WorldWideScience

Sample records for hide show additional

  1. Efficient Information Hiding Based on Theory of Numbers

    Directory of Open Access Journals (Sweden)

    Yanjun Liu

    2018-01-01

    Full Text Available Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hiding scheme based on the combination of Chinese remainder theorem (CRT and a new extraction function is proposed. By the proposed scheme, the cover image is divided into non-overlapping pixel groups for embedding to increase the embedding capacity. Experimental results show that the embedding capacity of the proposed scheme is significantly higher (greater than 2.5 bpp than previously proposed schemes while ensuring very good visual quality of the stego image. In addition, security analysis is given to show that the proposed scheme can resist visual attack.

  2. Optical hiding with visual cryptography

    Science.gov (United States)

    Shi, Yishi; Yang, Xiubo

    2017-11-01

    We propose an optical hiding method based on visual cryptography. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof and image-covered, leading to the high security. During the extraction process, the covered phase-keys are illuminated with laser beams and then incoherently superimposed to extract the hidden information directly by human vision, without complicated optical implementations and any additional computation, resulting in the convenience of extraction. Also, the phase-keys are manufactured as the diffractive optical elements that are robust to the attacks, such as the blocking and the phase-noise. Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.

  3. Meta-GWAS Accuracy and Power (MetaGAP Calculator Shows that Hiding Heritability Is Partially Due to Imperfect Genetic Correlations across Studies.

    Directory of Open Access Journals (Sweden)

    Ronald de Vlaming

    2017-01-01

    Full Text Available Large-scale genome-wide association results are typically obtained from a fixed-effects meta-analysis of GWAS summary statistics from multiple studies spanning different regions and/or time periods. This approach averages the estimated effects of genetic variants across studies. In case genetic effects are heterogeneous across studies, the statistical power of a GWAS and the predictive accuracy of polygenic scores are attenuated, contributing to the so-called 'missing heritability'. Here, we describe the online Meta-GWAS Accuracy and Power (MetaGAP calculator (available at www.devlaming.eu which quantifies this attenuation based on a novel multi-study framework. By means of simulation studies, we show that under a wide range of genetic architectures, the statistical power and predictive accuracy provided by this calculator are accurate. We compare the predictions from the MetaGAP calculator with actual results obtained in the GWAS literature. Specifically, we use genomic-relatedness-matrix restricted maximum likelihood to estimate the SNP heritability and cross-study genetic correlation of height, BMI, years of education, and self-rated health in three large samples. These estimates are used as input parameters for the MetaGAP calculator. Results from the calculator suggest that cross-study heterogeneity has led to attenuation of statistical power and predictive accuracy in recent large-scale GWAS efforts on these traits (e.g., for years of education, we estimate a relative loss of 51-62% in the number of genome-wide significant loci and a relative loss in polygenic score R2 of 36-38%. Hence, cross-study heterogeneity contributes to the missing heritability.

  4. Reflections on Quantum Data Hiding

    Science.gov (United States)

    Winter, Andreas

    Quantum data hiding, originally invented as a limitation on local operations and classical communications (LOCC) in distinguishing globally orthogonal states, is actually a phenomenon arising generically in statistics whenever comparing a `strong' set of measurements (i.e., decision rules) with a `weak' one. The classical statistical analogue of this would be secret sharing, in which two perfectly distinguishable multi-partite hypotheses appear to be indistinguishable when accessing only a marginal. The quantum versions are richer in that for example LOCC allows for state tomography, so the states cannot be come perfectly indistinguishable but only nearly so, and hence the question is one of efficiency. I will discuss two concrete examples and associated sets of problems: 1. Gaussian operations and classical computation (GOCC): Not very surprisingly, GOCC cannot distinguish optimally even two coherent states of a single mode. Here we find states, each a mixture of multi-mode coherent states, which are almost perfectly distinguishable by suitable measurements, by when restricted to GOCC, i.e. linear optics and post-processing, the states appear almost identical. The construction is random and relies on coding arguments. Open questions include whether there one can give a constructive version of the argument, and whether for instance even thermal states can be used, or how efficient the hiding is. 2. Local operation and classical communication (LOCC): It is well-known that in a bipartite dxd-system, asymptotically logd bits can be hidden. Here we show for the first time, using the calculus of min-entropies, that this is asymptotically optimal. In fact, we get bounds on the data hiding capacity of any preparation system; these are however not always tight. While it is known that data hiding by separable states is possible (i.e. the state preparation can be done by LOCC), it is open whether the optimal information efficiency of (asymptotically) log d bits can be

  5. Hackers in Hiding:

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2016-01-01

    On several occasions Michel Foucault advocated a methodological turn towards what he called a ‘happy positivism’. Foucault’s emphasis on the surface does not deny the importance of structures of hiding, but understands it as a game in which the structures of hiding are viewed as contingently given....... In this paper, I will analyse the conflict between the hacker movement and the field of corporate interests. I argue that the introduction of graphical user interfaces and the maintaining of copyright interests are the contingent background of the ongoing conflict. By bracketing the analyses of hidden...

  6. Short term preservation of hide using vacuum: influence on properties of hide and of processed leather.

    Science.gov (United States)

    Gudro, Ilze; Valeika, Virgilijus; Sirvaitytė, Justa

    2014-01-01

    The objective of this work was to investigate vacuum influence on hide preservation time and how it affects hide structure. It was established that vacuum prolongs the storage time without hide tissue putrefaction up to 21 days when the storage temperature is 4°C. The microorganisms act for all storage times, but the action is weak and has no observable influence on the quality of hide during the time period mentioned. The hide shrinkage temperature decrease is negligible, which shows that breaking of intermolecular bonds does not occur. Optical microscopy, infrared spectroscopy and differential scanning calorimetry also did not show any structural changes which can influence the quality of leather produced from such hide. The qualitative indexes of wet blue processed under laboratory conditions and of leather produced during industrial trials are presented. Indexes such as chromium compounds exhaustion, content of chromium in leather, content of soluble matter in dichloromethane, strength properties, and shrinkage temperature were determined. Properties of the leather produced from vacuumed hide under industrial conditions conformed to the requirements of shoe upper leather.

  7. An Image Encryption Method Based on Bit Plane Hiding Technology

    Institute of Scientific and Technical Information of China (English)

    LIU Bin; LI Zhitang; TU Hao

    2006-01-01

    A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane of several different open images. And then a new hiding image is acquired by a nesting "Exclusive-OR" operation on those images obtained from the first step. At last, by employing image fusion technique, the final hiding result is achieved. The experimental result shows that the method proposed in this paper is effective.

  8. Information hiding technique

    Science.gov (United States)

    Younger, Michael; Budulas, Peter P.; Young, Stuart H.

    2002-08-01

    Spread spectrum communication techniques have been recognized as a viable method to gain an advantage in interference environments. Many military-oriented systems have been initiated, and some civil systems have been attempted. Spread spectrum allows the ability to hide the signal of interest below or in the noise floor, so as not to be detected. A spread spectrum system is one in which the transmitted signal is spread over a wide frequency band, much wider, in fact, than the minimum bandwidth required to transmit the information being sent. We at Army Research Lab (ARL) are proposing using the same technique on the Internet with port hopping. The information would be transmitted in data packets over multiple ports. The port used would vary per packet or per session basis. This port hopping gives you and the recipients the ability to take datagram's and spread them out over a multitude of ports. This will hide information among the Internet noise. This will allow trusted communications between the transmitter and receiver because of the port coding sequence. There are 64K possible ports to span datagram. Jamming of transmission would be limiting the ability of the sniffer/listener. Also, the listener will find it difficult to use a man in the middle attach, since the data will be spread over multiple ports and only the receiver and transmitter will know the specific port sequencing for the datagram.

  9. Image hiding using optical interference

    Science.gov (United States)

    Zhang, Yan; Wang, Weining

    2010-09-01

    Optical image encryption technology has attracted a lot of attentions due to its large capacitance and fast speed. In conventional image encryption methods, the random phase masks are used as encryption keys to encode the images into white noise distribution. Therefore, this kind of methods requires interference technology to record complex amplitude and is vulnerable to attack techniques. The image hiding methods which employ the phase retrieve algorithm to encode the images into two or more phase masks are proposed, the hiding process is carried out within a computer using iterative algorithm. But the iterative algorithms are time consumed. All method mentioned above are based on the optical diffraction of the phase masks. In this presentation, a new optical image hiding method based on optical interference is proposed. The coherence lights which pass through two phase masks are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are design analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the novelty of the new proposed methods. This method can be expanded for double images hiding.

  10. Family networks and income hiding

    NARCIS (Netherlands)

    Beekman, Gonne; Gatto, Marcel; Nillesen, Eleonora

    2015-01-01

    This study investigates the relationship between family network density and income hiding in rural Liberia. We link people's behaviour in a modified lottery experiment and a time preference game to detailed information about their family networks. We find that individuals with a dense family

  11. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  12. Metabolic modeling of energy balances in Mycoplasma hyopneumoniae shows that pyruvate addition increases growth rate.

    Science.gov (United States)

    Kamminga, Tjerko; Slagman, Simen-Jan; Bijlsma, Jetta J E; Martins Dos Santos, Vitor A P; Suarez-Diez, Maria; Schaap, Peter J

    2017-10-01

    Mycoplasma hyopneumoniae is cultured on large-scale to produce antigen for inactivated whole-cell vaccines against respiratory disease in pigs. However, the fastidious nutrient requirements of this minimal bacterium and the low growth rate make it challenging to reach sufficient biomass yield for antigen production. In this study, we sequenced the genome of M. hyopneumoniae strain 11 and constructed a high quality constraint-based genome-scale metabolic model of 284 chemical reactions and 298 metabolites. We validated the model with time-series data of duplicate fermentation cultures to aim for an integrated model describing the dynamic profiles measured in fermentations. The model predicted that 84% of cellular energy in a standard M. hyopneumoniae cultivation was used for non-growth associated maintenance and only 16% of cellular energy was used for growth and growth associated maintenance. Following a cycle of model-driven experimentation in dedicated fermentation experiments, we were able to increase the fraction of cellular energy used for growth through pyruvate addition to the medium. This increase in turn led to an increase in growth rate and a 2.3 times increase in the total biomass concentration reached after 3-4 days of fermentation, enhancing the productivity of the overall process. The model presented provides a solid basis to understand and further improve M. hyopneumoniae fermentation processes. Biotechnol. Bioeng. 2017;114: 2339-2347. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  13. Hide and seek

    DEFF Research Database (Denmark)

    Radel, Dietrich; Sand, Andreas; Steel, Mike

    2013-01-01

    criterion. This provides, for the first time, a rigorous way to test tree search algorithms on homoplasy-rich data, where we know in advance what the ‘best’ tree is. In this short note we consider just one search program (TNT) but show that it is able to locate the globally optimal tree correctly for 32......Finding optimal evolutionary trees from sequence data is typically an intractable problem, and there is usually no way of knowing how close to optimal the best tree from some search truly is. The problem would seem to be particularly acute when we have many taxa and when that data has high levels...... of homoplasy, in which the individual characters require many changes to fit on the best tree. However, a recent mathematical result has provided a precise tool to generate a short number of high-homoplasy characters for any given tree, so that this tree is provably the optimal tree under the maximum parsimony...

  14. Hiding Information Using different lighting Color images

    Science.gov (United States)

    Majead, Ahlam; Awad, Rash; Salman, Salema S.

    2018-05-01

    The host medium for the secret message is one of the important principles for the designers of steganography method. In this study, the best color image was studied to carrying any secret image.The steganography approach based Lifting Wavelet Transform (LWT) and Least Significant Bits (LSBs) substitution. The proposed method offers lossless and unnoticeable changes in the contrast carrier color image and imperceptible by human visual system (HVS), especially the host images which was captured in dark lighting conditions. The aim of the study was to study the process of masking the data in colored images with different light intensities. The effect of the masking process was examined on the images that are classified by a minimum distance and the amount of noise and distortion in the image. The histogram and statistical characteristics of the cover image the results showed the efficient use of images taken with different light intensities in hiding data using the least important bit substitution method. This method succeeded in concealing textual data without distorting the original image (low light) Lire developments due to the concealment process.The digital image segmentation technique was used to distinguish small areas with masking. The result is that smooth homogeneous areas are less affected as a result of hiding comparing with high light areas. It is possible to use dark color images to send any secret message between two persons for the purpose of secret communication with good security.

  15. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients

    Science.gov (United States)

    Zhang, Xiaoqiang; Wang, Z. Jane

    2013-10-01

    Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 10 to 10 and thus can resist brute-force attack and unauthorized detection watermark attack.

  16. Hiding Critical Targets in Smart Grid Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bao, Wei [Univ. of Arkansas, Fayetteville, AR (United States); Li, Qinghua

    2017-10-23

    With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromised nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.

  17. Effect of Some Sudanese Traditional Hot Iron Branding on Cattle Hide Quality

    Directory of Open Access Journals (Sweden)

    Rehab Eltejani Abdelkarim

    2016-12-01

    Full Text Available This study was designed in order to assess and evaluate the effect of hot iron branding on cattle hide quality. 62 shapes of hot iron branding were detected and classified. Branding damage was evaluated depending on: purpose of application, location in the animal body, branding area, tribe which applied and hide degree. The results showed that, Baggara tribes branding were causing the greater damage on cattle hides; where 71.4% of its brands placed in the abdominal and animal back area (middle of the hide; in proportion to Misseriya Zuraq tribes (68.4%. According to the location of branding, the less tribe that causing damages to the cattle hides were Darfur tribes (14.3%. In terms of branding area Darfur tribes were causing the most branding damages where 42.8% of its brands on cattle hides were between 20-30cm, followed by Baggara tribes where 57.1% of its brands were between 10-20cm then Misseriya Zuraq tribes by 52.6%, and finally North Kordofan tribes of 37.5%. grading of cattle hides depending on the presence of the brand marks the study revealed that, Misseriya Zuraq tribe's brands were obtained the highest percentage (89.4% of the rejected hides (Scarto= 4 and 5 grades, when compared with North Kordofan tribes (87.5%. For commercial reason brand's were mostly done in the area of 5-10cm but, their effect on cattle hide quality was greater, where 81% of the hides were classified as Scarto.

  18. Recent Advances in Information Hiding and Applications

    CERN Document Server

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao

    2013-01-01

    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  19. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Directory of Open Access Journals (Sweden)

    Andreas Wilke

    Full Text Available Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  20. Sensitive plant (Mimosa pudica hiding time depends on individual and state

    Directory of Open Access Journals (Sweden)

    Sarah Reed-Guy

    2017-07-01

    Full Text Available The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  1. Optical image hiding based on interference

    Science.gov (United States)

    Zhang, Yan; Wang, Bo

    2009-11-01

    Optical image processing has been paid a lot of attentions recently due to its large capacitance and fast speed. Many image encryption and hiding technologies have been proposed based on the optical technology. In conventional image encryption methods, the random phase masks are usually used as encryption keys to encode the images into random white noise distribution. However, this kind of methods requires interference technology such as holography to record complex amplitude. Furthermore, it is vulnerable to attack techniques. The image hiding methods employ the phase retrieve algorithm to encode the images into two or more phase masks. The hiding process is carried out within a computer and the images are reconstructed optically. But the iterative algorithms need a lot of time to hide the image into the masks. All methods mentioned above are based on the optical diffraction of the phase masks. In this presentation, we will propose a new optical image hiding method based on interference. The coherence lights pass through two phase masks and are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are designed analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the validity of the new proposed methods.

  2. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  3. Effects of gamma rays on the physical and mechanical properties of hide

    International Nuclear Information System (INIS)

    Sutrisno Puspodikoro.

    1976-01-01

    The effect of gamma rays on the physical and mechanical properties of hide has been studied, using Gammacell 220 as an irradiator. The determination of the physical and mechanical properties of the irradiated hide was carried out by Balai Penelitian Kulit (Leather Research Institute) at Yogyakarta. Experiments show that up to a certain dose of irradiation, favourable effects can be obtained, while higher doses impair the physical and mechanical properties of the leather raw materials. (author)

  4. Efficient reversible data hiding in encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2014-09-01

    Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.

  5. Hiding effort to gain a competitive advantage: Evidence from China.

    Science.gov (United States)

    Zhao, Li; Heyman, Gail D

    2018-06-01

    Previous studies with Western populations have shown that adolescents' tendency to downplay their academic effort is affected by two kinds of motives: ability-related motives (e.g., to appear competent) and social approval motives (e.g., to be popular). In this research, we test for the presence of additional competition-related motives in China, a culture placing strong emphasis on academic competition. Study 1 (N = 150) showed that, in response to a scenario in which a hard-working high-school junior hid effort from classmates, the most highly endorsed explanation was "to influence others to work less hard to maintain a competitive advantage." Study 2 (N = 174) revealed that competition-related explanations were endorsed relatively more often when the speaker and audience had similar academic rankings. This tendency was most evident when both speaker and audience were top performers, and when this was the case, participants' desire to demonstrate superiority over others was a positive predictor of endorsement of competition-related motives. Study 3 (N = 137) verified that competition-related motives were more strongly endorsed among Chinese participants than U.S. These results suggest that at least in cultures that emphasize academic competition and in contexts where competition is salient, hiding effort is often about attempting to gain strategic advantage. © 2016 International Union of Psychological Science.

  6. Unitary embedding for data hiding with the SVD

    Science.gov (United States)

    Bergman, Clifford; Davidson, Jennifer

    2005-03-01

    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  7. Perception of Stakeholders to the Proposed Ban on Cow Hide ...

    African Journals Online (AJOL)

    User

    Keywords: Cow hide consumption, cow hide value chain, ponmo .... value chain;. 2. identify sources of information of the respondents on the proposed ban; ..... the health risk associated with the consumption of ponmo may favour its proposed.

  8. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  9. Hiding levitating objects above a ground plane

    DEFF Research Database (Denmark)

    Zhang, Jingjing; Luo, Yu; Mortensen, Asger

    2010-01-01

    An approach to hiding objects levitating above a conducting sheet is suggested in this paper. The proposed device makes use of isotropic negative-refractive-index materials without extreme material parameters, and creates an illusion of a remote conducting sheet. Numerical simulations are perform...

  10. HIDE working groups: synchrotron based system: summary

    International Nuclear Information System (INIS)

    Barton, M.Q.

    1978-01-01

    A brief overview is given of the work resulting from a one-week workshop on the use of synchrotrons in heavy ion fusion, i.e., a Heavy Ion Demonstration Experiment (HIDE). Topics discussed concerned the number of beams on target, space charge limitations, choice of ion charge state, and areas identified as needing further work

  11. A New Images Hiding Scheme Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    LIU Nian-sheng; GUO Dong-hui; WU Bo-xi; Parr G

    2005-01-01

    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of covert image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).

  12. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Directory of Open Access Journals (Sweden)

    Sha Edwin Hsing-Mean

    2002-01-01

    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  13. Feed addition of curcumin to laying hens showed anticoccidial effect, and improved egg quality and animal health.

    Science.gov (United States)

    Galli, Gabriela M; Da Silva, Aleksandro S; Biazus, Angelisa H; Reis, João H; Boiago, Marcel M; Topazio, Josué P; Migliorini, Marcos J; Guarda, Naiara S; Moresco, Rafael N; Ourique, Aline F; Santos, Cayane G; Lopes, Leandro S; Baldissera, Matheus D; Stefani, Lenita M

    2018-01-31

    The aim of this study was to evaluate whether the addition of curcumin in the diet of commercial laying hens could have an anticoccidial action and improve egg quality. For this, 60 laying hens were divided into three groups: T0 (the control group); T30 and T50 (30 and 50 mg/kg of curcumin in the feed, respectively). Eggs recently laid were collected on days 14 and 21 of the experiment, and stored for 21 days. It was observed increased specific gravity and yolk index in stored eggs of the groups T30 and T50 compared to T0. The yolk color reduced in the eggs stored from groups T30 and T50 compared to T0. Moreover, TBARS levels were lower in fresh and stored eggs from groups T30 and T50. It was observed increased TAC levels in fresh eggs from groups T30 and T50 and in stored eggs from the group T50. The presence of curcumin was not detected by HPLC in the yolk and albumen. Seric levels of albumin and uric acid did not differ between groups, while seric levels of total proteins increased on day 21 on groups T30 and T50. Finally, it was observed a significant reduction on the number of oocysts in fecal samples on days 14 and 21 of T30 and T50 compared to T0. Based on these evidences, it is possible to conclude that the addition of curcumin in the diet of laying hens has an anticoccidial effect and improves egg quality. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. Matryoshka: Hiding Secret Communication in Plain Sight

    OpenAIRE

    Safaka, Iris; Fragouli, Christina; Argyraki, Katerina

    2016-01-01

    We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small -- existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of...

  15. The Costs of Hiding and Faking Emotions: The Case of Extraverts and Introverts.

    Science.gov (United States)

    Seger-Guttmann, Tali; Medler-Liraz, Hana

    2016-01-01

    The present study examined the moderation effects of extraversion on the relationships between hiding and faking emotions, perceived satisfaction from intimate relationships, and reported physical health concerns. Four hundred and four Israeli participants, who were all involved in intimate relationships at the time of the study, responded to the Extraversion scale from the Big-Five Inventory, the DEELS to measure hiding and faking emotions, the SELF to assess physical health concerns, and the short version of the ENRICH to evaluate perceived satisfaction with intimate relationships. The mean age was 32.3 years (SD = 8.2); and the average length of time as a couple was 7.8 years (SD = 8.2). Of the participants, 198 were married (48.5%). The findings indicate that the effect of hiding negative emotions was stronger for perceived satisfaction with intimate relationships and physical health concerns than that for faking positive emotions. Extraverts who showed a higher frequency of hiding their negative emotions were significantly less satisfied with their relationships than introverts and they also tended to report more concerns with their physical health. These results were not found when extraverts reported a high frequency of faking positive emotions. These results are discussed in the context of the trait-behavior-concordance model and stress the importance of distinguishing faking from hiding.

  16. Multiple-image hiding using super resolution reconstruction in high-frequency domains

    Science.gov (United States)

    Li, Xiao-Wei; Zhao, Wu-Xiang; Wang, Jun; Wang, Qiong-Hua

    2017-12-01

    In this paper, a robust multiple-image hiding method using the computer-generated integral imaging and the modified super-resolution reconstruction algorithm is proposed. In our work, the host image is first transformed into frequency domains by cellular automata (CA), to assure the quality of the stego-image, the secret images are embedded into the CA high-frequency domains. The proposed method has the following advantages: (1) robustness to geometric attacks because of the memory-distributed property of elemental images, (2) increasing quality of the reconstructed secret images as the scheme utilizes the modified super-resolution reconstruction algorithm. The simulation results show that the proposed multiple-image hiding method outperforms other similar hiding methods and is robust to some geometric attacks, e.g., Gaussian noise and JPEG compression attacks.

  17. Children and Robots Learning to Play Hide and Seek

    National Research Council Canada - National Science Library

    Trafton, J. G; Schultz, Alan C; Perznowski, Dennis; Bugajska, Magdalena D; Adams, William; Cassimatis, Nicholas L; Brock, Derek P

    2006-01-01

    ...., containment, under) and use that information to play a credible game of hide and seek. They model this hypothesis within the ACT-R cognitive architecture and put the model on a robot, which is able to mimic the child's hiding behavior. They also take the "hiding" model and use it as the basis for a "seeking" model. They suggest that using the same representations and procedures that a person uses allows better interaction between the human and robotic system.

  18. DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Siva Shankar

    2016-08-01

    Full Text Available Digital image steganography has several applications in information security and communication. Data hiding in encrypted images ensure that both the cover image and the secret message can be recovered at the receiver end. This work presents a novel data hiding and image encryption scheme using random diffusion and Two dimensional Arnold cat mapping transform. The secret message bits are placed in the least significant bit positions of the cover image. Then a shared key is used to generate random 8 bit random integer stream and is added to the stego image in the random diffusion step. Arnold cat mapping transformation is done to scramble the pixels. The two steps of random diffusion and Arnold transform mapping are done alternatively several times to completely encrypt the image contents. The process is reversed at the receiver end to get both the secret message and the cover image with little loss. The random diffusion step overcomes the limited period of the Arnold transform. The embedding capacity of one bit per pixel is achieved. Security analysis is carried out which shows that the encryption is highly secure. The number of collisions is low thus preventing brute force attacks. The original cover image is recoverable with minimal losses.

  19. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  20. Dynamics and driving forces of hides, skins, leather and leather ...

    African Journals Online (AJOL)

    Footwear and leather goods are constrained by lack of factories, competition from used goods, synthetic plastics and uninformed market. Investment in hides, skins and leather industry supported by training programmes has potential to generate great monetary revenue. Keywords: Hides, skin, leather, value chain, slaughter ...

  1. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  2. Selective Redundancy Removal: A Framework for Data Hiding

    Directory of Open Access Journals (Sweden)

    Ugo Fiore

    2010-02-01

    Full Text Available Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs. Such redundancy may be removed by means of optimization software. Redundancy removal, if applied selectively, enables information hiding. This work introduces Selective Redundancy Removal (SRR as a framework for hiding data. An example application of the framework is given in terms of hiding information in HTML documents. Non-uniformity across documents may raise alarms. Nevertheless, selective application of optimization techniques might be due to the legitimate use of optimization software not supporting all the optimization methods, or configured to not use all of them.

  3. Universal Steganalysis of Data Hiding in Grayscale Images

    Institute of Scientific and Technical Information of China (English)

    HUANG Ji-feng; LIN Jia-jun

    2007-01-01

    This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy.

  4. Unconventional thermal cloak hiding an object outside the cloak

    Science.gov (United States)

    Gao, Y.; Huang, J. P.

    2013-11-01

    All the thermal cloaks reported in the literature can be used to thermally hide an object inside the cloak. However, a common limitation of this kind of thermal cloaks is that the cloaked object cannot feel the external heat flow since it is located inside the cloak; thus we call these cloaks “conventional thermal cloaks”. Here we manage to overcome this limitation by exploiting a class of unconventional thermal cloaks that enable the cloaked object to feel the external heat flow. Our finite-element simulations in two dimensions show the desired cloaking effect. The underlying mechanism originates from the complementary effect of thermal metamaterials with negative thermal conductivities. This work suggests a different method to design thermal devices where heat conduction can be controlled at will.

  5. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  6. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  7. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  8. Alkali-free method of hide preparation for tanning

    OpenAIRE

    Valeika, V.; Beleska, K.; Sirvaityte, J.

    2012-01-01

    Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming) up to strongly acid (pickling). This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. D...

  9. Mechanical properties of biobased films prepared from collagen solutions derived from bovine hides

    Science.gov (United States)

    The most valuable byproducts of the meat packing industry are hides. The U.S. is the world’s 3rd largest hide producing country and currently produces approximately 35 million cattle hides annually. Due to fierce competition in global markets, the American leather and hides industry is facing chal...

  10. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: RVO:67985998 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  11. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: PRVOUK-P23 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  12. Let’s play hide and seek!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    This week, we would like you to play a small online game called “Virtual Hide & Seek”. The rules are simple: some of our colleagues have published some sensitive or confidential documents on CERN’s central services like Indico, CDS, EDMS or TWiki, as well as on our many websites. Your mission, should you choose to accept it: find them!   If you provide us with documents marked “confidential”, “classified”, “sensitive”, or containing plain text operational passwords, you can win a book on computer security. There are only few conditions: these documents must be visible from outside CERN, must not require a CERN account in order to access them, and must not belong to you or have a direct link with your work. Have fun! But seriously, are you sure that your documents are really properly protected? We regularly find confidential documents stored on one of the CERN central  services and w...

  13. Book Review: No Place To Hide

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2007-03-01

    Full Text Available O'Harrow, R., Jr. (2006. No Place To Hide. New York: Free Press. 352 pages, ISBN: 0-7432-8705-3 (paper, US$26Reviewed by Gary C. Kessler (gary.kessler@champlain.eduPersonal privacy and the protection of personal identifying information are of concern to all of us. Innumerable articles and conferences address our loss of privacy, either through the sale of consumer databases or our own inattention. Opinions vary from "You have no privacy; get over it" to "This is the end of civil liberties as we know them." We teach people to safely maneuver on the Internet and minimize their exposure to bogus sites set up to steal their identity, warn users about the dangers of phishing and posting personal information on social network sites, use firewalls to protect our databases, and enact laws such as the Health Insurance Portability and Accountability Act (HIPAA and the Family Educational Rights and Privacy Act (FERPA to protect information.(see PDF for full review

  14. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  15. Suitability of the RGB Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Ante Poljicak

    2010-06-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data  hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  16. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Institute of Scientific and Technical Information of China (English)

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao

    2004-01-01

    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  17. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  18. Impact of Media Richness on Reduction of Knowledge-Hiding Behavior in Enterprises

    DEFF Research Database (Denmark)

    Labafi, Somayeh; Khajeheian, Datis; Williams, Idongesit

    2018-01-01

    in a qualitative study. Thematic analysis is used to analyze transcribed interview data from employees in a software company in Iran. The findings of the analysis show that media richness significantly impacts on organizational learning and influences on knowledge hiding behavior in employees. This article...... suggests that entrepreneurs and managers of small firms should provide employees’ access to rich media content as well as established organizational learning as part of their organizational culture.......Knowledge hiding is one of the major obstacles in the progression of organizations that hinder the use of tacit knowledge of employees. The negative impact of this behavior is more significant in enterprises and small firms because they are more reliant on knowledge of their employees...

  19. High-capacity method for hiding data in the discrete cosine transform domain

    Science.gov (United States)

    Qazanfari, Kazem; Safabakhsh, Reza

    2013-10-01

    Steganography is the art and science of hiding data in different media such as texts, audios, images, and videos. Data hiding techniques are generally divided into two groups: spatial and frequency domain techniques. Spatial domain methods generally have low security and, as a result, are less attractive to researchers. Discrete cosine transform (DCT) is the most common transform domain used in steganography and JPEG compression. Since a large number of the DCT coefficients of JPEG images are zero, the capacity of DCT domain-based steganography methods is not very high. We present a high-capacity method for hiding messages in the DCT domain. We describe the method in two classes where the receiver has and where the receiver does not have the cover image. In each class, we consider three cases for each coefficient. By considering n coefficients, there are 3n different situations. The method embeds ⌊log2 3n⌋ bits in these n coefficients. We show that the maximum reachable capacity by our method is 58% higher than the other general steganography methods. Experimental results show that the histogram-based steganalysis methods cannot detect the stego images produced by the proposed method while the capacity is increased significantly.

  20. Information Hiding In Digital Video Using DCT, DWT and CvT

    Science.gov (United States)

    Abed Shukur, Wisam; Najah Abdullah, Wathiq; Kareem Qurban, Luheb

    2018-05-01

    The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the Normalized cross Correlation (NC). The experiments shows the error ratio of the proposed technique is (8%) while accuracy ratio is (92%) when the Curvelet Transform (CvT) is used, but compared with Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT), the error rates are 11% and 14% respectively, while the accuracy ratios are (89%) and (86%) respectively. So, the experiments shows the Poisson noise gives better results than other types of noises, while the speckle noise gives worst results compared with other types of noises. The proposed technique has been established by using MATLAB R2016a programming language.

  1. Alkali-free method of hide preparation for tanning

    Directory of Open Access Journals (Sweden)

    V. Valeika

    2012-06-01

    Full Text Available Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming up to strongly acid (pickling. This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. During both processes, unhairing and oxidative treatment, the opening of the derma structure occurs: 13.3-14.6g of non-collagen proteins are removed and amount of dermatan sulphate decreases by 35%. The hide obtained can be chromed directly after the above processes and subsequent treatment with sodium chloride solution omitted conventional pickling. The pH of the hide varies in the range of 8.3-3.7 during the processes of preparation for tanning.

  2. Perspective taking and theory of mind in hide and seek.

    Science.gov (United States)

    Street, Chris N H; Bischof, Walter F; Kingstone, Alan

    2018-01-01

    Does theory of mind play a significant role in where people choose to hide an item or where they search for an item that has been hidden? Adapting Anderson's "Hide-Find Paradigm" Anderson et al. (Action, Perception and Performance, 76, 907-913, 2014) participants viewed homogenous or popout visual arrays on a touchscreen table. Their task was to indicate where in the array they would hide an item, or to search for an item that had been hidden, by either a friend or a foe. Critically, participants believed that their sitting location at the touchtable was the same as-or opposite to-their partner's location. Replicating Anderson et al., participants tended to (1) select items nearer to themselves on homogenous displays, and this bias was stronger for a friend than foe; and (2) select popout items, and again, more for a friend than foe. These biases were observed only when participants believed that they shared the same physical perspective as their partner. Collectively, the data indicate that theory of mind plays a significant role in hiding and finding, and demonstrate that the hide-find paradigm is a powerful tool for investigating theory of mind in adults.

  3. An Improved Information Hiding Method Based on Sparse Representation

    Directory of Open Access Journals (Sweden)

    Minghai Yao

    2015-01-01

    Full Text Available A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.

  4. Prey should hide more randomly when a predator attacks more persistently.

    Science.gov (United States)

    Gal, Shmuel; Alpern, Steve; Casas, Jérôme

    2015-12-06

    When being searched for and then (if found) pursued by a predator, a prey animal has a choice between choosing very randomly among hiding locations so as to be hard to find or alternatively choosing a location from which it is more likely to successfully flee if found. That is, the prey can choose to be hard to find or hard to catch, if found. In our model, capture of prey requires both finding it and successfully pursuing it. We model this dilemma as a zero-sum repeated game between predator and prey, with the eventual capture probability as the pay-off to the predator. We find that the more random hiding strategy is better when the chances of repeated pursuit, which are known to be related to area topography, are high. Our results extend earlier results of Gal and Casas, where there was at most only a single pursuit. In that model, hiding randomly was preferred by the prey when the predator has only a few looks. Thus, our new multistage model shows that the effect of more potential looks is opposite. Our results can be viewed as a generalization of search games to the repeated game context and are in accordance with observed escape behaviour of different animals. © 2015 The Author(s).

  5. Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

    Directory of Open Access Journals (Sweden)

    Xianyi Chen

    2018-01-01

    Full Text Available Compared to the encrypted-image-based reversible data hiding (EIRDH method, the encrypted-signals-based reversible data hiding (ESRDH technique is a novel way to achieve a greater embedding rate and better quality of the decrypted signals. Motivated by ESRDH using signal energy transfer, we propose an improved ESRDH method using code division multiplexing and value expansion. At the beginning, each pixel of the original image is divided into several parts containing a little signal and multiple equal signals. Next, all signals are encrypted by Paillier encryption. And then a large number of secret bits are embedded into the encrypted signals using code division multiplexing and value expansion. Since the sum of elements in any spreading sequence is equal to 0, lossless quality of directly decrypted signals can be achieved using code division multiplexing on the encrypted equal signals. Although the visual quality is reduced, high-capacity data hiding can be accomplished by conducting value expansion on the encrypted little signal. The experimental results show that our method is better than other methods in terms of the embedding rate and average PSNR.

  6. Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

    Directory of Open Access Journals (Sweden)

    Mohammad S. Alam

    2012-10-01

    Full Text Available In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level.

  7. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    Directory of Open Access Journals (Sweden)

    H. Yang

    2009-12-01

    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  8. Market structure and performance of value chain actors in hides and ...

    African Journals Online (AJOL)

    Market structure and performance of value chain actors in hides and skins processing and marketing in Nigeria. ... There was high performance in hides and skins processing and marketing in Nigeria. ... EMAIL FULL TEXT EMAIL FULL TEXT

  9. Probability of error in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2007-01-01

    Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the

  10. On the Bayes risk in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2008-01-01

    Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability

  11. Polycyclic Aromatic Hydrocarbons (PAHs) Content in Cattle Hides ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Vol. 21 (6) 1105-1110. Full-text Available Online at www.ajol.info and ... Keywords: Cattle hide, meat, tyre, singeing, hydrocarbons ... on the substance used as fuel for meat processing. .... through the centrifuge at 200 rpm for 5 min. The.

  12. Intersectional Analysis in Critical Mathematics Education Research: A Response to Figure Hiding

    Science.gov (United States)

    Bullock, Erika C.

    2018-01-01

    In this chapter, I use figure hiding as a metaphor representing the processes of exclusion and suppression that critical mathematics education (CME) seeks to address. Figure hiding renders identities and modes of thought in mathematics education and mathematics education research invisible. CME has a commitment to addressing figure hiding by…

  13. Hiding and Searching Strategies of Adult Humans in a Virtual and a Real-Space Room

    Science.gov (United States)

    Talbot, Katherine J.; Legge, Eric L. G.; Bulitko, Vadim; Spetch, Marcia L.

    2009-01-01

    Adults searched for or cached three objects in nine hiding locations in a virtual room or a real-space room. In both rooms, the locations selected by participants differed systematically between searching and hiding. Specifically, participants moved farther from origin and dispersed their choices more when hiding objects than when searching for…

  14. Effects of dehydration methods on the characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  15. Effects of dehydration methods on characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  16. Alpha-conotoxin analogs with additional positive charge show increased selectivity towards Torpedo californica and some neuronal subtypes of nicotinic acetylcholine receptors

    NARCIS (Netherlands)

    Kasheverov, I.E.; Zhmak, M.N.; Vulfius, C.A.; Corbacheva, E.V.; Mordvintsev, D.Y.; Utkin, Y.N.; van Elk, R.; Smit, A.B.; Tsetlin, V.I.

    2006-01-01

    α-Conotoxins from Conus snails are indispensable tools for distinguishing various subtypes of nicotinic acetylcholine receptors (nAChRs), and synthesis of α-conotoxin analogs may yield novel antagonists of higher potency and selectivity. We incorporated additional positive charges into α-conotoxins

  17. Characterization of biofilms produced by Escherichia coli O157 isolated from cattle hides

    Science.gov (United States)

    Milojević, L.; Velebit, B.; Baltić, T.; Nikolić, A.; Mitrović, R.; Đorđević, V.

    2017-09-01

    This study aimed to investigate possibility E. coli O157 from cattle hides to produced biofilms. We had 28 suspect primoisolates and 17 were confirmed to be E. coli O157. Biofilm production test showed that more than 50% of this isolates did not produce biofilm. From the other half of the isolates, 5 of them were weakly adherent, 3 were moderately adherent. Since E. coli O157 are one of the main foodborne hazards in meat processing industry and the discovery that some of them can produce moderately adherent biofilms, request necessity of strict implementation of HACCP procedures to prevent further expansion this pathogen.

  18. What Hides Behind an Umemployment Rate: Comparing Portuguese and U.S. Unemployment

    OpenAIRE

    Olivier Blanchard; Pedro Portugal

    1998-01-01

    Over the last 15 years, Portugal and the United States have had the same average unemployment rate, about 6.5%. But behind these similar rates hide two very different labor markets. Unemployment duration in Portugal is more than three times that of the United States. Symmetrically, the flow of workers into unemployment in Portugal is, in proportion to the labor force, less than a third of what it is in the United States. Relying on evidence from Portuguese and U.S. micro data sets, we show th...

  19. Sensor and Actuator Fault-Hiding Reconfigurable Control Design for a Four-Tank System Benchmark

    DEFF Research Database (Denmark)

    Hameed, Ibrahim; El-Madbouly, Esam I; Abdo, Mohamed I

    2015-01-01

    Invariant (LTI) system where virtual sensors and virtual actuators are used to correct faulty performance through the use of a pre-fault performance. Simulation results showed that the developed approach can handle different types of faults and able to completely and instantly recover the original system......Fault detection and compensation plays a key role to fulfill high demands for performance and security in today's technological systems. In this paper, a fault-hiding (i.e., tolerant) control scheme that detects and compensates for actuator and sensor faults in a four-tank system benchmark...

  20. Information hiding techniques for infrared images: exploring the state-of-the art and challenges

    Science.gov (United States)

    Pomponiu, Victor; Cavagnino, Davide; Botta, Marco; Nejati, Hossein

    2015-10-01

    The proliferation of Infrared technology and imaging systems enables a different perspective to tackle many computer vision problems in defense and security applications. Infrared images are widely used by the law enforcement, Homeland Security and military organizations to achieve a significant advantage or situational awareness, and thus is vital to protect these data against malicious attacks. Concurrently, sophisticated malware are developed which are able to disrupt the security and integrity of these digital media. For instance, illegal distribution and manipulation are possible malicious attacks to the digital objects. In this paper we explore the use of a new layer of defense for the integrity of the infrared images through the aid of information hiding techniques such as watermarking. In this context, we analyze the efficiency of several optimal decoding schemes for the watermark inserted into the Singular Value Decomposition (SVD) domain of the IR images using an additive spread spectrum (SS) embedding framework. In order to use the singular values (SVs) of the IR images with the SS embedding we adopt several restrictions that ensure that the values of the SVs will maintain their statistics. For both the optimal maximum likelihood decoder and sub-optimal decoders we assume that the PDF of SVs can be modeled by the Weibull distribution. Furthermore, we investigate the challenges involved in protecting and assuring the integrity of IR images such as data complexity and the error probability behavior, i.e., the probability of detection and the probability of false detection, for the applied optimal decoders. By taking into account the efficiency and the necessary auxiliary information for decoding the watermark, we discuss the suitable decoder for various operating situations. Experimental results are carried out on a large dataset of IR images to show the imperceptibility and efficiency of the proposed scheme against various attack scenarios.

  1. A combination of a dairy product fermented by lactobacilli and galactooligosaccharides shows additive effects on mineral balances in growing rats with hypochlorhydria induced by a proton pump inhibitor.

    Science.gov (United States)

    Takasugi, Satoshi; Ashida, Kinya; Maruyama, Suyaka; Matsukiyo, Yukari; Kaneko, Tetsuo; Yamaji, Taketo

    2013-06-01

    This study aimed to investigate the effects of a combination of a dairy product fermented by lactobacilli (DFL) and galactooligosaccharides (GOS) on mineral balances in growing rats with hypochlorhydria induced by a proton pump inhibitor (PPI). Three-week-old male rats were assigned to receive one of six diets: a control diet, control diets containing 1.6 or 5.0 % GOS, a DFL diet and DFL diets containing 1.6 or 5.0 % GOS for 9 days. From day 5 of the feeding period, half of the rats fed with control diets were subcutaneously administered with saline, whereas the remaining rats were administered with PPI for 5 days. Calcium (Ca), phosphorus (P), magnesium (Mg), iron (Fe) and zinc (Zn) balances were determined from days 6 to 9. PPI administration significantly decreased the apparent absorption of Ca and Fe and increased urinary P excretion, resulting in decreased Ca, Fe and P retention. GOS dose-dependently increased the apparent absorption of Ca, Mg and Fe and urinary Mg excretion and decreased urinary P excretion. DFL significantly increased the apparent absorption of Ca and Mg and urinary Mg excretion. The combination of DFL and GOS additively affected these parameters, resulting in increased Ca, P and Fe retention, and it further increased the apparent absorption and retention of Zn at 5.0 % GOS. In conclusion, the combination of DFL and GOS improves Ca, P and Fe retention in an additive manner and increases the Zn retention in growing rats with hypochlorhydria induced by PPI.

  2. Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    OpenAIRE

    de Fuentes, Jose Maria; Blasco, Jorge; González-Tablas, Ana Isabel; González-Manzano, Lorena

    2014-01-01

    Vehicular ad hoc networks (VANETs) are a new communication scenario in which vehicles take an active part. Real-time reporting of misbehaving vehicles by surrounding ones is enabled by in-vehicle sensors and VANETs. Thus, sensors allow detecting the misbehavior whereas VANETs allow sending the report to the authority. Nevertheless, these reports should pass unnoticed by the reported driver to avoid his/her potential reprisals. Information hiding techniques could be used to allow vehicles to t...

  3. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    Directory of Open Access Journals (Sweden)

    Farouk Abd El-Monem

    2017-05-01

    Full Text Available Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA and butyl acrylate (BA. The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leather were studied and evaluated using SEM, shrinkage temperature and the mechanical properties of the pre-tanned leather. The results showed that, the prepared polymers A & C are the best polymers in improving the physical properties of the treated leather. Furthermore, the shrinkage temperature and the mechanical properties of the tanned leather were improved. In addition, a significant enhancement in the texture of the leather treated by the polymers was noticed as proved by scanning electron microscopy (SEM.

