contains higher antibacterial substances is its leaf. The objectives of this study were to determine antibacterial activity of tropical-almond, morinda, and white leadtree leaves extracts, and to analyse the potency of the three extracts as natural bactericide for soaking of skin or hide. The responses measured in this study were phytochemical contents, total flavonoid, tannin content, the inhibition zone, the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Phytochemical contents containing the three leaves extracts were alkaloid, flavonoid, tannin, saponin, phenolic, and glycoside. Total flavonoid and tannin contents of the three extracts were tropical-almond extract of 1.14 % and 1.51 %, respectively; morinda extract of 0.61 % and 0.36 %, respectively; and white leadtree extract of 0.60 % and 4.82 %, respectively. White leadtree leaf extract gave the highest inhibition zone against B. subtilis, S. aureus and E. coli, i.e. 1.50, 1.3, and 1.65 cm, respectively; and the lowest MIC and MBC against B. subtilis, S. aureus and E. coli, i.e. 1500, 3000, and 1500 μg/ml, respectively. Therefore, the white leadtree leave extract had more potential as bactericide for soaking of skin or hide compared to those of the tropical-almond and morinda leaves extracts.

  12. Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2015-05-01

    A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  13. Analysis Of Aspects Of Messages Hiding In Text Environments

    Directory of Open Access Journals (Sweden)

    Afanasyeva Olesya

    2015-09-01

    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  14. Costly hide and seek pays: unexpected consequences of deceit in a social dilemma

    International Nuclear Information System (INIS)

    Szolnoki, Attila; Perc, Matjaž

    2014-01-01

    Deliberate deceptiveness intended to gain an advantage is commonplace in human and animal societies. In a social dilemma, an individual may only pretend to be a cooperator to elicit cooperation from others, while in reality he is a defector. With this as motivation, we study a simple variant of the evolutionary prisoner's dilemma game entailing deceitful defectors and conditional cooperators that lifts the veil on the impact of such two-faced behavior. Defectors are able to hide their true intentions at a personal cost, while conditional cooperators are probabilistically successful at identifying defectors and act accordingly. By focusing on the evolutionary outcomes in structured populations, we observe a number of unexpected and counterintuitive phenomena. We show that deceitful behavior may fare better if it is costly, and that a higher success rate of identifying defectors does not necessarily favor cooperative behavior. These results are rooted in the spontaneous emergence of cycling dominance and spatial patterns that give rise to fascinating phase transitions, which in turn reveal the hidden complexity behind the evolution of deception. (paper)

  15. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  16. Alien invasions and the game of hide and seek in Patagonia.

    Directory of Open Access Journals (Sweden)

    Martin Lindegren

    Full Text Available The introduction, establishment and spread of alien species is a major threat to biodiversity and the provision of ecosystem services for human wellbeing. In order to reduce further loss of biodiversity and maintain productive and sustainable ecosystems, understanding the ecological mechanisms underlying species invasions and avoiding potentially harmful effects on native communities is urgently needed, but largely lacking. We here demonstrate, by means of hydroacoustics and advanced spatial modelling, how native fish species as a result of previous exposure to native predators may successfully respond to invasive novel predators through a complicated game of hide and seek, minimizing spatio-temporal overlap with predators, and potentially facilitating coexistence between native prey species (Galaxiids and introduced novel predators (Salmonids in a deep Andean lake, Patagonia.

  17. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    Directory of Open Access Journals (Sweden)

    Novella Isabel S

    2003-06-01

    Full Text Available Abstract Background In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, RED, was found to avoid extinction and remain in the population for long periods of time. Since RED characterizes the past evolutionary history of the population, this observation was called quasispecies memory. While the quasispecies theory predicts the existence of these memory genomes, there is a disagreement between the expected and observed mutant frequency values. Therefore, the origin of quasispecies memory is not fully understood. Results We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry, the likely cause of fitness differences between wild type and RED mutants. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.. If the RED mutant is constantly recreated by mutations, then its frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases their fitness to the wild-type level. Moreover, even at low m.o.i. the equilibrium frequency of the mutant is higher than predicted by the standard quasispecies model, because a fraction of mutant virions generated from wild-type parents will also be encapsidated by wild-type protein. Conclusions Our model predicts that phenotypic hiding will strongly influence the population dynamics of viruses, particularly at high m.o.i., and will also have important effects on the mutation-selection balance at low m.o.i. The delay in mutant extinction and increase in mutant

  18. No place to hide: when shame causes proselfs to cooperate.

    Science.gov (United States)

    Declerck, Carolyn Henriette; Boone, Christophe; Kiyonari, Toko

    2014-01-01

    Shame is considered a social emotion with action tendencies that elicit socially beneficial behavior. Yet, unlike other social emotions, prior experimental studies do not indicate that incidental shame boosts prosocial behavior. Based on the affect as information theory, we hypothesize that incidental feelings of shame can increase cooperation, but only for self-interested individuals, and only in a context where shame is relevant with regards to its action tendency. To test this hypothesis, cooperation levels are compared between a simultaneous prisoner's dilemma (where "defect" may result from multiple motives) and a sequential prisoner's dilemma (where "second player defect" is the result of intentional greediness). As hypothesized, shame positively affected proselfs in a sequential prisoner's dilemma. Hence ashamed proselfs become inclined to cooperate when they believe they have no way to hide their greediness, and not necessarily because they want to make up for earlier wrong-doing.

  19. Information hiding techniques for infrared images: exploring the state-of-the art and challenges

    Science.gov (United States)

    Pomponiu, Victor; Cavagnino, Davide; Botta, Marco; Nejati, Hossein

    2015-10-01

    The proliferation of Infrared technology and imaging systems enables a different perspective to tackle many computer vision problems in defense and security applications. Infrared images are widely used by the law enforcement, Homeland Security and military organizations to achieve a significant advantage or situational awareness, and thus is vital to protect these data against malicious attacks. Concurrently, sophisticated malware are developed which are able to disrupt the security and integrity of these digital media. For instance, illegal distribution and manipulation are possible malicious attacks to the digital objects. In this paper we explore the use of a new layer of defense for the integrity of the infrared images through the aid of information hiding techniques such as watermarking. In this context, we analyze the efficiency of several optimal decoding schemes for the watermark inserted into the Singular Value Decomposition (SVD) domain of the IR images using an additive spread spectrum (SS) embedding framework. In order to use the singular values (SVs) of the IR images with the SS embedding we adopt several restrictions that ensure that the values of the SVs will maintain their statistics. For both the optimal maximum likelihood decoder and sub-optimal decoders we assume that the PDF of SVs can be modeled by the Weibull distribution. Furthermore, we investigate the challenges involved in protecting and assuring the integrity of IR images such as data complexity and the error probability behavior, i.e., the probability of detection and the probability of false detection, for the applied optimal decoders. By taking into account the efficiency and the necessary auxiliary information for decoding the watermark, we discuss the suitable decoder for various operating situations. Experimental results are carried out on a large dataset of IR images to show the imperceptibility and efficiency of the proposed scheme against various attack scenarios.

  20. An Internal Data Non-hiding Type Real-time Kernel and its Application to the Mechatronics Controller

    Science.gov (United States)

    Yoshida, Toshio

    For the mechatronics equipment controller that controls robots and machine tools, high-speed motion control processing is essential. The software system of the controller like other embedded systems is composed of three layers software such as real-time kernel layer, middleware layer, and application software layer on the dedicated hardware. The application layer in the top layer is composed of many numbers of tasks, and application function of the system is realized by the cooperation between these tasks. In this paper we propose an internal data non-hiding type real-time kernel in which customizing the task control is possible only by change in the program code of the task side without any changes in the program code of real-time kernel. It is necessary to reduce the overhead caused by the real-time kernel task control for the speed-up of the motion control of the mechatronics equipment. For this, customizing the task control function is needed. We developed internal data non-cryptic type real-time kernel ZRK to evaluate this method, and applied to the control of the multi system automatic lathe. The effect of the speed-up of the task cooperation processing was able to be confirmed by combined task control processing on the task side program code using an internal data non-hiding type real-time kernel ZRK.

  1. Methanol extract of grain dust shows complement fixing activity and other characteristics similar to tannic acid.

    Science.gov (United States)

    Skea, D; Broder, I

    1986-01-01

    We have found several similarities between tannic acid and grain dust extract prepared with methanol. Both formed a precipitate with IgG, and these interactions were inhibited by albumin. In addition, both preparations fixed complement; this activity was heat stable and was removed by prior adsorption of the preparations with hide powder. Adsorption with polyvinyl polypyrrolidone reduced the complement-fixing activity of tannic acid but not that of the methanol grain dust extract. The similarities between tannic acid and the methanol grain dust extract are consistent with the presence of a tannin or tanninlike material in grain dust. Images FIGURE 1. PMID:3709479

  2. Effect of acanthocephalan parasites on hiding behaviour in two species of shore crabs.

    Science.gov (United States)

    Latham, A D M; Poulin, R

    2002-12-01

    The effect of acanthocephalan parasites (Profilicollis spp.) on the hiding behaviour during low tide of two species of shore crabs (intermediate hosts), Macrophthalmus hirtipes (Brachyura: Ocypodidae) and Hemigrapsus crenulatus (Brachyura: Grapsidae), was examined at Blueskin Bay, South Island, New Zealand. Exposed M. hirtipes were found to have significantly higher infection levels than did hidden conspecifics. This pattern was not observed for H. crenulatus. Mean cystacanth numbers were found to be considerably higher in M. hirtipes than H. crenulatus. Crabs exposed at low tide are at a greater risk of predation by definitive shorebird hosts than are hidden conspecifics. Preferential manipulation of one intermediate host species over another could influence diversity within ecosystems.

  3. Hide out return test and blowndown crud composition under ETA chemistry

    International Nuclear Information System (INIS)

    Chocron, Mauricio; Rodriguez, Ivanna; Saucedo, Ramona; Rodriguez-Aliciardi, Matias; Montes, Juan

    2012-09-01

    Among the techniques recommended for the surveillance of the Steam Generators (SGs) are (i) the follow-up of the corrosion products in the Feed Water and Blown down water and the corresponding accumulation mass balance and (ii) The follow-up of ionic impurities normally present in the main condensate and feed water that can enter the cycle either by condenser leakages or even by the make-up water. This is so, no matter how well the the cycle is constructed or the make-up water plant behaves given the continuous phase change present in it and the subsequent concentration. A synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in the deposits creating a potentially risky environment for the steam generator tubes. Hide out return determination consists in the measurement of the concentration of ions, anions and cations, present in the blown-down water which are eluted during the shutdown along with the reduction of power and temperature. The integrated value provides figures to perform several evaluations like: (i) how well the make-up water plant has performed during the cycle, (ii) presence of condenser in leakages, (iii) amount of deposits present in the steam generator and (iv) it allows to estimate the chemistry in operation inside the steam generator liquid phase inside the sludge pile. Embalse, a CANDU 6 pressurized heavy water reactor located in Cordoba Province, Argentina, is close to reach the end-of-design-life and a project of life extension is currently ongoing. There, also the chemistry in the BOP has been modified from Morpholine to Ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of steam generator internals and new steam generators will be installed. It is of interest then to set up a hide-out return procedure and analysis of blown down crud collected during the shut down as a base line for the second period of operation

  4. Hiding the interior region of core-shell nanoparticles with quantum invisible cloaks

    Science.gov (United States)

    Lee, Jeng Yi; Lee, Ray-Kuang

    2014-04-01

    Based on the scattering cancellation, we provide a method not only making a nanoparticle nearly invisible, but also hiding its interior region from the outside probing matter wave. By applying the interplay among the nodal points of partial waves along with the concept of streamline in fluid dynamics for probability flux, a quantum invisible cloak to the electron transport in a host semiconductor is demonstrated by simultaneously guiding the probability flux outside a hidden region and keeping the total scattering cross section negligible. As the probability flux vanishes in the interior region, one can embed any materials inside a multiple core-shell nanoparticle without affecting physical observables from the outside. Our results reveal the possibility to design a protection shield layer for fragile interior parts from the impact of transport electrons.

  5. Chlamydia pneumoniae hides inside apoptotic neutrophils to silently infect and propagate in macrophages.

    Directory of Open Access Journals (Sweden)

    Jan Rupp

    Full Text Available BACKGROUND: Intracellular pathogens have developed elaborate strategies for silent infection of preferred host cells. Chlamydia pneumoniae is a common pathogen in acute infections of the respiratory tract (e.g. pneumonia and associated with chronic lung sequelae in adults and children. Within the lung, alveolar macrophages and polymorph nuclear neutrophils (PMN are the first line of defense against bacteria, but also preferred host phagocytes of chlamydiae. METHODOLOGY/PRINCIPAL FINDINGS: We could show that C. pneumoniae easily infect and hide inside neutrophil granulocytes until these cells become apoptotic and are subsequently taken up by macrophages. C. pneumoniae infection of macrophages via apoptotic PMN results in enhanced replicative activity of chlamydiae when compared to direct infection of macrophages, which results in persistence of the pathogen. Inhibition of the apoptotic recognition of C. pneumoniae infected PMN using PS- masking Annexin A5 significantly lowered the transmission of chlamydial infection to macrophages. Transfer of apoptotic C. pneumoniae infected PMN to macrophages resulted in an increased TGF-ss production, whereas direct infection of macrophages with chlamydiae was characterized by an enhanced TNF-alpha response. CONCLUSIONS/SIGNIFICANCE: Taken together, our data suggest that C. pneumoniae uses neutrophil granulocytes to be silently taken up by long-lived macrophages, which allows for efficient propagation and immune protection within the human host.

  6. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    OpenAIRE

    El-Monem, Farouk Abd; Hussain, Ahmed I.; Nashy, EL-Shahat H.A.; El-Wahhab, Hamada Abd; Naser, Abd El-Rahman M.

    2014-01-01

    Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA) and butyl acrylate (BA). The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leat...

  7. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2015-01-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. (paper)

  8. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications.

    Science.gov (United States)

    Loan, Nazir A; Parah, Shabir A; Sheikh, Javaid A; Akhoon, Jahangir A; Bhat, Ghulam M

    2017-09-01

    A high capacity and semi-reversible data hiding scheme based on Pixel Repetition Method (PRM) and hybrid edge detection for scalable medical images has been proposed in this paper. PRM has been used to scale up the small sized image (seed image) and hybrid edge detection ensures that no important edge information is missed. The scaled up version of seed image has been divided into 2×2 non overlapping blocks. In each block there is one seed pixel whose status decides the number of bits to be embedded in the remaining three pixels of that block. The Electronic Patient Record (EPR)/data have been embedded by using Least Significant and Intermediate Significant Bit Substitution (ISBS). The RC4 encryption has been used to add an additional security layer for embedded EPR/data. The proposed scheme has been tested for various medical and general images and compared with some state of art techniques in the field. The experimental results reveal that the proposed scheme besides being semi-reversible and computationally efficient is capable of handling high payload and as such can be used effectively for electronic healthcare applications. Copyright © 2017. Published by Elsevier Inc.

  9. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  10. [Missed diagnosis of hiding posterior marginal fracture of ankle with pronation-external rotation type and its treatment].

    Science.gov (United States)

    Wang, Jia; Zhang, Yun-Tong; Zhang, Chun-Cai; Tang, Yang

    2014-01-01

    To analyze causes of missed diagnosis of hiding post-malleolar fractures in treating ankle joint fractures of pronation-external rotation type according to Lauge-Hansen classification and assess its medium-term outcomes. Among 103 patients with ankle joint fracture of pronation-external rotation type treated from March 2002 to June 2010,9 patients were missed diagnosis,including 6 males and 3 females,with a mean age of 35.2 years old (ranged, 18 to 55 years old) . Four patients were diagnosed during operation, 2 patients were diagnosed 2 or 3 days after first surgery and 3 patients came from other hospital. All the patients were treated remedially with lag screws and lock plates internal fixation. After operation,ankle joint function was evaluated according to American Orthopaedic Foot and Ankle Society (AOFAS). All the 9 patients were followed up, and the duration ranged from 14 to 30 months (averaged, 17 months). No incision infection was found, and all incision healed at the first stage. At the latest follow-up, AOFAS was 83.0 +/- 4.4, the score of 4 patients diagnosed during operation was 85.0 +/- 2.9, and the score of 5 patients treated by secondary operation was 81.0 +/- 5.3. All the patients got fracture union observed by X-ray at a mean time of 2.2 months after operation. There were no complications such as internal fixation loosing, broken and vascular or nerve injuries. Ankle joint fracture of pronation-external rotation type may be combined with hiding post-malleolar fractures. So to patients with ankle joint fracture of pronation-external rotation type, lateral X-ray should be read carefully, and if necessary, CT or MRI examination should be performed. If adding lateral X-ray examination after reduction of exterior and interior ankle joint fixation, the missed diagnosis may be avoided.

  11. Development of methods for the neutron activation analysis to the determination of essential and toxic trace elements of biological and environmental samples: application of enzyme activity of raw hides

    International Nuclear Information System (INIS)

    Sipos, T.; Nagy, L.G.; Toeroek, G.; Kollar, J.

    1974-01-01

    Investigations on the post mortem enzymatic processes pointed out the fact, that significant deviations can be observed in the extent and in the results of the autolytic transformations occurring during the storage of raw hide. A neutron activation analysis procedure, based on a semiautomated radiochemical separation procedure and scintillation gamma spectrometry, was selected for the determination of some trace elements. Six trace elements, Cu, Mn, Zn, Au, As, and Cr, and one minor component,Br, were detected and/or determined in the concentration region of 0,1-10 3 ppM. According to preliminary investigations evaluated at the time being, concentration differences of some orders of magnitude were obtained for some trace elements: copper, zinc and manganese, whereas the concentration of bromine remained practically constant. These findings seem to correlate with large differences in appearance due to different enzyme activities in the raw hides

  12. Probing the crucial role of Leu31 and Thr33 of the Bacillus pumilus CBS alkaline protease in substrate recognition and enzymatic depilation of animal hide.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    Full Text Available The sapB gene, encoding Bacillus pumilus CBS protease, and seven mutated genes (sapB-L31I, sapB-T33S, sapB-N99Y, sapB-L31I/T33S, sapB-L31I/N99Y, sapB-T33S/N99Y, and sapB-L31I/T33S/N99Y were overexpressed in protease-deficient Bacillus subtilis DB430 and purified to homogeneity. SAPB-N99Y and rSAPB displayed the highest levels of keratinolytic activity, hydrolysis efficiency, and enzymatic depilation. Interestingly, and at the semi-industrial scale, rSAPB efficiently removed the hair of goat hides within a short time interval of 8 h, thus offering a promising opportunity for the attainment of a lime and sulphide-free depilation process. The efficacy of the process was supported by submitting depilated pelts and dyed crusts to scanning electron microscopic analysis, and the results showed well opened fibre bundles and no apparent damage to the collagen layer. The findings also revealed better physico-chemical properties and less effluent loads, which further confirmed the potential candidacy of the rSAPB enzyme for application in the leather industry to attain an ecofriendly process of animal hide depilation. More interestingly, the findings on the substrate specificity and kinetic properties of the enzyme using the synthetic peptide para-nitroanilide revealed strong preferences for an aliphatic amino-acid (valine at position P1 for keratinases and an aromatic amino-acid (phenylalanine at positions P1/P4 for subtilisins. Molecular modeling suggested the potential involvement of a Leu31 residue in a network of hydrophobic interactions, which could have shaped the S4 substrate binding site. The latter could be enlarged by mutating L31I, fitting more easily in position P4 than a phenylalanine residue. The molecular modeling of SAPB-T33S showed a potential S2 subside widening by a T33S mutation, thus suggesting its importance in substrate specificity.

  13. What is hiding behind ontogenic d13C variations in mollusk shells: New insights from scallops.

    Science.gov (United States)

    Chauvaud, L.; Lorrain, A.; Gillikin, D. P.; Thebault, J.; Paulet, Y.; Strand, O.; Blamart, D.; Guarini, J.; Clavier, J.

    2008-12-01

    We examined d13Ccalcite variations along scallop shells (Pecten maximus) sampled in Norway, France and Spain. Time series of shell calcite d13C show a consistent pattern of decreasing d13C with age. This almost linear d13C trend reflects an increasing contribution of metabolic CO2 to skeletal carbonate throughout ontogeny. We have removed this ontogenic trend to try to extract other information from our shell calcite d13C dataset. Scallops from the Bay of Brest (western Brittany, France) were then used to interpret the data as many environmental parameters were available for this site. d13Ccalcite variations were compared to d13C of dissolved inorganic carbon (DIC) and Chl a. The detrended calcite d13C profiles seem to follow a seasonal pattern, but surprisingly are inversely related to the d13C DIC and chlorophyll a concentrations measured within the water column. Theses results suggest that shell d13C variations are not controlled by isotopic variation of DIC. Since scallops eat phytoplankton and microphytobenthos cells, and, as a consequence respire organic mater largely depleted in 13C, we therefore suggest that in mollusk suspension feeders the shell d13Ccalcite might still be used to track the annual number of phytoplankton blooms when d13C values of calcite are detrended. We must consider this trend as a potential biological filter hiding precious environmental records.

  14. Prevalence and relatedness of Escherichia coli O157:H7 strains in the feces and on the hides and carcasses of U.S. meat goats at slaughter.

    Science.gov (United States)

    Jacob, M E; Foster, D M; Rogers, A T; Balcomb, C C; Sanderson, M W

    2013-07-01

    We determined the prevalences of Escherichia coli O157:H7 in feces, hide, and carcasses of meat goats at a U.S. processing plant. Prevalences were 11.1%, 2.7%, and 2.7%, respectively. Sixteen pulsed-field gel electrophoresis (PFGE) subtypes were identified among 49 E. coli O157:H7 isolates, some of which were present on multiple sample types or collection days.

  15. Limited distortion in LSB steganography

    Science.gov (United States)

    Kim, Younhee; Duric, Zoran; Richards, Dana

    2006-02-01

    It is well known that all information hiding methods that modify the least significant bits introduce distortions into the cover objects. Those distortions have been utilized by steganalysis algorithms to detect that the objects had been modified. It has been proposed that only coefficients whose modification does not introduce large distortions should be used for embedding. In this paper we propose an effcient algorithm for information hiding in the LSBs of JPEG coefficients. Our algorithm uses parity coding to choose the coefficients whose modifications introduce minimal additional distortion. We derive the expected value of the additional distortion as a function of the message length and the probability distribution of the JPEG quantization errors of cover images. Our experiments show close agreement between the theoretical prediction and the actual additional distortion.

  16. Analysis of hide-out return and the composition of the steam generators' combined blowdown under ethanolamine chemistry

    International Nuclear Information System (INIS)

    Rodriguez Aliciardi, M; Belloni, M; Croatto, F; Ferrari, F; Herrera, C; Mendizabal, M; Montes, J; Saucedo, R; Rodriguez, I; Chocron, M

    2012-01-01

    Among the techniques recommended for the surveillance of the steam generators (SG's) are (i) the follow-up of the corrosion products in the feed water and blown-down water and the corresponding accumulation mass balance and (ii) the follow-up of the ionic impurities normally present in the main condensate and feed water that can enter in the cycle either through condenser leakages or even with the make-up water. This is, no matter how well the cycle is constructed or the make-up water plant behaves, given the continuous phase change present in the cycle, a concentration equilibrium is established. Moreover, a synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in crevices and deposits creating a potentially corrosion risky environment for the SG's tubes. Hide-out return determination consists in the measurement of ions' concentrations, present in the blown-down water which are eluted in the shutdown during the power and temperature reduction. The integrated values allow graphical representations for performing several evaluations like: (i) the performance make-up water plant during a period, (ii) the presence of condenser in-leakages, (iii) the SG's deposits estimation and (iv) the internal chemistry of the SG's liquid phase inside the sludge pile. CNE, a CANDU 6 pressurized heavy-water reactor (PHWR) located in Embalse, Cordoba Province, Argentina, is close to reach the end-of-design-life and a life extension project is currently ongoing. In the plant also the chemistry of the BOP has been modified from a morpholine to an ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of SG's internals and new SG's will be installed. Then, it is of interest to set up a hide-out return procedure and analysis of the combined blown-down crud collected during the shut down as a base line for the second period of

  17. Assessing theory of mind nonverbally in those with intellectual disability and ASD: the penny hiding game.

    Science.gov (United States)

    San José Cáceres, Antonia; Keren, Noa; Booth, Rhonda; Happé, Francesca

    2014-10-01

    Individuals with autism spectrum disorder (ASD) and low intellectual/language abilities are often omitted from experimental studies because of the challenges of testing these individuals. It is vital to develop appropriate and accessible tasks so that this significant part of the spectrum is not neglected. The theory of mind (ToM) has been extensively assessed in ASD, predominantly in relatively high-functioning individuals with reasonable language skills. This study aims to assess the ToM abilities of a sample of 132 participants with intellectual disability (ID) with and without ASD, matched in verbal mental age (VMA) and chronological age, using a naturalistic and nonverbal deception task: the Penny Hiding Game (PHG). The relationship between performance on the PHG and everyday adaptation was also studied. The PHG proved accessible to most participants, suggesting its suitability for use with individuals with low cognitive skills, attentional problems, and limited language. The ASD + ID group showed significantly more PHG errors, and fewer tricks, than the ID group. PHG performance correlated with Vineland adaptation scores for both groups. VMA was a major predictor of passing the task in both groups, and participants with ASD + ID required, on average, 2 years higher VMA than those with ID only, to achieve the same level of PHG success. VMA moderated the association between PHG performance and real-life social skills for the ASD + ID more than the ID group, suggesting that severely impaired individuals with ASD may rely on verbal ability to overcome their social difficulties, whereas individuals with ID alone may use more intuitive social understanding both in the PHG and everyday situations. © 2014 International Society for Autism Research, Wiley Periodicals, Inc.

  18. Analysis of the bacterial diversity existing on animal hide and wool: development of a preliminary PCR-restriction fragment length polymorphism fingerprint database for identifying isolates.

    Science.gov (United States)

    Chen, Yu; Gao, Hongwei; Zhang, Yanming; Deng, Mingjun; Wu, Zhenxing; Zhu, Laihua; Duan, Qing; Xu, Biao; Liang, Chengzhu; Yue, Zhiqin; Xiao, Xizhi

    2012-01-01

    Twenty-one bacterial strains were isolated from imported cattle hide and rabbit wool using two types of media, nutrient broth, and nutrient broth with serum. The bacteria identified were Brevibacillus laterosporus, Leclercia adecarboxylata, Peptococcus niger, Bacillus circulans, Raoultella ornithinolytica, Bacillus subtilis, Bacillus cereus, Bacillus thermobacillus, Bacillus choshinensis, Bacillus sphaericus, Acinetobacter haemolyticus, Sphingomonas paucimobilis, Bacillus thuringiensis, Staphylococcus intermedius, Mycobacteria, Moraxella, Klebsiella pneumoniae, Ralstonia pickettii, Staphylococcus chromogenes, Comamonas testosteroni, and Cupriavidus pauculus. The 16s rDNA gene of each bacterium was amplified using the universal primers 27f and 1492r. The amplicons were digested with AvaI, BamHI, BgII, DraI, EcoRI, EcoRV, HindIII, HinfI, HpaI, PstI, SmaI, TaqII, XbaI, XmaI, AluI, XhoI, and PvuI individually. A specific fingerprint from the PCR-restriction fragment length polymorphism method based on 16s rDNA was obtained for each bacterium. The results showed that the method developed was useful not only for bacterial identification but also for the etiological investigation of pathogens in imported animal hair and wool.

  19. Human Commercial Models' Eye Colour Shows Negative Frequency-Dependent Selection.

    Directory of Open Access Journals (Sweden)

    Isabela Rodrigues Nogueira Forti

    Full Text Available In this study we investigated the eye colour of human commercial models registered in the UK (400 female and 400 male and Brazil (400 female and 400 male to test the hypothesis that model eye colour frequency was the result of negative frequency-dependent selection. The eye colours of the models were classified as: blue, brown or intermediate. Chi-square analyses of data for countries separated by sex showed that in the United Kingdom brown eyes and intermediate colours were significantly more frequent than expected in comparison to the general United Kingdom population (P<0.001. In Brazil, the most frequent eye colour brown was significantly less frequent than expected in comparison to the general Brazilian population. These results support the hypothesis that model eye colour is the result of negative frequency-dependent selection. This could be the result of people using eye colour as a marker of genetic diversity and finding rarer eye colours more attractive because of the potential advantage more genetically diverse offspring that could result from such a choice. Eye colour may be important because in comparison to many other physical traits (e.g., hair colour it is hard to modify, hide or disguise, and it is highly polymorphic.

  20. That Man Behind the Curtain: Investigating the Sexual Online Dating Behavior of Men Who Have Sex With Men but Hide Their Same-Sex Sexual Attraction in Offline Surroundings.

    Science.gov (United States)

    Lemke, Richard; Weber, Mathias

    2017-01-01

    This study investigates how men who have sex with men (MSM) use chat and dating sites based on theories of stigma-related offline behavior and online self-disclosure. We hypothesize that hidden MSM (those who self-label as heterosexual or who hide their same-sex sexual attraction from family, friends, acquaintances, or a female romantic partner) differ from open MSM in how they behave on gay chat and dating sites and in offline gay venues. Drawing on a survey of 12,002 MSM, we show that hidden MSM tend to mask their identity on gay chat and dating sites while avoiding offline gay venues. They also focus more strongly on online sexual activities (e.g., masturbating during online chats) when using gay chat and dating sites. However, they spend the same amount of time on these sites, and they use them to initiate offline sexual encounters as often and as fast as open MSM.

  1. 40 CFR 425.10 - Applicability; description of the hair pulp, chrome tan, retan-wet finishing subcategory.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING... addition to other unhairing and tanning operation, processes raw or cured cattle or cattle-like hides into finished leather by chemically dissolving the hide hair, chrome tanning, and retan-wet finishing. ...

  2. Hiding in plain sight: communication theory in implementation science.

    Science.gov (United States)

    Manojlovich, Milisa; Squires, Janet E; Davies, Barbara; Graham, Ian D

    2015-04-23

    ignoring a key contributor to implementation intervention success. When conceptualized as a transformational process, the focus of communication moves to shared understanding and is grounded in human interactions and the way we go about constructing knowledge. Instead of hiding in plain sight, we suggest explicitly acknowledging the role that communication plays in our implementation efforts. By using both paradigms, we can investigate when communication facilitates implementation, when it does not, and how to improve it so that our implementation and clinical interventions are embraced by clinicians and patients alike.

  3. Hide-Scrapers from Arukhlo I Settlement in Georgia (on correspondence of the shape and function of prehistoric implements

    Directory of Open Access Journals (Sweden)

    Esakia Ketevan M.

    2017-09-01

    Full Text Available The article analyses one of the primary categories of the implement complex discovered at Arukhlo I Neolithic settlement (Georgia, Kvemo Kartli Region. The stone implements discovered at the site are characterized by their great variety. Comprehensive functional research conducted by the authors demonstrated that the typological and morphological characteristics of the various categories of stone implements do not always correspond to their functions. Thus, the shapes and functions of the hide-scrapers were fully identical for 18 of 39 implements only, whereas the other tools were used for different purposes and did not feature traces of utilization. A microanalysis of their working parts allowed to determine the types of processed raw material, means of processing, and in certain cases the type of obtained articles as well. The authors made a conclusion on the importance of the comprehensive research of production inventory for the reconstruction of the characteristic features of prehistoric economy.

  4. Validation of a hot water rinse and lactic acid spray in combination with scaling for treating hide-on carcasses to control biotype I strains of Escherichia coli used as surrogates for Shiga toxin-producing E. coli

    Science.gov (United States)

    Scalding of hide-on bob veal carcasses with or without standard scalding chemical agents typically used for hogs, followed by an 82.2degreeC hot water wash and lactic acid spray (applied at ambient temperature) prior to chilling, was evaluated to determine its effectiveness in reducing the levels of...

  5. Genetic diversity and antimicrobial resistance among isolates of Escherichia coli O157: H7 from feces and hides of super-shedders and low-shedding pen-mates in two commercial beef feedlots

    Directory of Open Access Journals (Sweden)

    Stanford Kim

    2012-09-01

    Full Text Available Abstract Background Cattle shedding at least 104 CFU Escherichia coli O157:H7/g feces are described as super-shedders and have been shown to increase transmission of E. coli O157:H7 to other cattle in feedlots. This study investigated relationships among fecal isolates from super-shedders (n = 162, perineal hide swab isolates (PS from super-shedders (n = 137 and fecal isolates from low-shedder (4 CFU/g feces pen-mates (n = 496 using pulsed-field gel electrophoresis (PFGE. A subsample of these fecal isolates (n = 474 was tested for antimicrobial resistance. Isolates of E. coli O157:H7 were obtained from cattle in pens (avg. 181 head at 2 commercial feedlots in southern Alberta with each steer sampled at entry to the feedlot and prior to slaughter. Results Only 1 steer maintained super-shedder status at both samplings, although approximately 30% of super-shedders in sampling 1 had low-shedder status at sampling 2. A total of 85 restriction endonuclease digestion clusters (REPC; 90% or greater similarity and 86 unique isolates (P = 0.94. Only 2/21 super-shedders had fecal isolates in the same REPC at both samplings. Fecal and PS isolates from individual super-shedders generally belonged to different REPCs, although fecal isolates of E. coli O157:H7 from super- and low-shedders showed greater similarity (P P = 0.69, although all super-shedder isolates with antimicrobial resistance (n = 3 were resistant to multiple antimicrobials. Conclusions Super-shedders did not have increased antimicrobial resistance compared to low-shedder pen mates. Our data demonstrated that PFGE profiles of individual super-shedders varied over time and that only 1/162 steers remained a super-shedder at 2 samplings. In these two commercial feedlots, PFGE subtypes of E. coli O157:H7 from fecal isolates of super- and low-shedders were frequently different as were subtypes of fecal and perineal hide isolates from super-shedders.

  6. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Directory of Open Access Journals (Sweden)

    Vishakha Kelkar

    2017-01-01

    Full Text Available In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient’s information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image.

  7. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Science.gov (United States)

    Tuckley, Kushal

    2017-01-01

    In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient's information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB) obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image. PMID:29104744

  8. Hiding the tobacco power wall reduces cigarette smoking risk in adolescents: using an experimental convenience store to assess tobacco regulatory options at retail point-of-sale.

    Science.gov (United States)

    Shadel, William G; Martino, Steven C; Setodji, Claude M; Scharf, Deborah M; Kusuke, Daniela; Sicker, Angela; Gong, Min

    2015-11-23

    This experiment tested whether changing the location or visibility of the tobacco power wall in a life sized replica of a convenience store had any effect on adolescents' susceptibility to future cigarette smoking. The study was conducted in the RAND StoreLab (RSL), a life sized replica of a convenience store that was developed to experimentally evaluate how changing aspects of tobacco advertising displays in retail point-of-sale environments influences tobacco use risk and behaviour. A randomised, between-subjects experimental design with three conditions that varied the location or visibility of the tobacco power wall within the RSL was used. The conditions were: cashier (the tobacco power wall was located in its typical position behind the cash register counter); sidewall (the tobacco power wall was located on a sidewall away from the cash register); or hidden (the tobacco power wall was located behind the cashier but was hidden behind an opaque wall). The sample included 241 adolescents. Hiding the tobacco power wall significantly reduced adolescents' susceptibility to future cigarette smoking compared to leaving it exposed (ie, the cashier condition; p=0.02). Locating the tobacco power wall on a sidewall away from the cashier had no effect on future cigarette smoking susceptibility compared to the cashier condition (p=0.80). Hiding the tobacco power wall at retail point-of-sale locations is a strong regulatory option for reducing the impact of the retail environment on cigarette smoking risk in adolescents. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  9. Optical image-hiding method with false information disclosure based on the interference principle and partial-phase-truncation in the fractional Fourier domain

    International Nuclear Information System (INIS)

    Dai, Chaoqing; Wang, Xiaogang; Zhou, Guoquan; Chen, Junlang

    2014-01-01

    An image-hiding method based on the optical interference principle and partial-phase-truncation in the fractional Fourier domain is proposed. The primary image is converted into three phase-only masks (POMs) using an analytical algorithm involved partial-phase-truncation and a fast random pixel exchange process. A procedure of a fake silhouette for a decryption key is suggested to reinforce the encryption and give a hint of the position of the key. The fractional orders of FrFT effectively enhance the security of the system. In the decryption process, the POM with false information and the other two POMs are, respectively, placed in the input and fractional Fourier planes to recover the primary image. There are no unintended information disclosures and iterative computations involved in the proposed method. Simulation results are presented to verify the validity of the proposed approach. (letters)

  10. Steganalysis of recorded speech

    Science.gov (United States)

    Johnson, Micah K.; Lyu, Siwei; Farid, Hany

    2005-03-01

    Digital audio provides a suitable cover for high-throughput steganography. At 16 bits per sample and sampled at a rate of 44,100 Hz, digital audio has the bit-rate to support large messages. In addition, audio is often transient and unpredictable, facilitating the hiding of messages. Using an approach similar to our universal image steganalysis, we show that hidden messages alter the underlying statistics of audio signals. Our statistical model begins by building a linear basis that captures certain statistical properties of audio signals. A low-dimensional statistical feature vector is extracted from this basis representation and used by a non-linear support vector machine for classification. We show the efficacy of this approach on LSB embedding and Hide4PGP. While no explicit assumptions about the content of the audio are made, our technique has been developed and tested on high-quality recorded speech.

  11. Birth Control Explorer

    Science.gov (United States)

    Menu Sex Ed Ask Us Anything Videos Games & Quizzes Connect Search About Find a Health Center X Sort by Advanced Search Show/Hide Content Types Article Game Poll Q&A Series Quiz Video Leave un-checked to search all types Search Sex Ed by Topic show topics hide topics Birth ...

  12. Statistical secrecy and multibit commitments

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Pedersen, Torben P.; Pfitzmann, Birgit

    1998-01-01

    nothing about it. One definition is based on the L1-norm distance between probability distributions, the other on information theory. We prove that the two definitions are essentially equivalent. We also show that statistical counterparts of definitions of computational secrecy are essentially equivalent......We present and compare definitions of "statistically hiding" protocols, and we propose a novel statistically hiding commitment scheme. Informally, a protocol statistically hides a secret if a computationally unlimited adversary who conducts the protocol with the owner of the secret learns almost...... to our main definitions. Commitment schemes are an important cryptologic primitive. Their purpose is to commit one party to a certain value, while hiding this value from the other party until some later time. We present a statistically hiding commitment scheme allowing commitment to many bits...

  13. Hide and seek

    DEFF Research Database (Denmark)

    Radel, Dietrich; Sand, Andreas; Steel, Mike

    2013-01-01

    criterion. This provides, for the first time, a rigorous way to test tree search algorithms on homoplasy-rich data, where we know in advance what the ‘best’ tree is. In this short note we consider just one search program (TNT) but show that it is able to locate the globally optimal tree correctly for 32......Finding optimal evolutionary trees from sequence data is typically an intractable problem, and there is usually no way of knowing how close to optimal the best tree from some search truly is. The problem would seem to be particularly acute when we have many taxa and when that data has high levels...... of homoplasy, in which the individual characters require many changes to fit on the best tree. However, a recent mathematical result has provided a precise tool to generate a short number of high-homoplasy characters for any given tree, so that this tree is provably the optimal tree under the maximum parsimony...

  14. Morphology of the leather defect light flecks and spots.

    Science.gov (United States)

    Nafstad, O; Wisløff, H; Grønstøl, H

    2001-01-01

    The skin histology and the scanning electron microscope morphology of the hide defect light flecks and spots after tanning were studied in 11 steers infested with biting lice (Damalinia bovis). Nine steers from herds free of lice were used as controls. Skin biopsies from 6 of the animals in the lice infested group showed mild to moderate hyperkeratosis and moderate perivascular to diffuse dermatitis with infiltration of mainly mononuclear cells and some eosinophilic granulocytes. The steers were slaughtered at an age of 18 to 23 months. Light flecks and spots occurred on all examined hides from the infested group after tanning. No examined hides from the control group demonstrated similar damage. Both light microscopic examination of sections of tanned hide with light flecks and spots and scanning electron microscopy of the same defects showed superficial grain loss and craters with a irregular fibre base encircled by smooth and intact grain. The association between louse infestation at an early age and damage of hides following slaughter 6 to 15 months later, suggested that louse infestations lead to a prolonged or lifelong weakening in the dermis. This weakening may cause superficial grain loss during the tanning process.

  15. Morphology of the Leather Defect Light Flecks and Spots

    Directory of Open Access Journals (Sweden)

    Grønstøl H

    2001-03-01

    Full Text Available The skin histology and the scanning electron microscope morphology of the hide defect light flecks and spots after tanning were studied in 11 steers infested with biting lice (Damalinia bovis. Nine steers from herds free of lice were used as controls. Skin biopsies from 6 of the animals in the lice infested group showed mild to moderate hyperkeratosis and moderate perivascular to diffuse dermatitis with infiltration of mainly mononuclear cells and some eosinophilic granulocytes. The steers were slaughtered at an age of 18 to 23 months. Light flecks and spots occurred on all examined hides from the infested group after tanning. No examined hides from the control group demonstrated similar damage. Both light microscopic examination of sections of tanned hide with light flecks and spots and scanning electron microscopy of the same defects showed superficial grain loss and craters with a irregular fibre base encircled by smooth and intact grain. The association between louse infestation at an early age and damage of hides following slaughter 6 to 15 months later, suggested that louse infestations lead to a prolonged or lifelong weakening in the dermis. This weakening may cause superficial grain loss during the tanning process.

  16. Mini review : Pengolahan kerupuk “Rambak” kulit di Indonesia

    Directory of Open Access Journals (Sweden)

    Dedes Amertaningtyas

    2011-12-01

    Full Text Available ABSTRACT: Hide a waste product of animal slaughter house is still can be utilized as food in the form of cracker. Cattle, buffalo, rabbit, chicken shank and fish skin can be used of raw materials for cracker production. This process include hide selection, washing, immersing, liming, deliming, boiling, cutting, immersing in sauce, drying and frying. In Indonesia, the skin cracker industriesare consentralised in certain area of west, central and east java provinces where Sumatra skin cracker are popular knows as “ kerupuk jangek”. Although skin cracker have a high protein content, however its quality are low comparedto other meat processed products. The most dominant amino acid in this product is glycine. Some important issues such as it is not recommended for people suffering uric acid, addition of harmfull additives i.e. formalin and borax, containg chrome which originated from hide prosessing industry and unreligion system of slaughtering (is not halal. Key words: waste product, skin animal, rambak cracker.