  4. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  5. [Simulation of homicide to hide child's suicide].

    Science.gov (United States)

    Schmidt, P; Driever, F; Madea, B

    2001-01-01

    A case of pretending a homicide to conceal a child suicide is reported in which characteristic findings of the postmortem examination and conclusions from the analysis of forensic autopsy series provided substantial support for the police investigation. In the late night hours of a spring day the police authorities were informed that a 10-year-old girl had been found dead on a playground near its parents' house. As injuries of the neck were recognized by the police officers a homicide investigation was initiated. The post mortem examination showed a furrow symmetrically slanting from the front to the nape of the neck, discrete punctate haemorrhages of the skin of the face and numerous 'tram-line' bruises of the back, buttocks and extremities. These findings indicated as cause and manner of death suicidal hanging following corporal punishment. Confronted with these conclusions the mother immediately made a corresponding confession.

  6. Hiding neutrino mass in modified gravity cosmologies

    Energy Technology Data Exchange (ETDEWEB)

    Bellomo, Nicola; Bellini, Emilio; Hu, Bin; Jimenez, Raul; Verde, Licia [ICC, University of Barcelona (UB-IEEC), Marti i Franques 1, 08028, Barcelona (Spain); Pena-Garay, Carlos, E-mail: nicola.bellomo@icc.ub.edu, E-mail: emilio.bellini@physics.ox.ac.uk, E-mail: binhu@icc.ub.edu, E-mail: raul.jimenez@icc.ub.edu, E-mail: penya@ific.uv.es, E-mail: liciaverde@icc.ub.edu [Instituto de Fisica Corpuscular, CSIC-UVEG, P.O. 22085, Valencia, 46071 (Spain)

    2017-02-01

    Cosmological observables show a dependence with the neutrino mass, which is partially degenerate with parameters of extended models of gravity. We study and explore this degeneracy in Horndeski generalized scalar-tensor theories of gravity. Using forecasted cosmic microwave background and galaxy power spectrum datasets, we find that a single parameter in the linear regime of the effective theory dominates the correlation with the total neutrino mass. For any given mass, a particular value of this parameter approximately cancels the power suppression due to the neutrino mass at a given redshift. The extent of the cancellation of this degeneracy depends on the cosmological large-scale structure data used at different redshifts. We constrain the parameters and functions of the effective gravity theory and determine the influence of gravity on the determination of the neutrino mass from present and future surveys.

  7. Hide unhairing and characterization of commercial enzymes used in leather manufacture

    Directory of Open Access Journals (Sweden)

    A Dettmer

    2011-09-01

    Full Text Available The enzymatic treatment of hides in tannery processes is a promising technology. However, the reaction kinetics of commercial enzymes available to the leather industry are not fully understood and their activities have been mainly determined with model proteins such as casein as substrate, which are not of direct relevance for cattle hides. Therefore, it is important to determine their activities on collagen and keratin, the main proteins of skin, in order to use these enzymes in leather processing. This work describes the study of five proteases, used commercially in tanneries, to assess their ability to act upon collagen and keratin and to determine their unhairing. Results showed that all commercial enzymes tested had more activity on collagen than on keratin. Unhairing was also tested and four out of the five enzymes tested showed some unhairing activity. Optima of the temperature and pH of the enzymes were very similar for all five enzymes, with maximal activities around 55ºC and pH 9 to 12, respectively.

  8. An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm

    Science.gov (United States)

    Zhang, B.; Sang, Jun; Alam, Mohammad S.

    2013-03-01

    An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.

  9. Suggested Method for Encryption and Hiding ‎Image using LCG and LSB

    Directory of Open Access Journals (Sweden)

    Atheer Hussein Zyara

    2017-12-01

    Full Text Available Maintaining the confidentiality of the data of the very important areas in computer applications , Where many researchers work in the fields of concealment and encryption . So in this research we are working on the combining of the two methods , where confidential data is encrypted by using  a proposed method , Then the cover is encrypted (regular image by LCG algorithm (which generates a series of random numbers to generate the encrypted cover (irregular image , After that ,we hide the encrypted data in encrypted cover by depending on the LSB technique, then we convert the irregular image into regular image and thereby getting  hidden data in random locations in the  cover image  , This method is characterized by flexibility in terms of the possibility of hiding the different  types of confidential data in different types of media , and durability as that data be hidden in random locations and this  what distinguishes the proposed algorithm , and the results showed high security, because the data is hidden in random locations in encrypted image then convert to the original regular image For clarification of the proposed algorithm , it has been applied on a digital image of the gray type using MATLAB language  by using the efficiency scales PSNR and MSE

  10. HIDING TEXT IN DIGITAL IMAGES USING PERMUTATION ORDERING AND COMPACT KEY BASED DICTIONARY

    Directory of Open Access Journals (Sweden)

    Nagalinga Rajan

    2017-05-01

    Full Text Available Digital image steganography is an emerging technique in secure communication for the modern connected world. It protects the content of the message without arousing suspicion in a passive observer. A novel steganography method is presented to hide text in digital images. A compact dictionary is designed to efficiently communicate all types of secret messages. The sorting order of pixels in image blocks are chosen as the carrier of embedded information. The high correlation in image pixel values means reordering within image blocks do not cause high distortion. The image is divided into blocks and perturbed to create non repeating sequences of intensity values. These values are then sorted according to the message. At the receiver end, the message is read from the sorting order of the pixels in image blocks. Only those image blocks with standard deviation lesser than a given threshold are chosen for embedding to alleviate visual distortion. Information Security is provided by shuffling the dictionary according to a shared key. Experimental Results and Analysis show that the method is capable of hiding text with more than 4000 words in a 512×512 grayscale image with a peak signal to noise ratio above 40 decibels.

  11. Hiding Techniques for Dynamic Encryption Text based on Corner Point

    Science.gov (United States)

    Abdullatif, Firas A.; Abdullatif, Alaa A.; al-Saffar, Amna

    2018-05-01

    Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

  12. Hiding a Heavy Higgs Boson at the 7 TeV LHC

    Energy Technology Data Exchange (ETDEWEB)

    Bai, Yang; Fan, JiJi; Hewett, JoAnne L.

    2012-03-20

    A heavy Standard Model Higgs boson is not only disfavored by electroweak precision observables but is also excluded by direct searches at the 7 TeV LHC for a wide range of masses. Here, we examine scenarios where a heavy Higgs boson can be made consistent with both the indirect constraints and the direct null searches by adding only one new particle beyond the Standard Model. This new particle should be a weak multiplet in order to have additional contributions to the oblique parameters. If it is a color singlet, we find that a heavy Higgs with an intermediate mass of 200-300 GeV can decay into the new states, suppressing the branching ratios for the standard model modes, and thus hiding a heavy Higgs at the LHC. If the new particle is also charged under QCD, the Higgs production cross section from gluon fusion can be reduced significantly due to the new colored particle one-loop contribution. Current collider constraints on the new particles allow for viable parameter space to exist in order to hide a heavy Higgs boson. We categorize the general signatures of these new particles, identify favored regions of their parameter space and point out that discovering or excluding them at the LHC can provide important indirect information for a heavy Higgs. Finally, for a very heavy Higgs boson, beyond the search limit at the 7 TeV LHC, we discuss three additional scenarios where models would be consistent with electroweak precision tests: including an additional vector-like fermion mixing with the top quark, adding another U(1) gauge boson and modifying triple-gauge boson couplings.

  13. Synthesis of Citric-Acrylate Oligomer and its in-Situ Reaction with Chrome Tanned Collagen (hide powder)

    International Nuclear Information System (INIS)

    Haroun, A.A.; Masoud, R.A.; Bronco, S.; Ciardelli, F.

    2005-01-01

    The purpose of this study was to formulate the new combined system of acrylic and citric acids, which has been prepared by free radical polymerization and esterification reaction at the same time to form citric acrylate (CAC) oligomer through ester linkage and low molecular weight (Mw 2241), in compared with polyacrylic acid. The chemical structure and the reaction mechanism of this oligomer were confirmed by different spectroscopic tools (1 H , 13 C-NMR, ATR-IR), gel permeation chromatography and thermogravimetric analysis (TGA/DTA). The problem of the effect of the masking agents in the chrome tanning of the collagen and the pickling of the hide has been approached from the study of the hydrothermal and mechanical properties, using this new eco-friendly oligomer, which was carried out in-situ treated/grafted chrome tanned collagen (hide powder), and pickled hide. The microemulsion grafting copolymerization of (CAC) using 2.2-azo-bis isobutyronitrile (ABIN), via direct coupling reaction, onto the chrome tanned collagen showed that the free amino groups of the collagen were considered to be a potential site for the in-situ reaction with (CAC) oligomer. Also, using of citric-acrylate (CAC) oligomer, during chrome tanning of leather, instead of the traditional strong acids (sulfuric, hydrochloric and formic) resulted in significant improvement in chrome exhaustion and physical properties

  14. Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload

    Directory of Open Access Journals (Sweden)

    Zhaoxia Yin

    2014-01-01

    Full Text Available This paper proposes a separable reversible data-hiding scheme in encrypted image which offers high payload and error-free data extraction. The cover image is partitioned into nonoverlapping blocks and multigranularity encryption is applied to obtain the encrypted image. The data hider preprocesses the encrypted image and randomly selects two basic pixels in each block to estimate the block smoothness and indicate peak points. Additional data are embedded into blocks in the sorted order of block smoothness by using local histogram shifting under the guidance of the peak points. At the receiver side, image decryption and data extraction are separable and can be free to choose. Compared to previous approaches, the proposed method is simpler in calculation while offering better performance: larger payload, better embedding quality, and error-free data extraction, as well as image recovery.

  15. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    Directory of Open Access Journals (Sweden)

    A.A. Mohamed

    2014-07-01

    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.

  16. Reversible data hiding for image based on histogram modification of wavelet coefficients

    NARCIS (Netherlands)

    Liang, Xiaoping; Wu, Xiaoyun; Huang, Jiwu; Hao, Y.; Liu, J.; Wang, Y.; Cheung, Y.; Yin, H.; Jiao, L.; Ma, J.; Jiao, Y.C.

    2005-01-01

    Reversible data hiding has drawn intensive attention recently. Reversibility means to embed data into digital media and restore the original media from marked media losslessly. Reversible data hiding technique is desired in sensitive applications that require no permanent loss of signal fidelity. In

  17. A method for removing adobe-type manure from hides using an oxidizing agent

    Science.gov (United States)

    Adobe-type (hardened) manure attached to bovine hair is a major source of meat contamination, hide quality deterioration, and devalued leather products. Therefore, it is important to develop cleaning solutions that can rapidly remove adobe-type manure to improve the quality of hides delivered to tan...

  18. 9 CFR 310.10 - Carcasses with skin or hide on; cleaning before evisceration; removal of larvae of Hypodermae...

    Science.gov (United States)

    2010-01-01

    ..., DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION... pathological skin conditions. When a carcass is to be dressed with the skin or hide left on, the skin or hide...

  19. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  20. An Algorithm for Data Hiding in Radiographic Images and ePHI/R Application

    Directory of Open Access Journals (Sweden)

    Aqsa Rashid

    2018-01-01

    Full Text Available Telemedicine is the use of Information and Communication Technology (ICT for clinical health care from a distance. The exchange of radiographic images and electronic patient health information/records (ePHI/R for diagnostic purposes has the risk of confidentiality, ownership identity, and authenticity. In this paper, a data hiding technique for ePHI/R is proposed. The color information in the cover image is used for key generation, and stego-images are produced with ideal case. As a result, the whole stego-system is perfectly secure. This method includes the features of watermarking and steganography techniques. The method is applied to radiographic images. For the radiographic images, this method resembles watermarking, which is an ePHI/R data system. Experiments show promising results for the application of this method to radiographic images in ePHI/R for both transmission and storage purpose.

  1. A novel attack method about double-random-phase-encoding-based image hiding method

    Science.gov (United States)

    Xu, Hongsheng; Xiao, Zhijun; Zhu, Xianchen

    2018-03-01

    By using optical image processing techniques, a novel text encryption and hiding method applied by double-random phase-encoding technique is proposed in the paper. The first step is that the secret message is transformed into a 2-dimension array. The higher bits of the elements in the array are used to fill with the bit stream of the secret text, while the lower bits are stored specific values. Then, the transformed array is encoded by double random phase encoding technique. Last, the encoded array is embedded on a public host image to obtain the image embedded with hidden text. The performance of the proposed technique is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient.

  2. No place to hide: when shame causes proselfs to cooperate.

    Science.gov (United States)

    Declerck, Carolyn Henriette; Boone, Christophe; Kiyonari, Toko

    2014-01-01

    Shame is considered a social emotion with action tendencies that elicit socially beneficial behavior. Yet, unlike other social emotions, prior experimental studies do not indicate that incidental shame boosts prosocial behavior. Based on the affect as information theory, we hypothesize that incidental feelings of shame can increase cooperation, but only for self-interested individuals, and only in a context where shame is relevant with regards to its action tendency. To test this hypothesis, cooperation levels are compared between a simultaneous prisoner's dilemma (where "defect" may result from multiple motives) and a sequential prisoner's dilemma (where "second player defect" is the result of intentional greediness). As hypothesized, shame positively affected proselfs in a sequential prisoner's dilemma. Hence ashamed proselfs become inclined to cooperate when they believe they have no way to hide their greediness, and not necessarily because they want to make up for earlier wrong-doing.

  3. Analysis Of Aspects Of Messages Hiding In Text Environments

    Directory of Open Access Journals (Sweden)

    Afanasyeva Olesya

    2015-09-01

    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  4. Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function

    Directory of Open Access Journals (Sweden)

    Najme Maleki

    2014-07-01

    Full Text Available This paper presents two adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Our adaptive scheme is based on the concept of human vision sensitivity, so the pixels in edge areas than to smooth areas can tolerate much more changes without making visible distortion for human eyes. In our adaptive scheme, the average differencing value of four neighborhood pixels into a block via a threshold secret key determines whether current block is located in edge or smooth area. Pixels in the edge areas are embedded by Q-bit of secret data with a larger value of Q than that of pixels placed in smooth areas. Also in this scholar, we represent one non-adaptive data hiding algorithm. Our non-adaptive scheme, via an error reduction procedure, produces a high visual quality for stego-image. The proposed schemes present several advantages. 1-of aspects the embedding capacity and visual quality of stego-image are scalable. In other words, the embedding rate as well as the image quality can be scaled for practical applications 2-the high embedding capacity with minimal visual distortion can be achieved, 3-our methods require little memory space for secret data embedding and extracting phases, 4-secret keys have used to protect of the embedded secret data. Thus, level of security is high, 5-the problem of overflow or underflow does not occur. Experimental results indicated that the proposed adaptive scheme significantly is superior to the currently existing scheme, in terms of stego-image visual quality, embedding capacity and level of security and also our non-adaptive method is better than other non-adaptive methods, in view of stego-image quality. Results show which our adaptive algorithm can resist against the RS steganalysis attack.

  5. Efficient hiding of confidential high-utility itemsets with minimal side effects

    Science.gov (United States)

    Lin, Jerry Chun-Wei; Hong, Tzung-Pei; Fournier-Viger, Philippe; Liu, Qiankun; Wong, Jia-Wei; Zhan, Justin

    2017-11-01

    Privacy preserving data mining (PPDM) is an emerging research problem that has become critical in the last decades. PPDM consists of hiding sensitive information to ensure that it cannot be discovered by data mining algorithms. Several PPDM algorithms have been developed. Most of them are designed for hiding sensitive frequent itemsets or association rules. Hiding sensitive information in a database can have several side effects such as hiding other non-sensitive information and introducing redundant information. Finding the set of itemsets or transactions to be sanitised that minimises side effects is an NP-hard problem. In this paper, a genetic algorithm (GA) using transaction deletion is designed to hide sensitive high-utility itemsets for PPUM. A flexible fitness function with three adjustable weights is used to evaluate the goodness of each chromosome for hiding sensitive high-utility itemsets. To speed up the evolution process, the pre-large concept is adopted in the designed algorithm. It reduces the number of database scans required for verifying the goodness of an evaluated chromosome. Substantial experiments are conducted to compare the performance of the designed GA approach (with/without the pre-large concept), with a GA-based approach relying on transaction insertion and a non-evolutionary algorithm, in terms of execution time, side effects, database integrity and utility integrity. Results demonstrate that the proposed algorithm hides sensitive high-utility itemsets with fewer side effects than previous studies, while preserving high database and utility integrity.

  6. Motivation to hide emotion and children's understanding of the distinction between real and apparent emotions.

    Science.gov (United States)

    Gosselin, Pierre; Warren, Madeleine; Diotte, Michèle

    2002-12-01

    The authors investigated the extent to which children's understanding of the distinction between real and apparent emotions varied according to the motivation to hide emotions. Children, aged 6-7 and 10-11 years, were read stories designed to elicit either prosocial or self-protective motivated display rules and were asked to predict the facial expressions the protagonists would make to hide felt emotions. Children were found to understand the distinction between real and apparent emotions very well, independently of the type of motivation. Contrary to predictions, boys understood this distinction better than did girls when the motivation to hide positive emotions was prosocial. Children perceived neutralization as the most appropriate strategy to hide felt emotions, followed by masking.

  7. Livestock and Hides and Skins Marketing in Kenya: Problems and investment needs

    OpenAIRE

    Jabbar, Mohammad A.

    2002-01-01

    The paper briefly summarises the historical perspective on the development of livestock marketing in Kenya, current problems of livestock and hides and skins marketing, and recommends investment opportunities to improve the situation.

  8. Strategie del patetico e interludi circensi in Hide and Seek di Wilkie Collins

    OpenAIRE

    De Giovanni, Flora

    2013-01-01

    Starting from Victor Turner’s definitions of cultural performance and liminoid phenomena, the essay aims to analyse Wilkie Collins’s third novel, Hide and Seek (1854), which seems to be a sort of survey of the pastimes Victorian England allowed itself in the age of the increasing commodification of leisure. Though not a proper sensation novel (the genre for which Collins became famous in the 1860s), Hide and Seek draws on the conventions of melodrama, which, as Peter Brook conv...

  9. An information hiding method based on LSB and tent chaotic map

    Science.gov (United States)

    Song, Jianhua; Ding, Qun

    2011-06-01

    In order to protect information security more effectively, a novel information hiding method based on LSB and Tent chaotic map was proposed, first the secret message is Tent chaotic encrypted, and then LSB steganography is executed for the encrypted message in the cover-image. Compared to the traditional image information hiding method, the simulation results indicate that the method greatly improved in imperceptibility and security, and acquired good results.

  10. An evaluation of selected methods for the decontamination of cattle hides prior to skinning.

    Science.gov (United States)

    Small, A; Wells-Burr, B; Buncic, S

    2005-02-01

    The effectiveness of different decontamination treatments in reducing microbial loads on cattle hides was assessed. The 10-s hide treatments were conducted using a wet-and-dry vacuum cleaner filled with one of the liquids (heated to 50 °C) indicated below, followed or not by 10-min drying in the air. Also, the hide was clipped, followed or not by 10-s singeing using a hand-held blowtorch. Before and after each decontamination treatment, the hide was sampled (100 cm(2) areas) by a sponge-swabbing method to compare the total viable counts of bacteria (TVC). The largest bacterial reduction (Psanitizer solution (10% Betane Plus) resulted in significant reductions of 1.80 (Peffects. Since hide contamination is associated with microbial contamination of the carcasses, the results indicate that post-killing/pre-skinning hide decontamination (used alone, or in combination with carcass decontamination) has a potential to improve microbial meat safety. Nevertheless, further research is required to optimise the efficacy of these treatments in the reduction of specific pathogens under commercial conditions.

  11. A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

    Directory of Open Access Journals (Sweden)

    Milad Taleby Ahvanooey

    2018-01-01

    Full Text Available With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.

  12. Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2015-05-01

    A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  13. Hiding in plain sight: communication theory in implementation science.

    Science.gov (United States)

    Manojlovich, Milisa; Squires, Janet E; Davies, Barbara; Graham, Ian D

    2015-04-23

    ignoring a key contributor to implementation intervention success. When conceptualized as a transformational process, the focus of communication moves to shared understanding and is grounded in human interactions and the way we go about constructing knowledge. Instead of hiding in plain sight, we suggest explicitly acknowledging the role that communication plays in our implementation efforts. By using both paradigms, we can investigate when communication facilitates implementation, when it does not, and how to improve it so that our implementation and clinical interventions are embraced by clinicians and patients alike.

  14. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization

    Science.gov (United States)

    Bajaj, Ruchika; Bedi, Punam; Pal, S. K.

    Steganography is an art of hiding information in such a way that prevents the detection of hidden messages. Besides security of data, the quantity of data that can be hidden in a single cover medium, is also very important. We present a secure data hiding scheme with high embedding capacity for messages of variable length based on Particle Swarm Optimization. This technique gives the best pixel positions in the cover image, which can be used to hide the secret data. In the proposed scheme, k bits of the secret message are substituted into k least significant bits of the image pixel, where k varies from 1 to 4 depending on the message length. The proposed scheme is tested and results compared with simple LSB substitution, uniform 4-bit LSB hiding (with PSO) for the test images Nature, Baboon, Lena and Kitty. The experimental study confirms that the proposed method achieves high data hiding capacity and maintains imperceptibility and minimizes the distortion between the cover image and the obtained stego image.

  15. Costly hide and seek pays: unexpected consequences of deceit in a social dilemma

    International Nuclear Information System (INIS)

    Szolnoki, Attila; Perc, Matjaž

    2014-01-01

    Deliberate deceptiveness intended to gain an advantage is commonplace in human and animal societies. In a social dilemma, an individual may only pretend to be a cooperator to elicit cooperation from others, while in reality he is a defector. With this as motivation, we study a simple variant of the evolutionary prisoner's dilemma game entailing deceitful defectors and conditional cooperators that lifts the veil on the impact of such two-faced behavior. Defectors are able to hide their true intentions at a personal cost, while conditional cooperators are probabilistically successful at identifying defectors and act accordingly. By focusing on the evolutionary outcomes in structured populations, we observe a number of unexpected and counterintuitive phenomena. We show that deceitful behavior may fare better if it is costly, and that a higher success rate of identifying defectors does not necessarily favor cooperative behavior. These results are rooted in the spontaneous emergence of cycling dominance and spatial patterns that give rise to fascinating phase transitions, which in turn reveal the hidden complexity behind the evolution of deception. (paper)

  16. What is hiding behind ontogenic d13C variations in mollusk shells: New insights from scallops.

    Science.gov (United States)

    Chauvaud, L.; Lorrain, A.; Gillikin, D. P.; Thebault, J.; Paulet, Y.; Strand, O.; Blamart, D.; Guarini, J.; Clavier, J.

    2008-12-01

    We examined d13Ccalcite variations along scallop shells (Pecten maximus) sampled in Norway, France and Spain. Time series of shell calcite d13C show a consistent pattern of decreasing d13C with age. This almost linear d13C trend reflects an increasing contribution of metabolic CO2 to skeletal carbonate throughout ontogeny. We have removed this ontogenic trend to try to extract other information from our shell calcite d13C dataset. Scallops from the Bay of Brest (western Brittany, France) were then used to interpret the data as many environmental parameters were available for this site. d13Ccalcite variations were compared to d13C of dissolved inorganic carbon (DIC) and Chl a. The detrended calcite d13C profiles seem to follow a seasonal pattern, but surprisingly are inversely related to the d13C DIC and chlorophyll a concentrations measured within the water column. Theses results suggest that shell d13C variations are not controlled by isotopic variation of DIC. Since scallops eat phytoplankton and microphytobenthos cells, and, as a consequence respire organic mater largely depleted in 13C, we therefore suggest that in mollusk suspension feeders the shell d13Ccalcite might still be used to track the annual number of phytoplankton blooms when d13C values of calcite are detrended. We must consider this trend as a potential biological filter hiding precious environmental records.

  17. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

    Directory of Open Access Journals (Sweden)

    Tzu-Chuen Lu

    2017-10-01

    Full Text Available The concept of a dual-image based scheme in information sharing consists of concealing secret messages in two cover images; only someone who has both stego-images can extract the secret messages. In 2015, Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit to reduce the distortion of the stego-image. Then, in 2016, Lu et al. used a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. Because the folding strategy can obviously reduce the value, the proposed scheme includes the folding operation twice to further decrease the reduced digit. We use a frequency-based encoding strategy to encode a secret message and then use the block folding technique by performing the center-folding operation twice to embed secret messages. An indicator is needed to identify the sequence number of the folding operation. The proposed scheme collects several indicators to produce a combined code and hides the code in a pixel to reduce the size of the indicators. The experimental results show that the proposed method can achieve higher image quality under the same embedding rate or higher payload, which is better than other methods.

  18. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    Science.gov (United States)

    Christandl, Matthias; Ferrara, Roberto

    2017-12-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005), 10.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.

  19. Chlamydia pneumoniae hides inside apoptotic neutrophils to silently infect and propagate in macrophages.

    Directory of Open Access Journals (Sweden)

    Jan Rupp

    Full Text Available BACKGROUND: Intracellular pathogens have developed elaborate strategies for silent infection of preferred host cells. Chlamydia pneumoniae is a common pathogen in acute infections of the respiratory tract (e.g. pneumonia and associated with chronic lung sequelae in adults and children. Within the lung, alveolar macrophages and polymorph nuclear neutrophils (PMN are the first line of defense against bacteria, but also preferred host phagocytes of chlamydiae. METHODOLOGY/PRINCIPAL FINDINGS: We could show that C. pneumoniae easily infect and hide inside neutrophil granulocytes until these cells become apoptotic and are subsequently taken up by macrophages. C. pneumoniae infection of macrophages via apoptotic PMN results in enhanced replicative activity of chlamydiae when compared to direct infection of macrophages, which results in persistence of the pathogen. Inhibition of the apoptotic recognition of C. pneumoniae infected PMN using PS- masking Annexin A5 significantly lowered the transmission of chlamydial infection to macrophages. Transfer of apoptotic C. pneumoniae infected PMN to macrophages resulted in an increased TGF-ss production, whereas direct infection of macrophages with chlamydiae was characterized by an enhanced TNF-alpha response. CONCLUSIONS/SIGNIFICANCE: Taken together, our data suggest that C. pneumoniae uses neutrophil granulocytes to be silently taken up by long-lived macrophages, which allows for efficient propagation and immune protection within the human host.

  20. Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography

    Directory of Open Access Journals (Sweden)

    Wei-Liang Tai

    2018-01-01

    Full Text Available We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds data in it by using a data-hiding key. The image decryption and data extraction are independent and separable at the receiver side. Even though the receiver, who has only the data-hiding key, does not learn about the decrypted content, he can extract data from the received marked encrypted signal. However, the receiver who has only the private key cannot extract the embedded data, but he can directly decrypt the received marked encrypted signal to obtain the original image without any error. Compared with other schemes using a cipher stream to encrypt the image, the proposed scheme is more appropriate for cloud services without degrading the security level.

  1. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    OpenAIRE

    Kuang Tsan Lin; Sheng Lih Yeh

    2014-01-01

    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  2. Preservation of bovine hide using less salt with low concentration of antiseptic, part I: effectiveness of developed formulations

    Science.gov (United States)

    Bovine raw hides are commercially cured either with high salt concentration of about half the weight of actual hide or 95% saturated brine solution. This conventional technique is very popular due to the availability of common salt (sodium chloride) and its cost effective procedure but it generates ...

  3. Surprising structures hiding in Penrose’s future null infinity

    Science.gov (United States)

    Newman, Ezra T.

    2017-07-01

    Since the late1950s, almost all discussions of asymptotically flat (Einstein-Maxwell) space-times have taken place in the context of Penrose’s null infinity, I+. In addition, almost all calculations have used the Bondi coordinate and tetrad systems. Beginning with a known asymptotically flat solution to the Einstein-Maxwell equations, we show first, that there are other natural coordinate systems, near I+, (analogous to light-cones in flat-space) that are based on (asymptotically) shear-free null geodesic congruences (analogous to the flat-space case). Using these new coordinates and their associated tetrad, we define the complex dipole moment, (the mass dipole plus i times angular momentum), from the l  =  1 harmonic coefficient of a component of the asymptotic Weyl tensor. Second, from this definition, from the Bianchi identities and from the Bondi-Sachs mass and linear momentum, we show that there exists a large number of results—identifications and dynamics—identical to those of classical mechanics and electrodynamics. They include, among many others, {P}=M{v}+..., {L}= {r} × {P} , spin, Newton’s second law with the rocket force term (\\dotM v) and radiation reaction, angular momentum conservation and others. All these relations take place in the rather mysterious H-space rather than in space-time. This leads to the enigma: ‘why do these well known relations of classical mechanics take place in H-space?’ and ‘What is the physical meaning of H-space?’

  4. Variation in the Level of Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The occurrence of hide damage light flecks and spots was determined on tanned hides from 28 herds during a period of 8 to 12 months. Light flecks and spots are described as small areas of grain loss up to 3 mm in diameter that are seen on dyed crust cattle leather. Damage was found on 75.8% of all hides. The neck and shoulders were the anatomical region with the highest prevalence of damage. Sixty-eight per cent of all hides had light flecks and spots in this region. The forelimbs and dewlap were the anatomical region with the second highest occurrence with a prevalence of 39.1%. This distribution corresponded to the known distribution of lice in cattle. No significant differences were observed in age, sex, prevalence of lice in the herd assessed in March or infestations with different lice species. The frequency of light flecks and spots varied significantly during the year. The frequency was highest in the late winter and early spring, decreased significantly during the summer and was lowest in the autumn. This variation supported the importance of lice in the development of light flecks and spots and suggested a relatively long healing period for the damages induced by lice. PMID:11455905

  5. The impact of a gender and business training on income hiding

    NARCIS (Netherlands)

    Bulte, Erwin H.; Lensink, Robert; Winkel, Anne B.

    2018-01-01

    We use a randomized controlled trial and behavioral game to study the extent and determinants of income hiding in rural Vietnam. We focus on a training program that aims to promote gender equality and entrepreneurship among women in poverty who are engaged in running a small business. In one

  6. Effect of hiding places, straw and territory on agression in group-housed rabbit does

    NARCIS (Netherlands)

    Rommers, J.M.; Reuvekamp, B.F.J.; Gunnink, H.; Jong, de I.C.

    2014-01-01

    Group-housing of rabbit does may be preferred from welfare point of view. However, group-housing causes agonistic behaviour which may cause severe injuries. Severe injuries may be prevented by offering hiding places for attacked does. Providing enrichment (straw) may reduce agonistic behaviour by

  7. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Energy Technology Data Exchange (ETDEWEB)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C. (Iso-Ster (Pty) Ltd., Kempton Park (South Africa))

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  8. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Science.gov (United States)

    Du Plessis, TA; Russell, AE; Stevens, RCB; Galloway, AC

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  9. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    International Nuclear Information System (INIS)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C.

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem. (author)

  10. Entry points to stimulation of expansion in hides and skins processing

    African Journals Online (AJOL)

    Only 3.4% of respondents add value to hides and skins by processing. ... For this status of the chain, it was proposed that a workable intervention model has to encompass placement of tanneries and slaughter slabs in the chain as new actors, linking chain actors, improving livestock services especially dipping, and ...

  11. Succession of hide-seek and pursuit-evasion at heterogeneous locations.

    Science.gov (United States)

    Gal, Shmuel; Casas, Jérôme

    2014-05-06

    Many interactions between searching agents and their elusive targets are composed of a succession of steps, whether in the context of immune systems, predation or counterterrorism. In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit-escape. Our aim is to link these two processes, usually analysed separately and with different models, in a single game theory context. We define a matrix game in which a searcher looks at a fixed number of discrete locations only once each searching for a hider, which can escape with varying probabilities according to its location. The value of the game is the overall probability of capture after k looks. The optimal search and hide strategies are described. If a searcher looks only once into any of the locations, an optimal hider chooses it's hiding place so as to make all locations equally attractive. This optimal strategy remains true as long as the number of looks is below an easily calculated threshold; however, above this threshold, the optimal position for the hider is where it has the highest probability of escaping once spotted.

  12. The Use of Polymerized Genipin for the Stabilization of the Collagen Structure of Animal Hides

    Science.gov (United States)

    Animal hides are the major byproduct of meat industry and the collagen fibers is the main constituent. Crosslinkers play a key role in stabilizing the collagen structure for useful applications. Genipin is widely used as an ideal biological protein crosslinking agent due to its low toxicity compare...

  13. Efficacy of citrilow™ and cecure™ spray wash on the levels and prevalence of aerobic bacterials and enterobacteriaceae bacteria on cattle hides

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle skins to the inner meat and hide quality detrition from bacteria is recognized as a severe hygienic problem for commercial beef and hide processing facilities. To circumvent bacterial contamination, cattle are washed during hide p...

  14. Assessing theory of mind nonverbally in those with intellectual disability and ASD: the penny hiding game.

    Science.gov (United States)

    San José Cáceres, Antonia; Keren, Noa; Booth, Rhonda; Happé, Francesca

    2014-10-01

    Individuals with autism spectrum disorder (ASD) and low intellectual/language abilities are often omitted from experimental studies because of the challenges of testing these individuals. It is vital to develop appropriate and accessible tasks so that this significant part of the spectrum is not neglected. The theory of mind (ToM) has been extensively assessed in ASD, predominantly in relatively high-functioning individuals with reasonable language skills. This study aims to assess the ToM abilities of a sample of 132 participants with intellectual disability (ID) with and without ASD, matched in verbal mental age (VMA) and chronological age, using a naturalistic and nonverbal deception task: the Penny Hiding Game (PHG). The relationship between performance on the PHG and everyday adaptation was also studied. The PHG proved accessible to most participants, suggesting its suitability for use with individuals with low cognitive skills, attentional problems, and limited language. The ASD + ID group showed significantly more PHG errors, and fewer tricks, than the ID group. PHG performance correlated with Vineland adaptation scores for both groups. VMA was a major predictor of passing the task in both groups, and participants with ASD + ID required, on average, 2 years higher VMA than those with ID only, to achieve the same level of PHG success. VMA moderated the association between PHG performance and real-life social skills for the ASD + ID more than the ID group, suggesting that severely impaired individuals with ASD may rely on verbal ability to overcome their social difficulties, whereas individuals with ID alone may use more intuitive social understanding both in the PHG and everyday situations. © 2014 International Society for Autism Research, Wiley Periodicals, Inc.

  15. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days) after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment. PMID:11455906

  16. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Directory of Open Access Journals (Sweden)

    Grønstøl H

    2001-03-01

    Full Text Available The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment.

  17. Cross-sectional study to estimate the prevalence of enterohaemorrhagic Escherichia coli on hides of market beef cows at harvest.

    Science.gov (United States)

    Schneider, L G; Stromberg, Z R; Lewis, G L; Moxley, R A; Smith, D R

    2018-03-25

    Cattle hides are an important source of enterohaemorrhagic Escherichia coli (EHEC) carcass contamination at slaughter. Seven EHEC serogroups are adulterants in raw, non-intact beef: EHEC O26, O45, O103, O111, O121, O145 and O157. The objective of this study was to estimate the probability for hide contamination with EHEC among US market beef cows at slaughter and to test the effects of season and geographic region on prevalence of hide contamination. Hides (n = 800) of market cows were swabbed at slaughter immediately after exsanguination, prior to hide removal. Cows were sampled from two geographically distinct beef packing plants during four seasons of 2015. Cattle source was categorized by northern or southern region. Samples were tested for EHEC by a molecular screening assay. The effects of region, season and their interaction on the probability of hide contamination by each EHEC serogroup were tested in separate multilevel multivariable logistic regression models, accounting for the random effect of clustering by plant. Statistical significance was set α = .05. Of 800 total samples, at least one EHEC was detected on 630 (79%) hides. Enterohaemorrhagic E. coli O26 was detected on 129 (16%) of all hides sampled, EHEC O45 on 437 (55%), EHEC O103 on 289 (36%), EHEC O111 on 189 (24%), EHEC O121 on 140 (18%), EHEC O145 on 171 (21%) and EHEC O157 on 89 (11%). Detection of EHEC O26 and EHEC O121 was associated with season. Season and region were associated with detecting EHEC O45 and EHEC O157. Season-by-region interactions were associated with the outcome of detecting EHEC O103, EHEC O111 and EHEC O145. Season, region of origin and the interaction of these factors affect hide contamination of market beef cattle at slaughter by EHEC, and each serogroup responds to these factors uniquely. © 2018 Blackwell Verlag GmbH.

  18. Optical multiple-image hiding based on interference and grating modulation

    International Nuclear Information System (INIS)

    He, Wenqi; Peng, Xiang; Meng, Xiangfeng

    2012-01-01

    We present a method for multiple-image hiding on the basis of interference-based encryption architecture and grating modulation. By using a modified phase retrieval algorithm, we can separately hide a number of secret images into one arbitrarily preselected host image associated with a set of phase-only masks (POMs), which are regarded as secret keys. Thereafter, a grating modulation operation is introduced to multiplex and store the different POMs into a single key mask, which is then assigned to the authorized users in privacy. For recovery, after an appropriate demultiplexing process, one can reconstruct the distributions of all the secret keys and then recover the corresponding hidden images with suppressed crosstalk. Computer simulation results are presented to validate the feasibility of our approach. (paper)

  19. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  20. Information hiding technology and application analysis based on decimal expansion of irrational numbers

    Science.gov (United States)

    Liu, Xiaoyong; Lu, Pei; Shao, Jianxin; Cao, Haibin; Zhu, Zhenmin

    2017-10-01

    In this paper, an information hiding method using decimal expansion of irrational numbers to generate random phase mask is proposed. Firstly, the decimal expansion parts of irrational numbers generate pseudo-random sequences using a new coding schemed, the irrational number and start and end bit numbers were used as keys in image information hiding. Secondly, we apply the coding schemed to the double phase encoding system, the pseudo-random sequences are taken to generate random phase masks. The mean square error is used to calculate the quality of the recovered image information. Finally, two tests had been carried out to verify the security of our method; the experimental results demonstrate that the cipher image has such features, strong robustness, key sensitivity, and resistance to brute force attack.

  1. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    Directory of Open Access Journals (Sweden)

    Ari Shawakat Tahir

    2015-12-01

    Full Text Available The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed.

  2. 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing

    CERN Document Server

    Tsai, Pei-Wei; Huang, Hsiang-Cheh

    2017-01-01

    This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .

  3. Hiding objects and creating illusions above a carpet filter using a Fourier optics approach.

    Science.gov (United States)

    Wu, Kedi; Wang, Guo Ping

    2010-09-13

    Invisibility carpet cloaks are usually used to hide an object beneath carpet. In this paper we propose and demonstrate a carpet filter to hide objects and create illusions above the filter by using a Fourier optics method. Instead of using transformation optics, we get electromagnetic parameters of the filter by optical transfer functions, which play the role of modulating the propagation of the scattering angular spectrum directly from an object above the filter. By further adding a functional layer onto the filter, we can even camouflage the object so that it appears to be a different object. The analytical results are confirmed by numerical simulations. Our method is completely different from the current coordinate transfer method and may provide another point of view to more clearly understand the mechanism of invisibility cloaks.

  4. Hide depilation and feather disintegration studies with keratinolytic serine protease from a novel Bacillus subtilis isolate.

    Science.gov (United States)

    Pillai, Priya; Archana, G

    2008-03-01

    Keratinases play an important role in biotechnological applications such as improvement of feather meal, enzymatic dehairing and production of amino acids or peptides from high molecular weight substrates. Bacillus subtilis P13, isolated from Vajreshwari hot spring (45-50 degrees C) near Mumbai, India, produces a neutral serine protease and has an optimum temperature of 65 degrees C. This enzyme preparation was keratinolytic in nature and could disintegrate whole chicken feathers, except for the remnants of shafts. The enzyme preparation also exhibited depilation of goat hides with the recovery of intact animal hair. The enzyme preparation could release peptides from ground feathers and bring about their weight reduction; however, similar action on hair was relatively weak. A single major PMSF-sensitive protease band could be detected upon zymogram analysis, indicating that a single enzyme may be responsible for feather degradation and hide depilation. The importance of these findings in the biotechnological application for feather and leather industries is discussed.

  5. A dehydration process for ovine hide to obtain a new collagenous material

    OpenAIRE

    Ollé Otero, Lluís; Sorolla, Silvia; Casas Solé, Concepció; Bacardit Dalmases, Anna

    2014-01-01

    The aim of the present work is to develop a dehydration process for ovine hide to obtain a new collagenous material for use in the leather industry. What is obtained through this new process is a dry and very porous collagenous substrate which allows the application of tanning chemicals by immersion in aqueous solutions. When compared to existing, traditional processes, economic and environmental advantages are obtained from the use of this new material. More specifically, the new process ...

  6. An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining

    OpenAIRE

    Yogendra Kumar Jain,; Vinod Kumar Yadav,; Geetika S. Panday

    2011-01-01

    The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful toolfor discovering relationships which are hidden in large database. Association rules hiding algorithms get strong and efficient performance for protecting confidential and cru...

  7. Optical image hiding based on chaotic vibration of deformable moiré grating

    Science.gov (United States)

    Lu, Guangqing; Saunoriene, Loreta; Aleksiene, Sandra; Ragulskis, Minvydas

    2018-03-01

    Image hiding technique based on chaotic vibration of deformable moiré grating is presented in this paper. The embedded secret digital image is leaked in a form of a pattern of time-averaged moiré fringes when the deformable cover grating vibrates according to a chaotic law of motion with a predefined set of parameters. Computational experiments are used to demonstrate the features and the applicability of the proposed scheme.

  8. Data Hiding Based on a Two-Layer Turtle Shell Matrix

    Directory of Open Access Journals (Sweden)

    Xiao-Zhu Xie

    2018-02-01

    Full Text Available Data hiding is a technology that embeds data into a cover carrier in an imperceptible way while still allowing the hidden data to be extracted accurately from the stego-carrier, which is one important branch of computer science and has drawn attention of scholars in the last decade. Turtle shell-based (TSB schemes have become popular in recent years due to their higher embedding capacity (EC and better visual quality of the stego-image than most of the none magic matrices based (MMB schemes. This paper proposes a two-layer turtle shell matrix-based (TTSMB scheme for data hiding, in which an extra attribute presented by a 4-ary digit is assigned to each element of the turtle shell matrix with symmetrical distribution. Therefore, compared with the original TSB scheme, two more bits are embedded into each pixel pair to obtain a higher EC up to 2.5 bits per pixel (bpp. The experimental results reveal that under the condition of the same visual quality, the EC of the proposed scheme outperforms state-of-the-art data hiding schemes.

  9. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  10. Physicochemical Properties of Gelatin Extracted from Buffalo Hide Pretreated with Different Acids.

    Science.gov (United States)

    Mulyani, Sri; Setyabudi, Francis M C Sigit; Pranoto, Yudi; Santoso, Umar

    2017-01-01

    The acid pretreatment of collagen molecules disrupts their crosslinks and assists in the release of acid-soluble proteins, fats, and other components. Generally, to achieve optimum extraction efficiency, strong acids may be used at a lower acid concentration compared to weak acids. This study aimed to determine the yield and physicochemical properties of gelatins extracted from buffalo hides pretreated with different acids. Hides were extracted with hydrochloric, citric, and acetic acids at concentrations of 0.3, 0.6, 0.9, 1.2, and 1.5 M. A completely randomized design and the least significant difference test were used in the experimental design, and all measurements were performed in triplicate. The highest yield (29.17%) was obtained from pretreatment with 0.9 M HCl. The gel strength did not differ significantly ( p >0.05) according to acid type (280.26-259.62 g Bloom), and the highest viscosity was obtained from the 0.6 M citric acid pretreatment. All the gelatins contained α- and β-chain components and several degraded peptides (24-66 kDa). The color and Fourier-transform infrared spectrum of the gelatin extracted using 0.9 M HCl were similar to those of commercial bovine skin gelatin. In general, the physicochemical properties of the gelatin complied with the industry standard set by the Gelatin Manufacturers Institute of America, revealing that buffalo hide could serve as a potential alternative source of gelatin.