  17. Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images

    Directory of Open Access Journals (Sweden)

    Mehdi Hussain

    2016-05-01

    Full Text Available The goal of image steganographic methods considers three main key issues: high embedding capacity, good visual symmetry/quality, and security. In this paper, a hybrid data hiding method combining the right-most digit replacement (RMDR with an adaptive least significant bit (ALSB is proposed to provide not only high embedding capacity but also maintain a good visual symmetry. The cover-image is divided into lower texture (symmetry patterns and higher texture (asymmetry patterns areas and these textures determine the selection of RMDR and ALSB methods, respectively, according to pixel symmetry. This paper has three major contributions. First, the proposed hybrid method enhanced the embedding capacity due to efficient ALSB utilization in the higher texture areas of cover images. Second, the proposed hybrid method maintains the high visual quality because RMDR has the closest selection process to generate the symmetry between stego and cover pixels. Finally, the proposed hybrid method is secure against statistical regular or singular (RS steganalysis and pixel difference histogram steganalysis because RMDR is capable of evading the risk of RS detection attacks due to pixel digits replacement instead of bits. Extensive experimental tests (over 1500+ cover images are conducted with recent least significant bit (LSB-based hybrid methods and it is demonstrated that the proposed hybrid method has a high embedding capacity (800,019 bits while maintaining good visual symmetry (39.00% peak signal-to-noise ratio (PSNR.

  18. Carpet cloak with graded dielectric metasurface (Presentation Recording)

    Science.gov (United States)

    Hsu, LiYi; Lepetit, Thomas; Kante, Boubacar

    2015-09-01

    We demonstrate a method to hide a Gaussian-shaped bump on a ground plane from an incoming plane wave. In essence, we use a graded metasurface to shape the wavefronts like those of a flat ground plane[1,2].The metasurface provides additional phase to the electromagnetic field to control the reflection angle. To mimic a flat ground plane, the reflection angle is chosen to be equal to the incident angle. The desired phase distribution is calculated based on generalized Snell's laws[3]. We design our metasurface in the microwave range using sub-wavelength dielectric resonators. We verify the design by full-wave time-domain simulations and show that the result matches our theory well. This approach can be applied to hide any object on a ground plane not only at microwave frequencies but also at higher frequencies up to the infrared. 1. Jensen Li and J. B. Pendry, Hiding under the Carpet: A New Strategy for Cloaking. Phys. Rev. Lett. 101, 203901 (2008) 2. Andrea Alu, Mantle cloak: Invisibility induced by a surface. Phys. Rev. B 80, 245115 (2009) 3. Yu N, et al. Light propagation with phase discontinuities: Generalized laws of reflection and refraction. Science 334(6054):333-337 (2011)

  19. Surprising structures hiding in Penrose’s future null infinity

    Science.gov (United States)

    Newman, Ezra T.

    2017-07-01

    Since the late1950s, almost all discussions of asymptotically flat (Einstein-Maxwell) space-times have taken place in the context of Penrose’s null infinity, I+. In addition, almost all calculations have used the Bondi coordinate and tetrad systems. Beginning with a known asymptotically flat solution to the Einstein-Maxwell equations, we show first, that there are other natural coordinate systems, near I+, (analogous to light-cones in flat-space) that are based on (asymptotically) shear-free null geodesic congruences (analogous to the flat-space case). Using these new coordinates and their associated tetrad, we define the complex dipole moment, (the mass dipole plus i times angular momentum), from the l  =  1 harmonic coefficient of a component of the asymptotic Weyl tensor. Second, from this definition, from the Bianchi identities and from the Bondi-Sachs mass and linear momentum, we show that there exists a large number of results—identifications and dynamics—identical to those of classical mechanics and electrodynamics. They include, among many others, {P}=M{v}+..., {L}= {r} × {P} , spin, Newton’s second law with the rocket force term (\\dotM v) and radiation reaction, angular momentum conservation and others. All these relations take place in the rather mysterious H-space rather than in space-time. This leads to the enigma: ‘why do these well known relations of classical mechanics take place in H-space?’ and ‘What is the physical meaning of H-space?’

  20. Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation

    Directory of Open Access Journals (Sweden)

    Jia Yaoqi

    2016-10-01

    Full Text Available The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai, which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users. In this work, we show that the current designs of peer-assisted CDNs expose clients to privacy-invasive attacks, enabling one client to infer the set of browsed resources of another client. To alleviate this, we propose an anonymous peer-assisted CDN (APAC, which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request and responder anonymity (i.e., hiding who responds to the request for peers. APAC can be a web service, compatible with current browsers and requiring no client-side changes. Our anonymity analysis shows that our APAC design can preserve a higher level of anonymity than state-of-the-art peer-assisted CDNs. In addition, our evaluation demonstrates that APAC can achieve desired performance gains.

  1. Young Stars in Old Galaxies - a Cosmic Hide and Seek Game

    Science.gov (United States)

    2002-05-01

    Surprise Discovery with World's Leading Telescopes [1] Summary Combining data from the NASA/ESA Hubble Space Telescope (HST) and the ESO Very Large Telescope (VLT) , a group of European and American astronomers [2] have made an unexpected, major discovery. They have identified a huge number of "young" stellar clusters , only a few billion years old [3], inside an "old" elliptical galaxy (NGC 4365), probably aged some 12 billion years. For the first time, it has been possible to identify several distinct periods of star-formation in a galaxy as old as this one . Elliptical galaxies like NGC 4365 have until now been considered to have undergone one early star-forming period and thereafter to be devoid of any star formation. However, the combination of the best and largest telescopes in space and on the ground has now clearly shown that there is more than meets the eye. This important new information will help to understand the early history of galaxies and the general theory of star formation in the Universe . PR Photo 15a/02 : Combined HST+VLT image of elliptical galaxy NGC 4365 PR Photo 15b/02 : Same image, with "old" and "young" stellar clusters indicated PR Photo 15c/02 : Animated GIF image, showing the three cluster populations observed in NGC 4365 Do elliptical galaxies only contain old stars? One of the challenges of modern astronomy is to understand how galaxies, those large systems of stars, gas and dust, form and evolve. In this connection, a central question has always been to learn when most of the stars in the Universe formed. Did this happen at a very early stage, within a few billion years after the Big Bang? Or were a significant number of the stars we now observe formed much more recently? Spectacular collisions between galaxies take place all the time, triggering the formation of thousands or even millions of stars, cf. ESO PR Photo 29b/99 of the dramatic encounter between NGC 6872 and IC 4970. However, when looking at the Universe as a whole, most

  2. Histogram Modification and Wavelet Transform for High Performance Watermarking

    Directory of Open Access Journals (Sweden)

    Ying-Shen Juang

    2012-01-01

    Full Text Available This paper proposes a reversible watermarking technique for natural images. According to the similarity of neighbor coefficients’ values in wavelet domain, most differences between two adjacent pixels are close to zero. The histogram is built based on these difference statistics. As more peak points can be used for secret data hiding, the hiding capacity is improved compared with those conventional methods. Moreover, as the differences concentricity around zero is improved, the transparency of the host image can be increased. Experimental results and comparison show that the proposed method has both advantages in hiding capacity and transparency.

  3. Can organic matter hide from decomposers in the labyrinth of soil aggregates? Micro-engineered Soil Chips challenging foraging fungi

    Science.gov (United States)

    Hammer, Edith C.; Aleklett, Kristin; Arellano Caicedo, Carlos G.; Bengtsson, Martin; Micaela Mafla Endara, Paola; Ohlsson, Pelle

    2017-04-01

    From the point of view of microorganisms, the soil environment is an enormously complex labyrinth with paths and dead-end streets, where resources and shelters are unevenly distributed. We study foraging strategies of soil organisms, especially fungi, and the possibility of physio-spatial stabilization of organic matter by "hiding" in occluded soil spaces. We manipulate growth habitat microstructure with lab-on-a-chip techniques, where we designed complex environments with channels and obstacle at dimensions of the size of hyphae, and construct them in the transparent, gas-permeable polymer PDMS. We fill those with different nutrient solutions or combine with mineral nutrient gradients, and inoculate them with soil organisms. We analyze organisms and substrates with microscopy, fluorescence microscopy and analytical chemistry. We compared different soil litter decomposers and an arbuscular mycorrhizal fungus for their ability to forage through complex air-gap structures and attempt to classify them into functional traits concerning their mycelium directionality, space-exploring approach and ability to grow through acute angles and narrow constrictions. We identified structures which are very difficult to penetrate for most species, and compounds located behind such features may thus be spatially unavailable for decomposers. We discuss our approach in comparison to soil pore space tomographic analyses and findings we made in the pore space of colonized wood biochar.

  4. Meta-GWAS Accuracy and Power (MetaGAP Calculator Shows that Hiding Heritability Is Partially Due to Imperfect Genetic Correlations across Studies.

    Directory of Open Access Journals (Sweden)

    Ronald de Vlaming

    2017-01-01

    Full Text Available Large-scale genome-wide association results are typically obtained from a fixed-effects meta-analysis of GWAS summary statistics from multiple studies spanning different regions and/or time periods. This approach averages the estimated effects of genetic variants across studies. In case genetic effects are heterogeneous across studies, the statistical power of a GWAS and the predictive accuracy of polygenic scores are attenuated, contributing to the so-called 'missing heritability'. Here, we describe the online Meta-GWAS Accuracy and Power (MetaGAP calculator (available at www.devlaming.eu which quantifies this attenuation based on a novel multi-study framework. By means of simulation studies, we show that under a wide range of genetic architectures, the statistical power and predictive accuracy provided by this calculator are accurate. We compare the predictions from the MetaGAP calculator with actual results obtained in the GWAS literature. Specifically, we use genomic-relatedness-matrix restricted maximum likelihood to estimate the SNP heritability and cross-study genetic correlation of height, BMI, years of education, and self-rated health in three large samples. These estimates are used as input parameters for the MetaGAP calculator. Results from the calculator suggest that cross-study heterogeneity has led to attenuation of statistical power and predictive accuracy in recent large-scale GWAS efforts on these traits (e.g., for years of education, we estimate a relative loss of 51-62% in the number of genome-wide significant loci and a relative loss in polygenic score R2 of 36-38%. Hence, cross-study heterogeneity contributes to the missing heritability.

  5. Tail position affects the body temperature of rats during cold exposure in a low-energy state.

    Science.gov (United States)

    Uchida, Yuki; Tokizawa, Ken; Nakamura, Mayumi; Lin, Cheng-Hsien; Nagashima, Kei

    2012-02-01

    Rats place their tails underneath their body trunks when cold (tail-hiding behavior). The aim of the present study was to determine whether this behavior is necessary to maintain body temperature. Male Wistar rats were divided into 'fed' and '42-h fasting' groups. A one-piece tail holder (8.4 cm in length) that prevented the tail-hiding behavior or a three-piece tail holder (2.8 cm in length) that allowed for the tail-hiding behavior was attached to the tails of the rats. The rats were exposed to 27°C for 180 min or to 20°C for 90 min followed by 15°C for 90 min with continuous body temperature and oxygen consumption measurements. Body temperature decreased by -1.0 ± 0.1°C at 15°C only in the rats that prevented tail-hiding behavior of the 42-h fasting group, and oxygen consumption increased at 15°C in all animals. Oxygen consumption was not different between the rats that prevented tail-hiding behavior and the rats that allowed the behavior in the fed and 42-h fasting groups under ambient conditions. These results show that the tail-hiding behavior is involved in thermoregulation in the cold in fasting rats.

  6. Show Horse Welfare: Horse Show Competitors' Understanding, Awareness, and Perceptions of Equine Welfare.

    Science.gov (United States)

    Voigt, Melissa A; Hiney, Kristina; Richardson, Jennifer C; Waite, Karen; Borron, Abigail; Brady, Colleen M

    2016-01-01

    The purpose of this study was to gain a better understanding of stock-type horse show competitors' understanding of welfare and level of concern for stock-type show horses' welfare. Data were collected through an online questionnaire that included questions relating to (a) interest and general understanding of horse welfare, (b) welfare concerns of the horse show industry and specifically the stock-type horse show industry, (c) decision-making influences, and (d) level of empathic characteristics. The majority of respondents indicated they agree or strongly agree that physical metrics should be a factor when assessing horse welfare, while fewer agreed that behavioral and mental metrics should be a factor. Respondent empathy levels were moderate to high and were positively correlated with the belief that mental and behavioral metrics should be a factor in assessing horse welfare. Respondents indicated the inhumane practices that most often occur at stock-type shows include excessive jerking on reins, excessive spurring, and induced excessive unnatural movement. Additionally, respondents indicated association rules, hired trainers, and hired riding instructors are the most influential regarding the decisions they make related to their horses' care and treatment.

  7. Biochemical and molecular characterization of a serine keratinase from Brevibacillus brevis US575 with promising keratin-biodegradation and hide-dehairing activities.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    Full Text Available Dehairing is one of the highly polluting operations in the leather industry. The conventional lime-sulfide process used for dehairing produces large amounts of sulfide, which poses serious toxicity and disposal problems. This operation also involves hair destruction, a process that leads to increased chemical oxygen demand (COD, biological oxygen demand (BOD, and total suspended solid (TSS loads in the effluent. With these concerns in mind, enzyme-assisted dehairing has often been proposed as an alternative method. The main enzyme preparations so far used involved keratinases. The present paper reports on the purification of an extracellular keratinase (KERUS newly isolated from Brevibacillus brevis strain US575. Matrix assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF/MS analysis revealed that the purified enzyme was a monomer with a molecular mass of 29121.11 Da. The sequence of the 27 N-terminal residues of KERUS showed high homology with those of Bacillus keratinases. Optimal activity was achieved at pH 8 and 40°C. Its thermoactivity and thermostability were upgraded in the presence of 5 mM Ca(2+. The enzyme was completely inhibited by phenylmethanesulfonyl fluoride (PMSF and diiodopropyl fluorophosphates (DFP, which suggests that it belongs to the serine protease family. KERUS displayed higher levels of hydrolysis, substrate specificity, and catalytic efficiency than NUE 12 MG and KOROPON® MK EG keratinases. The enzyme also exhibited powerful keratinolytic activity that made it able to accomplish the entire feather-biodegradation process on its own. The kerUS gene encoding KERUS was cloned, sequenced, and expressed in Escherichia coli. The biochemical properties of the extracellular purified recombinant enzyme (rKERUS were similar to those of native KERUS. Overall, the findings provide strong support for the potential candidacy of this enzyme as an effective and eco-friendly alternative to the conventional

  8. Environmental enrichment choices of shelter cats.

    Science.gov (United States)

    Ellis, J J; Stryhn, H; Spears, J; Cockram, M S

    2017-08-01

    Choices made by cats between different types of environmental enrichment may help shelters to prioritize how to most effectively enrich cat housing, especially when limited by space or funds. This study investigates the environmental enrichment use of cats in a choice test. Twenty-six shelter cats were kept singularly in choice chambers for 10days. Each chamber had a central area and four centrally-linked compartments containing different types of environmental enrichment: 1) an empty control, 2) a prey-simulating toy, 3) a perching opportunity, and 4) a hiding opportunity. Cat movement between compartments was quantitatively recorded using a data-logger. Enriched compartments were visited significantly more frequently during the light period than during the dark period. Cats spent a significantly greater percentage of time in the hiding compartment (median=55%, IQR=46) than in the toy compartment (median=2%, IQR=9), or in the empty control compartment (median=4%, IQR=4). These results provide additional evidence to support the value of a hiding box to cats housed in a novel environment, in that they choose hiding relative to other types of environmental enrichment. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Can a Bright and Energetic X-Ray Pulsar Be Hiding Amid the Debris of SN 1987A?

    Science.gov (United States)

    Esposito, Paolo; Rea, Nanda; Lazzati, Davide; Matsuura, Mikako; Perna, Rosalba; Pons, José A.

    2018-04-01

    The mass of the stellar precursor of supernova (SN) 1987A and the burst of neutrinos observed at the moment of the explosion are consistent with the core-collapse formation of a neutron star. However, no compelling evidence for the presence of a compact object of any kind in SN 1987A has been found yet in any band of the electromagnetic spectrum, prompting questions on whether the neutron star survived and, if it did, on its properties. Beginning with an analysis of recent Chandra observations, here we appraise the current observational situation. We derived limits on the X-ray luminosity of a compact object with a nonthermal, Crab-pulsar-like spectrum of the order of ≈(1–5) × 1035 erg s‑1, corresponding to limits on the rotational energy loss of a possible X-ray pulsar in SN 1987A of ≈(0.5–1.5) × 1038 erg s‑1. However, a much brighter X-ray source cannot be excluded if, as is likely, it is enshrouded in a cloud of absorbing matter with a metallicity similar to that expected in the outer layers of a massive star toward the end of its life. We found that other limits obtained from various arguments and observations in other energy ranges either are unbinding or allow a similar maximum luminosity of the order of ≈1035 erg s‑1. We conclude that while a pulsar alike the one in the Crab Nebula in both luminosity and spectrum is hardly compatible with the observations, there is ample space for an “ordinary” X-ray-emitting young neutron star, born with normal initial spin period, temperature, and magnetic field, to be hiding inside the evolving remnant of SN 1987A.

  10. Effects of Ultrasound Assisted Extraction in Conjugation with Aid of Actinidin on the Molecular and Physicochemical Properties of Bovine Hide Gelatin

    Directory of Open Access Journals (Sweden)

    Tanbir Ahmad

    2018-03-01

    Full Text Available Actinidin was used to pretreat the bovine hide and ultrasonic wave (53 kHz and 500 W was used for the time durations of 2, 4 and 6 h at 60 °C to extract gelatin samples (UA2, UA4 and UA6, respectively. Control (UAC gelatin was extracted using ultrasound for 6 h at 60 °C without enzyme pretreatment. There was significant (p < 0.05 increase in gelatin yield as the time duration of ultrasound treatment increased with UA6 giving the highest yield of 19.65%. Gel strength and viscosity of UAC and UA6 extracted gelatin samples were 627.53 and 502.16 g and 16.33 and 15.60 mPa.s, respectively. Longer duration of ultrasound treatment increased amino acids content of the extracted gelatin and UAC exhibited the highest content of amino acids. Progressive degradation of polypeptide chains was observed in the protein pattern of the extracted gelatin as the time duration of ultrasound extraction increased. Fourier transform infrared (FTIR spectroscopy depicted loss of molecular order and degradation in UA6. Scanning electron microscopy (SEM revealed protein aggregation and network formation in the gelatin samples with increasing time of ultrasound treatment. The study indicated that ultrasound assisted gelatin extraction using actinidin exhibited high yield with good quality gelatin.

  11. Nitrogen fixation in Red Sea seagrass meadows

    KAUST Repository

    Abdallah, Malak

    2017-01-01

    Seagrasses are key coastal ecosystems, providing many ecosystem services. Seagrasses increase biodiversity as they provide habitat for a large set of organisms. In addition, their structure provides hiding places to avoid predation. Seagrasses can

  12. Dog-appeasing pheromone collars reduce sound-induced fear and anxiety in beagle dogs: a placebo-controlled study.

    Science.gov (United States)

    Landsberg, G M; Beck, A; Lopez, A; Deniaud, M; Araujo, J A; Milgram, N W

    2015-09-12

    The objective of the study was to assess the effects of a dog-appeasing pheromone (DAP) collar in reducing sound-induced fear and anxiety in a laboratory model of thunderstorm simulation. Twenty-four beagle dogs naïve to the current test were divided into two treatment groups (DAP and placebo) balanced on their fear score in response to a thunderstorm recording. Each group was then exposed to two additional thunderstorm simulation tests on consecutive days. Dogs were video-assessed by a trained observer on a 6-point scale for active, passive and global fear and anxiety (combined). Both global and active fear and anxiety scores were significantly improved during and following thunder compared with placebo on both test days. DAP significantly decreased global fear and anxiety across 'during' and 'post' thunder times when compared with baseline. There was no significant improvement in the placebo group from baseline on the test days. In addition, the DAP group showed significantly greater use of the hide box at any time with increased exposure compared with the placebo group. The DAP collar reduced the scores of fear and anxiety, and increased hide use in response to a thunder recording, possibly by counteracting noise-related increased reactivity. British Veterinary Association.

  13. Assessment of exposure to chemical agents and ergonomic stressors in tanneries in Kanpur, India.

    Science.gov (United States)

    Ory, F G; Rahman, F U; Katagade, V; Shukla, A; Burdorf, A

    1997-10-01

    In developing countries qualitative assessment of exposure at the workplace may be an essential tool in evaluating hazardous working conditions. This survey reports on qualitative assessment of exposure to chemicals, dust, and ergonomic stressors among 298 workers in 15 tanneries in Kanpur, India. In general, chemical exposure and dermal exposure were highest among beamhouse workers, less for workers involved in dry finishing activities, and lowest for those performing the wet finishing of hides. Dermal exposure was rated as high to very high during beamhouse activities, reflecting direct contact with wet hides and manual handling of hides in soak tanks. Relevant dust exposure was observed only during dry finishing activities. Most workers experienced severe postural load due to working in trunk flexion and rotation for more than 50% of their daily work time. In addition, manual materials handling with loads over 20 kg frequently occurred. The size of the tannery, in general a reflection of state of technology, showed no systematic influence on exposure profiles. The survey suggested that mechanization of material transfer and application of trolleys reduced the work time with trunk flexion and rotation and implied less manual lifting. The presence of local exhaust ventilation in large tanneries seemed to reduce the chemical exposure. This survey has demonstrated the importance of rapid appraisal techniques for evaluating hazardous conditions at the workplace. In developing countries this approach may facilitate occupational hygiene research and practice.

  14. I saw where you have been--The topography of human demonstration affects dogs' search patterns and perseverative errors.

    Science.gov (United States)

    Péter, András; Topál, József; Miklósi, Ádám; Pongrácz, Péter

    2016-04-01

    Performance in object search tasks is not only influenced by the subjects' object permanence ability. For example, ostensive cues of the human manipulating the target markedly affect dogs' choices. However, the interference between the target's location and the spatial cues of the human hiding the object is still unknown. In a five-location visible displacement task, the experimental groups differed in the hiding route of the experimenter. In the 'direct' condition he moved straight towards the actual location, hid the object and returned to the dog. In the 'indirect' conditions, he additionally walked behind each screen before returning. The two 'indirect' conditions differed from each other in that the human either visited the previously baited locations before (proactive interference) or after (retroactive interference) hiding the object. In the 'indirect' groups, dogs' performance was significantly lower than in the 'direct' group, demonstrating that for dogs, in an ostensive context, spatial cues of the hider are as important as the observed location of the target. Based on their incorrect choices, dogs were most attracted to the previously baited locations that the human visited after hiding the object in the actual trial. This underlines the importance of retroactive interference in multiple choice tasks. Copyright © 2016 Elsevier B.V. All rights reserved.

  15. Feed addition of curcumin to laying hens showed anticoccidial effect, and improved egg quality and animal health.

    Science.gov (United States)

    Galli, Gabriela M; Da Silva, Aleksandro S; Biazus, Angelisa H; Reis, João H; Boiago, Marcel M; Topazio, Josué P; Migliorini, Marcos J; Guarda, Naiara S; Moresco, Rafael N; Ourique, Aline F; Santos, Cayane G; Lopes, Leandro S; Baldissera, Matheus D; Stefani, Lenita M

    2018-01-31

    The aim of this study was to evaluate whether the addition of curcumin in the diet of commercial laying hens could have an anticoccidial action and improve egg quality. For this, 60 laying hens were divided into three groups: T0 (the control group); T30 and T50 (30 and 50 mg/kg of curcumin in the feed, respectively). Eggs recently laid were collected on days 14 and 21 of the experiment, and stored for 21 days. It was observed increased specific gravity and yolk index in stored eggs of the groups T30 and T50 compared to T0. The yolk color reduced in the eggs stored from groups T30 and T50 compared to T0. Moreover, TBARS levels were lower in fresh and stored eggs from groups T30 and T50. It was observed increased TAC levels in fresh eggs from groups T30 and T50 and in stored eggs from the group T50. The presence of curcumin was not detected by HPLC in the yolk and albumen. Seric levels of albumin and uric acid did not differ between groups, while seric levels of total proteins increased on day 21 on groups T30 and T50. Finally, it was observed a significant reduction on the number of oocysts in fecal samples on days 14 and 21 of T30 and T50 compared to T0. Based on these evidences, it is possible to conclude that the addition of curcumin in the diet of laying hens has an anticoccidial effect and improves egg quality. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. Improvement of uptake of chrome tan on hide protein by basic oxides

    International Nuclear Information System (INIS)

    Nashya, E.H.A.; Aggiagh, A.E.; Khedra, M.H.; El-Sayeda, N.H.E.

    2005-01-01

    Three basic oxides were used to improve uptake of chrome tan as well as shrinkage temperature of the tanned leather. In addition, the skin quality is one of the most important factors taking into consideration. Three basic oxides, named magnesium oxide, manganese oxide and sodium bicarbonate. The process was optimized taking into the account the shaking rate, chrome concentration (%), initial ph, basic oxides concentration, temperature and contact time. The optimum conditions for exhaustion, fixation, shrinkage temperature as well as skin quality showed that agitation rate of 150 rpm, chrome concentration of 16%, initial ph of 2.5, basic oxide concentration of 4% magnesium oxide, temperature of 35 degree C and contact time of 24 hr. The best results obtained are 88% exhaustion, 90.03% fixation and 109 degree C shrinkage temperature in aqueous medium

  17. Determinants of Leather and Leather products Exports in Tanzania

    Directory of Open Access Journals (Sweden)

    Francis Lwesya

    2018-03-01

    Full Text Available This study examines the determinants of Leather and Leather products Exports in Tanzania. We apply Ordinary Least Square (OLS analysis on time series data from 1980 to 2015. The findings show that export of raw hides and skins, and high costs of production are among the deterring factors to leather and leather products export in Tanzania. Export of raw hides and skins and costs of production recorded negative and significant relationship with leather exports. On the other hand, hides and skins collection recorded insignificant relationship while leather price in the world market had negative and significant relationship with leather exports. This suggests that other factors such as low quality of leather and leather products exported, inadequate capital investment, stiff competition with foreign companies for hides and skins and inadequate market information explain the state of current Tanzania’s leather exports. Thus, attracting local and Foreign Direct Investment (FDI in the leather subsector by providing friendly investment climate and addressing the supply side constraints will enable increased high quality leather and leather products diversification and exports

  18. The effects of titanium dioxide coatings on light-derived heating and transdermal heat transfer in bovine skin

    Science.gov (United States)

    Bartle, S. J.; Thomson, D. U.; Gehring, R.; van der Merwe, D.

    2017-11-01

    The effects of titanium dioxide coatings of bovine hides on light absorption and transdermal transfer of light-derived heat were investigated. Four hair-on rug hides from Holstein cattle were purchased. Twelve samples about 20 cm on a side were cut from each hide; nine from the black-colored areas, and three from the white areas. Samples were randomized and assigned to four coating treatments: (1) white hide with no coating (White), (2) black hide with no coating (Black), (3) black hide with 50% coating (Mid), and (4) black hide with 100% coating (High). Coatings were applied to the black hide samples using a hand sprayer. Lux measurements were taken using a modified lux meter at three light intensities generated with a broad spectrum, cold halogen light source. Reflectance over a wavelength range of 380 to 900 nm was measured using a spectroradiometer. The transdermal transfer of heat derived from absorbed light was measured by applying a broad spectrum, cold halogen light source to the stratum corneum (coated) side of the sample and recording the temperature of the dermis-side using a thermal camera for 10 min at 30-s intervals. At the high light level, the White, Black, Mid, and High coating treatments had different ( P 400 to 750 nm), Black hides reflected 10 to 15% of the light energy, hides with the Mid coating treatment reflected 35 to 40%, and hides with the High coating treatment reflected 70 to 80% of the light energy. The natural White hide samples reflected 60 to 80% of the light energy. The average maximum temperatures at the dermis-side of the hides due to transferred heat were 34.5, 70.1, 55.0, and 31.7, for the White, Black, Mid, and High treatments, respectively. Reflective coatings containing titanium dioxide on cattle hides were effective in reducing light energy absorption and reduced light-derived heat transfer from the skin surface to deeper skin layers.

  19. Metabolic modeling of energy balances in Mycoplasma hyopneumoniae shows that pyruvate addition increases growth rate.

    Science.gov (United States)

    Kamminga, Tjerko; Slagman, Simen-Jan; Bijlsma, Jetta J E; Martins Dos Santos, Vitor A P; Suarez-Diez, Maria; Schaap, Peter J

    2017-10-01

    Mycoplasma hyopneumoniae is cultured on large-scale to produce antigen for inactivated whole-cell vaccines against respiratory disease in pigs. However, the fastidious nutrient requirements of this minimal bacterium and the low growth rate make it challenging to reach sufficient biomass yield for antigen production. In this study, we sequenced the genome of M. hyopneumoniae strain 11 and constructed a high quality constraint-based genome-scale metabolic model of 284 chemical reactions and 298 metabolites. We validated the model with time-series data of duplicate fermentation cultures to aim for an integrated model describing the dynamic profiles measured in fermentations. The model predicted that 84% of cellular energy in a standard M. hyopneumoniae cultivation was used for non-growth associated maintenance and only 16% of cellular energy was used for growth and growth associated maintenance. Following a cycle of model-driven experimentation in dedicated fermentation experiments, we were able to increase the fraction of cellular energy used for growth through pyruvate addition to the medium. This increase in turn led to an increase in growth rate and a 2.3 times increase in the total biomass concentration reached after 3-4 days of fermentation, enhancing the productivity of the overall process. The model presented provides a solid basis to understand and further improve M. hyopneumoniae fermentation processes. Biotechnol. Bioeng. 2017;114: 2339-2347. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  20. Decorin Content and Near Infrared Spectroscopy Analysis of Dried Collagenous Biomaterial Samples

    Directory of Open Access Journals (Sweden)

    Suzanne Schreyer

    2012-12-01

    Full Text Available The efficient removal of proteoglycans, such as decorin, from the hide when processing it to leather by traditional means is generally acceptable and beneficial for leather quality, especially for softness and flexibility. A patented waterless or acetone dehydration method that can generate a product similar to leather called Dried Collagenous Biomaterial (known as BCD was developed but has no effect on decorin removal efficiency. The Alcian Blue colorimetric technique was used to assay the sulfated glycosaminoglycan (sGAG portion of decorin. The corresponding residual decorin content was correlated to the mechanical properties of the BCD samples and was comparable to the control leather made traditionally. The waterless dehydration and instantaneous chrome tanning process is a good eco-friendly alternative to transforming hides to leather because no additional effects were observed after examination using NIR spectroscopy and additional chemometric analysis.

  1. Decorin content and near infrared spectroscopy analysis of dried collagenous biomaterial samples.

    Science.gov (United States)

    Aldema-Ramos, Mila L; Castell, Joan Carles; Muir, Zerlina E; Adzet, Jose Maria; Sabe, Rosa; Schreyer, Suzanne

    2012-12-14

    The efficient removal of proteoglycans, such as decorin, from the hide when processing it to leather by traditional means is generally acceptable and beneficial for leather quality, especially for softness and flexibility. A patented waterless or acetone dehydration method that can generate a product similar to leather called Dried Collagenous Biomaterial (known as BCD) was developed but has no effect on decorin removal efficiency. The Alcian Blue colorimetric technique was used to assay the sulfated glycosaminoglycan (sGAG) portion of decorin. The corresponding residual decorin content was correlated to the mechanical properties of the BCD samples and was comparable to the control leather made traditionally. The waterless dehydration and instantaneous chrome tanning process is a good eco-friendly alternative to transforming hides to leather because no additional effects were observed after examination using NIR spectroscopy and additional chemometric analysis.

  2. Decorin Content and Near Infrared Spectroscopy Analysis of Dried Collagenous Biomaterial Samples

    Science.gov (United States)

    Aldema-Ramos, Mila L.; Castell, Joan Carles; Muir, Zerlina E.; Adzet, Jose Maria; Sabe, Rosa; Schreyer, Suzanne

    2012-01-01

    The efficient removal of proteoglycans, such as decorin, from the hide when processing it to leather by traditional means is generally acceptable and beneficial for leather quality, especially for softness and flexibility. A patented waterless or acetone dehydration method that can generate a product similar to leather called Dried Collagenous Biomaterial (known as BCD) was developed but has no effect on decorin removal efficiency. The Alcian Blue colorimetric technique was used to assay the sulfated glycosaminoglycan (sGAG) portion of decorin. The corresponding residual decorin content was correlated to the mechanical properties of the BCD samples and was comparable to the control leather made traditionally. The waterless dehydration and instantaneous chrome tanning process is a good eco-friendly alternative to transforming hides to leather because no additional effects were observed after examination using NIR spectroscopy and additional chemometric analysis. PMID:24970152

  3. Attacking Time

    Science.gov (United States)

    2015-06-01

    13 published papers , and 8 technical reports. All of these publications are available through password-protected access at: http...additional Ph.D. thesis on hardware hiding has been completed, together with an additional paper ; thesis preparation is in progress. In addition, this...employing microcontrollers and other real-time processors. These devices typically lack memory management and make little to no use of cache. • Dynamic

  4. Photokopolimerisasi monomer akrilat degan kulit kras sapi

    Directory of Open Access Journals (Sweden)

    Dwi Wahini Nurhajati

    1997-06-01

    Full Text Available The research on photocopolymerization of acrylate monomer with cow crust hide had object to observe the resulted copolymer onto cow crust hide. Crust hides, saturated with aqueous emulsions containing 25 wt % of n-butyl acrylate (n-BA or tripropylene glycol diacrylate (TPGDA were irradiated by cobalt – 60 gamma rays with doses ranges from 5 to 25 kGy. The irradiated hides were washed with water, dried in air and extracted in soxhlet apparatus for 48 hours to remove homopolymer. The highest yield of photocopolymerization of n – butyl acrylate monomer with crust hides was found 17,7878% at dose 25 kGy, and for photocopolymerization of tripropylene glycol diacrylate with crust hides was found 39,4245% at dose 20 kGy.

  5. Switching theory-based steganographic system for JPEG images

    Science.gov (United States)

    Cherukuri, Ravindranath C.; Agaian, Sos S.

    2007-04-01

    Cellular communications constitute a significant portion of the global telecommunications market. Therefore, the need for secured communication over a mobile platform has increased exponentially. Steganography is an art of hiding critical data into an innocuous signal, which provide answers to the above needs. The JPEG is one of commonly used format for storing and transmitting images on the web. In addition, the pictures captured using mobile cameras are in mostly in JPEG format. In this article, we introduce a switching theory based steganographic system for JPEG images which is applicable for mobile and computer platforms. The proposed algorithm uses the fact that energy distribution among the quantized AC coefficients varies from block to block and coefficient to coefficient. Existing approaches are effective with a part of these coefficients but when employed over all the coefficients they show there ineffectiveness. Therefore, we propose an approach that works each set of AC coefficients with different frame work thus enhancing the performance of the approach. The proposed system offers a high capacity and embedding efficiency simultaneously withstanding to simple statistical attacks. In addition, the embedded information could be retrieved without prior knowledge of the cover image. Based on simulation results, the proposed method demonstrates an improved embedding capacity over existing algorithms while maintaining a high embedding efficiency and preserving the statistics of the JPEG image after hiding information.

  6. Additive conjoint measurement for multiattribute utility

    NARCIS (Netherlands)

    Maas, A.; Wakker, P.P.

    1994-01-01

    This paper shows that multiattribute utility can be simplified by methods from additive conjoint measurement. Given additive conjoint measurability under certainty, axiomatizations can be simplified, and implementation and reliability of elicitation can be improved. This also contributes to the

  7. Rapid Determination of Amino Acids in Beer, Red Wine, and Donkey-Hide Gelatin by Gradient Elution of HPLC: From Micellar Liquid Chromatography to High Submicellar Liquid Chromatography.

    Science.gov (United States)

    Xie, Yunfei; Luo, Tian; Yang, Jing; Dong, Yuming

    2018-01-01

    Amino acids (AAs) in beer, red wine, and donkey-hide gelatin were rapidly determined by gradient LC elution from micellar LC to high submicellar LC. Mobile phase A was a 0.075 M sodium dodecyl sulfate solution containing 20 mM ammonium acetate with a pH value adjusted to 3.5 with acetic acid solution, and mobile phase B was acetonitrile. Optimized chromatographic conditions were as follows: mobile phase B increased from 25 to 60% (v/v) in 30 min and the use of a Venusil XBP C18 column (5 µm, 250 × 4.6 mm) as the stationary phase, with a column temperature of 35°C, flow rate of 1.2 mL/min, and detection wavelength of 266 nm. The results indicated good linearity (r2 ≥ 0.9924). The intraday precision of the retention time was RSD ≤ 1.1%, whereas interday was RSD ≤ 3.2%; intraday precision of the peak area was RSD ≤ 3.3%, whereas interday was RSD ≤ 4.9%. The range of recovery was 94.6-102.4%. The RSDs of the retention time for the AAs for the different samples were 0.04-0.31%.

  8. Dirty Secrets: How Tax Havens Destroy the Economy

    OpenAIRE

    Murphy, R.

    2017-01-01

    What happens when the rich are allowed to hide their money in tax havens, and what we should do about it\\ud The Panama Papers were a reminder of how the superrich are allowed to hide their wealth from the rest of us. Dirty Secrets uncovers the extent of the corruption behind this crisis and shows what needs to be done in the face of this unregulated spread of rampant greed.\\ud \\ud Tax havens, we are often told, are part of the global architecture of capitalism, providing a freedom from regula...

  9. Jauch-Piron States and σ-Additivity

    Science.gov (United States)

    Bunce, L. J.; Hamhalter, Jan

    We study σ-additivity of the physically plausible Jauch-Piron states on a von Neumann algebra M. Amongst other consequences we extend our earlier results [5] by showing that geometric conditions much weaker than pureness imply σ-additivity for a Jauch-Piron state and, further, that if M is properly infinite and the continuum hypothesis is assumed to be true then all Jauch-Piron factor states are σ-additive.

  10. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity

    NARCIS (Netherlands)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-01-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity

  11. Versatility of cooperative transcriptional activation: a thermodynamical modeling analysis for greater-than-additive and less-than-additive effects.

    Directory of Open Access Journals (Sweden)

    Till D Frank

    Full Text Available We derive a statistical model of transcriptional activation using equilibrium thermodynamics of chemical reactions. We examine to what extent this statistical model predicts synergy effects of cooperative activation of gene expression. We determine parameter domains in which greater-than-additive and less-than-additive effects are predicted for cooperative regulation by two activators. We show that the statistical approach can be used to identify different causes of synergistic greater-than-additive effects: nonlinearities of the thermostatistical transcriptional machinery and three-body interactions between RNA polymerase and two activators. In particular, our model-based analysis suggests that at low transcription factor concentrations cooperative activation cannot yield synergistic greater-than-additive effects, i.e., DNA transcription can only exhibit less-than-additive effects. Accordingly, transcriptional activity turns from synergistic greater-than-additive responses at relatively high transcription factor concentrations into less-than-additive responses at relatively low concentrations. In addition, two types of re-entrant phenomena are predicted. First, our analysis predicts that under particular circumstances transcriptional activity will feature a sequence of less-than-additive, greater-than-additive, and eventually less-than-additive effects when for fixed activator concentrations the regulatory impact of activators on the binding of RNA polymerase to the promoter increases from weak, to moderate, to strong. Second, for appropriate promoter conditions when activator concentrations are increased then the aforementioned re-entrant sequence of less-than-additive, greater-than-additive, and less-than-additive effects is predicted as well. Finally, our model-based analysis suggests that even for weak activators that individually induce only negligible increases in promoter activity, promoter activity can exhibit greater-than-additive

  12. School Phobia

    Science.gov (United States)

    Tyrrell, Maureen

    2005-01-01

    School phobia is a serious disorder affecting up to 5% of elementary and middle school children. Long-term consequences include academic failure, diminished peer relationships, parental conflict, and development of additional psychiatric disorders. Hiding behind such common physical symptoms as headaches, stomachaches, and fatigue, school phobia…

  13. Shell colour, temperature, (micro)habitat structure and predator pressure affect the behaviour of Cepaea nemoralis

    Science.gov (United States)

    Rosin, Zuzanna M.; Kwieciński, Zbigniew; Lesicki, Andrzej; Skórka, Piotr; Kobak, Jarosław; Szymańska, Anna; Osiejuk, Tomasz S.; Kałuski, Tomasz; Jaskulska, Monika; Tryjanowski, Piotr

    2018-06-01

    Although shell colour polymorphism of the land snail Cepaea nemoralis is a well-known phenomenon, proximate and ultimate factors driving its evolution remain uncertain. Polymorphic species show variation in behavioural responses to selective forces. Therefore, we estimated effects of various environmental factors (temperature, humidity, food availability, (micro)habitat structure and predatory pressure) on behavioural response (frequency of locomotion, climbing and hiding) of C. nemoralis morphs, in experimental and natural conditions. In the experimental part of study, the frequency of locomotion was negatively affected by temperature and the presence of food and positively influenced by the presence of light. Morphs significantly differed in behavioural responses to environmental variability. Pink mid-banded and yellow five-banded morphs climbed less often and hide in shelter more often than yellow and pink unbanded individuals when temperature was low and food was absent. Snails fed most often at moderate temperature compared to low and high temperatures. Field investigations partially confirmed differences among morphs in frequency of climbing, but not in terms of probability of hiding in sheltered sites. In natural colonies, temperature and (micro)habitat structure significantly affected frequency of climbing as well as hiding in shelter. Snails more often hid in sheltered sites where thrushes preyed on Cepaea. Tendency of unbanded morphs to climb trees may have evolved under avian predatory pressure as thrushes forage on a ground. Tendency of banded morphs to hide in sheltered sites may reflect prey preferences for cryptic background. The results implicate that differential behaviour of C. nemoralis morphs compensate for their morphological and physiological limitations of adaptation to habitat.

  14. Food additives: an ethical evaluation.

    Science.gov (United States)

    Mepham, Ben

    2011-01-01

    Food additives are an integral part of the modern food system, but opinion polls showing most Europeans have worries about them imply an urgent need for ethical analysis of their use. The existing literature on food ethics, safety assessment and animal testing. Food additives provide certain advantages in terms of many people's lifestyles. There are disagreements about the appropriate application of the precautionary principle and of the value and ethical validity of animal tests in assessing human safety. Most consumers have a poor understanding of the relative benefits and risks of additives, but concerns over food safety and animal testing remain high. Examining the impacts of food additives on consumer sovereignty, consumer health and on animals used in safety testing should allow a more informed debate about their appropriate uses.