  11. Traceability System Model for Quality Gelatin Raw Material of Cattle Hides

    Directory of Open Access Journals (Sweden)

    S Nur

    2010-09-01

    Full Text Available Several criteria must be accomplished within the provision of quality products in terms of the types of materials, the processing methods and effort to get it. Traceability system involves various parties that have different needs and goals in the process of supplying raw materials. Hence, there is a need for institutional systems engineering that can organize and manage the tracking process, the procurement of raw materials that guarantee the origin of gelatin raw materials, and facilitate the industry and customer to create a standardized quality of product. The purpose of the study formulates the institutional tracking models of gelatin raw material from cattle hide based on various criteria and assessment of the expert opinion. The methods used in this study were Interpretative structural modeling to formulate a representation of institutional tracking efficiently and analytical hierarchy process to determine the tracking strategy of industrial gelatin raw materials from cowhide. The results obtained from the study were some key elements of institutional tracking model for industrial gelatin raw materials from cowhide and the traceability strategies for industrial raw materials from cattle hide gelatin Indonesia. (Animal Production 12(3: 190-198 (2010 Key Words: traceability, institutional model, cattle hide, gelatin

  12. Content-based Image Hiding Method for Secure Network Biometric Verification

    Directory of Open Access Journals (Sweden)

    Xiangjiu Che

    2011-08-01

    Full Text Available For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content correlation analysis to protect the network-based transmitted image. By using principal component analysis (PCA, the content correlation between the biometric image and the cover image is firstly analyzed. Then based on particle swarm optimization (PSO algorithm, some regions of the cover image are selected to represent the biometric image, in which the cover image can carry partial content of the biometric image. As a result of the correlation analysis, the unrepresented part of the biometric image is embedded into the cover image by using the discrete wavelet transform (DWT. Combined with human visual system (HVS model, this approach makes the hiding result perceptually invisible. The extensive experimental results demonstrate that the proposed hiding approach is robust against some common frequency and geometric attacks; it also provides an effective protection for the secure biometric verification.

  13. HIDE & SEEK: End-to-end packages to simulate and process radio survey data

    Science.gov (United States)

    Akeret, J.; Seehars, S.; Chang, C.; Monstein, C.; Amara, A.; Refregier, A.

    2017-01-01

    As several large single-dish radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these datasets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system-from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing single-dish radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single-dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal. The two packages can be used separately or together depending on the application. Their modular and flexible nature allows easy adaptation to other instruments and datasets. We describe the basic architecture of the two packages and examine in detail the noise and RFI modeling in HIDE, as well as the implementation of gain calibration and RFI mitigation in SEEK. We then apply HIDE &SEEK to forward-model a Galactic survey in the frequency range 990-1260 MHz based on data taken at the Bleien Observatory. For this survey, we expect to cover 70% of the full sky and achieve a median signal-to-noise ratio of approximately 5-6 in the cleanest channels including systematic uncertainties. However, we also point out the potential challenges of high RFI contamination and baseline removal when examining the early data from the Bleien Observatory. The fully documented HIDE &SEEK packages are available at http://hideseek.phys.ethz.ch/ and are published

  14. Ultrashort soliton switching based on coherent energy hiding.

    Science.gov (United States)

    Romagnoli, M; Wabnitz, S; Zoccolotti, L

    1991-08-15

    Coherent coupling between light and atoms may be exploited for conceiving a novel class of all-optical signalprocessing devices without a direct counterpart in the continuous-wave regime. We show that the self-switching of ultrashort soliton pulses on resonance with a transition of doping centers in a slab waveguide directional coupler is based on nonlinear group-velocity (instead of the usual phase-velocity) changes.

  15. Hiding the weakness: structural robustness using origami design

    Science.gov (United States)

    Liu, Bin; Santangelo, Christian; Cohen, Itai

    2015-03-01

    A non-deformable structure is typically associated with infinitely stiff materials that resist distortion. In this work, we designed a structure with a region that will not deform even though it is made of arbitrarily compliant materials. More specifically, we show that a foldable sheet with a circular hole in the middle can be deformed externally with the internal geometry of the hole unaffected. Instead of strengthening the local stiffness, we fine tune the crease patterns so that all the soft modes that can potentially deform the internal geometry are not accessible through strain on the external boundary. The inner structure is thus protected by the topological mechanics, based on the detailed geometry of how the vertices in the foldable sheet are connected. In this way, we isolate the structural robustness from the mechanical properties of the materials, which introduces an extra degree of freedom for structural design.

  16. A logarithmic quantization index modulation for perceptually better data hiding.

    Science.gov (United States)

    Kalantari, Nima Khademi; Ahadi, Seyed Mohammad

    2010-06-01

    In this paper, a novel arrangement for quantizer levels in the Quantization Index Modulation (QIM) method is proposed. Due to perceptual advantages of logarithmic quantization, and in order to solve the problems of a previous logarithmic quantization-based method, we used the compression function of mu-Law standard for quantization. In this regard, the host signal is first transformed into the logarithmic domain using the mu-Law compression function. Then, the transformed data is quantized uniformly and the result is transformed back to the original domain using the inverse function. The scalar method is then extended to vector quantization. For this, the magnitude of each host vector is quantized on the surface of hyperspheres which follow logarithmic radii. Optimum parameter mu for both scalar and vector cases is calculated according to the host signal distribution. Moreover, inclusion of a secret key in the proposed method, similar to the dither modulation in QIM, is introduced. Performance of the proposed method in both cases is analyzed and the analytical derivations are verified through extensive simulations on artificial signals. The method is also simulated on real images and its performance is compared with previous scalar and vector quantization-based methods. Results show that this method features stronger a watermark in comparison with conventional QIM and, as a result, has better performance while it does not suffer from the drawbacks of a previously proposed logarithmic quantization algorithm.

  17. HIDING IN THE SHADOWS. II. COLLISIONAL DUST AS EXOPLANET MARKERS

    International Nuclear Information System (INIS)

    Dobinson, Jack; Leinhardt, Zoë M.; Lines, Stefan; Carter, Philip J.; Dodson-Robinson, Sarah E.; Teanby, Nick A.

    2016-01-01

    Observations of the youngest planets (∼1–10 Myr for a transitional disk) will increase the accuracy of our planet formation models. Unfortunately, observations of such planets are challenging and time-consuming to undertake, even in ideal circumstances. Therefore, we propose the determination of a set of markers that can preselect promising exoplanet-hosting candidate disks. To this end, N-body simulations were conducted to investigate the effect of an embedded Jupiter-mass planet on the dynamics of the surrounding planetesimal disk and the resulting creation of second-generation collisional dust. We use a new collision model that allows fragmentation and erosion of planetesimals, and dust-sized fragments are simulated in a post-process step including non-gravitational forces due to stellar radiation and a gaseous protoplanetary disk. Synthetic images from our numerical simulations show a bright double ring at 850 μm for a low-eccentricity planet, whereas a high-eccentricity planet would produce a characteristic inner ring with asymmetries in the disk. In the presence of first-generation primordial dust these markers would be difficult to detect far from the orbit of the embedded planet, but would be detectable inside a gap of planetary origin in a transitional disk

  18. Are mammal olfactory signals hiding right under our noses?

    Science.gov (United States)

    Apps, Peter James

    2013-06-01

    Chemical communication via olfactory semiochemicals plays a central role in the social behaviour and reproduction of mammals, but even after four decades of research, only a few mammal semiochemicals have been chemically characterized. Expectations that mammal chemical signals are coded by quantitative relationships among multiple components have persisted since the earliest studies of mammal semiochemistry, and continue to direct research strategies. Nonetheless, the chemistry of mammal excretions and secretions and the characteristics of those semiochemicals that have been identified show that mammal semiochemicals are as likely to be single compounds as to be mixtures, and are as likely to be coded by the presence and absence of chemical compounds as by their quantities. There is very scant support for the view that mammal semiochemicals code signals as specific ratios between components, and no evidence that they depend on a Gestalt or a chemical image. Of 31 semiochemicals whose chemical composition is known, 15 have a single component and 16 are coded by presence/absence, one may depend on a ratio between two compounds and none of them are chemical images. The expectation that mammal chemical signals have multiple components underpins the use of multivariate statistical analyses of chromatographic data, but the ways in which multivariate statistics are commonly used to search for active mixtures leads to single messenger compounds and signals that are sent by the presence and absence of compounds being overlooked. Research on mammal semiochemicals needs to accommodate the possibility that simple qualitative differences are no less likely than complex quantitative differences to encode chemical signals.

  19. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications.

    Science.gov (United States)

    Loan, Nazir A; Parah, Shabir A; Sheikh, Javaid A; Akhoon, Jahangir A; Bhat, Ghulam M

    2017-09-01

    A high capacity and semi-reversible data hiding scheme based on Pixel Repetition Method (PRM) and hybrid edge detection for scalable medical images has been proposed in this paper. PRM has been used to scale up the small sized image (seed image) and hybrid edge detection ensures that no important edge information is missed. The scaled up version of seed image has been divided into 2×2 non overlapping blocks. In each block there is one seed pixel whose status decides the number of bits to be embedded in the remaining three pixels of that block. The Electronic Patient Record (EPR)/data have been embedded by using Least Significant and Intermediate Significant Bit Substitution (ISBS). The RC4 encryption has been used to add an additional security layer for embedded EPR/data. The proposed scheme has been tested for various medical and general images and compared with some state of art techniques in the field. The experimental results reveal that the proposed scheme besides being semi-reversible and computationally efficient is capable of handling high payload and as such can be used effectively for electronic healthcare applications. Copyright © 2017. Published by Elsevier Inc.

  20. Effect of acanthocephalan parasites on hiding behaviour in two species of shore crabs.

    Science.gov (United States)

    Latham, A D M; Poulin, R

    2002-12-01

    The effect of acanthocephalan parasites (Profilicollis spp.) on the hiding behaviour during low tide of two species of shore crabs (intermediate hosts), Macrophthalmus hirtipes (Brachyura: Ocypodidae) and Hemigrapsus crenulatus (Brachyura: Grapsidae), was examined at Blueskin Bay, South Island, New Zealand. Exposed M. hirtipes were found to have significantly higher infection levels than did hidden conspecifics. This pattern was not observed for H. crenulatus. Mean cystacanth numbers were found to be considerably higher in M. hirtipes than H. crenulatus. Crabs exposed at low tide are at a greater risk of predation by definitive shorebird hosts than are hidden conspecifics. Preferential manipulation of one intermediate host species over another could influence diversity within ecosystems.

  1. A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fujisaki, Eiichiro

    2002-01-01

    We present a statistically-hiding commitment scheme allowing commitment to arbitrary size integers, based on any (Abelian) group with certain properties, most importantly, that it is hard for the committer to compute its order. We also give efficient zero-knowledge protocols for proving knowledge...... input is chosen by the (possibly cheating) prover. -  - Our results apply to any group with suitable properties. In particular, they apply to a much larger class of RSA moduli than the safe prime products proposed in [14] - Potential examples include RSA moduli, class groups and, with a slight...

  2. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  3. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    DEFF Research Database (Denmark)

    Christandl, Matthias; Ferrara, Roberto

    2017-01-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005)]. The construction of those states was based...... on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable...

  4. Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding

    OpenAIRE

    Wu, Han-Zhou; Wang, Hong-Xia; Shi, Yun-Qing

    2016-01-01

    This paper presents a novel reversible data hiding (RDH) algorithm for gray-scaled images, in which the prediction-error of prediction error (PPE) of a pixel is used to carry the secret data. In the proposed method, the pixels to be embedded are firstly predicted with their neighboring pixels to obtain the corresponding prediction errors (PEs). Then, by exploiting the PEs of the neighboring pixels, the prediction of the PEs of the pixels can be determined. And, a sorting technique based on th...

  5. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    Science.gov (United States)

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  6. A REVIEW ON HEAVY METALS CONTENTS IN HIDE, SKIN AND PROCESSED LEATHERS

    Directory of Open Access Journals (Sweden)

    KOIZHAIGANOVA Meruyert

    2016-05-01

    Full Text Available Heavy metals are metals with high atomic weight which can be deposited in soil, water, plants and animals. It is generally known that mammal tissues are good bioindicators of trace elements, including heavy metals. Heavy metal analysis serves to identify and quantify the elements that are a potential hazard to the consumer after varying levels of contact. Usage area of leather is increasingly expanding in these days and it has also become a material requested and demanded by effect of fashion. Leather must protect its appearance and physical stability and also be problem-free in ecological terms and harmless to human health. There is a lack of data concerning the content of toxic elements in raw hide and skin of animals. Mainly information concerning metals content, including toxic ones, in processed leathers may be found in the literature. The aim of the present study was to review and compare the content of some heavy metals in raw hide, skin and the processed leathers in order to evaluate their accumulation and transition to the end-up product.

  7. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Ding Qing-Yan; Zhang Shu-Hui; Chen Xiu-Bo

    2016-01-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. (paper)

  8. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm

    Directory of Open Access Journals (Sweden)

    Ching-Yu Yang

    2012-01-01

    Full Text Available This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.

  9. Efficacy of Citrilow® and Cecure® spray wash on the prevalence of aerobic and enterobacteriaceae/gram negative enteric bacilli and cattle hide quality

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle to the inner meat as well as hide quality deterioration from bacteria are hygienic problems for meat and hide processing facilities. This study investigated spray wash treatments independently with two antimicrobials used in the ...

  10. Showing Value (Editorial

    Directory of Open Access Journals (Sweden)

    Denise Koufogiannakis

    2009-06-01

    librarians on student achievement. Todd notes, “If we do not show value, we will not have a future. Evidence-based practice is not about the survival of school librarians, it’s about the survival of our students” (40. In this issue we feature school libraries and their connection to evidence based practice. Former Editor-in-Chief, Lindsay Glynn, began putting the wheels in motion for this feature almost a year ago. She invited Carol Gordon and Ross Todd to act as guest editors of the section, drawing upon their contacts and previous work in this field. The result is an issue with five feature articles exploring different aspects of the connection between school libraries and evidence based practice, from the theoretical to the practical. In addition, there is a thought-provoking Commentary by David Loertscher, asking whether we need the evolutionary model of evidence based practice, or something more revolutionary!In addition to the Feature section, we have a well-rounded issue with articles on the topics of library human resources, and the development of a scholars’ portal. As well, there are a record 10 evidence summaries and our educational EBL101 column. I hope there is something for everyone in this issue of EBLIP – enjoy, and see you soon in Stockholm!

  11. Hiding the interior region of core-shell nanoparticles with quantum invisible cloaks

    Science.gov (United States)

    Lee, Jeng Yi; Lee, Ray-Kuang

    2014-04-01

    Based on the scattering cancellation, we provide a method not only making a nanoparticle nearly invisible, but also hiding its interior region from the outside probing matter wave. By applying the interplay among the nodal points of partial waves along with the concept of streamline in fluid dynamics for probability flux, a quantum invisible cloak to the electron transport in a host semiconductor is demonstrated by simultaneously guiding the probability flux outside a hidden region and keeping the total scattering cross section negligible. As the probability flux vanishes in the interior region, one can embed any materials inside a multiple core-shell nanoparticle without affecting physical observables from the outside. Our results reveal the possibility to design a protection shield layer for fragile interior parts from the impact of transport electrons.

  12. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  13. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2015-01-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. (paper)

  14. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  15. Alien invasions and the game of hide and seek in Patagonia.

    Directory of Open Access Journals (Sweden)

    Martin Lindegren

    Full Text Available The introduction, establishment and spread of alien species is a major threat to biodiversity and the provision of ecosystem services for human wellbeing. In order to reduce further loss of biodiversity and maintain productive and sustainable ecosystems, understanding the ecological mechanisms underlying species invasions and avoiding potentially harmful effects on native communities is urgently needed, but largely lacking. We here demonstrate, by means of hydroacoustics and advanced spatial modelling, how native fish species as a result of previous exposure to native predators may successfully respond to invasive novel predators through a complicated game of hide and seek, minimizing spatio-temporal overlap with predators, and potentially facilitating coexistence between native prey species (Galaxiids and introduced novel predators (Salmonids in a deep Andean lake, Patagonia.

  16. Antibacterial activities of leave extracts as bactericides for soaking of skin or hide

    Science.gov (United States)

    Suparno, Ono; Panandita, Tania; Afifah, Amalia; Marimin; Purnawati, Rini

    2018-03-01

    Antibacteria, a subtance inhibiting the growth of bacteria, can be obtained from tropical-almond (Terminalia catappa), morinda (Morinda citrifolia), and white leadtree (Leucaena leucocephala) plants, since the plants have phytochemical content functioning as antibacterial agent. Commonly, part of plant that contains higher antibacterial substances is its leaf. The objectives of this study were to determine antibacterial activity of tropical-almond, morinda, and white leadtree leaves extracts, and to analyse the potency of the three extracts as natural bactericide for soaking of skin or hide. The responses measured in this study were phytochemical contents, total flavonoid, tannin content, the inhibition zone, the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Phytochemical contents containing the three leaves extracts were alkaloid, flavonoid, tannin, saponin, phenolic, and glycoside. Total flavonoid and tannin contents of the three extracts were tropical-almond extract of 1.14 % and 1.51 %, respectively; morinda extract of 0.61 % and 0.36 %, respectively; and white leadtree extract of 0.60 % and 4.82 %, respectively. White leadtree leaf extract gave the highest inhibition zone against B. subtilis, S. aureus and E. coli, i.e. 1.50, 1.3, and 1.65 cm, respectively; and the lowest MIC and MBC against B. subtilis, S. aureus and E. coli, i.e. 1500, 3000, and 1500 μg/ml, respectively. Therefore, the white leadtree leave extract had more potential as bactericide for soaking of skin or hide compared to those of the tropical-almond and morinda leaves extracts.

  17. Young Stars in Old Galaxies - a Cosmic Hide and Seek Game

    Science.gov (United States)

    2002-05-01

    Surprise Discovery with World's Leading Telescopes [1] Summary Combining data from the NASA/ESA Hubble Space Telescope (HST) and the ESO Very Large Telescope (VLT) , a group of European and American astronomers [2] have made an unexpected, major discovery. They have identified a huge number of "young" stellar clusters , only a few billion years old [3], inside an "old" elliptical galaxy (NGC 4365), probably aged some 12 billion years. For the first time, it has been possible to identify several distinct periods of star-formation in a galaxy as old as this one . Elliptical galaxies like NGC 4365 have until now been considered to have undergone one early star-forming period and thereafter to be devoid of any star formation. However, the combination of the best and largest telescopes in space and on the ground has now clearly shown that there is more than meets the eye. This important new information will help to understand the early history of galaxies and the general theory of star formation in the Universe . PR Photo 15a/02 : Combined HST+VLT image of elliptical galaxy NGC 4365 PR Photo 15b/02 : Same image, with "old" and "young" stellar clusters indicated PR Photo 15c/02 : Animated GIF image, showing the three cluster populations observed in NGC 4365 Do elliptical galaxies only contain old stars? One of the challenges of modern astronomy is to understand how galaxies, those large systems of stars, gas and dust, form and evolve. In this connection, a central question has always been to learn when most of the stars in the Universe formed. Did this happen at a very early stage, within a few billion years after the Big Bang? Or were a significant number of the stars we now observe formed much more recently? Spectacular collisions between galaxies take place all the time, triggering the formation of thousands or even millions of stars, cf. ESO PR Photo 29b/99 of the dramatic encounter between NGC 6872 and IC 4970. However, when looking at the Universe as a whole, most

  18. Show-Bix &

    DEFF Research Database (Denmark)

    2014-01-01

    The anti-reenactment 'Show-Bix &' consists of 5 dias projectors, a dial phone, quintophonic sound, and interactive elements. A responsive interface will enable the Dias projectors to show copies of original dias slides from the Show-Bix piece ”March på Stedet”, 265 images in total. The copies are...

  19. Hide out return test and blowndown crud composition under ETA chemistry

    International Nuclear Information System (INIS)

    Chocron, Mauricio; Rodriguez, Ivanna; Saucedo, Ramona; Rodriguez-Aliciardi, Matias; Montes, Juan

    2012-09-01

    Among the techniques recommended for the surveillance of the Steam Generators (SGs) are (i) the follow-up of the corrosion products in the Feed Water and Blown down water and the corresponding accumulation mass balance and (ii) The follow-up of ionic impurities normally present in the main condensate and feed water that can enter the cycle either by condenser leakages or even by the make-up water. This is so, no matter how well the the cycle is constructed or the make-up water plant behaves given the continuous phase change present in it and the subsequent concentration. A synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in the deposits creating a potentially risky environment for the steam generator tubes. Hide out return determination consists in the measurement of the concentration of ions, anions and cations, present in the blown-down water which are eluted during the shutdown along with the reduction of power and temperature. The integrated value provides figures to perform several evaluations like: (i) how well the make-up water plant has performed during the cycle, (ii) presence of condenser in leakages, (iii) amount of deposits present in the steam generator and (iv) it allows to estimate the chemistry in operation inside the steam generator liquid phase inside the sludge pile. Embalse, a CANDU 6 pressurized heavy water reactor located in Cordoba Province, Argentina, is close to reach the end-of-design-life and a project of life extension is currently ongoing. There, also the chemistry in the BOP has been modified from Morpholine to Ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of steam generator internals and new steam generators will be installed. It is of interest then to set up a hide-out return procedure and analysis of blown down crud collected during the shut down as a base line for the second period of operation

  20. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    Directory of Open Access Journals (Sweden)

    Novella Isabel S

    2003-06-01

    Full Text Available Abstract Background In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, RED, was found to avoid extinction and remain in the population for long periods of time. Since RED characterizes the past evolutionary history of the population, this observation was called quasispecies memory. While the quasispecies theory predicts the existence of these memory genomes, there is a disagreement between the expected and observed mutant frequency values. Therefore, the origin of quasispecies memory is not fully understood. Results We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry, the likely cause of fitness differences between wild type and RED mutants. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.. If the RED mutant is constantly recreated by mutations, then its frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases their fitness to the wild-type level. Moreover, even at low m.o.i. the equilibrium frequency of the mutant is higher than predicted by the standard quasispecies model, because a fraction of mutant virions generated from wild-type parents will also be encapsidated by wild-type protein. Conclusions Our model predicts that phenotypic hiding will strongly influence the population dynamics of viruses, particularly at high m.o.i., and will also have important effects on the mutation-selection balance at low m.o.i. The delay in mutant extinction and increase in mutant

  1. Talking with TV shows

    DEFF Research Database (Denmark)

    Sandvik, Kjetil; Laursen, Ditte

    2014-01-01

    User interaction with radio and television programmes is not a new thing. However, with new cross-media production concepts such as X Factor and Voice, this is changing dramatically. The second-screen logic of these productions encourages viewers, along with TV’s traditional one-way communication...... mode, to communicate on interactive (dialogue-enabling) devices such as laptops, smartphones and tablets. Using the TV show Voice as our example, this article shows how the technological and situational set-up of the production invites viewers to engage in new ways of interaction and communication...

  2. Talk Show Science.

    Science.gov (United States)

    Moore, Mitzi Ruth

    1992-01-01

    Proposes having students perform skits in which they play the roles of the science concepts they are trying to understand. Provides the dialog for a skit in which hot and cold gas molecules are interviewed on a talk show to study how these properties affect wind, rain, and other weather phenomena. (MDH)

  3. Obesity in show cats.

    Science.gov (United States)

    Corbee, R J

    2014-12-01

    Obesity is an important disease with a high prevalence in cats. Because obesity is related to several other diseases, it is important to identify the population at risk. Several risk factors for obesity have been described in the literature. A higher incidence of obesity in certain cat breeds has been suggested. The aim of this study was to determine whether obesity occurs more often in certain breeds. The second aim was to relate the increased prevalence of obesity in certain breeds to the official standards of that breed. To this end, 268 cats of 22 different breeds investigated by determining their body condition score (BCS) on a nine-point scale by inspection and palpation, at two different cat shows. Overall, 45.5% of the show cats had a BCS > 5, and 4.5% of the show cats had a BCS > 7. There were significant differences between breeds, which could be related to the breed standards. Most overweight and obese cats were in the neutered group. It warrants firm discussions with breeders and cat show judges to come to different interpretations of the standards in order to prevent overweight conditions in certain breeds from being the standard of beauty. Neutering predisposes for obesity and requires early nutritional intervention to prevent obese conditions. Journal of Animal Physiology and Animal Nutrition © 2014 Blackwell Verlag GmbH.

  4. Honored Teacher Shows Commitment.

    Science.gov (United States)

    Ratte, Kathy

    1987-01-01

    Part of the acceptance speech of the 1985 National Council for the Social Studies Teacher of the Year, this article describes the censorship experience of this honored social studies teacher. The incident involved the showing of a videotape version of the feature film entitled "The Seduction of Joe Tynan." (JDH)

  5. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding.

    Science.gov (United States)

    Wang, Xiaogang; Chen, Wen; Chen, Xudong

    2014-09-22

    We present a novel image hiding method based on phase retrieval algorithm under the framework of nonlinear double random phase encoding in fractional Fourier domain. Two phase-only masks (POMs) are efficiently determined by using the phase retrieval algorithm, in which two cascaded phase-truncated fractional Fourier transforms (FrFTs) are involved. No undesired information disclosure, post-processing of the POMs or digital inverse computation appears in our proposed method. In order to achieve the reduction in key transmission, a modified image hiding method based on the modified phase retrieval algorithm and logistic map is further proposed in this paper, in which the fractional orders and the parameters with respect to the logistic map are regarded as encryption keys. Numerical results have demonstrated the feasibility and effectiveness of the proposed algorithms.

  6. The energy show

    International Nuclear Information System (INIS)

    1988-01-01

    The Energy Show is a new look at the problems of world energy, where our supplies come from, now and in the future. The programme looks at how we need energy to maintain our standards of living. Energy supply is shown as the complicated set of problems it is - that Fossil Fuels are both raw materials and energy sources, that some 'alternatives' so readily suggested as practical options are in reality a long way from being effective. (author)

  7. Additive manufacturing.

    Science.gov (United States)

    Mumith, A; Thomas, M; Shah, Z; Coathup, M; Blunn, G

    2018-04-01

    Increasing innovation in rapid prototyping (RP) and additive manufacturing (AM), also known as 3D printing, is bringing about major changes in translational surgical research. This review describes the current position in the use of additive manufacturing in orthopaedic surgery. Cite this article: Bone Joint J 2018;100-B:455-60.

  8. A Data Hiding Technique to Synchronously Embed Physiological Signals in H.264/AVC Encoded Video for Medicine Healthcare.

    Science.gov (United States)

    Peña, Raul; Ávila, Alfonso; Muñoz, David; Lavariega, Juan

    2015-01-01

    The recognition of clinical manifestations in both video images and physiological-signal waveforms is an important aid to improve the safety and effectiveness in medical care. Physicians can rely on video-waveform (VW) observations to recognize difficult-to-spot signs and symptoms. The VW observations can also reduce the number of false positive incidents and expand the recognition coverage to abnormal health conditions. The synchronization between the video images and the physiological-signal waveforms is fundamental for the successful recognition of the clinical manifestations. The use of conventional equipment to synchronously acquire and display the video-waveform information involves complex tasks such as the video capture/compression, the acquisition/compression of each physiological signal, and the video-waveform synchronization based on timestamps. This paper introduces a data hiding technique capable of both enabling embedding channels and synchronously hiding samples of physiological signals into encoded video sequences. Our data hiding technique offers large data capacity and simplifies the complexity of the video-waveform acquisition and reproduction. The experimental results revealed successful embedding and full restoration of signal's samples. Our results also demonstrated a small distortion in the video objective quality, a small increment in bit-rate, and embedded cost savings of -2.6196% for high and medium motion video sequences.

  9. No Place to Hide: Missing Primitive Stars Outside Milky Way Uncovered

    Science.gov (United States)

    2010-02-01

    After years of successful concealment, the most primitive stars outside our Milky Way galaxy have finally been unmasked. New observations using ESO's Very Large Telescope have been used to solve an important astrophysical puzzle concerning the oldest stars in our galactic neighbourhood - which is crucial for our understanding of the earliest stars in the Universe. "We have, in effect, found a flaw in the forensic methods used until now," says Else Starkenburg, lead author of the paper reporting the study. "Our improved approach allows us to uncover the primitive stars hidden among all the other, more common stars." Primitive stars are thought to have formed from material forged shortly after the Big Bang, 13.7 billion years ago. They typically have less than one thousandth the amount of chemical elements heavier than hydrogen and helium found in the Sun and are called "extremely metal-poor stars" [1]. They belong to one of the first generations of stars in the nearby Universe. Such stars are extremely rare and mainly observed in the Milky Way. Cosmologists think that larger galaxies like the Milky Way formed from the merger of smaller galaxies. Our Milky Way's population of extremely metal-poor or "primitive" stars should already have been present in the dwarf galaxies from which it formed, and similar populations should be present in other dwarf galaxies. "So far, evidence for them has been scarce," says co-author Giuseppina Battaglia. "Large surveys conducted in the last few years kept showing that the most ancient populations of stars in the Milky Way and dwarf galaxies did not match, which was not at all expected from cosmological models." Element abundances are measured from spectra, which provide the chemical fingerprints of stars [2]. The Dwarf galaxies Abundances and Radial-velocities Team [3] used the FLAMES instrument on ESO's Very Large Telescope to measure the spectra of over 2000 individual giant stars in four of our galactic neighbours, the Fornax

  10. Food additives

    Science.gov (United States)

    ... GO About MedlinePlus Site Map FAQs Customer Support Health Topics Drugs & Supplements Videos & Tools Español You Are Here: Home → Medical Encyclopedia → Food additives URL of this page: //medlineplus.gov/ency/article/ ...

  11. Methanol extract of grain dust shows complement fixing activity and other characteristics similar to tannic acid.

    Science.gov (United States)

    Skea, D; Broder, I

    1986-01-01

    We have found several similarities between tannic acid and grain dust extract prepared with methanol. Both formed a precipitate with IgG, and these interactions were inhibited by albumin. In addition, both preparations fixed complement; this activity was heat stable and was removed by prior adsorption of the preparations with hide powder. Adsorption with polyvinyl polypyrrolidone reduced the complement-fixing activity of tannic acid but not that of the methanol grain dust extract. The similarities between tannic acid and the methanol grain dust extract are consistent with the presence of a tannin or tanninlike material in grain dust. Images FIGURE 1. PMID:3709479

  12. Probing the crucial role of Leu31 and Thr33 of the Bacillus pumilus CBS alkaline protease in substrate recognition and enzymatic depilation of animal hide.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    Full Text Available The sapB gene, encoding Bacillus pumilus CBS protease, and seven mutated genes (sapB-L31I, sapB-T33S, sapB-N99Y, sapB-L31I/T33S, sapB-L31I/N99Y, sapB-T33S/N99Y, and sapB-L31I/T33S/N99Y were overexpressed in protease-deficient Bacillus subtilis DB430 and purified to homogeneity. SAPB-N99Y and rSAPB displayed the highest levels of keratinolytic activity, hydrolysis efficiency, and enzymatic depilation. Interestingly, and at the semi-industrial scale, rSAPB efficiently removed the hair of goat hides within a short time interval of 8 h, thus offering a promising opportunity for the attainment of a lime and sulphide-free depilation process. The efficacy of the process was supported by submitting depilated pelts and dyed crusts to scanning electron microscopic analysis, and the results showed well opened fibre bundles and no apparent damage to the collagen layer. The findings also revealed better physico-chemical properties and less effluent loads, which further confirmed the potential candidacy of the rSAPB enzyme for application in the leather industry to attain an ecofriendly process of animal hide depilation. More interestingly, the findings on the substrate specificity and kinetic properties of the enzyme using the synthetic peptide para-nitroanilide revealed strong preferences for an aliphatic amino-acid (valine at position P1 for keratinases and an aromatic amino-acid (phenylalanine at positions P1/P4 for subtilisins. Molecular modeling suggested the potential involvement of a Leu31 residue in a network of hydrophobic interactions, which could have shaped the S4 substrate binding site. The latter could be enlarged by mutating L31I, fitting more easily in position P4 than a phenylalanine residue. The molecular modeling of SAPB-T33S showed a potential S2 subside widening by a T33S mutation, thus suggesting its importance in substrate specificity.

  13. Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number

    OpenAIRE

    Kohei Arai; Yuji Yamada

    2011-01-01

    An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images...

  14. Analysis of the bacterial diversity existing on animal hide and wool: development of a preliminary PCR-restriction fragment length polymorphism fingerprint database for identifying isolates.

    Science.gov (United States)

    Chen, Yu; Gao, Hongwei; Zhang, Yanming; Deng, Mingjun; Wu, Zhenxing; Zhu, Laihua; Duan, Qing; Xu, Biao; Liang, Chengzhu; Yue, Zhiqin; Xiao, Xizhi

    2012-01-01

    Twenty-one bacterial strains were isolated from imported cattle hide and rabbit wool using two types of media, nutrient broth, and nutrient broth with serum. The bacteria identified were Brevibacillus laterosporus, Leclercia adecarboxylata, Peptococcus niger, Bacillus circulans, Raoultella ornithinolytica, Bacillus subtilis, Bacillus cereus, Bacillus thermobacillus, Bacillus choshinensis, Bacillus sphaericus, Acinetobacter haemolyticus, Sphingomonas paucimobilis, Bacillus thuringiensis, Staphylococcus intermedius, Mycobacteria, Moraxella, Klebsiella pneumoniae, Ralstonia pickettii, Staphylococcus chromogenes, Comamonas testosteroni, and Cupriavidus pauculus. The 16s rDNA gene of each bacterium was amplified using the universal primers 27f and 1492r. The amplicons were digested with AvaI, BamHI, BgII, DraI, EcoRI, EcoRV, HindIII, HinfI, HpaI, PstI, SmaI, TaqII, XbaI, XmaI, AluI, XhoI, and PvuI individually. A specific fingerprint from the PCR-restriction fragment length polymorphism method based on 16s rDNA was obtained for each bacterium. The results showed that the method developed was useful not only for bacterial identification but also for the etiological investigation of pathogens in imported animal hair and wool.

  15. An Internal Data Non-hiding Type Real-time Kernel and its Application to the Mechatronics Controller

    Science.gov (United States)

    Yoshida, Toshio

    For the mechatronics equipment controller that controls robots and machine tools, high-speed motion control processing is essential. The software system of the controller like other embedded systems is composed of three layers software such as real-time kernel layer, middleware layer, and application software layer on the dedicated hardware. The application layer in the top layer is composed of many numbers of tasks, and application function of the system is realized by the cooperation between these tasks. In this paper we propose an internal data non-hiding type real-time kernel in which customizing the task control is possible only by change in the program code of the task side without any changes in the program code of real-time kernel. It is necessary to reduce the overhead caused by the real-time kernel task control for the speed-up of the motion control of the mechatronics equipment. For this, customizing the task control function is needed. We developed internal data non-cryptic type real-time kernel ZRK to evaluate this method, and applied to the control of the multi system automatic lathe. The effect of the speed-up of the task cooperation processing was able to be confirmed by combined task control processing on the task side program code using an internal data non-hiding type real-time kernel ZRK.

  16. Improvement of uptake of chrome tan on hide protein by basic oxides

    International Nuclear Information System (INIS)

    Nashya, E.H.A.; Aggiagh, A.E.; Khedra, M.H.; El-Sayeda, N.H.E.

    2005-01-01

    Three basic oxides were used to improve uptake of chrome tan as well as shrinkage temperature of the tanned leather. In addition, the skin quality is one of the most important factors taking into consideration. Three basic oxides, named magnesium oxide, manganese oxide and sodium bicarbonate. The process was optimized taking into the account the shaking rate, chrome concentration (%), initial ph, basic oxides concentration, temperature and contact time. The optimum conditions for exhaustion, fixation, shrinkage temperature as well as skin quality showed that agitation rate of 150 rpm, chrome concentration of 16%, initial ph of 2.5, basic oxide concentration of 4% magnesium oxide, temperature of 35 degree C and contact time of 24 hr. The best results obtained are 88% exhaustion, 90.03% fixation and 109 degree C shrinkage temperature in aqueous medium

  17. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia)

    OpenAIRE

    Donatas Brandišauskas

    2010-01-01

    This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imp...

  18. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2011-05-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  19. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2010-12-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  20. That Man Behind the Curtain: Investigating the Sexual Online Dating Behavior of Men Who Have Sex With Men but Hide Their Same-Sex Sexual Attraction in Offline Surroundings.

    Science.gov (United States)

    Lemke, Richard; Weber, Mathias

    2017-01-01

    This study investigates how men who have sex with men (MSM) use chat and dating sites based on theories of stigma-related offline behavior and online self-disclosure. We hypothesize that hidden MSM (those who self-label as heterosexual or who hide their same-sex sexual attraction from family, friends, acquaintances, or a female romantic partner) differ from open MSM in how they behave on gay chat and dating sites and in offline gay venues. Drawing on a survey of 12,002 MSM, we show that hidden MSM tend to mask their identity on gay chat and dating sites while avoiding offline gay venues. They also focus more strongly on online sexual activities (e.g., masturbating during online chats) when using gay chat and dating sites. However, they spend the same amount of time on these sites, and they use them to initiate offline sexual encounters as often and as fast as open MSM.

  1. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

    Directory of Open Access Journals (Sweden)

    Jong Hyuk Park

    2016-10-01

    Full Text Available Long Term Evolution (LTE and Long Term Evolution-Advanced (LTE-A support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI and Radio Network Temporary Identities (RNTI are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME. The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.

  2. Hide-Scrapers from Arukhlo I Settlement in Georgia (on correspondence of the shape and function of prehistoric implements

    Directory of Open Access Journals (Sweden)

    Esakia Ketevan M.

    2017-09-01

    Full Text Available The article analyses one of the primary categories of the implement complex discovered at Arukhlo I Neolithic settlement (Georgia, Kvemo Kartli Region. The stone implements discovered at the site are characterized by their great variety. Comprehensive functional research conducted by the authors demonstrated that the typological and morphological characteristics of the various categories of stone implements do not always correspond to their functions. Thus, the shapes and functions of the hide-scrapers were fully identical for 18 of 39 implements only, whereas the other tools were used for different purposes and did not feature traces of utilization. A microanalysis of their working parts allowed to determine the types of processed raw material, means of processing, and in certain cases the type of obtained articles as well. The authors made a conclusion on the importance of the comprehensive research of production inventory for the reconstruction of the characteristic features of prehistoric economy.

  3. [Missed diagnosis of hiding posterior marginal fracture of ankle with pronation-external rotation type and its treatment].

    Science.gov (United States)

    Wang, Jia; Zhang, Yun-Tong; Zhang, Chun-Cai; Tang, Yang

    2014-01-01

    To analyze causes of missed diagnosis of hiding post-malleolar fractures in treating ankle joint fractures of pronation-external rotation type according to Lauge-Hansen classification and assess its medium-term outcomes. Among 103 patients with ankle joint fracture of pronation-external rotation type treated from March 2002 to June 2010,9 patients were missed diagnosis,including 6 males and 3 females,with a mean age of 35.2 years old (ranged, 18 to 55 years old) . Four patients were diagnosed during operation, 2 patients were diagnosed 2 or 3 days after first surgery and 3 patients came from other hospital. All the patients were treated remedially with lag screws and lock plates internal fixation. After operation,ankle joint function was evaluated according to American Orthopaedic Foot and Ankle Society (AOFAS). All the 9 patients were followed up, and the duration ranged from 14 to 30 months (averaged, 17 months). No incision infection was found, and all incision healed at the first stage. At the latest follow-up, AOFAS was 83.0 +/- 4.4, the score of 4 patients diagnosed during operation was 85.0 +/- 2.9, and the score of 5 patients treated by secondary operation was 81.0 +/- 5.3. All the patients got fracture union observed by X-ray at a mean time of 2.2 months after operation. There were no complications such as internal fixation loosing, broken and vascular or nerve injuries. Ankle joint fracture of pronation-external rotation type may be combined with hiding post-malleolar fractures. So to patients with ankle joint fracture of pronation-external rotation type, lateral X-ray should be read carefully, and if necessary, CT or MRI examination should be performed. If adding lateral X-ray examination after reduction of exterior and interior ankle joint fixation, the missed diagnosis may be avoided.

  4. Hide and go seek with temperature signals of Northeastern US Tree Species

    Science.gov (United States)

    Alexander, M. R.; Pederson, N.; Bishop, D. A.; Pearl, J. K.; Anchukaitis, K. J.

    2017-12-01

    Improving reconstructions of past climate is vital in providing long-term context for regional climate change. There have been only two published reconstructions of past temperatures in the northeastern U.S. (NEUS) since the 1980s, one based on Picea rubens, and one out in 2017 based upon Chamaecyparis thyoides (Atlantic white cedar; AWC). Because increased species diversity generally improves dendrohydroclimatic reconstructions and both Picea rubens and AWC have limitations as paleoproxies due to land-use and air pollution, we conducted a series of tests to ask, "Does species diversity improve reconstructions of temperature history in the northeastern United States?" The first two tests were performed on AWC and then a network of AWC and Picea rubens. Subsequent tests added groups of species or genera from a network of 230 tree-ring chronologies beginning with those having the strongest relation between warming temperatures and increased growth. PC1 of the AWC test represented 40% of the variance and showed a significant positive relation with winter temperature (r = 0.38). As additional species were included, the "winter temperature PC" accounted for less of the overall variance, ranging from 26% of the variance in test 2 to 5% by test 5. AWC is swamped by the hydroclimatic signal that dominates our network. Populations of species such as Fagus grandifolia, Fraxinus nigra, Juniperus virginiana, Liriodendron tulipifera, Pinus rigida, and Pinus strobus from our network loaded strongest with AWC on the winter temperature PC. Including multiple species accounted for almost 20% more variance in the winter temperature record than AWC alone. Although drought is a dominating influence of tree growth in this region, our results suggest that winter temperatures are recorded within NEUS tree rings. Increasing the species diversity of tree proxies has the potential for improving reconstruction of paleotemperatures in regions lacking latitudinal or altitudinal tree lines

  5. Biochemical and molecular characterization of a serine keratinase from Brevibacillus brevis US575 with promising keratin-biodegradation and hide-dehairing activities.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    Full Text Available Dehairing is one of the highly polluting operations in the leather industry. The conventional lime-sulfide process used for dehairing produces large amounts of sulfide, which poses serious toxicity and disposal problems. This operation also involves hair destruction, a process that leads to increased chemical oxygen demand (COD, biological oxygen demand (BOD, and total suspended solid (TSS loads in the effluent. With these concerns in mind, enzyme-assisted dehairing has often been proposed as an alternative method. The main enzyme preparations so far used involved keratinases. The present paper reports on the purification of an extracellular keratinase (KERUS newly isolated from Brevibacillus brevis strain US575. Matrix assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF/MS analysis revealed that the purified enzyme was a monomer with a molecular mass of 29121.11 Da. The sequence of the 27 N-terminal residues of KERUS showed high homology with those of Bacillus keratinases. Optimal activity was achieved at pH 8 and 40°C. Its thermoactivity and thermostability were upgraded in the presence of 5 mM Ca(2+. The enzyme was completely inhibited by phenylmethanesulfonyl fluoride (PMSF and diiodopropyl fluorophosphates (DFP, which suggests that it belongs to the serine protease family. KERUS displayed higher levels of hydrolysis, substrate specificity, and catalytic efficiency than NUE 12 MG and KOROPON® MK EG keratinases. The enzyme also exhibited powerful keratinolytic activity that made it able to accomplish the entire feather-biodegradation process on its own. The kerUS gene encoding KERUS was cloned, sequenced, and expressed in Escherichia coli. The biochemical properties of the extracellular purified recombinant enzyme (rKERUS were similar to those of native KERUS. Overall, the findings provide strong support for the potential candidacy of this enzyme as an effective and eco-friendly alternative to the conventional

  6. Analysis of hide-out return and the composition of the steam generators' combined blowdown under ethanolamine chemistry

    International Nuclear Information System (INIS)

    Rodriguez Aliciardi, M; Belloni, M; Croatto, F; Ferrari, F; Herrera, C; Mendizabal, M; Montes, J; Saucedo, R; Rodriguez, I; Chocron, M

    2012-01-01

    Among the techniques recommended for the surveillance of the steam generators (SG's) are (i) the follow-up of the corrosion products in the feed water and blown-down water and the corresponding accumulation mass balance and (ii) the follow-up of the ionic impurities normally present in the main condensate and feed water that can enter in the cycle either through condenser leakages or even with the make-up water. This is, no matter how well the cycle is constructed or the make-up water plant behaves, given the continuous phase change present in the cycle, a concentration equilibrium is established. Moreover, a synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in crevices and deposits creating a potentially corrosion risky environment for the SG's tubes. Hide-out return determination consists in the measurement of ions' concentrations, present in the blown-down water which are eluted in the shutdown during the power and temperature reduction. The integrated values allow graphical representations for performing several evaluations like: (i) the performance make-up water plant during a period, (ii) the presence of condenser in-leakages, (iii) the SG's deposits estimation and (iv) the internal chemistry of the SG's liquid phase inside the sludge pile. CNE, a CANDU 6 pressurized heavy-water reactor (PHWR) located in Embalse, Cordoba Province, Argentina, is close to reach the end-of-design-life and a life extension project is currently ongoing. In the plant also the chemistry of the BOP has been modified from a morpholine to an ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of SG's internals and new SG's will be installed. Then, it is of interest to set up a hide-out return procedure and analysis of the combined blown-down crud collected during the shut down as a base line for the second period of

  7. "Hiding Our Snickers": "Weekly Mail" Journalists' Indirect Resistance in Apartheid South Africa

    Science.gov (United States)

    Trabold, Bryan

    2006-01-01

    In the mid- to late 1980s, the challenges facing the editors and journalists working for the South African antiapartheid newspaper, the "Weekly Mail," were formidable. In addition to the more than one hundred censorship laws already in place, the apartheid government had declared a series of states of emergency in a final and desperate…

  8. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    OpenAIRE

    El-Monem, Farouk Abd; Hussain, Ahmed I.; Nashy, EL-Shahat H.A.; El-Wahhab, Hamada Abd; Naser, Abd El-Rahman M.

    2014-01-01

    Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA) and butyl acrylate (BA). The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leat...

  9. Prevalence and relatedness of Escherichia coli O157:H7 strains in the feces and on the hides and carcasses of U.S. meat goats at slaughter.

    Science.gov (United States)

    Jacob, M E; Foster, D M; Rogers, A T; Balcomb, C C; Sanderson, M W

    2013-07-01

    We determined the prevalences of Escherichia coli O157:H7 in feces, hide, and carcasses of meat goats at a U.S. processing plant. Prevalences were 11.1%, 2.7%, and 2.7%, respectively. Sixteen pulsed-field gel electrophoresis (PFGE) subtypes were identified among 49 E. coli O157:H7 isolates, some of which were present on multiple sample types or collection days.

  10. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Directory of Open Access Journals (Sweden)

    Vishakha Kelkar

    2017-01-01

    Full Text Available In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient’s information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image.

  11. Can organic matter hide from decomposers in the labyrinth of soil aggregates? Micro-engineered Soil Chips challenging foraging fungi

    Science.gov (United States)

    Hammer, Edith C.; Aleklett, Kristin; Arellano Caicedo, Carlos G.; Bengtsson, Martin; Micaela Mafla Endara, Paola; Ohlsson, Pelle

    2017-04-01

    From the point of view of microorganisms, the soil environment is an enormously complex labyrinth with paths and dead-end streets, where resources and shelters are unevenly distributed. We study foraging strategies of soil organisms, especially fungi, and the possibility of physio-spatial stabilization of organic matter by "hiding" in occluded soil spaces. We manipulate growth habitat microstructure with lab-on-a-chip techniques, where we designed complex environments with channels and obstacle at dimensions of the size of hyphae, and construct them in the transparent, gas-permeable polymer PDMS. We fill those with different nutrient solutions or combine with mineral nutrient gradients, and inoculate them with soil organisms. We analyze organisms and substrates with microscopy, fluorescence microscopy and analytical chemistry. We compared different soil litter decomposers and an arbuscular mycorrhizal fungus for their ability to forage through complex air-gap structures and attempt to classify them into functional traits concerning their mycelium directionality, space-exploring approach and ability to grow through acute angles and narrow constrictions. We identified structures which are very difficult to penetrate for most species, and compounds located behind such features may thus be spatially unavailable for decomposers. We discuss our approach in comparison to soil pore space tomographic analyses and findings we made in the pore space of colonized wood biochar.

  12. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Science.gov (United States)

    Tuckley, Kushal

    2017-01-01

    In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient's information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB) obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image. PMID:29104744

  13. Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images

    Directory of Open Access Journals (Sweden)

    Mehdi Hussain

    2016-05-01

    Full Text Available The goal of image steganographic methods considers three main key issues: high embedding capacity, good visual symmetry/quality, and security. In this paper, a hybrid data hiding method combining the right-most digit replacement (RMDR with an adaptive least significant bit (ALSB is proposed to provide not only high embedding capacity but also maintain a good visual symmetry. The cover-image is divided into lower texture (symmetry patterns and higher texture (asymmetry patterns areas and these textures determine the selection of RMDR and ALSB methods, respectively, according to pixel symmetry. This paper has three major contributions. First, the proposed hybrid method enhanced the embedding capacity due to efficient ALSB utilization in the higher texture areas of cover images. Second, the proposed hybrid method maintains the high visual quality because RMDR has the closest selection process to generate the symmetry between stego and cover pixels. Finally, the proposed hybrid method is secure against statistical regular or singular (RS steganalysis and pixel difference histogram steganalysis because RMDR is capable of evading the risk of RS detection attacks due to pixel digits replacement instead of bits. Extensive experimental tests (over 1500+ cover images are conducted with recent least significant bit (LSB-based hybrid methods and it is demonstrated that the proposed hybrid method has a high embedding capacity (800,019 bits while maintaining good visual symmetry (39.00% peak signal-to-noise ratio (PSNR.

  14. Risk Aversion in Game Shows

    DEFF Research Database (Denmark)

    Andersen, Steffen; Harrison, Glenn W.; Lau, Morten I.

    2008-01-01

    We review the use of behavior from television game shows to infer risk attitudes. These shows provide evidence when contestants are making decisions over very large stakes, and in a replicated, structured way. Inferences are generally confounded by the subjective assessment of skill in some games......, and the dynamic nature of the task in most games. We consider the game shows Card Sharks, Jeopardy!, Lingo, and finally Deal Or No Deal. We provide a detailed case study of the analyses of Deal Or No Deal, since it is suitable for inference about risk attitudes and has attracted considerable attention....

  15. Measuring performance at trade shows

    DEFF Research Database (Denmark)

    Hansen, Kåre

    2004-01-01

    Trade shows is an increasingly important marketing activity to many companies, but current measures of trade show performance do not adequately capture dimensions important to exhibitors. Based on the marketing literature's outcome and behavior-based control system taxonomy, a model is built...... that captures a outcome-based sales dimension and four behavior-based dimensions (i.e. information-gathering, relationship building, image building, and motivation activities). A 16-item instrument is developed for assessing exhibitors perceptions of their trade show performance. The paper presents evidence...

  16. Tokyo Motor Show 2003; Tokyo Motor Show 2003

    Energy Technology Data Exchange (ETDEWEB)

    Joly, E.

    2004-01-01

    The text which follows present the different techniques exposed during the 37. Tokyo Motor Show. The report points out the great tendencies of developments of the Japanese automobile industry. The hybrid electric-powered vehicles or those equipped with fuel cells have been highlighted by the Japanese manufacturers which allow considerable budgets in the research of less polluting vehicles. The exposed models, although being all different according to the manufacturer, use always a hybrid system: fuel cell/battery. The manufacturers have stressed too on the intelligent systems for navigation and safety as well as on the design and comfort. (O.M.)

  17. Reality show: um paradoxo nietzschiano

    Directory of Open Access Journals (Sweden)

    Ilana Feldman

    2011-01-01

    Full Text Available

    O fenômeno dos reality shows - e a subseqüente relação entre imagem e verdade - assenta-se sobre uma série de paradoxos. Tais paradoxos podem ser compreendidos à luz do pensamento do filósofo alemão Friedrich Nietzsche, que, através dos usos de formulações paradoxais, concebia a realidade como um mundo de pura aparência e a verdade como um acréscimo ficcional, como um efeito. A ficção é então tomada, na filosofia de Nietzsche, não em seu aspecto falsificante e desrealizador - como sempre pleiteou nossa tradição metafísica -, mas como condição necessária para que certa espécie de invenção possa operar como verdade. Sendo assim, a própria expressão reality show, através de sua formulação paradoxal, engendra explicitamente um mundo de pura aparência, em que a verdade, a parte reality da proposição, é da ordem do suplemento, daquilo que se acrescenta ficcionalmente - como um adjetivo - a show. O ornamento, nesse caso, passa a ocupar o lugar central, apontando para o efeito produzido: o efeito-de-verdade. Seguindo, então, o pensamento nietzschiano e sua atualização na contemporaneidade, investigaremos de que forma os televisivos “shows de realidade” operam paradoxalmente, em consonância com nossas paradoxais práticas culturais.

  18. Hiding data selected topics : Rudolf Ahlswede’s lectures on information theory 3

    CERN Document Server

    Althöfer, Ingo; Deppe, Christian; Tamm, Ulrich

    2016-01-01

    Devoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon’s historical work on secrecy systems is detailed, followed by an introduction to an information-theoretic model of wiretap channels, and such important concepts as homophonic coding and authentication. Once the theoretical arguments have been presented, comprehensive technical details of AES are given. Furthermore, a short introduction to the history of public-key cryptology, RSA and El Gamal cryptosystems is provided, followed by a look at the basic theory of elliptic curves, and algorithms for efficient addition in elliptic curves. Lastly, the important topic of “oblivious transfer” is discussed, which is strongly conne...

  19. How the leopard hides its spots: ASIP mutations and melanism in wild cats.

    Directory of Open Access Journals (Sweden)

    Alexsandra Schneider

    Full Text Available The occurrence of melanism (darkening of the background coloration is documented in 13 felid species, in some cases reaching high frequencies at the population level. Recent analyses have indicated that it arose multiple times in the Felidae, with three different species exhibiting unique mutations associated with this trait. The causative mutations in the remaining species have so far not been identified, precluding a broader assessment of the evolutionary dynamics of melanism in the Felidae. Among these, the leopard (Panthera pardus is a particularly important target for research, given the iconic status of the 'black panther' and the extremely high frequency of melanism observed in some Asian populations. Another felid species from the same region, the Asian golden cat (Pardofelis temminckii, also exhibits frequent records of melanism in some areas. We have sequenced the coding region of the Agouti Signaling Protein (ASIP gene in multiple leopard and Asian golden cat individuals, and identified distinct mutations strongly associated with melanism in each of them. The single nucleotide polymorphism (SNP detected among the P. pardus individuals was caused by a nonsense mutation predicted to completely ablate ASIP function. A different SNP was identified in P. temminckii, causing a predicted amino acid change that should also induce loss of function. Our results reveal two additional cases of species-specific mutations implicated in melanism in the Felidae, and indicate that ASIP mutations may play an important role in naturally-occurring coloration polymorphism.

  20. Can a Bright and Energetic X-Ray Pulsar Be Hiding Amid the Debris of SN 1987A?

    Science.gov (United States)

    Esposito, Paolo; Rea, Nanda; Lazzati, Davide; Matsuura, Mikako; Perna, Rosalba; Pons, José A.

    2018-04-01

    The mass of the stellar precursor of supernova (SN) 1987A and the burst of neutrinos observed at the moment of the explosion are consistent with the core-collapse formation of a neutron star. However, no compelling evidence for the presence of a compact object of any kind in SN 1987A has been found yet in any band of the electromagnetic spectrum, prompting questions on whether the neutron star survived and, if it did, on its properties. Beginning with an analysis of recent Chandra observations, here we appraise the current observational situation. We derived limits on the X-ray luminosity of a compact object with a nonthermal, Crab-pulsar-like spectrum of the order of ≈(1–5) × 1035 erg s‑1, corresponding to limits on the rotational energy loss of a possible X-ray pulsar in SN 1987A of ≈(0.5–1.5) × 1038 erg s‑1. However, a much brighter X-ray source cannot be excluded if, as is likely, it is enshrouded in a cloud of absorbing matter with a metallicity similar to that expected in the outer layers of a massive star toward the end of its life. We found that other limits obtained from various arguments and observations in other energy ranges either are unbinding or allow a similar maximum luminosity of the order of ≈1035 erg s‑1. We conclude that while a pulsar alike the one in the Crab Nebula in both luminosity and spectrum is hardly compatible with the observations, there is ample space for an “ordinary” X-ray-emitting young neutron star, born with normal initial spin period, temperature, and magnetic field, to be hiding inside the evolving remnant of SN 1987A.

  1. Hide and seek: a comparative autoradiographic in vitro investigation of the adenosine A3 receptor

    Energy Technology Data Exchange (ETDEWEB)

    Haeusler, D.; Fuchshuber, F.; Girschele, F.; Hacker, M.; Wadsak, W.; Mitterhauser, Markus [Medical University of Vienna, Department of Biomedical Imaging and Image-guided Therapy, Vienna (Austria); Grassinger, L. [University of Applied Sciences Wiener Neustadt, Department of Biomedical Analytics, Wiener Neustadt (Austria); Hoerleinsberger, W.J. [Medical University of Vienna, Department of Biomedical Imaging and Image-guided Therapy, Vienna (Austria); University of Vienna, Cognitive Science Research Platform, Vienna (Austria); Hoeftberger, R.; Leisser, I. [Medical University of Vienna, Institute of Neurology, Vienna (Austria); Shanab, K.; Spreitzer, H. [University of Vienna, Department of Drug and Natural Product Synthesis, Vienna (Austria); Gerdenitsch, W. [Medical University of Vienna, Institute of Biomedicinal Research, Vienna (Austria)

    2015-05-01

    Since the adenosine A3 receptor (A3R) is considered to be of high clinical importance in the diagnosis and treatment of ischaemic conditions (heart and brain), glaucoma, asthma, arthritis, cancer and inflammation, a suitable and selective A3R PET tracer such as [{sup 18}F]FE rate at SUPPY would be of high clinical value for clinicians as well as patients. A3R was discovered in the late 1990s, but there is still little known regarding its distribution in the CNS and periphery. Hence, in autoradiographic experiments the distribution of A3R in human brain and rat tissues was investigated and the specific binding of the A3R antagonist FE rate at SUPPY and MRS1523 compared. Immunohistochemical staining (IHC) experiments were also performed to validate the autoradiographic findings. For autoradiographic competition experiments human post-mortem brain and rat tissues were incubated with [{sup 125}I]AB-MECA and highly selective compounds to block the other adenosine receptor subtypes. Additionally, IHC was performed with an A3 antibody. Specific A3R binding of MRS1523 and FE rate at SUPPY was found in all rat peripheral tissues examined with the highest amounts in the spleen (44.0 % and 46.4 %), lung (44.5 % and 45.0 %), heart (39.9 % and 42.9 %) and testes (27.4 % and 29.5 %, respectively). Low amounts of A3R were found in rat brain tissues (5.9 % and 5.6 %, respectively) and human brain tissues (thalamus 8.0 % and 9.1 %, putamen 7.8 % and 8.2 %, cerebellum 6.0 % and 7.8 %, hippocampus 5.7 % and 5.6 %, caudate nucleus 4.9 % and 6.4 %, cortex 4.9 % and 6.3 %, respectively). The outcome of the A3 antibody staining experiments complemented the results of the autoradiographic experiments. The presence of A3R protein was verified in central and peripheral tissues by autoradiography and IHC. The specificity and selectivity of FE rate at SUPPY was confirmed by direct comparison with MRS1523, providing further evidence that [{sup 18}F]FE rate at SUPPY may be a suitable A3 PET

  2. Can R-parity violation hide vanilla supersymmetry at the LHC?

    International Nuclear Information System (INIS)

    Asano, Masaki

    2012-09-01

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  3. Hiding in Fresh Fruits and Vegetables: Opportunistic Pathogens May Cross Geographical Barriers

    Directory of Open Access Journals (Sweden)

    Zahra S. Al-Kharousi

    2016-01-01

    Full Text Available Different microbial groups of the microbiome of fresh produce can have diverse effects on human health. This study was aimed at identifying some microbial communities of fresh produce by analyzing 105 samples of imported fresh fruits and vegetables originated from different countries in the world including local samples (Oman for aerobic plate count and the counts of Enterobacteriaceae, Enterococcus, and Staphylococcus aureus. The isolated bacteria were identified by molecular (PCR and biochemical methods (VITEK 2. Enterobacteriaceae occurred in 60% of fruits and 91% of vegetables. Enterococcus was isolated from 20% of fruits and 42% of vegetables. E. coli and S. aureus were isolated from 22% and 7% of vegetables, respectively. Ninety-seven bacteria comprising 21 species were similarly identified by VITEK 2 and PCR to species level. E. coli, Klebsiella pneumoniae, Enterococcus casseliflavus, and Enterobacter cloacae were the most abundant species; many are known as opportunistic pathogens which may raise concern to improve the microbial quality of fresh produce. Phylogenetic trees showed no relationship between clustering of the isolates based on the 16S rRNA gene and the original countries of fresh produce. Intercountry passage of opportunistic pathogens in fresh produce cannot be ruled out, which requires better management.

  4. CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Cemal Kocak

    2017-03-01

    Full Text Available Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio and SSIM (Structural Similarity Index. In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD method, Simulated Annealing (SA Algorithm and Mix column transform based on irreducible polynomial mathematics methods.

  5. Human vision-based algorithm to hide defective pixels in LCDs

    Science.gov (United States)

    Kimpe, Tom; Coulier, Stefaan; Van Hoey, Gert

    2006-02-01

    Producing displays without pixel defects or repairing defective pixels is technically not possible at this moment. This paper presents a new approach to solve this problem: defects are made invisible for the user by using image processing algorithms based on characteristics of the human eye. The performance of this new algorithm has been evaluated using two different methods. First of all the theoretical response of the human eye was analyzed on a series of images and this before and after applying the defective pixel compensation algorithm. These results show that indeed it is possible to mask a defective pixel. A second method was to perform a psycho-visual test where users were asked whether or not a defective pixel could be perceived. The results of these user tests also confirm the value of the new algorithm. Our "defective pixel correction" algorithm can be implemented very efficiently and cost-effectively as pixel-dataprocessing algorithms inside the display in for instance an FPGA, a DSP or a microprocessor. The described techniques are also valid for both monochrome and color displays ranging from high-quality medical displays to consumer LCDTV applications.

  6. Hiding or hospitalising? On dilemmas of pregnancy management in East Cameroon.

    Science.gov (United States)

    van der Sijpt, Erica

    2013-01-01

    Current international debates and policies on safe motherhood mainly propose biomedical interventions to reduce the risks during pregnancy and delivery. Yet, the conceptualisations of risk that underlie this framework may not correspond with local perceptions of reproductive dangers; consequently, hospital services may remain underutilised. Inspired by a growing body of anthropological literature exploring local fertility-related fears, and drawing on 15 months of fieldwork, this paper describes ideas about risky reproduction and practices of pregnancy protection in a Cameroonian village. It shows that social and supernatural threats to fertility are deemed more significant than the physical threats of fertility stressed at the (inter)national level. To protect their pregnancies from those social and supernatural influences, however, women take very physical measures. It is in this respect that biomedical interventions, physical in their very nature, do connect to local methods of pregnancy management. Furthermore, some pregnant women purposefully deploy hospital care in an attempt to reduce relational uncertainties. Explicit attention to the intersections of the social and the physical, and of the supernatural and the biomedical, furthers anthropological knowledge on fertility management and offers a starting point for more culturally sensitive safe motherhood interventions.

  7. Can R-parity violation hide vanilla supersymmetry at the LHC?

    Energy Technology Data Exchange (ETDEWEB)

    Asano, Masaki [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Rolbiecki, Krzysztof; Sakurai, Kazuki [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2012-09-15

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  8. HIDING IN PLAIN SIGHT: RECORD-BREAKING COMPACT STELLAR SYSTEMS IN THE SLOAN DIGITAL SKY SURVEY

    International Nuclear Information System (INIS)

    Sandoval, Michael A.; Vo, Richard P.; Romanowsky, Aaron J.; Strader, Jay; Choi, Jieun; Conroy, Charlie; Jennings, Zachary G.; Villaume, Alexa; Brodie, Jean P.; Foster, Caroline; Norris, Mark A.; Janz, Joachim; Forbes, Duncan A.

    2015-01-01

    Motivated by the recent, serendipitous discovery of the densest known galaxy, M60-UCD1, we present two initial findings from a follow-up search, using the Sloan Digital Sky Survey, Subaru/Suprime-Cam, and Hubble Space Telescope imaging, and SOuthern Astrophysical Research (SOAR)/Goodman spectroscopy. The first object discovered, M59-UCD3, has a similar size to M60-UCD1 (half-light radius of r h ∼ 20 pc) but is 40% more luminous (M V ∼ −14.6), making it the new densest-known galaxy. The second, M85-HCC1, has a size like a typical globular cluster (GC; r h ∼ 1.8 pc) but is much more luminous (M V ∼ −12.5). This hypercompact cluster is by far the densest confirmed free-floating stellar system, and is equivalent to the densest known nuclear star clusters. From spectroscopy, we find that both objects are relatively young (∼9 and ∼3 Gyr, respectively), with metal-abundances that resemble those of galaxy centers. Their host galaxies show clear signs of large-scale disturbances, and we conclude that these dense objects are the remnant nuclei of recently accreted galaxies. M59-UCD3 is an ideal target for follow-up with high-resolution imaging and spectroscopy to search for an overweight central supermassive black hole as was discovered in M60-UCD1. These findings also emphasize the potential value of ultra-compact dwarfs and massive GCs as tracers of the assembly histories of galaxies

  9. HIDING IN PLAIN SIGHT: RECORD-BREAKING COMPACT STELLAR SYSTEMS IN THE SLOAN DIGITAL SKY SURVEY

    Energy Technology Data Exchange (ETDEWEB)

    Sandoval, Michael A.; Vo, Richard P.; Romanowsky, Aaron J. [Department of Physics and Astronomy, San José State University, One Washington Square, San Jose, CA 95192 (United States); Strader, Jay [Department of Physics and Astronomy, Michigan State University, East Lansing, MI 48824 (United States); Choi, Jieun; Conroy, Charlie [Harvard–Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States); Jennings, Zachary G.; Villaume, Alexa [Department of Astronomy and Astrophysics, University of California, Santa Cruz, CA 95064 (United States); Brodie, Jean P. [University of California Observatories, 1156 High Street, Santa Cruz, CA 95064 (United States); Foster, Caroline [Australian Astronomical Observatory, P.O. Box 915, North Ryde, NSW 1670 (Australia); Norris, Mark A. [Max Planck Institut für Astronomie, Königstuhl 17, D-69117, Heidelberg (Germany); Janz, Joachim; Forbes, Duncan A. [Centre for Astrophysics and Supercomputing, Swinburne University, Hawthorn, VIC 3122 (Australia)

    2015-07-20

    Motivated by the recent, serendipitous discovery of the densest known galaxy, M60-UCD1, we present two initial findings from a follow-up search, using the Sloan Digital Sky Survey, Subaru/Suprime-Cam, and Hubble Space Telescope imaging, and SOuthern Astrophysical Research (SOAR)/Goodman spectroscopy. The first object discovered, M59-UCD3, has a similar size to M60-UCD1 (half-light radius of r{sub h} ∼ 20 pc) but is 40% more luminous (M{sub V} ∼ −14.6), making it the new densest-known galaxy. The second, M85-HCC1, has a size like a typical globular cluster (GC; r{sub h} ∼ 1.8 pc) but is much more luminous (M{sub V} ∼ −12.5). This hypercompact cluster is by far the densest confirmed free-floating stellar system, and is equivalent to the densest known nuclear star clusters. From spectroscopy, we find that both objects are relatively young (∼9 and ∼3 Gyr, respectively), with metal-abundances that resemble those of galaxy centers. Their host galaxies show clear signs of large-scale disturbances, and we conclude that these dense objects are the remnant nuclei of recently accreted galaxies. M59-UCD3 is an ideal target for follow-up with high-resolution imaging and spectroscopy to search for an overweight central supermassive black hole as was discovered in M60-UCD1. These findings also emphasize the potential value of ultra-compact dwarfs and massive GCs as tracers of the assembly histories of galaxies.

  10. Emperors in hiding: when ice-breakers and satellites complement each other in Antarctic exploration.

    Directory of Open Access Journals (Sweden)

    André Ancel

    Full Text Available Evaluating the demographic trends of marine top predators is critical to understanding the processes involved in the ongoing rapid changes in Antarctic ecosystems. However, the remoteness and logistical complexity of operating in Antarctica, especially during winter, make such an assessment difficult. Satellite imaging is increasingly recognised as a valuable method for remote animal population monitoring, yet its accuracy and reliability are still to be fully evaluated. We report here the first ground visit of an emperor penguin colony first discovered by satellite, but also the discovery of a second one not indicated by satellite survey at that time. Several successive remote surveys in this coastal region of East Antarctica, both before and after sudden local changes, had indeed only identified one colony. These two colonies (with a total of ca. 7,400 breeding pairs are located near the Mertz Glacier in an area that underwent tremendous habitat change after the glacier tongue broke off in February 2010. Our findings therefore suggest that a satellite survey, although offering a major advance since it allows a global imaging of emperor penguin colonies, may miss certain colony locations when challenged by certain features of polar ecosystems, such as snow cover, evolving ice topology, and rapidly changing habitat. Moreover our survey shows that this large seabird has considerable potential for rapid adaptation to sudden habitat loss, as the colony detected in 2009 may have moved and settled on new breeding grounds. Overall, the ability of emperor penguin colonies to relocate following habitat modification underlines the continued need for a mix of remote sensing and field surveys (aerial photography and ground counts, especially in the less-frequented parts of Antarctica, to gain reliable knowledge about the population demography and dynamics of this flagship species of the Antarctic ecosystem.

  11. Emperors in hiding: when ice-breakers and satellites complement each other in Antarctic exploration.

    Science.gov (United States)

    Ancel, André; Cristofari, Robin; Fretwell, Peter T; Trathan, Phil N; Wienecke, Barbara; Boureau, Matthieu; Morinay, Jennifer; Blanc, Stéphane; Le Maho, Yvon; Le Bohec, Céline

    2014-01-01

    Evaluating the demographic trends of marine top predators is critical to understanding the processes involved in the ongoing rapid changes in Antarctic ecosystems. However, the remoteness and logistical complexity of operating in Antarctica, especially during winter, make such an assessment difficult. Satellite imaging is increasingly recognised as a valuable method for remote animal population monitoring, yet its accuracy and reliability are still to be fully evaluated. We report here the first ground visit of an emperor penguin colony first discovered by satellite, but also the discovery of a second one not indicated by satellite survey at that time. Several successive remote surveys in this coastal region of East Antarctica, both before and after sudden local changes, had indeed only identified one colony. These two colonies (with a total of ca. 7,400 breeding pairs) are located near the Mertz Glacier in an area that underwent tremendous habitat change after the glacier tongue broke off in February 2010. Our findings therefore suggest that a satellite survey, although offering a major advance since it allows a global imaging of emperor penguin colonies, may miss certain colony locations when challenged by certain features of polar ecosystems, such as snow cover, evolving ice topology, and rapidly changing habitat. Moreover our survey shows that this large seabird has considerable potential for rapid adaptation to sudden habitat loss, as the colony detected in 2009 may have moved and settled on new breeding grounds. Overall, the ability of emperor penguin colonies to relocate following habitat modification underlines the continued need for a mix of remote sensing and field surveys (aerial photography and ground counts), especially in the less-frequented parts of Antarctica, to gain reliable knowledge about the population demography and dynamics of this flagship species of the Antarctic ecosystem.

  12. Metabolic modeling of energy balances in Mycoplasma hyopneumoniae shows that pyruvate addition increases growth rate

    NARCIS (Netherlands)

    Kamminga, Tjerko; Slagman, Simen Jan; Bijlsma, Jetta J.E.; Martins dos Santos, Vitor A.P.; Suarez-Diez, Maria; Schaap, Peter J.

    2017-01-01

    Mycoplasma hyopneumoniae is cultured on large-scale to produce antigen for inactivated whole-cell vaccines against respiratory disease in pigs. However, the fastidious nutrient requirements of this minimal bacterium and the low growth rate make it challenging to reach sufficient biomass yield for

  13. Phytotherapeutics oridonin and ponicidin show additive effects combined with irradiation in pancreatic cancer in vitro

    Directory of Open Access Journals (Sweden)

    Liermann Jakob

    2017-11-01

    Full Text Available Chemoradiation of locally advanced non-metastatic pancreatic cancer can lead to secondary operability by tumor mass reduction. Here, we analyzed radiomodulating effects of oridonin and ponicidin in pancreatic cancer in vitro. Both agents are ent-kaurane diterpenoids, extracted from Isodon rubescens, a plant that is well known in Traditional Chinese Medicine. Cytotoxic effects have recently been shown in different tumor entities for both agents.

  14. Genetic diversity and antimicrobial resistance among isolates of Escherichia coli O157: H7 from feces and hides of super-shedders and low-shedding pen-mates in two commercial beef feedlots

    Directory of Open Access Journals (Sweden)

    Stanford Kim

    2012-09-01

    Full Text Available Abstract Background Cattle shedding at least 104 CFU Escherichia coli O157:H7/g feces are described as super-shedders and have been shown to increase transmission of E. coli O157:H7 to other cattle in feedlots. This study investigated relationships among fecal isolates from super-shedders (n = 162, perineal hide swab isolates (PS from super-shedders (n = 137 and fecal isolates from low-shedder (4 CFU/g feces pen-mates (n = 496 using pulsed-field gel electrophoresis (PFGE. A subsample of these fecal isolates (n = 474 was tested for antimicrobial resistance. Isolates of E. coli O157:H7 were obtained from cattle in pens (avg. 181 head at 2 commercial feedlots in southern Alberta with each steer sampled at entry to the feedlot and prior to slaughter. Results Only 1 steer maintained super-shedder status at both samplings, although approximately 30% of super-shedders in sampling 1 had low-shedder status at sampling 2. A total of 85 restriction endonuclease digestion clusters (REPC; 90% or greater similarity and 86 unique isolates (P = 0.94. Only 2/21 super-shedders had fecal isolates in the same REPC at both samplings. Fecal and PS isolates from individual super-shedders generally belonged to different REPCs, although fecal isolates of E. coli O157:H7 from super- and low-shedders showed greater similarity (P P = 0.69, although all super-shedder isolates with antimicrobial resistance (n = 3 were resistant to multiple antimicrobials. Conclusions Super-shedders did not have increased antimicrobial resistance compared to low-shedder pen mates. Our data demonstrated that PFGE profiles of individual super-shedders varied over time and that only 1/162 steers remained a super-shedder at 2 samplings. In these two commercial feedlots, PFGE subtypes of E. coli O157:H7 from fecal isolates of super- and low-shedders were frequently different as were subtypes of fecal and perineal hide isolates from super-shedders.

  15. Nothing to Hide

    DEFF Research Database (Denmark)

    Raun, Tobias; Keegan, Cael

    2018-01-01

    of sexualized consumption. We argue that in order to understand the gendered and sexual complexities of this image, it is necessary to contextualize it within Dowling’s comprehensive selfie-practice on YouTube and Instagram. Although this image is not a selfie per se, it is almost impossible to separate from...

  16. Additive Manufacturing Infrared Inspection

    Science.gov (United States)

    Gaddy, Darrell; Nettles, Mindy

    2015-01-01

    The Additive Manufacturing Infrared Inspection Task started the development of a real-time dimensional inspection technique and digital quality record for the additive manufacturing process using infrared camera imaging and processing techniques. This project will benefit additive manufacturing by providing real-time inspection of internal geometry that is not currently possible and reduce the time and cost of additive manufactured parts with automated real-time dimensional inspections which deletes post-production inspections.

  17. [Food additives and healthiness].

    Science.gov (United States)

    Heinonen, Marina

    2014-01-01

    Additives are used for improving food structure or preventing its spoilage, for example. Many substances used as additives are also naturally present in food. The safety of additives is evaluated according to commonly agreed principles. If high concentrations of an additive cause adverse health effects for humans, a limit of acceptable daily intake (ADI) is set for it. An additive is a risk only when ADI is exceeded. The healthiness of food is measured on the basis of nutrient density and scientifically proven effects.

  18. Ancient bacteria show evidence of DNA repair

    DEFF Research Database (Denmark)

    Johnson, Sarah Stewart; Hebsgaard, Martin B; Christensen, Torben R

    2007-01-01

    -term survival of bacteria sealed in frozen conditions for up to one million years. Our results show evidence of bacterial survival in samples up to half a million years in age, making this the oldest independently authenticated DNA to date obtained from viable cells. Additionally, we find strong evidence...... geological timescales. There has been no direct evidence in ancient microbes for the most likely mechanism, active DNA repair, or for the metabolic activity necessary to sustain it. In this paper, we couple PCR and enzymatic treatment of DNA with direct respiration measurements to investigate long...... that this long-term survival is closely tied to cellular metabolic activity and DNA repair that over time proves to be superior to dormancy as a mechanism in sustaining bacteria viability....

  19. Validation of a hot water rinse and lactic acid spray in combination with scaling for treating hide-on carcasses to control biotype I strains of Escherichia coli used as surrogates for Shiga toxin-producing E. coli

    Science.gov (United States)

    Scalding of hide-on bob veal carcasses with or without standard scalding chemical agents typically used for hogs, followed by an 82.2degreeC hot water wash and lactic acid spray (applied at ambient temperature) prior to chilling, was evaluated to determine its effectiveness in reducing the levels of...

  20. Optical image-hiding method with false information disclosure based on the interference principle and partial-phase-truncation in the fractional Fourier domain

    International Nuclear Information System (INIS)

    Dai, Chaoqing; Wang, Xiaogang; Zhou, Guoquan; Chen, Junlang

    2014-01-01

    An image-hiding method based on the optical interference principle and partial-phase-truncation in the fractional Fourier domain is proposed. The primary image is converted into three phase-only masks (POMs) using an analytical algorithm involved partial-phase-truncation and a fast random pixel exchange process. A procedure of a fake silhouette for a decryption key is suggested to reinforce the encryption and give a hint of the position of the key. The fractional orders of FrFT effectively enhance the security of the system. In the decryption process, the POM with false information and the other two POMs are, respectively, placed in the input and fractional Fourier planes to recover the primary image. There are no unintended information disclosures and iterative computations involved in the proposed method. Simulation results are presented to verify the validity of the proposed approach. (letters)

  1. Hiding the tobacco power wall reduces cigarette smoking risk in adolescents: using an experimental convenience store to assess tobacco regulatory options at retail point-of-sale.

    Science.gov (United States)

    Shadel, William G; Martino, Steven C; Setodji, Claude M; Scharf, Deborah M; Kusuke, Daniela; Sicker, Angela; Gong, Min

    2015-11-23

    This experiment tested whether changing the location or visibility of the tobacco power wall in a life sized replica of a convenience store had any effect on adolescents' susceptibility to future cigarette smoking. The study was conducted in the RAND StoreLab (RSL), a life sized replica of a convenience store that was developed to experimentally evaluate how changing aspects of tobacco advertising displays in retail point-of-sale environments influences tobacco use risk and behaviour. A randomised, between-subjects experimental design with three conditions that varied the location or visibility of the tobacco power wall within the RSL was used. The conditions were: cashier (the tobacco power wall was located in its typical position behind the cash register counter); sidewall (the tobacco power wall was located on a sidewall away from the cash register); or hidden (the tobacco power wall was located behind the cashier but was hidden behind an opaque wall). The sample included 241 adolescents. Hiding the tobacco power wall significantly reduced adolescents' susceptibility to future cigarette smoking compared to leaving it exposed (ie, the cashier condition; p=0.02). Locating the tobacco power wall on a sidewall away from the cashier had no effect on future cigarette smoking susceptibility compared to the cashier condition (p=0.80). Hiding the tobacco power wall at retail point-of-sale locations is a strong regulatory option for reducing the impact of the retail environment on cigarette smoking risk in adolescents. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  2. Additives in yoghurt production

    Directory of Open Access Journals (Sweden)

    Milna Tudor

    2008-02-01

    Full Text Available In yoghurt production, mainly because of sensory characteristics, different types of additives are used. Each group, and also each substance from the same group has different characteristics and properties. For that reason, for improvement of yoghurt sensory characteristics apart from addition selection, the quantity of the additive is very important. The same substance added in optimal amount improves yoghurt sensory attributes, but too small or too big addition can reduce yoghurt sensory attributes. In this paper, characteristics and properties of mostly used additives in yoghurt production are described; skimmed milk powder, whey powder, concentrated whey powder, sugars and artificial sweeteners, fruits, stabilizers, casein powder, inulin and vitamins. Also the impact of each additive on sensory and physical properties of yoghurt, syneresis and viscosity, are described, depending on used amount added in yoghurt production.

  3. Polylactides in additive biomanufacturing.

    Science.gov (United States)

    Poh, Patrina S P; Chhaya, Mohit P; Wunner, Felix M; De-Juan-Pardo, Elena M; Schilling, Arndt F; Schantz, Jan-Thorsten; van Griensven, Martijn; Hutmacher, Dietmar W

    2016-12-15

    New advanced manufacturing technologies under the alias of additive biomanufacturing allow the design and fabrication of a range of products from pre-operative models, cutting guides and medical devices to scaffolds. The process of printing in 3 dimensions of cells, extracellular matrix (ECM) and biomaterials (bioinks, powders, etc.) to generate in vitro and/or in vivo tissue analogue structures has been termed bioprinting. To further advance in additive biomanufacturing, there are many aspects that we can learn from the wider additive manufacturing (AM) industry, which have progressed tremendously since its introduction into the manufacturing sector. First, this review gives an overview of additive manufacturing and both industry and academia efforts in addressing specific challenges in the AM technologies to drive toward AM-enabled industrial revolution. After which, considerations of poly(lactides) as a biomaterial in additive biomanufacturing are discussed. Challenges in wider additive biomanufacturing field are discussed in terms of (a) biomaterials; (b) computer-aided design, engineering and manufacturing; (c) AM and additive biomanufacturing printers hardware; and (d) system integration. Finally, the outlook for additive biomanufacturing was discussed. Copyright © 2016 Elsevier B.V. All rights reserved.

  4. Additive and polynomial representations

    CERN Document Server

    Krantz, David H; Suppes, Patrick

    1971-01-01

    Additive and Polynomial Representations deals with major representation theorems in which the qualitative structure is reflected as some polynomial function of one or more numerical functions defined on the basic entities. Examples are additive expressions of a single measure (such as the probability of disjoint events being the sum of their probabilities), and additive expressions of two measures (such as the logarithm of momentum being the sum of log mass and log velocity terms). The book describes the three basic procedures of fundamental measurement as the mathematical pivot, as the utiliz

  5. Food Additives and Hyperkinesis

    Science.gov (United States)

    Wender, Ester H.

    1977-01-01

    The hypothesis that food additives are causally associated with hyperkinesis and learning disabilities in children is reviewed, and available data are summarized. Available from: American Medical Association 535 North Dearborn Street Chicago, Illinois 60610. (JG)

  6. Groups – Additive Notation

    Directory of Open Access Journals (Sweden)

    Coghetto Roland

    2015-06-01

    Full Text Available We translate the articles covering group theory already available in the Mizar Mathematical Library from multiplicative into additive notation. We adapt the works of Wojciech A. Trybulec [41, 42, 43] and Artur Korniłowicz [25].

  7. Groups – Additive Notation

    OpenAIRE

    Coghetto Roland

    2015-01-01

    We translate the articles covering group theory already available in the Mizar Mathematical Library from multiplicative into additive notation. We adapt the works of Wojciech A. Trybulec [41, 42, 43] and Artur Korniłowicz [25].

  8. Human Commercial Models' Eye Colour Shows Negative Frequency-Dependent Selection.

    Directory of Open Access Journals (Sweden)

    Isabela Rodrigues Nogueira Forti

    Full Text Available In this study we investigated the eye colour of human commercial models registered in the UK (400 female and 400 male and Brazil (400 female and 400 male to test the hypothesis that model eye colour frequency was the result of negative frequency-dependent selection. The eye colours of the models were classified as: blue, brown or intermediate. Chi-square analyses of data for countries separated by sex showed that in the United Kingdom brown eyes and intermediate colours were significantly more frequent than expected in comparison to the general United Kingdom population (P<0.001. In Brazil, the most frequent eye colour brown was significantly less frequent than expected in comparison to the general Brazilian population. These results support the hypothesis that model eye colour is the result of negative frequency-dependent selection. This could be the result of people using eye colour as a marker of genetic diversity and finding rarer eye colours more attractive because of the potential advantage more genetically diverse offspring that could result from such a choice. Eye colour may be important because in comparison to many other physical traits (e.g., hair colour it is hard to modify, hide or disguise, and it is highly polymorphic.

  9. Food additives: an ethical evaluation.

    Science.gov (United States)

    Mepham, Ben

    2011-01-01

    Food additives are an integral part of the modern food system, but opinion polls showing most Europeans have worries about them imply an urgent need for ethical analysis of their use. The existing literature on food ethics, safety assessment and animal testing. Food additives provide certain advantages in terms of many people's lifestyles. There are disagreements about the appropriate application of the precautionary principle and of the value and ethical validity of animal tests in assessing human safety. Most consumers have a poor understanding of the relative benefits and risks of additives, but concerns over food safety and animal testing remain high. Examining the impacts of food additives on consumer sovereignty, consumer health and on animals used in safety testing should allow a more informed debate about their appropriate uses.

  10. Show Horse Welfare: Horse Show Competitors' Understanding, Awareness, and Perceptions of Equine Welfare.

    Science.gov (United States)

    Voigt, Melissa A; Hiney, Kristina; Richardson, Jennifer C; Waite, Karen; Borron, Abigail; Brady, Colleen M

    2016-01-01

    The purpose of this study was to gain a better understanding of stock-type horse show competitors' understanding of welfare and level of concern for stock-type show horses' welfare. Data were collected through an online questionnaire that included questions relating to (a) interest and general understanding of horse welfare, (b) welfare concerns of the horse show industry and specifically the stock-type horse show industry, (c) decision-making influences, and (d) level of empathic characteristics. The majority of respondents indicated they agree or strongly agree that physical metrics should be a factor when assessing horse welfare, while fewer agreed that behavioral and mental metrics should be a factor. Respondent empathy levels were moderate to high and were positively correlated with the belief that mental and behavioral metrics should be a factor in assessing horse welfare. Respondents indicated the inhumane practices that most often occur at stock-type shows include excessive jerking on reins, excessive spurring, and induced excessive unnatural movement. Additionally, respondents indicated association rules, hired trainers, and hired riding instructors are the most influential regarding the decisions they make related to their horses' care and treatment.