  15. Incentive Contract in Supply Chain with Asymmetric Information

    Directory of Open Access Journals (Sweden)

    Yingsheng Su

    2014-01-01

    Full Text Available The supply chain always appears inefficient because of the different targets of members and information asymmetry, especially when upstream enterprises not only hide information about their effort levels, but also hide information about their technology level. The paper uses principal-agent theory and the theory of regulation to design the contract to realize the maximization of principal's profit on the condition that the contract satisfies the participant and incentive conditions of agent. As a result, it is obvious that the contract achieves the goal of control. In addition, it also can be concluded that the amount of rent that the manufacturer can obtain is up to the value of his information and the condition of his resource.

  16. Showing Value (Editorial

    Directory of Open Access Journals (Sweden)

    Denise Koufogiannakis

    2009-06-01

    librarians on student achievement. Todd notes, “If we do not show value, we will not have a future. Evidence-based practice is not about the survival of school librarians, it’s about the survival of our students” (40. In this issue we feature school libraries and their connection to evidence based practice. Former Editor-in-Chief, Lindsay Glynn, began putting the wheels in motion for this feature almost a year ago. She invited Carol Gordon and Ross Todd to act as guest editors of the section, drawing upon their contacts and previous work in this field. The result is an issue with five feature articles exploring different aspects of the connection between school libraries and evidence based practice, from the theoretical to the practical. In addition, there is a thought-provoking Commentary by David Loertscher, asking whether we need the evolutionary model of evidence based practice, or something more revolutionary!In addition to the Feature section, we have a well-rounded issue with articles on the topics of library human resources, and the development of a scholars’ portal. As well, there are a record 10 evidence summaries and our educational EBL101 column. I hope there is something for everyone in this issue of EBLIP – enjoy, and see you soon in Stockholm!

  17. Alpha-conotoxin analogs with additional positive charge show increased selectivity towards Torpedo californica and some neuronal subtypes of nicotinic acetylcholine receptors

    NARCIS (Netherlands)

    Kasheverov, I.E.; Zhmak, M.N.; Vulfius, C.A.; Corbacheva, E.V.; Mordvintsev, D.Y.; Utkin, Y.N.; van Elk, R.; Smit, A.B.; Tsetlin, V.I.

    2006-01-01

    α-Conotoxins from Conus snails are indispensable tools for distinguishing various subtypes of nicotinic acetylcholine receptors (nAChRs), and synthesis of α-conotoxin analogs may yield novel antagonists of higher potency and selectivity. We incorporated additional positive charges into α-conotoxins

  18. An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution

    Science.gov (United States)

    Chadha, Ankit; Satam, Neha; Sood, Rakshak; Bade, Dattatray

    2013-09-01

    In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) both are used. All the results displayed prove to be time-efficient and effective. Also the algorithm is tested for various numbers of bits. For those values of bits, Mean Square Error (MSE) and Peak-Signal-to-Noise-Ratio (PSNR) are calculated and plotted. Experimental results show that the stego-image is visually indistinguishable from the original cover-image when nsteganography process does not reveal presence of any hidden message, thus qualifying the criteria of imperceptible message.

  19. 21 CFR 573.200 - Condensed animal protein hydrolysate.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 6 2010-04-01 2010-04-01 false Condensed animal protein hydrolysate. 573.200... ANIMALS Food Additive Listing § 573.200 Condensed animal protein hydrolysate. (a) Identity. The condensed animal protein hydrolysate is produced from the meat byproducts scraped from cured (salted) hides taken...

  20. The impact of multiple show-ups on eyewitness decision-making and innocence risk.

    Science.gov (United States)

    Smith, Andrew M; Bertrand, Michelle; Lindsay, R C L; Kalmet, Natalie; Grossman, Deborah; Provenzano, Daniel

    2014-09-01

    If an eyewitness rejects a show-up, police may respond by finding a new suspect and conducting a second show-up with the same eyewitness. Police may continue finding suspects and conducting show-ups until the eyewitness makes an identification (Study 1). Relatively low criterion-setting eyewitnesses filter themselves out of the multiple show-ups procedure by choosing the first suspect with whom they are presented (Studies 2 and 3). Accordingly, response bias was more stringent on the second show-up when compared with the first, but became no more stringent with additional show-ups. Despite this stringent shift in response bias, innocence risk increased with additional show-ups, as false alarms cumulate (Studies 2 and 3). Although unbiased show-up instructions decreased innocent suspect identifications, the numbers were still discouraging (Study 4). Given the high number of innocent suspects who would be mistakenly identified through the use of multiple show-up procedures, using such identifications as evidence of guilt is questionable. Although evidence of guilt is limited to identifications from a single show-up, practical constraints might sometimes require police to use additional show-ups. Accordingly, we propose a stronger partition between evidentiary and investigative procedures. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  1. Restricted evaluation of Trichodectes canis (Phthiraptera: Trichodectidae detection methods in Alaska gray wolves

    Directory of Open Access Journals (Sweden)

    Theresa M. Woldstad

    2014-12-01

    Full Text Available Trichodectes canis (Phthiraptera: Trichodectidae was first documented on Alaska (USA gray wolves (Canis lupus on the Kenai Peninsula in 1981. In subsequent years, numerous wolves exhibited visually apparent, moderate to severe infestations. Currently, the Alaska Department of Fish and Game utilizes visual inspection, histopathology, and potassium hydroxide (KOH hide digestion for T. canis detection. Our objective was to determine optimal sampling locations for T. canis detection. Wolf hides were subjected to lice enumeration using KOH hide digestion. Thirty nine of the 120 wolves examined had lice. Of these 39, total louse burdens ranged from 14 to an extrapolated 80,000. The hides of 12 infested animals were divided into 10 cm by 10 cm subsections and the lice enumerated on a subsection from each of four regions: neck; shoulder; groin; and rump. Combining the data from these 12 wolves, the highest mean proportions of the total louse burdens on individual wolves were found on the rump and differed significantly from the lowest mean proportion on the neck. However, examination of the four subsections failed to detect all infested wolves. Hides from 16 of the 39 infested animals were cut into left and right sides, and each side then cut into four, approximately equal sections: neck and shoulder; chest; abdomen; and rump. Half hides were totally digested from 11 wolves, and whole hides from 5. For these 21 half hides, the highest mean proportions of total louse burdens were found on the rump, and this section had the highest sensitivity for louse detection, regardless of burden. However, removal of this large section from a hide would likely be opposed by hunters and trappers.

  2. Using of Hyperbranched Poly(amidoamine as Pretanning Agent for Leather

    Directory of Open Access Journals (Sweden)

    Amal Amin Ibrahim

    2013-01-01

    Full Text Available Although chrome is considered as the major tanning agent in the production of all types of hides and leather worldwide, it represents a serious source of environmental pollution. Therefore, polyamidoamine hyperbranched polymer (HPAM was involved in pretanning of the depickled hides to enhance the chromium uptake during the tanning process. The key parameters which affect the exhaustion and fixation of chrome tan including shrinkage temperature of the tanned leather were studied. The results showed a significant improvement in the chrome exhaustion, the shrinkage temperature, and the texture and softness of the leather treated by HPAM.

  3. Drag reduction by natural polymeric additives in PMDS microchannel: Effect of types of additives

    Directory of Open Access Journals (Sweden)

    Ling Fiona W.M.

    2017-01-01

    Full Text Available Drag reduction technology was used in medical applications to enhance the blood flow in semiclogged blood streams which can be an alternative treatment for atherosclerosis. In this present study, natural polymeric drag reducing additives (DRA was introduced to replace synthetic polymer which has the possibility of bringing side effects to human health. Three different sources, namely okra, aloe vera and hibiscus were utilized to extract the natural polymeric additives which were then tested in custom made microchannel simulating human heart blood vessels. The performance of different types of additives was evaluated using pressure measurements. The maximum drag reduction up to 63.48% is achieved using 300 ppm of hibiscus mucilage at operating pressure of 50 mbar. In this present work, hibiscus showed the best drag reduction performance, giving the highest %FI in most of the cases. This experimental results proved that these natural polymeric additives could be utilized as DRA in enhancing the blood flow in semiclogged blood streams.

  4. The effects of titanium dioxide coatings on light-derived heating and transdermal heat transfer in bovine skin

    NARCIS (Netherlands)

    Bartle, S J; Thomson, D U; Gehring, R; van der Merwe, B. D.

    2017-01-01

    The effects of titanium dioxide coatings of bovine hides on light absorption and transdermal transfer of light-derived heat were investigated. Four hair-on rug hides from Holstein cattle were purchased. Twelve samples about 20 cm on a side were cut from each hide; nine from the black-colored areas,

  5. Characterization of Thermo- and Detergent Stable Antigenic Glycosylated Cysteine Protease of Euphorbia nivulia Buch.-Ham. and Evaluation of Its Ecofriendly Applications

    Directory of Open Access Journals (Sweden)

    Shamkant B. Badgujar

    2013-01-01

    Full Text Available An antigenic glycosylated cysteine protease has been purified from the latex of Euphorbia nivulia Buch.-Ham. It exhibits remarkable protease activity in the presence of metal ions, oxidizing agents, organic solvents, and detergents. This enzyme showed potential role in leather processing industry due to its dehairing activity for animal hide without hydrolyzing fibrous proteins, producing, by this way, a better quality product. The enzyme can also be used for silver recovering from X-ray plates. In addition, the stability (temperature and surfactants and hydrolysis of blood stain data also revealed its application in detergent industries. Agriculturally, this protease finds application in biocontrol process against the infectious management of root knot nematode, Meloidogyne incognita. Biologically, it shows noticeable wound healing, haemostatic and antibacterial activity.

  6. Nothing to Hide

    DEFF Research Database (Denmark)

    Raun, Tobias; Keegan, Cael

    2018-01-01

    of sexualized consumption. We argue that in order to understand the gendered and sexual complexities of this image, it is necessary to contextualize it within Dowling’s comprehensive selfie-practice on YouTube and Instagram. Although this image is not a selfie per se, it is almost impossible to separate from...

  7. Image security based on iterative random phase encoding in expanded fractional Fourier transform domains

    Science.gov (United States)

    Liu, Zhengjun; Chen, Hang; Blondel, Walter; Shen, Zhenmin; Liu, Shutian

    2018-06-01

    A novel image encryption method is proposed by using the expanded fractional Fourier transform, which is implemented with a pair of lenses. Here the centers of two lenses are separated at the cross section of axis in optical system. The encryption system is addressed with Fresnel diffraction and phase modulation for the calculation of information transmission. The iterative process with the transform unit is utilized for hiding secret image. The structure parameters of a battery of lenses can be used for additional keys. The performance of encryption method is analyzed theoretically and digitally. The results show that the security of this algorithm is enhanced markedly by the added keys.

  8. The How and Why of Interactive Markov Chains

    NARCIS (Netherlands)

    Hermanns, H.; Katoen, Joost P.; de Boer, F.S; Bonsangue, S.H.; Leuschel, M

    2010-01-01

    This paper reviews the model of interactive Markov chains (IMCs, for short), an extension of labelled transition systems with exponentially delayed transitions. We show that IMCs are closed under parallel composition and hiding, and show how IMCs can be compositionally aggregated prior to analysis

  9. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Fadhil Mahmood

    2013-04-01

    Full Text Available     Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.        In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.      This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secures data transmission applications

  10. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Mahmood

    2014-04-01

    Full Text Available Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.  In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.  This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secure data transmission applications

  11. Latex peptidases of Calotropis procera for dehairing of leather as an alternative to environmentally toxic sodium sulfide treatment.

    Science.gov (United States)

    Lopéz, Laura M I; Viana, Carolina A; Errasti, María E; Garro, María L; Martegani, José E; Mazzilli, Germán A; Freitas, Cléverson D T; Araújo, Ídila M S; da Silva, Rafaela O; Ramos, Márcio V

    2017-09-01

    Dehairing of crude leather is a critical stage performed at the beginning of its processing to obtain industrially useful pieces. Tanneries traditionally apply a chemical process based on sodium sulfide. Since this chemical reactive is environmentally toxic and inefficiently recycled, innovative protocols for reducing or eliminating its use in leather depilation are welcomed. Therefore, latex peptidases from Calotropis procera (CpLP) and Cryptostegia grandiflora (CgLP) were assayed for this purpose. Enzyme activity on substrates representative of skin such as hide powder azure (U HPA ), elastin (U E ), azocollagen (U AZOCOL ), keratin (U K ), and epidermis (U EP ) was determined, while depilation activity was assayed on cow hide. Only CpLP was active against keratin (13.4 U K ) and only CgLP was active against elastin (0.12 U E ). CpLP (93.0 U HPA , 403.6 U AZOCOL , 36.3 U EP ) showed higher activity against the other substrates than CgLP (47.6 U HPA , 261.5 U AZOCOL , 8.5 U EP ). In pilot assays, CpLP (0.05% w/v with sodium sulfite 0.6% w/v as activator) released hairs from cow hide pieces. Macroscopic and microscopic analyses of the hide revealed that the dehairing process was complete and the leather structure was preserved. The proteolytic system of C. procera is a suitable bioresources to be exploited by tanneries.

  12. Совмещённая процедура сборки матрицы жёсткости при решении упругопластической задачи на кластерной системе

    OpenAIRE

    Толмачев, А. В.; Халевицкий, Ю. В.; Коновалов, А. В.

    2014-01-01

    Finiteelementmethodiswidelyusedinmetalformingprocessessimulation. Parallel implementation of this method on computer cluster raises anissue of parallel stiffness matrix assembly. This paper describes a novel approach to data transmission handling during assembly steps.Advanced techniquessuch ascomputation and communication interleaving and implicit synchronization are used. Authors introduce additional bufferization to hide MPI latency and reduce memory usage.

  13. Basophil activation test with food additives in chronic urticaria patients.

    Science.gov (United States)

    Kang, Min-Gyu; Song, Woo-Jung; Park, Han-Ki; Lim, Kyung-Hwan; Kim, Su-Jung; Lee, Suh-Young; Kim, Sae-Hoon; Cho, Sang-Heon; Min, Kyung-Up; Chang, Yoon-Seok

    2014-01-01

    The role of food additives in chronic urticaria (CU) is still under investigation. In this study, we aimed to explore the association between food additives and CU by using the basophil activation test (BAT). The BAT using 15 common food additives was performed for 15 patients with CU who had a history of recurrent urticarial aggravation following intake of various foods without a definite food-specific IgE. Of the 15 patients studied, two (13.3%) showed positive BAT results for one of the tested food additives. One patient responded to monosodium glutamate, showing 18.7% of CD203c-positive basophils. Another patient showed a positive BAT result to sodium benzoate. Both patients had clinical correlations with the agents, which were partly determined by elimination diets. The present study suggested that at least a small proportion of patients with CU had symptoms associated with food additives. The results may suggest the potential utility of the BAT to identity the role of food additives in CU.

  14. Ultrashort soliton switching based on coherent energy hiding.

    Science.gov (United States)

    Romagnoli, M; Wabnitz, S; Zoccolotti, L

    1991-08-15

    Coherent coupling between light and atoms may be exploited for conceiving a novel class of all-optical signalprocessing devices without a direct counterpart in the continuous-wave regime. We show that the self-switching of ultrashort soliton pulses on resonance with a transition of doping centers in a slab waveguide directional coupler is based on nonlinear group-velocity (instead of the usual phase-velocity) changes.

  15. Hiding neutrino mass in modified gravity cosmologies

    Energy Technology Data Exchange (ETDEWEB)

    Bellomo, Nicola; Bellini, Emilio; Hu, Bin; Jimenez, Raul; Verde, Licia [ICC, University of Barcelona (UB-IEEC), Marti i Franques 1, 08028, Barcelona (Spain); Pena-Garay, Carlos, E-mail: nicola.bellomo@icc.ub.edu, E-mail: emilio.bellini@physics.ox.ac.uk, E-mail: binhu@icc.ub.edu, E-mail: raul.jimenez@icc.ub.edu, E-mail: penya@ific.uv.es, E-mail: liciaverde@icc.ub.edu [Instituto de Fisica Corpuscular, CSIC-UVEG, P.O. 22085, Valencia, 46071 (Spain)

    2017-02-01

    Cosmological observables show a dependence with the neutrino mass, which is partially degenerate with parameters of extended models of gravity. We study and explore this degeneracy in Horndeski generalized scalar-tensor theories of gravity. Using forecasted cosmic microwave background and galaxy power spectrum datasets, we find that a single parameter in the linear regime of the effective theory dominates the correlation with the total neutrino mass. For any given mass, a particular value of this parameter approximately cancels the power suppression due to the neutrino mass at a given redshift. The extent of the cancellation of this degeneracy depends on the cosmological large-scale structure data used at different redshifts. We constrain the parameters and functions of the effective gravity theory and determine the influence of gravity on the determination of the neutrino mass from present and future surveys.

  16. Show-Bix &

    DEFF Research Database (Denmark)

    2014-01-01

    The anti-reenactment 'Show-Bix &' consists of 5 dias projectors, a dial phone, quintophonic sound, and interactive elements. A responsive interface will enable the Dias projectors to show copies of original dias slides from the Show-Bix piece ”March på Stedet”, 265 images in total. The copies are...

  17. Early hydration of portland cement with crystalline mineral additions

    International Nuclear Information System (INIS)

    Rahhal, V.; Talero, R.

    2005-01-01

    This research presents the effects of finely divided crystalline mineral additions (quartz and limestone), commonly known as filler, on the early hydration of portland cements with very different mineralogical composition. The used techniques to study the early hydration of blended cements were conduction calorimeter, hydraulicity (Fratini's test), non-evaporable water and X-ray diffraction. Results showed that the stimulation and the dilution effects increase when the percentage of crystalline mineral additions used is increased. Depending on the replacement proportion, the mineralogical cement composition and the type of crystalline addition, at 2 days, the prevalence of the dilution effect or the stimulation effect shows that crystalline mineral additions could act as sites of heat dissipation or heat stimulation, respectively

  18. [Simulation of homicide to hide child's suicide].

    Science.gov (United States)

    Schmidt, P; Driever, F; Madea, B

    2001-01-01

    A case of pretending a homicide to conceal a child suicide is reported in which characteristic findings of the postmortem examination and conclusions from the analysis of forensic autopsy series provided substantial support for the police investigation. In the late night hours of a spring day the police authorities were informed that a 10-year-old girl had been found dead on a playground near its parents' house. As injuries of the neck were recognized by the police officers a homicide investigation was initiated. The post mortem examination showed a furrow symmetrically slanting from the front to the nape of the neck, discrete punctate haemorrhages of the skin of the face and numerous 'tram-line' bruises of the back, buttocks and extremities. These findings indicated as cause and manner of death suicidal hanging following corporal punishment. Confronted with these conclusions the mother immediately made a corresponding confession.

  19. Additive manufacturing in maxillofacial reconstruction

    Directory of Open Access Journals (Sweden)

    Dincă Luciana Laura

    2017-01-01

    Full Text Available In this paper the benefits of using additive manufacturing technologies in maxillofacial reconstruction are highlighted. Based on a real clinical case, the paper describes the manufacture of an implant prototype replacing the right zygomatic bone and a part of maxilla using additive manufacturing technologies. The face is the most expressive part of the human body that makes us unique. It was shown that the maxillofacial prostheses help to improve the psychological state of patients affected by, because low self esteem feeling appears commonly to this patients with the facial defects. The aim of this paper is to show how using additive manufacturing technologies methods within this research, the producing a surgical model will help surgeon to improve the pre-operative planning. For this we used additive manufacturing technologies such as Stereolitography to achieve the biomodel and FDM-fused deposition modelling to obtain a prototype model because these technologies make it possible to obtain prosthesis according to the physical and mechanical requirements of the region of implantation.

  20. LSB-Based Steganography Using Reflected Gray Code

    Science.gov (United States)

    Chen, Chang-Chu; Chang, Chin-Chen

    Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to be detected. The LSB-based data hiding is one of the steganographic methods, used to embed the secret data into the least significant bits of the pixel values in a cover image. In this paper, we propose an LSB-based scheme using reflected-Gray code, which can be applied to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always equal to the secret bits and the experiment shows that the differences are up to almost 50%. According to the mathematical deduction and experimental results, the proposed scheme has the same image quality and payload as the simple LSB substitution scheme. In fact, our proposed data hiding scheme in the case of G1 (one bit Gray code) system is equivalent to the simple LSB substitution scheme.

  1. Fluxional additives: a second generation control in enantioselective catalysis.

    Science.gov (United States)

    Sibi, Mukund P; Manyem, Shankar; Palencia, Hector

    2006-10-25

    The concept of "fluxional additives", additives that can adopt enantiomeric conformations depending on the chiral information in the ligand, is demonstrated in enantioselective Diels-Alder and nitrone cycloaddition reactions. The additive design is modular, and diverse structures are accessible in three steps. Chiral Lewis acids from main group and transition metals show enhancements in enantioselectivity in the presence of these additives.

  2. Lighthouse Guild

    Science.gov (United States)

    ... Contact Us About Us Programs & Services Health Plans eLearning Vision + Health Donate Need Help? Show Menu Hide ... Find a health plan Coping with vision loss eLearning Support for parents of children with visual impairments ...

  3. Biocompatibility of photopolymers for additive manufacturing

    Directory of Open Access Journals (Sweden)

    Leonhardt Stefan

    2016-09-01

    Full Text Available To establish photopolymers for the production of class II or class III medical products by additive manufacturing it is essential to know which components of photopolymeric systems, consisting of monomers, photoinitiators and additives, are the determining factors on their biocompatible properties. In this study the leachable substances of a cured photopolymeric system were eluted and identified by HPLC-MS detection. In addition the cured photopolymer was testes for cytotoxicity and genotoxicity according to DIN EN ISO 10993 for long time applications. The results showed that uncured residual monomers are the determining factor on the biocompatible properties of the photopolymeric system. Strategies to reduce these residual monomers in the cured photopolymer are presented.

  4. Study of the colloidal structure of crude oils - Characterisation of asphaltene suspensions. Relationships between microscopic description and macroscopic properties under different conditions

    International Nuclear Information System (INIS)

    Guille, Veronique; Espinat, Didier; Ravey, Jean-Claude

    1994-04-01

    The authors report the use of techniques of X-ray and neutron scattering, and of rheological measurements to characterise the macrostructure of asphaltenes in solution. They confirm the relevance of a lamellar model for asphaltene particles. They also show that the addition of resin particles results in a decrease of asphaltene size, and hides solvent effects. They also performed a characterisation of the residue of a vacuum distillation. Rheological measurements showed that this residue behaves like a Newtonian liquid above 100 C. Scattering spectra reveal a structure modification between 20 and 90 C. No significant change of the scattering spectrum is then noticed, even up to 300 C. It appears that the scattering technique does not allow an observation of structure modifications to be performed on a large size range [fr

  5. Food and food additives in severe atopic dermatitis.

    Science.gov (United States)

    Van Bever, H P; Docx, M; Stevens, W J

    1989-11-01

    In this study the role of food additives, tyramine and acetylsalicylic acid, was investigated by double-blind placebo-controlled challenges (DBPCC) in 25 children with severe atopic dermatitis (AD). All children challenged with foods (n = 24), except one, showed one or more positive reactions to the DBPCC with foods. Positive reactions presented as different combinations of flares of skin symptoms, intestinal symptoms and respiratory symptoms. Seventeen children (70.8%) showed a positive challenge to egg, 12 to wheat (50%), eight to milk (33.3%) and eight to soya (33.3%). Six children underwent DBPCC with food additives, tyramine and acetylsalicylic acid. All were found to demonstrate positive skin and/or intestinal reactions to at least one of the food additives. Two children reacted to tartrazine, three to sodium benzoate, two to sodium glutamate, two to sodium metabisulfite, four to acetylsalicylic acid and one to tyramine. It is concluded that some foods, food additives, tyramine and acetylsalicylic acid, can cause positive DBPCC in children with severe AD.

  6. Dolphin shows and interaction programs: benefits for conservation education?

    Science.gov (United States)

    Miller, L J; Zeigler-Hill, V; Mellen, J; Koeppel, J; Greer, T; Kuczaj, S

    2013-01-01

    Dolphin shows and dolphin interaction programs are two types of education programs within zoological institutions used to educate visitors about dolphins and the marine environment. The current study examined the short- and long-term effects of these programs on visitors' conservation-related knowledge, attitude, and behavior. Participants of both dolphin shows and interaction programs demonstrated a significant short-term increase in knowledge, attitudes, and behavioral intentions. Three months following the experience, participants of both dolphin shows and interaction programs retained the knowledge learned during their experience and reported engaging in more conservation-related behaviors. Additionally, the number of dolphin shows attended in the past was a significant predictor of recent conservation-related behavior suggesting that repetition of these types of experiences may be important in inspiring people to conservation action. These results suggest that both dolphin shows and dolphin interaction programs can be an important part of a conservation education program for visitors of zoological facilities. © 2012 Wiley Periodicals, Inc.

  7. Improving Rural Women Income through Cocoyam Value Addition ...

    African Journals Online (AJOL)

    User

    empowered rural women to become entrepreneurs at various levels. ... have showed that value added agriculture can be one way to preserve small farmers .... The results in Table 2 show the level of utilization of cocoyam value addition.

  8. Molecular spectroscopic study for suggested mechanism of chrome tanned leather

    Science.gov (United States)

    Nashy, Elshahat H. A.; Osman, Osama; Mahmoud, Abdel Aziz; Ibrahim, Medhat

    2012-03-01

    Collagen represents the structural protein of the extracellular matrix, which gives strength of hides and/or skin under tanning process. Chrome tan is the most important tanning agent all over the world. The methods for production of leather evolved over several centuries as art and engineering with little understanding of the underlying science. The present work is devoted to suggest the most probable mechanistic action of chrome tan on hide proteins. First the affect of Cr upon hide protein is indicated by the studied mechanical properties. Then the spectroscopic characterization of the hide protein as well as chrome tanned leather was carried out with Horizontal Attenuated Total Reflection (HATR) FT-IR. The obtained results indicate how the chromium can attached with the active sites of collagen. Molecular modeling confirms that chromium can react with amino as well as carboxylate groups. Four schemes were obtained to describe the possible interactions of chrome tan with hide proteins.

  9. A review of scalp camouflaging agents and prostheses for individuals with hair loss.

    Science.gov (United States)

    Donovan, Jeff C H; Shapiro, Ron L; Shapiro, Paul; Zupan, Matt; Pierre-Louis, Margareth; Hordinsky, Maria K

    2012-08-15

    Hair loss is a common problem for both men and women and may impact negatively on self-esteem. A variety of medical and surgical treatment options are available depending on the type of alopecia. Many patients also seek the advice of their physicians about options to hide or reduce the appearance of hair loss with hair prostheses (wigs, hairpieces, and extensions) or hair camouflaging agents (hair fibers, powder cakes, lotions, sprays, hair crayons, and scalp tattooing). Herein, we review current methods to hide or reduce the appearance of hair loss and discuss their associated costs, advantages, and disadvantages. Knowledge of products available to cover scalp, eyebrow, and eyelash hair loss may not only better equip clinicians to respond to questions from concerned patients, but may provide additional options to help these patients best cope with their hair loss.

  10. Additivity vs Synergism: Investigation of the Additive Interaction of Cinnamon Bark Oil and Meropenem in Combinatory Therapy.

    Science.gov (United States)

    Yang, Shun-Kai; Yusoff, Khatijah; Mai, Chun-Wai; Lim, Wei-Meng; Yap, Wai-Sum; Lim, Swee-Hua Erin; Lai, Kok-Song

    2017-11-04

    Combinatory therapies have been commonly applied in the clinical setting to tackle multi-drug resistant bacterial infections and these have frequently proven to be effective. Specifically, combinatory therapies resulting in synergistic interactions between antibiotics and adjuvant have been the main focus due to their effectiveness, sidelining the effects of additivity, which also lowers the minimal effective dosage of either antimicrobial agent. Thus, this study was undertaken to look at the effects of additivity between essential oils and antibiotic, via the use of cinnamon bark essential oil (CBO) and meropenem as a model for additivity. Comparisons between synergistic and additive interaction of CBO were performed in terms of the ability of CBO to disrupt bacterial membrane, via zeta potential measurement, outer membrane permeability assay and scanning electron microscopy. It has been found that the additivity interaction between CBO and meropenem showed similar membrane disruption ability when compared to those synergistic combinations which was previously reported. Hence, results based on our studies strongly suggest that additive interaction acts on a par with synergistic interaction. Therefore, further investigation in additive interaction between antibiotics and adjuvant should be performed for a more in depth understanding of the mechanism and the impacts of such interaction.

  11. Additivity vs Synergism: Investigation of the Additive Interaction of Cinnamon Bark Oil and Meropenem in Combinatory Therapy

    Directory of Open Access Journals (Sweden)

    Shun-Kai Yang

    2017-11-01

    Full Text Available Combinatory therapies have been commonly applied in the clinical setting to tackle multi-drug resistant bacterial infections and these have frequently proven to be effective. Specifically, combinatory therapies resulting in synergistic interactions between antibiotics and adjuvant have been the main focus due to their effectiveness, sidelining the effects of additivity, which also lowers the minimal effective dosage of either antimicrobial agent. Thus, this study was undertaken to look at the effects of additivity between essential oils and antibiotic, via the use of cinnamon bark essential oil (CBO and meropenem as a model for additivity. Comparisons between synergistic and additive interaction of CBO were performed in terms of the ability of CBO to disrupt bacterial membrane, via zeta potential measurement, outer membrane permeability assay and scanning electron microscopy. It has been found that the additivity interaction between CBO and meropenem showed similar membrane disruption ability when compared to those synergistic combinations which was previously reported. Hence, results based on our studies strongly suggest that additive interaction acts on a par with synergistic interaction. Therefore, further investigation in additive interaction between antibiotics and adjuvant should be performed for a more in depth understanding of the mechanism and the impacts of such interaction.

  12. Dynamic hubs show competitive and static hubs non-competitive regulation of their interaction partners.

    Directory of Open Access Journals (Sweden)

    Apurv Goel

    Full Text Available Date hub proteins have 1 or 2 interaction interfaces but many interaction partners. This raises the question of whether all partner proteins compete for the interaction interface of the hub or if the cell carefully regulates aspects of this process? Here, we have used real-time rendering of protein interaction networks to analyse the interactions of all the 1 or 2 interface hubs of Saccharomyces cerevisiae during the cell cycle. By integrating previously determined structural and gene expression data, and visually hiding the nodes (proteins and their edges (interactions during their troughs of expression, we predict when interactions of hubs and their partners are likely to exist. This revealed that 20 out of all 36 one- or two- interface hubs in the yeast interactome fell within two main groups. The first was dynamic hubs with static partners, which can be considered as 'competitive hubs'. Their interaction partners will compete for the interaction interface of the hub and the success of any interaction will be dictated by the kinetics of interaction (abundance and affinity and subcellular localisation. The second was static hubs with dynamic partners, which we term 'non-competitive hubs'. Regulatory mechanisms are finely tuned to lessen the presence and/or effects of competition between the interaction partners of the hub. It is possible that these regulatory processes may also be used by the cell for the regulation of other, non-cell cycle processes.

  13. The structure of additive conservation laws

    International Nuclear Information System (INIS)

    Helmut Reen

    1979-01-01

    All additive conserved quantities are listed for a system with short range central force interaction between the particles: a special case shows up in Boltzmann H-theorem and his derivation of the Maxwell velocity distribution. It is concluded that in classical mechanics of mass points there are no other additive conservation laws besides of energy, momentum, angular momentum and center of mass motion. A generator is considered of a symmetry transformation defined as integral over a conserved local current density where the latter, in general, needs not be covariant under translations

  14. Facts about Type 2

    Medline Plus

    Full Text Available ... Diabetes Research & Practice Home We Are Research Leaders World's Largest Diabetes Meeting Recent Advances Type 1 Research ... survey-loading').remove(); $('#emailsurvey').hide(); $('#emailsurveythanks').show(); } } }; /* bind any forms with the "luminateApi" class */ luminateExtend.api.bind(); }); })( ...

  15. Create Your Plate

    Medline Plus

    Full Text Available ... Diabetes Research & Practice Home We Are Research Leaders World's Largest Diabetes Meeting Recent Advances Type 1 Research ... survey-loading').remove(); $('#emailsurvey').hide(); $('#emailsurveythanks').show(); } } }; /* bind any forms with the "luminateApi" class */ luminateExtend.api.bind(); }); })( ...

  16. Laser additive manufacturing of high-performance materials

    CERN Document Server

    Gu, Dongdong

    2015-01-01

    This book entitled “Laser Additive Manufacturing of High-Performance Materials” covers the specific aspects of laser additive manufacturing of high-performance new materials components based on an unconventional materials incremental manufacturing philosophy, in terms of materials design and preparation, process control and optimization, and theories of physical and chemical metallurgy. This book describes the capabilities and characteristics of the development of new metallic materials components by laser additive manufacturing process, including nanostructured materials, in situ composite materials, particle reinforced metal matrix composites, etc. The topics presented in this book, similar as laser additive manufacturing technology itself, show a significant interdisciplinary feature, integrating laser technology, materials science, metallurgical engineering, and mechanical engineering. This is a book for researchers, students, practicing engineers, and manufacturing industry professionals interested i...

  17. Controlling the microstructure and properties of wire arc additive manufactured Ti–6Al–4V with trace boron additions

    International Nuclear Information System (INIS)

    Bermingham, M.J.; Kent, D.; Zhan, H.; StJohn, D.H.; Dargusch, M.S.

    2015-01-01

    This study demonstrates that trace boron addition to Ti–6Al–4V coupons produced by additive layer manufacturing is an effective way to eliminate the deleterious anisotropic microstructures often encountered with this manufacturing technique. Trace boron additions (up to 0.13 wt.%) to this alloy eliminate grain boundary-α and colony-α, and instead produce a homogeneous α-microstructure consisting of fine equiaxed α-grains in both as-deposited and heat treated coupons. Prior-β grains remain columnar with boron addition but become narrower due to the wider solidification range and growth restricting effect of the boron solute. Compared to unmodified Ti–6Al–4V alloy, Ti–6Al–4V modified with trace boron additions showed up to 40% improvement in plasticity with no loss in strength under uniaxial compression at room temperature. Boron additions were found to inhibit twinning transmission that causes sudden large load drops during deformation of the unmodified Ti–6Al–4V alloy in the heat treated condition

  18. Niektóre operacje technologiczne przyczyniające się do powstawania wad i nietrwałości skór wyprawionych (część 2)

    OpenAIRE

    Kozielec, Tomasz

    2011-01-01

    In the second part of the article author focused on descriptions of such processesof hide converting to leather as: liming (treating hide by calcium hydroxide, andsodium sulphide in the form of suspension or mash), unhairing and fleshing(by hand and machine), removing so called “dirts” from hide structure (namelyremains of follicles and hairs, pigments, fats etc) which remained after previouslymentioned processes, deliming (removing of alkaline compounds after theliming process by using of or...

  19. Radiolytic stabilization of poly(methyl methacrylate) using commercial additives

    International Nuclear Information System (INIS)

    Aquino, Katia Aparecida da Silva

    2000-04-01

    Poly(methyl methacrylate), PMMA, Acrigel, a Brazilian polymer, is used in the manufacture of medical supplies sterelizable by ionizing radiation. However, when PMMA is gamma-irradiated it undergoes main chain scissions, which promote molecular degradation causing reduction in its mechanical properties. Therefore, radiolytic of PMMA is important for it to become commercially radiosterizable. In this work some commercial additives, originally used in photo-and thermo-oxidate stabilization of polymers, were tested. Only two additives, type HALS (Hindered Amine Light Stabilizer), denoted Scavenger, showed a good protective quality. The investigation of radiation-induced main scissions was carried out by viscosimetric method. The most effective additive, added to the polymer system at 0.3 w/w%, promotes a great molecular radioprotection of 93%. That means a reduction of G-value (scissions/100 eV) from 0.611 to 0.053. In addition, the glassy transition temperature (T g ) of PMMA (no additive) significantly changed by radiation does not change when PMMA (with additive) is irradiated. The spectroscopy analysis, FT-IR and NMR ( 1 H), showed that the radioprotector added to the system does not change the PMMA structure. (author)

  20. 77 FR 13522 - Safety Zone; Baltimore Air Show, Patapsco River, Baltimore, MD

    Science.gov (United States)

    2012-03-07

    ... public event will consist of military and civilian aircraft performing low-flying, high-speed precision... Harbor. In addition to the air show dates, military and civilian aircraft performing in the air show will...[deg]14'30'' N, longitude 076[deg]36'30'' W; thence to the point of origin. This safety zone will be...

  1. Time dependent patient no-show predictive modelling development.

    Science.gov (United States)

    Huang, Yu-Li; Hanauer, David A

    2016-05-09

    Purpose - The purpose of this paper is to develop evident-based predictive no-show models considering patients' each past appointment status, a time-dependent component, as an independent predictor to improve predictability. Design/methodology/approach - A ten-year retrospective data set was extracted from a pediatric clinic. It consisted of 7,291 distinct patients who had at least two visits along with their appointment characteristics, patient demographics, and insurance information. Logistic regression was adopted to develop no-show models using two-thirds of the data for training and the remaining data for validation. The no-show threshold was then determined based on minimizing the misclassification of show/no-show assignments. There were a total of 26 predictive model developed based on the number of available past appointments. Simulation was employed to test the effective of each model on costs of patient wait time, physician idle time, and overtime. Findings - The results demonstrated the misclassification rate and the area under the curve of the receiver operating characteristic gradually improved as more appointment history was included until around the 20th predictive model. The overbooking method with no-show predictive models suggested incorporating up to the 16th model and outperformed other overbooking methods by as much as 9.4 per cent in the cost per patient while allowing two additional patients in a clinic day. Research limitations/implications - The challenge now is to actually implement the no-show predictive model systematically to further demonstrate its robustness and simplicity in various scheduling systems. Originality/value - This paper provides examples of how to build the no-show predictive models with time-dependent components to improve the overbooking policy. Accurately identifying scheduled patients' show/no-show status allows clinics to proactively schedule patients to reduce the negative impact of patient no-shows.

  2. Additive manufacturing of tunable lenses

    Science.gov (United States)

    Schlichting, Katja; Novak, Tobias; Heinrich, Andreas

    2017-02-01

    Individual additive manufacturing of optical systems based on 3D Printing offers varied possibilities in design and usage. In addition to the additive manufacturing procedure, the usage of tunable lenses allows further advantages for intelligent optical systems. Our goal is to bring the advantages of additive manufacturing together with the huge potential of tunable lenses. We produced tunable lenses as a bundle without any further processing steps, like polishing. The lenses were designed and directly printed with a 3D Printer as a package. The design contains the membrane as an optical part as well as the mechanical parts of the lens, like the attachments for the sleeves which contain the oil. The dynamic optical lenses were filled with an oil. The focal length of the lenses changes due to a change of the radius of curvature. This change is caused by changing the pressure in the inside of the lens. In addition to that, we designed lenses with special structures to obtain different areas with an individual optical power. We want to discuss the huge potential of this technology for several applications. Further, an appropriate controlling system is needed. Wéll show the possibilities to control and regulate the optical power of the lenses. The lenses could be used for illumination tasks, and in the future, for individual measurement tasks. The main advantage is the individuality and the possibility to create an individual design which completely fulfills the requirements for any specific application.

  3. 40 CFR 432.102 - Effluent limitations attainable by the application of the best practicable control technology...

    Science.gov (United States)

    2010-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS MEAT... derived for a renderer which does not cure cattle hide. If a renderer does cure cattle hide, the following...

  4. Inter-Linking of Rivers: Are we on the right side?

    Digital Repository Service at National Institute of Oceanography (India)

    Mukhopadhyay, R.

    measures could constitute the alternative path if we stop hiding from stark truth and do not overestimate our capacity to coordinate and manage super-mega projects like this one that would involve at least fifteen to twenty central ministries and equal...-Indore), and parts of Rajasthan. This would help irrigate additional 35,000 million hectares of land. Another major incentive of this project shall be to offer a respite from floods to various parts of the northern and eastern India. Additionally...

  5. [Effect of biochar addition on soil evaporation.

    Science.gov (United States)

    Xu, Jian; Niu, Wen Quan; Zhang, Ming Zhi; Li, Yuan; Lyu, Wang; Li, Kang-Yong; Zou, Xiao-Yang; Liang, Bo-Hui

    2016-11-18

    In order to determine the rational amount of biochar application and its effect on soil hydrological processes in arid area, soil column experiments were conducted in the laboratory using three biochar additions (5%, 10% and 15%) and four different biochar types (devaporation. The results showed that the addition of biochar could change the phreatic water recharge, soil water-holding capacity, capillary water upward movement and soil evaporation obviously. But the effects were different depending on the type of biochar raw material and the size of particle. The phreatic water recharge increased with the increasing amount of biochar addition. The addition of biochar could obviously enlarge the soil water-holding capacity and promote the capillary water upward movement rate. This effect was greater when using the material of bamboo charcoal compared with using wood charcoal, while biochar with small particle size had greater impact than that with big particle size. The biochar could effectively restrain the soil evaporation at a low addition amount (5%). But it definitely promoted the soil evaporation if the addition amount was very high. In arid area, biochar addition in appropriate amount could improve soil water retention capacity.

  6. No Place to Hide: Missing Primitive Stars Outside Milky Way Uncovered

    Science.gov (United States)

    2010-02-01

    After years of successful concealment, the most primitive stars outside our Milky Way galaxy have finally been unmasked. New observations using ESO's Very Large Telescope have been used to solve an important astrophysical puzzle concerning the oldest stars in our galactic neighbourhood - which is crucial for our understanding of the earliest stars in the Universe. "We have, in effect, found a flaw in the forensic methods used until now," says Else Starkenburg, lead author of the paper reporting the study. "Our improved approach allows us to uncover the primitive stars hidden among all the other, more common stars." Primitive stars are thought to have formed from material forged shortly after the Big Bang, 13.7 billion years ago. They typically have less than one thousandth the amount of chemical elements heavier than hydrogen and helium found in the Sun and are called "extremely metal-poor stars" [1]. They belong to one of the first generations of stars in the nearby Universe. Such stars are extremely rare and mainly observed in the Milky Way. Cosmologists think that larger galaxies like the Milky Way formed from the merger of smaller galaxies. Our Milky Way's population of extremely metal-poor or "primitive" stars should already have been present in the dwarf galaxies from which it formed, and similar populations should be present in other dwarf galaxies. "So far, evidence for them has been scarce," says co-author Giuseppina Battaglia. "Large surveys conducted in the last few years kept showing that the most ancient populations of stars in the Milky Way and dwarf galaxies did not match, which was not at all expected from cosmological models." Element abundances are measured from spectra, which provide the chemical fingerprints of stars [2]. The Dwarf galaxies Abundances and Radial-velocities Team [3] used the FLAMES instrument on ESO's Very Large Telescope to measure the spectra of over 2000 individual giant stars in four of our galactic neighbours, the Fornax

  7. AirShow 1.0 CFD Software Users' Guide

    Science.gov (United States)

    Mohler, Stanley R., Jr.

    2005-01-01

    AirShow is visualization post-processing software for Computational Fluid Dynamics (CFD). Upon reading binary PLOT3D grid and solution files into AirShow, the engineer can quickly see how hundreds of complex 3-D structured blocks are arranged and numbered. Additionally, chosen grid planes can be displayed and colored according to various aerodynamic flow quantities such as Mach number and pressure. The user may interactively rotate and translate the graphical objects using the mouse. The software source code was written in cross-platform Java, C++, and OpenGL, and runs on Unix, Linux, and Windows. The graphical user interface (GUI) was written using Java Swing. Java also provides multiple synchronized threads. The Java Native Interface (JNI) provides a bridge between the Java code and the C++ code where the PLOT3D files are read, the OpenGL graphics are rendered, and numerical calculations are performed. AirShow is easy to learn and simple to use. The source code is available for free from the NASA Technology Transfer and Partnership Office.

  8. H-point standard additions method for simultaneous determination of sulfamethoxazole and trimethoprim in pharmaceutical formulations and biological fluids with simultaneous addition of two analytes

    Science.gov (United States)

    Givianrad, M. H.; Saber-Tehrani, M.; Aberoomand-Azar, P.; Mohagheghian, M.

    2011-03-01

    The applicability of H-point standard additions method (HPSAM) to the resolving of overlapping spectra corresponding to the sulfamethoxazole and trimethoprim is verified by UV-vis spectrophotometry. The results show that the H-point standard additions method with simultaneous addition of both analytes is suitable for the simultaneous determination of sulfamethoxazole and trimethoprim in aqueous media. The results of applying the H-point standard additions method showed that the two drugs could be determined simultaneously with the concentration ratios of sulfamethoxazole to trimethoprim varying from 1:18 to 16:1 in the mixed samples. Also, the limits of detections were 0.58 and 0.37 μmol L -1 for sulfamethoxazole and trimethoprim, respectively. In addition the means of the calculated RSD (%) were 1.63 and 2.01 for SMX and TMP, respectively in synthetic mixtures. The proposed method has been successfully applied to the simultaneous determination of sulfamethoxazole and trimethoprim in some synthetic, pharmaceutical formulation and biological fluid samples.

  9. Pembuatan kulit tahan air untuk bagian atas sepatu

    Directory of Open Access Journals (Sweden)

    Suliestiyah Wiryodiningrat

    2008-12-01

    Full Text Available The aim of research non manufacturing of waterproof leather for shoe upper is to find the best formula in producing waterproof cow hide leather for shoe uppers. Today, the tanners trying their best effort to fulfill the shoes. The research used salted raw cow hide 18 sides were utilized. Leather treatment process begining with soaking stage up to tanning stage and using the same formula in each treatment. In the fatliquoring stage, the treatment varied in the number of fatliquoring chemical material were 8,10, and 12 % respectively. Whereas, the amount of was silicon added in the dyeing process were 5,7.5, and 10 % respectively. The quality of the leather was physically examined accordance with testing method of ISO. 8782- 1998 € and DIN standard. The results performed that the best formula was sample with addition of fatliquoring 12 % and silicon5%.

  10. Synergism of clinical evaluation and penile sonographic imaging in diagnosis of penile fracture: a case report

    Directory of Open Access Journals (Sweden)

    Bello Jibril

    2012-09-01

    Full Text Available Abstract Introduction Penile fracture is an uncommon urologic emergency, and is the traumatic rupture of the tunica albuginea covering the corpus cavernosa. This usually occurs following blunt trauma sustained during coitus, masturbation or self-manipulations to hide or suppress an erection. Clinical diagnosis can often be easily made with typical history and examination findings. However, the patient may present atypically and/or with a suspicion of associated urethral injury. The roles of various diagnostic investigations are being evaluated in these situations. Case presentation We report the case of a 31-year-old African man with penile fracture and suspected associated urethral injury that occurred after self-manipulations to hide an erection. Conclusions Penile ultrasound and sonourethrography provide useful additional diagnostic information to supplement clinical history and physical examination findings and can be performed easily, at low cost and with no delays to surgery.

  11. Sintering of magnesia: effect of additives

    Indian Academy of Sciences (India)

    Effect of different additives, namely Cr2O3, Fe2O3 and TiO2, up to 2 wt% was studied on the sinter- ing and .... mental distribution of the components is shown in figure 7. It shows ... Chiang Y M, Birniand D and Kingery W 1996 Physical ceram-.

  12. (ajst) additive main effects and multiplicative

    African Journals Online (AJOL)

    2013-08-02

    Aug 2, 2013 ... genotypes assessed by biplot analysis showed that the most stable ... biplot is a useful tool for the analysis of multi-environment trial (MET) data. ... multiplicative components, extracting first the additive ... The AMMI analysis of variance of cassava harvest index of the 8 .... wheat mega-environments in Iran.

  13. Significance of Glucose Addition on Chitosan-Glycerophosphate Hydrogel Properties

    Directory of Open Access Journals (Sweden)

    Dian Susanthy

    2016-03-01

    Full Text Available Chitosan-glycerophosphate hydrogel can be used as dental scaffold due to its thermosensitivity, gelation performance at body temperature, suitable acidity for body condition, biocompatibility, and ability to provide good environment for cell proliferation and differentiation. Previous study showed that glucose addition to the chitosan solution before steam sterilization improved its hydrogel mechanical strength. However, the effectiveness of glucose addition was still doubted because glucose might undergo Maillard reaction in that particular condition. The aims of this study are to confirm whether the glucose addition can increase the hydrogel mechanical strength and gelation rate effectively and also to compare their performance to be dental scaffold. This research was performed through several steps, namely preparation of chitosan-glycerophosphate solution, addition of glucose, gelation time test, gel mechanical strength measurement, functional group analysis, and physical properties measurements (pH, viscosity, and pore size. The result showed that glucose addition did not improve the hydrogel mechanical strength and gelation rate, neither when it was added before nor after steam sterilization. Glucose addition before steam sterilization seemed to trigger Maillard reaction or browning effect, while glucose addition after steam sterilization increased the amount of free water molecules in the hydrogel. Chitosan and glycerophosphate interact physically, but interaction between chitosan and glucose seems to occur chemically and followed by the formation of free water molecules. Glucose addition decreases the solution viscosity and hydrogel pore size so the hydrogel performance as dental scaffold is lowered.

  14. The behaviour of molybdenum dialkyldithiocarbamate friction modifier additives

    International Nuclear Information System (INIS)

    Graham, Jocelyn Claire Herries

    2001-01-01

    In recent years there has been growing concern to produce energy-efficient lubricated components and modem engine oil specifications require lubricants to demonstrate fuel efficiency in standardised engine tests. One important method of producing low friction and thus fuel-efficient lubricants is to use oil-soluble, molybdenum-containing, friction modifier additives. In optimal conditions these additives are able to produce very low friction coefficients, in the range 0.045 to 0.075 in boundary lubrication conditions. Very little is known about the chemical and physical mechanisms by which oil soluble molybdenum additives form low friction films in tribological contacts. Information about their activity could lead to optimal use of these additives in lubricants and, therefore, more efficient engine running. The work outlined in this thesis investigated the behaviour of oil-soluble molybdenum additives and showed that these additives were able to effectively reduce friction in the absence of other additives such as ZnDTP. Their activity was shown to be highly concentration and temperature dependent and was also found to be sensitive to the roughness of the contacting surfaces. Raman spectroscopy was used to analyse the chemical nature of molybdenum-containing reaction films and found that friction reduction indubitably arises from the local formation of platelets (diameter 30-50 nm) of MoS 2 . The formation of MoS 2 -rich films was found to occur only during direct asperity-asperity rubbing of the contacting surfaces (this type of contact being especially prevalent in pure sliding contacts). At elevated temperatures and in the presence of oxidising gases the consumption of MoDTC was monitored. MoDTC concentration dropped until the total value fell below a critical level to reduce friction. The study showed that decay rate of molybdenum-containing species was reduced by the addition of peroxide-decomposing antioxidants. (author)

  15. Cleaning Process Development for Metallic Additively Manufactured Parts

    Science.gov (United States)

    Tramel, Terri L.; Welker, Roger; Lowery, Niki; Mitchell, Mark

    2014-01-01

    Additive Manufacturing of metallic components for aerospace applications offers many advantages over traditional manufacturing techniques. As a new technology, many aspects of its widespread utilization remain open to investigation. Among these are the cleaning processes that can be used for post finishing of parts and measurements to verify effectiveness of the cleaning processes. Many cleaning and drying processes and measurement methods that have been used for parts manufactured using conventional techniques are candidates that may be considered for cleaning and verification of additively manufactured parts. Among these are vapor degreasing, ultrasonic immersion and spray cleaning, followed by hot air drying, vacuum baking and solvent displacement drying. Differences in porosity, density, and surface finish of additively manufactured versus conventionally manufactured parts may introduce new considerations in the selection of cleaning and drying processes or the method used to verify their effectiveness. This presentation will review the relative strengths and weaknesses of different candidate cleaning and drying processes as they may apply to additively manufactured metal parts for aerospace applications. An ultrasonic cleaning technique for exploring the cleanability of parts will be presented along with an example using additively manufactured Inconel 718 test specimens to illustrate its use. The data analysis shows that this ultrasonic cleaning approach results in a well-behaved ultrasonic cleaning/extraction behavior. That is, it does not show signs of accelerated cavitation erosion of the base material, which was later confirmed by neutron imaging. In addition, the analysis indicated that complete cleaning would be achieved by ultrasonic immersion cleaning at approximately 5 minutes, which was verified by subsequent cleaning of additional parts.

  16. Genoa Boat Show – Good Example of Event Management

    Directory of Open Access Journals (Sweden)

    Dunja Demirović

    2012-07-01

    Full Text Available International Boat Show, a business and tourist event, has been held annually in Italian city of Genoa since 1962. The fair is one of the oldest, largest and best known in the field of boating industry worldwide, primarily due to good management of the event and it can serve as case study for domestic fair organizers to improve the quality of their business and services. Since Belgrade is the city of fairs, but compared to Genoa still underdeveloped in terms of trade shows, the following tasks imposed naturally in this study: to determine the relationship of the organizers of Genoa Boat Show in the sector of preparation and fair offer, in the sector of selection and communication with specific target groups (especially visitors, services during the fair and functioning of the city during the fair. During the research the authors have mostly used historical method, comparison, synthesis and the interview method. The results of theoretical research, in addition, may help not only managers of fair shows and of exhibitions, but also to organizers of other events in our country

  17. Differential sensitivity to human communication in dogs, wolves, and human infants.

    Science.gov (United States)

    Topál, József; Gergely, György; Erdohegyi, Agnes; Csibra, Gergely; Miklósi, Adám

    2009-09-04

    Ten-month-old infants persistently search for a hidden object at its initial hiding place even after observing it being hidden at another location. Recent evidence suggests that communicative cues from the experimenter contribute to the emergence of this perseverative search error. We replicated these results with dogs (Canis familiaris), who also commit more search errors in ostensive-communicative (in 75% of the total trials) than in noncommunicative (39%) or nonsocial (17%) hiding contexts. However, comparative investigations suggest that communicative signals serve different functions for dogs and infants, whereas human-reared wolves (Canis lupus) do not show doglike context-dependent differences of search errors. We propose that shared sensitivity to human communicative signals stems from convergent social evolution of the Homo and the Canis genera.

  18. GPU accelerated likelihoods for stereo-based articulated tracking

    DEFF Research Database (Denmark)

    Friborg, Rune Møllegaard; Hauberg, Søren; Erleben, Kenny

    2010-01-01

    than a traditional CPU implementation. We explain the non-intuitive steps required to attain an optimized GPU implementation, where the dominant part is to hide the memory latency effectively. Benchmarks show that computations which previously required several minutes, are now performed in few seconds....

  19. Additional reactor protection system of RBMK-1500

    International Nuclear Information System (INIS)

    1999-01-01

    Analysis of anticipated transients without scram of RBMK-1500 reactor showed that additional reactor protection system is required. Data of accident analysis in the case of loose of external electric power and loose of vacuum in condensers of turbines are provided

  20. Emotion Regulation Characteristics Development in Iranian Primary School Pupils

    Directory of Open Access Journals (Sweden)

    Asghar Dadkhah

    2014-12-01

    Full Text Available Objectives: Emotion regulations refer to the ability of experiencing emotions as a basic human capacity and the experience of the basic emotions happiness, anger, sadness and fear are considered as reular characteristics among nations. In school-age children, problems in socioemotional development typically shows themselves as challenging, socially disruptive paterns of behavior. The purpose of the present study was to understand Emotion Regulation characteristics in Iranian primary school pupils and whether Iranian children enable to identify common emotions. Methods: Participants included 900 children, 9 to 10 years, from elementary schools from 21 provinces in Iran. In pilot work we presented 200 children with four hypothetical vignettes of the kind typically used in display rule research. In the main study children’s knowledge regarding hiding their emotions was assessed through a structured interview. The participants were presented with the interview questions after the vignettes. The answers were coded by two people and the interrater reliability was high. The children were assessed on the basis of four common emotions:Happiness, Anger,Fear,and, Sadness. Results: The analysis of the data indicated that: 1 all children were enabled to identify and differentiate all four emotions from each other, most of students hide their happiness, anger, fear and sadness, they hide their emotions in specific situation such as school and home, hide happiness and anger against peers and hide fear and sadness in front of adults. Discussion: The study indicates that Iranian children not only differ from other culture peers in the amount of display rule use in daily life, but also in the situations they report using it and their motives for doing so they suppress their overall emotions more frequently, especially in presence of family and for pro-social and self-protective reasons. These findings provides the basic knowledge about Iranian children

  1. Hiding the weakness: structural robustness using origami design

    Science.gov (United States)

    Liu, Bin; Santangelo, Christian; Cohen, Itai

    2015-03-01

    A non-deformable structure is typically associated with infinitely stiff materials that resist distortion. In this work, we designed a structure with a region that will not deform even though it is made of arbitrarily compliant materials. More specifically, we show that a foldable sheet with a circular hole in the middle can be deformed externally with the internal geometry of the hole unaffected. Instead of strengthening the local stiffness, we fine tune the crease patterns so that all the soft modes that can potentially deform the internal geometry are not accessible through strain on the external boundary. The inner structure is thus protected by the topological mechanics, based on the detailed geometry of how the vertices in the foldable sheet are connected. In this way, we isolate the structural robustness from the mechanical properties of the materials, which introduces an extra degree of freedom for structural design.

  2. 40 CFR 432.105 - New source performance standards (NSPS).

    Science.gov (United States)

    2010-07-01

    ... GUIDELINES AND STANDARDS MEAT AND POULTRY PRODUCTS POINT SOURCE CATEGORY Renderers § 432.105 New source... renderer that does not cure cattle hide as part of the plant operations. If a renderer does cure hide, the...

  3. Influence of additives on the stability of the phases of alumina

    International Nuclear Information System (INIS)

    Rosario, D.C.C.; Gouvea, D.

    2011-01-01

    Problems with the stability of gamma alumina in catalytic reactions have been solved with the inclusion of additives during the synthesis of alumina. These additives stabilize the temperature of phase transition allowing the use of metastable alumina at high temperatures, but the mechanisms of action of additives are not well defined. It is known that each family of additive or additives behaves in different ways for this stabilization. This work aimed to study the performance of MgO and ZrO 2 , respectively at different concentrations in alumina synthesized via Pechini. The samples were analyzed by DSC, X-ray diffraction, measurement of specific surface area by BET analysis, and infrared analysis. The results showed an increase in transition temperature for both additives, and a different changes for specific surface area, showing that MgO and ZrO 2 work on improving the stability but with distinct mechanisms. (author)

  4. Hide and go seek with temperature signals of Northeastern US Tree Species

    Science.gov (United States)

    Alexander, M. R.; Pederson, N.; Bishop, D. A.; Pearl, J. K.; Anchukaitis, K. J.

    2017-12-01

    Improving reconstructions of past climate is vital in providing long-term context for regional climate change. There have been only two published reconstructions of past temperatures in the northeastern U.S. (NEUS) since the 1980s, one based on Picea rubens, and one out in 2017 based upon Chamaecyparis thyoides (Atlantic white cedar; AWC). Because increased species diversity generally improves dendrohydroclimatic reconstructions and both Picea rubens and AWC have limitations as paleoproxies due to land-use and air pollution, we conducted a series of tests to ask, "Does species diversity improve reconstructions of temperature history in the northeastern United States?" The first two tests were performed on AWC and then a network of AWC and Picea rubens. Subsequent tests added groups of species or genera from a network of 230 tree-ring chronologies beginning with those having the strongest relation between warming temperatures and increased growth. PC1 of the AWC test represented 40% of the variance and showed a significant positive relation with winter temperature (r = 0.38). As additional species were included, the "winter temperature PC" accounted for less of the overall variance, ranging from 26% of the variance in test 2 to 5% by test 5. AWC is swamped by the hydroclimatic signal that dominates our network. Populations of species such as Fagus grandifolia, Fraxinus nigra, Juniperus virginiana, Liriodendron tulipifera, Pinus rigida, and Pinus strobus from our network loaded strongest with AWC on the winter temperature PC. Including multiple species accounted for almost 20% more variance in the winter temperature record than AWC alone. Although drought is a dominating influence of tree growth in this region, our results suggest that winter temperatures are recorded within NEUS tree rings. Increasing the species diversity of tree proxies has the potential for improving reconstruction of paleotemperatures in regions lacking latitudinal or altitudinal tree lines

  5. Additivity for parametrized topological Euler characteristic and Reidemeister torsion

    OpenAIRE

    Badzioch, Bernard; Dorabiala, Wojciech

    2005-01-01

    Dwyer, Weiss, and Williams have recently defined the notions of parametrized topological Euler characteristic and parametrized topological Reidemeister torsion which are invariants of bundles of compact topological manifolds. We show that these invariants satisfy additivity formulas paralleling the additive properties of the classical Euler characteristic and Reidemeister torsion of finite CW-complexes.

  6. An Analysis of Perturbed Quantization Steganography in the Spatial Domain

    Science.gov (United States)

    2005-03-01

    Transform Domain While LSB steganography hides data in the least significant areas of image pixels, this data is not robust against lossy digital...introduced a technique for detecting least significant bit ( LSB ) steganography in digital images called RS Steganalysis. RS Steganalysis produces a...the function has the effect of additive noise similar to that introduced by pixel based LSB steganography . In clean cover images , the flipping

  7. Ancient bacteria show evidence of DNA repair

    DEFF Research Database (Denmark)

    Johnson, Sarah Stewart; Hebsgaard, Martin B; Christensen, Torben R

    2007-01-01

    -term survival of bacteria sealed in frozen conditions for up to one million years. Our results show evidence of bacterial survival in samples up to half a million years in age, making this the oldest independently authenticated DNA to date obtained from viable cells. Additionally, we find strong evidence...... geological timescales. There has been no direct evidence in ancient microbes for the most likely mechanism, active DNA repair, or for the metabolic activity necessary to sustain it. In this paper, we couple PCR and enzymatic treatment of DNA with direct respiration measurements to investigate long...... that this long-term survival is closely tied to cellular metabolic activity and DNA repair that over time proves to be superior to dormancy as a mechanism in sustaining bacteria viability....

  8. "Hiding Our Snickers": "Weekly Mail" Journalists' Indirect Resistance in Apartheid South Africa

    Science.gov (United States)

    Trabold, Bryan

    2006-01-01

    In the mid- to late 1980s, the challenges facing the editors and journalists working for the South African antiapartheid newspaper, the "Weekly Mail," were formidable. In addition to the more than one hundred censorship laws already in place, the apartheid government had declared a series of states of emergency in a final and desperate…

  9. Genomic Model with Correlation Between Additive and Dominance Effects.

    Science.gov (United States)

    Xiang, Tao; Christensen, Ole Fredslund; Vitezica, Zulma Gladis; Legarra, Andres

    2018-05-09

    Dominance genetic effects are rarely included in pedigree-based genetic evaluation. With the availability of single nucleotide polymorphism markers and the development of genomic evaluation, estimates of dominance genetic effects have become feasible using genomic best linear unbiased prediction (GBLUP). Usually, studies involving additive and dominance genetic effects ignore possible relationships between them. It has been often suggested that the magnitude of functional additive and dominance effects at the quantitative trait loci are related, but there is no existing GBLUP-like approach accounting for such correlation. Wellmann and Bennewitz showed two ways of considering directional relationships between additive and dominance effects, which they estimated in a Bayesian framework. However, these relationships cannot be fitted at the level of individuals instead of loci in a mixed model and are not compatible with standard animal or plant breeding software. This comes from a fundamental ambiguity in assigning the reference allele at a given locus. We show that, if there has been selection, assigning the most frequent as the reference allele orients the correlation between functional additive and dominance effects. As a consequence, the most frequent reference allele is expected to have a positive value. We also demonstrate that selection creates negative covariance between genotypic additive and dominance genetic values. For parameter estimation, it is possible to use a combined additive and dominance relationship matrix computed from marker genotypes, and to use standard restricted maximum likelihood (REML) algorithms based on an equivalent model. Through a simulation study, we show that such correlations can easily be estimated by mixed model software and accuracy of prediction for genetic values is slightly improved if such correlations are used in GBLUP. However, a model assuming uncorrelated effects and fitting orthogonal breeding values and dominant

  10. Microstructure and mechanical properties of molybdenum silicides with Al additions

    International Nuclear Information System (INIS)

    Rosales, I.; Bahena, D.; Colin, J.

    2007-01-01

    Several molybdenum silicides alloys with different aluminum additions were produced by the arc-cast method. Microstructure observed in the alloys presented a variation of the precipitated second phase respect to the aluminum content. Evaluation of the compressive behavior at high temperature of the alloys shows an important improvement in its ductility, approximately of 20%. Fracture toughness was increased proportionally with Al content. In addition at room temperature the alloys show a better mechanical behavior in comparison with the sample unalloyed. In general, Al additions result to be a good alternative to improve the resistance of these intermetallic alloys. The results are interpreted on the base of the analysis of second phase strengthening

  11. EFFICIENT ADAPTIVE STEGANOGRAPHY FOR COLOR IMAGESBASED ON LSBMR ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. Sharmila

    2012-02-01

    Full Text Available Steganography is the art of hiding the fact that communication is taking place, by hiding information in other medium. Many different carrier file formats can be used, but digital images are the most popular because of their frequent use on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques. The Least Significant Bit (LSB based approach is a simplest type of steganographic algorithm. In all the existing approaches, the decision of choosing the region within a cover image is performed without considering the relationship between image content and the size of secret message. Thus, the plain regions in the cover will be ruin after data hiding even at a low data rate. Hence choosing the edge region for data hiding will be a solution. Many algorithms are deal with edges in images for data hiding. The Paper 'Edge adaptive image steganography based on LSBMR algorithm' is a LSB steganography presented the results of algorithms on gray-scale images only. This paper presents the results of analyzing the performance of edge adaptive steganography for colored images (JPEG. The algorithms have been slightly modified for colored image implementation and are compared on the basis of evaluation parameters like peak signal noise ratio (PSNR and mean square error (MSE. This method can select the edge region depending on the length of secret message and difference between two consecutive bits in the cover image. For length of message is short, only small edge regions are utilized while on leaving other region as such. When the data rate increases, more regions can be used adaptively for data hiding by adjusting the parameters. Besides this, the message is encrypted using efficient cryptographic algorithm which further increases the security.

  12. Reviews Opera: Doctor Atomic DVD: Doctor Atomic Equipment: Digital stopclock with external trigger Book: I Cyborg Book: Flat Earth: The History of an Infamous Idea Book: Mere Thermodynamics Book: CGP revision guides Book: Hiding the Elephant: How Magicians Invented the Impossible Book: Back of the Envelope Physics Web Watch

    Science.gov (United States)

    2009-07-01

    WE RECOMMEND Doctor Atomic The new Doctor Atomic opera provkes discussion on ethics I Cyborg The world's first human cyborg shares his life story in I Cyborg Flat Earth: The History of an Infamous Idea Flat Earth gives us a different perspective on creationism Mere Thermodynamics An introductory text on the three laws CGP revision guides This revision guide suits all courses and every pocket Hiding the Elephant: How Magicians Invented the Impossible The mystery of many illusions are solved in this book Back of the Envelope Physics This reference deserves a place on your bookshelf WORTH A LOOK Doctor Atomic The DVD doesn't do justice to the live performance Digital stopclock with external trigger Use these stopclocks when you need an external trigger WEB WATCH Webcasts reach out to an online audience

  13. Non-goal-directed recall of specific events in apes after long delays.

    Science.gov (United States)

    Lewis, Amy; Call, Josep; Berntsen, Dorthe

    2017-07-12

    We examined if apes spontaneously remember one-time, distinctive events across long delays when probed by discriminant cues. Apes witnessed an experimenter hide a cache of food, which they could then retrieve. They retrieved one of two food types; one more distinctive than the other. Two, 10 or 50 weeks later, the apes returned to the same enclosure and found a piece of the previously hidden food on the ground. An experimenter who had not hidden the food was also present. Apes immediately searched the location where the food was previously hidden (no food was here), showing recall of the event. One week later, apes returned to the same enclosure, with the same food on the ground, but now the experimenter that had hidden the food was present. Again, apes immediately searched the hiding location. Apes that had not witnessed the hiding event did not search. There was no significant effect of food type, and retention declined from exposure to the two-week delay, then levelled, consistent with the forgetting curve in humans (Ebbinghaus, H. 1964 Memory: a contribution to experimental psychology (transl. H.A. Ruger & C.E. Bussenvis). New York, NY: Dover. (Original work published 1885.)). This is the first study to show apes can recall a one-time, non-goal-directed event longer than two weeks ago and that apes' recall declines in accordance with a standard retention function. © 2017 The Author(s).

  14. Cloaking and imaging at the same time

    Science.gov (United States)

    Wu, Qiannan; Xu, Yadong; Li, Hui; Chen, Huanyang

    2013-02-01

    In this letter, we propose a conceptual device to perform good imaging with positive refraction. At the same time, this device is an isotropic omnidirectional cloak with a perfect electric conductor hiding region and shows versatile illusion optical effects. Numerical simulations are performed to verify the functionalities.

  15. Interfacial behavior of common food contact polymer additives.

    Science.gov (United States)

    Heiserman, W M; Can, S Z; Walker, R A; Begley, T H; Limm, W

    2007-07-15

    Irganox 1076 (IN1076) and Irganox 1010 (IN1010), phenol containing species often used as antioxidant additives in food packaging polymers have both hydrophilic and hydrophobic functional groups. Consequently these additives are likely to absorb to surfaces where their free energy is minimized. Experiments described in this work examine the two-dimensional phase behavior and vibrational structure of IN1076 and IN1010 films adsorbed to the air/water interface. Surface pressure isotherms show that repeated compression of these films leads to continued irreversible loss of molecules and that on a per molecule basis, this loss is more pronounced for IN1076 than for IN1010. Differences in the surface properties of these two antioxidant additives are interpreted based on differences in molecular structure. Surface specific vibrational measurements of these organic films show very little conformational order, implying that even when closely packed, both antioxidant species have little affinity for forming highly organized domains. These findings have important ramifications for mechanisms that reduce antioxidant activity in polymers as well as descriptions of antioxidant blooming on polymer surfaces.

  16. A Variable Neighborhood Search Algorithm for the Leather Nesting Problem

    Directory of Open Access Journals (Sweden)

    Cláudio Alves

    2012-01-01

    Full Text Available The leather nesting problem is a cutting and packing optimization problem that consists in finding the best layout for a set of irregular pieces within a natural leather hide with an irregular surface and contour. In this paper, we address a real application of this problem related to the production of car seats in the automotive industry. The high quality requirements imposed on these products combined with the heterogeneity of the leather hides make the problem very complex to solve in practice. Very few results are reported in the literature for the leather nesting problem. Furthermore, the majority of the approaches impose some additional constraints to the layouts related to the particular application that is considered. In this paper, we describe a variable neighborhood search algorithm for the general leather nesting problem. To evaluate the performance of our approaches, we conducted an extensive set of computational experiments on real instances. The results of these experiments are reported at the end of the paper.

  17. Additional chromosome abnormalities in chronic myeloid leukemia

    Directory of Open Access Journals (Sweden)

    Hui-Hua Hsiao

    2011-02-01

    Full Text Available The Philadelphia (Ph chromosome and/or Breakpoint cluster region-Abelson leukemia virus oncogene transcript are unique markers for chronic myeloid leukemia (CML. However, CML demonstrates heterogeneous presentations and outcomes. We analyzed the cytogenetic and molecular results of CML patients to evaluate their correlation with clinical presentations and outcome. A total of 84 newly diagnosed CML patients were enrolled in the study. Patients were treated according to disease status. Bone marrow samples were obtained to perform cytogenetic and molecular studies. Clinical presentations, treatment courses, and survival were reviewed retrospectively. Among 84 patients, 72 had chronic phase and 12 had accelerated phase CML. Cytogenetic study showed 69 (82.1% with the classic Ph chromosome, 6 (7.2% with a variant Ph chromosome, and 9 (10.7% with additional chromosome abnormalities. Fifty-four (64.3% cases harbored b3a2 transcripts, 29 (34.5% had b2a2 transcript, and 1 had e19a2 transcript. There was no difference in clinical presentations between different cytogenetic and molecular groups; however, additional chromosome abnormalities were significantly associated with the accelerated phase. Imatinib therapy was an effective treatment, as measured by cytogenetic response, when administered as first- and second-line therapy in chronic phase patients. Survival analysis showed that old age, additional chromosome abnormalities, high Sokal score, and no cytogenetic response in second-line therapy had a significant poor impact (p<0.05. In conclusion, we presented the cytogenetic and molecular pattern of CML patients and demonstrated that the additional chromosome abnormality was associated with poor outcome.

  18. The Estonian president: the Baltics are not afraid of migrants or Russians / Sten Hankewitz

    Index Scriptorium Estoniae

    Hankewitz, Sten A., 1979-

    2016-01-01

    President Kersti Kaljulaidi avalikust vastusest EurActivis ilmunud James Crispi artiklile "The Brief: Europe’s elites rush to hide behind Mutti’s skirts" http://www.euractiv.com/section/all/news/the-brief-europes-elites-rush-to-hide-behind-muttis-skirts/

  19. Gun Shows and Gun Violence: Fatally Flawed Study Yields Misleading Results

    Science.gov (United States)

    Hemenway, David; Webster, Daniel; Pierce, Glenn; Braga, Anthony A.

    2010-01-01

    A widely publicized but unpublished study of the relationship between gun shows and gun violence is being cited in debates about the regulation of gun shows and gun commerce. We believe the study is fatally flawed. A working paper entitled “The Effect of Gun Shows on Gun-Related Deaths: Evidence from California and Texas” outlined this study, which found no association between gun shows and gun-related deaths. We believe the study reflects a limited understanding of gun shows and gun markets and is not statistically powered to detect even an implausibly large effect of gun shows on gun violence. In addition, the research contains serious ascertainment and classification errors, produces results that are sensitive to minor specification changes in key variables and in some cases have no face validity, and is contradicted by 1 of its own authors’ prior research. The study should not be used as evidence in formulating gun policy. PMID:20724672

  20. Influence of Therapeutic Ceftiofur Treatments of Feedlot Cattle on Fecal and Hide Prevalences of Commensal Escherichia coli Resistant to Expanded-Spectrum Cephalosporins, and Molecular Characterization of Resistant Isolates

    Science.gov (United States)

    Griffin, Dee; Kuehn, Larry A.; Brichta-Harhay, Dayna M.

    2013-01-01

    In the United States, the blaCMY-2 gene contained within incompatibility type A/C (IncA/C) plasmids is frequently identified in extended-spectrum-cephalosporin-resistant (ESCr) Escherichia coli strains from both human and cattle sources. Concerns have been raised that therapeutic use of ceftiofur in cattle may increase the prevalence of ESCr E. coli. We report that herd ESCr E. coli fecal and hide prevalences throughout the residency of cattle at a feedlot, including during the period of greatest ceftiofur use at the feedlot, were either not significantly different (P ≥ 0.05) or significantly less (P E. coli shedding that follows ceftiofur injection abated, ceftiofur-injected cattle were no more likely than untreated members of the same herd to shed ESCr E. coli. Pulsed-field gel electrophoresis (PFGE) genotyping, antibiotic resistance phenotyping, screening for presence of the blaCMY-2 gene, and plasmid replicon typing were performed on 312 ESCr E. coli isolates obtained during six sampling periods spanning the 10-month residence of cattle at the feedlot. The identification of only 26 unique PFGE genotypes, 12 of which were isolated during multiple sampling periods, suggests that clonal expansion of feedlot-adapted blaCMY-2 E. coli strains contributed more to the persistence of blaCMY-2 than horizontal transfer of IncA/C plasmids between E. coli strains at this feedlot. We conclude that therapeutic use of ceftiofur at this cattle feedlot did not significantly increase the herd prevalence of ESCr E. coli. PMID:23354706

  1. Fuel and Additive Characterization for HCCI Combustion

    International Nuclear Information System (INIS)

    Aceves, S M; Flowers, D; Martinez-Frias, J; Espinosa-Loza, F; Pitz, W J; Dibble, R

    2003-01-01

    This paper shows a numerical evaluation of fuels and additives for HCCl combustion. First, a long list of candidate HCCl fuels is selected. For all the fuels in the list, operating conditions (compression ratio, equivalence ratio and intake temperature) are determined that result in optimum performance under typical operation for a heavy-duty engine. Fuels are also characterized by presenting Log(p)-Log(T) maps for multiple fuels under HCCl conditions. Log(p)-Log(T) maps illustrate important processes during HCCl engine operation, including compression, low temperature heat release and ignition. Log(p)-Log(T) diagrams can be used for visualizing these processes and can be used as a tool for detailed analysis of HCCl combustion. The paper also includes a ranking of many potential additives. Experiments and analyses have indicated that small amounts (a few parts per million) of secondary fuels (additives) may considerably affect HCCl combustion and may play a significant role in controlling HCCl combustion. Additives are ranked according to their capability to advance HCCl ignition. The best additives are listed and an explanation of their effect on HCCl combustion is included

  2. Strong-stability-preserving additive linear multistep methods

    KAUST Repository

    Hadjimichael, Yiannis

    2018-02-20

    The analysis of strong-stability-preserving (SSP) linear multistep methods is extended to semi-discretized problems for which different terms on the right-hand side satisfy different forward Euler (or circle) conditions. Optimal perturbed and additive monotonicity-preserving linear multistep methods are studied in the context of such problems. Optimal perturbed methods attain larger monotonicity-preserving step sizes when the different forward Euler conditions are taken into account. On the other hand, we show that optimal SSP additive methods achieve a monotonicity-preserving step-size restriction no better than that of the corresponding nonadditive SSP linear multistep methods.

  3. Studies of alumina additions in zirconia - magnesia

    International Nuclear Information System (INIS)

    Muccillo, R.

    1987-01-01

    Ionic conductivity measurements have been carried out in the 500 0 C - 1000 0 C temperature range in Mg - PSZ (Partially Stabilized Zirconia) with 0.5 to 10 mol % alumina additions. All specimens were prepared by pressing followed by pre - and sintering at 1000 0 C/2h and1450 0 C/4h, respectively. Thermal histerysis of the ionic conductivity have been detected, probably due to phase changes in the Mg-PSZ samples. The results show that alumina additions up to 2.1% enhances densification with no major variations in electrical resistivity values. (Author) [pt

  4. Additives for cement compositions based on modified peat

    Energy Technology Data Exchange (ETDEWEB)

    Kopanitsa, Natalya, E-mail: kopanitsa@mail.ru; Sarkisov, Yurij, E-mail: sarkisov@tsuab.ru; Gorshkova, Aleksandra, E-mail: kasatkina.alexandra@gmail.com; Demyanenko, Olga, E-mail: angel-n@sibmail.com [Tomsk State University of Architecture and Building, 2, Solyanaya sq., Tomsk, 634003 (Russian Federation)

    2016-01-15

    High quality competitive dry building mixes require modifying additives for various purposes to be included in their composition. There is insufficient amount of quality additives having stable properties for controlling the properties of cement compositions produced in Russia. Using of foreign modifying additives leads to significant increasing of the final cost of the product. The cost of imported modifiers in the composition of the dry building mixes can be up to 90% of the material cost, depending on the composition complexity. Thus, the problem of import substitution becomes relevant, especially in recent years, due to difficult economic situation. The article discusses the possibility of using local raw materials as a basis for obtaining dry building mixtures components. The properties of organo-mineral additives for cement compositions based on thermally modified peat raw materials are studied. Studies of the structure and composition of the additives are carried out by physicochemical research methods: electron microscopy and X-ray analysis. Results of experimental research showed that the peat additives contribute to improving of cement-sand mortar strength and hydrophysical properties.

  5. Addition of electric arc furnace dust in hot metal changing the form of addition

    International Nuclear Information System (INIS)

    Marques Sobrinho, Vicente de Paulo Ferreira; Oliveira, Jose Roberto de; Vieira, Estefano Aparecido; Telles, Victor Bridi; Grillo, Felipe Fardin; Tenorio, Jorge Alberto Soares; Espinosa, Denise Crocce Romano

    2014-01-01

    This research aims to study the incorporation of the mass of electric arc furnace dust (EAFD), by addition in hot metal (1.78% Si) at a temperature of 1,400 degrees Celsius. The EAFD is from a steel plant producing long steel. The addition of the EAFD was as received, in the form of briquettes without agitation of the hot metal and in the form of briquettes with agitation of the hot metal. Previously, the EAFD was characterized using the following techniques: chemical analysis, size analysis, X-ray diffraction, scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) microanalysis. The achievement of fusion experiments in laboratory scale, took place in a vertical tubular furnace with temperature control. The fusion experiments to assess the incorporation of EAFD mass used graphite crucibles. After cooling, the hot metal and the slag, remaining in the crucible, were weighed to do a mass balance. A flow of inert gas (argon) was maintained inside the furnace during the experiments. Results show that the experiment with addition of EAFD as received presents the best result of incorporating the mass of the final hot metal (1.73%) combined with the lowest percentage of volatilized mass of EAFD (46.52%). The experiment addition of EAFD in the form of briquette with agitation of hot metal presents the lowest percentage of slag mass (4.58%). The zinc content of volatilized EAFD (64.30%) is higher than the zinc content of the imported ore concentrate (52%) and zinc content of the national ore concentrate (12% to 39%). The presence of lead and cadmium in the slag characterizing it as a hazardous solid waste. (author)

  6. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

    Directory of Open Access Journals (Sweden)

    Jong Hyuk Park

    2016-10-01

    Full Text Available Long Term Evolution (LTE and Long Term Evolution-Advanced (LTE-A support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI and Radio Network Temporary Identities (RNTI are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME. The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.

  7. Radon in Austrian tourist mines and show caves

    International Nuclear Information System (INIS)

    Ringer, W.; Graeser, J.

    2009-01-01

    The radon situation in tourist mines and show caves is barely investigated in Austria. This paper investigates the influence of its determining factors, such as climate, structure and geology. For this purpose, long-term time-resolved measurements over 6 to 12 months in 4 tourist mines and 2 show caves - with 5 to 9 measuring points each - have been carried out to obtain the course of radon concentration throughout the year. In addition, temperature and air-pressure were measured and compared to the data outside where available. Results suggest that the dominating factors of the average radon concentration are structure and location (geology) of the tunnel-system, whereas the diurnal and annual variation is mainly caused by the changing airflow, which is driven by the difference in temperature inside and outside. Downcast air is connected with very low radon concentrations, upcast air with high concentrations. In some locations the maximum values appear when the airflow ceases. But airflow can be different in different parts of mines and caves. Systems close to the surface show generally lower radon levels than the ones located deeper underground. Due to variation of structure, geology and local climate, the radon situation in mines and caves can only be described by simultaneous measurements at several measuring points. (orig.)

  8. Fuel additive improves plant`s air quality

    Energy Technology Data Exchange (ETDEWEB)

    Kratch, K.

    1995-07-01

    Employees of a major pulp and paper manufacturer complained to the Michigan Department of Public Health that emissions from liquefied petroleum gas-powered fork-lifts used in one of the facility`s warehouses were making them ill. The new and tight building was locking in carbon monoxide emissions, according to the plant`s vehicle maintenance supervisor. Although LPG is a clean-burning fuel, it absorbs impurities from pipelines, resulting in emissions problems. After the company introduced a fuel additive to the LPG, employees` symptoms disappeared. According to the maintenance supervisor, there have been no complaints since the additive was introduced five years ago. A major US auto manufacturer also found the additive helpful in reducing carbon monoxide emissions from forklift trucks in a large parts warehouse to levels within OSHA limits. The carmaker conducted a test of 10 forklifts at its Toledo, Ohio, plant to determine the additive`s effectiveness. Trucks were equipped with new or rebuilt vaporizers, and their carburetors were adjusted for the lowest carbon monoxide and hydrocarbon emissions levels prior to the test. According to Advanced Technology, five trucks were filled with LPG and treated with CGX-4, and five used fuel from the same stock but without the additive. All were operated 16 hours a day, six days a week without further tuning or adjusting. Carbon monoxide and hydrocarbon emissions were measured at 30-, 45- and 65-day intervals. Test results show that all of the trucks using the additive maintained low levels of carbon monoxide and hydrocarbon emissions longer than trucks not using the additive.