  11. Alternative additives; Alternative additiver

    Energy Technology Data Exchange (ETDEWEB)

    2007-08-15

    In this project a number of industrial and agricultural waste products have been characterised and evaluated in terms of alkali-getter performance. The intended use is for biomass-fired power stations aiming at reducing corrosion or slagging related problems. The following products have been obtained, characterised and evaluated: 1) Brewery draff 2) Danish de-gassed manure 3) Paper sludge 4) Moulding sand 5) Spent bleaching earth 6) Anorthosite 7) Sand 8) Clay-sludge. Most of the above alternative additive candidates are deemed unsuitable due to insufficient chemical effect and/or expensive requirements for pre-treatment (such as drying and transportation). 3 products were selected for full-scale testing: de-gassed manure, spent bleaching earth and clay slugde. The full scale tests were undertaken at the biomass-fired power stations in Koege, Slagelse and Ensted. Spent bleaching earth (SBE) and clay sludge were the only tested additive candidates that had a proven ability to react with KCl, to thereby reduce Cl-concentrations in deposits, and reduce the deposit flux to superheater tubes. Their performance was shown to nearly as good as commercial additives. De-gassed manure, however, did not evaluate positively due to inhibiting effects of Ca in the manure. Furthermore, de-gassed manure has a high concentration of heavy metals, which imposes a financial burden with regard to proper disposal of the ash by-products. Clay-sludge is a wet clay slurring, and drying and transportation of this product entails substantial costs. Spent bleaching does not require much pre-treatment and is therefore the most promising alternative additive. On the other hand, bleaching earth contains residual plant oil which means that a range of legislation relating to waste combustion comes into play. Not least a waste combustion fee of 330 DKK/tonne. For all alternative (and commercial) additives disposal costs of the increase ash by-products represents a significant cost. This is

  12. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  13. Playing Hide and Seek: How Glycosylation of the Influenza Virus Hemagglutinin Can Modulate the Immune Response to Infection

    Directory of Open Access Journals (Sweden)

    Michelle D. Tate

    2014-03-01

    Full Text Available Seasonal influenza A viruses (IAV originate from pandemic IAV and have undergone changes in antigenic structure, including addition of glycans to the hemagglutinin (HA glycoprotein. The viral HA is the major target recognized by neutralizing antibodies and glycans have been proposed to shield antigenic sites on HA, thereby promoting virus survival in the face of widespread vaccination and/or infection. However, addition of glycans can also interfere with the receptor binding properties of HA and this must be compensated for by additional mutations, creating a fitness barrier to accumulation of glycosylation sites. In addition, glycans on HA are also recognized by phylogenetically ancient lectins of the innate immune system and the benefit provided by evasion of humoral immunity is balanced by attenuation of infection. Therefore, a fine balance must exist regarding the optimal pattern of HA glycosylation to offset competing pressures associated with recognition by innate defenses, evasion of humoral immunity and maintenance of virus fitness. In this review, we examine HA glycosylation patterns of IAV associated with pandemic and seasonal influenza and discuss recent advancements in our understanding of interactions between IAV glycans and components of innate and adaptive immunity.

  14. Playing Hide and Seek: How Glycosylation of the Influenza Virus Hemagglutinin Can Modulate the Immune Response to Infection

    Science.gov (United States)

    Tate, Michelle D.; Job, Emma R.; Deng, Yi-Mo; Gunalan, Vithiagaran; Maurer-Stroh, Sebastian; Reading, Patrick C.

    2014-01-01

    Seasonal influenza A viruses (IAV) originate from pandemic IAV and have undergone changes in antigenic structure, including addition of glycans to the hemagglutinin (HA) glycoprotein. The viral HA is the major target recognized by neutralizing antibodies and glycans have been proposed to shield antigenic sites on HA, thereby promoting virus survival in the face of widespread vaccination and/or infection. However, addition of glycans can also interfere with the receptor binding properties of HA and this must be compensated for by additional mutations, creating a fitness barrier to accumulation of glycosylation sites. In addition, glycans on HA are also recognized by phylogenetically ancient lectins of the innate immune system and the benefit provided by evasion of humoral immunity is balanced by attenuation of infection. Therefore, a fine balance must exist regarding the optimal pattern of HA glycosylation to offset competing pressures associated with recognition by innate defenses, evasion of humoral immunity and maintenance of virus fitness. In this review, we examine HA glycosylation patterns of IAV associated with pandemic and seasonal influenza and discuss recent advancements in our understanding of interactions between IAV glycans and components of innate and adaptive immunity. PMID:24638204

  15. Antimicrobial potential of sophorolipids for anti-acne, anti-dental caries, hide preservation and food safety applications

    Science.gov (United States)

    Sophorolipids (SLs) are microbial glycolipids that can be produced via fermentation in relatively large yields (reportedly as high as 400 g/L under appropriate growth conditions). These versatile molecules have demonstrated usefulness as additives in detergent, cleaner, cosmetic, and stabilizer appl...

  16. Additive manufacturing of metals

    International Nuclear Information System (INIS)

    Herzog, Dirk; Seyda, Vanessa; Wycisk, Eric; Emmelmann, Claus

    2016-01-01

    Additive Manufacturing (AM), the layer-by layer build-up of parts, has lately become an option for serial production. Today, several metallic materials including the important engineering materials steel, aluminium and titanium may be processed to full dense parts with outstanding properties. In this context, the present overview article describes the complex relationship between AM processes, microstructure and resulting properties for metals. It explains the fundamentals of Laser Beam Melting, Electron Beam Melting and Laser Metal Deposition, and introduces the commercially available materials for the different processes. Thereafter, typical microstructures for additively manufactured steel, aluminium and titanium are presented. Special attention is paid to AM specific grain structures, resulting from the complex thermal cycle and high cooling rates. The properties evolving as a consequence of the microstructure are elaborated under static and dynamic loading. According to these properties, typical applications are presented for the materials and methods for conclusion.

  17. Additive manufactured serialization

    Science.gov (United States)

    Bobbitt, III, John T.

    2017-04-18

    Methods for forming an identifying mark in a structure are described. The method is used in conjunction with an additive manufacturing method and includes the alteration of a process parameter during the manufacturing process. The method can form in a unique identifying mark within or on the surface of a structure that is virtually impossible to be replicated. Methods can provide a high level of confidence that the identifying mark will remain unaltered on the formed structure.

  18. Development of methods for the neutron activation analysis to the determination of essential and toxic trace elements of biological and environmental samples: application of enzyme activity of raw hides

    International Nuclear Information System (INIS)

    Sipos, T.; Nagy, L.G.; Toeroek, G.; Kollar, J.

    1974-01-01

    Investigations on the post mortem enzymatic processes pointed out the fact, that significant deviations can be observed in the extent and in the results of the autolytic transformations occurring during the storage of raw hide. A neutron activation analysis procedure, based on a semiautomated radiochemical separation procedure and scintillation gamma spectrometry, was selected for the determination of some trace elements. Six trace elements, Cu, Mn, Zn, Au, As, and Cr, and one minor component,Br, were detected and/or determined in the concentration region of 0,1-10 3 ppM. According to preliminary investigations evaluated at the time being, concentration differences of some orders of magnitude were obtained for some trace elements: copper, zinc and manganese, whereas the concentration of bromine remained practically constant. These findings seem to correlate with large differences in appearance due to different enzyme activities in the raw hides

  19. Additive conjoint measurement for multiattribute utility

    NARCIS (Netherlands)

    Maas, A.; Wakker, P.P.

    1994-01-01

    This paper shows that multiattribute utility can be simplified by methods from additive conjoint measurement. Given additive conjoint measurability under certainty, axiomatizations can be simplified, and implementation and reliability of elicitation can be improved. This also contributes to the

  20. Rapid Determination of Amino Acids in Beer, Red Wine, and Donkey-Hide Gelatin by Gradient Elution of HPLC: From Micellar Liquid Chromatography to High Submicellar Liquid Chromatography.

    Science.gov (United States)

    Xie, Yunfei; Luo, Tian; Yang, Jing; Dong, Yuming

    2018-01-01

    Amino acids (AAs) in beer, red wine, and donkey-hide gelatin were rapidly determined by gradient LC elution from micellar LC to high submicellar LC. Mobile phase A was a 0.075 M sodium dodecyl sulfate solution containing 20 mM ammonium acetate with a pH value adjusted to 3.5 with acetic acid solution, and mobile phase B was acetonitrile. Optimized chromatographic conditions were as follows: mobile phase B increased from 25 to 60% (v/v) in 30 min and the use of a Venusil XBP C18 column (5 µm, 250 × 4.6 mm) as the stationary phase, with a column temperature of 35°C, flow rate of 1.2 mL/min, and detection wavelength of 266 nm. The results indicated good linearity (r2 ≥ 0.9924). The intraday precision of the retention time was RSD ≤ 1.1%, whereas interday was RSD ≤ 3.2%; intraday precision of the peak area was RSD ≤ 3.3%, whereas interday was RSD ≤ 4.9%. The range of recovery was 94.6-102.4%. The RSDs of the retention time for the AAs for the different samples were 0.04-0.31%.

  1. Effects of Ultrasound Assisted Extraction in Conjugation with Aid of Actinidin on the Molecular and Physicochemical Properties of Bovine Hide Gelatin

    Directory of Open Access Journals (Sweden)

    Tanbir Ahmad

    2018-03-01

    Full Text Available Actinidin was used to pretreat the bovine hide and ultrasonic wave (53 kHz and 500 W was used for the time durations of 2, 4 and 6 h at 60 °C to extract gelatin samples (UA2, UA4 and UA6, respectively. Control (UAC gelatin was extracted using ultrasound for 6 h at 60 °C without enzyme pretreatment. There was significant (p < 0.05 increase in gelatin yield as the time duration of ultrasound treatment increased with UA6 giving the highest yield of 19.65%. Gel strength and viscosity of UAC and UA6 extracted gelatin samples were 627.53 and 502.16 g and 16.33 and 15.60 mPa.s, respectively. Longer duration of ultrasound treatment increased amino acids content of the extracted gelatin and UAC exhibited the highest content of amino acids. Progressive degradation of polypeptide chains was observed in the protein pattern of the extracted gelatin as the time duration of ultrasound extraction increased. Fourier transform infrared (FTIR spectroscopy depicted loss of molecular order and degradation in UA6. Scanning electron microscopy (SEM revealed protein aggregation and network formation in the gelatin samples with increasing time of ultrasound treatment. The study indicated that ultrasound assisted gelatin extraction using actinidin exhibited high yield with good quality gelatin.

  2. Additive manufacturing of tunable lenses

    Science.gov (United States)

    Schlichting, Katja; Novak, Tobias; Heinrich, Andreas

    2017-02-01

    Individual additive manufacturing of optical systems based on 3D Printing offers varied possibilities in design and usage. In addition to the additive manufacturing procedure, the usage of tunable lenses allows further advantages for intelligent optical systems. Our goal is to bring the advantages of additive manufacturing together with the huge potential of tunable lenses. We produced tunable lenses as a bundle without any further processing steps, like polishing. The lenses were designed and directly printed with a 3D Printer as a package. The design contains the membrane as an optical part as well as the mechanical parts of the lens, like the attachments for the sleeves which contain the oil. The dynamic optical lenses were filled with an oil. The focal length of the lenses changes due to a change of the radius of curvature. This change is caused by changing the pressure in the inside of the lens. In addition to that, we designed lenses with special structures to obtain different areas with an individual optical power. We want to discuss the huge potential of this technology for several applications. Further, an appropriate controlling system is needed. Wéll show the possibilities to control and regulate the optical power of the lenses. The lenses could be used for illumination tasks, and in the future, for individual measurement tasks. The main advantage is the individuality and the possibility to create an individual design which completely fulfills the requirements for any specific application.

  3. BWR zinc addition Sourcebook

    International Nuclear Information System (INIS)

    Garcia, Susan E.; Giannelli, Joseph F.; Jarvis, Alfred J.

    2014-01-01

    Boiling Water Reactors (BWRs) have been injecting zinc into the primary coolant via the reactor feedwater system for over 25 years for the purpose of controlling primary system radiation fields. The BWR zinc injection process has evolved since the initial application at the Hope Creek Nuclear Station in 1986. Key transitions were from the original natural zinc oxide (NZO) to depleted zinc oxide (DZO), and from active zinc injection of a powdered zinc oxide slurry (pumped systems) to passive injection systems (zinc pellet beds). Zinc addition has continued through various chemistry regimes changes, from normal water chemistry (NWC) to hydrogen water chemistry (HWC) and HWC with noble metals (NobleChem™) for mitigation of intergranular stress corrosion cracking (IGSCC) of reactor internals and primary system piping. While past reports published by the Electric Power Research Institute (EPRI) document specific industry experience related to these topics, the Zinc Sourcebook was prepared to consolidate all of the experience gained over the past 25 years. The Zinc Sourcebook will benefit experienced BWR Chemistry, Operations, Radiation Protection and Engineering personnel as well as new people entering the nuclear power industry. While all North American BWRs implement feedwater zinc injection, a number of other BWRs do not inject zinc. This Sourcebook will also be a valuable resource to plants considering the benefits of zinc addition process implementation, and to gain insights on industry experience related to zinc process control and best practices. This paper presents some of the highlights from the Sourcebook. (author)

  4. Teardrop bladder: additional considerations

    International Nuclear Information System (INIS)

    Wechsler, R.J.; Brennan, R.E.

    1982-01-01

    Nine cases of teardrop bladder (TDB) seen at excretory urography are presented. In some of these patients, the iliopsoas muscles were at the upper limit of normal in size, and additional evaluation of the perivesical structures with computed tomography (CT) was necessary. CT demonstrated only hypertrophied muscles with or without perivesical fat. The psoas muscles and pelvic width were measured in 8 patients and compared with the measurements of a control group of males without TDB. Patients with TDB had large iliopsoas muscles and narrow pelves compared with the control group. The psoas muscle width/pelvic width ratio was significantly greater (p < 0.0005) in patients with TDB than in the control group, with values of 1.04 + 0.05 and 0.82 + 0.09, respectively. It is concluded that TDB is not an uncommon normal variant in black males. Both iliopsoas muscle hypertrophy and a narrow pelvis are factors that predispose a patient to TDB

  5. Sewage sludge additive

    Science.gov (United States)

    Kalvinskas, J. J.; Mueller, W. A.; Ingham, J. D. (Inventor)

    1980-01-01

    The additive is for a raw sewage treatment process of the type where settling tanks are used for the purpose of permitting the suspended matter in the raw sewage to be settled as well as to permit adsorption of the dissolved contaminants in the water of the sewage. The sludge, which settles down to the bottom of the settling tank is extracted, pyrolyzed and activated to form activated carbon and ash which is mixed with the sewage prior to its introduction into the settling tank. The sludge does not provide all of the activated carbon and ash required for adequate treatment of the raw sewage. It is necessary to add carbon to the process and instead of expensive commercial carbon, coal is used to provide the carbon supplement.

  6. The Hide-and-Seek of Grain Boundaries from Moiré Pattern Fringe of Two-Dimensional Graphene

    Science.gov (United States)

    Kim, Jung Hwa; Kim, Kwanpyo; Lee, Zonghoon

    2015-01-01

    Grain boundaries (GBs) commonly exist in crystalline materials and affect various properties of materials. The facile identification of GBs is one of the significant requirements for systematical study of polycrystalline materials including recently emerging two-dimensional materials. Previous observations of GBs have been performed by various tools including high resolution transmission electron microscopy. However, a method to easily identify GBs, especially in the case of low-angle GBs, has not yet been well established. In this paper, we choose graphene bilayers with a GB as a model system and investigate the effects of interlayer rotations to the identification of GBs. We provide a critical condition between adjacent moiré fringe spacings, which determines the possibility of GB recognition. In addition, for monolayer graphene with a grain boundary, we demonstrate that low-angle GBs can be distinguished easily by inducing moiré patterns deliberately with an artificial reference overlay. PMID:26216628

  7. Playing hide and seek with repeats in local and global de novo transcriptome assembly of short RNA-seq reads.

    Science.gov (United States)

    Lima, Leandro; Sinaimeri, Blerina; Sacomoto, Gustavo; Lopez-Maestre, Helene; Marchet, Camille; Miele, Vincent; Sagot, Marie-France; Lacroix, Vincent

    2017-01-01

    The main challenge in de novo genome assembly of DNA-seq data is certainly to deal with repeats that are longer than the reads. In de novo transcriptome assembly of RNA-seq reads, on the other hand, this problem has been underestimated so far. Even though we have fewer and shorter repeated sequences in transcriptomics, they do create ambiguities and confuse assemblers if not addressed properly. Most transcriptome assemblers of short reads are based on de Bruijn graphs (DBG) and have no clear and explicit model for repeats in RNA-seq data, relying instead on heuristics to deal with them. The results of this work are threefold. First, we introduce a formal model for representing high copy-number and low-divergence repeats in RNA-seq data and exploit its properties to infer a combinatorial characteristic of repeat-associated subgraphs. We show that the problem of identifying such subgraphs in a DBG is NP-complete. Second, we show that in the specific case of local assembly of alternative splicing (AS) events, we can implicitly avoid such subgraphs, and we present an efficient algorithm to enumerate AS events that are not included in repeats. Using simulated data, we show that this strategy is significantly more sensitive and precise than the previous version of KisSplice (Sacomoto et al. in WABI, pp 99-111, 1), Trinity (Grabherr et al. in Nat Biotechnol 29(7):644-652, 2), and Oases (Schulz et al. in Bioinformatics 28(8):1086-1092, 3), for the specific task of calling AS events. Third, we turn our focus to full-length transcriptome assembly, and we show that exploring the topology of DBGs can improve de novo transcriptome evaluation methods. Based on the observation that repeats create complicated regions in a DBG, and when assemblers try to traverse these regions, they can infer erroneous transcripts, we propose a measure to flag transcripts traversing such troublesome regions, thereby giving a confidence level for each transcript. The originality of our work when

  8. Additive lattice kirigami.

    Science.gov (United States)

    Castle, Toen; Sussman, Daniel M; Tanis, Michael; Kamien, Randall D

    2016-09-01

    Kirigami uses bending, folding, cutting, and pasting to create complex three-dimensional (3D) structures from a flat sheet. In the case of lattice kirigami, this cutting and rejoining introduces defects into an underlying 2D lattice in the form of points of nonzero Gaussian curvature. A set of simple rules was previously used to generate a wide variety of stepped structures; we now pare back these rules to their minimum. This allows us to describe a set of techniques that unify a wide variety of cut-and-paste actions under the rubric of lattice kirigami, including adding new material and rejoining material across arbitrary cuts in the sheet. We also explore the use of more complex lattices and the different structures that consequently arise. Regardless of the choice of lattice, creating complex structures may require multiple overlapping kirigami cuts, where subsequent cuts are not performed on a locally flat lattice. Our additive kirigami method describes such cuts, providing a simple methodology and a set of techniques to build a huge variety of complex 3D shapes.

  9. Additive Manufactured Superconducting Cavities

    Science.gov (United States)

    Holland, Eric; Rosen, Yaniv; Woolleet, Nathan; Materise, Nicholas; Voisin, Thomas; Wang, Morris; Mireles, Jorge; Carosi, Gianpaolo; Dubois, Jonathan

    Superconducting radio frequency cavities provide an ultra-low dissipative environment, which has enabled fundamental investigations in quantum mechanics, materials properties, and the search for new particles in and beyond the standard model. However, resonator designs are constrained by limitations in conventional machining techniques. For example, current through a seam is a limiting factor in performance for many waveguide cavities. Development of highly reproducible methods for metallic parts through additive manufacturing, referred to colloquially as 3D printing\\x9D, opens the possibility for novel cavity designs which cannot be implemented through conventional methods. We present preliminary investigations of superconducting cavities made through a selective laser melting process, which compacts a granular powder via a high-power laser according to a digitally defined geometry. Initial work suggests that assuming a loss model and numerically optimizing a geometry to minimize dissipation results in modest improvements in device performance. Furthermore, a subset of titanium alloys, particularly, a titanium, aluminum, vanadium alloy (Ti - 6Al - 4V) exhibits properties indicative of a high kinetic inductance material. This work is supported by LDRD 16-SI-004.

  10. Additive manufacturing in maxillofacial reconstruction

    Directory of Open Access Journals (Sweden)

    Dincă Luciana Laura

    2017-01-01

    Full Text Available In this paper the benefits of using additive manufacturing technologies in maxillofacial reconstruction are highlighted. Based on a real clinical case, the paper describes the manufacture of an implant prototype replacing the right zygomatic bone and a part of maxilla using additive manufacturing technologies. The face is the most expressive part of the human body that makes us unique. It was shown that the maxillofacial prostheses help to improve the psychological state of patients affected by, because low self esteem feeling appears commonly to this patients with the facial defects. The aim of this paper is to show how using additive manufacturing technologies methods within this research, the producing a surgical model will help surgeon to improve the pre-operative planning. For this we used additive manufacturing technologies such as Stereolitography to achieve the biomodel and FDM-fused deposition modelling to obtain a prototype model because these technologies make it possible to obtain prosthesis according to the physical and mechanical requirements of the region of implantation.

  11. Playing hide-and-seek with host macrophages through the use of mycobacterial cell envelope phthiocerol dimycocerosates and phenolic glycolipids

    Directory of Open Access Journals (Sweden)

    Ainhoa eARBUES

    2014-12-01

    Full Text Available Mycobacterial pathogens, including Mycobacterium tuberculosis, the etiological agent of tuberculosis (TB, have evolved a remarkable ability to evade the immune system in order to survive and to colonize the host. Among the most important evasion strategies is the capacity of these bacilli to parasitize host macrophages, since these are major effector cells against intracellular pathogens that can be used as long-term cellular reservoirs. Mycobacterial pathogens employ an array of virulence factors that manipulate macrophage function to survive and establish infection. Until recently, however, the role of mycobacterial cell envelope lipids as virulence factors in macrophage subversion has remained elusive. Here, we will address exclusively the proposed role for phthiocerol dimycocerosates (DIM in the modulation of the resident macrophage response and that of phenolic glycolipids (PGL in the regulation of the recruitment and phenotype of incoming macrophage precursors to the site of infection. We will provide a unique perspective of potential additional functions for these lipids, and highlight obstacles and opportunities to further understand their role in the pathogenesis of TB and other mycobacterial diseases.

  12. Do You Have Anything to Hide? Infidelity-Related Behaviors on Social Media Sites and Marital Satisfaction.

    Science.gov (United States)

    McDaniel, Brandon T; Drouin, Michelle; Cravens, Jaclyn D

    2017-01-01

    Social media provides one route to behaviors that may be potentially harmful to romantic relationships, such as communicating with alternative partners, which can sometimes create relationship conflict, breakups, or divorce. Limited empirical evidence exists concerning social media infidelity-related behaviors and marital relationships. This study examined whether married/cohabiting individuals are using social media sites to engage in online infidelity-related behaviors and to what extent this related to relationship satisfaction, ambivalence, and relational attachment characteristics as reported by 338 married/cohabiting individuals from 176 families. Only a small percentage of married/cohabiting couples reported engaging in social media infidelity-related behaviors; however, more engagement in infidelity-related behaviors on social media was significantly related to lower relationship satisfaction, higher relationship ambivalence, and greater attachment avoidance and anxiety in both women and men. Additionally, attachment anxiety and gender interacted with relationship satisfaction in predicting online infidelity-related behaviors when controlling for other variables. Implications are discussed.

  13. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  14. Lost but can't be neglected: Huge quantities of small microplastics hide in the South China Sea.

    Science.gov (United States)

    Cai, Minggang; He, Haixia; Liu, Mengyang; Li, Siwei; Tang, Guowen; Wang, Weimin; Huang, Peng; Wei, Ge; Lin, Yan; Chen, Bin; Hu, Jiahui; Cen, Zhengnan

    2018-08-15

    Large quantities of microplastics with small particle sizes were found in the South China Sea (SCS). The abundances of microplastics in seawater were 0.045±0.093and 2569±1770particles/m 3 according to the bongo net and pumping sampling methods, respectively. Smaller-size fractions (sizeseas with ocean currents. The distribution characteristics showed that it was mainly controlled by terrestrial input of the Pearl River. This study, as the first report from SCS on microplastics in water for its distribution and influence factors, provided impetus for further research on the transportation fate and the behavior of this emerging pollutant from coastal zone to the open oceans. Copyright © 2018 Elsevier B.V. All rights reserved.

  15. Educational Outreach: The Space Science Road Show

    Science.gov (United States)

    Cox, N. L. J.

    2002-01-01

    The poster presented will give an overview of a study towards a "Space Road Show". The topic of this show is space science. The target group is adolescents, aged 12 to 15, at Dutch high schools. The show and its accompanying experiments would be supported with suitable educational material. Science teachers at schools can decide for themselves if they want to use this material in advance, afterwards or not at all. The aims of this outreach effort are: to motivate students for space science and engineering, to help them understand the importance of (space) research, to give them a positive feeling about the possibilities offered by space and in the process give them useful knowledge on space basics. The show revolves around three main themes: applications, science and society. First the students will get some historical background on the importance of space/astronomy to civilization. Secondly they will learn more about novel uses of space. On the one hand they will learn of "Views on Earth" involving technologies like Remote Sensing (or Spying), Communication, Broadcasting, GPS and Telemedicine. On the other hand they will experience "Views on Space" illustrated by past, present and future space research missions, like the space exploration missions (Cassini/Huygens, Mars Express and Rosetta) and the astronomy missions (Soho and XMM). Meanwhile, the students will learn more about the technology of launchers and satellites needed to accomplish these space missions. Throughout the show and especially towards the end attention will be paid to the third theme "Why go to space"? Other reasons for people to get into space will be explored. An important question in this is the commercial (manned) exploration of space. Thus, the questions of benefit of space to society are integrated in the entire show. It raises some fundamental questions about the effects of space travel on our environment, poverty and other moral issues. The show attempts to connect scientific with

  16. 2008 LHC Open Days Physics: the show

    CERN Multimedia

    2008-01-01

    A host of events and activities await visitors to the LHC Open Days on 5 and 6 April. A highlight will be the physics shows funded by the European Physical Society (EPS), which are set to surprise and challenge children and adults alike! School children use their experience of riding a bicycle to understand how planets move around the sun (Copyright : Circus Naturally) Participating in the Circus Naturally show could leave a strange taste in your mouth! (Copyright : Circus Naturally) The Rino Foundation’s experiments with liquid nitrogen can be pretty exciting! (Copyright: The Rino Foundation)What does a bicycle have in common with the solar system? Have you ever tried to weigh air or visualise sound? Ever heard of a vacuum bazooka? If you want to discover the answers to these questions and more then come to the Physics Shows taking place at the CERN O...

  17. Online Italian fandoms of American TV shows

    Directory of Open Access Journals (Sweden)

    Eleonora Benecchi

    2015-06-01

    Full Text Available The Internet has changed media fandom in two main ways: it helps fans connect with each other despite physical distance, leading to the formation of international fan communities; and it helps fans connect with the creators of the TV show, deepening the relationship between TV producers and international fandoms. To assess whether Italian fan communities active online are indeed part of transnational online communities and whether the Internet has actually altered their relationship with the creators of the original text they are devoted to, qualitative analysis and narrative interviews of 26 Italian fans of American TV shows were conducted to explore the fan-producer relationship. Results indicated that the online Italian fans surveyed preferred to stay local, rather than using geography-leveling online tools. Further, the sampled Italian fans' relationships with the show runners were mediated or even absent.

  18. Duchenne muscular dystrophy models show their age

    OpenAIRE

    Chamberlain, Jeffrey S.

    2010-01-01

    The lack of appropriate animal models has hampered efforts to develop therapies for Duchenne muscular dystrophy (DMD). A new mouse model lacking both dystrophin and telomerase (Sacco et al., 2010) closely mimics the pathological progression of human DMD and shows that muscle stem cell activity is a key determinant of disease severity.

  19. Show Them You Really Want the Job

    Science.gov (United States)

    Perlmutter, David D.

    2012-01-01

    Showing that one really "wants" the job entails more than just really wanting the job. An interview is part Broadway casting call, part intellectual dating game, part personality test, and part, well, job interview. When there are 300 applicants for a position, many of them will "fit" the required (and even the preferred) skills listed in the job…

  20. A Talk Show from the Past.

    Science.gov (United States)

    Gallagher, Arlene F.

    1991-01-01

    Describes a two-day activity in which elementary students examine voting rights, the right to assemble, and women's suffrage. Explains the game, "Assemble, Reassemble," and a student-produced talk show with five students playing the roles of leaders of the women's suffrage movement. Profiles Elizabeth Cady Stanton, Lucretia Mott, Susan…

  1. Laser entertainment and light shows in education

    Science.gov (United States)

    Sabaratnam, Andrew T.; Symons, Charles

    2002-05-01

    Laser shows and beam effects have been a source of entertainment since its first public performance May 9, 1969, at Mills College in Oakland, California. Since 1997, the Photonics Center, NgeeAnn Polytechnic, Singapore, has been using laser shows as a teaching tool. Students are able to exhibit their creative skills and learn at the same time how lasers are used in the entertainment industry. Students will acquire a number of skills including handling three- phase power supply, operation of cooling system, and laser alignment. Students also acquire an appreciation of the arts, learning about shapes and contours as they develop graphics for the shows. After holography, laser show animation provides a combination of the arts and technology. This paper aims to briefly describe how a krypton-argon laser, galvanometer scanners, a polychromatic acousto-optic modulator and related electronics are put together to develop a laser projector. The paper also describes how students are trained to make their own laser animation and beam effects with music, and at the same time have an appreciation of the operation of a Class IV laser and the handling of optical components.

  2. The Last Great American Picture Show

    NARCIS (Netherlands)

    Elsaesser, Thomas; King, Noel; Horwath, Alexander

    2004-01-01

    The Last Great American Picture Show brings together essays by scholars and writers who chart the changing evaluations of the American cinema of the 1970s, sometimes referred to as the decade of the lost generation, but now more and more recognized as the first New Hollywood, without which the

  3. Reality, ficción o show

    Directory of Open Access Journals (Sweden)

    Sandra Ruíz Moreno

    2002-01-01

    Full Text Available Para tener un punto de vista claro y objetivo frente a la polémica establecida en torno al programa “Protagonistas de novela” y la tendiente proliferación de los reality show en las parrillas de programación de la televisión colombiana, se realizó un análisis de texto y contenido de dicho programa, intentando definirlo desde sus posibilidades de realidad, ficción y show. Las unidades de análisis y el estudio de su tratamiento arrojaron un alto contenido que gira en torno a las emociones del ser humano relacionadas con la convivencia, tratadas a manera de show y con algunos aportes textuales de ficción, pero sin su elemento mediador básico, el actor, quitándole toda la posibilidad de tener un tratamiento con la profundidad, distancia y ética que requieren los temas de esta índole. El resultado es un formato que sólo busca altos índices de sintonía y que pertenece más a la denominada televisión “trash”, que a una búsqueda de realidad del hombre y mucho menos de sociedad.

  4. An evolutionary game theoretical model shows the limitations of the additive partitioning method for interpreting biodiversity experiments

    NARCIS (Netherlands)

    Vermeulen, Peter J.; Ruijven, van Jasper; Anten, Niels P.R.; Werf, van der Wopke; Satake, Akiko

    2017-01-01

    1.The relationship between diversity and ecosystem functioning is often analysed by partitioning the change in species performance in mixtures into a complementarity effect (CE) and a selection effect (SE). There is continuing ambiguity in the literature on the interpretation of these effects,

  5. Myopes show increased susceptibility to nearwork aftereffects.

    Science.gov (United States)

    Ciuffreda, K J; Wallis, D M

    1998-09-01

    Some aspects of accommodation may be slightly abnormal (or different) in myopes, compared with accommodation in emmetropes and hyperopes. For example, the initial magnitude of accommodative adaptation in the dark after nearwork is greatest in myopes. However, the critical test is to assess this initial accommodative aftereffect and its subsequent decay in the light under more natural viewing conditions with blur-related visual feedback present, if a possible link between this phenomenon and clinical myopia is to be considered. Subjects consisted of adult late- (n = 11) and early-onset (n = 13) myopes, emmetropes (n = 11), and hyperopes (n = 9). The distance-refractive state was assessed objectively using an autorefractor immediately before and after a 10-minute binocular near task at 20 cm (5 diopters [D]). Group results showed that myopes were most susceptible to the nearwork aftereffect. It averaged 0.35 D in initial magnitude, with considerably faster posttask decay to baseline in the early-onset (35 seconds) versus late-onset (63 seconds) myopes. There was no myopic aftereffect in the remaining two refractive groups. The myopes showed particularly striking accommodatively related nearwork aftereffect susceptibility. As has been speculated and found by many others, transient pseudomyopia may cause or be a precursor to permanent myopia or myopic progression. Time-integrated increased retinal defocus causing axial elongation is proposed as a possible mechanism.

  6. Showing Emulsion Properties with Common Dairy Foods

    Science.gov (United States)

    Bravo-Diaz, Carlos; Gonzalez-Romero, Elisa

    1996-09-01

    Foods are mixtures of different chemical compounds, and the quality we sense (taste, texture, color, etc.) are all manifestations of its chemical properties. Some of them can be visualized with the aid of simple, safe and inexpensive experiments using dairy products that can be found in any kitchen and using almost exclusively kitchen utensils. In this paper we propose some of them related with food emulsions. Food emulsions cover an extremely wide area of daily-life applications such as milk, sauces, dressings and beverages. Experimentation with some culinary recipes to prepare them and the analyisis of the observed results is close to ideal subject for the introduction of chemical principles, allowing to discuss about the nature and composition of foods, the effects of additives, etc. At the same time it allows to get insights into the scientific reasons that underlie on the recipes (something that it is not usually found in most cookbooks). For example, when making an emulsion like mayonnaise, why the egg yolks and water are the first materials in the bowl , and the oil is added to them rather than in the other way around? How you can "rescue" separate emulsions (mayonnaise)? Which parameters affect emulsion stability? Since safety, in its broad sense, is the first requisite for any food, concerns about food exist throughout the world and the more we are aware of our everyday life, the more likely we will be to deal productively with the consequences. On the other hand, understanding what foods are and how cooking works destroys no delightful mystery of the art of cuisine, instead the mystery expands.

  7. Microbiological and environmental issues in show caves.

    Science.gov (United States)

    Saiz-Jimenez, Cesareo

    2012-07-01

    Cultural tourism expanded in the last half of the twentieth century, and the interest of visitors has come to include caves containing archaeological remains. Some show caves attracted mass tourism, and economical interests prevailed over conservation, which led to a deterioration of the subterranean environment and the rock art. The presence and the role of microorganisms in caves is a topic that is often ignored in cave management. Knowledge of the colonisation patterns, the dispersion mechanisms, and the effect on human health and, when present, over rock art paintings of these microorganisms is of the utmost importance. In this review the most recent advances in the study of microorganisms in caves are presented, together with the environmental implications of the findings.

  8. Information Hiding: an Annotated Bibliography

    National Research Council Canada - National Science Library

    Anderson, Ross

    1999-01-01

    ... so. These steganography, copyright marking, the study of covert channels in operating systems, low-probability of intercept communications, and the study of subliminal channels in digital signature schemes...

  9. Information Hiding: an Annotated Bibliography

    Science.gov (United States)

    1999-04-13

    www.springer.de/catalog/html-files/deutsch/comp/3540619968. html>. [325] 063213, ‘A Multiversion Transaction Scheduler for Centralized Multilevel Se- cure...an MLS DBMS. The authors pro- pose getting around these problems by using multiversion schedulers. An abstract model is developed and shown to

  10. Hiding Crimes in Cyberspace (PREPRINT)

    National Research Council Canada - National Science Library

    Denning, Dorothy E; Baugh, Jr, William E

    1999-01-01

    .... Individuals need it to protect their private communications and confidential data. Encryption is critical to building a secure and trusted global information infrastructure for communications and electronic commerce...

  11. Additivity of entropic uncertainty relations

    Directory of Open Access Journals (Sweden)

    René Schwonnek

    2018-03-01

    Full Text Available We consider the uncertainty between two pairs of local projective measurements performed on a multipartite system. We show that the optimal bound in any linear uncertainty relation, formulated in terms of the Shannon entropy, is additive. This directly implies, against naive intuition, that the minimal entropic uncertainty can always be realized by fully separable states. Hence, in contradiction to proposals by other authors, no entanglement witness can be constructed solely by comparing the attainable uncertainties of entangled and separable states. However, our result gives rise to a huge simplification for computing global uncertainty bounds as they now can be deduced from local ones. Furthermore, we provide the natural generalization of the Maassen and Uffink inequality for linear uncertainty relations with arbitrary positive coefficients.

  12. NASA GIBS Use in Live Planetarium Shows

    Science.gov (United States)

    Emmart, C. B.

    2015-12-01

    The American Museum of Natural History's Hayden Planetarium was rebuilt in year 2000 as an immersive theater for scientific data visualization to show the universe in context to our planet. Specific astrophysical movie productions provide the main daily programming, but interactive control software, developed at AMNH allows immersive presentation within a data aggregation of astronomical catalogs called the Digital Universe 3D Atlas. Since 2006, WMS globe browsing capabilities have been built into a software development collaboration with Sweden's Linkoping University (LiU). The resulting Uniview software, now a product of the company SCISS, is operated by about fifty planetariums around that world with ability to network amongst the sites for global presentations. Public presentation of NASA GIBS has allowed authoritative narratives to be presented within the range of data available in context to other sources such as Science on a Sphere, NASA Earth Observatory and Google Earth KML resources. Specifically, the NOAA supported World Views Network conducted a series of presentations across the US that focused on local ecological issues that could then be expanded in the course of presentation to national and global scales of examination. NASA support of for GIBS resources in an easy access multi scale streaming format like WMS has tremendously enabled particularly facile presentations of global monitoring like never before. Global networking of theaters for distributed presentations broadens out the potential for impact of this medium. Archiving and refinement of these presentations has already begun to inform new types of documentary productions that examine pertinent, global interdependency topics.

  13. Mining by-products show potential

    International Nuclear Information System (INIS)

    Douglas, Grant

    2013-01-01

    Full text: Many mining and industrial processes generate wastewater that contains a variety of contaminants, such as metals and metalloids. These must be removed to ensure the wastewater is suitable for reuse or safe discharge to the environment. However, mining wastewater treatment processes have traditionally been difficult due to the large range of different contaminants present, requiring a number of complex steps. In current processes, the mining industry generally adds lime to the wastewater to purify it. While often effective, the key issue with this method has been the volume of sludge that forms and the subsequent problems with dealing with this sludge - either to extract the contained water, which often requires additional treatment, or to find enough space for long-term disposal. This complex practice could end soon thanks to a new treatment solution that utilises hydrotalcites. Developed by CSIRO, the treatment overcomes the complexities of lime-based methods and offers a simpler and more water smart process. The CSIRO team found that hydrotalcites, which are layered minerals consisting of aluminium- and magnesium- rich layers, can simultaneously remove a variety of contaminants in wastewater in a single step. Scientists noticed that hydrotalcites begin to form when aluminium and magnesium are present at an ideal ratio and under conditions during neutralisation of acidic waters. As hydrotalcites form, the contaminants become trapped and are easily removed from the wastewater as a solid. Mining wastewater often contains substantial magnesium and aluminium concentrations. This means that we can create hydrotalcites utilising common contaminants that are already present in the wastewater, by simply adjusting their concentrations and adding alkaline compounds to rapidly increase pH. Initial applications have focussed on treating wastewater generated from the mining and extraction of uranium. A range of contaminants including uranium, rare earth elements

  14. Geoscience is Important? Show Me Why

    Science.gov (United States)

    Boland, M. A.

    2017-12-01

    "The public" is not homogenous and no single message or form of messaging will connect the entire public with the geosciences. One approach to promoting trust in, and engagement with, the geosciences is to identify specific sectors of the public and then develop interactions and communication products that are immediately relevant to that sector's interests. If the content and delivery are appropriate, this approach empowers people to connect with the geosciences on their own terms and to understand the relevance of the geosciences to their own situation. Federal policy makers are a distinct and influential subgroup of the general public. In preparation for the 2016 presidential election, the American Geosciences Institute (AGI) in collaboration with its 51 member societies prepared Geoscience for America's Critical Needs: Invitation to a National Dialogue, a document that identified major geoscience policy issues that should be addressed in a national policy platform. Following the election, AGI worked with eight other geoscience societies to develop Geoscience Policy Recommendations for the New Administration and the 115th Congress, which outlines specific policy actions to address national issues. State and local decision makers are another important subgroup of the public. AGI has developed online content, factsheets, and case studies with different levels of technical complexity so people can explore societally-relevant geoscience topics at their level of technical proficiency. A related webinar series is attracting a growing worldwide audience from many employment sectors. Partnering with government agencies and other scientific and professional societies has increased the visibility and credibility of these information products with our target audience. Surveys and other feedback show that these products are raising awareness of the geosciences and helping to build reciprocal relationships between geoscientists and decision makers. The core message of all

  15. Bacteriophages show promise as antimicrobial agents.

    Science.gov (United States)

    Alisky, J; Iczkowski, K; Rapoport, A; Troitsky, N

    1998-01-01

    The emergence of antibiotic-resistant bacteria has prompted interest in alternatives to conventional drugs. One possible option is to use bacteriophages (phage) as antimicrobial agents. We have conducted a literature review of all Medline citations from 1966-1996 that dealt with the therapeutic use of phage. There were 27 papers from Poland, the Soviet Union, Britain and the U.S.A. The Polish and Soviets administered phage orally, topically or systemically to treat a wide variety of antibiotic-resistant pathogens in both adults and children. Infections included suppurative wound infections, gastroenteritis, sepsis, osteomyelitis, dermatitis, empyemas and pneumonia; pathogens included Staphylococcus, Streptococcus, Klebsiella, Escherichia, Proteus, Pseudomonas, Shigella and Salmonella spp. Overall, the Polish and Soviets reported success rates of 80-95% for phage therapy, with rare, reversible gastrointestinal or allergic side effects. However, efficacy of phage was determined almost exclusively by qualitative clinical assessment of patients, and details of dosages and clinical criteria were very sketchy. There were also six British reports describing controlled trials of phage in animal models (mice, guinea pigs and livestock), measuring survival rates and other objective criteria. All of the British studies raised phage against specific pathogens then used to create experimental infections. Demonstrable efficacy against Escherichia, Acinetobacter, Pseudomonas and Staphylococcus spp. was noted in these model systems. Two U.S. papers dealt with improving the bioavailability of phage. Phage is sequestered in the spleen and removed from circulation. This can be overcome by serial passage of phage through mice to isolate mutants that resist sequestration. In conclusion, bacteriophages may show promise for treating antibiotic resistant pathogens. To facilitate further progress, directions for future research are discussed and a directory of authors from the reviewed

  16. DAST in Flight Showing Diverging Wingtip Oscillations

    Science.gov (United States)

    1980-01-01

    normal stiffness. This was done because stiffness requires structural weight but ensures freedom from flutter-an uncontrolled, divergent oscillation of the structure, driven by aerodynamic forces and resulting in structural failure. The program used refined theoretical tools to predict at what speed flutter would occur. It then designed a high-response control system to counteract the motion and permit a much lighter wing structure. The wing had, in effect, 'electronic stiffness.' Flight research with this concept was extremely hazardous because an error in either the flutter prediction or control system implementation would result in wing structural failure and the loss of the vehicle. Because of this, flight demonstration of a sub-scale vehicle made sense from the standpoint of both safety and cost. The program anticipated structural failure during the course of the flight research. The Firebee II was a supersonic drone selected as the DAST testbed because its wing could be easily replaced, it used only tail-mounted control surfaces, and it was available as surplus from the U. S. Air Force. It was capable of 5-g turns (that is, turns producing acceleration equal to 5 times that of gravity). Langley outfitted a drone with an aeroelastic, supercritical research wing suitable for a Mach 0.98 cruise transport with a predicted flutter speed of Mach 0.95 at an altitude of 25,000 feet. Dryden and Langley, in conjunction with Boeing, designed and fabricated a digital flutter suppression system (FSS). Dryden developed an RPRV (remotely piloted research vehicle) flight control system; integrated the wing, FSS, and vehicle systems; and conducted the flight program. In addition to a digital flight control system and aeroelastic wings, each DAST drone had research equipment mounted in its nose and a mid-air retrieval system in its tail. The drones were originally launched from the NASA B-52 bomber and later from a DC-130. The DAST vehicle's flight was monitored from the sky by an F

  17. effects of sulphur addition on addition on and mechanical properties

    African Journals Online (AJOL)

    User

    234-8034714355. 8034714355. 1. EFFECTS OF SULPHUR ADDITION ON. ADDITION ON. 2. AND MECHANICAL PROPERTIES O. 3. 4. C. W. Onyia. 5. 1DEPT. OF METALLURGICAL AND MATERIALS. 6. 2, 4DEPT. OF METALLURGICAL ...