  9. Evaluation of PCDD/Fs characterization in animal feed and feed additives.

    Science.gov (United States)

    Kim, MeeKyung; Kim, Sooyeon; Yun, Seon Jong; Kwon, Jin-Wook; Son, Seong-Wan

    2007-09-01

    Safety control of feed and feed additives is necessary to have safe food of animal origin. Based on media reports, nine incidents regarding dioxins and/or PCBs contaminations occurred worldwide during the last decade. Korea is a country which imports feed and feed additives. In this study, various kinds of feed and feed additives were analyzed to monitor the contamination level of dioxins. The level of PCDD/Fs in fish oil was the highest with a concentration of 23.33ngkg(-1), which is equivalent to a toxicological concentration of 4.68ngWHO-TEQ/kg. Feed from animals origin such as chicken meal, animal fat, fish meal, fish oil, and shell powder showed relatively higher concentrations of PCDD/Fs. Feed from plants origin, minerals, and additives ranged from non-detects for bit pulp and ethoxyquin to 8.28ngkg(-1) for dl-methionine. From a toxicological point of view, the highest concentration in vitamins was 0.08ngWHO-TEQ/kg among the feed additives. 2,3,4,7,8-PeCDF was the dominant congener in samples of fish oil, fish meal, and shell powder. Animal fat showed that the pattern of PCDD/Fs depends on the sources of contamination. A sample of animal fat showed 1,2,3,4,7,8-HxCDF and the other sample showed 1,2,3,4,7,8-HxCDD as a primary congener. Generally, low levels of PCDDs were detected in feed additives. Patterns of PCDD/Fs in choline chloride were different with that in choline chloride from an incident in Europe in 2000.

  10. Visualizing Changes in Pretest and Post-Test Student Responses with Consistency Plots

    Science.gov (United States)

    Wittmann, Michael C.; Black, Katrina E.

    2014-01-01

    Tabular presentations of student data often hide information about the switches in responses by individual students over the course of a semester. We extend unpublished work by Kanim on "escalator diagrams," which show changes in student responses from correct to incorrect (and vice versa) while representing pre- and postinstruction…

  11. Decorated proofs for computational effects: States

    Directory of Open Access Journals (Sweden)

    Jean-Guillaume Dumas

    2012-08-01

    Full Text Available The syntax of an imperative language does not mention explicitly the state, while its denotational semantics has to mention it. In this paper we show that the equational proofs about an imperative language may hide the state, in the same way as the syntax does.

  12. Thermo-mechanical properties of poly ε-caprolactone/poly L-lactic acid blends: addition of nalidixic acid and polyethylene glycol additives.

    Science.gov (United States)

    Douglas, P; Albadarin, Ahmad B; Al-Muhtaseb, Ala'a H; Mangwandi, Chirangano; Walker, G M

    2015-05-01

    The search for ideal biomaterials is still on-going for tissue regeneration. In this study, blends of poly ε-caprolactone (PCL) with poly l-lactic acid (PLLA), nalidixic acid (NA) and polyethylene glycol (PEG) were prepared. Mechanical and thermal properties of the blends were investigated by tensile and flexural analysis, DSC, TGA, WXRD, MFI, BET, SEM and hot stage optical microscopy. Results showed that the loading of PLLA caused a significant decrease in tensile strength and almost total eradication of the elongation at break of PCL matrix, especially after PEG and NA addition. Increased stiffness was also noted with additional NA, PEG and PLLA, resulting in an increase in the flexural modulus of the blends. Isothermal degradation indicated that bulk PCL, PLLA and the blends were thermally stable at 200°C for the duration of 2h making extrusion of the blends at this temperature viable. Morphological study showed that increasing the PLLA content and addition of the very low viscosity PEG and powder NA decreased the Melt Flow Indexer and increased the viscosity. At the higher temperature, the PLLA begins to soften and eventually melts allowing for increased flow and, coupling this with, the natural increase in MFI caused by temperature is enhanced further. The PEG and NA addition increased dramatically the pore volume which is important for cell growth and flow transport of nutrients and metabolic waste. Copyright © 2015 Elsevier Ltd. All rights reserved.

  13. INFLUENCE OF NATURAL ADDITIVES ON PROTEIN COMPLEX OF BREAD

    Directory of Open Access Journals (Sweden)

    Dana Urminská

    2010-11-01

    Full Text Available The study focuses on researching the influence of natural additives on certain technological characteristics of mixtures used for bread production, more particularly the influence of N substances in used raw material on selected qualitative parameters of bread. The blends for bread production to be analysed were prepared by mixing wheat flour with an addition of oat, buckwheat, lentil and chickpea wholegrain flour in different portions (10, 20, 30, 40 and 50 %. The experiment showed that the addition of natural additives worsened the protein complex of the blends used in bread production (worsening also qualitative parameters known as product volume. The loaves prepared with an addition of buckwheat, oat, lentil and chickpea were evaluated to be of a lesser quality from a technological viewpoint when compared with pure wheat loaves. The lower content of gluten forming proteins and the generally changed protein composition of blends due to additives caused a lower percentage of wet gluten content, its lower extensibility and swelling capacity. The sedimentation value (Zeleny index decreased proportionally with the increase of addition until the level was unsatisfactory for raw material intended for bakery purposes. The N content in experimental loaves was higher than in the reference loaves and it increased according to the selected additive and its portion in the blend (more with the addition of lentil and chickpea, less in case of buckwheat and oat which is considered as positive from a nutritional point of view. But from the technological point of view the additives did not show any positive influence and caused a lower loaf bread volume. The most significant decrease of the loaf bread volume was found with the addition of 50 % of buckwheat (- 45.6 %. Better results were obtained with a lower portion of the additive: loaf with an addition of 30 % of chickpea (volume decreased by 12.8 % > loaf with an addition of 30 % of lentil (volume

  14. KONSEP PENYANDIAN FILE JPEG DENGAN MENGGUNAKAN METODE LSB

    Directory of Open Access Journals (Sweden)

    Haikal Nando Winata

    2017-03-01

    Full Text Available Steganography is a technique to hide text or messages that other people do not know the contents of the text or the secret message. Steganography technique is often used to avoid suspicion and to avoid other people desire to know the contents of the text or the secret message. Digital image is one of the most well-known media and the public by the author. Digital image acts as a medium or a text container you want to hide a secret message. Methods LSB (Least Significant Bit that hides the bytes of text or message you want to hide into the last byte in the digital image. LSB method has the advantage of not changing the size and shape of the digital image by naked eye, text data or messages hidden can be restored without any change in size and shape

  15. Directed Hidden-Code Extractor for Environment-Sensitive Malwares

    Science.gov (United States)

    Jia, Chunfu; Wang, Zhi; Lu, Kai; Liu, Xinhai; Liu, Xin

    Malware writers often use packing technique to hide malicious payload. A number of dynamic unpacking tools are.designed in order to identify and extract the hidden code in the packed malware. However, such unpacking methods.are all based on a highly controlled environment that is vulnerable to various anti-unpacking techniques. If execution.environment is suspicious, malwares may stay inactive for a long time or stop execution immediately to evade.detection. In this paper, we proposed a novel approach that automatically reasons about the environment requirements.imposed by malware, then directs a unpacking tool to change the controlled environment to extract the hide code at.the new environment. The experimental results show that our approach significantly increases the resilience of the.traditional unpacking tools to environment-sensitive malware.

  16. Different glassy states, as indicated by a violation of the generalized Cauchy relation

    Energy Technology Data Exchange (ETDEWEB)

    Krueger, J K [Laboratoire Europeen de Recherche Universitaire Saarland-Lorraine (LERUSL), Universitaet des Saarlandes, Fakultaet fuer Physik und Elektrotechnik 7.2, Gebaeude 38, D-66041 Saarbruecken (Germany); Britz, T [Laboratoire Europeen de Recherche Universitaire Saarland-Lorraine (LERUSL), Universitaet des Saarlandes, Fakultaet fuer Physik und Elektrotechnik 7.2, Gebaeude 38, D-66041 Saarbruecken (Germany); Coutre, A le [Laboratoire Europeen de Recherche Universitaire Saarland-Lorraine (LERUSL), Universitaet des Saarlandes, Fakultaet fuer Physik und Elektrotechnik 7.2, Gebaeude 38, D-66041 Saarbruecken (Germany); Baller, J [Laboratoire Europeen de Recherche Universitaire Saarland-Lorraine (LERUSL), Universitaet des Saarlandes, Fakultaet fuer Physik und Elektrotechnik 7.2, Gebaeude 38, D-66041 Saarbruecken (Germany); Possart, W [Universitaet des Saarlandes, Fakultaet fuer Chemie, Pharmazie und Werkstoffwissenschaften 8.15, Gebaeude 22, D-66041 Saarbruecken (Germany); Alnot, P [Laboratoire Europeen de Recherche Universitaire Saarland-Lorraine (LERUSL), Universitaet des Saarlandes, Fakultaet fuer Physik und Elektrotechnik 7.2, Gebaeude 38, D-66041 Saarbruecken (Germany); Sanctuary, R [Centre Universitaire de Luxembourg, Departement des Sciences, Laboratoire 1.19, 162a Avenue de la Faiencerie, L-1511, Luxembourg (Luxembourg)

    2003-07-01

    Using Brillouin spectroscopy as a probe for high-frequency clamped acoustic properties, a shear modulus c{sub 44}{sup {infinity}} can be measured in addition to the longitudinal modulus c{sub 11}{sup {infinity}} already well above the thermal glass transition. On slow cooling of the liquid through the thermal glass transition temperature T{sub g}, both moduli show a kink-like behaviour and the function c{sub 11}{sup {infinity}} = c{sub 11}{sup {infinity}}(c{sub 44}{sup {infinity}}) follows a generalized Cauchy relation (gCR) defined by the linear relation c{sub 11}{sup {infinity}} = 3c{sub 44}{sup {infinity}} + constant, which completely hides the glass transition. In this work we show experimentally that on fast cooling this linear transformation becomes violated within the glassy state, but that thermal ageing drives the elastic coefficients towards the gCR, i.e. towards a unique glassy state.

  17. Ring Confidential Transactions

    Directory of Open Access Journals (Sweden)

    Shen Noether

    2016-12-01

    Full Text Available This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is distributed through a proof-of-work “mining” process having no central party or trusted setup. The original Monero protocol was based on CryptoNote, which uses ring signatures and one-time keys to hide the destination and origin of transactions. Recently the technique of using a commitment scheme to hide the amount of a transaction has been discussed and implemented by Bitcoin Core developer Gregory Maxwell. In this article, a new type of ring signature, A Multilayered Linkable Spontaneous Anonymous Group signature is described which allows one to include a Pedersen Commitment in a ring signature. This construction results in a digital currency with hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation. The author would like to note that early drafts of this were publicized in the Monero Community and on the #bitcoin-wizards IRC channel. Blockchain hashed drafts are available showing that this work was started in Summer 2015, and completed in early October 2015. An eprint is also available at http://eprint.iacr.org/2015/1098.

  18. Defense.gov Special Report: Employer Support Freedom Awards

    Science.gov (United States)

    , asset management and other financial and risk management products and services. Army Reserve Col management." Navy Commander Christopher Myers, U.S. Navy Reserve More More Hide Story Hide Story , offering a wide range of health and wellness products and services incorporating an integrated, holistic

  19. A new Watermarking System based on Discrete Cosine Transform (DCT) in color biometric images.

    Science.gov (United States)

    Dogan, Sengul; Tuncer, Turker; Avci, Engin; Gulten, Arif

    2012-08-01

    This paper recommend a biometric color images hiding approach An Watermarking System based on Discrete Cosine Transform (DCT), which is used to protect the security and integrity of transmitted biometric color images. Watermarking is a very important hiding information (audio, video, color image, gray image) technique. It is commonly used on digital objects together with the developing technology in the last few years. One of the common methods used for hiding information on image files is DCT method which used in the frequency domain. In this study, DCT methods in order to embed watermark data into face images, without corrupting their features.

  20. Additive derivations on algebras of measurable operators

    International Nuclear Information System (INIS)

    Ayupov, Sh.A.; Kudaybergenov, K.K.

    2009-08-01

    Given a von Neumann algebra M we introduce the so-called central extension mix(M) of M. We show that mix(M) is a *-subalgebra in the algebra LS(M) of all locally measurable operators with respect to M, and this algebra coincides with LS(M) if and only if M does not admit type II direct summands. We prove that if M is a properly infinite von Neumann algebra then every additive derivation on the algebra mix(M) is inner. This implies that on the algebra LS(M), where M is a type I ∞ or a type III von Neumann algebra, all additive derivations are inner derivations. (author)

  1. Improving Performance of Software Implemented Floating Point Addition

    DEFF Research Database (Denmark)

    Hindborg, Andreas Erik; Karlsson, Sven

    2011-01-01

    We outline and evaluate hardware extensions to an integer processor pipeline which allow IEEE 754 oating point, FP, addition to be eciently implemented in software. With a very moderate increase in hardware resources, our perfor- mance evaluation shows that, for a benchmark that executes 12.5% FP...... addition instructions, our approach exhibits a rel- ative slowdown of 3.38 to 15.15 as compared to dedicated hardware. This is a signicant improvement of pure software emulation which leads to relative slowdowns up to 45.33....

  2. Additive manufacturing.

    Science.gov (United States)

    Mumith, A; Thomas, M; Shah, Z; Coathup, M; Blunn, G

    2018-04-01

    Increasing innovation in rapid prototyping (RP) and additive manufacturing (AM), also known as 3D printing, is bringing about major changes in translational surgical research. This review describes the current position in the use of additive manufacturing in orthopaedic surgery. Cite this article: Bone Joint J 2018;100-B:455-60.

  3. Treating shale oil to obtain sulfonates

    Energy Technology Data Exchange (ETDEWEB)

    Schaeffer, H

    1921-01-21

    The process shows as its principal characteristics: (1) treating the oil with chlorsulfonic acid at a temperature of about 100/sup 0/C; (2) the transformation of the sulfonic acid obtained into salts; (3) as new industrial products, the sulfonates obtained and their industrial application as disinfectants for hides and wood.

  4. A tool for automatic generation of RTL-level VHDL description of RNS FIR filters

    DEFF Research Database (Denmark)

    Re, Andrea Del; Nannarelli, Alberto; Re, Marco

    2004-01-01

    Although digital filters based on the Residue Number System (RNS) show high performance and low power dissipation, RNS filters are not widely used in DSP systems, because of the complexity of the algorithms involved. We present a tool to design RNS FIR filters which hides the RNS algorithms to th...

  5. Do recreation motivations and wilderness involvement relate to support for wilderness management? A segmentation analysis

    Science.gov (United States)

    Troy E. Hall; Erin Seekamp; David Cole

    2010-01-01

    Surveys show relatively little support for use restrictions to protect wilderness experiences. However, such conclusions based on aggregate data could hide important differences among visitors. Visitors with more wilderness-dependent trip motives were hypothesized to be more supportive of use restrictions. Using survey data from visitors to 13 wildernesses, cluster...

  6. Application of additive tariffs in the electricity sector

    International Nuclear Information System (INIS)

    Apolinario, I.; Felizardo, N.; Leite Garcia, A.; Oliveira, P.; Trindade, A.; Vasconcelos, J.; Verdelho, P.

    2004-01-01

    This paper presents and discusses a methodology for the calculation and application of tariffs in the electricity sector based on the principle of tariff additivity. It shows how such tariffs can reflect costs and assure the absence of cross subsidies between clients. The methodology presented was adopted in the Portuguese Tariff Code for electricity by the Portuguese Energy Regulator (ERSE). The work presented in this article reflects the experience acquired by ERSE during the preparation, discussion and implementation of that Code. Allowed revenues are determined separately for every regulated activity, assuring that there are no cross subsidies between activities. Additionally, the application of the tariff additivity principle assures the nonexistence of cross subsidies between consumers. Regulated tariffs applicable to end users of electricity are determined by summation, variable by variable, of the different activity tariffs in accordance with the services the costumer uses and in the proportion of that use. The corollary is that if the different activity tariffs are cost reflective and promote efficiency in resource allocation, the tariffs applicable to consumers (access tariffs or integral tariffs) will also reflect costs in the same manner. Therefore, besides economic efficiency, equity between non binding system consumers and binding system consumers is promoted. The examples presented in the article intend to show how additive tariffs reflect costs giving adequate economic price signals for the rational use of the networks and electric energy consumption

  7. Transfer of Training in Simple Addition.

    Science.gov (United States)

    Chen, Yalin; Campbell, Jamie I D

    2017-04-18

    In recent years several researchers have proposed that skilled adults may solve single-digit addition problems (e.g. 3 + 1 = 4, 4 + 3 = 7) using a fast counting procedure. Practicing a procedure, often leads to transfer of learning and faster performance of unpracticed items. Such transfer has been demonstrated using a counting-based alphabet arithmetic task (e.g., B + 4 = C D E F) that indicated robust generalization of practice (i.e., RT gains) when untrained transfer problems at test had been implicitly practiced (e.g., practice B + 3, test B + 2 or B + 1). Here we constructed analogous simple addition problems (practice 4 + 3, test 4 + 2 or 4 + 1). In each of three experiments (total n = 108) participants received six practice blocks followed by two test blocks of new problems to examine generalization effects. Practice of addition identity-rule problems (i.e., 0 + N = N) showed complete transfer of RT gains made during practice to unpracticed items at test. In contrast, the addition ties (2 + 2, 3 + 3, etc.) presented large RT costs for unpracticed problems at test, but sped up substantially in the second test block. This pattern is consistent with item-specific strengthening of associative memory. The critical items were small non-tie additions (sum ≤ 10) for which the test problems would be implicitly practiced if counting was employed during practice. In all three experiments (and collectively) there was no evidence of generalization for these items in the first test block, but there was robust speed up when the items were repeated in the second test block. Thus, there was no evidence of the generalization of practice that would be expected if counting procedures mediated our participants' performance on small non-tie addition problems.

  8. Anatomically ordered tapping interferes more with one-digit addition than two-digit addition: a dual-task fMRI study.

    Science.gov (United States)

    Soylu, Firat; Newman, Sharlene D

    2016-02-01

    Fingers are used as canonical representations for numbers across cultures. In previous imaging studies, it was shown that arithmetic processing activates neural resources that are known to participate in finger movements. Additionally, in one dual-task study, it was shown that anatomically ordered finger tapping disrupts addition and subtraction more than multiplication, possibly due to a long-lasting effect of early finger counting experiences on the neural correlates and organization of addition and subtraction processes. How arithmetic task difficulty and tapping complexity affect the concurrent performance is still unclear. If early finger counting experiences have bearing on the neural correlates of arithmetic in adults, then one would expect anatomically and non-anatomically ordered tapping to have different interference effects, given that finger counting is usually anatomically ordered. To unravel these issues, we studied how (1) arithmetic task difficulty and (2) the complexity of the finger tapping sequence (anatomical vs. non-anatomical ordering) affect concurrent performance and use of key neural circuits using a mixed block/event-related dual-task fMRI design with adult participants. The results suggest that complexity of the tapping sequence modulates interference on addition, and that one-digit addition (fact retrieval), compared to two-digit addition (calculation), is more affected from anatomically ordered tapping. The region-of-interest analysis showed higher left angular gyrus BOLD response for one-digit compared to two-digit addition, and in no-tapping conditions than dual tapping conditions. The results support a specific association between addition fact retrieval and anatomically ordered finger movements in adults, possibly due to finger counting strategies that deploy anatomically ordered finger movements early in the development.

  9. Digital watermarks in electronic document circulation

    Directory of Open Access Journals (Sweden)

    Vitaliy Grigorievich Ivanenko

    2017-07-01

    Full Text Available This paper reviews different protection methods for electronic documents, their good and bad qualities. Common attacks on electronic documents are analyzed. Digital signature and ways of eliminating its flaws are studied. Different digital watermark embedding methods are described, they are divided into 2 types. The solution to protection of electronic documents is based on embedding digital watermarks. Comparative analysis of this methods is given. As a result, the most convenient method is suggested – reversible data hiding. It’s remarked that this technique excels at securing the integrity of the container and its digital watermark. Digital watermark embedding system should prevent illegal access to the digital watermark and its container. Digital watermark requirements for electronic document protection are produced. Legal aspect of copyright protection is reviewed. Advantages of embedding digital watermarks in electronic documents are produced. Modern reversible data hiding techniques are studied. Distinctive features of digital watermark use in Russia are highlighted. Digital watermark serves as an additional layer of defense, that is in most cases unknown to the violator. With an embedded digital watermark, it’s impossible to misappropriate the authorship of the document, even if the intruder signs his name on it. Therefore, digital watermarks can act as an effective additional tool to protect electronic documents.

  10. CPR in medical TV shows: non-health care student perspective.

    Science.gov (United States)

    Alismail, Abdullah; Meyer, Nicole C; Almutairi, Waleed; Daher, Noha S

    2018-01-01

    There are over a dozen medical shows airing on television, many of which are during prime time. Researchers have recently become more interested in the role of these shows, and the awareness on cardiopulmonary resuscitation. Several cases have been reported where a lay person resuscitated a family member using medical TV shows as a reference. The purpose of this study is to examine and evaluate college students' perception on cardiopulmonary resuscitation and when to shock using an automated external defibrillator based on their experience of watching medical TV shows. A total of 170 students (nonmedical major) were surveyed in four different colleges in the United States. The survey consisted of questions that reflect their perception and knowledge acquired from watching medical TV shows. A stepwise regression was used to determine the significant predictors of "How often do you watch medical drama TV shows" in addition to chi-square analysis for nominal variables. Regression model showed significant effect that TV shows did change students' perception positively ( p <0.001), and they would select shock on asystole as the frequency of watching increases ( p =0.023). The findings of this study show that high percentage of nonmedical college students are influenced significantly by medical shows. One particular influence is the false belief about when a shock using the automated external defibrillator (AED) is appropriate as it is portrayed falsely in most medical shows. This finding raises a concern about how these shows portray basic life support, especially when not following American Heart Association (AHA) guidelines. We recommend the medical advisors in these shows to use AHA guidelines and AHA to expand its expenditures to include medical shows to educate the public on the appropriate action to rescue an out-of-hospital cardiac arrest patient.

  11. Semantic Web Technologies for the Adaptive Web

    DEFF Research Database (Denmark)

    Dolog, Peter; Nejdl, Wolfgang

    2007-01-01

    Ontologies and reasoning are the key terms brought into focus by the semantic web community. Formal representation of ontologies in a common data model on the web can be taken as a foundation for adaptive web technologies as well. This chapter describes how ontologies shared on the semantic web...... provide conceptualization for the links which are a main vehicle to access information on the web. The subject domain ontologies serve as constraints for generating only those links which are relevant for the domain a user is currently interested in. Furthermore, user model ontologies provide additional...... means for deciding which links to show, annotate, hide, generate, and reorder. The semantic web technologies provide means to formalize the domain ontologies and metadata created from them. The formalization enables reasoning for personalization decisions. This chapter describes which components...

  12. Anomaly Detection In Additively Manufactured Parts Using Laser Doppler Vibrometery

    Energy Technology Data Exchange (ETDEWEB)

    Hernandez, Carlos A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-09-29

    Additively manufactured parts are susceptible to non-uniform structure caused by the unique manufacturing process. This can lead to structural weakness or catastrophic failure. Using laser Doppler vibrometry and frequency response analysis, non-contact detection of anomalies in additively manufactured parts may be possible. Preliminary tests show promise for small scale detection, but more future work is necessary.

  13. Carrageenan as a dry strength additive for papermaking.

    Directory of Open Access Journals (Sweden)

    Zhenhua Liu

    Full Text Available Carrageenans are commercially important sulfated gums found in various species of red seaweeds (Rhodophyta, wherein they serve a structural function similar to that of pectins in land plants. In this study, carrageenan was used independently or in combination with cationic polyacrylamide (CPAM and/or Al2(SO43 to explore its application as a dry strength additive in papermaking. Strength index determination, ash content detection, FTIR characterization and SEM observation were performed on prepared handsheets. The results showed that with 0.6% Al2(SO43 and 0.2% carrageenan as additives, the tensile index increased by 13.53% and precipitated calcium carbonate (PCC retention increased by 57.06%. With 0.6% Al2(SO43, 0.2% carrageenan and 0.03% CPAM as additives, PCC retention increased by 121% while the tensile index did not fall compared to handsheets without additives, indicating that carrageenan could enhance the strength of handsheets and be used as an anionic dry strength agent.

  14. Laser additive manufacturing bulk graphene-copper nanocomposites.

    Science.gov (United States)

    Hu, Zengrong; Chen, Feng; Lin, Dong; Nian, Qiong; Parandoush, Pedram; Zhu, Xing; Shao, Zhuqiang; Cheng, Gary J

    2017-11-03

    The exceptional mechanical properties of graphene make it an ideal nanofiller for reinforcing metal matrix composites (MMCs). In this work, graphene-copper (Gr-Cu) nanocomposites have been fabricated by a laser additive manufacturing process. Transmission electron microscopy (TEM), x-ray diffraction (XRD) and Raman spectroscopy were utilized to characterize the fabricated nanocomposites. The XRD, Raman spectroscopy, energy dispersive spectroscopy and TEM results demonstrated the feasibility of laser additive manufacturing of Gr-Cu nanocomposites. The microstructures were characterized by high resolution TEM and the results further revealed the interface between the copper matrix and graphene. With the addition of graphene, the mechanical properties of the composites were enhanced significantly. Nanoindentation tests showed that the average modulus value and hardness of the composites were 118.9 GPa and 3 GPa respectively; 17.6% and 50% increases were achieved compared with pure copper, respectively. This work demonstrates a new way to manufacture graphene copper nanocomposites with ultra-strong mechanical properties and provides alternatives for applications in electrical and thermal conductors.

  15. Managing water addition to a degraded core

    International Nuclear Information System (INIS)

    Kuan, P.; Hanson, D.J.; Odar, F.

    1992-01-01

    In this paper the authors present information that can be used in severe accident management by providing an improved understanding of the effects of water addition to a degraded core. This improved understanding is developed using a diagram showing a sequence of core damage states. Whenever possible, a temperature and a time after accident initiation are estimated for each damage state in the sequence diagram. This diagram can be used to anticipate the evolution of events during an accident. Possible responses of plant instruments are described to identify these damage states and the effects of water addition. The rate and amount of water addition needed (a) to remove energy from the core, (b) to stabilize the core or (c) to not adversely affect the damage progression, are estimated. Analysis of the capability to remove energy from large cohesive and particulate debris beds indicates that these beds may not be stabilized in the core region and they may partially relocate to the lower plenum of the reactor vessel

  16. 40 CFR 425.02 - General definitions.

    Science.gov (United States)

    2010-07-01

    ... STANDARDS LEATHER TANNING AND FINISHING POINT SOURCE CATEGORY General Provisions § 425.02 General...) “Chrome tan” means the process of converting hide into leather using a form of chromium. (g) “Vegetable tan” means the process of converting hides into leather using chemicals either derived from vegetable...

  17. Additive Manufacturing Cloud via Peer-Robot Collaboration

    Directory of Open Access Journals (Sweden)

    Yuan Yao

    2016-05-01

    Full Text Available When building a 3D printing cloud manufacturing platform, self-sensing and collaboration on manufacturing resources present challenging problems. This paper proposes a peer-robot collaboration framework to deal with these issues. Each robot combines heterogeneous additive manufacturing hardware and software, acting as an intelligent agent. Through collaboration with other robots, it forms a dynamic and scalable integration manufacturing system. The entire distributed system is managed by rules that employ an internal rule engine, which supports rule conversion and conflict resolution. Two additive manufacturing service scenarios are designed to analyse the efficiency and scalability of the framework. Experiments show that the presented method performs well in tasks requiring large-scale access to resources and collaboration.

  18. Effects of sulphur addition on modification and mechanical ...

    African Journals Online (AJOL)

    CW Onyia, BA Okorie, NI Amalu, SI Neife ... The results showed that the addition of sulphur to Al-12wt%Si alloy modified the Al-Si eutectic ... of the eutectic silicon structure with significant decrease in mechanical properties of the alloy and this ...

  19. Prevalence of Escherichia coli O157:H7 and Salmonella in camels, cattle, goats, and sheep harvested for meat in Riyadh.

    Science.gov (United States)

    Bosilevac, Joseph M; Gassem, Mustafa A; Al Sheddy, Ibraheem A; Almaiman, Salah A; Al-Mohizea, Ibrahim S; Alowaimer, Abdullah; Koohmaraie, Mohammad

    2015-01-01

    Escherichia coli O157:H7 and Salmonella are significant foodborne pathogens that can be found in the feces and on the hides of meat animals. When hides are removed during the harvest process, the carcass and subsequent meat products can become contaminated. Camels, cattle, sheep, and goats are harvested for meat in Riyadh, Saudi Arabia. The prevalence of E. coli O157:H7 and Salmonella are unknown in these animals, and it is assumed that if the animals carry the pathogens in their feces or on their hides, meat products are likely to become contaminated. To this end, a minimum of 206 samples each from hides and feces of camels, cattle, goats, and sheep were collected over the course of 8 months and tested for E. coli O157:H7 and Salmonella. It was found that E. coli O157:H7 was present in feces (10.7, 1.4, 2.4, and 2.4%) and on hides (17.9, 8.2, 2.9, and 9.2%) of cattle, goats, camels, and sheep, respectively. The prevalence of Salmonella was 11.2, 13.5, 23.2, and 18.8% in feces and 80.2, 51.2 67.6, and 60.2% on hides of cattle, goats, camels, and sheep, respectively. The prevalence of E coli O157:H7 was nearly zero in all samples collected in June and July, while Salmonella did not exhibit any seasonal variation. These results constitute the first comprehensive study of E. coli O157:H7 and Salmonella prevalence in Saudi Arabian meat animals at harvest.

  20. DUST AND INFRARED IMAGING OF POLAR RING GALAXIES

    NARCIS (Netherlands)

    ARNABOLDI, M; FREEMAN, KC; SACKETT, PD; SPARKE, LS; CAPACCIOLI, M

    1995-01-01

    We have derived surface photometry for a sample of five polar ring(PR) galaxies in the optical (B and R bands) and in the near-IR (K band). Our preliminary results show that the morphology of these objects is heavily perturbed by dust, which sometimes completely hides the real distribution of the

  1. Vacuum pyrolysis of waste tires with basic additives

    International Nuclear Information System (INIS)

    Zhang Xinghua; Wang Tiejun; Ma Longlong; Chang Jie

    2008-01-01

    Granules of waste tires were pyrolyzed under vacuum (3.5-10 kPa) conditions, and the effects of temperature and basic additives (Na 2 CO 3 , NaOH) on the properties of pyrolysis were thoroughly investigated. It was obvious that with or without basic additives, pyrolysis oil yield increased gradually to a maximum and subsequently decreased with a temperature increase from 450 deg. C to 600 deg. C, irrespective of the addition of basic additives to the reactor. The addition of NaOH facilitated pyrolysis dramatically, as a maximal pyrolysis oil yield of about 48 wt% was achieved at 550 deg. C without the addition of basic additives, while a maximal pyrolysis oil yield of about 50 wt% was achieved at 480 deg. C by adding 3 wt% (w/w, powder/waste tire granules) of NaOH powder. The composition analysis of pyrolytic naphtha (i.b.p. (initial boiling point) ∼205 deg. C) distilled from pyrolysis oil showed that more dl-limonene was obtained with basic additives and the maximal content of dl-limonene in pyrolysis oil was 12.39 wt%, which is a valuable and widely-used fine chemical. However, no improvement in pyrolysis was observed with Na 2 CO 3 addition. Pyrolysis gas was mainly composed of H 2 , CO, CH 4 , CO 2 , C 2 H 4 and C 2 H 6 . Pyrolytic char had a surface area comparable to commercial carbon black, but its proportion of ash (above 11.5 wt%) was much higher

  2. A high capacity text steganography scheme based on LZW compression and color coding

    Directory of Open Access Journals (Sweden)

    Aruna Malik

    2017-02-01

    Full Text Available In this paper, capacity and security issues of text steganography have been considered by employing LZW compression technique and color coding based approach. The proposed technique uses the forward mail platform to hide the secret data. This algorithm first compresses secret data and then hides the compressed secret data into the email addresses and also in the cover message of the email. The secret data bits are embedded in the message (or cover text by making it colored using a color coding table. Experimental results show that the proposed method not only produces a high embedding capacity but also reduces computational complexity. Moreover, the security of the proposed method is significantly improved by employing stego keys. The superiority of the proposed method has been experimentally verified by comparing with recently developed existing techniques.

  3. Serotonin Transporter Knockout Rats Show Improved Strategy Set-Shifting and Reduced Latent Inhibition

    Science.gov (United States)

    Nonkes, Lourens J. P.; van de Vondervoort, Ilse I. G. M.; de Leeuw, Mark J. C.; Wijlaars, Linda P.; Maes, Joseph H. R.; Homberg, Judith R.

    2012-01-01

    Behavioral flexibility is a cognitive process depending on prefrontal areas allowing adaptive responses to environmental changes. Serotonin transporter knockout (5-HTT[superscript -/-]) rodents show improved reversal learning in addition to orbitofrontal cortex changes. Another form of behavioral flexibility, extradimensional strategy set-shifting…

  4. effects of sulphur addition on addition on and mechanical properties

    African Journals Online (AJOL)

    User

    234-8034714355. 8034714355. 1. EFFECTS OF SULPHUR ADDITION ON. ADDITION ON. 2. AND MECHANICAL PROPERTIES O. 3. 4. C. W. Onyia. 5. 1DEPT. OF METALLURGICAL AND MATERIALS. 6. 2, 4DEPT. OF METALLURGICAL ...

  5. Was it for walrus? Viking Age settlement and medieval walrus ivory trade in Iceland and Greenland

    DEFF Research Database (Denmark)

    Frei, Karin M.; Coutu, Ashley N.; Smiarowski, Konrad

    2015-01-01

    Walrus-tusk ivory and walrus-hide rope were highly desired goods in Viking Age north-west Europe. New finds of walrus bone and ivory in early Viking Age contexts in Iceland are concentrated in the south-west, and suggest extensive exploitation of nearby walrus for meat, hide and ivory during the ...

  6. 40 CFR 432.107 - Effluent limitations attainable by the application of the best control technology for...

    Science.gov (United States)

    2010-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS MEAT... BOD5 and TSS specified in paragraph (a) of this section were derived for a renderer which does not cure cattle hide. If a renderer does cure hide, the following formulas should be used to calculate BOD5 and...

  7. An ancient Maya ritual cache at Pook's Hill, Belize

    DEFF Research Database (Denmark)

    Stemp, W. James; Braswell, Geoffrey E.; Helmke, Christophe

    2018-01-01

    , the edge and surface wear on most of the used obsidian blades are consistent with other functions, including cutting meat/skin/fresh hide, cutting or sawing wood and dry hide, cutting or sawing other soft and hard materials, and scraping hard materials. Clearly, not all blades from this ritual deposit were...

  8. Changes of Properties of Bitumen Binders by Additives Application

    Science.gov (United States)

    Remišová, Eva; Holý, Michal

    2017-10-01

    Requirements for properties of bituminous binders are determined in the European standards. The physico-chemical behaviour of bitumen depends on its colloidal structure (asphaltenes dispersed into an oily matrix constituted by saturates, aromatics and resins) that depends primarily on its crude source and processing. Bitumen properties are evaluated by group composition, elementary analysis, but more often conventional or functional tests. Bitumen for road uses is assessed according to the physical characteristics. For the purpose of improving the qualitative properties of bitumen and asphalts the additives are applied e.g. to increase elasticity, improving the heat stability, improving adhesion to aggregate, to decrease viscosity, increasing the resistance to aging, to prevent binder drainage from the aggregate surface, etc. The objective of presented paper is to assess and compare effect of additives on properties of bitumen binders. In paper, the results of bitumen properties, penetration, softening point, and dynamic viscosity of two paving grade bitumen 35/50, 50/70 and polymer modified bitumen PmB 45/80-75 are analyzed and also the changes of these properties by the application of selected additives (Sasobit, Licomont BS100, Wetfix BE and CWM) to improve adhesion to aggregate and improve workability. Measurements of properties have been performed according to the relevant European standards. The laboratory tests showed significantly increasing the softening point of paving grade bitumen 50/70 and 35/50 by 13 to 45°C. The effect of various additives on bitumen softening point is different. Penetration varies according to type of bitumen and type of used additive. The penetration values of modified bitumen PmB 45/80-75 with additives Sasobit and Licomont BS100 show increase of bitumen stiffness of 16 0.1mm and a shift in the gradation. The changes in penetration and in softening point significantly shown when calculating on Penetration index as a parameter of

  9. Interfacial Microstructure and Properties of Steel/Aluminum Powder Additive

    Directory of Open Access Journals (Sweden)

    YUAN Jiang

    2017-09-01

    Full Text Available Based on first-principles density functional theory, the Fe/Al interface model of steel/aluminum laser welding was constructed by layer technique. The Fe/Al interface was studied by metal atom X (X=Sn, Sr, Zr, Ce, La.The results show that Sn, Sr and Ce preferentially displace the Al atoms at the Fe/Al interface, while La and Zr preferentially displace the Fe atoms at the Fe/Al interface. Alloying promotes the transfer of Fe/Al interfacial electrons between different orbits, enhances the ionic bond properties of Fe-Al, improves the Fe/Al interface binding capacity, improves the brittle fracture of Fe/Al interface, and the alloying effect of Sn most notable. On the basis of this, the laser lap welding test of Sn and Zr powder was carried out on 1.4mm thick DC51D+ZF galvanized steel and 1.2mm thick 6016 aluminum alloy specimen. The results show that the addition of powder can promote the flowability of the molten bath and change the composition and microstructure of the joint interface. The tensile strength of the steel/aluminum joint is 327.41MPa and the elongation is 22.93% with the addition of Sn powder, which is obviously improved compared with the addition of Zr powder and without the addition of powder.

  10. Fascioperichondrial Flap with a Proximal Base Combined with Prominent Ear Surgery

    Directory of Open Access Journals (Sweden)

    Heval Selman Özkan

    2017-08-01

    Full Text Available Objective: In this article, we present a personalized surgical technique to relocate a fascioperichondrial flap with a proximal base as an additional measure to improve results and hide sharp edges which frequently occur following traditional otoplasty. Materials and Methods: Fascioperichondrial flap with a proximal base prepared from the dorsal side was transposed to the anterior helix and conchal excision side and secured with stitches to hide visible edges and reinforce Furnas sutures. Nine patients operated for prominent ear deformity using this modification were included in the study and follow-up period was at least 6 months. Conchal mastoid distances were calculated from the superior and middle third of the ears before and after the operation, also in follow-up controls to determine the efficiency of the method. Results: There were no suture extrusions, skin necrosis or infection. The mean difference for both the upper and middle third of the ears were considerably lower (p≤0.05 at the end of six month after the operation. There were no visible skin edges and discomfort described by the patients. Conclusion: Fascioperichondrial flap with a proximal base repositioning to conchal side is an easy procedure that can be applied simply as an adjunct to traditional techniques. Addition of this flap provides an additional tissue to reinforce suture repair and, the results seem to be more durable and strong. Another main advantage of this flap is eliminating the unnatural visible breakpoints in the conchal bowl.

  11. Synthetic Aperture Radar Data Processing on an FPGA Multi-Core System

    DEFF Research Database (Denmark)

    Schleuniger, Pascal; Kusk, Anders; Dall, Jørgen

    2013-01-01

    on an FPGA. The fabric consisting of 64 processor cores and 2D mesh interconnect utilizes 60% of the hardware resources of a Xilinx Virtex-7 device with 550 thousand logic cells and consumes about 10 watt. We apply software pipelining to hide memory latency and reduce the hardware footprint by 14%. We show...

  12. Additive recovery of lateral boundaries of grains under electronic exposure

    International Nuclear Information System (INIS)

    Postnikov, D.V.; Plotnikov, S.V.

    2002-01-01

    The experimental investigation of additive re-distribution under electronic beam revealed a recovery of the additive at grain boundaries. Additive accumulation mainly takes place at the boundaries that are perpendicular to material surface, whereas there is no an observed recovery of additive at the boundaries that are parallel to the surface. The additive recovery is caused by spot fault gradients near the grain boundary. The grain boundary is an intensive run-off region of vacancies. Therefore, the average vacancy distribution profile near the grain boundary changes its pattern. The above case indicates that there are two additive fluxes. One of them is vectored perpendicular to the surface, and the other one is parallel to it, i. e. it is vectored to the grain boundary. A study of the perpendicular and parallel boundaries shows that there is no additive settling at the boundaries that are parallel to the surface, since the general flux is vectored to the parallel boundaries. There is no such kind of phenomenon at the grain boundaries that are perpendicular to the surface. Besides, the perpendicular boundaries are more effective run-off regions for vacancies, since there is a slower build-up of the region with vacancies due to displacement of the vacancies to the surface. To compute concentration of vacancies we will consider a grain of the surface as a model. The computations indicate the presence of vacancy gradients vectored to the surface and grain boundaries, which are perpendicular to the surface. Comparison of the experimental and theoretical outcomes shows a good agreement between the theoretical model and actual processes occurring under the exposure. This theory disclose wide potentials for application of diffusion processes in alloys

  13. Hanseniaspora uvarum from winemaking environments show spatial and temporal genetic clustering

    Directory of Open Access Journals (Sweden)

    Warren eAlbertin

    2016-01-01

    Full Text Available Hanseniaspora uvarum is one of the most abundant yeast species found on grapes and in grape must, at least before the onset of alcoholic fermentation which is usually performed by Saccharomyces species. The aim of this study was to characterise the genetic and phenotypic variability within the H. uvarum species. One hundred and fifteen strains isolated from winemaking environments in different geographical origins were analysed using 11 microsatellite markers and a subset of 47 strains were analysed by AFLP. H. uvarum isolates clustered mainly on the basis of their geographical localisation as revealed by microsatellites. In addition, a strong clustering based on year of isolation was evidenced, indicating that the genetic diversity of Hanseniaspora uvarum isolates was related to both spatial and temporal variations. Conversely, clustering analysis based on AFLP data provided a different picture with groups showing no particular characteristics, but provided higher strain discrimination. This result indicated that AFLP approaches are inadequate to establish the genetic relationship between individuals, but allowed good strain discrimination. At the phenotypic level, several extracellular enzymatic activities of enological relevance (pectinase, chitinase, protease, β-glucosidase were measured but showed low diversity. The impact of environmental factors of enological interest (temperature, anaerobia and copper addition on growth was also assessed and showed poor variation. Altogether, this work provided both new analytical tool (microsatellites and new insights into the genetic and phenotypic diversity of H. uvarum, a yeast species that has previously been identified as a potential candidate for co-inoculation in grape must, but whose intraspecific variability had never been fully assessed.

  14. Life cycle assessment and additives: state of knowledge

    DEFF Research Database (Denmark)

    is to identify research needs within this area focusing on both risk assessment (RA) and life cycle assessment (LCA). Besides the sectors on paper and plastics also lubricants, textiles, electronics and leather are included in RiskCycle. On plastics a literature review regarding the state of knowledge......Concerns about possible toxic effects from additives/impurities accumulated in globally recycled waste/resources like paper and plastics was one of the main reasons for starting up the EU FP7 Coordination Action project RiskCycle (www.wadef.com/projects/riskcycle). A key aim of the project...... on additives/impurities in LCA has been performed within RiskCycle. Several inventory databases (LCI data) have been investigated and the result shows that most LCI databases use PlasticsEurope data for plastics production. Most of these data are aggregated and do not include additives. Regarding...

  15. Organogermanium Chemistry: Germacyclobutanes and digermane Additions to Acetylenes

    Energy Technology Data Exchange (ETDEWEB)

    Chubb, Andrew Michael [Iowa State Univ., Ames, IA (United States)

    2003-01-01

    This dissertation comprises two main research projects. The first project, presented in Chapter 1, involves the synthesis and thermochemistry of germacyclobutanes (germetanes). Four new germetanes (spirodigermetane, diallylgermetane, dichlorogermetane, and germacyclobutane) have been synthesized using a modified di-Grignard synthesis. Diallylgermetane is shown to be a useful starting material for obtaining other germetanes, particularly the parent germetane, germacyclobutane. The gas-phase thermochemistries of spirodigermetane, diallylgermetane and germacyclobutane have been explored via pulsed stirred-flow reactor (SFR) studies, showing remarkable differences in decomposition, depending on the substitution at the germanium atom. The second project investigates the thermochemical, photochemical, and catalytic additions of several digermanes to acetylenes. The first examples of thermo- and photochemical additions of Ge-Ge bonds to C{triple_bond}C are demonstrated. Mechanistic investigations are described and comparisons are made to analogous disilane addition reactions, previously studied in their group.

  16. Children Who Are Hearing Impaired with Additional Disabilities and Related Aspects of Parental Stress.

    Science.gov (United States)

    Hintermair, Manfred

    2000-01-01

    In this German study, 317 parents of children with hearing impairments and additional disabilities completed both the Parenting Stress Index and an additional questionnaire on demographics and related information. Analysis showed consistently high stress scores in the Child Domain, whereas the Parent Domain showed only a slight tendency toward…

  17. On self-exciting coupled Faraday disk homopolar dynamos driving series motors

    Science.gov (United States)

    Moroz, Irene M.; Hide, Raymond; Soward, Andrew M.

    1998-06-01

    We present the results of a preliminary analytical and numerical study of one of the simpler members of a hierarchy of N (where N ≥ 1) coupled self-exciting Faraday disk homopolar dynamos, incorporating motors as additional electrical elements driven by the dynamo-generated current, as proposed by Hide (1997). The hierarchy is a generalisation of a single disk dynamo ( N = 1) with just one electric motor in the system, and crucially, incorporating effects due to mechanical friction in both the disk and the motor, as investigated by Hide et al. (1996). This is describable by a set of three coupled autonomous nonlinear ordinary differential equations, which, due to the presence of the motor, has solutions corresponding to co-existing periodic states of increasing complexity, as well as to chaotic dynamics. We consider the case of two such homopolar dynamos ( N = 2) with generally dissimilar characteristics but coupled together magnetically, with the aim of determining the extent to which this coupled system differs in its behaviour from the single disk dynamo with a series motor (Hide et al. 1996). In the case when the units are identical, the behaviour of the double dynamo system (after initial transients have decayed away) is identical to that of the single dynamo system, with solutions (including “synchronised chaos”) locked in both amplitude and phase. When there is no motor in the system and the coefficient of mechanical friction in the disks is small, these transients resemble the well-known ‘non-synchronous’, but structurally unstable Rikitake solution.

  18. Evaluation of additional biogeochemical impacts on mitigation pathways in an energy sytem integrated assessment model.

    Science.gov (United States)

    Dessens, O.

    2017-12-01

    Within the last IPCC AR5 a large and systematic sensitivity study around available technologies and timing of policies applied in IAMs to achieve the 2°C target has been conducted. However the simple climate representations included in IAMs are generally tuned to the results of ensemble means. This may result in hiding within the ensemble mean results possible challenging mitigation pathways for the economy or the technology future scenarios. This work provides new insights on the sensitivity of the socio-economic response to different climate factors under a 2°C climate change target in order to help guide future efforts to reduce uncertainty in the climate mitigation decisions. The main objective is to understand and bring new insights on how future global warming will affect the natural biochemical feedbacks on the climate system and what could be the consequences of these feedbacks on the anthropogenic emission pathways with a specific focus on the energy-economy system. It specifically focuses on three issues of the climate representation affecting the energy system transformation and GHG emissions pathways: 1- Impacts of the climate sensitivity (or TCR); 2- Impacts of warming on the radiative forcing (cloudiness,...); 3- Impacts of warming on the carbon cycle (carbon cycle feedback). We use the integrated assessment model TIAM-UCL to examine the mitigation pathways compatible with the 2C target depending on assumptions regarding the 3 issues of the climate representation introduced above. The following key conclusions drawn from this study are that mitigation to 2°C is still possible under strong climate sensitivity (TCR), strong carbon cycle amplification or positive radiative forcing feedback. However, this level of climate mitigation will require a significant transformation in the way we produce and consume energy. Carbon capture and sequestration on electricity generation, industry and biomass is part of the technology pool needed to achieve this

  19. Stabilized zirconia with cerium and neodymium addition

    International Nuclear Information System (INIS)

    Andrade, I.M. de; Pessoa, R.C.; Nasar, M.C.; Nasar, R.S.; Rodriques, M.K.C.; Oliveira, J.F.

    2006-01-01

    Zr 0,9 Ce 0,05 Nd 0,05 O 1,975 system was synthesized with the use of the Pechini method. The polymeric resin was calcined at 350 deg C/3 h and analysed by FTIR that show bands relative to organic. Radicals esther type. The TGA curve indicated the polymeric decomposition occurring from 30 deg C to 740 deg C. DTA analysis show a exothermic peak in 100 deg C due to loss of water of material. From 500 deg C to 800 deg C was observed a intense peak due to polymer decomposition and the zirconia crystallization. The calcined powder from 350 deg C/3 h e 30 min to 900 deg/3 h were analysed by XRD that show the crystalline phase formation with the increase of temperature. The X-ray diffraction pattern show the presence of two phases, such as tetragonal and cubic of zirconia demonstrating that neodymium and cerium additions led to zirconia stabilization. (author)

  20. Molecular dynamics simulation of three plastic additives' diffusion in polyethylene terephthalate.

    Science.gov (United States)

    Li, Bo; Wang, Zhi-Wei; Lin, Qin-Bao; Hu, Chang-Ying

    2017-06-01

    Accurate diffusion coefficient data of additives in a polymer are of paramount importance for estimating the migration of the additives over time. This paper shows how this diffusion coefficient can be estimated for three plastic additives [2-(2'-hydroxy-5'-methylphenyl) (UV-P), 2,6-di-tert-butyl-4-methylphenol (BHT) and di-(2-ethylhexyl) phthalate (DEHP)] in polyethylene terephthalate (PET) using the molecular dynamics (MD) simulation method. MD simulations were performed at temperatures of 293-433 K. The diffusion coefficient was calculated through the Einstein relationship connecting the data of mean-square displacement at different times. Comparison of the diffusion coefficients simulated by the MD simulation technique, predicted by the Piringer model and experiments, showed that, except for a few samples, the MD-simulated values were in agreement with the experimental values within one order of magnitude. Furthermore, the diffusion process for additives is discussed in detail, and four factors - the interaction energy between additive molecules and PET, fractional free volume, molecular shape and size, and self-diffusion of the polymer - are proposed to illustrate the microscopic diffusion mechanism. The movement trajectories of additives in PET cell models suggested that the additive molecules oscillate slowly rather than hopping for a long time. Occasionally, when a sufficiently large hole was created adjacently, the molecule could undergo spatial motion by jumping into the free-volume hole and consequently start a continuous oscillation and hop. The results indicate that MD simulation is a useful approach for predicting the microstructure and diffusion coefficient of plastic additives, and help to estimate the migration level of additives from PET packaging.

  1. Fatigue crack propagation in additively manufactured porous biomaterials.

    Science.gov (United States)

    Hedayati, R; Amin Yavari, S; Zadpoor, A A

    2017-07-01

    Additively manufactured porous titanium implants, in addition to preserving the excellent biocompatible properties of titanium, have very small stiffness values comparable to those of natural bones. Although usually loaded in compression, biomedical implants can also be under tensional, shear, and bending loads which leads to crack initiation and propagation in their critical points. In this study, the static and fatigue crack propagation in additively manufactured porous biomaterials with porosities between 66% and 84% is investigated using compact-tension (CT) samples. The samples were made using selective laser melting from Ti-6Al-4V and were loaded in tension (in static study) and tension-tension (in fatigue study) loadings. The results showed that displacement accumulation diagram obtained for different CT samples under cyclic loading had several similarities with the corresponding diagrams obtained for cylindrical samples under compression-compression cyclic loadings (in particular, it showed a two-stage behavior). For a load level equaling 50% of the yield load, both the CT specimens studied here and the cylindrical samples we had tested under compression-compression cyclic loading elsewhere exhibited similar fatigue lives of around 10 4 cycles. The test results also showed that for the same load level of 0.5F y , the lower density porous structures demonstrate relatively longer lives than the higher-density ones. This is because the high bending stresses in high-density porous structures gives rise to local Mode-I crack opening in the rough external surface of the struts which leads to quicker formation and propagation of the cracks. Under both the static and cyclic loading, all the samples showed crack pathways which were not parallel to but made 45 ° angles with respect to the notch direction. This is due to the fact that in the rhombic dodecahedron unit cell, the weakest struts are located in 45 ° direction with respect to the notch direction

  2. Identification of irradiated food additives by photostimulated luminescence (PSL) method

    International Nuclear Information System (INIS)

    Yun, Hye Jeong; Kwon, Joong Ho; KIm, Dong Ho; Hur, Jung Mu; Yang, Suh Yung; Lee, Byoung Hun

    2008-01-01

    Photostimulated luminescence (PSL), electron spin resonance (ESR) and thermoluminescence (TL) analyses were conducted to detect whether 258 kinds of extracted and powdered forms food additives were irradiated or not. In a view of the PSL results, 9 kinds of the extracted and powdered samples (3.2%) showed over 5,000 photon counts (60 sec) -1 and these samples were judged to be irradiation-positive. Thirty nine kinds of the samples (15.6%) yielded 700-5,000 photon counts (60 sec) -1 and these samples were grouped into irradiation-potential, while the samples showed below 700 photon counts (60 sec) -1 sec were judged to be irradiation-negative. TL glow curves for minerals separated from 5 samples were detected at 150 degrees C with high intensity. However, TL analysis did not apply to other irradiation-positive and irradiation-potential samples because the minerals for TL detection were not separated from the samples. ESR measurements for irradiation-positive and irradiation-potential samples, judged by PSL detection, showed no specific signals to irradiation. The results indicated that PSL could be applied to identify irradiation treatment of extracted and powdered food additives, while TL was optional and ESR was not suitable for detection extracted and powdered food additives

  3. Tokyo Motor Show 2003; Tokyo Motor Show 2003

    Energy Technology Data Exchange (ETDEWEB)

    Joly, E.

    2004-01-01

    The text which follows present the different techniques exposed during the 37. Tokyo Motor Show. The report points out the great tendencies of developments of the Japanese automobile industry. The hybrid electric-powered vehicles or those equipped with fuel cells have been highlighted by the Japanese manufacturers which allow considerable budgets in the research of less polluting vehicles. The exposed models, although being all different according to the manufacturer, use always a hybrid system: fuel cell/battery. The manufacturers have stressed too on the intelligent systems for navigation and safety as well as on the design and comfort. (O.M.)

  4. An automated radiological survey method for performing site remediation and decommissioning

    International Nuclear Information System (INIS)

    Handy, R.G.; Bolch, W.E.; Harder, G.F.; Tolaymat, T.M.

    1994-01-01

    A portable, computer-based method of performing environmental monitoring and assessment for site remediation and decommissioning has been developed. The integrated system has been developed to provide for survey time reductions and real-time data analysis. The technique utilizes a notebook 486 computer with the necessary hardware and software components that makes it possible to be used in an almost unlimited number of environmental monitoring and assessment scenarios. The results from a pilot, open-quotes hide-and-seekclose quotes gamma survey and an actual alpha decontamination survey were elucidated. It was found that a open-quotes hide-and-seekclose quotes survey could come up with timely and accurate conclusions about the position of the source. The use of the automated system in a Th-232 alpha survey resulted in a reduction in the standard time necessary to do a radiological survey. In addition, the ability to analyze the data on-site allowed for identification and location of areas which needed further decontamination. Finally, a discussion on possible future improvements and field conclusions was made

  5. Investigation of bifunctional ester additives for methanol-gasoline system

    International Nuclear Information System (INIS)

    Zhang, J.; Yang, C.; Tang, Y.; Du, Q.; Song, N.; Zhang, Z.

    2014-01-01

    To explore new and multifunctional additives for methanol-gasoline, tartaric ester were synthesized and screened as phase stabilizer and saturation vapor pressure depressor for methanol-gasoline. The effect of the esters structure on the efficiency was discussed. The results show that the stabilities of the blends depend on the length of the glycolic esters alkoxy group. In addition, the tartaric esters also can depress the saturation vapor pressure of methanol-gasoline effectively in M15. Effect of the structure on the efficiency was also discussed. (author)

  6. Nash Stability in Additively Separable Hedonic Games and Community Structures

    DEFF Research Database (Denmark)

    Olsen, Martin

    2009-01-01

      We prove that the problem of deciding whether a Nash stable   partition exists in an Additively Separable Hedonic Game is   NP-complete. We also show that the problem of deciding whether a   non trivial Nash stable partition exists in an   Additively Separable Hedonic Game with   non......-negative and symmetric   preferences is NP-complete. We motivate our study of the   computational complexity by linking Nash stable partitions in   Additively Separable Hedonic Games to community structures in   networks. Our results formally justify that computing community   structures in general is hard....

  7. Regional savings bank Oldenburg heats and cools with geothermal energy. Temperation of buildings supports real smartness of architecture; Landessparkasse zu Oldenburg heizt und kuehlt mit Geothermie. Gebaeudetemperierung unterstuetzt sachliche Eleganz der Architektur

    Energy Technology Data Exchange (ETDEWEB)

    Schmid, Wolfgang

    2010-02-15

    Clear lines and real elegance on the basis of a well-contrived scanning system mark the new building of the regional savings bank Oldenburg (Federal Republic of Germany). The minimalistic style of the new centre also repeats itself in the selection of temperation system for buildings being hided quasi invisibly in the floor. In addition, the linear grating of the underfloor panel convectors along the external walls accentuate the clear lines of architecture and set own accents.

  8. Characterization of Starch Edible Films with Different Essential Oils Addition

    Directory of Open Access Journals (Sweden)

    Šuput Danijela

    2016-12-01

    Full Text Available This study investigated properties of starch-based edible films with oregano and black cumin essential oil addition. Essential oils addition positively affected film swelling (decreased due to essential oil addition, mechanical properties (tensile strength decreased while elongation at break increased, and water vapor barrier properties (decreased along with essential oils addition. Control film did not have any biological activity, which proves the need for essential oils addition in order to obtain active packaging. Oregano oil was more effective in terms of biological activity. Endothermal peak, above 200°C, represents total thermal degradation of edible films. Diffraction pattern of control film showed significant destruction of A-type crystal structure. Addition of essential oils resulted in peak shape change: diffraction peaks became narrower. Principal Component Analysis has been used to assess the effect of essential oils addition on final starch-based edible films characteristics with the aim to reveal directions for the film characteristics improvement, since the next phase will be optimal film application for food packaging.

  9. Utilization of curve offsets in additive manufacturing

    Science.gov (United States)

    Haseltalab, Vahid; Yaman, Ulas; Dolen, Melik

    2018-05-01

    Curve offsets are utilized in different fields of engineering and science. Additive manufacturing, which lately becomes an explicit requirement in manufacturing industry, utilizes curve offsets widely. One of the necessities of offsetting is for scaling which is required if there is shrinkage after the fabrication or if the surface quality of the resulting part is unacceptable. Therefore, some post-processing is indispensable. But the major application of curve offsets in additive manufacturing processes is for generating head trajectories. In a point-wise AM process, a correct tool-path in each layer can reduce lots of costs and increase the surface quality of the fabricated parts. In this study, different curve offset generation algorithms are analyzed to show their capabilities and disadvantages through some test cases and improvements on their drawbacks are suggested.

  10. Information Hiding: an Annotated Bibliography

    National Research Council Canada - National Science Library

    Anderson, Ross

    1999-01-01

    ... so. These steganography, copyright marking, the study of covert channels in operating systems, low-probability of intercept communications, and the study of subliminal channels in digital signature schemes...

  11. Information Hiding: an Annotated Bibliography

    Science.gov (United States)

    1999-04-13

    www.springer.de/catalog/html-files/deutsch/comp/3540619968. html>. [325] 063213, ‘A Multiversion Transaction Scheduler for Centralized Multilevel Se- cure...an MLS DBMS. The authors pro- pose getting around these problems by using multiversion schedulers. An abstract model is developed and shown to

  12. Hiding Crimes in Cyberspace (PREPRINT)

    National Research Council Canada - National Science Library

    Denning, Dorothy E; Baugh, Jr, William E

    1999-01-01

    .... Individuals need it to protect their private communications and confidential data. Encryption is critical to building a secure and trusted global information infrastructure for communications and electronic commerce...

  13. Ductility and fracture of single crystaliine Ni3Al with boron additions

    International Nuclear Information System (INIS)

    Heredia, F.E.; Pope, D.P.

    1989-01-01

    Low and high temperature tensile tests were performed on single crystals of pure Ni 3 Al and Ni 3 Al+B in order to determine the effect of B additions on the ductility and fracture behavior. Tests were carried out in air at a constant strain rate of 1/3 x 10 -3 s -1 . The orientation tested were [001] for whic the yield stress in tension is always greater than in compression, and those for wich the tension/compression asymmetry is zero ([T=C]) for each particular composition. At room temperature, the results show a positive effect of B additions on both the fracture stress and on the ductility. The ductility at 800K appears to decrease monotonically with B additions. The largest ductilities are found for [T=C] at room temperature where an improvement of about 26% (resolved strain) for an addition of 0.2 at % B was obtained. However, the most dramatic increase in ductility occurs for the [001] oriented samples at room temperature where a 55% improvement was measured over that of pure Ni 3 Al. Fracture surfaces show a combinaton of massive slip, some clevage, and heavily dimpled areas. These observations show that B additions not only increase the ductility of polycrystalline Ni 3 Al, as has been previously observed by many investigators, but also that the already-ductile single crystalline material, indicating that a bulk effect should be added to the grain boundary strengthening effect of B when explaining the improvement in ductility of polycrystalline Ni 3 Al due to B additions

  14. Characterization of Metal Powders Used for Additive Manufacturing.

    Science.gov (United States)

    Slotwinski, J A; Garboczi, E J; Stutzman, P E; Ferraris, C F; Watson, S S; Peltz, M A

    2014-01-01

    Additive manufacturing (AM) techniques can produce complex, high-value metal parts, with potential applications as critical parts, such as those found in aerospace components. The production of AM parts with consistent and predictable properties requires input materials (e.g., metal powders) with known and repeatable characteristics, which in turn requires standardized measurement methods for powder properties. First, based on our previous work, we assess the applicability of current standardized methods for powder characterization for metal AM powders. Then we present the results of systematic studies carried out on two different powder materials used for additive manufacturing: stainless steel and cobalt-chrome. The characterization of these powders is important in NIST efforts to develop appropriate measurements and standards for additive materials and to document the property of powders used in a NIST-led additive manufacturing material round robin. An extensive array of characterization techniques was applied to these two powders, in both virgin and recycled states. The physical techniques included laser diffraction particle size analysis, X-ray computed tomography for size and shape analysis, and optical and scanning electron microscopy. Techniques sensitive to structure and chemistry, including X-ray diffraction, energy dispersive analytical X-ray analysis using the X-rays generated during scanning electron microscopy, and X-Ray photoelectron spectroscopy were also employed. The results of these analyses show how virgin powder changes after being exposed to and recycled from one or more Direct Metal Laser Sintering (DMLS) additive manufacturing build cycles. In addition, these findings can give insight into the actual additive manufacturing process.

  15. Characterization of Metal Powders Used for Additive Manufacturing

    Science.gov (United States)

    Slotwinski, JA; Garboczi, EJ; Stutzman, PE; Ferraris, CF; Watson, SS; Peltz, MA

    2014-01-01

    Additive manufacturing (AM) techniques1 can produce complex, high-value metal parts, with potential applications as critical parts, such as those found in aerospace components. The production of AM parts with consistent and predictable properties requires input materials (e.g., metal powders) with known and repeatable characteristics, which in turn requires standardized measurement methods for powder properties. First, based on our previous work, we assess the applicability of current standardized methods for powder characterization for metal AM powders. Then we present the results of systematic studies carried out on two different powder materials used for additive manufacturing: stainless steel and cobalt-chrome. The characterization of these powders is important in NIST efforts to develop appropriate measurements and standards for additive materials and to document the property of powders used in a NIST-led additive manufacturing material round robin. An extensive array of characterization techniques was applied to these two powders, in both virgin and recycled states. The physical techniques included laser diffraction particle size analysis, X-ray computed tomography for size and shape analysis, and optical and scanning electron microscopy. Techniques sensitive to structure and chemistry, including X-ray diffraction, energy dispersive analytical X-ray analysis using the X-rays generated during scanning electron microscopy, and X-Ray photoelectron spectroscopy were also employed. The results of these analyses show how virgin powder changes after being exposed to and recycled from one or more Direct Metal Laser Sintering (DMLS) additive manufacturing build cycles. In addition, these findings can give insight into the actual additive manufacturing process. PMID:26601040

  16. The Contributions of Political Fashion Shows and Fabric to Visual Arts-Based Practice

    Science.gov (United States)

    Butterwick, Shauna

    2017-01-01

    This chapter explores how working with the genre of fashion shows and using fabric are two important additions to the various genres employed in visual arts-based practice. These genres are particularly attuned to feminist approaches to popular education, research, and teaching, enabling embodied knowing and the expression of imagination and…

  17. Antifreeze polymeric additives for fuels; Aditivos polimericos anticongelantes para combustiveis

    Energy Technology Data Exchange (ETDEWEB)

    Muniz, Aline S.; Carvalho, Agne Roani de; Sakae, George Hideki; Oliveira, Angelo R.S.; Cesar-Oliveira, Maria Aparecida F. [Universidade Federal do Parana - UFPR - Departamento de Quimica - LABPOL-Laboratorio de Polimeros Sinteticos, Centro Politecnico, Curitiba, PR (Brazil)], e-mails: mafco@ufpr.br, alinemuniz@ufpr.br

    2011-07-01

    Owing to the current interest in the reduction of environmental pollution, several researchers are seeking renewable sources of energy which can at least partially replace combustibles derived from petroleum. Diesel oil is the combustible that most seriously pollutes the environment and is thus the biodiesel that is being considered as a fuel which can be replaced by a renewable combustible; this can possibly be used in diesel engines without any modifications. However, certain problems have to be overcome with regard to the temperature at which the biodiesel should be stored and used, since there is a tendency for biodiesel to solidify at low temperatures. This suggests that there is a need for the use of anti-freeze additives. This work behind the main focus additives with only 25 ppm, were able to reduce the pour point of fuel, achieving significant results, for example, the additive M14A18 lowered the pour point (PP) of B20 to -20 degree C, showing that the use of increasing amounts of biodiesel to diesel can aggregate. The main focus of work behind the development of additives that with only 25 ppm, were able to reduce the pour point of fuel, producing significant results such as those obtained with the use of additive M14A18 which lowered the pour point of the B20 to -20 degree C, showing the possibility of using increasing amounts of biodiesel added to diesel. (author)

  18. Biodiesel production from tall oil with synthesized Mn and Ni based additives: effects of the additives on fuel consumption and emissions

    Energy Technology Data Exchange (ETDEWEB)

    Ali Keskin; Metin Guru; Duran Altiparmak [Mersin University, Mersin (Turkey). Technical Education Faculty

    2007-05-15

    In this study, biodiesel fuel and fuel additives were produced from crude tall oil that is a by-product in the pulp manufacturing by craft or sulphate pulping process. Fatty acids and resinic acids were obtained from crude tall oil by distillation method. Tall oil methyl ester (biodiesel) was produced from fatty acids. Resinic acids were reacted with NiO and MnO{sub 2} stoichiometrically for production of metallic fuel additives. Each metallic fuel additive was added at the rate of 8 {mu}mol/l and 12 {mu}mol/l to make mixtures of 60% tall oil methyl ester/40% diesel fuel (TE60) for preparing test fuels. Metallic fuel additives improved properties of biodiesel fuels, such as pour point and viscosity values. Biodiesel fuels were tested in an unmodified direct injection diesel engine at full load condition. Specific fuel consumption of biodiesel fuels increased by 6.00%, however, in comparison with TE60, it showed trend of decreasing with adding of additives. Exhaust emission profile of biodiesel fuels improved. CO emissions and smoke opacity decreased up to 64.28% and 30.91% respectively. Low NOx emission was also observed in general for the biodiesel fuels. 28 refs., 4 figs., 3 tabs.

  19. Elk and mule deer responses to variation in hunting pressure.

    Science.gov (United States)

    Bruce K. Johnson; Alan A. Ager; James H. Noyes; Norm. Cimon

    2004-01-01

    Hunting can exert a variety of effects on both targeted and nontargeted ungulates, and animals either run or hide in response to hunting pressure. If animals successfully elude hunters by running, the energetic cost may deplete fat reserves needed for survival during winter in temperate regions. If animals successfully elude hunters by hiding, there may be an energetic...

  20. Immobilization of antimony in waste-to-energy bottom ash by addition of calcium and iron containing additives.

    Science.gov (United States)

    Van Caneghem, Jo; Verbinnen, Bram; Cornelis, Geert; de Wijs, Joost; Mulder, Rob; Billen, Pieter; Vandecasteele, Carlo

    2016-08-01

    The leaching of Sb from waste-to-energy (WtE) bottom ash (BA) often exceeds the Dutch limit value of 0.32mgkg(-1) for recycling of BA in open construction applications. From the immobilization mechanisms described in the literature, it could be concluded that both Ca and Fe play an important role in the immobilization of Sb in WtE BA. Therefore, Ca and Fe containing compounds were added to the samples of the sand fraction of WtE BA, which in contrast to the granulate fraction is not recyclable to date, and the effect on the Sb leaching was studied by means of batch leaching tests. Results showed that addition of 0.5 and 2.5% CaO, 5% CaCl2, 2.5% Fe2(SO4)3 and 1% FeCl3 decreased the Sb leaching from 0.62±0.02mgkgDM(-1) to 0.20±0.02, 0.083±0.044, 0.25±0.01, 0.27±0.002 and 0.29±0.02mgkgDM(-1), respectively. Due to the increase in pH from 11.41 to 12.53 when 2.5% CaO was added, Pb and Zn leaching increased and exceeded the respective leaching limits. Addition of 5% CaCO3 had almost no effect on the Sb leaching, as evidenced by the resulting 0.53mgkgDM(-1) leaching concentration. This paper shows a complementary enhancement of the effect of Ca and Fe, by comparing the aforementioned Sb leaching results with those of WtE BA with combined addition of 2.5% CaO or 5% CaCl2 with 2.5% Fe2(SO4)3 or 1% FeCl3. These lab scale results suggest that formation of romeites with a high Ca content and formation of iron antimonate (tripuhyite) with a very low solubility are the main immobilization mechanisms of Sb in WtE BA. Besides the pure compounds and their mixtures, also addition of 10% of two Ca and Fe containing residues of the steel industry, hereafter referred to as R1 and R2, was effective in decreasing the Sb leaching from WtE BA below the Dutch limit value for reuse in open construction applications. To evaluate the long term effect of the additives, pilot plots of WtE BA with 10% of R1 and 5% and 10% of R2 were built and samples were submitted to leaching tests at

  1. Effects due to induced azimuthal eddy currents in a self-exciting Faraday disk homopolar dynamo with a nonlinear series motor. I.. Two special cases

    Science.gov (United States)

    Hide, Raymond; Moroz, Irene M.

    1999-10-01

    The elucidation of the behaviour of physically realistic self-exciting Faraday-disk dynamos bears inter alia on attempts by theoretical geophysicists to interpret observations of geomagnetic polarity reversals. Hide [The nonlinear differential equations governing a hierarchy of self-exciting coupled Faraday-disk homopolar dynamos, Phys. Earth Planet. Interiors 103 (1997) 281-291; Nonlinear quenching of current fluctuations in a self-exciting homopolar dynamo, Nonlinear Processes in Geophysics 4 (1998) 201-205] has introduced a novel 4-mode set of nonlinear ordinary differential equations to describe such a dynamo in which a nonlinear electric motor is connected in series with the coil. The applied couple, α, driving the disk is steady and the Lorentz couple driving the motor is a quadratic function, x(1-ɛ)+ɛσx 2, of the dynamo-generated current x, with 0≤ɛ≤1. When there are no additional biasing effects due to background magnetic fields etc., the behaviour of the dynamo is determined by eight independent non-negative control parameters. These include ρ, proportional to the resistance of the disk to azimuthal eddy currents, and β, an inverse measure of the moment of inertia of the armature of the motor. When β=0 (the case when the motor is absent and ɛ and σ are redundant) and ρ -1≠0 , the 4-mode dynamo equations reduce to the 3-mode Lorenz equations, which can behave chaotically [E. Knobloch, Chaos in the segmented disc dynamo, Phys. Lett. A 82 (1981) 439-440]. When β≠0 but ρ -1=0 , the 4-mode set of equations reduces to a 3-mode dynamo [R. Hide (1997), see above], which can also behave chaotically when ɛ=0 [R. Hide, A.C. Skeldon, D.J. Acheson, A study of two novel self-exciting single-disk homopolar dynamos: theory, Proc. R. Soc. Lond. A 452 (1996) 1369-1395] but not when ɛ=1 [R. Hide (1998), see above]. In the latter case, however, all persistent fluctuations are completely quenched [R. Hide (1998), see above]. In this paper we investigate

  2. Nonparametric additive regression for repeatedly measured data

    KAUST Repository

    Carroll, R. J.

    2009-05-20

    We develop an easily computed smooth backfitting algorithm for additive model fitting in repeated measures problems. Our methodology easily copes with various settings, such as when some covariates are the same over repeated response measurements. We allow for a working covariance matrix for the regression errors, showing that our method is most efficient when the correct covariance matrix is used. The component functions achieve the known asymptotic variance lower bound for the scalar argument case. Smooth backfitting also leads directly to design-independent biases in the local linear case. Simulations show our estimator has smaller variance than the usual kernel estimator. This is also illustrated by an example from nutritional epidemiology. © 2009 Biometrika Trust.

  3. [Food additives and healthiness].

    Science.gov (United States)

    Heinonen, Marina

    2014-01-01

    Additives are used for improving food structure or preventing its spoilage, for example. Many substances used as additives are also naturally present in food. The safety of additives is evaluated according to commonly agreed principles. If high concentrations of an additive cause adverse health effects for humans, a limit of acceptable daily intake (ADI) is set for it. An additive is a risk only when ADI is exceeded. The healthiness of food is measured on the basis of nutrient density and scientifically proven effects.

  4. Effects of some polymeric additives on the cocrystallization of caffeine

    Science.gov (United States)

    Chung, Jihae; Kim, Il Won

    2011-11-01

    Effects of polymeric additives on the model cocrystallization were examined. The model cocrystal was made from caffeine and oxalic acid, and poly(ethylene glycol) (PEG), poly( L-lactide) (PLLA), poly(ɛ-caprolactone) (PCL), and poly(acrylic acid) (PAA) were the additives. The cocrystals were formed as millimeter-sized crystals without additives, and they became microcrystals with PLLA and PCL, and nanocrystals with PAA. XRD and IR revealed that the cocrystal structure was unchanged despite the strong effects of the additives on the crystal morphology, although some decrease in crystallinity was observed with PAA as confirmed by DSC. The DSC study also showed that the cocrystal melted and recrystallized to form α-caffeine upon heating. The present study verified that the polymeric additives can be utilized to modulate the size and morphology of the cocrystals without interfering the intermolecular interactions essential to the integrity of the cocrystal structures.

  5. Solitary eccrine syringofibroadenoma: a case report showing papillary tubular adenoma-like features

    Directory of Open Access Journals (Sweden)

    Toshiyuki Yamamoto

    2016-10-01

    Full Text Available We herein describe a case showing eccrine syringofibroadenoma occurred on the dorsum of the right foot of a 46-year-old Japanese female. Histopathologic examination revealed anastomosing cords and strands of cuboidal epithelial cells extending from the epidermis to the upper dermis, with a number of well-defined ducts suggesting eccrine ductal origin. In addition, there were papillary tubular adenoma-like ductal structures lined by a few rows of epithelial cells with papillary projections into the lumen surrounded by fibrous stroma in the mid-dermis. It is of note that various histologic features showing different differentiation were seen in a single lesion of eccrine syringofibroadenoma.

  6. Using blocking approach to preserve privacy in classification rules by inserting dummy Transaction

    Directory of Open Access Journals (Sweden)

    Doryaneh Hossien Afshari

    2017-03-01

    Full Text Available The increasing rate of data sharing among organizations could maximize the risk of leaking sensitive knowledge. Trying to solve this problem leads to increase the importance of privacy preserving within the process of data sharing. In this study is focused on privacy preserving in classification rules mining as a technique of data mining. We propose a blocking algorithm to hiding sensitive classification rules. In the solution, rules' hiding occurs as a result of editing a set of transactions which satisfy sensitive classification rules. The proposed approach tries to deceive and block adversaries by inserting some dummy transactions. Finally, the solution has been evaluated and compared with other available solutions. Results show that limiting the number of attributes existing in each sensitive rule will lead to a decrease in both the number of lost rules and the production rate of ghost rules.

  7. Tannins quantification in barks of Mimosa tenuiflora and Acacia mearnsii

    Directory of Open Access Journals (Sweden)

    Leandro Calegari

    2016-03-01

    Full Text Available Due to its chemical complexity, there are several methodologies for vegetable tannins quantification. Thus, this work aims at quantifying both tannin and non-tannin substances present in the barks of Mimosa tenuiflora and Acacia mearnsii by two different methods. From bark particles of both species, analytical solutions were produced by using a steam-jacketed extractor. The solution was analyzed by Stiasny and hide-powder (no chromed methods. For both species, tannin levels were superior when analyzed by hide-powder method, reaching 47.8% and 24.1% for A. mearnsii and M. tenuiflora, respectively. By Stiasny method, the tannins levels considered were 39.0% for A. mearnsii, and 15.5% for M. tenuiflora. Despite the best results presented by A. mearnsii, the bark of M. tenuiflora also showed great potential due to its considerable amount of tannin and the availability of the species at Caatinga biome.

  8. Fourier analysis: from cloaking to imaging

    Science.gov (United States)

    Wu, Kedi; Cheng, Qiluan; Wang, Guo Ping

    2016-04-01

    Regarding invisibility cloaks as an optical imaging system, we present a Fourier approach to analytically unify both Pendry cloaks and complementary media-based invisibility cloaks into one kind of cloak. By synthesizing different transfer functions, we can construct different devices to realize a series of interesting functions such as hiding objects (events), creating illusions, and performing perfect imaging. In this article, we give a brief review on recent works of applying Fourier approach to analysis invisibility cloaks and optical imaging through scattering layers. We show that, to construct devices to conceal an object, no constructive materials with extreme properties are required, making most, if not all, of the above functions realizable by using naturally occurring materials. As instances, we experimentally verify a method of directionally hiding distant objects and create illusions by using all-dielectric materials, and further demonstrate a non-invasive method of imaging objects completely hidden by scattering layers.

  9. A Joint Watermarking and ROI Coding Scheme for Annotating Traffic Surveillance Videos

    Directory of Open Access Journals (Sweden)

    Su Po-Chyi

    2010-01-01

    Full Text Available We propose a new application of information hiding by employing the digital watermarking techniques to facilitate the data annotation in traffic surveillance videos. There are two parts in the proposed scheme. The first part is the object-based watermarking, in which the information of each vehicle collected by the intelligent transportation system will be conveyed/stored along with the visual data via information hiding. The scheme is integrated with H.264/AVC, which is assumed to be adopted by the surveillance system, to achieve an efficient implementation. The second part is a Region of Interest (ROI rate control mechanism for encoding traffic surveillance videos, which helps to improve the overall performance. The quality of vehicles in the video will be better preserved and a good rate-distortion performance can be attained. Experimental results show that this potential scheme works well in traffic surveillance videos.

  10. Effects of Polymeric Additives on the Crystallization and Release Behavior of Amorphous Ibuprofen

    Directory of Open Access Journals (Sweden)

    Su Yang Lee

    2013-01-01

    Full Text Available Some polymeric additives were studied to understand their effects on the amorphous phase of ibuprofen (IBU, used as a poorly water soluble pharmaceutical model compound. The amorphous IBU in bulk, as well as in nanopores (diameter ~24 nm of anodic aluminum oxide, was examined with the addition of poly(acrylic acid, poly(N-vinyl pyrrolidone, or poly(4-vinylphenol. Results of bulk crystallization showed that they were effective in limiting the crystal growth, while the nucleation of the crystalline phase in contact with water was nearly instantaneous in all cases. Poly(N-vinyl pyrrolidone, the most effective additive, was in specific interaction with IBU, as revealed by IR spectroscopy. The addition of the polymers was combined with the nanoscopic confinement to further stabilize the amorphous phase. Still, the IBU with addition of polymeric additives showed sustained release behavior. The current study suggested that the inhibition of the crystal nucleation was probably the most important factor to stabilize the amorphous phase and fully harness its high solubility.

  11. Space: The Hunt for Hidden Dimensions

    International Nuclear Information System (INIS)

    Hewett, JoAnne

    2006-01-01

    Extra dimensions of space may be present in our universe. Their discovery would dramatically change our view of the cosmos and would prompt many questions. How do they hide? What is their shape? How many are there? How big are they? Do particles and forces feel their presence? This lecture will explain the concept of dimensions and show that current theoretical models predict the existence of extra spatial dimensions which could be in the discovery reach of present and near-term experiments. The manner by which these additional dimensions reveal their existence will be described. Searches for modifications of the gravitational force, astrophysical effects, and collider signatures already constrain the size of extra dimensions and will be summarized. Once new dimensions are discovered, the technology by which the above questions can be answered will be discussed.

  12. Acute myocardial infarction in a young bodybuilder taking anabolic androgenic steroids: A case report and critical review of the literature.

    Science.gov (United States)

    Christou, Georgios A; Christou, Konstantinos A; Nikas, Dimitrios N; Goudevenos, John A

    2016-11-01

    We describe a case report of a 30-year-old bodybuilder suffering acute myocardial infarction (AMI). He had been taking stanozolol and testosterone for two months. The coronary angiogram showed high thrombotic burden in the left anterior descending artery without underlying atherosclerosis. Few case reports of AMI in athletes taking anabolic androgenic steroids (AASs) have been reported so far. AAS-related AMI is possibly underreported in the medical literature due to the desire of the affected individuals to hide AAS use. Physicians should always consider the possibility of AAS abuse in the context of a young athlete suffering AMI. AASs can predispose to AMI through the acceleration of coronary atherosclerosis. Additionally, thrombosis without underlying atherosclerosis or vasospasm is highly possible to cause AMI in AAS users. Complications after AMI may be more frequent in AAS users. © The European Society of Cardiology 2016.

  13. The influence of affect on suboptimal strategy choice in the Monty Hall dilemma

    Directory of Open Access Journals (Sweden)

    Efendic Emir

    2015-01-01

    Full Text Available The Monty Hall dilemma (MHD presents an intriguing choice anomaly that offers insight into human reasoning. It presents a specific subclass of decision tasks that require the adequate use of Bayes theorem in order to make optimal decisions. In the MHD, participants are presented with three doors with only one door hiding the prize. After their initial choice of a door, they are offered additional information. A different door (one that does not hide the prize and one not chosen by the participant is opened to reveal nothing behind it. Afterwards, the participants are offered to stay with their initial choice or to switch to the other remaining door. The better strategy is to always switch; a counterintuitive one for most people. We examine the notorious difficulty of the MHD from an affective perspective while relying on the dual processing approach to thinking. We varied participants’ reliance on their affective reactions as opposed to a neutral condition and hypothesized that the affective reactions associated with the staying option contribute to worse performance on the task. Indeed, the participants in the affective condition chose the staying option more often than our control participants. Using the MHD as an appropriate paradigm of conditional probability reasoning we show that, for this type of task, an affective strategy is highly inefficient. We attribute these results to the affective reactions associated with the staying option, with regret avoidance associated with the switch option, and the conditional probability construction of the dilemma.

  14. An overview of zinc addition for BWR dose rate control

    Energy Technology Data Exchange (ETDEWEB)

    Marble, W.J. [GE Nuclear Energy, San Jose, CA (United States)

    1995-03-01

    This paper presents an overview of the BWRs employing feedwater zinc addition to reduce primary system dose rates. It identifies which BWRs are using zinc addition and reviews the mechanical injection and passive addition hardware currently being employed. The impact that zinc has on plant chemistry, including the factor of two to four reduction in reactor water Co-60 concentrations, is discussed. Dose rate results, showing the benefits of implementing zinc on either fresh piping surfaces or on pipes with existing films are reviewed. The advantages of using zinc that is isotopically enhanced by the depletion of the Zn-64 precursor to Zn-65 are identified.