  18. ADDITIVES USED TO OBTAIN FOOD

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2012-01-01

    Full Text Available Use of food additives in food is determined by the growth of contemporary food needs of the world population. Additives used in food, both natural and artificial ones, contribute to: improving the organoleptic characteristics and to preserve the food longer, but we must not forget that all these additives should not be found naturally in food products. Some of these additives are not harmful and human pests in small quantities, but others may have harmful effects on health.

  19. Time dependent patient no-show predictive modelling development.

    Science.gov (United States)

    Huang, Yu-Li; Hanauer, David A

    2016-05-09

    Purpose - The purpose of this paper is to develop evident-based predictive no-show models considering patients' each past appointment status, a time-dependent component, as an independent predictor to improve predictability. Design/methodology/approach - A ten-year retrospective data set was extracted from a pediatric clinic. It consisted of 7,291 distinct patients who had at least two visits along with their appointment characteristics, patient demographics, and insurance information. Logistic regression was adopted to develop no-show models using two-thirds of the data for training and the remaining data for validation. The no-show threshold was then determined based on minimizing the misclassification of show/no-show assignments. There were a total of 26 predictive model developed based on the number of available past appointments. Simulation was employed to test the effective of each model on costs of patient wait time, physician idle time, and overtime. Findings - The results demonstrated the misclassification rate and the area under the curve of the receiver operating characteristic gradually improved as more appointment history was included until around the 20th predictive model. The overbooking method with no-show predictive models suggested incorporating up to the 16th model and outperformed other overbooking methods by as much as 9.4 per cent in the cost per patient while allowing two additional patients in a clinic day. Research limitations/implications - The challenge now is to actually implement the no-show predictive model systematically to further demonstrate its robustness and simplicity in various scheduling systems. Originality/value - This paper provides examples of how to build the no-show predictive models with time-dependent components to improve the overbooking policy. Accurately identifying scheduled patients' show/no-show status allows clinics to proactively schedule patients to reduce the negative impact of patient no-shows.

  20. Dynamics of ultrasonic additive manufacturing.

    Science.gov (United States)

    Hehr, Adam; Dapino, Marcelo J

    2017-01-01

    Ultrasonic additive manufacturing (UAM) is a solid-state technology for joining similar and dissimilar metal foils near room temperature by scrubbing them together with ultrasonic vibrations under pressure. Structural dynamics of the welding assembly and work piece influence how energy is transferred during the process and ultimately, part quality. To understand the effect of structural dynamics during UAM, a linear time-invariant model is proposed to relate the inputs of shear force and electric current to resultant welder velocity and voltage. Measured frequency response and operating performance of the welder under no load is used to identify model parameters. Using this model and in-situ measurements, shear force and welder efficiency are estimated to be near 2000N and 80% when welding Al 6061-H18 weld foil, respectively. Shear force and welder efficiency have never been estimated before in UAM. The influence of processing conditions, i.e., welder amplitude, normal force, and weld speed, on shear force and welder efficiency are investigated. Welder velocity was found to strongly influence the shear force magnitude and efficiency while normal force and weld speed showed little to no influence. The proposed model is used to describe high frequency harmonic content in the velocity response of the welder during welding operations and coupling of the UAM build with the welder. Copyright © 2016 Elsevier B.V. All rights reserved.

  1. Dimensionless numbers in additive manufacturing

    Science.gov (United States)

    Mukherjee, T.; Manvatkar, V.; De, A.; DebRoy, T.

    2017-02-01

    The effects of many process variables and alloy properties on the structure and properties of additively manufactured parts are examined using four dimensionless numbers. The structure and properties of components made from 316 Stainless steel, Ti-6Al-4V, and Inconel 718 powders for various dimensionless heat inputs, Peclet numbers, Marangoni numbers, and Fourier numbers are studied. Temperature fields, cooling rates, solidification parameters, lack of fusion defects, and thermal strains are examined using a well-tested three-dimensional transient heat transfer and fluid flow model. The results show that lack of fusion defects in the fabricated parts can be minimized by strengthening interlayer bonding using high values of dimensionless heat input. The formation of harmful intermetallics such as laves phases in Inconel 718 can be suppressed using low heat input that results in a small molten pool, a steep temperature gradient, and a fast cooling rate. Improved interlayer bonding can be achieved at high Marangoni numbers, which results in vigorous circulation of liquid metal, larger pool dimensions, and greater depth of penetration. A high Fourier number ensures rapid cooling, low thermal distortion, and a high ratio of temperature gradient to the solidification growth rate with a greater tendency of plane front solidification.

  2. Best in show but not best shape: a photographic assessment of show dog body condition.

    Science.gov (United States)

    Such, Z R; German, A J

    2015-08-01

    Previous studies suggest that owners often wrongly perceive overweight dogs to be in normal condition. The body shape of dogs attending shows might influence owners' perceptions, with online images of overweight show winners having a negative effect. This was an observational in silico study of canine body condition. 14 obese-prone breeds and 14 matched non-obese-probe breeds were first selected, and one operator then used an online search engine to identify 40 images, per breed, of dogs that had appeared at a major national UK show (Crufts). After images were anonymised and coded, a second observer subjectively assessed body condition, in a single sitting, using a previously validated method. Of 1120 photographs initially identified, 960 were suitable for assessing body condition, with all unsuitable images being from longhaired breeds. None of the dogs (0 per cent) were underweight, 708 (74 per cent) were in ideal condition and 252 (26 per cent) were overweight. Pugs, basset hounds and Labrador retrievers were most likely to be overweight, while standard poodles, Rhodesian ridgebacks, Hungarian vizslas and Dobermanns were least likely to be overweight. Given the proportion of show dogs from some breeds that are overweight, breed standards should be redefined to be consistent with a dog in optimal body condition. British Veterinary Association.

  3. Color Addition and Subtraction Apps

    Science.gov (United States)

    Ruiz, Frances; Ruiz, Michael J.

    2015-01-01

    Color addition and subtraction apps in HTML5 have been developed for students as an online hands-on experience so that they can more easily master principles introduced through traditional classroom demonstrations. The evolution of the additive RGB color model is traced through the early IBM color adapters so that students can proceed step by step…

  4. How Safe Are Color Additives?

    Science.gov (United States)

    ... Linkedin Pin it Email Print Subscribe: FDA Consumer Health Information Color additives give the red tint to your fruit punch ... in Foods, Drugs, Cosmetics, and Medical Devices Color Additives: FDA's Regulatory Process and Historical Perspectives ... Health Cosmetics Dietary Supplements Drugs Food Medical Devices Nutrition ...

  5. Density measures and additive property

    OpenAIRE

    Kunisada, Ryoichi

    2015-01-01

    We deal with finitely additive measures defined on all subsets of natural numbers which extend the asymptotic density (density measures). We consider a class of density measures which are constructed from free ultrafilters on natural numbers and study a certain additivity property of such density measures.

  6. Dolphin shows and interaction programs: benefits for conservation education?

    Science.gov (United States)

    Miller, L J; Zeigler-Hill, V; Mellen, J; Koeppel, J; Greer, T; Kuczaj, S

    2013-01-01

    Dolphin shows and dolphin interaction programs are two types of education programs within zoological institutions used to educate visitors about dolphins and the marine environment. The current study examined the short- and long-term effects of these programs on visitors' conservation-related knowledge, attitude, and behavior. Participants of both dolphin shows and interaction programs demonstrated a significant short-term increase in knowledge, attitudes, and behavioral intentions. Three months following the experience, participants of both dolphin shows and interaction programs retained the knowledge learned during their experience and reported engaging in more conservation-related behaviors. Additionally, the number of dolphin shows attended in the past was a significant predictor of recent conservation-related behavior suggesting that repetition of these types of experiences may be important in inspiring people to conservation action. These results suggest that both dolphin shows and dolphin interaction programs can be an important part of a conservation education program for visitors of zoological facilities. © 2012 Wiley Periodicals, Inc.

  7. Prevalence of Food Additive Intolerance

    DEFF Research Database (Denmark)

    Madsen, Charlotte Bernhard

    1994-01-01

    The prevalence estimates vary with a factor 100. As the results vary so do the study populations. 6 If the different study populations are accounted for, a common conclusion can be drawn: Food additive intolerance is found in adults with atopic symptoms from the respiratory tract and skin. The prevalence......1 The existing prevalence estimates of food additive intolerance(1-4) are being reviewed. 2 In the EEC report the estimated frequency of food additive intolerance is 0.03% to 0.15% based on data from patient groups. 3 The British population study results in a prevalence estimate of 0.......026%. The challenged population is 81 children and adults with a history of reproducible clinical symptoms after ingestion of food additives. 4 In the Danish population study a prevalence of 1-2% is found in children age 5-16. In this study a total of 606 children mainly with atopic disease have been challenged. 5...

  8. Topology Optimization for Additive Manufacturing

    DEFF Research Database (Denmark)

    Clausen, Anders

    This PhD thesis deals with the combination of topology optimization and additive man-ufacturing (AM, also known as 3D-printing). In addition to my own works, the thesis contains a broader review and assessment of the literature within the field. The thesis first presents a classification...... of the various AM technologies, a review of relevant manufacturing materials, the properties of these materials in the additively manufactured part, as well as manufacturing constraints with a potential for design optimization. Subsequently, specific topology optimization formulations relevant for the most im...... for scalable manufacturing. In relation to interface problems it is shown how a flexible void area may be included into a standard minimum compliance problem by employing an additional design variable field and a sensitivity filter. Furthermore, it is shown how the design of coated structures may be modeled...

  9. (ICSID) ADDITIONAL FACILITY IN INTERNA

    African Journals Online (AJOL)

    Fr. Ikenga

    ... which is adopted by Article 5 of the Additional Facility Rules to guide the ... B, Barrister at Law, e-mail: kcezeibe@yahoo.com; Phone 08033950631 and .... revision and annulment which are internally available under the Washington ...

  10. Genoa Boat Show – Good Example of Event Management

    Directory of Open Access Journals (Sweden)

    Dunja Demirović

    2012-07-01

    Full Text Available International Boat Show, a business and tourist event, has been held annually in Italian city of Genoa since 1962. The fair is one of the oldest, largest and best known in the field of boating industry worldwide, primarily due to good management of the event and it can serve as case study for domestic fair organizers to improve the quality of their business and services. Since Belgrade is the city of fairs, but compared to Genoa still underdeveloped in terms of trade shows, the following tasks imposed naturally in this study: to determine the relationship of the organizers of Genoa Boat Show in the sector of preparation and fair offer, in the sector of selection and communication with specific target groups (especially visitors, services during the fair and functioning of the city during the fair. During the research the authors have mostly used historical method, comparison, synthesis and the interview method. The results of theoretical research, in addition, may help not only managers of fair shows and of exhibitions, but also to organizers of other events in our country

  11. Wide and High Additive Manufacturing

    Energy Technology Data Exchange (ETDEWEB)

    Post, Brian K. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Roschli, Alex C. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-03-01

    The goal of this project is to develop and demonstrate the enabling technologies for Wide and High Additive Manufacturing (WHAM). WHAM will open up new areas of U.S. manufacturing for very large tooling in support of the transportation and energy industries, significantly reducing cost and lead time. As with Big Area Additive Manufacturing (BAAM), the initial focus is on the deposition of composite materials.

  12. Tomato Fruits Show Wide Phenomic Diversity but Fruit Developmental Genes Show Low Genomic Diversity.

    Directory of Open Access Journals (Sweden)

    Vijee Mohan

    Full Text Available Domestication of tomato has resulted in large diversity in fruit phenotypes. An intensive phenotyping of 127 tomato accessions from 20 countries revealed extensive morphological diversity in fruit traits. The diversity in fruit traits clustered the accessions into nine classes and identified certain promising lines having desirable traits pertaining to total soluble salts (TSS, carotenoids, ripening index, weight and shape. Factor analysis of the morphometric data from Tomato Analyzer showed that the fruit shape is a complex trait shared by several factors. The 100% variance between round and flat fruit shapes was explained by one discriminant function having a canonical correlation of 0.874 by stepwise discriminant analysis. A set of 10 genes (ACS2, COP1, CYC-B, RIN, MSH2, NAC-NOR, PHOT1, PHYA, PHYB and PSY1 involved in various plant developmental processes were screened for SNP polymorphism by EcoTILLING. The genetic diversity in these genes revealed a total of 36 non-synonymous and 18 synonymous changes leading to the identification of 28 haplotypes. The average frequency of polymorphism across the genes was 0.038/Kb. Significant negative Tajima'D statistic in two of the genes, ACS2 and PHOT1 indicated the presence of rare alleles in low frequency. Our study indicates that while there is low polymorphic diversity in the genes regulating plant development, the population shows wider phenotype diversity. Nonetheless, morphological and genetic diversity of the present collection can be further exploited as potential resources in future.

  13. Food additives and preschool children.

    Science.gov (United States)

    Martyn, Danika M; McNulty, Breige A; Nugent, Anne P; Gibney, Michael J

    2013-02-01

    Food additives have been used throughout history to perform specific functions in foods. A comprehensive framework of legislation is in place within Europe to control the use of additives in the food supply and ensure they pose no risk to human health. Further to this, exposure assessments are regularly carried out to monitor population intakes and verify that intakes are not above acceptable levels (acceptable daily intakes). Young children may have a higher dietary exposure to chemicals than adults due to a combination of rapid growth rates and distinct food intake patterns. For this reason, exposure assessments are particularly important in this age group. The paper will review the use of additives and exposure assessment methods and examine factors that affect dietary exposure by young children. One of the most widely investigated unfavourable health effects associated with food additive intake in preschool-aged children are suggested adverse behavioural effects. Research that has examined this relationship has reported a variety of responses, with many noting an increase in hyperactivity as reported by parents but not when assessed using objective examiners. This review has examined the experimental approaches used in such studies and suggests that efforts are needed to standardise objective methods of measuring behaviour in preschool children. Further to this, a more holistic approach to examining food additive intakes by preschool children is advisable, where overall exposure is considered rather than focusing solely on behavioural effects and possibly examining intakes of food additives other than food colours.

  14. Additional reactor protection system of RBMK-1500

    International Nuclear Information System (INIS)

    1999-01-01

    Analysis of anticipated transients without scram of RBMK-1500 reactor showed that additional reactor protection system is required. Data of accident analysis in the case of loose of external electric power and loose of vacuum in condensers of turbines are provided

  15. Sintering of magnesia: effect of additives

    Indian Academy of Sciences (India)

    Effect of different additives, namely Cr2O3, Fe2O3 and TiO2, up to 2 wt% was studied on the sinter- ing and .... mental distribution of the components is shown in figure 7. It shows ... Chiang Y M, Birniand D and Kingery W 1996 Physical ceram-.

  16. (ajst) additive main effects and multiplicative

    African Journals Online (AJOL)

    2013-08-02

    Aug 2, 2013 ... genotypes assessed by biplot analysis showed that the most stable ... biplot is a useful tool for the analysis of multi-environment trial (MET) data. ... multiplicative components, extracting first the additive ... The AMMI analysis of variance of cassava harvest index of the 8 .... wheat mega-environments in Iran.

  17. effects of sulphur addition on addition on and mechanical properties

    African Journals Online (AJOL)

    User

    on the microstructure and mechanical properties of sand cast been investigated ... owed that the addition of sulphur to Al-12wt%Si alloy. 12wt%Si alloy .... 28 materials. 29. Element. Aluminum. Silicon. Al. Si. Ca. Fe. Cu. Zn. Mn. Mg. Cr. B. 99.71.

  18. [Effect of biochar addition on soil evaporation.

    Science.gov (United States)

    Xu, Jian; Niu, Wen Quan; Zhang, Ming Zhi; Li, Yuan; Lyu, Wang; Li, Kang-Yong; Zou, Xiao-Yang; Liang, Bo-Hui

    2016-11-18

    In order to determine the rational amount of biochar application and its effect on soil hydrological processes in arid area, soil column experiments were conducted in the laboratory using three biochar additions (5%, 10% and 15%) and four different biochar types (devaporation. The results showed that the addition of biochar could change the phreatic water recharge, soil water-holding capacity, capillary water upward movement and soil evaporation obviously. But the effects were different depending on the type of biochar raw material and the size of particle. The phreatic water recharge increased with the increasing amount of biochar addition. The addition of biochar could obviously enlarge the soil water-holding capacity and promote the capillary water upward movement rate. This effect was greater when using the material of bamboo charcoal compared with using wood charcoal, while biochar with small particle size had greater impact than that with big particle size. The biochar could effectively restrain the soil evaporation at a low addition amount (5%). But it definitely promoted the soil evaporation if the addition amount was very high. In arid area, biochar addition in appropriate amount could improve soil water retention capacity.

  19. Evaluation of certain food additives.

    Science.gov (United States)

    2017-01-01

    This report represents the conclusions of a Joint FAO/WHO Expert Committee convened to evaluate the safety of various food additives, including flavouring agents, with a view to concluding as to safety concerns and to preparing specifications for identity and purity. The first part of the report contains a general discussion of the principles governing the toxicological evaluation of and assessment of dietary exposure to food additives, including flavouring agents. A summary follows of the Committee’s evaluations of technical, toxicological and dietary exposure data for 10 food additives (Allura Red AC; carob bean gum; lutein esters from Tagetes erecta; octenyl succinic acid (OSA)– modified gum arabic; pectin; Quinoline Yellow; rosemary extract; steviol glycosides; tartrazine; and xanthan gum) and five groups of flavouring agents (alicyclic, alicyclic-fused and aromatic-fused ring lactones; aliphatic and aromatic amines and amides; aliphatic secondary alcohols, ketones and related esters; cinnamyl alcohol and related substances; and tetrahydrofuran and furanone derivatives). Specifications for the following food additives were revised: aspartame; cassia gum; citric and fatty acid esters of glycerol (CITREM); modified starches; octanoic acid; starch sodium octenyl succinate; and total colouring matters. Annexed to the report are tables summarizing the Committee’s recommendations for dietary exposures to and toxicological evaluations of all of the food additives, including flavouring agents, considered at this meeting.

  20. Calcium addition in straw gasification

    DEFF Research Database (Denmark)

    Risnes, H.; Fjellerup, Jan Søren; Henriksen, Ulrik Birk

    2003-01-01

    The present work focuses on the influence of calcium addition in gasification. The inorganic¿organic element interaction as well as the detailed inorganic¿inorganic elements interaction has been studied. The effect of calcium addition as calcium sugar/molasses solutions to straw significantly...... affected the ash chemistry and the ash sintering tendency but much less the char reactivity. Thermo balance test are made and high-temperature X-ray diffraction measurements are performed, the experimental results indicate that with calcium addition major inorganic¿inorganic reactions take place very late...... in the char conversion process. Comprehensive global equilibrium calculations predicted important characteristics of the inorganic ash residue. Equilibrium calculations predict the formation of liquid salt if sufficient amounts of Ca are added and according to experiments as well as calculations calcium binds...

  1. Additive interaction in survival analysis

    DEFF Research Database (Denmark)

    Rod, Naja Hulvej; Lange, Theis; Andersen, Ingelise

    2012-01-01

    It is a widely held belief in public health and clinical decision-making that interventions or preventive strategies should be aimed at patients or population subgroups where most cases could potentially be prevented. To identify such subgroups, deviation from additivity of absolute effects...... an empirical example of interaction between education and smoking on risk of lung cancer. We argue that deviations from additivity of effects are important for public health interventions and clinical decision-making, and such estimations should be encouraged in prospective studies on health. A detailed...... is the relevant measure of interest. Multiplicative survival models, such as the Cox proportional hazards model, are often used to estimate the association between exposure and risk of disease in prospective studies. In Cox models, deviations from additivity have usually been assessed by surrogate measures...

  2. Additional disulfide bonds in insulin

    DEFF Research Database (Denmark)

    Vinther, Tine N; Pettersson, Ingrid; Huus, Kasper

    2015-01-01

    The structure of insulin, a glucose homeostasis-controlling hormone, is highly conserved in all vertebrates and stabilized by three disulfide bonds. Recently, we designed a novel insulin analogue containing a fourth disulfide bond located between positions A10-B4. The N-terminus of insulin's B......-chain is flexible and can adapt multiple conformations. We examined how well disulfide bond predictions algorithms could identify disulfide bonds in this region of insulin. In order to identify stable insulin analogues with additional disulfide bonds, which could be expressed, the Cβ cut-off distance had...... in comparison to analogues with additional disulfide bonds that were more difficult to predict. In contrast, addition of the fourth disulfide bond rendered all analogues resistant to fibrillation under stress conditions and all stable analogues bound to the insulin receptor with picomolar affinities. Thus...

  3. AirShow 1.0 CFD Software Users' Guide

    Science.gov (United States)

    Mohler, Stanley R., Jr.

    2005-01-01

    AirShow is visualization post-processing software for Computational Fluid Dynamics (CFD). Upon reading binary PLOT3D grid and solution files into AirShow, the engineer can quickly see how hundreds of complex 3-D structured blocks are arranged and numbered. Additionally, chosen grid planes can be displayed and colored according to various aerodynamic flow quantities such as Mach number and pressure. The user may interactively rotate and translate the graphical objects using the mouse. The software source code was written in cross-platform Java, C++, and OpenGL, and runs on Unix, Linux, and Windows. The graphical user interface (GUI) was written using Java Swing. Java also provides multiple synchronized threads. The Java Native Interface (JNI) provides a bridge between the Java code and the C++ code where the PLOT3D files are read, the OpenGL graphics are rendered, and numerical calculations are performed. AirShow is easy to learn and simple to use. The source code is available for free from the NASA Technology Transfer and Partnership Office.

  4. Five Kepler target stars that show multiple transiting exoplanet candidates

    Energy Technology Data Exchange (ETDEWEB)

    Steffen, Jason H.; /Fermilab; Batalha, Natalie M.; /San Jose State U.; Borucki, William J.; /NASA, Ames; Buchhave, Lars A.; /Harvard-Smithsonian Ctr. Astrophys. /Bohr Inst.; Caldwell, Douglas A.; /NASA, Ames /SETI Inst., Mtn. View; Cochran, William D.; /Texas U.; Endl, Michael; /Texas U.; Fabrycky, Daniel C.; /Harvard-Smithsonian Ctr. Astrophys.; Fressin, Francois; /Harvard-Smithsonian Ctr. Astrophys.; Ford, Eric B.; /Florida U.; Fortney, Jonathan J.; /UC, Santa Cruz, Phys. Dept. /NASA, Ames

    2010-06-01

    We present and discuss five candidate exoplanetary systems identified with the Kepler spacecraft. These five systems show transits from multiple exoplanet candidates. Should these objects prove to be planetary in nature, then these five systems open new opportunities for the field of exoplanets and provide new insights into the formation and dynamical evolution of planetary systems. We discuss the methods used to identify multiple transiting objects from the Kepler photometry as well as the false-positive rejection methods that have been applied to these data. One system shows transits from three distinct objects while the remaining four systems show transits from two objects. Three systems have planet candidates that are near mean motion commensurabilities - two near 2:1 and one just outside 5:2. We discuss the implications that multitransiting systems have on the distribution of orbital inclinations in planetary systems, and hence their dynamical histories; as well as their likely masses and chemical compositions. A Monte Carlo study indicates that, with additional data, most of these systems should exhibit detectable transit timing variations (TTV) due to gravitational interactions - though none are apparent in these data. We also discuss new challenges that arise in TTV analyses due to the presence of more than two planets in a system.

  5. Radon in Austrian tourist mines and show caves

    International Nuclear Information System (INIS)

    Ringer, W.; Graeser, J.

    2009-01-01

    The radon situation in tourist mines and show caves is barely investigated in Austria. This paper investigates the influence of its determining factors, such as climate, structure and geology. For this purpose, long-term time-resolved measurements over 6 to 12 months in 4 tourist mines and 2 show caves - with 5 to 9 measuring points each - have been carried out to obtain the course of radon concentration throughout the year. In addition, temperature and air-pressure were measured and compared to the data outside where available. Results suggest that the dominating factors of the average radon concentration are structure and location (geology) of the tunnel-system, whereas the diurnal and annual variation is mainly caused by the changing airflow, which is driven by the difference in temperature inside and outside. Downcast air is connected with very low radon concentrations, upcast air with high concentrations. In some locations the maximum values appear when the airflow ceases. But airflow can be different in different parts of mines and caves. Systems close to the surface show generally lower radon levels than the ones located deeper underground. Due to variation of structure, geology and local climate, the radon situation in mines and caves can only be described by simultaneous measurements at several measuring points. (orig.)

  6. Aminodisulfides as additives to lubricants

    Energy Technology Data Exchange (ETDEWEB)

    Balin, A.I.; Tarasevich, V.B.; Veretenova, T.N.

    1980-01-01

    A study was carried out and tehcnology developed for producing sulfur-nitrogen containing additives of the type of aminodisulfide by interaction of beta, beta-dichlordialkyl (aryl) disulfides with diethanolamine in a medium of sulfur-diethanolamine. The 2,2'-bis-(diethanol)-dialkyl(aryl) disulfides obtained do not hydrolyze in aqueous soltuions of alkalis, exhibit rather high antiscoring properties and are recommended for tests as active additives of high pressure to SOZH and technological lubricants of the oil and emulsion types.

  7. Additive to clay drilling muds

    Energy Technology Data Exchange (ETDEWEB)

    Voytenko, V.S.; Nekrasova, V.B.; Nikitinskiy, E.L.; Ponomarev, V.N.

    1984-01-01

    The purpose of the invention is to improve the lubricating and strengthening properties of clay drilling muds. This goal is achieved because the lubricating and strengthening additive used is waste from the pulp and paper industry at the stage of reprocessing crude sulfate soap into phytosterol.

  8. The selective addition of water

    NARCIS (Netherlands)

    Resch, V.; Hanefeld, U.

    2014-01-01

    Water is omnipresent and essential. Yet at the same time it is a rather unreactive molecule. The direct addition of water to C[double bond, length as m-dash]C double bonds is therefore a challenge not answered convincingly. In this perspective we critically evaluate the selectivity and the

  9. Radiation curable Michael addition compounds

    International Nuclear Information System (INIS)

    Gruber, G.W.; Friedlander, C.B.; McDonald, W.H.; Dowbenko, R.

    1979-01-01

    Radiation polymerizable acrylyloxy-containing reaction products are provided from Michael addition reaction of an amide containing at least two acrylate groups with a primary or secondary amine. The resulting amine adducts of the amide, which contain at least one acrylate group per molecule, possesses high cure rates in air and are useful in compositions for forming coatings. (author)

  10. Additively manufactured porous tantalum implants

    NARCIS (Netherlands)

    Wauthle, Ruben; Van Der Stok, Johan; Yavari, Saber Amin; Van Humbeeck, Jan; Kruth, Jean Pierre; Zadpoor, Amir Abbas; Weinans, Harrie; Mulier, Michiel; Schrooten, Jan

    2015-01-01

    The medical device industry's interest in open porous, metallic biomaterials has increased in response to additive manufacturing techniques enabling the production of complex shapes that cannot be produced with conventional techniques. Tantalum is an important metal for medical devices because of

  11. Fluxional additives: a second generation control in enantioselective catalysis.

    Science.gov (United States)

    Sibi, Mukund P; Manyem, Shankar; Palencia, Hector

    2006-10-25

    The concept of "fluxional additives", additives that can adopt enantiomeric conformations depending on the chiral information in the ligand, is demonstrated in enantioselective Diels-Alder and nitrone cycloaddition reactions. The additive design is modular, and diverse structures are accessible in three steps. Chiral Lewis acids from main group and transition metals show enhancements in enantioselectivity in the presence of these additives.

  12. Machine-Learning-Based No Show Prediction in Outpatient Visits

    Directory of Open Access Journals (Sweden)

    Carlos Elvira

    2018-03-01

    Full Text Available A recurring problem in healthcare is the high percentage of patients who miss their appointment, be it a consultation or a hospital test. The present study seeks patient’s behavioural patterns that allow predicting the probability of no- shows. We explore the convenience of using Big Data Machine Learning models to accomplish this task. To begin with, a predictive model based only on variables associated with the target appointment is built. Then the model is improved by considering the patient’s history of appointments. In both cases, the Gradient Boosting algorithm was the predictor of choice. Our numerical results are considered promising given the small amount of information available. However, there seems to be plenty of room to improve the model if we manage to collect additional data for both patients and appointments.

  13. Evaluation of certain food additives.

    Science.gov (United States)

    2012-01-01

    This report represents the conclusions of a Joint FAO/WHO Expert Committee convened to evaluate the safety of various food additives, including flavouring agents, with a view to concluding as to safety concerns and to preparing specifications for identity and purity. The first part of the report contains a general discussion of the principles governing the toxicological evaluation of and assessment of dietary exposure to food additives, including flavouring agents. A summary follows of the Committee's evaluations of technical, toxicological and dietary exposure data for five food additives (magnesium dihydrogen diphosphate; mineral oil (medium and low viscosity) classes II and III; 3-phytase from Aspergillus niger expressed in Aspergillus niger; serine protease (chymotrypsin) from Nocardiopsis prasina expressed in Bacillus licheniformis; and serine protease (trypsin) from Fusarium oxysporum expressed in Fusarium venenatum) and 16 groups of flavouring agents (aliphatic and aromatic amines and amides; aliphatic and aromatic ethers; aliphatic hydrocarbons, alcohols, aldehydes, ketones, carboxylic acids and related esters, sulfides, disulfides and ethers containing furan substitution; aliphatic linear alpha,beta-unsaturated aldehydes, acids and related alcohols, acetals and esters; amino acids and related substances; epoxides; furfuryl alcohol and related substances; linear and branched-chain aliphatic, unsaturated, unconjugated alcohols, aldehydes, acids and related esters; miscellaneous nitrogen-containing substances; phenol and phenol derivatives; pyrazine derivatives; pyridine, pyrrole and quinoline derivatives; saturated aliphatic acyclic branched-chain primary alcohols, aldehydes and acids; simple aliphatic and aromatic sulfides and thiols; sulfur-containing heterocyclic compounds; and sulfur-substituted furan derivatives). Specifications for the following food additives were revised: ethyl cellulose, mineral oil (medium viscosity), modified starches and titanium

  14. Studies of alumina additions in zirconia - magnesia

    International Nuclear Information System (INIS)

    Muccillo, R.

    1987-01-01

    Ionic conductivity measurements have been carried out in the 500 0 C - 1000 0 C temperature range in Mg - PSZ (Partially Stabilized Zirconia) with 0.5 to 10 mol % alumina additions. All specimens were prepared by pressing followed by pre - and sintering at 1000 0 C/2h and1450 0 C/4h, respectively. Thermal histerysis of the ionic conductivity have been detected, probably due to phase changes in the Mg-PSZ samples. The results show that alumina additions up to 2.1% enhances densification with no major variations in electrical resistivity values. (Author) [pt

  15. The structure of additive conservation laws

    International Nuclear Information System (INIS)

    Helmut Reen

    1979-01-01

    All additive conserved quantities are listed for a system with short range central force interaction between the particles: a special case shows up in Boltzmann H-theorem and his derivation of the Maxwell velocity distribution. It is concluded that in classical mechanics of mass points there are no other additive conservation laws besides of energy, momentum, angular momentum and center of mass motion. A generator is considered of a symmetry transformation defined as integral over a conserved local current density where the latter, in general, needs not be covariant under translations

  16. Protocol for ADDITION-PRO

    DEFF Research Database (Denmark)

    Johansen, Nanna Borup; Hansen, Anne-Louise Smidt; Jensen, Troels M

    2012-01-01

    disease and microvascular diabetic complications. We also require a better understanding of the mechanisms that underlie and drive early changes in cardiometabolic physiology. The ADDITION-PRO study was designed to address these issues among individuals at different levels of diabetes risk recruited from...... Danish primary care. METHODS/DESIGN: ADDITION-PRO is a population-based, longitudinal cohort study of individuals at high risk for diabetes. 16,136 eligible individuals were identified at high risk following participation in a stepwise screening programme in Danish general practice between 2001 and 2006....... All individuals with impaired glucose regulation at screening, those who developed diabetes following screening, and a random sub-sample of those at lower levels of diabetes risk were invited to attend a follow-up health assessment in 2009-2011 (n=4,188), of whom 2,082 (50%) attended. The health...

  17. Additive theory of prime numbers

    CERN Document Server

    Hua, L K

    2009-01-01

    Loo-Keng Hua was a master mathematician, best known for his work using analytic methods in number theory. In particular, Hua is remembered for his contributions to Waring's Problem and his estimates of trigonometric sums. Additive Theory of Prime Numbers is an exposition of the classic methods as well as Hua's own techniques, many of which have now also become classic. An essential starting point is Vinogradov's mean-value theorem for trigonometric sums, which Hua usefully rephrases and improves. Hua states a generalized version of the Waring-Goldbach problem and gives asymptotic formulas for the number of solutions in Waring's Problem when the monomial x^k is replaced by an arbitrary polynomial of degree k. The book is an excellent entry point for readers interested in additive number theory. It will also be of value to those interested in the development of the now classic methods of the subject.

  18. Dolomitic lime containing hydraulic additive

    International Nuclear Information System (INIS)

    Lagzdina, S.; Sedmalis, U.; Bidermanis, L.; Liepins, J.; Grosvalds, I.

    1997-01-01

    To obtain qualitative dolomitic lime the optimum calcination temperature of dolomite containing about 9 % of clayey substances is 900 deg C. The mechanical strength of dolomitic lime containing 30 % of brick waste additive after 6-9 months of hardening is 1.4-1.5 times higher than that of samples without hydraulic additive, for calcium lime - 2.2-2.6 times higher. Generally the mechanical strength of dolomitic lime is higher than that one of calcium lime. It can be explained by the active role of MgO in the hydration and hardening processes of dolomitic lime. Xray diffraction phase analysis was performed by X-ray diffractometer DPON-3M with Cu-K α emission filter

  19. Decontamination formulation with sorbent additive

    Science.gov (United States)

    Tucker; Mark D. , Comstock; Robert H.

    2007-10-16

    A decontamination formulation and method of making that neutralizes the adverse health effects of both chemical and biological compounds, especially chemical warfare (CW) and biological warfare (BW) agents, and toxic industrial chemicals. The formulation provides solubilizing compounds that serve to effectively render the chemical and biological compounds, particularly CW and BW compounds, susceptible to attack, and at least one reactive compound that serves to attack (and detoxify or kill) the compound. The formulation includes at least one solubilizing agent, a reactive compound, a bleaching activator, a sorbent additive, and water. The highly adsorbent, water-soluble sorbent additive (e.g., sorbitol or mannitol) is used to "dry out" one or more liquid ingredients, such as the liquid bleaching activator (e.g., propylene glycol diacetate or glycerol diacetate) and convert the activator into a dry, free-flowing powder that has an extended shelf life, and is more convenient to handle and mix in the field.

  20. The Frontiers of Additive Manufacturing

    Energy Technology Data Exchange (ETDEWEB)

    Grote, Christopher John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-03-03

    Additive manufacturing, more commonly known as 3-D printing, has become a ubiquitous tool in science for its precise control over mechanical design. For additive manufacturing to work, a 3-D structure is split into thin 2D slices, and then different physical properties, such as photo-polymerization or melting, are used to grow the sequential layers. The level of control allows not only for devices to be made with a variety of materials: e.g. plastics, metals, and quantum dots, but to also have finely controlled structures leading to other novel properties. While 3-D printing is widely used by hobbyists for making models, it also has industrial applications in structural engineering, biological tissue scaffolding, customized electric circuitry, fuel cells, security, and more.

  1. Minimum Additive Waste Stabilization (MAWS)

    International Nuclear Information System (INIS)

    1994-02-01

    In the Minimum Additive Waste Stabilization(MAWS) concept, actual waste streams are utilized as additive resources for vitrification, which may contain the basic components (glass formers and fluxes) for making a suitable glass or glassy slag. If too much glass former is present, then the melt viscosity or temperature will be too high for processing; while if there is too much flux, then the durability may suffer. Therefore, there are optimum combinations of these two important classes of constituents depending on the criteria required. The challenge is to combine these resources in such a way that minimizes the use of non-waste additives yet yields a processable and durable final waste form for disposal. The benefit to this approach is that the volume of the final waste form is minimized (waste loading maximized) since little or no additives are used and vitrification itself results in volume reduction through evaporation of water, combustion of organics, and compaction of the solids into a non-porous glass. This implies a significant reduction in disposal costs due to volume reduction alone, and minimizes future risks/costs due to the long term durability and leach resistance of glass. This is accomplished by using integrated systems that are both cost-effective and produce an environmentally sound waste form for disposal. individual component technologies may include: vitrification; thermal destruction; soil washing; gas scrubbing/filtration; and, ion-exchange wastewater treatment. The particular combination of technologies will depend on the waste streams to be treated. At the heart of MAWS is vitrification technology, which incorporates all primary and secondary waste streams into a final, long-term, stabilized glass wasteform. The integrated technology approach, and view of waste streams as resources, is innovative yet practical to cost effectively treat a broad range of DOE mixed and low-level wastes

  2. Trust Trust Me (The Additivity)

    OpenAIRE

    Mano , Ken; Sakurada , Hideki; Tsukada , Yasuyuki

    2017-01-01

    Part 4: Trust Metrics; International audience; We present a mathematical formulation of a trust metric using a quality and quantity pair. Under a certain assumption, we regard trust as an additive value and define the soundness of a trust computation as not to exceed the total sum. Moreover, we point out the importance of not only soundness of each computed trust but also the stability of the trust computation procedure against changes in trust value assignment. In this setting, we define tru...

  3. A manual on using additives

    International Nuclear Information System (INIS)

    Lee, Bong Hoon

    1991-10-01

    This book consists of five chapters, which describe plasticizer ; summary, synthesis of plasticizer, basic notion, analysis and test on plasticizer, stabilizer ; stabilizer for plastic, an antioxidant, phosphorous acid estelle, ultraviolet ray absorbent, performance of stabilizer, influence on another additives, mix case of PVC production and analysis method for stabilizer, ultraviolet ray absorbent ; basic property and ultraviolet ray absorbent maker, anti-static agent ; basics, anti-static agent of a high molecule and analysis of anti-static agent, flame retardant of plastic.

  4. Additive property of separative power

    International Nuclear Information System (INIS)

    Yamamoto, Ichiro; Kanagawa, Akira

    1980-01-01

    A separative power of a separating element, whose heads and tails separation factors are α and β, is expressed by phi sub(b)(α, β) = [α(β - 1)1n α - (α - 1)1n β]/(αβ - 1) for the unit flow of the desired material and phi sub(a)(α, β) (= phi sub(b)(β, α)) for that of undesired material. The additive properties of the functions phi sub(b) and phi sub(a) were demonstrated by calculations of various types of ideal cascades, but the origin of the property is not obvious. The present study has furnished the mathematical basis of the additivity based on the special functional equation. First, for symmetric processes (α = β), the functional equation which describes the function representing the quality of separation f(α, α) concerning the desired material was obtained and solved to give the functional form of f(α, α). The result was extented to the function f(α, β) representing the quality of asymmetric separation (α not equal β). The derived function f(α, β) was demonstrated to be equal to phi sub(b)(α, β), and it was verified that functions phi sub(b)(α, β) and phi sub(a)(α, β) have the additive property in themselves. (author)

  5. Evaluation of certain food additives.

    Science.gov (United States)

    2009-01-01

    This report represents the conclusions of a Joint FAO/WHO Expert Committee convened to evaluate the safety of various food additives, including flavouring agents, with a view to recommending acceptable daily intakes (ADIs) and to preparing specifications for identity and purity. The first part of the report contains a general discussion of the principles governing the toxicological evaluation and assessment of intake of food additives (in particular, flavouring agents). A summary follows of the Committee's evaluations of technical, toxicological and intake data for certain food additives (asparaginase from Aspergillus niger expressed in A. niger, calcium lignosulfonate (40-65), ethyl lauroyl arginate, paprika extract, phospholipase C expressed in Pichia pastoris, phytosterols, phytostanols and their esters, polydimethylsiloxane, steviol glycosides and sulfites [assessment of dietary exposure]) and 10 groups of related flavouring agents (aliphatic branched-chain saturated and unsaturated alcohols, aldehydes, acids and related esters; aliphatic linear alpha,beta-unsaturated aldehydes, acids and related alcohols, acetals and esters; aliphatic secondary alcohols, ketones and related esters; alkoxy-substituted allylbenzenes present in foods and essential oils and used as flavouring agents; esters of aliphatic acyclic primary alcohols with aliphatic linear saturated carboxylic acids; furan-substituted aliphatic hydrocarbons, alcohols, aldehydes, ketones, carboxylic acids and related esters, sulfides, disulfides and ethers; miscellaneous nitrogen-containing substances; monocyclic and bicyclic secondary alcohols, ketones and related esters; hydroxy- and alkoxy-substituted benzyl derivatives; and substances structurally related to menthol). Specifications for the following food additives were revised: canthaxanthin; carob bean gum and carob bean gum (clarified); chlorophyllin copper complexes, sodium and potassium salts; Fast Green FCF; guar gum and guar gum (clarified

  6. Biocompatibility of photopolymers for additive manufacturing

    Directory of Open Access Journals (Sweden)

    Leonhardt Stefan

    2016-09-01

    Full Text Available To establish photopolymers for the production of class II or class III medical products by additive manufacturing it is essential to know which components of photopolymeric systems, consisting of monomers, photoinitiators and additives, are the determining factors on their biocompatible properties. In this study the leachable substances of a cured photopolymeric system were eluted and identified by HPLC-MS detection. In addition the cured photopolymer was testes for cytotoxicity and genotoxicity according to DIN EN ISO 10993 for long time applications. The results showed that uncured residual monomers are the determining factor on the biocompatible properties of the photopolymeric system. Strategies to reduce these residual monomers in the cured photopolymer are presented.

  7. Additive Manufacturing of Porous Metal

    Energy Technology Data Exchange (ETDEWEB)

    Dehoff, Ryan R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Kirka, Michael M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-06-01

    Currently, helium is obtained through separation from natural gas. The current industrial process incurs significant costs and requires large energy resources to successfully achieve separation. Through utilizing Additive Manufacturing (AM) technologies it is possible to reduce both of these burdens when refining helium gas. The ability to engineer porosity levels within Inconel 718 discs for controlled separation of helium from natural gas was investigated. Arrays of samples fabricated using the electron beam melting process were analyzed for their relative porosity density. Based upon the measurements, full scale discs were fabricated, and subsequently tested to determine their effectiveness in separating helium from liquefied natural gas.

  8. Fuel and Additive Characterization for HCCI Combustion

    International Nuclear Information System (INIS)

    Aceves, S M; Flowers, D; Martinez-Frias, J; Espinosa-Loza, F; Pitz, W J; Dibble, R

    2003-01-01

    This paper shows a numerical evaluation of fuels and additives for HCCl combustion. First, a long list of candidate HCCl fuels is selected. For all the fuels in the list, operating conditions (compression ratio, equivalence ratio and intake temperature) are determined that result in optimum performance under typical operation for a heavy-duty engine. Fuels are also characterized by presenting Log(p)-Log(T) maps for multiple fuels under HCCl conditions. Log(p)-Log(T) maps illustrate important processes during HCCl engine operation, including compression, low temperature heat release and ignition. Log(p)-Log(T) diagrams can be used for visualizing these processes and can be used as a tool for detailed analysis of HCCl combustion. The paper also includes a ranking of many potential additives. Experiments and analyses have indicated that small amounts (a few parts per million) of secondary fuels (additives) may considerably affect HCCl combustion and may play a significant role in controlling HCCl combustion. Additives are ranked according to their capability to advance HCCl ignition. The best additives are listed and an explanation of their effect on HCCl combustion is included

  9. Additive manufacturing of RF absorbers

    Science.gov (United States)

    Mills, Matthew S.