  15. Economic Analysis of Additive Manufacturing Integration in Injection Molding Process Chain

    DEFF Research Database (Denmark)

    Charalambis, Alessandro; Kerbache, Laoucine; Tosello, Guido

    The purpose of this research is to analyze how additive manufacturing can create value when it is utilized as a supportive technology to injection molding by quantifying the cost advantages that can be obtained. Tooling for the product development phase is investigated as pilot integration area...... of additive manufacturing with injection molding. Cost considerations are discussed through the development of a cost estimation model. The study shows that integration of additive manufacturing in the product development phase for fabrication of soft tooling is economically convenient with a cost reduction...... of 79,8% and 89,9%. The cost models on additive manufacturing have been built so far on the idea of substituting injection molding with additive manufacturing. In response to this literature gap, this research addresses the advantages of additive manufacturing utilized in a synergistic rather than...

  16. Polylactides in additive biomanufacturing.

    Science.gov (United States)

    Poh, Patrina S P; Chhaya, Mohit P; Wunner, Felix M; De-Juan-Pardo, Elena M; Schilling, Arndt F; Schantz, Jan-Thorsten; van Griensven, Martijn; Hutmacher, Dietmar W

    2016-12-15

    New advanced manufacturing technologies under the alias of additive biomanufacturing allow the design and fabrication of a range of products from pre-operative models, cutting guides and medical devices to scaffolds. The process of printing in 3 dimensions of cells, extracellular matrix (ECM) and biomaterials (bioinks, powders, etc.) to generate in vitro and/or in vivo tissue analogue structures has been termed bioprinting. To further advance in additive biomanufacturing, there are many aspects that we can learn from the wider additive manufacturing (AM) industry, which have progressed tremendously since its introduction into the manufacturing sector. First, this review gives an overview of additive manufacturing and both industry and academia efforts in addressing specific challenges in the AM technologies to drive toward AM-enabled industrial revolution. After which, considerations of poly(lactides) as a biomaterial in additive biomanufacturing are discussed. Challenges in wider additive biomanufacturing field are discussed in terms of (a) biomaterials; (b) computer-aided design, engineering and manufacturing; (c) AM and additive biomanufacturing printers hardware; and (d) system integration. Finally, the outlook for additive biomanufacturing was discussed. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. Effect of revert addition on microstructure and mechanical properties of M951 Ni-base superalloy

    International Nuclear Information System (INIS)

    Yang, Y.H.; Yu, J.J.; Sun, X.F.; Jin, T.; Guan, H.R.; Hu, Z.Q.

    2012-01-01

    Highlights: ► The microstructure is not influenced by the additions of recycled alloy. ► The stress rupture life significantly decreases with addition of recycled alloy. ► The stress rupture life is remarkably dependent on various revert additions. ► The stress rupture life has been significantly improved after filtration. ► The melt filtered through 20 ppi shows the lowest stress rupture life. - Abstract: The effect of recycled alloy proportion on the composition, microstructure and mechanical properties of M951 alloy has been investigated. With the addition of the recycled alloy proportion, the concentrations of boron and carbon obviously decrease. The microstructure is not influenced by the additions of recycled alloy. The stress rupture life significantly decreases with the addition of recycled alloy proportion. Because of the removal of oxide inclusions by filtration, the stress rupture life has been significantly improved, and it also shows a clear dependence upon passage size of the filter. The melt filtered through passage size of 20 ppi shows the lowest stress rupture life.

  18. Ionic Liquids as Novel Lubricants and /or Lubricant Additives

    Energy Technology Data Exchange (ETDEWEB)

    Qu, J. [ORNL; Viola, M. B. [General Motors Company

    2013-10-31

    This ORNL-GM CRADA developed ionic liquids (ILs) as novel lubricants or oil additives for engine lubrication. A new group of oil-miscible ILs have been designed and synthesized with high thermal stability, non-corrosiveness, excellent wettability, and most importantly effective anti-scuffing/anti-wear and friction reduction characteristics. Mechanistic analysis attributes the superior lubricating performance of IL additives to their physical and chemical interactions with metallic surfaces. Working with a leading lubricant formulation company, the team has successfully developed a prototype low-viscosity engine oil using a phosphonium-phosphate IL as an anti-wear additive. Tribological bench tests of the IL-additized formulated oil showed 20-33% lower friction in mixed and elastohydrodynamic lubrication and 38-92% lower wear in boundary lubrication when compared with commercial Mobil 1 and Mobil Clean 5W-30 engine oils. High-temperature, high load (HTHL) full-size engine tests confirmed the excellent anti-wear performance for the IL-additized engine oil. Sequence VID engine dynamometer tests demonstrated an improved fuel economy by >2% for this IL-additized engine oil benchmarked against the Mobil 1 5W-30 oil. In addition, accelerated catalyst aging tests suggest that the IL additive may potentially have less adverse impact on three-way catalysts compared to the conventional ZDDP. Follow-on research is needed for further development and optimization of IL chemistry and oil formulation to fully meet ILSAC GF-5 specifications and further enhance the automotive engine efficiency and durability.

  19. Rheology of high melt strength polypropylene for additive manufacturing

    DEFF Research Database (Denmark)

    Jagenteufel, Ralf; Hofstätter, Thomas; Kamleitner, Florian

    2017-01-01

    stability, whereas HMS-PP showed a more stable behavior at the investigated temperatures. Hereafter, the material was used in a fused deposition modeling additive manufacturing process, focusing on the investigation of possible improvements of HMS-PP over ABS. Based on the extrusion parameters for ABS...

  20. Evolution of solidification texture during additive manufacturing

    Science.gov (United States)

    Wei, H. L.; Mazumder, J.; DebRoy, T.

    2015-01-01

    Striking differences in the solidification textures of a nickel based alloy owing to changes in laser scanning pattern during additive manufacturing are examined based on theory and experimental data. Understanding and controlling texture are important because it affects mechanical and chemical properties. Solidification texture depends on the local heat flow directions and competitive grain growth in one of the six preferred growth directions in face centered cubic alloys. Therefore, the heat flow directions are examined for various laser beam scanning patterns based on numerical modeling of heat transfer and fluid flow in three dimensions. Here we show that numerical modeling can not only provide a deeper understanding of the solidification growth patterns during the additive manufacturing, it also serves as a basis for customizing solidification textures which are important for properties and performance of components. PMID:26553246

  1. the strategy of finger use in children's addition Relationship with short-term memory, finger dexterity, and addition skills

    OpenAIRE

    Asakawa, Atsushi; Sugimura, Shinichiro

    2009-01-01

    Previous research has shown that the children's use of the fingers in additon changes with age. In this study, a part of data on the strategy of finger use by Asakawa and Sugimura (2009) was reanalyzed to clarify the relationship between, short-term memory, finger dexterity and addition skills. A two-way ANOVA showed a significant interaction between memory span and finger use. Examination of simple main effect indicated that significant effect of memory span at the group of the children who ...

  2. Leaching of additives from construction materials to urban storm water runoff

    DEFF Research Database (Denmark)

    Burkhardt, Mike; Zuleeg, S.; Boller, M.

    2011-01-01

    Urban water management requires further clarification about pollutants in storm water. Little is known about the release of organic additives used in construction materials and the impact of these compounds to storm water runoff. We investigated sources and pathways of additives used...... shows approximately one to two orders of magnitude lower concentrations. Concentrations decreased also during individual runoff events. In storm water and receiving water the occurrence of additives did not follow the typical first flush model. This can be explained by the release lasting over the time...

  3. Extreme Pressure Synergistic Mechanism of Bismuth Naphthenate and Sulfurized Isobutene Additives

    Science.gov (United States)

    Xu, Xin; Hu, Jianqiang; Yang, Shizhao; Xie, Feng; Guo, Li

    A four-ball tester was used to evaluate the tribological performances of bismuth naphthenate (BiNap), sulfurized isobutene (VSB), and their combinations. The results show that the antiwear properties of BiNap and VSB are not very visible, but they possess good extreme pressure (EP) properties, particularly sulfur containing bismuth additives. Synergistic EP properties of BiNap with various sulfur-containing additives were investigated. The results indicate that BiNap exhibits good EP synergism with sulfur-containing additives. The surface analytical tools, such as X-ray photoelectron spectrometer (XPS) scanning electron microscope (SEM) and energy dispersive X-ray (EDX), were used to investigate the topography, composition contents, and depth profile of some typical elements on the rubbing surface. Smooth topography of wear scar further confirms that the additive showed good EP capacities, and XPS and EDX analyzes indicate that tribochemical mixed protective films composed of bismuth, bismuth oxides, sulfides, and sulfates are formed on the rubbing surface, which improves the tribological properties of lubricants. In particular, a large number of bismuth atoms and bismuth sulfides play an important role in improving the EP properties of oils.

  4. Additives in yoghurt production

    Directory of Open Access Journals (Sweden)

    Milna Tudor

    2008-02-01

    Full Text Available In yoghurt production, mainly because of sensory characteristics, different types of additives are used. Each group, and also each substance from the same group has different characteristics and properties. For that reason, for improvement of yoghurt sensory characteristics apart from addition selection, the quantity of the additive is very important. The same substance added in optimal amount improves yoghurt sensory attributes, but too small or too big addition can reduce yoghurt sensory attributes. In this paper, characteristics and properties of mostly used additives in yoghurt production are described; skimmed milk powder, whey powder, concentrated whey powder, sugars and artificial sweeteners, fruits, stabilizers, casein powder, inulin and vitamins. Also the impact of each additive on sensory and physical properties of yoghurt, syneresis and viscosity, are described, depending on used amount added in yoghurt production.

  5. Additive Manufacturing Infrared Inspection

    Science.gov (United States)

    Gaddy, Darrell; Nettles, Mindy

    2015-01-01

    The Additive Manufacturing Infrared Inspection Task started the development of a real-time dimensional inspection technique and digital quality record for the additive manufacturing process using infrared camera imaging and processing techniques. This project will benefit additive manufacturing by providing real-time inspection of internal geometry that is not currently possible and reduce the time and cost of additive manufactured parts with automated real-time dimensional inspections which deletes post-production inspections.

  6. Colour change of bakery products influenced by used additions

    Directory of Open Access Journals (Sweden)

    Petra Čáslavková

    2014-01-01

    Full Text Available This study deals with the effects of selected additions of vegetable origin on the colour of whole grain breads. The colour was assessed using model samples which were made of mixtures containing various wholemeal flour types (wheat, spelt, and rye flour and increasing amounts of additions in the form of buckwheat, oat, and barley flour. The additions were 10, 20, 30, 40 and 50 per cent. Colour measurement was performed instrumentally, using an image analysis method which was modified for the purposes of this study. It was found out that, regardless of the flour/addition ratio, both factors in the form of wheat, spelt, and rye wholemeal flour, and barley, oat and buckwheat flour additions and their interactions exhibited a significant influence on the colour of the bakery products (P P < 0.05 were found for the following combinations: mixture of wheat flour with buckwheat, barley, and oat; mixture of spelt flour with buckwheat and oat; and mixture of rye flour with buckwheat and barley. The proposed general regression model which was created using the data obtained in the experiment, showed colour variability of more than 95 per cent.

  7. Additive Cellular Automata and Volume Growth

    Directory of Open Access Journals (Sweden)

    Thomas B. Ward

    2000-08-01

    Full Text Available Abstract: A class of dynamical systems associated to rings of S-integers in rational function fields is described. General results about these systems give a rather complete description of the well-known dynamics in one-dimensional additive cellular automata with prime alphabet, including simple formulæ for the topological entropy and the number of periodic configurations. For these systems the periodic points are uniformly distributed along some subsequence with respect to the maximal measure, and in particular are dense. Periodic points may be constructed arbitrarily close to a given configuration, and rationality of the dynamical zeta function is characterized. Throughout the emphasis is to place this particular family of cellular automata into the wider context of S-integer dynamical systems, and to show how the arithmetic of rational function fields determines their behaviour. Using a covering space the dynamics of additive cellular automata are related to a form of hyperbolicity in completions of rational function fields. This expresses the topological entropy of the automata directly in terms of volume growth in the covering space.

  8. Additional Samples: Where They Should Be Located

    International Nuclear Information System (INIS)

    Pilger, G. G.; Costa, J. F. C. L.; Koppe, J. C.

    2001-01-01

    Information for mine planning requires to be close spaced, if compared to the grid used for exploration and resource assessment. The additional samples collected during quasimining usually are located in the same pattern of the original diamond drillholes net but closer spaced. This procedure is not the best in mathematical sense for selecting a location. The impact of an additional information to reduce the uncertainty about the parameter been modeled is not the same everywhere within the deposit. Some locations are more sensitive in reducing the local and global uncertainty than others. This study introduces a methodology to select additional sample locations based on stochastic simulation. The procedure takes into account data variability and their spatial location. Multiple equally probable models representing a geological attribute are generated via geostatistical simulation. These models share basically the same histogram and the same variogram obtained from the original data set. At each block belonging to the model a value is obtained from the n simulations and their combination allows one to access local variability. Variability is measured using an uncertainty index proposed. This index was used to map zones of high variability. A value extracted from a given simulation is added to the original data set from a zone identified as erratic in the previous maps. The process of adding samples and simulation is repeated and the benefit of the additional sample is evaluated. The benefit in terms of uncertainty reduction is measure locally and globally. The procedure showed to be robust and theoretically sound, mapping zones where the additional information is most beneficial. A case study in a coal mine using coal seam thickness illustrates the method

  9. Modified signed-digit trinary addition using synthetic wavelet filter

    Science.gov (United States)

    Iftekharuddin, K. M.; Razzaque, M. A.

    2000-09-01

    The modified signed-digit (MSD) number system has been a topic of interest as it allows for parallel carry-free addition of two numbers for digital optical computing. In this paper, harmonic wavelet joint transform (HWJT)-based correlation technique is introduced for optical implementation of MSD trinary adder implementation. The realization of the carry-propagation-free addition of MSD trinary numerals is demonstrated using synthetic HWJT correlator model. It is also shown that the proposed synthetic wavelet filter-based correlator shows high performance in logic processing. Simulation results are presented to validate the performance of the proposed technique.

  10. Effect of polymer additives on transition in pipe flow

    Energy Technology Data Exchange (ETDEWEB)

    Castro, W; Squire, W

    1967-09-01

    Small amounts of long-chain, water-soluble polymers have a marked effect on turbulent flow resulting in appreciable reduction of turbulent friction. The maximum reduction in pipe flow resistance is obtained at such low concentrations that the density and viscosity are not altered appreciably. The minimum friction curve varies as Re-2/3 and appears to be the same for all effective additives tested. The transition process is affected by these additives. Quantitative results are presented showing a reduction in the intensity of the turbulent flashes and the fraction of the time the flow is turbulent at a given Reynolds number. (13 refs.)

  11. High strength tungsten heavy alloys with molybdenum additions

    International Nuclear Information System (INIS)

    Bose, A.; Sims, D.M.; German, R.M.

    1987-01-01

    Tungsten heavy alloys are candidates for numerous applications based on the unique combination of high density, high strength, and high ductility coupled with excellent machinability. Though there has been considerable research on heavy alloys, the primary focus has been on the ductility. These alloys are well suited for ballistic uses due to their high densities and it is expected that for superior ballistic performance, a high hardness, high strength and moderate ductility alloy would be ideal. The major goal of this investigation was to obtain heavy alloys with hardness greater than HRA 72. It is evident from the phase diagrams that molybdenum, which goes into solution in tungsten, nickel and iron, could act as a potential strengthening addition. With this in view, tungsten heavy alloys with molybdenum additions were fabricated from mixed elemental powders. A baseline composition of 90W-7Ni-3Fe was chosen to its good elongation and moderate strength. The molybdenum additions were made by replacing the tungsten. Compared to the baseline properties with no molybdenum addition, the strength and hardness showed a continuous increase with molybdenum addition. The ductility of the alloy continued to decrease with increasing molybdenum content, but even with 16% wt. % molybdenum of the elongation was still around 6%. An interesting facet of these alloying additions is the grain refinement that is brought about by adding to molybdenum to the system. The grain refinement is related to the lower solubility of tunbsten in the matrix due to partial displacement by molybdenum

  12. Oxidation processes on conducting carbon additives for lithium-ion batteries

    KAUST Repository

    La Mantia, Fabio

    2012-11-21

    The oxidation processes at the interface between different types of typical carbon additives for lithium-ion batteries and carbonates electrolyte above 5 V versus Li/Li+ were investigated. Depending on the nature and surface area of the carbon additive, the irreversible capacity during galvanostatic cycling between 2.75 and 5.25 V versus Li/Li+ could be as high as 700 mAh g-1 (of carbon). In the potential region below 5 V versus Li/Li+, high surface carbon additives also showed irreversible plateaus at about 4.1-4.2 and 4.6 V versus Li/Li+. These plateaus disappeared after thermal treatments at or above 150 °C in inert gas. The influence of the irreversible capacity of carbon additives on the overall performances of positive electrodes was discussed. © 2012 Springer Science+Business Media Dordrecht.

  13. Adverse reactions to food additives in children with atopic symptoms

    DEFF Research Database (Denmark)

    Fuglsang, G.; Madsen, Charlotte Bernhard; Halken, S.

    1994-01-01

    and 335 were subjected to open challenge. A total of 23 children developed positive reactions after the open challenge. Sixteen of these patients accepted the double-blind challenge, and six showed a positive reaction to preservatives (atopic dermatitis, asthma, rhinitis), coloring agents (atopic......, rhinitis, or urticaria. After a 2-week period on an additive-free diet, the children were challenged with the eliminated additives. The food additives investigated were coloring agents, preservatives, citric acid, and flavoring agents. Carbonated ''lemonade'' containing the dissolved additives was used...... for the open challenge. Two doses were used: a low dose and a 10-fold higher dose. Gelatin capsules were used for a double-blind challenge. The children were 4-15 years old, and they were attending an outpatient pediatric clinic for the first time. Of the 379 patients who entered the study, 44 were excluded...

  14. Influence of additives on phase stabilization of scandia-doped zirconia

    Energy Technology Data Exchange (ETDEWEB)

    Muccillo, Eliana Navarro dos Santos; Grosso, Robson Lopes; Reis, Shirley Leite dos; Muccillo, Reginaldo, E-mail: enavarro@usp.br, E-mail: roblopeg@usp.br, E-mail: shirley.reis@usp.br, E-mail: muccillo@usp.br [Instituto de Pesquisas Energeticas e Nucleares (IPEN/CNEN-SP), Sao Paulo, SP (Brazil)

    2017-04-15

    The effects of small additions of tin, zinc, calcium and boron oxides on phase composition and electrical conductivity of zirconia-10 mol% scandia were investigated. Compounds containing 1 mol% zinc, tin and calcium oxides and 1, 3 and 5 wt.% boron oxide were prepared by solid state reaction and characterized by X-ray diffraction, density measurements, scanning electron microscopy and impedance spectroscopy. Full stabilization of the cubic structure at room temperature was obtained with additions of 1 mol% calcium oxide and 2 wt.% boron oxide. Partially stabilized compounds exhibit herringbone structure, characteristic of the β- rhombohedric phase. Specimens with calcium as additive show total conductivity of 23.8 mS.cm{sup -1} at 750 deg C with activation energy of 1.13 eV. Liquid phase sintering by boron oxide addition is effective to enhance the densification of the solid electrolyte. (author)

  15. The Gay Artist as Tragic Hero in The Picture of Dorian Gray

    OpenAIRE

    Alley, Henry

    2009-01-01

    In his article "The Gay Artist as Tragic Hero in The Picture of Dorian Gray" Henry M. Alley discusses the central artistic figure in Oscar Wilde's novel, Basil Hallward. As the novel's tragic protagonist, he commands the most pity and fear and serves as the most dynamic member of the dramatis personae. Alley contextualizes his discussion within Aristotle's Poetics, contemporary criticism, as well as Wilde's own comments. In addition, Alley looks at Hallward's attempt to hide or censor his gay...

  16. Latency-Based and Psychophysiological Measures of Sexual Interest Show Convergent and Concurrent Validity.

    Science.gov (United States)

    Ó Ciardha, Caoilte; Attard-Johnson, Janice; Bindemann, Markus

    2018-04-01

    Latency-based measures of sexual interest require additional evidence of validity, as do newer pupil dilation approaches. A total of 102 community men completed six latency-based measures of sexual interest. Pupillary responses were recorded during three of these tasks and in an additional task where no participant response was required. For adult stimuli, there was a high degree of intercorrelation between measures, suggesting that tasks may be measuring the same underlying construct (convergent validity). In addition to being correlated with one another, measures also predicted participants' self-reported sexual interest, demonstrating concurrent validity (i.e., the ability of a task to predict a more validated, simultaneously recorded, measure). Latency-based and pupillometric approaches also showed preliminary evidence of concurrent validity in predicting both self-reported interest in child molestation and viewing pornographic material containing children. Taken together, the study findings build on the evidence base for the validity of latency-based and pupillometric measures of sexual interest.

  17. Damage evolution and failure mechanisms in additively manufactured stainless steel

    Energy Technology Data Exchange (ETDEWEB)

    Carlton, Holly D., E-mail: carlton4@llnl.gov [Materials Engineering Division, Lawrence Livermore National Laboratory, 7000 East Avenue, Livermore, CA 94550 (United States); Haboub, Abdel [Lincoln University, Life and Physical Sciences Department, 820 Chestnut St, Jefferson City, MO 65101 (United States); Gallegos, Gilbert F. [Materials Engineering Division, Lawrence Livermore National Laboratory, 7000 East Avenue, Livermore, CA 94550 (United States); Parkinson, Dilworth Y.; MacDowell, Alastair A. [Advanced Light Source, Lawrence Berkeley National Laboratory, 1 Cyclotron Road, Berkeley, CA 94720 (United States)

    2016-01-10

    In situ tensile tests were performed on additively manufactured austenitic stainless steel to track damage evolution within the material. For these experiments Synchrotron Radiation micro-Tomography was used to measure three-dimensional pore volume, distribution, and morphology in stainless steel at the micrometer length-scale while tensile loading was applied. The results showed that porosity distribution played a larger role in affecting the fracture mechanisms than measured bulk density. Specifically, additively manufactured stainless steel specimens with large inhomogeneous void distributions displayed a flaw-dominated failure where cracks were shown to initiate at pre-existing voids, while annealed additively manufactured stainless steel specimens, which contained low porosity and randomly distributed pores, displayed fracture mechanisms that closely resembled wrought metal.

  18. Statistical study of chemical additives effects in the waste cementation

    International Nuclear Information System (INIS)

    Tello, Cledola C.O. de; Diniz, Paula S.; Haucz, Maria J.A.

    1997-01-01

    This paper presents the statistical study, that was carried out to analyse the chemical additives effect in the waste cementation process. Three different additives from two industries were tested: set accelerator, set retarder and super plasticizers, in cemented pates with and without bentonite. The experiments were planned in accordance with the 2 3 factorial design, so that the effect of each type of additive, its quantity and manufacturer in cemented paste and specimens could be evaluated. The results showed that the use of these can improve the cementation process and the product. The admixture quantity and the association with bentonite were the most important factors affecting the process and product characteristics. (author). 4 refs., 9 figs., 4 tabs

  19. Rheological properties of the wheat flour supplemented with different additives

    Directory of Open Access Journals (Sweden)

    GEORGETA STOENESCU

    2011-07-01

    Full Text Available One characteristic of the Romanian wheat flour in the recent years consists of high values of the falling number. The aim of the present study was to explore the Mixolab device to characterize the thermo-mechanical behaviour of flour supplemented with different additives that contain α-amylase. Mixolab parameters C4 and C5 were found to be lower in samples with high doses of additives containing α-amylases. The increase of the α-amylase dose reduces the dough stability. The samples that contain higher doses of additives presented low values of the β slope, which gives indications about starch gelatinization. The samples with reduced α-amylases activity showed high values of the γ slope.

  20. Differentiation study of porous hydroxyapatite body fabricated by using three different additives

    International Nuclear Information System (INIS)

    Cik Rohaida Che Hak; Idris Besar; Rusnah Mustaffa; Mohd Reusmaazran Yusof

    2005-01-01

    Porous hydroxyapatite is suitable for bone surgery applications because it allows bone ingrowth and promotes faster healing. In this study, a porous hydroxyapatite body was fabricated by slip casting route, followed by a comprehensive investigation of its physical properties. The porous body was prepared by mixing the hydroxyapatite slurry with three different additives namely; sago beads, potassium oleate and sodium dodecyl sulphate (SDS). The mixture of slurry and additives was then casted in plaster mold before it was dried and sintered at high temperature. The structure of the porous body could be tailored by using different composition and parameters of the additives; sago beads (pore former agent), potassium oleate (foaming agent) and SDS (foaming agent). The role of these three additives was investigated by several chemical, physical and mechanical evaluations method. The identification of additives was determined by FTIR, the porosity of porous hydroxyapatite was measured by Densitometer and the morphology of the porous structure was observed under Scanning Electron Microscopy and Image Analyzer. The results showed that potassium oleate contribute significantly towards porosity. However the resulting porosity would actually very dependent on the proportions of the additives, the more additives being added, the higher the porosity. All three additives produced macrostructure with pores larger than 100 mm, however the one produced by using sago beads showed a less pore interconnection structure compared to those obtained by both foaming agent. Playing with different proportions of these additives, it was possible to improve the foam stability, size of pores and pore connectivity in order to reproduce the porous hydroxyapatite body that having a similar pore structure of the natural bone. (Author)

  1. Additivity of entropic uncertainty relations

    Directory of Open Access Journals (Sweden)

    René Schwonnek

    2018-03-01

    Full Text Available We consider the uncertainty between two pairs of local projective measurements performed on a multipartite system. We show that the optimal bound in any linear uncertainty relation, formulated in terms of the Shannon entropy, is additive. This directly implies, against naive intuition, that the minimal entropic uncertainty can always be realized by fully separable states. Hence, in contradiction to proposals by other authors, no entanglement witness can be constructed solely by comparing the attainable uncertainties of entangled and separable states. However, our result gives rise to a huge simplification for computing global uncertainty bounds as they now can be deduced from local ones. Furthermore, we provide the natural generalization of the Maassen and Uffink inequality for linear uncertainty relations with arbitrary positive coefficients.

  2. Characterizations of additive manufactured porous titanium implants.

    Science.gov (United States)

    Basalah, Ahmad; Shanjani, Yaser; Esmaeili, Shahrzad; Toyserkani, Ehsan

    2012-10-01

    This article describes physical, chemical, and mechanical characterizations of porous titanium implants made by an additive manufacturing method to gain insight into the correlation of process parameters and final physical properties of implants used in orthopedics. For the manufacturing chain, the powder metallurgy technology was combined with the additive manufacturing to fabricate the porous structure from the pure tanium powder. A 3D printing machine was employed in this study to produce porous bar samples. A number of physical parameters such as titanium powder size, polyvinyl alcohol (PVA) amount, sintering temperature and time were investigated to control the mechanical properties and porosity of the structures. The produced samples were characterized through porosity and shrinkage measurements, mechanical compression test and scanning electron microscopy (SEM). The results showed a level of porosity in the samples in the range of 31-43%, which is within the range of the porosity of the cancelluous bone and approaches the range of the porosity of the cortical bone. The results of the mechanical test showed that the compressive strength is in the wide range of 56-509 MPa implying the effect of the process parameters on the mechanical strengths. This technique of manufacturing of Ti porous structures demonstrated a low level of shrinkage with the shrinkage percentage ranging from 1.5 to 5%. Copyright © 2012 Wiley Periodicals, Inc.

  3. Influence of the Addition of Selected Spices on Sensory Quality and Biological Activity of Honey

    Directory of Open Access Journals (Sweden)

    Aleksandra Wilczyńska

    2017-01-01

    Full Text Available Bee honey is nutritious and has numerous health benefits, but its taste is for many people too bland. Honey with addition of spices could be important to the food industry as a functional product with positive health image and interesting taste. Such product would definitely meet health-driven consumers’ expectations. Therefore, the aim of this study was to evaluate the effect of addition of selected spices on sensory, antimicrobial, and antioxidant properties of honey. Results showed that the addition of spices significantly affected the taste and the smell of honey (p<0,05 and that honey with the cinnamon was the most desired and easily accepted product by the consumers. The addition of spices had no significant effect on texture and appearance. All tested samples showed the ability to inhibit the growth of bacteria and, contrary to the assumptions, the addition of spices did not cause an increase of antimicrobial activity. The results also showed that the kind and amount of added spice significantly affected the antioxidant activity: ability to scavenge free radicals and total phenolics content. The highest antioxidant activity revealed the honey with cinnamon and the lowest revealed the honey with cardamom addition.

  4. Ruminal degradation kinetic of Brachiaria decumbens silages with different nitrogen additives

    Directory of Open Access Journals (Sweden)

    Odimári Pricila Pires do Prado

    2014-02-01

    Full Text Available This study aimed to assess levels of nitrogen additive Silogen® pasto on ruminal in vitro degradability gas production in Brachiaria decumbens silages. The nitrogen additive contained bacterial strains (Bacillus subtilis, Lactobacillus curvatus, Lactobacillus plantarum and Pediococcus acidilactici and minimum nitrogen to 360 g/kg. The levels were: 0.0; 1.0; 1.5; 2.0 and 2.5%. In fractionation were calculated total carbohydrates (TC, non-fiber carbohydrates (NFC, soluble and rapidly degradable (A + B1, potentially degradable (B2 and degradable (C. The kinetic parameters of FC and NFC were estimated using the technique of in vitro gas production. Data were subjected to analysis of variance at 5%. The level additive did not influence the TC and fraction A + B1. The levels of nitrogen additive influenced the NFC, fractions B2 and C. For NFC content 2.0% showed the lowest (22.0 %. The lower levels of additive nitrogen (0, 1.0 and 1.5 % had higher fractions of B2 (average 40.2 % and lower values for the fraction C (average 20.0 % . There was no difference in the volume of gas CNF (average 86.73 mL and final volume of gas produced (average 195.79 mL. Was no influence of nitrogen additives for the time of colonization, the lowest time of 3.89 h to 1.0%. The volume of gas of FC was influenced by levels of nitrogen additives with higher values to 0 % from 1.0 %, and 114.74 and 115.09 mL, respectively. Degradation rates of FC and FNC were also affected by the concentrations of nitrogenous additives, which presented higher rates to the levels of 2.0 and 2.5%. It follows that the lower levels of additives to 1.5 % promoted the reduction of the C fraction and increased B2, and greater production of gas volume of the fiber in these silages, showing better nutritional value in these silages.

  5. Succession of hide–seek and pursuit–evasion at heterogeneous locations

    Science.gov (United States)

    Gal, Shmuel; Casas, Jérôme

    2014-01-01

    Many interactions between searching agents and their elusive targets are composed of a succession of steps, whether in the context of immune systems, predation or counterterrorism. In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit–escape. Our aim is to link these two processes, usually analysed separately and with different models, in a single game theory context. We define a matrix game in which a searcher looks at a fixed number of discrete locations only once each searching for a hider, which can escape with varying probabilities according to its location. The value of the game is the overall probability of capture after k looks. The optimal search and hide strategies are described. If a searcher looks only once into any of the locations, an optimal hider chooses it's hiding place so as to make all locations equally attractive. This optimal strategy remains true as long as the number of looks is below an easily calculated threshold; however, above this threshold, the optimal position for the hider is where it has the highest probability of escaping once spotted. PMID:24621817

  6. COMPARATIVE STUDY OF EDGE BASED LSB MATCHING STEGANOGRAPHY FOR COLOR IMAGES

    Directory of Open Access Journals (Sweden)

    A.J. Umbarkar

    2016-02-01

    Full Text Available Steganography is a very pivotal technique mainly used for covert transfer of information over a covert communication channel. This paper proposes a significant comparative study of the spatial LSB domain technique that focuses on sharper edges of the color as well as gray scale images for the purpose of data hiding and hides secret message first in sharper edge regions and then in smooth regions of the image. Message embedding depends on content of the image and message size. The experimental results illustrate that, for low embedding rate the method hides the message in sharp edges of cover image to get better stego image visualization quality. For high embedding rate, smooth regions and edges of the cover image are used for the purpose of data hiding. In this steganography method, color image and textured kind of image preserves better visual quality of stego image. The novelty of the comparative study is that, it helps to analyze the efficiency and performance of the method as it gives better results because it directly works on color images instead of converting to gray scale image.

  7. Stimulation of terrestrial ecosystem carbon storage by nitrogen addition: a meta-analysis.

    Science.gov (United States)

    Yue, Kai; Peng, Yan; Peng, Changhui; Yang, Wanqin; Peng, Xin; Wu, Fuzhong

    2016-01-27

    Elevated nitrogen (N) deposition alters the terrestrial carbon (C) cycle, which is likely to feed back to further climate change. However, how the overall terrestrial ecosystem C pools and fluxes respond to N addition remains unclear. By synthesizing data from multiple terrestrial ecosystems, we quantified the response of C pools and fluxes to experimental N addition using a comprehensive meta-analysis method. Our results showed that N addition significantly stimulated soil total C storage by 5.82% ([2.47%, 9.27%], 95% CI, the same below) and increased the C contents of the above- and below-ground parts of plants by 25.65% [11.07%, 42.12%] and 15.93% [6.80%, 25.85%], respectively. Furthermore, N addition significantly increased aboveground net primary production by 52.38% [40.58%, 65.19%] and litterfall by 14.67% [9.24%, 20.38%] at a global scale. However, the C influx from the plant litter to the soil through litter decomposition and the efflux from the soil due to microbial respiration and soil respiration showed insignificant responses to N addition. Overall, our meta-analysis suggested that N addition will increase soil C storage and plant C in both above- and below-ground parts, indicating that terrestrial ecosystems might act to strengthen as a C sink under increasing N deposition.

  8. Fault isolability conditions for linear systems with additive faults

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Stoustrup, Jakob

    2006-01-01

    In this paper, we shall show that an unlimited number of additive single faults can be isolated under mild conditions if a general isolation scheme is applied. Multiple faults are also covered. The approach is algebraic and is based on a set representation of faults, where all faults within a set...

  9. Effects of Ni-5%RExOy Composite Additives on Electrochemical Hydrogen Storage Performances of Mg2Ni

    Directory of Open Access Journals (Sweden)

    ZHANG Guo-fang

    2017-11-01

    Full Text Available The Ni-5%RExOy (CeO2, La2O3, Eu2O3 as composite additives, Mg2Ni-Ni-5%RExOy composites were prepared by the ball milling method. The effects of different additives on the structure, morphology, electrochemistry and kinetic properties of Mg2Ni alloy were studied systematically. The results show that composite additives can improve the proportion of amorphous and nanocrystalline structure of Mg2Ni alloy. The particle size is homogeneous but the agglomeration is observed in the sample with Ni-5%CeO2 additives. The composites with additives show higher maximum discharge capacity and better cycle stabilities. All of these three kinds of composite additives can improve the kinetic properties of the composites effectively, including optimizing the charge-transfer ability, the reversibility of the electrochemical reaction on the alloy surface, and enhancing the diffusion coefficients of H atoms in the bulk of alloy. Among these three kinds of additives, Ni-5%CeO2 additive shows the best catalysis effect on promoting the kinetic properties of the composites.

  10. Five Kepler target stars that show multiple transiting exoplanet candidates

    Energy Technology Data Exchange (ETDEWEB)

    Steffen, Jason H.; /Fermilab; Batalha, Natalie M.; /San Jose State U.; Borucki, William J.; /NASA, Ames; Buchhave, Lars A.; /Harvard-Smithsonian Ctr. Astrophys. /Bohr Inst.; Caldwell, Douglas A.; /NASA, Ames /SETI Inst., Mtn. View; Cochran, William D.; /Texas U.; Endl, Michael; /Texas U.; Fabrycky, Daniel C.; /Harvard-Smithsonian Ctr. Astrophys.; Fressin, Francois; /Harvard-Smithsonian Ctr. Astrophys.; Ford, Eric B.; /Florida U.; Fortney, Jonathan J.; /UC, Santa Cruz, Phys. Dept. /NASA, Ames

    2010-06-01

    We present and discuss five candidate exoplanetary systems identified with the Kepler spacecraft. These five systems show transits from multiple exoplanet candidates. Should these objects prove to be planetary in nature, then these five systems open new opportunities for the field of exoplanets and provide new insights into the formation and dynamical evolution of planetary systems. We discuss the methods used to identify multiple transiting objects from the Kepler photometry as well as the false-positive rejection methods that have been applied to these data. One system shows transits from three distinct objects while the remaining four systems show transits from two objects. Three systems have planet candidates that are near mean motion commensurabilities - two near 2:1 and one just outside 5:2. We discuss the implications that multitransiting systems have on the distribution of orbital inclinations in planetary systems, and hence their dynamical histories; as well as their likely masses and chemical compositions. A Monte Carlo study indicates that, with additional data, most of these systems should exhibit detectable transit timing variations (TTV) due to gravitational interactions - though none are apparent in these data. We also discuss new challenges that arise in TTV analyses due to the presence of more than two planets in a system.

  11. Quantification of Campylobacter and Salmonella in cattle before, during, and after the slaughter process.

    Science.gov (United States)

    Abley, Melanie J; Wittum, Thomas E; Zerby, Henry N; Funk, Julie A

    2012-02-01

    Salmonella and Campylobacter cause a significant number of human illnesses globally, most of which are food related. Cattle can be asymptomatic carriers of both of these pathogens. The objective of this study was to determine the association between the concentration of Salmonella and Campylobacter pre- and postharvest in cattle. Samples were collected from each of 98 individually identified cattle during the periharvest and postharvest period. For each animal, four different phases were sampled: on farm (fecal sample), poststunning and exsanguination (hide sponge and rectal content sample [lairage]), prechilling (carcass sponge), and final product (ground meat). Salmonella and Campylobacter were cultured and quantified at each stage by using the direct dilution and most probable number (MPN) method. Salmonella was not isolated from any sample. The proportion (%) of samples that were Campylobacter positive was 77, 82, 97, 55, and 12 for farm, rectal content, hide, carcass, and meat samples respectively. The mean Campylobacter concentration for each sample was as follows: fecal sample from farm, 3.7×10(4) cfu/g; rectal content sample from lairage, 1.6×10(5) cfu/g; hide sponge, 0.9 cfu/cm(2); carcass sponge, 8.7 cfu/half carcass; and meat, 1.1 cfu/g. There were no associations between Campylobacter concentrations for any two sample types. This lack of association could indicate that there is an environmental reservoir that can contaminate the final meat product, or since the majority of animals were positive entering the slaughter process, that the process itself reduces the load of Campylobacter regardless of the initial concentration. In addition, contamination of beef may be more strongly associated with periharvest practices than animal carriage rates.

  12. How many food additives are rodent carcinogens?

    Science.gov (United States)

    Johnson, F M

    2002-01-01

    One generally assumes that chemical agents added to foods are reasonably free of risks to human health, and practically everyone consumes some additives in his or her food daily throughout life. In the United States, the 1958 Food Additives Amendment to the Federal Food, Drug and Cosmetic Act of 1938 requires food manufacturers to demonstrate the safety of food additives to the Food and Drug Administration (FDA). The Amendment contains a provision that prohibits approval of an additive if it is found to cause cancer in humans or animals. In the present study, data from the National Toxicology Program rodent bioassay (NTPRB) were used to identify a sample of approximately 50 rodent-tested additives and other chemicals added to food that had been evaluated independently of the FDA/food industry. Surprisingly, the sample shows more than 40% of these food chemicals to be carcinogenic in one or more rodent groups. If this percentage is extrapolated to all substances added to food in the United States, it would imply that more than 1000 of such substances are potential rodent carcinogens. The NTP and FDA test guidelines use similar, though not necessarily identical, rodent test procedures, including near lifetime exposures to the maximum tolerated dose. The FDA specifies that test chemicals should be administered by the oral route. However, the oral route includes three methods of delivering chemicals, that is, mixed in the food or water or delivered by stomach tube (gavage). The NTP data show only 1 of 18 food chemicals mixed in the food are rodent carcinogens, but 16 of 23 gavage-administered food chemicals are carcinogenic to rodents. The distribution suggests that among orally delivered chemicals, those administered in the feed will more likely prove to be noncarcinogens than chemicals given by gavage. The rodent data also reveal that effects may vary according to dose and genotype, as well as by route of administration, to further complicate extrapolation to humans

  13. Predicting additional care in young children with neurodevelopmental disability: a systematic literature review

    NARCIS (Netherlands)

    Meester-Delver, Anke; Beelen, Anita; Hennekam, Raoul; Hadders-Algra, Mijna; Nollet, Frans

    2006-01-01

    Children with developmental disabilities often show a variety of associated impairments that lead to a lifelong need for additional care. Careful assessment of these impairments is required not only for diagnostic purposes but also to inform the parents about the expected additional care needs in

  14. Direct observation of lubricant additives using tomography techniques

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Yunyun [Department of Materials Science and Engineering, Texas A& M University, College Station, Texas 77843 (United States); Sanchez, Carlos [Mechanical Engineering, Texas A& M University, College Station, Texas 77843 (United States); Parkinson, Dilworth Y. [Advanced Light Source, Lawrence Berkeley National Laboratory, Berkeley, California 94720 (United States); Liang, Hong, E-mail: hliang@tamu.edu [Department of Materials Science and Engineering, Texas A& M University, College Station, Texas 77843 (United States); Mechanical Engineering, Texas A& M University, College Station, Texas 77843 (United States)

    2016-07-25

    Lubricants play important roles in daily activities such as driving, walking, and cooking. The current understanding of mechanisms of lubrication, particularly in mechanical systems, has been limited by the lack of capability in direct observation. Here, we report an in situ approach to directly observe the motion of additive particles in grease under the influence of shear. Using the K-edge tomography technique, it is possible to detect particular additives in a grease and observe their distribution through 3D visualization. A commercial grease as a reference was studied with and without an inorganic additive of Fe{sub 3}O{sub 4} microparticles. The results showed that it was possible to identify these particles and track their movement. Under a shear stress, Fe{sub 3}O{sub 4} particles were found to adhere to the edge of calcium complex thickeners commonly used in grease. Due to sliding, the grease formed a film with increased density. This approach enables in-line monitoring of a lubricant and future investigation in mechanisms of lubrication.

  15. Experimentation on bio-kerosene stove using organic additive

    Science.gov (United States)

    Varshini, M.; Shetty, Divakar

    2017-07-01

    One of the basic worthy item used in most of the villages even now a day's also is the kerosene stove. But in the current scenario, the petroleum products are been replenished. So an alternate fuel should be found in order delve. This work is to check the contingency of blending pongamia oil and kerosene in which is used as an additive. Pongamia is one of the forest based fast growing evergreen tree which is capable of yielding 9 - 90 kg seeds from which 25% of oil can be extracted. Distilled cow urine is to be used so that the fuel can be stored for longer time and is odorless. Blends of 10% to 70% neat pongamia oil - kerosene(KEP) and pongamia oil - kerosene with additive(KEPWA) are prepared. The properties such as flash point, fire point and viscosity are determined. The blends are been compared by doing emission test. The blends with additive showed better properties and reducing in emission characteristics compared to neat blends. It is also observed that emission of CO is decreasing with increasing blends.

  16. The characterization of ceramic alumina prepared by using additive glass beads

    Science.gov (United States)

    Suprapedi; Muljadi; Sardjono, Priyo

    2018-01-01

    The ceramic alumina has been made by using additive glass bead (5 and 10 % wt.). There are two kinds of materials, such as : gamma Alumina and glass bead. Synthesis of alumina was done by ball milling for 24 hours, then the mixed powder was dried in drying oven at 100 °C for 6 hours. Furthermore, the dried powder was mixed by using 2 % of PVA and continued with compacted to form a pellet with pressure of 50 MPA. The next step is sintering process with variation temperature of 1150, 1200, 1250, 1300 and 1400 °C and holding time for 2 hours. The characterization conducted are consist of test density, hardness, shrinkage, and microstructure. The results show that ceramic alumina with addition of 10 % wt. glass bead has the higher value of density, hardness and shrinkage than addition of 5% wt. glass bead. The highest characterization of ceramic alumina with addition 10 % glass bead was achieved at sintering temperature of 1400 °C with density 3.68 g/cm3, hardness vickers 780.40 Hv and shrinkage 15.23 %. The XRD results show that it was founds a corrundum (alpha Alumina) as dominant phase and mullite as minor phase.

  17. Can ligand addition to soil enhance Cd phytoextraction? A mechanistic model study.

    Science.gov (United States)

    Lin, Zhongbing; Schneider, André; Nguyen, Christophe; Sterckeman, Thibault

    2014-11-01

    Phytoextraction is a potential method for cleaning Cd-polluted soils. Ligand addition to soil is expected to enhance Cd phytoextraction. However, experimental results show that this addition has contradictory effects on plant Cd uptake. A mechanistic model simulating the reaction kinetics (adsorption on solid phase, complexation in solution), transport (convection, diffusion) and root absorption (symplastic, apoplastic) of Cd and its complexes in soil was developed. This was used to calculate plant Cd uptake with and without ligand addition in a great number of combinations of soil, ligand and plant characteristics, varying the parameters within defined domains. Ligand addition generally strongly reduced hydrated Cd (Cd(2+)) concentration in soil solution through Cd complexation. Dissociation of Cd complex ([Formula: see text]) could not compensate for this reduction, which greatly lowered Cd(2+) symplastic uptake by roots. The apoplastic uptake of [Formula: see text] was not sufficient to compensate for the decrease in symplastic uptake. This explained why in the majority of the cases, ligand addition resulted in the reduction of the simulated Cd phytoextraction. A few results showed an enhanced phytoextraction in very particular conditions (strong plant transpiration with high apoplastic Cd uptake capacity), but this enhancement was very limited, making chelant-enhanced phytoextraction poorly efficient for Cd.

  18. Fourier analysis: from cloaking to imaging

    International Nuclear Information System (INIS)

    Wu, Kedi; Ping Wang, Guo; Cheng, Qiluan

    2016-01-01

    Regarding invisibility cloaks as an optical imaging system, we present a Fourier approach to analytically unify both Pendry cloaks and complementary media-based invisibility cloaks into one kind of cloak. By synthesizing different transfer functions, we can construct different devices to realize a series of interesting functions such as hiding objects (events), creating illusions, and performing perfect imaging. In this article, we give a brief review on recent works of applying Fourier approach to analysis invisibility cloaks and optical imaging through scattering layers. We show that, to construct devices to conceal an object, no constructive materials with extreme properties are required, making most, if not all, of the above functions realizable by using naturally occurring materials. As instances, we experimentally verify a method of directionally hiding distant objects and create illusions by using all-dielectric materials, and further demonstrate a non-invasive method of imaging objects completely hidden by scattering layers. (review)

  19. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  20. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  1. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  2. Do Holocaust survivors show increased vulnerability or resilience to post-Holocaust cumulative adversity?

    Science.gov (United States)

    Shrira, Amit; Palgi, Yuval; Ben-Ezra, Menachem; Shmotkin, Dov

    2010-06-01

    Prior trauma can hinder coping with additional adversity or inoculate against the effect of recurrent adversity. The present study further addressed this issue by examining whether a subsample of Holocaust survivors and comparison groups, drawn from the Israeli component of the Survey of Health, Ageing, and Retirement in Europe, were differentially affected by post-Holocaust cumulative adversity. Post-Holocaust cumulative adversity had a stronger effect on the lifetime depression of Holocaust survivors than on that of comparisons. However, comparisons were more negatively affected by post-Holocaust cumulative adversity when examining markers of physical and cognitive functioning. Our findings suggest that previous trauma can both sensitize and immunize, as Holocaust survivors show general resilience intertwined with specific vulnerability when confronted with additional cumulative adversity.

  3. Hypercrosslinked Additives for Ageless Gas-Separation Membranes.

    Science.gov (United States)

    Lau, Cher Hon; Mulet, Xavier; Konstas, Kristina; Doherty, Cara M; Sani, Marc-Antoine; Separovic, Frances; Hill, Matthew R; Wood, Colin D

    2016-02-05

    The loss of internal pores, a process known as physical aging, inhibits the long-term use of the most promising gas-separation polymers. Previously we reported that a porous aromatic framework (PAF-1) could form a remarkable nanocomposite with gas-separation polymers to stop aging. However, PAF-1 synthesis is very onerous both from a reagent and reaction-condition perspective, making it difficult to scale-up. We now reveal a highly dispersible and scalable additive based on α,α'-dichloro-p-xylene (p-DCX), that inhibits aging more effectively, and crucially almost doubles gas-transport selectivity. These synergistic effects are related to the intimately mixed nanocomposite that is formed though the high dispersibility of p-DCX in the gas-separation polymer. This reduces particle-size effects and the internal free volume is almost unchanged over time. This study shows this inexpensive and scalable polymer additive delivers exceptional gas-transport performance and selectivity. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  4. Morphology Analysis and Process Research on Novel Metal Fused-coating Additive Manufacturing

    Science.gov (United States)

    Wang, Xin; Wei, Zheng ying; Du, Jun; Ren, Chuan qi; Zhang, Shan; Zhang, Zhitong; Bai, Hao

    2017-12-01

    Existing metal additive manufacturing equipment has high capital costs and slow throughput printing. In this paper, a new metal fused-coating additive manufacturing (MFCAM) was proposed. Experiments of single-track formation were conducted using MFCAM to validate the feasibility. The low melting alloy was selected as the forming material. Then, the effect of process parameters such as the flow rate, deposition velocity and initial distance on the forming morphology. There is a strong coupling effect between the single track forming morphology. Through the analysis of influencing factors to improve the forming quality of specimens. The experimental results show that the twice as forming efficiency as the metal droplet deposition. Additionally, the forming morphology and quality were analyzed by confocal laser scanning microscope and X-ray. The results show that the metal fused-coating process can achieve good surface morphology and without internal tissue defect.

  5. Transflective multiplexing of holographic polymer dispersed liquid crystal using Si additives

    Directory of Open Access Journals (Sweden)

    2011-01-01

    Full Text Available Morphology, grating formation dynamics and electro-optical performance of transflective multiplexing with holographic polymer dispersed liquid crystal (HPDLC were investigated in the presence of silica nanoparticles (Aerosil R812 (RS and modified Aerosil 200 (MS and silicon monomer (vinyltrimethoxy silane (VTMS by using three coherent laser beams. The addition of Si additive significantly augmented the diffraction efficiencies of transmission and reflection gratings due to the enhanced phase separation with large LC channels. The film was driven only with Si additives which are enriched at the polymer-LC interfaces. As the additive content increased, driving voltage decreased to a minimum of 30 V at 2.0 wt% VTMS. It was found that the interface modification and large droplet size are crucial to operate the film. Among the three types of Si additive, VTMS showed the highest electro-optical performance due to its low viscosity and high reactivity.

  6. [The zoological garden of Amsterdam Natura Artis Magistra during world War II].

    Science.gov (United States)

    Frankenhuis, Maarten Th

    2009-01-01

    Thanks to the wise management of its director, dr. Armand Sunier, and his team, 'Artis' survived the difficult war period without great losses of its animals and only material damage to some buildings. Artis has meant very much for the inhabitants of the city of Amsterdam during the war. In the first place for the employees and their families, that were kept for starvation and forced labour by extra rations of food and safe hiding places. But also for jewish persons in hiding, who could escape from a certain death by hiding in animal houses or other buildings in the garden. And also for hundreds of thousands people of Amsterdam who found in their zoological garden an oasis of relaxation in a town full of threat and violence.

  7. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    Science.gov (United States)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  8. Daytime avoidance of chemosensory alarm cues by adult sea lamprey (Petromyzon marinus)

    Science.gov (United States)

    Di Rocco, Richard; Belanger, Cowan; Imre, István; Brown, Grant; Johnson, Nicholas S.

    2014-01-01

    Sea lamprey (Petromyzon marinus) avoid damage-released and predator chemosensory cues at night, but their response to these cues during the day is unknown. Here, we explored (i) whether sea lamprey avoid these cues during the day and (ii) the effect of water temperature on the avoidance of chemosensory alarm cues in two diurnal laboratory experiments. We hypothesized that daytime activity would be temperature-dependent and that only sea lamprey vulnerable to predation (i.e., not hiding) would behaviourally respond to chemosensory alarm cues. Ten groups of ten sea lamprey were exposed to one of a variety of potential chemosensory cues. The experiments were conducted over a range of temperatures to quantify the effect of temperature on avoidance behaviour. Consistent with our hypothesis, a higher proportion of animals were active during daytime as water temperature increased. Moving sea lamprey showed an avoidance response to 2-phenylethylamine (a compound found in mammalian urine) and human saliva once water temperatures had risen to mean (±SD) = 13.7 (±1.4) °C. Resting and hiding sea lamprey did not show an avoidance response to any of the experimental stimuli.

  9. Statistical analysis of sediment toxicity by additive monotone regression splines

    NARCIS (Netherlands)

    Boer, de W.J.; Besten, den P.J.; Braak, ter C.J.F.

    2002-01-01

    Modeling nonlinearity and thresholds in dose-effect relations is a major challenge, particularly in noisy data sets. Here we show the utility of nonlinear regression with additive monotone regression splines. These splines lead almost automatically to the estimation of thresholds. We applied this

  10. Effect of hydrogen addition on autoignited methane lifted flames

    KAUST Repository

    Choin, Byung Chul

    2012-01-01

    Autoignited lifted flames in laminar jets with hydrogen-enriched methane fuels have been investigated experimentally in heated coflow air. The results showed that the autoignited lifted flame of the methane/hydrogen mixture, which had an initial temperature over 920 K, the threshold temperature for autoignition in methane jets, exhibited features typical of either a tribrachial edge or mild combustion depending on fuel mole fraction and the liftoff height increased with jet velocity. The liftoff height in the hydrogen-assisted autoignition regime was dependent on the square of the adiabatic ignition delay time for the addition of small amounts of hydrogen, as was the case for pure methane jets. When the initial temperature was below 920 K, where the methane fuel did not show autoignition behavior, the flame was autoignited by the addition of hydrogen, which is an ignition improver. The liftoff height demonstrated a unique feature in that it decreased nonlinearly as the jet velocity increased. The differential diffusion of hydrogen is expected to play a crucial role in the decrease in the liftoff height with increasing jet velocity.

  11. Are mammal olfactory signals hiding right under our noses?

    Science.gov (United States)

    Apps, Peter James

    2013-06-01

    Chemical communication via olfactory semiochemicals plays a central role in the social behaviour and reproduction of mammals, but even after four decades of research, only a few mammal semiochemicals have been chemically characterized. Expectations that mammal chemical signals are coded by quantitative relationships among multiple components have persisted since the earliest studies of mammal semiochemistry, and continue to direct research strategies. Nonetheless, the chemistry of mammal excretions and secretions and the characteristics of those semiochemicals that have been identified show that mammal semiochemicals are as likely to be single compounds as to be mixtures, and are as likely to be coded by the presence and absence of chemical compounds as by their quantities. There is very scant support for the view that mammal semiochemicals code signals as specific ratios between components, and no evidence that they depend on a Gestalt or a chemical image. Of 31 semiochemicals whose chemical composition is known, 15 have a single component and 16 are coded by presence/absence, one may depend on a ratio between two compounds and none of them are chemical images. The expectation that mammal chemical signals have multiple components underpins the use of multivariate statistical analyses of chromatographic data, but the ways in which multivariate statistics are commonly used to search for active mixtures leads to single messenger compounds and signals that are sent by the presence and absence of compounds being overlooked. Research on mammal semiochemicals needs to accommodate the possibility that simple qualitative differences are no less likely than complex quantitative differences to encode chemical signals.

  12. Talk Show Science.

    Science.gov (United States)

    Moore, Mitzi Ruth

    1992-01-01

    Proposes having students perform skits in which they play the roles of the science concepts they are trying to understand. Provides the dialog for a skit in which hot and cold gas molecules are interviewed on a talk show to study how these properties affect wind, rain, and other weather phenomena. (MDH)

  13. [The acute management of agitation].

    Science.gov (United States)

    Bakay, S; Iweins, A; Scantamburlo, G; Ansseau, M; Pitchot, W

    2013-11-01

    Agitation in psychiatry is defined as "a request to which an answer cannot be deferred". If some types of controllable agitation can be solved by human means or psychotropic drugs, others may require the intervention of intensivists who will contribute to the onset of crisis resolution. In addition, an organic aetiology must be carefully excluded a before considering a psychiatric origin of agitation, especially in patients with no psychiatric history and in the elderly. Indeed, acute agitation can hide serious somatic traps and be life threatening.

  14. Additive recovery at lateral boundaries of grains under electronic exposure

    International Nuclear Information System (INIS)

    Plotnikov, S.V.; Postnikov, D.V.

    2000-01-01

    The experimental investigation of additive re-distribution under electronic beam revealed a recovery of the additive at grain boundaries. Additive accumulation mainly takes place at the boundaries that are perpendicular to material surface, whereas there is no an observed recovery of additive at the boundaries that are parallel to the surface. To construe the processes of additive recovery at grain boundaries, we may use the kinetic diffusion equation describing the mass transfer processes in the presence of temperature gradients and non-equilibrium vacancies. The additive recovery is caused by spot fault gradients near the grain boundary. The grain boundary is an intensive run-off region of vacancies. Therefore, the average vacancy distribution profile near the grain boundary changes its pattern. The above case indicates that there are two additive fluxes. One of them is vectored perpendicular to the surface, and the other one is parallel to it, i.e. it is vectored to the grain boundary. A study of the perpendicular and parallel boundaries shows that there is no additive settling at the boundaries that are parallel to the surface, since the general flux is vectored to the parallel boundaries. There is no such kind of phenomenon at the grain boundaries that are perpendicular to the surface. Besides, the perpendicular boundaries are more effective run-off regions for vacancies, since there is a slower build-up of the region with vacancies due to displacement of the vacancies to the surface

  15. Food additives

    Science.gov (United States)

    ... GO About MedlinePlus Site Map FAQs Customer Support Health Topics Drugs & Supplements Videos & Tools Español You Are Here: Home → Medical Encyclopedia → Food additives URL of this page: //medlineplus.gov/ency/article/ ...

  16. Machine-Learning-Based No Show Prediction in Outpatient Visits

    Directory of Open Access Journals (Sweden)

    Carlos Elvira

    2018-03-01

    Full Text Available A recurring problem in healthcare is the high percentage of patients who miss their appointment, be it a consultation or a hospital test. The present study seeks patient’s behavioural patterns that allow predicting the probability of no- shows. We explore the convenience of using Big Data Machine Learning models to accomplish this task. To begin with, a predictive model based only on variables associated with the target appointment is built. Then the model is improved by considering the patient’s history of appointments. In both cases, the Gradient Boosting algorithm was the predictor of choice. Our numerical results are considered promising given the small amount of information available. However, there seems to be plenty of room to improve the model if we manage to collect additional data for both patients and appointments.

  17. Simultaneous masking additivity for short Gaussian-shaped tones: spectral effects.

    Science.gov (United States)

    Laback, Bernhard; Necciari, Thibaud; Balazs, Peter; Savel, Sophie; Ystad, Sølvi

    2013-08-01

    Laback et al. [(2011). J. Acoust. Soc. Am. 129, 888-897] investigated the additivity of nonsimultaneous masking using short Gaussian-shaped tones as maskers and target. The present study involved Gaussian stimuli to measure the additivity of simultaneous masking for combinations of up to four spectrally separated maskers. According to most basilar membrane measurements, the maskers should be processed linearly at the characteristic frequency (CF) of the target. Assuming also compression of the target, all masker combinations should produce excess masking (exceeding linear additivity). The results for a pair of maskers flanking the target indeed showed excess masking. The amount of excess masking could be predicted by a model assuming summation of masker-evoked excitations in intensity units at the target CF and compression of the target, using compressive input/output functions derived from the nonsimultaneous masking study. However, the combinations of lower-frequency maskers showed much less excess masking than predicted by the model. This cannot easily be attributed to factors like off-frequency listening, combination tone perception, or between-masker suppression. It was better predicted, however, by assuming weighted intensity summation of masker excitations. The optimum weights for the lower-frequency maskers were smaller than one, consistent with partial masker compression as indicated by recent psychoacoustic data.

  18. Ionic Liquids as Additives of Coffee Bean Oil in Steel-Steel Contacts

    Directory of Open Access Journals (Sweden)

    James Grace

    2015-10-01

    Full Text Available Environmental awareness and ever-growing restrictive regulations over contamination have increased the need for more environmentally-friendly lubricants. Due to their superior biodegradability and lower toxicity, vegetable oils are a good alternative to replace currently-used mineral oils. However, vegetable oils show low oxidation and thermal stability and poor anti-wear properties. Most of these drawbacks can be attenuated through the use of additives. In the last decade, ionic liquids have emerged as high-performance fluids and lubricant additives due to their unique characteristics. In this study, the tribological behavior of two phosphonium-based ionic liquids is investigated as additives of coffee bean oil in steel-steel contact. Coffee bean oil-ionic liquid blends containing 1, 2.5, and 5 wt% of each ionic liquid are studied using a block-on-flat reciprocating tribometer and the test results are compared to commercially-available, fully-formulated lubricant. Results showed that the addition of the ionic liquids to the coffee bean oil reduces wear volume of the steel disks, and wear values achieved are comparable to that obtained when the commercially-available lubricant is used.

  19. Degradation of Paraquat in Gramoxone Pesticide with Addition of ZnO

    Directory of Open Access Journals (Sweden)

    Febrina Arfi

    2017-11-01

    Full Text Available Paraquat is the most toxic herbicide, the main agricultural crops and plantations that use them are cloves, cocoa, oil palm, rubber, coffee, and pepper. Therefore, it is necessary to study to degrade paraquat compounds by photolysis method with using ZnO. Photolysis is a process of UV irradiation with a wavelength of 200-400 nm. In this study Photolysis method used UV light with λ = 365 nm. Degradation of paraquat compound was done with the influence of variation of time without the addition ZnO, the influence of ZnO additional variations, and the effect of combination between variations of time and optimization of ZnO addition. The result of the study shows that photolysis degradation product without the addition of ZnO for 120 minutes has been degraded by 12.56%. While the optimum addition of 0.1 grams ZnO increased the percentage of degradation which is about 57.64%. This is proved that the addition of ZnO with photolysis method can degrade more paraquat compounds.

  20. Hiding data selected topics : Rudolf Ahlswede’s lectures on information theory 3

    CERN Document Server

    Althöfer, Ingo; Deppe, Christian; Tamm, Ulrich

    2016-01-01

    Devoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon’s historical work on secrecy systems is detailed, followed by an introduction to an information-theoretic model of wiretap channels, and such important concepts as homophonic coding and authentication. Once the theoretical arguments have been presented, comprehensive technical details of AES are given. Furthermore, a short introduction to the history of public-key cryptology, RSA and El Gamal cryptosystems is provided, followed by a look at the basic theory of elliptic curves, and algorithms for efficient addition in elliptic curves. Lastly, the important topic of “oblivious transfer” is discussed, which is strongly conne...

  1. Additives for high-load extruders; Additivsysteme fuer hochbelastete Spritzgussmaschinen

    Energy Technology Data Exchange (ETDEWEB)

    Fletschinger, M.; Brand, F. [Ciba Speciality Chemicals Inc., Basel (Switzerland)

    2004-12-01

    The requirement for tight sealing of hydraulic systems, such as between the moving cylinders and the seals in extruders, has led to the development of new technologies in particular with respect to the sealing materials. Today PTFE/bronze (Poly-Tetra-Fluoro-Ethylene/embedded bronze powder) seals are widely used for these applications, which require in addition reliability and long seal life. Needs to replace environmentally problematic hydraulic fluids based on ZnDTP has gained momentum and therefore new lubricants have also been evaluated for these hydraulic systems. The well-known seal manufacturer Busak + Shamban observed axial tiny scratches in the contact area cylinder-seal on the metal surface when replacing ZnDTP based with Zn-free lubricants. ''Micro-scratching'' refers to this phenomenon, which ultimately leads to fluid leakage thus reducing the efficiency of the hydraulic systems. A first assumption was that this problem is associated with the additive technology. A subsequent root cause analysis clearly showed that this preliminary hypothesis was incorrect. An in depth investigation showed that the phenomenon occurs when the load carrying capacity of the lubricant is insufficient and is not associated with the lubricant additive technology (Zn-free vs. Zn-containing). The load carrying capacity is predominantly determined by the selection of the correct lubricant viscosity and by its appropriate wear inhibition system. In this work it could be demonstrated that there are also Zn-free lubricants available which meet all these requirements. (orig.)

  2. Technological foundations of processing tomato pomace in feed additives

    Directory of Open Access Journals (Sweden)

    B. Yegorov

    2015-05-01

    Full Text Available Introduction. Search for new types of alternative raw material for the efficient development of poultry industry and problem of waste disposal of canning industry made it necessary to develop a method of processing tomato pomace in feed additives. Materials and methods. Sampling, preparation and testing were carried out by general and specific organ oleptic and physical-technological methods of assessment and analysis of the properties of raw materials and finished products. Results. Incorporation of tomato pomace in the feed additive reduces the cost of raw materials and expenses associated with moistening of the mixture before extrusion and incorporation of chalk feed will solve the problem of calcium imbalance of laying hens. It was found that extrusion process has improved the physical properties of feed additive and showed the possibility of its use as a feed component: moisture content decreased by 34.5 %, the angle of repose increased by 11.4 %, flowability decreased by 39.7 % and bulk density decreased by 32.3 %. Conclusions. The resulting feed additive will solve the problem of diversification of raw materials, waste, calcium imbalance of laying hens and reduce expenses on compound animal feedstuff production.

  3. Obesity in show cats.

    Science.gov (United States)

    Corbee, R J

    2014-12-01

    Obesity is an important disease with a high prevalence in cats. Because obesity is related to several other diseases, it is important to identify the population at risk. Several risk factors for obesity have been described in the literature. A higher incidence of obesity in certain cat breeds has been suggested. The aim of this study was to determine whether obesity occurs more often in certain breeds. The second aim was to relate the increased prevalence of obesity in certain breeds to the official standards of that breed. To this end, 268 cats of 22 different breeds investigated by determining their body condition score (BCS) on a nine-point scale by inspection and palpation, at two different cat shows. Overall, 45.5% of the show cats had a BCS > 5, and 4.5% of the show cats had a BCS > 7. There were significant differences between breeds, which could be related to the breed standards. Most overweight and obese cats were in the neutered group. It warrants firm discussions with breeders and cat show judges to come to different interpretations of the standards in order to prevent overweight conditions in certain breeds from being the standard of beauty. Neutering predisposes for obesity and requires early nutritional intervention to prevent obese conditions. Journal of Animal Physiology and Animal Nutrition © 2014 Blackwell Verlag GmbH.

  4. Plasticity of thermoregulatory behavior in leopard geckos (Eublepharis macularius, Blyth 1954).

    Science.gov (United States)

    Craioveanu, Octavian; Craioveanu, Cristina; Mireşan, Vioara

    2017-07-01

    Studies on thermoregulation in nocturnal lizards have shown that their thermal regimes are similar to those of diurnal lizards, even though they hide during the daytime and are active mostly at night, when heat sources are very scarce. As a result, nocturnal lizards display an active thermoregulatory behavior consisting of seeking warm shelters to hide during the daytime, using accumulated heat for the nocturnal activity. Based on this information, we hypothesize that when leopard geckos (Eublepharis macularius, Blyth 1954) are presented with the choice of safety in cool shelters or vulnerability in heated open areas, suitable temperature will prevail in importance, i.e. they will trade the advantages provided by the shelter for an exposed, but physiologically necessary heat source. Data on the time juvenile E. macularius spent in shelters, and in open areas along a thermal gradient and under a 12/12 hr photoperiod, from eight individuals confirmed our hypothesis. We found that, not only did they select heat sources over shelters, but, along with the light/dark cycle, temperature may also represent a cue for activity. Additionally we found that substrate moisture plays an important role in shelter preference. © 2017 Wiley Periodicals, Inc.

  5. Determination of Tannins of Three Common Acacia Species of Sudan

    Directory of Open Access Journals (Sweden)

    Isam Eldin Hussein Elgailani

    2014-01-01

    Full Text Available The objective of this study is to analyze and compare tannins of three common Acacia species of Sudan, since vegetable tannins are important in leather industry. Acacia nilotica and Acacia seyal samples were collected from Sunt Forest in Khartoum State, while Acacia senegal samples were collected from the Debabat Forest in South Kordofan State. Bark samples from bulk collections of the three Acacia species were extracted with boiled deionized water. The amount of tannins present in these bulk samples was determined by Folin-Denis method for total phenolic materials, followed by precipitation with hide-powder. The difference between the amount of phenolic materials present before and after addition of hide-powder represents the amount of tannins present. The percentage of tannins in the leaves, bark, and mature and immature fruits of collections of individuals of Acacia species was estimated; mature and immature fruits of Acacia nilotica contain tannins (22.15% and 22.10%, resp.. The leaves of Acacia nilotica and Acacia seyal contain tannins (11.80% and 6.30%, resp.. The barks of Acacia seyal, Acacia nilotica, and Acacia senegal contain tannins (12.15%, 10.47%, and 3.49%, resp..

  6. Adaptive Watermarking Scheme Using Biased Shift of Quantization Index

    Directory of Open Access Journals (Sweden)

    Young-Ho Seo

    2010-01-01

    Full Text Available We propose a watermark embedding and extracting method for blind watermarking. It uses the characteristics of a scalar quantizer to comply with the recommendation in JPEG, MPEG series, or JPEG2000. Our method performs embedding of a watermark bit by shifting the corresponding frequency transform coefficient (the watermark position to a quantization index according to the value of the watermark bit, which prevents from losing the watermark information during the data compression process. The watermark can be embedded simultaneously to the quantization process without an additional process for watermarking, which means it can be performed at the same speed to the compression process. In the embedding process, a Linear Feedback Shift Register (LFSR is used to hide the watermark informations and the watermark positions. The experimental results showed that the proposed method satisfies enough robustness and imperceptibility that are the major requirements for watermarking.

  7. Hydration of Portland cement with additions of calcium sulfoaluminates

    International Nuclear Information System (INIS)

    Le Saoût, Gwenn; Lothenbach, Barbara; Hori, Akihiro; Higuchi, Takayuki; Winnefeld, Frank

    2013-01-01

    The effect of mineral additions based on calcium aluminates on the hydration mechanism of ordinary Portland cement (OPC) was investigated using isothermal calorimetry, thermal analysis, X-ray diffraction, scanning electron microscopy, solid state nuclear magnetic resonance and pore solution analysis. Results show that the addition of a calcium sulfoaluminate cement (CSA) to the OPC does not affect the hydration mechanism of alite but controls the aluminate dissolution. In the second blend investigated, a rapid setting cement, the amorphous calcium aluminate reacts very fast to ettringite. The release of aluminum ions strongly retards the hydration of alite but the C–S–H has a similar composition as in OPC with no additional Al to Si substitution. As in CSA–OPC, the aluminate hydration is controlled by the availability of sulfates. The coupling of thermodynamic modeling with the kinetic equations predicts the amount of hydrates and pore solution compositions as a function of time and validates the model in these systems.

  8. Valency stabilization of Polyvalent Iron Ions in Solution By some Organic additives during Gamma Irradiation

    International Nuclear Information System (INIS)

    Barakat, M.F.; Abdel Hamid, M.M.

    2012-01-01

    Valency stabilization of polyvalent ions in gamma irradiated aqueous solutions is sometimes necessary for the success of some chemical operations. In some previous publications valency stabilization of some polyvalent ions in solution upon gamma irradiation was achieved by using additives capable of interacting with the oxidizing or reducing species formed by water radiolysis in the medium. The results showed that the duration of valency stabilization depends on the concentration of the additives used.In the present work, a series of some organic additives has been used to investigate their capability in inducing valency stabilization of polyvalent iron ions when subjected to extended gamma irradiation periods. The results showed that the efficiency of valency stabilization depends on the amount and chemical structure of the organic additive used

  9. Behaviour of a cement stone with chemical additions under short high temperature effects

    International Nuclear Information System (INIS)

    Falikman, V.R.; Veselova, V.I.; Ershov, V.Yu.; Muzalevskij, L.P.

    1987-01-01

    The purpose of the paper is to investigate the influence of different chemical additions used in NPP construction on thermal stability of a cement stone under short- and high-temperature effects. S-3 and dihydroxyphenyl utilized as peptizing agents for increase of placeability of concrete mixtures as well as sodium nitrite utilized as an antifreezing addition at conccreting at low temperatures are used as additions. The investigations were conducted in the 0-900 deg C temperature range divided into 4 ranges. Shrinkage and mass losses of specimens were determined. The obtained data show that specimens with additions are subjected to smaller shrinkage and mass losses as compared with specimens without additions. The highest positive effect is attained in portland cements with active mineral additions

  10. Effects of Different Addition Amounts of Superphosphate on Vegetable Waste Compost

    Directory of Open Access Journals (Sweden)

    YANG Yan

    2017-01-01

    Full Text Available The effects of different addition amounts of superphosphate on vegetable waste compost were studied. Results showed that, addition of superphosphate improved the temperature during the compost. It had the highest temperature of 64.33℃, when the addition quantity of superphosphate was 10.26% of dry matter weight. At the end of the composting, adding superphosphate had no significant effect on C/N, however, it decreased pH and improved the EC of the compost. The EC values were significantly higher than CK, when the addition amount was be tween 4.10%and 10.26%of dry matter weight. When the addition below 10.26%, the GI values were significantly higher than CK(P<0.01, and the highest value was 105.61%, when the addition was 2.05%(S5. Adding superphosphate significantly reduced the nitrogen loss rate of composting(P<0.05, and the lowest was 23.94%,when the addition was 2.05%, meanwhile, the input-output ratio was 3.93, which was the highest value. Under this experimental condition, adding superphosphate promoted the compost maturity significantly, reduced the nitrogen loss rate, and the optimal addition of superphosphate was 2.05%of dry matter weight.

  11. Hidden spin-3/2 field in the standard model

    Energy Technology Data Exchange (ETDEWEB)

    Demir, Durmus; Karahan, Canan; Sargin, Ozan [Izmir Institute of Technology, Department of Physics, Urla (Turkey); Korutlu, Beste [TUeBITAK National Metrology Institute, Gebze, Kocaeli (Turkey)

    2017-09-15

    Here we show that a massive spin-3/2 field can hide in the SM spectrum in a way revealing itself only virtually. We study collider signatures and loop effects of this field, and determine its role in Higgs inflation and its potential as dark matter. We show that this spin-3/2 field has a rich linear collider phenomenology and motivates consideration of a neutrino-Higgs collider. We also show that the study of Higgs inflation, dark matter and dark energy can reveal more about the neutrino and dark sector. (orig.)

  12. Evaluation of the H-point standard additions method (HPSAM) and the generalized H-point standard additions method (GHPSAM) for the UV-analysis of two-component mixtures.

    Science.gov (United States)

    Hund, E; Massart, D L; Smeyers-Verbeke, J

    1999-10-01

    The H-point standard additions method (HPSAM) and two versions of the generalized H-point standard additions method (GHPSAM) are evaluated for the UV-analysis of two-component mixtures. Synthetic mixtures of anhydrous caffeine and phenazone as well as of atovaquone and proguanil hydrochloride were used. Furthermore, the method was applied to pharmaceutical formulations that contain these compounds as active drug substances. This paper shows both the difficulties that are related to the methods and the conditions by which acceptable results can be obtained.

  13. Ação de diferentes agentes curtentes utilizados no curtimento de peles de coelhos: testes físico-mecânicos dos couros = Action of different tanning agents used on rabbit hide tanning: physicalmechanic tests

    Directory of Open Access Journals (Sweden)

    Nilson do Prado Franco

    2009-10-01

    Full Text Available O objetivo do experimento foi avaliar a ação de diferentes agentes curtentes no processamento das peles de coelhos, sobre a resistência do couro. Cinquenta peles de coelhos foram submetidas a diferentes agentes curtentes na etapa de curtimento (T1 = 6% sais de cromoChromossal B®, T2 = 22% tanino vegetal Clarotan-x8®; T3 = 22% tanino sintético Syntac CW®; T4 = 12% tanino vegetal Weibull® + 10% tanino sintético Syntac F®; T5 = 22% tanino vegetal Weibull®. Foram retirados os corpos de prova do couro, na região dorsal, no sentidolongitudinal e transversal em relação ao eixo céfalo-caudal. Os agentes curtentes e retirada dos corpos de prova não influenciaram no teste de tração (9,28 N mm-2 a 11,63 N mm-2 e força aplicada (17,91 N a 24,85 N nos testes. Os curtimentos com sais de cromo (62,85% e Clarotan–x8® (70,28% proporcionaram maiores valores de alongamento em relação aos demais agentes curtentes utilizados. Os corpos de prova do couro no sentido transversal (59,12% apresentaram maior alongamento comparado ao longitudinal (49,72%. Os curtimentos com sais de cromo (22,70 N mm-1, Clarotan–x8® (25,94 N mm-1 e Weibull® (21,58 N mm-1 proporcionaram couros com maior resistência ao rasgamento. O sentido de retirada dos corpos de prova no couro não influenciou no rasgamento progressivo. As técnicas de curtimento com sais de cromo e Clarotan-x8® proporcionaram couros com melhores valores de resistência ao alongamento e rasgamento progressivo.The objective of the experiment was to evaluate the action of different tanning agents in the processing of rabbit hides over skin resistance. Fifty skins of rabbit hides were submitted to different tanning agents in the tanning stage (T1 = 6% Chromossal B® chromesalts; T2 = 22% Clarotan–x8® vegetable tannin; T3 = 22% Syntac CW® synthetic tannin; T4 = 12% Weibull® vegetable tannin + 10% Syntac F® synthetic tannin; T5 = 22% Weibull® vegetable tannin. The specimens were removed

  14. Improvement of engineering soil properties using non -traditional additives

    Directory of Open Access Journals (Sweden)

    Waheed Mohanned

    2018-01-01

    Full Text Available Laboratory experiments are conducted to evaluate the effect of some non-traditional additives on the engineering properties of clayey soil, which show problematic phenomenon when used as a construction material. The conducted tests covered the influence of these additives on various parameters like consistency limits, compaction characteristics and CBR value. Two nontraditional stabilizers are selected in this study, polymers and phosphoric acid at three different percent which are (1%, 3% and 5% of the dry soil weight. It is concluded that addition of the polymer to the clayey soil results in a slight increase in plastic limit while the liquid limit is not affected accompanied by a marginal decrease in the dry unit weight while the optimum moisture content remains unaffected. The addition of phosphoric acid to the clayey soil has no effect on its Atterberg limits. In general, it is observed that polymer is found to be ineffective as a stabilizer to improve clayey soils, especially in small amounts of about (3%. The phosphoric acid treated soil gained better improvement for all amounts of additive used. For (3% acid treated soil the CBR is about (360% compared to that of untreated soil, for that, it can be concluded that the improvement using phosphoric acid in the clay soils is a promising option and can be applied to solve the geotechnical stabilization problems.

  15. "Compacted" procedures for adults' simple addition: A review and critique of the evidence.

    Science.gov (United States)

    Chen, Yalin; Campbell, Jamie I D

    2018-04-01

    We review recent empirical findings and arguments proffered as evidence that educated adults solve elementary addition problems (3 + 2, 4 + 1) using so-called compacted procedures (e.g., unconscious, automatic counting); a conclusion that could have significant pedagogical implications. We begin with the large-sample experiment reported by Uittenhove, Thevenot and Barrouillet (2016, Cognition, 146, 289-303), which tested 90 adults on the 81 single-digit addition problems from 1 + 1 to 9 + 9. They identified the 12 very-small addition problems with different operands both ≤ 4 (e.g., 4 + 3) as a distinct subgroup of problems solved by unconscious, automatic counting: These items yielded a near-perfectly linear increase in answer response time (RT) yoked to the sum of the operands. Using the data reported in the article, however, we show that there are clear violations of the sum-counting model's predictions among the very-small addition problems, and that there is no real RT boundary associated with addends ≤4. Furthermore, we show that a well-known associative retrieval model of addition facts-the network interference theory (Campbell, 1995)-predicts the results observed for these problems with high precision. We also review the other types of evidence adduced for the compacted procedure theory of simple addition and conclude that these findings are unconvincing in their own right and only distantly consistent with automatic counting. We conclude that the cumulative evidence for fast compacted procedures for adults' simple addition does not justify revision of the long-standing assumption that direct memory retrieval is ultimately the most efficient process of simple addition for nonzero problems, let alone sufficient to recommend significant changes to basic addition pedagogy.

  16. Additives as corrosion inhibitors in reinforced concrete

    International Nuclear Information System (INIS)

    Venegas, Ricardo; Vera, Rosa; Carvajal, Ana Maria; Villarroel, Maria; Vera, Enrique; Ortiz, Cesar

    2008-01-01

    This work studies the behavior of two additives as inhibitors of corrosion in reinforced concrete. The presence of Microsilica, a physical inhibitor, in the mixture decreases pore size in structures and improves compression. Calcium Nitrite, a chemical inhibitor, is an oxidizing agent and allows a more homogenous film to form over the steel that becomes more resistant to attacks from aggressive ions like anion chloride and others. Three pairs of concrete test pieces were used without additives and with additives with a/c ration of 0.55. The samples were exposed to an accelerated attack of chlorides, submerging them in a 4.27 M solution of NaCl for 24 hours and then drying them at room temperature for another 24 hours, completing a cycle every 48 hours. The tests were carried out at 1 cycle and 5 cycles of partial moistening and drying. The steel corrosion was evaluated with corrosion potential measurements. Conductivity, pH, chlorides and sulfate profiles were defined depending on the depth of the concrete. The composition of the corrosion products was determined using X-ray diffraction and the morphology of the film by scanning electron microscopy. The results show that for 1 test cycle, the corrosion potential of the steel in the sample with calcium nitrite was -54mV, which was a higher value than that measured in the sample with microsilica (-217.3mV) and without an additive (-159.1mV), corroborating its inhibitory power. The content of the free chlorides in the sample with micros ice allows greater capillary suction by adding high amounts of chloride to the structure (2.6% on the outside up to 2.20% near the steel); while the test pieces with calcium nitrite and without an additive had concentrations lower than 2% in all the evaluated points. After five cycles of exposing the samples to the saline solution the behavior is inverted. The measures of conductivity agreed with the previous results. Meanwhile, the pH of the solutions obtained from the powder from the

  17. Metabolic modeling of energy balances in Mycoplasma hyopneumoniae shows that pyruvate addition increases growth rate

    NARCIS (Netherlands)

    Kamminga, Tjerko; Slagman, Simen Jan; Bijlsma, Jetta J.E.; Martins dos Santos, Vitor A.P.; Suarez-Diez, Maria; Schaap, Peter J.

    2017-01-01

    Mycoplasma hyopneumoniae is cultured on large-scale to produce antigen for inactivated whole-cell vaccines against respiratory disease in pigs. However, the fastidious nutrient requirements of this minimal bacterium and the low growth rate make it challenging to reach sufficient biomass yield for

  18. Phytotherapeutics oridonin and ponicidin show additive effects combined with irradiation in pancreatic cancer in vitro

    Directory of Open Access Journals (Sweden)

    Liermann Jakob

    2017-11-01

    Full Text Available Chemoradiation of locally advanced non-metastatic pancreatic cancer can lead to secondary operability by tumor mass reduction. Here, we analyzed radiomodulating effects of oridonin and ponicidin in pancreatic cancer in vitro. Both agents are ent-kaurane diterpenoids, extracted from Isodon rubescens, a plant that is well known in Traditional Chinese Medicine. Cytotoxic effects have recently been shown in different tumor entities for both agents.

  19. Improvement of aquaponic performance through micro- and macro-nutrient addition.

    Science.gov (United States)

    Ru, Dongyun; Liu, Jikai; Hu, Zhen; Zou, Yina; Jiang, Liping; Cheng, Xiaodian; Lv, Zhenting

    2017-07-01

    Aquaponics is one of the "zero waste" industry in the twenty-first century, and is considered to be one of the major trends for the future development of agriculture. However, the low nitrogen utilization efficiency (NUE) restricted its widely application. To date, many attempts have been conducted to improve its NUE. In the present study, effect of micro- and macro-nutrient addition on performance of tilapia-pak choi aquaponics was investigated. Results showed that the addition of micro- and macro-nutrients improved the growth of plant directly and facilitated fish physiology indirectly, which subsequently increased NUE of aquaponics from 40.42 to 50.64%. In addition, remarkable lower total phosphorus concentration was obtained in aquaponics with micro- and macro-nutrient addition, which was attributed to the formation of struvite. Most of the added micro-nutrients were enriched in plant root, while macro-nutrients mainly existed in water. Moreover, no enrichment of micro- and macro-nutrients in aquaponic products (i.e., fish and plant leaves) was observed, indicating that it had no influence on food safety. The findings here reported manifest that appropriate addition of micro- and macro-nutrients to aquaponics is necessary, and would improve its economic feasibility.

  20. Can R-parity violation hide vanilla supersymmetry at the LHC?

    International Nuclear Information System (INIS)

    Asano, Masaki

    2012-09-01

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.