    The ability of additive manufacturing techniques to fabricate integrated electromagnetic absorbers tuned for specific radio frequency bands within structural composites allows for unique combinations of mechanical and electromagnetic properties. These composites and films can be used for RF shielding of sensitive electromagnetic components through in-plane and out-of-plane RF absorption. Structural composites are a common building block of many commercial platforms. These platforms may be placed in situations in which there is a need for embedded RF absorbing properties along with structural properties. Instead of adding radar absorbing treatments to the external surface of existing structures, which adds increased size, weight and cost; it could prove to be advantageous to integrate the microwave absorbing properties directly into the composite during the fabrication process. In this thesis, a method based on additive manufacturing techniques of composites structures with prescribed electromagnetic loss, within the frequency range 1 to 26GHz, is presented. This method utilizes screen printing and nScrypt micro dispensing to pattern a carbon based ink onto low loss substrates. The materials chosen for this study will be presented, and the fabrication technique that these materials went through to create RF absorbing structures will be described. The calibration methods used, the modeling of the RF structures, and the applications in which this technology can be utilized will also be presented.

  10. Mechanics of additively manufactured biomaterials.

    Science.gov (United States)

    Zadpoor, Amir A

    2017-06-01

    Additive manufacturing (3D printing) has found many applications in healthcare including fabrication of biomaterials as well as bioprinting of tissues and organs. Additively manufactured (AM) biomaterials may possess arbitrarily complex micro-architectures that give rise to novel mechanical, physical, and biological properties. The mechanical behavior of such porous biomaterials including their quasi-static mechanical properties and fatigue resistance is not yet well understood. It is particularly important to understand the relationship between the designed micro-architecture (topology) and the resulting mechanical properties. The current special issue is dedicated to understanding the mechanical behavior of AM biomaterials. Although various types of AM biomaterials are represented in the special issue, the primary focus is on AM porous metallic biomaterials. As a prelude to this special issue, this editorial reviews some of the latest findings in the mechanical behavior of AM porous metallic biomaterials so as to describe the current state-of-the-art and set the stage for the other studies appearing in the issue. Some areas that are important for future research are also briefly mentioned. Copyright © 2017 Elsevier Ltd. All rights reserved.

  11. Additive versus multiplicative muon conservation

    International Nuclear Information System (INIS)

    Nemethy, P.

    1981-01-01

    Experimental elucidation of the question of muon conservation is reviewed. It is shown that neutral-current experiments have not yet yielded information about muonium-antimuonium conversion at the weak-interaction level and that all the charged-current experiments agree that there is no evidence for a multiplicative law. The best limits, from the muon-decay neutrino experiment at LAMPF and from the inverse muon-decay experiment in the CERN neutrino beam, definitely exclude multiplicative law schemes with a branching ratio R approximately 1/2. It is concluded that unless the dynamics conspire to make a multiplicative law with very small R it would appear that muon conservation obeys conserved additive lepton flavor law. (U.K.)

  12. An Additive Manufacturing Test Artifact

    Science.gov (United States)

    Moylan, Shawn; Slotwinski, John; Cooke, April; Jurrens, Kevin; Donmez, M Alkan

    2014-01-01

    A test artifact, intended for standardization, is proposed for the purpose of evaluating the performance of additive manufacturing (AM) systems. A thorough analysis of previously proposed AM test artifacts as well as experience with machining test artifacts have inspired the design of the proposed test artifact. This new artifact is designed to provide a characterization of the capabilities and limitations of an AM system, as well as to allow system improvement by linking specific errors measured in the test artifact to specific sources in the AM system. The proposed test artifact has been built in multiple materials using multiple AM technologies. The results of several of the builds are discussed, demonstrating how the measurement results can be used to characterize and improve a specific AM system. PMID:26601039

  13. Business models for additive manufacturing

    DEFF Research Database (Denmark)

    Hadar, Ronen; Bilberg, Arne; Bogers, Marcel

    2015-01-01

    Digital fabrication — including additive manufacturing (AM), rapid prototyping and 3D printing — has the potential to revolutionize the way in which products are produced and delivered to the customer. Therefore, it challenges companies to reinvent their business model — describing the logic...... of creating and capturing value. In this paper, we explore the implications that AM technologies have for manufacturing systems in the new business models that they enable. In particular, we consider how a consumer goods manufacturer can organize the operations of a more open business model when moving from...... a manufacturer-centric to a consumer-centric value logic. A major shift includes a move from centralized to decentralized supply chains, where consumer goods manufacturers can implement a “hybrid” approach with a focus on localization and accessibility or develop a fully personalized model where the consumer...

  14. Additive manufacturing with polypropylene microfibers.

    Science.gov (United States)

    Haigh, Jodie N; Dargaville, Tim R; Dalton, Paul D

    2017-08-01

    The additive manufacturing of small diameter polypropylene microfibers is described, achieved using a technique termed melt electrospinning writing. Sequential fiber layering, which is important for accurate three-dimensional fabrication, was achieved with the smallest fiber diameter of 16.4±0.2μm obtained. The collector speed, temperature and melt flow rate to the nozzle were optimized for quality and minimal fiber pulsing. Of particular importance to the success of this method is appropriate heating of the collector plate, so that the electrostatically drawn filament adheres during the direct-writing process. By demonstrating the direct-writing of polypropylene, new applications exploiting the favorable mechanical, stability and biocompatible properties of this polymer are envisaged. Copyright © 2017. Published by Elsevier B.V.

  15. Additional Equipment for Soil Biodegradation

    Science.gov (United States)

    Vondráčková, Terezie; Kraus, Michal; Šál, Jiří

    2017-12-01

    Intensification of industrial production, increasing citizens’ living standards, expanding the consumer assortment mean in the production - consumption cycle a constantly increasing occurrence of waste material, which by its very nature must be considered as a source of useful raw materials in all branches of human activity. In addition to strict legislative requirements, a number of circumstances characterize waste management. It is mainly extensive transport associated with the handling and storage of large volumes of substances with a large assortment of materials (substances of all possible physical and chemical properties) and high demands on reliability and time coordination of follow-up processes. Considerable differences in transport distances, a large number of sources, processors and customers, and not least seasonal fluctuations in waste and strong price pressures cannot be overlooked. This highlights the importance of logistics in waste management. Soils that are contaminated with oil and petroleum products are hazardous industrial waste. Methods of industrial waste disposal are landfilling, biological processes, thermal processes and physical and chemical methods. The paper focuses on the possibilities of degradation of oil pollution, in particular biodegradation by bacteria, which is relatively low-cost among technologies. It is necessary to win the fight with time so that no ground water is contaminated. We have developed two additional devices to help reduce oil accident of smaller ranges. In the case of such an oil accident, it is necessary to carry out the permeability test of contaminated soil in time and, on this basis, to choose the technology appropriate to the accident - either in-sit biodegradation - at the site of the accident, or on-sit - to remove the soil and biodegrade it on the designated deposits. A special injection drill was developed for in-sit biodegradation, tossing and aeration equipment of the extracted soil was developed for

  16. Variation in the peacock's train shows a genetic component.

    Science.gov (United States)

    Petrie, Marion; Cotgreave, Peter; Pike, Thomas W

    2009-01-01

    Female peafowl (Pavo cristatus) show a strong mating preference for males with elaborate trains. This, however, poses something of a paradox because intense directional selection should erode genetic variation in the males' trains, so that females will no longer benefit by discriminating among males on the basis of these traits. This situation is known as the 'lek paradox', and leads to the theoretical expectation of low heritability in the peacock's train. We used two independent breeding experiments, involving a total of 42 sires and 86 of their male offspring, to estimate the narrow sense heritabilities of male ornaments and other morphometric traits. Contrary to expectation, we found significant levels of heritability in a trait known to be used by females during mate choice (train length), while no significant heritabilities were evident for other, non-fitness related morphological traits (tarsus length, body weight or spur length). This study adds to the building body of evidence that high levels of additive genetic variance can exist in secondary sexual traits under directional selection, but further emphasizes the main problem of what maintains this variation.

  17. Transfer of Training in Simple Addition.

    Science.gov (United States)

    Chen, Yalin; Campbell, Jamie I D

    2017-04-18

    In recent years several researchers have proposed that skilled adults may solve single-digit addition problems (e.g. 3 + 1 = 4, 4 + 3 = 7) using a fast counting procedure. Practicing a procedure, often leads to transfer of learning and faster performance of unpracticed items. Such transfer has been demonstrated using a counting-based alphabet arithmetic task (e.g., B + 4 = C D E F) that indicated robust generalization of practice (i.e., RT gains) when untrained transfer problems at test had been implicitly practiced (e.g., practice B + 3, test B + 2 or B + 1). Here we constructed analogous simple addition problems (practice 4 + 3, test 4 + 2 or 4 + 1). In each of three experiments (total n = 108) participants received six practice blocks followed by two test blocks of new problems to examine generalization effects. Practice of addition identity-rule problems (i.e., 0 + N = N) showed complete transfer of RT gains made during practice to unpracticed items at test. In contrast, the addition ties (2 + 2, 3 + 3, etc.) presented large RT costs for unpracticed problems at test, but sped up substantially in the second test block. This pattern is consistent with item-specific strengthening of associative memory. The critical items were small non-tie additions (sum ≤ 10) for which the test problems would be implicitly practiced if counting was employed during practice. In all three experiments (and collectively) there was no evidence of generalization for these items in the first test block, but there was robust speed up when the items were repeated in the second test block. Thus, there was no evidence of the generalization of practice that would be expected if counting procedures mediated our participants' performance on small non-tie addition problems.

  18. Improving Rural Women Income through Cocoyam Value Addition ...

    African Journals Online (AJOL)

    User

    empowered rural women to become entrepreneurs at various levels. ... have showed that value added agriculture can be one way to preserve small farmers .... The results in Table 2 show the level of utilization of cocoyam value addition.

  19. Incommensurate crystallography without additional dimensions.

    Science.gov (United States)

    Kocian, Philippe

    2013-07-01

    It is shown that the Euclidean group of translations, when treated as a Lie group, generates translations not only in Euclidean space but on any space, curved or not. Translations are then not necessarily vectors (straight lines); they can be any curve compatible with the parameterization of the considered space. In particular, attention is drawn to the fact that one and only one finite and free module of the Lie algebra of the group of translations can generate both modulated and non-modulated lattices, the modulated character being given only by the parameterization of the space in which the lattice is generated. Moreover, it is shown that the diffraction pattern of a structure is directly linked to the action of that free and finite module. In the Fourier transform of a whole structure, the Fourier transform of the electron density of one unit cell (i.e. the structure factor) appears concretely, whether the structure is modulated or not. Thus, there exists a neat separation: the geometrical aspect on the one hand and the action of the group on the other, without requiring additional dimensions.

  20. Sustainability Characterization for Additive Manufacturing.

    Science.gov (United States)

    Mani, Mahesh; Lyons, Kevin W; Gupta, S K

    2014-01-01

    Additive manufacturing (AM) has the potential to create geometrically complex parts that require a high degree of customization, using less material and producing less waste. Recent studies have shown that AM can be an economically viable option for use by the industry, yet there are some inherent challenges associated with AM for wider acceptance. The lack of standards in AM impedes its use for parts production since industries primarily depend on established standards in processes and material selection to ensure the consistency and quality. Inability to compare AM performance against traditional manufacturing methods can be a barrier for implementing AM processes. AM process sustainability has become a driver due to growing environmental concerns for manufacturing. This has reinforced the importance to understand and characterize AM processes for sustainability. Process characterization for sustainability will help close the gaps for comparing AM performance to traditional manufacturing methods. Based on a literature review, this paper first examines the potential environmental impacts of AM. A methodology for sustainability characterization of AM is then proposed to serve as a resource for the community to benchmark AM processes for sustainability. Next, research perspectives are discussed along with relevant standardization efforts.

  1. Utilization of curve offsets in additive manufacturing

    Science.gov (United States)

    Haseltalab, Vahid; Yaman, Ulas; Dolen, Melik

    2018-05-01

    Curve offsets are utilized in different fields of engineering and science. Additive manufacturing, which lately becomes an explicit requirement in manufacturing industry, utilizes curve offsets widely. One of the necessities of offsetting is for scaling which is required if there is shrinkage after the fabrication or if the surface quality of the resulting part is unacceptable. Therefore, some post-processing is indispensable. But the major application of curve offsets in additive manufacturing processes is for generating head trajectories. In a point-wise AM process, a correct tool-path in each layer can reduce lots of costs and increase the surface quality of the fabricated parts. In this study, different curve offset generation algorithms are analyzed to show their capabilities and disadvantages through some test cases and improvements on their drawbacks are suggested.

  2. Evolution of solidification texture during additive manufacturing

    Science.gov (United States)

    Wei, H. L.; Mazumder, J.; DebRoy, T.

    2015-01-01

    Striking differences in the solidification textures of a nickel based alloy owing to changes in laser scanning pattern during additive manufacturing are examined based on theory and experimental data. Understanding and controlling texture are important because it affects mechanical and chemical properties. Solidification texture depends on the local heat flow directions and competitive grain growth in one of the six preferred growth directions in face centered cubic alloys. Therefore, the heat flow directions are examined for various laser beam scanning patterns based on numerical modeling of heat transfer and fluid flow in three dimensions. Here we show that numerical modeling can not only provide a deeper understanding of the solidification growth patterns during the additive manufacturing, it also serves as a basis for customizing solidification textures which are important for properties and performance of components. PMID:26553246

  3. Additive derivations on algebras of measurable operators

    International Nuclear Information System (INIS)

    Ayupov, Sh.A.; Kudaybergenov, K.K.

    2009-08-01

    Given a von Neumann algebra M we introduce the so-called central extension mix(M) of M. We show that mix(M) is a *-subalgebra in the algebra LS(M) of all locally measurable operators with respect to M, and this algebra coincides with LS(M) if and only if M does not admit type II direct summands. We prove that if M is a properly infinite von Neumann algebra then every additive derivation on the algebra mix(M) is inner. This implies that on the algebra LS(M), where M is a type I ∞ or a type III von Neumann algebra, all additive derivations are inner derivations. (author)

  4. Drag reduction by natural polymeric additives in PMDS microchannel: Effect of types of additives

    Directory of Open Access Journals (Sweden)

    Ling Fiona W.M.

    2017-01-01

    Full Text Available Drag reduction technology was used in medical applications to enhance the blood flow in semiclogged blood streams which can be an alternative treatment for atherosclerosis. In this present study, natural polymeric drag reducing additives (DRA was introduced to replace synthetic polymer which has the possibility of bringing side effects to human health. Three different sources, namely okra, aloe vera and hibiscus were utilized to extract the natural polymeric additives which were then tested in custom made microchannel simulating human heart blood vessels. The performance of different types of additives was evaluated using pressure measurements. The maximum drag reduction up to 63.48% is achieved using 300 ppm of hibiscus mucilage at operating pressure of 50 mbar. In this present work, hibiscus showed the best drag reduction performance, giving the highest %FI in most of the cases. This experimental results proved that these natural polymeric additives could be utilized as DRA in enhancing the blood flow in semiclogged blood streams.

  5. Hide and vanish: data sets where the most parsimonious tree is known but hard to find, and their implications for tree search methods.

    Science.gov (United States)

    Goloboff, Pablo A

    2014-10-01

    Three different types of data sets, for which the uniquely most parsimonious tree can be known exactly but is hard to find with heuristic tree search methods, are studied. Tree searches are complicated more by the shape of the tree landscape (i.e. the distribution of homoplasy on different trees) than by the sheer abundance of homoplasy or character conflict. Data sets of Type 1 are those constructed by Radel et al. (2013). Data sets of Type 2 present a very rugged landscape, with narrow peaks and valleys, but relatively low amounts of homoplasy. For such a tree landscape, subjecting the trees to TBR and saving suboptimal trees produces much better results when the sequence of clipping for the tree branches is randomized instead of fixed. An unexpected finding for data sets of Types 1 and 2 is that starting a search from a random tree instead of a random addition sequence Wagner tree may increase the probability that the search finds the most parsimonious tree; a small artificial example where these probabilities can be calculated exactly is presented. Data sets of Type 3, the most difficult data sets studied here, comprise only congruent characters, and a single island with only one most parsimonious tree. Even if there is a single island, missing entries create a very flat landscape which is difficult to traverse with tree search algorithms because the number of equally parsimonious trees that need to be saved and swapped to effectively move around the plateaus is too large. Minor modifications of the parameters of tree drifting, ratchet, and sectorial searches allow travelling around these plateaus much more efficiently than saving and swapping large numbers of equally parsimonious trees with TBR. For these data sets, two new related criteria for selecting taxon addition sequences in Wagner trees (the "selected" and "informative" addition sequences) produce much better results than the standard random or closest addition sequences. These new methods for Wagner

  6. Additional chromosome abnormalities in chronic myeloid leukemia

    Directory of Open Access Journals (Sweden)

    Hui-Hua Hsiao

    2011-02-01

    Full Text Available The Philadelphia (Ph chromosome and/or Breakpoint cluster region-Abelson leukemia virus oncogene transcript are unique markers for chronic myeloid leukemia (CML. However, CML demonstrates heterogeneous presentations and outcomes. We analyzed the cytogenetic and molecular results of CML patients to evaluate their correlation with clinical presentations and outcome. A total of 84 newly diagnosed CML patients were enrolled in the study. Patients were treated according to disease status. Bone marrow samples were obtained to perform cytogenetic and molecular studies. Clinical presentations, treatment courses, and survival were reviewed retrospectively. Among 84 patients, 72 had chronic phase and 12 had accelerated phase CML. Cytogenetic study showed 69 (82.1% with the classic Ph chromosome, 6 (7.2% with a variant Ph chromosome, and 9 (10.7% with additional chromosome abnormalities. Fifty-four (64.3% cases harbored b3a2 transcripts, 29 (34.5% had b2a2 transcript, and 1 had e19a2 transcript. There was no difference in clinical presentations between different cytogenetic and molecular groups; however, additional chromosome abnormalities were significantly associated with the accelerated phase. Imatinib therapy was an effective treatment, as measured by cytogenetic response, when administered as first- and second-line therapy in chronic phase patients. Survival analysis showed that old age, additional chromosome abnormalities, high Sokal score, and no cytogenetic response in second-line therapy had a significant poor impact (p<0.05. In conclusion, we presented the cytogenetic and molecular pattern of CML patients and demonstrated that the additional chromosome abnormality was associated with poor outcome.

  7. Additive Manufacturing of Fuel Injectors

    Energy Technology Data Exchange (ETDEWEB)

    Sadek Tadros, Dr. Alber Alphonse [Edison Welding Institute, Inc., Columbus, OH (United States); Ritter, Dr. George W. [Edison Welding Institute, Inc., Columbus, OH (United States); Drews, Charles Donald [Edison Welding Institute, Inc., Columbus, OH (United States); Ryan, Daniel [Solar Turbines Inc., San Diego, CA (United States)

    2017-10-24

    Additive manufacturing (AM), also known as 3D-printing, has been shifting from a novelty prototyping paradigm to a legitimate manufacturing tool capable of creating components for highly complex engineered products. An emerging AM technology for producing metal parts is the laser powder bed fusion (L-PBF) process; however, industry manufacturing specifications and component design practices for L-PBF have not yet been established. Solar Turbines Incorporated (Solar), an industrial gas turbine manufacturer, has been evaluating AM technology for development and production applications with the desire to enable accelerated product development cycle times, overall turbine efficiency improvements, and supply chain flexibility relative to conventional manufacturing processes (casting, brazing, welding). Accordingly, Solar teamed with EWI on a joint two-and-a-half-year project with the goal of developing a production L-PBF AM process capable of consistently producing high-nickel alloy material suitable for high temperature gas turbine engine fuel injector components. The project plan tasks were designed to understand the interaction of the process variables and their combined impact on the resultant AM material quality. The composition of the high-nickel alloy powders selected for this program met the conventional cast Hastelloy X compositional limits and were commercially available in different particle size distributions (PSD) from two suppliers. Solar produced all the test articles and both EWI and Solar shared responsibility for analyzing them. The effects of powder metal input stock, laser parameters, heat treatments, and post-finishing methods were evaluated. This process knowledge was then used to generate tensile, fatigue, and creep material properties data curves suitable for component design activities. The key process controls for ensuring consistent material properties were documented in AM powder and process specifications. The basic components of the project

  8. Additional Samples: Where They Should Be Located

    International Nuclear Information System (INIS)

    Pilger, G. G.; Costa, J. F. C. L.; Koppe, J. C.

    2001-01-01

    Information for mine planning requires to be close spaced, if compared to the grid used for exploration and resource assessment. The additional samples collected during quasimining usually are located in the same pattern of the original diamond drillholes net but closer spaced. This procedure is not the best in mathematical sense for selecting a location. The impact of an additional information to reduce the uncertainty about the parameter been modeled is not the same everywhere within the deposit. Some locations are more sensitive in reducing the local and global uncertainty than others. This study introduces a methodology to select additional sample locations based on stochastic simulation. The procedure takes into account data variability and their spatial location. Multiple equally probable models representing a geological attribute are generated via geostatistical simulation. These models share basically the same histogram and the same variogram obtained from the original data set. At each block belonging to the model a value is obtained from the n simulations and their combination allows one to access local variability. Variability is measured using an uncertainty index proposed. This index was used to map zones of high variability. A value extracted from a given simulation is added to the original data set from a zone identified as erratic in the previous maps. The process of adding samples and simulation is repeated and the benefit of the additional sample is evaluated. The benefit in terms of uncertainty reduction is measure locally and globally. The procedure showed to be robust and theoretically sound, mapping zones where the additional information is most beneficial. A case study in a coal mine using coal seam thickness illustrates the method

  9. Pumilio2-deficient mice show a predisposition for epilepsy

    Directory of Open Access Journals (Sweden)

    Philipp Follwaczny

    2017-11-01

    Full Text Available Epilepsy is a neurological disease that is caused by abnormal hypersynchronous activities of neuronal ensembles leading to recurrent and spontaneous seizures in human patients. Enhanced neuronal excitability and a high level of synchrony between neurons seem to trigger these spontaneous seizures. The molecular mechanisms, however, regarding the development of neuronal hyperexcitability and maintenance of epilepsy are still poorly understood. Here, we show that pumilio RNA-binding family member 2 (Pumilio2; Pum2 plays a role in the regulation of excitability in hippocampal neurons of weaned and 5-month-old male mice. Almost complete deficiency of Pum2 in adult Pum2 gene-trap mice (Pum2 GT causes misregulation of genes involved in neuronal excitability control. Interestingly, this finding is accompanied by the development of spontaneous epileptic seizures in Pum2 GT mice. Furthermore, we detect an age-dependent increase in Scn1a (Nav1.1 and Scn8a (Nav1.6 mRNA levels together with a decrease in Scn2a (Nav1.2 transcript levels in weaned Pum2 GT that is absent in older mice. Moreover, field recordings of CA1 pyramidal neurons show a tendency towards a reduced paired-pulse inhibition after stimulation of the Schaffer-collateral-commissural pathway in Pum2 GT mice, indicating a predisposition to the development of spontaneous seizures at later stages. With the onset of spontaneous seizures at the age of 5 months, we detect increased protein levels of Nav1.1 and Nav1.2 as well as decreased protein levels of Nav1.6 in those mice. In addition, GABA receptor subunit alpha-2 (Gabra2 mRNA levels are increased in weaned and adult mice. Furthermore, we observe an enhanced GABRA2 protein level in the dendritic field of the CA1 subregion in the Pum2 GT hippocampus. We conclude that altered expression levels of known epileptic risk factors such as Nav1.1, Nav1.2, Nav1.6 and GABRA2 result in enhanced seizure susceptibility and manifestation of epilepsy in the

  10. Nonparametric additive regression for repeatedly measured data

    KAUST Repository

    Carroll, R. J.

    2009-05-20

    We develop an easily computed smooth backfitting algorithm for additive model fitting in repeated measures problems. Our methodology easily copes with various settings, such as when some covariates are the same over repeated response measurements. We allow for a working covariance matrix for the regression errors, showing that our method is most efficient when the correct covariance matrix is used. The component functions achieve the known asymptotic variance lower bound for the scalar argument case. Smooth backfitting also leads directly to design-independent biases in the local linear case. Simulations show our estimator has smaller variance than the usual kernel estimator. This is also illustrated by an example from nutritional epidemiology. © 2009 Biometrika Trust.

  11. Managing water addition to a degraded core

    International Nuclear Information System (INIS)

    Kuan, P.; Hanson, D.J.; Odar, F.

    1992-01-01

    In this paper the authors present information that can be used in severe accident management by providing an improved understanding of the effects of water addition to a degraded core. This improved understanding is developed using a diagram showing a sequence of core damage states. Whenever possible, a temperature and a time after accident initiation are estimated for each damage state in the sequence diagram. This diagram can be used to anticipate the evolution of events during an accident. Possible responses of plant instruments are described to identify these damage states and the effects of water addition. The rate and amount of water addition needed (a) to remove energy from the core, (b) to stabilize the core or (c) to not adversely affect the damage progression, are estimated. Analysis of the capability to remove energy from large cohesive and particulate debris beds indicates that these beds may not be stabilized in the core region and they may partially relocate to the lower plenum of the reactor vessel

  12. How many food additives are rodent carcinogens?

    Science.gov (United States)

    Johnson, F M

    2002-01-01

    One generally assumes that chemical agents added to foods are reasonably free of risks to human health, and practically everyone consumes some additives in his or her food daily throughout life. In the United States, the 1958 Food Additives Amendment to the Federal Food, Drug and Cosmetic Act of 1938 requires food manufacturers to demonstrate the safety of food additives to the Food and Drug Administration (FDA). The Amendment contains a provision that prohibits approval of an additive if it is found to cause cancer in humans or animals. In the present study, data from the National Toxicology Program rodent bioassay (NTPRB) were used to identify a sample of approximately 50 rodent-tested additives and other chemicals added to food that had been evaluated independently of the FDA/food industry. Surprisingly, the sample shows more than 40% of these food chemicals to be carcinogenic in one or more rodent groups. If this percentage is extrapolated to all substances added to food in the United States, it would imply that more than 1000 of such substances are potential rodent carcinogens. The NTP and FDA test guidelines use similar, though not necessarily identical, rodent test procedures, including near lifetime exposures to the maximum tolerated dose. The FDA specifies that test chemicals should be administered by the oral route. However, the oral route includes three methods of delivering chemicals, that is, mixed in the food or water or delivered by stomach tube (gavage). The NTP data show only 1 of 18 food chemicals mixed in the food are rodent carcinogens, but 16 of 23 gavage-administered food chemicals are carcinogenic to rodents. The distribution suggests that among orally delivered chemicals, those administered in the feed will more likely prove to be noncarcinogens than chemicals given by gavage. The rodent data also reveal that effects may vary according to dose and genotype, as well as by route of administration, to further complicate extrapolation to humans

  13. Characterizations of additive manufactured porous titanium implants.

    Science.gov (United States)

    Basalah, Ahmad; Shanjani, Yaser; Esmaeili, Shahrzad; Toyserkani, Ehsan

    2012-10-01

    This article describes physical, chemical, and mechanical characterizations of porous titanium implants made by an additive manufacturing method to gain insight into the correlation of process parameters and final physical properties of implants used in orthopedics. For the manufacturing chain, the powder metallurgy technology was combined with the additive manufacturing to fabricate the porous structure from the pure tanium powder. A 3D printing machine was employed in this study to produce porous bar samples. A number of physical parameters such as titanium powder size, polyvinyl alcohol (PVA) amount, sintering temperature and time were investigated to control the mechanical properties and porosity of the structures. The produced samples were characterized through porosity and shrinkage measurements, mechanical compression test and scanning electron microscopy (SEM). The results showed a level of porosity in the samples in the range of 31-43%, which is within the range of the porosity of the cancelluous bone and approaches the range of the porosity of the cortical bone. The results of the mechanical test showed that the compressive strength is in the wide range of 56-509 MPa implying the effect of the process parameters on the mechanical strengths. This technique of manufacturing of Ti porous structures demonstrated a low level of shrinkage with the shrinkage percentage ranging from 1.5 to 5%. Copyright © 2012 Wiley Periodicals, Inc.

  14. Stabilized zirconia with cerium and neodymium addition

    International Nuclear Information System (INIS)

    Andrade, I.M. de; Pessoa, R.C.; Nasar, M.C.; Nasar, R.S.; Rodriques, M.K.C.; Oliveira, J.F.

    2006-01-01

    Zr 0,9 Ce 0,05 Nd 0,05 O 1,975 system was synthesized with the use of the Pechini method. The polymeric resin was calcined at 350 deg C/3 h and analysed by FTIR that show bands relative to organic. Radicals esther type. The TGA curve indicated the polymeric decomposition occurring from 30 deg C to 740 deg C. DTA analysis show a exothermic peak in 100 deg C due to loss of water of material. From 500 deg C to 800 deg C was observed a intense peak due to polymer decomposition and the zirconia crystallization. The calcined powder from 350 deg C/3 h e 30 min to 900 deg/3 h were analysed by XRD that show the crystalline phase formation with the increase of temperature. The X-ray diffraction pattern show the presence of two phases, such as tetragonal and cubic of zirconia demonstrating that neodymium and cerium additions led to zirconia stabilization. (author)

  15. Best practices show the way to information security maturity

    CSIR Research Space (South Africa)

    Lessing, MM

    2008-09-01

    Full Text Available A Security Maturity Model (SMM) provides an organisation with a distinct Information Security framework. Organisations that conform to these models are likely to pursue satisfactory Information Security. Additionally, the use of Security Maturity...

  16. Free Recall Shows Similar Reactivation Behavior as Recognition & Cued Recall

    OpenAIRE

    Tarnow, Eugen

    2016-01-01

    I find that the total retrieval time in word free recall increases linearly with the total number of items recalled. Measured slopes, the time to retrieve an additional item, vary from 1.4-4.5 seconds per item depending upon presentation rate, subject age and whether there is a delay after list presentation or not. These times to retrieve an additional item obey a second linear relationship as a function of the recall probability averaged over the experiment, explicitly independent of subject...

  17. Ação de diferentes agentes curtentes utilizados no curtimento de peles de coelhos: testes físico-mecânicos dos couros = Action of different tanning agents used on rabbit hide tanning: physicalmechanic tests

    Directory of Open Access Journals (Sweden)

    Nilson do Prado Franco

    2009-10-01

    Full Text Available O objetivo do experimento foi avaliar a ação de diferentes agentes curtentes no processamento das peles de coelhos, sobre a resistência do couro. Cinquenta peles de coelhos foram submetidas a diferentes agentes curtentes na etapa de curtimento (T1 = 6% sais de cromoChromossal B®, T2 = 22% tanino vegetal Clarotan-x8®; T3 = 22% tanino sintético Syntac CW®; T4 = 12% tanino vegetal Weibull® + 10% tanino sintético Syntac F®; T5 = 22% tanino vegetal Weibull®. Foram retirados os corpos de prova do couro, na região dorsal, no sentidolongitudinal e transversal em relação ao eixo céfalo-caudal. Os agentes curtentes e retirada dos corpos de prova não influenciaram no teste de tração (9,28 N mm-2 a 11,63 N mm-2 e força aplicada (17,91 N a 24,85 N nos testes. Os curtimentos com sais de cromo (62,85% e Clarotan–x8® (70,28% proporcionaram maiores valores de alongamento em relação aos demais agentes curtentes utilizados. Os corpos de prova do couro no sentido transversal (59,12% apresentaram maior alongamento comparado ao longitudinal (49,72%. Os curtimentos com sais de cromo (22,70 N mm-1, Clarotan–x8® (25,94 N mm-1 e Weibull® (21,58 N mm-1 proporcionaram couros com maior resistência ao rasgamento. O sentido de retirada dos corpos de prova no couro não influenciou no rasgamento progressivo. As técnicas de curtimento com sais de cromo e Clarotan-x8® proporcionaram couros com melhores valores de resistência ao alongamento e rasgamento progressivo.The objective of the experiment was to evaluate the action of different tanning agents in the processing of rabbit hides over skin resistance. Fifty skins of rabbit hides were submitted to different tanning agents in the tanning stage (T1 = 6% Chromossal B® chromesalts; T2 = 22% Clarotan–x8® vegetable tannin; T3 = 22% Syntac CW® synthetic tannin; T4 = 12% Weibull® vegetable tannin + 10% Syntac F® synthetic tannin; T5 = 22% Weibull® vegetable tannin. The specimens were removed

  18. Latest data shows long-term security of uranium supply

    International Nuclear Information System (INIS)

    2010-01-01

    Full text: According to Uranium 2009: Resources, Production and Demand just published by the OECD Nuclear En ergy Agency (NEA) and the International Atomic Energy Agency (IAEA), uranium resources, production and demand are all on the rise. Exploration efforts have increased recently in line with the expected expansion of nuclear energy in the coming years. Total identified resources have grown but so too have costs of production. Worldwide exploration and mine development expenditures have more than doubled since the publication of the previous edition, Uranium 2007: Resources, Production and Demand. These expenditures have increased despite declining uranium market prices since mid- 2007. The uranium resources presented in this edition, reflecting the situation as of 1 January 2009, show that total identified resources amounted to 6 306 300 tU, an increase of about 15% compared to 2007, including those reported in the high-cost category (< USD 260/kgU or < USD 100/lbU O), reintroduced for the first time since the 1980s. This high-cost 3 8 category was used in the 2009 edition in response to the generally increased market prices for uranium in recent years, despite the decline since mid-2007, expectations of increasing demand as new nuclear power plants are being planned and built, and increased mining costs. Although total identified resources have increased overall, there has been a significant reduction in lower-cost resources owing to increased mining costs. At 2008 rates of consumption, total identified resources are sufficient for over 100 years of supply. The recognition by an increasing number of governments that nuclear power can produce competitively priced, baseload electricity that is essentially free of greenhouse gas emissions, coupled with the role that nuclear can play in enhancing security of energy supply, increases the prospects for growth in nuclear generating capacity, although the magnitude of that growth remains to be determined. According to

  19. Payload specialist Reinhard Furrer show evidence of previous blood sampling

    Science.gov (United States)

    1985-01-01

    Payload specialist Reinhard Furrer shows evidence of previous blood sampling while Wubbo J. Ockels, Dutch payload specialist (only partially visible), extends his right arm after a sample has been taken. Both men show bruises on their arms.

  20. Influence of Therapeutic Ceftiofur Treatments of Feedlot Cattle on Fecal and Hide Prevalences of Commensal Escherichia coli Resistant to Expanded-Spectrum Cephalosporins, and Molecular Characterization of Resistant Isolates

    Science.gov (United States)

    Griffin, Dee; Kuehn, Larry A.; Brichta-Harhay, Dayna M.

    2013-01-01

    In the United States, the blaCMY-2 gene contained within incompatibility type A/C (IncA/C) plasmids is frequently identified in extended-spectrum-cephalosporin-resistant (ESCr) Escherichia coli strains from both human and cattle sources. Concerns have been raised that therapeutic use of ceftiofur in cattle may increase the prevalence of ESCr E. coli. We report that herd ESCr E. coli fecal and hide prevalences throughout the residency of cattle at a feedlot, including during the period of greatest ceftiofur use at the feedlot, were either not significantly different (P ≥ 0.05) or significantly less (P E. coli shedding that follows ceftiofur injection abated, ceftiofur-injected cattle were no more likely than untreated members of the same herd to shed ESCr E. coli. Pulsed-field gel electrophoresis (PFGE) genotyping, antibiotic resistance phenotyping, screening for presence of the blaCMY-2 gene, and plasmid replicon typing were performed on 312 ESCr E. coli isolates obtained during six sampling periods spanning the 10-month residence of cattle at the feedlot. The identification of only 26 unique PFGE genotypes, 12 of which were isolated during multiple sampling periods, suggests that clonal expansion of feedlot-adapted blaCMY-2 E. coli strains contributed more to the persistence of blaCMY-2 than horizontal transfer of IncA/C plasmids between E. coli strains at this feedlot. We conclude that therapeutic use of ceftiofur at this cattle feedlot did not significantly increase the herd prevalence of ESCr E. coli. PMID:23354706

  1. Experimental validation of an ultra-thin metasurface cloak for hiding a metallic obstacle from an antenna radiation at low frequencies

    Science.gov (United States)

    Teperik, Tatiana V.; Burokur, Shah Nawaz; de Lustrac, André; Sabanowski, Guy; Piau, Gérard-Pascal

    2017-07-01

    We demonstrate numerically and experimentally an ultra-thin (≈ λ/240) metasurface-based invisibility cloak for low frequency antenna applications. We consider a monopole antenna mounted on a ground plane and a cylindrical metallic obstacle of diameter smaller than the wavelength located in its near-field. To restore the intrinsic radiation patterns of the antenna perturbed by this obstacle, a metasurface cloak consisting simply of a metallic patch printed on a dielectric substrate is wrapped around the obstacle. Using a finite element method based commercial electromagnetic solver, we show that the radiation patterns of the monopole antenna can be restored completely owing to electromagnetic modes of the resonant cavity formed between the patch and obstacle. The metasurface cloak is fabricated, and the concept is experimentally demonstrated at 125 MHz. Performed measurements are in good agreement with numerical simulations, verifying the efficiency of the proposed cloak.

  2. The impact of multiple show-ups on eyewitness decision-making and innocence risk.

    Science.gov (United States)

    Smith, Andrew M; Bertrand, Michelle; Lindsay, R C L; Kalmet, Natalie; Grossman, Deborah; Provenzano, Daniel

    2014-09-01

    If an eyewitness rejects a show-up, police may respond by finding a new suspect and conducting a second show-up with the same eyewitness. Police may continue finding suspects and conducting show-ups until the eyewitness makes an identification (Study 1). Relatively low criterion-setting eyewitnesses filter themselves out of the multiple show-ups procedure by choosing the first suspect with whom they are presented (Studies 2 and 3). Accordingly, response bias was more stringent on the second show-up when compared with the first, but became no more stringent with additional show-ups. Despite this stringent shift in response bias, innocence risk increased with additional show-ups, as false alarms cumulate (Studies 2 and 3). Although unbiased show-up instructions decreased innocent suspect identifications, the numbers were still discouraging (Study 4). Given the high number of innocent suspects who would be mistakenly identified through the use of multiple show-up procedures, using such identifications as evidence of guilt is questionable. Although evidence of guilt is limited to identifications from a single show-up, practical constraints might sometimes require police to use additional show-ups. Accordingly, we propose a stronger partition between evidentiary and investigative procedures. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  3. Limited analytical capacity for cyanotoxins in developing countries may hide serious environmental health problems: simple and affordable methods may be the answer.

    Science.gov (United States)

    Pírez, Macarena; Gonzalez-Sapienza, Gualberto; Sienra, Daniel; Ferrari, Graciela; Last, Michael; Last, Jerold A; Brena, Beatriz M

    2013-01-15

    In recent years, the international demand for commodities has prompted enormous growth in agriculture in most South American countries. Due to intensive use of fertilizers, cyanobacterial blooms have become a recurrent phenomenon throughout the continent, but their potential health risk remains largely unknown due to the lack of analytical capacity. In this paper we report the main results and conclusions of more than five years of systematic monitoring of cyanobacterial blooms in 20 beaches of Montevideo, Uruguay, on the Rio de la Plata, the fifth largest basin in the world. A locally developed microcystin ELISA was used to establish a sustainable monitoring program that revealed seasonal peaks of extremely high toxicity, more than one-thousand-fold greater than the WHO limit for recreational water. Comparison with cyanobacterial cell counts and chlorophyll-a determination, two commonly used parameters for indirect estimation of toxicity, showed that such indicators can be highly misleading. On the other hand, the accumulated experience led to the definition of a simple criterion for visual classification of blooms, that can be used by trained lifeguards and technicians to take rapid on-site decisions on beach management. The simple and low cost approach is broadly applicable to risk assessment and risk management in developing countries. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. 77 FR 13522 - Safety Zone; Baltimore Air Show, Patapsco River, Baltimore, MD

    Science.gov (United States)

    2012-03-07

    ... public event will consist of military and civilian aircraft performing low-flying, high-speed precision... Harbor. In addition to the air show dates, military and civilian aircraft performing in the air show will...[deg]14'30'' N, longitude 076[deg]36'30'' W; thence to the point of origin. This safety zone will be...

  5. Mechanical properties of additively manufactured octagonal honeycombs

    Energy Technology Data Exchange (ETDEWEB)

    Hedayati, R., E-mail: rezahedayati@gmail.com [Department of Mechanical Engineering, Amirkabir University of Technology (Tehran Polytechnic), Hafez Ave, Tehran (Iran, Islamic Republic of); Department of Biomechanical Engineering, Faculty of Mechanical, Maritime, and Materials Engineering, Delft University of Technology (TU Delft), Mekelweg 2, 2628 CD Delft (Netherlands); Sadighi, M.; Mohammadi-Aghdam, M. [Department of Mechanical Engineering, Amirkabir University of Technology (Tehran Polytechnic), Hafez Ave, Tehran (Iran, Islamic Republic of); Zadpoor, A.A. [Department of Biomechanical Engineering, Faculty of Mechanical, Maritime, and Materials Engineering, Delft University of Technology (TU Delft), Mekelweg 2, 2628 CD Delft (Netherlands)

    2016-12-01

    Honeycomb structures have found numerous applications as structural and biomedical materials due to their favourable properties such as low weight, high stiffness, and porosity. Application of additive manufacturing and 3D printing techniques allows for manufacturing of honeycombs with arbitrary shape and wall thickness, opening the way for optimizing the mechanical and physical properties for specific applications. In this study, the mechanical properties of honeycomb structures with a new geometry, called octagonal honeycomb, were investigated using analytical, numerical, and experimental approaches. An additive manufacturing technique, namely fused deposition modelling, was used to fabricate the honeycomb from polylactic acid (PLA). The honeycombs structures were then mechanically tested under compression and the mechanical properties of the structures were determined. In addition, the Euler-Bernoulli and Timoshenko beam theories were used for deriving analytical relationships for elastic modulus, yield stress, Poisson's ratio, and buckling stress of this new design of honeycomb structures. Finite element models were also created to analyse the mechanical behaviour of the honeycombs computationally. The analytical solutions obtained using Timoshenko beam theory were close to computational results in terms of elastic modulus, Poisson's ratio and yield stress, especially for relative densities smaller than 25%. The analytical solutions based on the Timoshenko analytical solution and the computational results were in good agreement with experimental observations. Finally, the elastic properties of the proposed honeycomb structure were compared to those of other honeycomb structures such as square, triangular, hexagonal, mixed, diamond, and Kagome. The octagonal honeycomb showed yield stress and elastic modulus values very close to those of regular hexagonal honeycombs and lower than the other considered honeycombs. - Highlights: • The octagonal

  6. Object attributes combine additively in visual search.

    Science.gov (United States)

    Pramod, R T; Arun, S P

    2016-01-01

    We perceive objects as containing a variety of attributes: local features, relations between features, internal details, and global properties. But we know little about how they combine. Here, we report a remarkably simple additive rule that governs how these diverse object attributes combine in vision. The perceived dissimilarity between two objects was accurately explained as a sum of (a) spatially tuned local contour-matching processes modulated by part decomposition; (b) differences in internal details, such as texture; (c) differences in emergent attributes, such as symmetry; and (d) differences in global properties, such as orientation or overall configuration of parts. Our results elucidate an enduring question in object vision by showing that the whole object is not a sum of its parts but a sum of its many attributes.

  7. Additive Cellular Automata and Volume Growth

    Directory of Open Access Journals (Sweden)

    Thomas B. Ward

    2000-08-01

    Full Text Available Abstract: A class of dynamical systems associated to rings of S-integers in rational function fields is described. General results about these systems give a rather complete description of the well-known dynamics in one-dimensional additive cellular automata with prime alphabet, including simple formulæ for the topological entropy and the number of periodic configurations. For these systems the periodic points are uniformly distributed along some subsequence with respect to the maximal measure, and in particular are dense. Periodic points may be constructed arbitrarily close to a given configuration, and rationality of the dynamical zeta function is characterized. Throughout the emphasis is to place this particular family of cellular automata into the wider context of S-integer dynamical systems, and to show how the arithmetic of rational function fields determines their behaviour. Using a covering space the dynamics of additive cellular automata are related to a form of hyperbolicity in completions of rational function fields. This expresses the topological entropy of the automata directly in terms of volume growth in the covering space.

  8. Leaching of plastic additives to marine organisms

    International Nuclear Information System (INIS)

    Koelmans, Albert A.; Besseling, Ellen; Foekema, Edwin M.

    2014-01-01

    It is often assumed that ingestion of microplastics by aquatic species leads to increased exposure to plastic additives. However, experimental data or model based evidence is lacking. Here we assess the potential of leaching of nonylphenol (NP) and bisphenol A (BPA) in the intestinal tracts of Arenicola marina (lugworm) and Gadus morhua (North Sea cod). We use a biodynamic model that allows calculations of the relative contribution of plastic ingestion to total exposure of aquatic species to chemicals residing in the ingested plastic. Uncertainty in the most crucial parameters is accounted for by probabilistic modeling. Our conservative analysis shows that plastic ingestion by the lugworm yields NP and BPA concentrations that stay below the lower ends of global NP and BPA concentration ranges, and therefore are not likely to constitute a relevant exposure pathway. For cod, plastic ingestion appears to be a negligible pathway for exposure to NP and BPA. - Highlights: • Uptake of plastic additives after plastic ingestion was modeled for worms and fish. • This was done for bisphenol A and nonylphenol. • Uncertainty was accounted for by Monte Carlo simulations. • It appeared that exposure by plastic ingestion was negligible for fish. • Plastic ingestion may occasionally be relevant for marine worms. - Leaching of nonylphenol and bisphenol A from ingested microplastic may be relevant for the lugworm, but is irrelevant for fish like cod

  9. Additive Manufacturing of Composites and Complex Materials

    Science.gov (United States)

    Spowart, Jonathan E.; Gupta, Nikhil; Lehmhus, Dirk

    2018-03-01

    Advanced composite materials form an important class of high-performance industrial materials used in weight-sensitive applications such as aerospace structures, automotive structures and sports equipment. In many of these applications, parts are made in small production runs, are highly customized and involve long process development times. Developments in additive manufacturing (AM) methods have helped in overcoming many of these limitations. The special topic of Additive Manufacturing of Composites and Complex Materials captures the state of the art in this area by collecting nine papers that present much novel advancement in this field. The studies under this topic show advancement in the area of AM of carbon fiber and graphene-reinforced composites with high thermal and electrical conductivities, development of new hollow glass particle-filled syntactic foam filaments for printing lightweight structures and integration of sensors or actuators during AM of metallic parts. Some of the studies are focused on process optimization or modification to increase the manufacturing speed or tuning manufacturing techniques to enable AM of new materials.

  10. Uudised : Otsman taas Riias show'l. Rokkstaarist ministriks

    Index Scriptorium Estoniae

    2007-01-01

    Drag-kabareeartist Erkki Otsman esineb detsembris Riias "Sapnu Fabrikas" toimuval jõulu-show'l. Austraalia rokkansambli Midnight Oil endine laulja Peter Garrett nimetati valitsuse keskkonnaministriks

  11. based 2D dynamic metal-organic framework showing selective

    Indian Academy of Sciences (India)

    materials have been extensively studied for storage, separation, magnetism, sensing, biomedical and very recently for ion conduction applications.14–21 Hydrogen ... thesis of dynamic MOF with high affinity for water becomes handy in separation applications. Also, for a material to be smart sorbent, in addition to selective ...

  12. Jauch-Piron States and σ-Additivity

    Science.gov (United States)

    Bunce, L. J.; Hamhalter, Jan

    We study σ-additivity of the physically plausible Jauch-Piron states on a von Neumann algebra M. Amongst other consequences we extend our earlier results [5] by showing that geometric conditions much weaker than pureness imply σ-additivity for a Jauch-Piron state and, further, that if M is properly infinite and the continuum hypothesis is assumed to be true then all Jauch-Piron factor states are σ-additive.

  13. Entertaining politics, seriously?! : How talk show formats blur conceptual boundaries

    NARCIS (Netherlands)

    Schohaus, Birte

    2017-01-01

    What happens behind the scenes of a talk show? Why do some politicians seem to appear on every show while others are hardly ever seen? Birte Schohaus conducted a multi-layered research in which she conducted interviews with journalists, producers, PR advisors and (former) politicians and combined

  14. Effects of TV Crime Shows on Behavioural Development of Children

    Directory of Open Access Journals (Sweden)

    Abdullah Mudassar

    2017-01-01

    Full Text Available Television crime dramas and shows are very popular all over the world. This popularity is not bound to a certain age group, rather all the TV viewers like these shows very much. Like other countries, dozens of TV channels are telecasting these crime shows in Pakistan. Furthermore, few of the channels telecast crime shows at prime time which attests the popularity of such genre. Some of the media contents behave in morally disputed ways. The crime depictions as re-enactments of TV crime shows are questionable in the field of research signifying diverse cultural contexts. A large number of people are habitual to watch these shows, which may probably come out with negative behavioural outcomes. Especially the children who are at their behavioural developmental phase; are more susceptible to adopt negative behavioural leanings. In this research effort, introduction and detail of TV crime shows in Pakistan are provided, the literature concerning “media as risk factor“ in children development is discussed, and relevant theories inferences are deliberated.it was found that media has powerful role in behaviour formulating of children and violence media portrayal (TV crime shows may appear with grave concerns. Previous scientific literature was reviewed to find and discuss the problem in hand. In the research effort, the literature review provides research propositions to explore further dimensions to TV crime shows’ effects and possible negative or positive behavioural outcomes in children behaviour.

  15. The Presentation of Science in Everyday Life: The Science Show

    Science.gov (United States)

    Watermeyer, Richard

    2013-01-01

    This paper constitutes a case-study of the "science show" model of public engagement employed by a company of science communicators focused on the popularization of science, technology, engineering and mathematics (STEM) subject disciplines with learner constituencies. It examines the potential of the science show to foster the interest…

  16. "The Daily Show with Jon Stewart": Part 1

    Science.gov (United States)

    Trier, James

    2008-01-01

    Comedy Central's popular program "The Daily Show With Jon Stewart" is the best critical media literacy program on television, and it can be used in valuable ways in the classroom as part of a media literacy pedagogy. This Media Literacy column provides an overview of the show and its accompanying website and considers ways it might be used in the…

  17. The Daily Show with Jon Stewart: Part 2

    Science.gov (United States)

    Trier, James

    2008-01-01

    "The Daily Show With Jon Stewart" is one of the best critical literacy programs on television, and in this Media Literacy column the author suggests ways that teachers can use video clips from the show in their classrooms. (For Part 1, see EJ784683.)

  18. 16 CFR 5.57 - Order to show cause.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Order to show cause. 5.57 Section 5.57 Commercial Practices FEDERAL TRADE COMMISSION ORGANIZATION, PROCEDURES AND RULES OF PRACTICE STANDARDS OF CONDUCT Disciplinary Actions Concerning Postemployment Conflict of Interest § 5.57 Order to show cause. (a...

  19. Anomaly Detection In Additively Manufactured Parts Using Laser Doppler Vibrometery

    Energy Technology Data Exchange (ETDEWEB)

    Hernandez, Carlos A. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-09-29

    Additively manufactured parts are susceptible to non-uniform structure caused by the unique manufacturing process. This can lead to structural weakness or catastrophic failure. Using laser Doppler vibrometry and frequency response analysis, non-contact detection of anomalies in additively manufactured parts may be possible. Preliminary tests show promise for small scale detection, but more future work is necessary.

  20. Additivity for parametrized topological Euler characteristic and Reidemeister torsion

    OpenAIRE

    Badzioch, Bernard; Dorabiala, Wojciech

    2005-01-01

    Dwyer, Weiss, and Williams have recently defined the notions of parametrized topological Euler characteristic and parametrized topological Reidemeister torsion which are invariants of bundles of compact topological manifolds. We show that these invariants satisfy additivity formulas paralleling the additive properties of the classical Euler characteristic and Reidemeister torsion of finite CW-complexes.

  1. Additives as corrosion inhibitors in reinforced concrete

    International Nuclear Information System (INIS)

    Venegas, Ricardo; Vera, Rosa; Carvajal, Ana Maria; Villarroel, Maria; Vera, Enrique; Ortiz, Cesar

    2008-01-01

    This work studies the behavior of two additives as inhibitors of corrosion in reinforced concrete. The presence of Microsilica, a physical inhibitor, in the mixture decreases pore size in structures and improves compression. Calcium Nitrite, a chemical inhibitor, is an oxidizing agent and allows a more homogenous film to form over the steel that becomes more resistant to attacks from aggressive ions like anion chloride and others. Three pairs of concrete test pieces were used without additives and with additives with a/c ration of 0.55. The samples were exposed to an accelerated attack of chlorides, submerging them in a 4.27 M solution of NaCl for 24 hours and then drying them at room temperature for another 24 hours, completing a cycle every 48 hours. The tests were carried out at 1 cycle and 5 cycles of partial moistening and drying. The steel corrosion was evaluated with corrosion potential measurements. Conductivity, pH, chlorides and sulfate profiles were defined depending on the depth of the concrete. The composition of the corrosion products was determined using X-ray diffraction and the morphology of the film by scanning electron microscopy. The results show that for 1 test cycle, the corrosion potential of the steel in the sample with calcium nitrite was -54mV, which was a higher value than that measured in the sample with microsilica (-217.3mV) and without an additive (-159.1mV), corroborating its inhibitory power. The content of the free chlorides in the sample with micros ice allows greater capillary suction by adding high amounts of chloride to the structure (2.6% on the outside up to 2.20% near the steel); while the test pieces with calcium nitrite and without an additive had concentrations lower than 2% in all the evaluated points. After five cycles of exposing the samples to the saline solution the behavior is inverted. The measures of conductivity agreed with the previous results. Meanwhile, the pH of the solutions obtained from the powder from the

  2. Davedan Show Di Amphi Theatre Nusa Dua Bali

    Directory of Open Access Journals (Sweden)

    Ni Made Ruastiti

    2018-05-01

    Full Text Available Artikel ini disusun dari hasil penelitian yang bertujuan untuk dapat memahami pertunjukan Davedan Show di Amphi Theatre Nusa Dua Bali. Penelitian ini dilakukan karena adanya ketimpangan antara asumsi dan kenyataan di lapangan. Pada umumnya wisatawan yang datang ke Bali hanya senang dan antusias menonton seni pertunjukan pariwisata berbasis seni budaya lokal saja. Tetapi kenyataan ini berbeda. Walaupun Davedan Show tidak dibangun dari seni budaya lokal saja, tetapi kenyataannya wisatawan sangat senang menonton pertunjukan tersebut. Pertanyaannya: bagaimanakah bentuk pertunjukan Davedan Show tersebut?; mengapa wisatawan senang menonton pertunjukan itu?; apa implikasinya bagi pelaku, masyarakat, dan industri pariwisata di Nusa Dua, Bali?. Penelitian ini menggunakan metode penelitian kualitatif, khususnya implementatif partisipatoris yang mengutamakan kerjasama antara periset dengan para informan terkait. Sumber data penelitian ini adalah pertunjukan Davedan itu sendiri, pihak manajemen, para penari, penonton, hasil-hasil penelitian yang telah ada sebelumnya. Seluruh data yang telah dikumpulkan dengan teknik observasi, wawancara, FGD, dan studi kepustakaan itu dianalisis secara kritis dengan menggunakan teori estetika postmodern, teori praktik, dan teori relasi kuasa pengetahuan. Hasil penelitian menunjukan bahwa: (1 Davedan Show disajikan dalam bentuk oratorium. Hal itu dapat dilihat dari cara penyajian, koreografi, dan iringan pertunjukannya. Davedan Show yang menampilkan tema Treasure of The Archipelago, membuka gerbang petualangan baru itu diiringi musik rekaman etnik Nusantara secara medley, berkelanjutan dengan struktur pertunjukan: seni budaya Bali, Sumatra, Sunda, Solo, Kalimantan, dan seni budaya Papua; (2 Davedan Show banyak diminati wisatawan manca negara karena penciptaan pertunjukan itu dilatari oleh ideologi pasar, ideologi estetika, dan ideologi budaya Nusantara; (3 Hingga kini Davedan Show berkembang secara berkelanjutan di Nusa Dua

  3. Different bioassays for investigating orientation responses of the banana weevil, Cosmopolites sordidus, show additive effects of host plant volatiles and a synthetic male-produced aggregation pheromone

    NARCIS (Netherlands)

    Tinzaara, W.; Dicke, M.; Huis, van A.; Loon, van J.A.; Gold, C.S.

    2003-01-01

    Three different bioassay methods to investigate the orientation behaviour of the banana weevil, Cosmopolites sordidus (Germar) (Coleoptera: Curculionidae), to host plant volatiles and a synthetic pheromone (cosmolure+) were compared. A locomotion compensator was used to separately record walking

  4. QLab 3 show control projects for live performances & installations

    CERN Document Server

    Hopgood, Jeromy

    2013-01-01

    Used from Broadway to Britain's West End, QLab software is the tool of choice for many of the world's most prominent sound, projection, and integrated media designers. QLab 3 Show Control: Projects for Live Performances & Installations is a project-based book on QLab software covering sound, video, and show control. With information on both sound and video system basics and the more advanced functions of QLab such as MIDI show control, new OSC capabilities, networking, video effects, and microphone integration, each chapter's specific projects will allow you to learn the software's capabilitie

  5. Versatility of cooperative transcriptional activation: a thermodynamical modeling analysis for greater-than-additive and less-than-additive effects.

    Directory of Open Access Journals (Sweden)

    Till D Frank

    Full Text Available We derive a statistical model of transcriptional activation using equilibrium thermodynamics of chemical reactions. We examine to what extent this statistical model predicts synergy effects of cooperative activation of gene expression. We determine parameter domains in which greater-than-additive and less-than-additive effects are predicted for cooperative regulation by two activators. We show that the statistical approach can be used to identify different causes of synergistic greater-than-additive effects: nonlinearities of the thermostatistical transcriptional machinery and three-body interactions between RNA polymerase and two activators. In particular, our model-based analysis suggests that at low transcription factor concentrations cooperative activation cannot yield synergistic greater-than-additive effects, i.e., DNA transcription can only exhibit less-than-additive effects. Accordingly, transcriptional activity turns from synergistic greater-than-additive responses at relatively high transcription factor concentrations into less-than-additive responses at relatively low concentrations. In addition, two types of re-entrant phenomena are predicted. First, our analysis predicts that under particular circumstances transcriptional activity will feature a sequence of less-than-additive, greater-than-additive, and eventually less-than-additive effects when for fixed activator concentrations the regulatory impact of activators on the binding of RNA polymerase to the promoter increases from weak, to moderate, to strong. Second, for appropriate promoter conditions when activator concentrations are increased then the aforementioned re-entrant sequence of less-than-additive, greater-than-additive, and less-than-additive effects is predicted as well. Finally, our model-based analysis suggests that even for weak activators that individually induce only negligible increases in promoter activity, promoter activity can exhibit greater-than-additive

  6. marker development for two novel rice genes showing differential ...

    Indian Academy of Sciences (India)

    2014-08-19

    Aug 19, 2014 ... School of Crop Improvement, College of PostGraduate Studies, Central Agricultural University, ... from the root transcriptome data for tolerance to low P. .... Values show a representative result of three independent experiments ...

  7. Do men and women show love differently in marriage?

    Science.gov (United States)

    Schoenfeld, Elizabeth A; Bredow, Carrie A; Huston, Ted L

    2012-11-01

    In Western societies, women are considered more adept than men at expressing love in romantic relationships. Although scholars have argued that this view of love gives short shrift to men's ways of showing love (e.g., Cancian, 1986; Noller, 1996), the widely embraced premise that men and women "love differently" has rarely been examined empirically. Using data collected at four time points over 13 years of marriage, the authors examined whether love is associated with different behaviors for husbands and wives. Multilevel analyses revealed that, counter to theoretical expectations, both genders were equally likely to show love through affection. But whereas wives expressed love by enacting fewer negative or antagonistic behaviors, husbands showed love by initiating sex, sharing leisure activities, and doing household work together with their wives. Overall, the findings indicate that men and women show their love in more nuanced ways than cultural stereotypes suggest.

  8. Milky Way Monster Stars in Cosmic Reality Show

    Science.gov (United States)

    2003-01-01

    faint streak of X-rays about 1 light-year long has been discovered 1.5 light years from Sgr A*. The streak points at Sgr A*, suggesting that it may be a jet of particles expelled at nearly the speed of light from just outside the event horizon of the black hole. The intensity and size of this jet indicate that the flaring activity has been occurring for many years. Labeled image of Sagittarius A* Jet Labeled image of Sagittarius A* Jet On a much larger scale, huge lobes of 20-million-degree-Centigrade gas extending over dozens of light years on either side of the black hole have also been discovered. "These lobes show that enormous explosions have occurred several times over the last ten thousand years," said Mark Morris of UCLA, lead author of a second paper on Sgr A*, who also participated in the press conference. Sangwook Park, of Penn State University in University Park, and Michael Muno, of MIT, were lead authors of two other papers presented at the meeting. These papers focused on the extraordinarily rich region around the central black hole, where they detected more than 2,000 X-ray sources. Other members of the team include Mark Bautz and George Ricker of MIT, Niel Brandt, Patrick Broos, George Chartas, Eric Feigelson, Gordon Garmire, and Leisa Townsley of Penn State, Yoshitomo Maeda of the Institute of Space and Astronautical Science in Japan, and Christian Howard of UCLA. NASA's Marshall Space Flight Center in Huntsville, Ala., manages the Chandra program, and TRW, Inc., Redondo Beach, Calif., is the prime contractor for the spacecraft. The Smithsonian's Chandra X-ray Center controls science and flight operations from Cambridge, Mass., for the Office of Space Science at NASA Headquarters, Washington. Images and additional information about this result are available at: http://chandra.harvard.edu and http://chandra.nasa.gov

  9. Army Study Shows Decline In Behavioral Health Stigma

    Science.gov (United States)

    2012-01-01

    Army Study Shows Decline in Behavioral Health Stigma By Rob McIlvaine Army News Service WASHINGTON, Jan. 20, 2012 - A newly released Army study on...conference yesterday. The three-year study outlines the problem of suicide in the Army and related issues of substance abuse, spouse abuse and child abuse...REPORT TYPE 3. DATES COVERED 00-00-2012 to 00-00-2012 4. TITLE AND SUBTITLE Army Study Shows Decline In Behavioral Health Stigma 5a. CONTRACT

  10. Septic tank additive impacts on microbial populations.

    Science.gov (United States)

    Pradhan, S; Hoover, M T; Clark, G H; Gumpertz, M; Wollum, A G; Cobb, C; Strock, J

    2008-01-01

    Environmental health specialists, other onsite wastewater professionals, scientists, and homeowners have questioned the effectiveness of septic tank additives. This paper describes an independent, third-party, field scale, research study of the effects of three liquid bacterial septic tank additives and a control (no additive) on septic tank microbial populations. Microbial populations were measured quarterly in a field study for 12 months in 48 full-size, functioning septic tanks. Bacterial populations in the 48 septic tanks were statistically analyzed with a mixed linear model. Additive effects were assessed for three septic tank maintenance levels (low, intermediate, and high). Dunnett's t-test for tank bacteria (alpha = .05) indicated that none of the treatments were significantly different, overall, from the control at the statistical level tested. In addition, the additives had no significant effects on septic tank bacterial populations at any of the septic tank maintenance levels. Additional controlled, field-based research iswarranted, however, to address additional additives and experimental conditions.

  11. Microstructure and mechanical properties of molybdenum silicides with Al additions

    International Nuclear Information System (INIS)

    Rosales, I.; Bahena, D.; Colin, J.

    2007-01-01

    Several molybdenum silicides alloys with different aluminum additions were produced by the arc-cast method. Microstructure observed in the alloys presented a variation of the precipitated second phase respect to the aluminum content. Evaluation of the compressive behavior at high temperature of the alloys shows an important improvement in its ductility, approximately of 20%. Fracture toughness was increased proportionally with Al content. In addition at room temperature the alloys show a better mechanical behavior in comparison with the sample unalloyed. In general, Al additions result to be a good alternative to improve the resistance of these intermetallic alloys. The results are interpreted on the base of the analysis of second phase strengthening

  12. A GAO hiding among the PAO

    DEFF Research Database (Denmark)

    McIlroy, Simon Jon; Albertsen, Mads; Stokholm-Bjerregaard, Mikkel

    “Candidatus Accumulibacter phosphatis” (Accumulibacter) and the model GAO being the gammaproteobacterial “Candidatus Competibacter phosphatis” (see Oehmen et al., 2007). Here, we report the discovery of a GAO from the genus Propionivibrio, which is closely related to Accumulibacter. Propionivibrio is often...

  13. Human Infrastructure Detection and Exploitation (HIDE)

    Science.gov (United States)

    2009-11-01

    7  Figure 4. Picture of the fluxgate magnetometer and the coil-type magnetic sensor...may also be used to detect the usage of computer monitors. We used two different B-field sensors (figure 4), namely, (1) a fluxgate magnetometer ...collected at 256 samples per second. The three-axis fluxgate magnetometer used was an Applied Physics Systems Model 1540. It has the sensitivity

  14. Know Where Lead May Be Hiding

    Science.gov (United States)

    ... might like ... Sing-Along Songs With words and music! Go! What's That Word Scientific Dictionary Not sure of what a word means? Find Out! For teachers The Environmental Health Science Education website provides educators, students and scientists with ...

  15. Are QSO2 hiding among EROs?

    OpenAIRE

    Brusa, Marcella

    2004-01-01

    We present the results of a deep (80 ks) XMM-Newton survey of one of the largest sample of near-infrared selected Extremely Red Objects (R-K>5) available to date (~300 objects, Daddi et al. 2000). The fraction of individually detected, X-ray emitting EROs is of the order of ~3.5%, down to F_x > 4x10^-15 cgs and Ks

  16. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  17. Cryptic cuckoo eggs hide from competing cuckoos

    Science.gov (United States)

    Gloag, Ros; Keller, Laurie-Anne; Langmore, Naomi E.

    2014-01-01

    Interspecific arms races between cuckoos and their hosts have produced remarkable examples of mimicry, with parasite eggs evolving to match host egg appearance and so evade removal by hosts. Certain bronze-cuckoo species, however, lay eggs that are cryptic rather than mimetic. These eggs are coated in a low luminance pigment that camouflages them within the dark interiors of hosts' nests. We investigated whether cuckoo egg crypsis is likely to have arisen from the same coevolutionary processes known to favour egg mimicry. We added high and low luminance-painted eggs to the nests of large-billed gerygones (Gerygone magnirostris), a host of the little bronze-cuckoo (Chalcites minutillus). Gerygones rarely rejected either egg type, and did not reject natural cuckoo eggs. Cuckoos, by contrast, regularly removed an egg from clutches before laying their own and were five times more likely to remove a high luminance model than its low luminance counterpart. Given that we found one-third of all parasitized nests were exploited by multiple cuckoos, our results suggest that competition between cuckoos has been the key selective agent for egg crypsis. In such intraspecific arms races, crypsis may be favoured over mimicry because it can reduce the risk of egg removal to levels below chance. PMID:25122227

  18. HIDE working groups. A. Synchrotron based system

    International Nuclear Information System (INIS)

    Barton, M.Q.

    1977-01-01

    A summary is given of a week's discussions on an ion source to target scenario for a synchrotron for heavy ion fusion. Topics considered include: the number of beams on the target; beam dynamics; and a number of areas explicitly identified as needing further work

  19. Hiding Lorentz invariance violation with MOND

    International Nuclear Information System (INIS)

    Sanders, R. H.

    2011-01-01

    Horava-Lifshitz gravity is an attempt to construct a renormalizable theory of gravity by breaking the Lorentz invariance of the gravitational action at high energies. The underlying principle is that Lorentz invariance is an approximate symmetry and its violation by gravitational phenomena is somehow hidden to present limits of observational precision. Here I point out that a simple modification of the low-energy limit of Horava-Lifshitz gravity in its nonprojectable form can effectively camouflage the presence of a preferred frame in regions where the Newtonian gravitational field gradient is higher than cH 0 ; this modification results in the phenomenology of modified Newtonian dynamics (MOND) at lower accelerations. As a relativistic theory of MOND, this modified Horava-Lifshitz theory presents several advantages over its predecessors.

  20. Hiding in Plain Sight: Street artists online

    Directory of Open Access Journals (Sweden)

    Kim Barbour

    2013-10-01

    Full Text Available Identity and privacy concerns related to social media are the subject of widespread academic enquiry and mass media reporting. Although in most circumstances academic research tends to present identity play and online self­presentation as positive, media reporting in Australia makes much of the risks of identity theft, privacy breaches and online predators. This research explores the phenomenological experience of creating an online persona, focusing particularly on street artists. For street artists, the threat of unwanted exposure has to be balanced with the positive implications of sharing their creative work outside its geographical and temporal constraints. I argue that street artists use complex persona­creation strategies in order to both protect and promote themselves. The two street artists discussed in this article experience their engagement with social media and digital networks in ways that offer new insight into the opportunities and problems associated with the presentation of a persona online.

  1. Soliciting Performance, Hiding Bias: Whiteness and Librarianship

    Directory of Open Access Journals (Sweden)

    Angela Galvan

    2015-06-01

    Full Text Available Image by Flickr user tweng (CC BY-SA 2.0 In Brief: Despite the growing body of research on our professional demographics and multi-year diversity initiatives, librarianship in the United States remains overwhelmingly white. I suggest the interview process is a series of repetitive gestures designed to mimic and reinforce white middle class values, which ultimately influence […

  2. Mechanical Properties of Additively Manufactured Thick Honeycombs

    Directory of Open Access Journals (Sweden)

    Reza Hedayati

    2016-07-01

    Full Text Available Honeycombs resemble the structure of a number of natural and biological materials such as cancellous bone, wood, and cork. Thick honeycomb could be also used for energy absorption applications. Moreover, studying the mechanical behavior of honeycombs under in-plane loading could help understanding the mechanical behavior of more complex 3D tessellated structures such as porous biomaterials. In this paper, we study the mechanical behavior of thick honeycombs made using additive manufacturing techniques that allow for fabrication of honeycombs with arbitrary and precisely controlled thickness. Thick honeycombs with different wall thicknesses were produced from polylactic acid (PLA using fused deposition modelling, i.e., an additive manufacturing technique. The samples were mechanically tested in-plane under compression to determine their mechanical properties. We also obtained exact analytical solutions for the stiffness matrix of thick hexagonal honeycombs using both Euler-Bernoulli and Timoshenko beam theories. The stiffness matrix was then used to derive analytical relationships that describe the elastic modulus, yield stress, and Poisson’s ratio of thick honeycombs. Finite element models were also built for computational analysis of the mechanical behavior of thick honeycombs under compression. The mechanical properties obtained using our analytical relationships were compared with experimental observations and computational results as well as with analytical solutions available in the literature. It was found that the analytical solutions presented here are in good agreement with experimental and computational results even for very thick honeycombs, whereas the analytical solutions available in the literature show a large deviation from experimental observation, computational results, and our analytical solutions.

  3. Pedagogical Techniques Employed by the Television Show "MythBusters"

    Science.gov (United States)

    Zavrel, Erik

    2016-11-01

    "MythBusters," the long-running though recently discontinued Discovery Channel science entertainment television program, has proven itself to be far more than just a highly rated show. While its focus is on entertainment, the show employs an array of pedagogical techniques to communicate scientific concepts to its audience. These techniques include: achieving active learning, avoiding jargon, employing repetition to ensure comprehension, using captivating demonstrations, cultivating an enthusiastic disposition, and increasing intrinsic motivation to learn. In this content analysis, episodes from the show's 10-year history were examined for these techniques. "MythBusters" represents an untapped source of pedagogical techniques, which science educators may consider availing themselves of in their tireless effort to better reach their students. Physics educators in particular may look to "MythBusters" for inspiration and guidance in how to incorporate these techniques into their own teaching and help their students in the learning process.

  4. Implications of the Goal Theory on air show programs planning

    Directory of Open Access Journals (Sweden)

    Dewald Venter

    2014-01-01

    Full Text Available Events have long played an important role in human society (Shone & Parry, 2010: 3. The toils and efforts of daily lives have often been broken up by events of all kinds as humans seek an escape from the harsh reality of existence and events provide the outlet. Events are classified into four categories according to Shone and Parry (2010: 5 namely leisure (sport, recreation, personal (weddings, birthdays, cultural (art, folklore and organizational (politics, commercial. Successful events either match or exceed visitor motives and goals. It is critical that data be collected from visitors to determine their motives and goals in order to satisfy them and thereby encouraging repeat visits. One such event is the annual air show held at the Zwartkop Air Force Base (AFB in Pretoria, South Africa. Zwartkop AFB is also home to the South African Air Force (SAAF museum that also the hosts of the air show. Much of the museum‟s funds are generated through hosting the air show and sponsor contributions. Visitor goal satisfaction should therefore be of critically importance to the program planners. Military hardware has long held a fascination for those who used them and inspired the imagination of young and old. Such hardware often serves as a remembrance of times passed and as a testament to those who perished. For many visiting museums and air shows, curiosity plays a big role. The particular focus of this article will be on how the goal theory of leisure travel can be utilized by the air show organizers to enhance visitor experience to an air show.

  5. CERN cars drive by the Geneva Motor Show

    CERN Multimedia

    CERN Bulletin

    2011-01-01

    One of CERN's new gas-fuelled cars was a special guest at the press days of the Geneva motor show this year. The car enjoyed a prominent position on the Gazmobil stand, right next to the latest Mazeratis and Ferraris. Journalists previewing the motor show could discover CERN's support for green technologies and also find out more about the lab - home to the fastest racetrack on the planet, with protons in the LHC running at 99.9999991% of the speed of light.    

  6. The Biochemistry Show: a new and fun tool for learning

    Directory of Open Access Journals (Sweden)

    A.H Ono

    2006-07-01

    Full Text Available The traditional methods to teach biochemistry in most universities are based on the memorization of chemical structures,  biochemical  pathways  and  reagent  names,  which  is  many  times  dismotivating  for  the  students.  We presently describe an innovative, interactive and alternative method for teaching biochemistry to medical and nutrition undergraduate students, called the Biochemistry Show (BioBio Show.The Biobio show is based on active participation of the students. They are divided in groups and the groups face each other. One group faces another one group at a time, in a game based on true or false questions that involve subjects of applied biochemistry (exercise, obesity, diabetes, cholesterol, free radicals, among others. The questions of the Show are previously elaborated by senior students. The Biobio Show has four phases, the first one is a selection exam, and from the second to the fourth phase, eliminatory confrontations happen. On a confrontation, the first group must select a certain quantity of questions for the opponent to answer.  The group who choses the questions must know how to answer and justify the selected questions. This procedure is repeated on all phases of the show. On the last phase, the questions used are taken from an exam previously performed by the students: either the 9-hour biochemistry exam (Sé et al. A 9-hour biochemistry exam. An iron man competition or a good way of evaluating undergraduate students? SBBq 2005, abstract K-6 or the True-or-False exam (TFE (Sé et al. Are tutor-students capable of writing good biochemistry exams? SBBq 2004, abstract K-18. The winner group receives an extra 0,5 point on the final grade. Over 70% of the students informed on a questionnaire that the Biobio Show is a valuable tool for learning biochemistry.    That is a new way to enrich the discussion of biochemistry in the classroom without the students getting bored. Moreover, learning

  7. Additive Manufacturing of Aerospace Propulsion Components

    Science.gov (United States)

    Misra, Ajay K.; Grady, Joseph E.; Carter, Robert

    2015-01-01

    The presentation will provide an overview of ongoing activities on additive manufacturing of aerospace propulsion components, which included rocket propulsion and gas turbine engines. Future opportunities on additive manufacturing of hybrid electric propulsion components will be discussed.

  8. The Philosophical Consideration about Food Additives

    OpenAIRE

    Baoyu Ma

    2015-01-01

    This study mainly analyzes the essential features of food additives technology from the angle of philosophy, explaining the essential characteristics of food additives technology. As for the attitude towards the application of food additives, it is influenced by the public's gender, age, educational level, occupation and monthly expenditure for buying non-staple food and other variables, thus, the attitude towards food additives and green food, as well as the attitude towards using artificial...

  9. An autopsied case of tuberculous meningitis showing interesting CT findings

    International Nuclear Information System (INIS)

    Abiko, Takashi; Higuchi, Hiroshi; Imada, Ryuichi; Nagai, Kenichi

    1983-01-01

    A 61-year-old female patient died of a neurological disorder of unknown origin one month after the first visit and was found to have had tuberculous meningitis at autopsy. CT revealed a low density area showing an enlargement of the cerebral ventricle but did not reveal contrast enhancement in the basal cistern peculiar to tuberculous meningitis. (Namekawa, K.)

  10. Auditory temporal-order thresholds show no gender differences

    NARCIS (Netherlands)

    van Kesteren, Marlieke T. R.; Wierslnca-Post, J. Esther C.

    2007-01-01

    Purpose: Several studies on auditory temporal-order processing showed gender differences. Women needed longer inter-stimulus intervals than men when indicating the temporal order of two clicks presented to the left and right ear. In this study, we examined whether we could reproduce these results in

  11. Auditory temporal-order thresholds show no gender differences

    NARCIS (Netherlands)

    van Kesteren, Marlieke T R; Wiersinga-Post, J Esther C

    2007-01-01

    PURPOSE: Several studies on auditory temporal-order processing showed gender differences. Women needed longer inter-stimulus intervals than men when indicating the temporal order of two clicks presented to the left and right ear. In this study, we examined whether we could reproduce these results in

  12. An Easy Way to Show Memory Color Effects.

    Science.gov (United States)

    Witzel, Christoph

    2016-01-01

    This study proposes and evaluates a simple stimulus display that allows one to measure memory color effects (the effect of object knowledge and memory on color perception). The proposed approach is fast and easy and does not require running an extensive experiment. It shows that memory color effects are robust to minor variations due to a lack of color calibration.

  13. Polypyridyl iron(II) complexes showing remarkable photocytotoxicity ...

    Indian Academy of Sciences (India)

    aditya

    Polypyridyl iron(II) complexes showing remarkable photocytotoxicity in visible light. ADITYA GARAI a. , UTTARA BASU a. , ILA PANT b. , PATURU KONDAIAH*. ,b. AND. AKHIL R. CHAKRAVARTY*. ,a a. Department of Inorganic and Physical Chemistry, Indian Institute of Science, Bangalore. 560012, India. E-mail: ...

  14. Manumycin from a new Streptomyces strain shows antagonistic ...

    African Journals Online (AJOL)

    Manumycin from a new Streptomyces strain shows antagonistic effect against methicillin-resistant Staphylococcus aureus (MRSA)/vancomycin-resistant enterococci (VRE) strains from Korean Hospitals. Yun Hee Choi, Seung Sik Cho, Jaya Ram Simkhada, Chi Nam Seong, Hyo Jeong Lee, Hong Seop Moon, Jin Cheol Yoo ...

  15. Five kepler target stars that show multiple transiting exoplanet candidates

    DEFF Research Database (Denmark)

    Steffen..[], Jason H.; Batalha, N. M.; Broucki, W J.

    2010-01-01

    We present and discuss five candidate exoplanetary systems identified with the Kepler spacecraft. These five systems show transits from multiple exoplanet candidates. Should these objects prove to be planetary in nature, then these five systems open new opportunities for the field of exoplanets a...

  16. Your Town Television Show: SMART Program (Part 1) [video

    OpenAIRE

    Naval Postgraduate School, (U.S.); Sanders, John; Millsaps, Knox; Shifflett, Deborah

    2010-01-01

    From "Your Town" television show. SMART Scholarship Program featured on Your Town television program in Monterey, California. Host John Sanders, Special Collections Manager of the Naval Postgraduate School's Dudley Knox Library, interviews Dr. Knox Millsaps, Executive Agent for the SMART Program, and Deborah Shifflett, SMART Program Manager.

  17. Your Town Television Show: SMART Program (Part 3) [video

    OpenAIRE

    Naval Postgraduate School, (U.S.); Sanders, John; Millsaps, Knox; Shifflett, Deborah

    2010-01-01

    From "Your Town" television show. SMART Scholarship Program featured on Your Town television program in Monterey, California. Host John Sanders, Special Collections Manager of the Naval Postgraduate School's Dudley Knox Library, interviews Dr. Knox Millsaps, Executive Agent for the SMART Program, and Deborah Shifflett, SMART Program Manager.

  18. A Progress Evaluation of Four Bilingual Children's Television Shows.

    Science.gov (United States)

    Klein, Stephen P.; And Others

    An evaluation of a bilingual education TV series was conducted involving 6-year-old English speaking, Spanish speaking, and bilingual children at four sites. Children were assigned to control and experimental groups with the latter group seeing four 30 minute shows. A pretest-posttest design was employed with the pretest serving as the covariate…

  19. The neonicotinoid imidachloprid shows high chronic toxicity to mayfly nymphs

    NARCIS (Netherlands)

    Roessink, I.; Merga, L.B.; Zweers, A.J.; Brink, van den P.J.

    2013-01-01

    The present study evaluated the acute and chronic toxicity of imidacloprid to a range of freshwater arthropods. Mayfly and caddisfly species were most sensitive to short-term imidacloprid exposures (10 tests), whereas the mayflies showed by far the most sensitive response to long-term exposure of

  20. An Easy Way to Show Memory Color Effects

    OpenAIRE

    Witzel, Christoph

    2016-01-01

    This study proposes and evaluates a simple stimulus display that allows one to measure memory color effects (the effect of object knowledge and memory on color perception). The proposed approach is fast and easy and does not require running an extensive experiment. It shows that memory color effects are robust to minor variations due to a lack of color calibration.

  1. 36 CFR 14.24 - Showing as to citizenship required.

    Science.gov (United States)

    2010-07-01

    ... INTERIOR RIGHTS-OF-WAY Procedures § 14.24 Showing as to citizenship required. (a) Individuals. An individual applicant applying for a right-of-way under any right-of-way act, except the Act of March 3, 1891... applicant resided in the United States thereafter while a minor, should be furnished. Where the husband and...

  2. Mice lacking neuropeptide Y show increased sensitivity to cocaine

    DEFF Research Database (Denmark)

    Sørensen, Gunnar; Woldbye, David Paul Drucker

    2012-01-01

    There is increasing data implicating neuropeptide Y (NPY) in the neurobiology of addiction. This study explored the possible role of NPY in cocaine-induced behavior using NPY knockout mice. The transgenic mice showed a hypersensitive response to cocaine in three animal models of cocaine addiction...

  3. Television Judge Shows: Nordic and U.S. Perspectives

    DEFF Research Database (Denmark)

    Porsdam, Helle

    2017-01-01

    Legal discourse is language that people use in a globalizing and multicultural society to negotiate acceptable behaviors and values. We see this played out in popular cultural forums such as judicial television dramas. In the American context, television judge shows are virtually synonymous...

  4. Mixed cultures of Kimchi lactic acid bacteria show increased cell ...

    African Journals Online (AJOL)

    ufuoma

    anaerobic organisms that are highly resistant to salts. Probiotic cultures for use in ... kimchi have a superior ability to decompose and utilize nutrients, and show ... citrate, 5 g sodium acetate, 1 g Tween, 2 g K2HPO4, 0.2 g. MgSO4•7H2O, 0.2 g ...

  5. Teaching Job Interviewing Skills with the Help of Television Shows

    Science.gov (United States)

    Bloch, Janel

    2011-01-01

    Because of its potential for humor and drama, job interviewing is frequently portrayed on television. This article discusses how scenes from popular television series such as "Everybody Loves Raymond," "Friends," and "The Mary Tyler Moore Show" can be used to teach effective job interview skills in business communication courses. Television…

  6. Airline Overbooking Problem with Uncertain No-Shows

    Directory of Open Access Journals (Sweden)

    Chunxiao Zhang

    2014-01-01

    Full Text Available This paper considers an airline overbooking problem of a new single-leg flight with discount fare. Due to the absence of historical data of no-shows for a new flight, and various uncertain human behaviors or unexpected events which causes that a few passengers cannot board their aircraft on time, we fail to obtain the probability distribution of no-shows. In this case, the airlines have to invite some domain experts to provide belief degree of no-shows to estimate its distribution. However, human beings often overestimate unlikely events, which makes the variance of belief degree much greater than that of the frequency. If we still regard the belief degree as a subjective probability, the derived results will exceed our expectations. In order to deal with this uncertainty, the number of no-shows of new flight is assumed to be an uncertain variable in this paper. Given the chance constraint of social reputation, an overbooking model with discount fares is developed to maximize the profit rate based on uncertain programming theory. Finally, the analytic expression of the optimal booking limit is obtained through a numerical example, and the results of sensitivity analysis indicate that the optimal booking limit is affected by flight capacity, discount, confidence level, and parameters of the uncertainty distribution significantly.

  7. Triphala, a formulation of traditional Ayurvedic medicine, shows

    Indian Academy of Sciences (India)

    Triphala, a formulation of traditional Ayurvedic medicine, shows protective effect against X-radiation in HeLa cells. YUKI TAKAUJI KENSUKE ... with the cellscultured in vitro. The simple bioassay system with human cultured cells would facilitate the understanding of themolecular basis for the beneficial effects of Triphala.

  8. Bilinguals Show Weaker Lexical Access during Spoken Sentence Comprehension

    Science.gov (United States)

    Shook, Anthony; Goldrick, Matthew; Engstler, Caroline; Marian, Viorica

    2015-01-01

    When bilinguals process written language, they show delays in accessing lexical items relative to monolinguals. The present study investigated whether this effect extended to spoken language comprehension, examining the processing of sentences with either low or high semantic constraint in both first and second languages. English-German…

  9. Soil bacteria show different tolerance ranges to an unprecedented disturbance

    DEFF Research Database (Denmark)

    Nunes, Ines Marques; Jurburg, Stephanie; Jacquiod, Samuel Jehan Auguste

    2018-01-01

    stress doses. FRG1, the most sensitive group, was dominated by Actinobacteria. FRG2 and FRG3, with intermediate tolerance, displayed prevalence of Proteobacteria, while FRG4, the most resistant group, was driven by Firmicutes. While the most sensitive FRGs showed predictable responses linked to changes...

  10. Recurrent and multiple bladder tumors show conserved expression profiles

    International Nuclear Information System (INIS)

    Lindgren, David; Fioretos, Thoas; Månsson, Wiking; Höglund, Mattias; Gudjonsson, Sigurdur; Jee, Kowan Ja; Liedberg, Fredrik; Aits, Sonja; Andersson, Anna; Chebil, Gunilla; Borg, Åke; Knuutila, Sakari

    2008-01-01

    Urothelial carcinomas originate from the epithelial cells of the inner lining of the bladder and may appear as single or as multiple synchronous tumors. Patients with urothelial carcinomas frequently show recurrences after treatment making follow-up necessary. The leading hypothesis explaining the origin of meta- and synchronous tumors assumes a monoclonal origin. However, the genetic relationship among consecutive tumors has been shown to be complex in as much as the genetic evolution does not adhere to the chronological appearance of the metachronous tumors. Consequently, genetically less evolved tumors may appear chronologically later than genetically related but more evolved tumors. Forty-nine meta- or synchronous urothelial tumors from 22 patients were analyzed using expression profiling, conventional CGH, LOH, and mutation analyses. We show by CGH that partial chromosomal losses in the initial tumors may not be present in the recurring tumors, by LOH that different haplotypes may be lost and that detected regions of LOH may be smaller in recurring tumors, and that mutations present in the initial tumor may not be present in the recurring ones. In contrast we show that despite apparent genomic differences, the recurrent and multiple bladder tumors from the same patients display remarkably similar expression profiles. Our findings show that even though the vast majority of the analyzed meta- and synchronous tumors from the same patients are not likely to have originated directly from the preceding tumor they still show remarkably similar expressions profiles. The presented data suggests that an expression profile is established early in tumor development and that this profile is stable and maintained in recurring tumors

  11. The dilemma of allergy to food additives.

    Science.gov (United States)

    Bahna, Sami L; Burkhardt, Joshua G

    2018-01-01

    To provide a brief summary on food additives and to outline a practical approach for evaluating subjects suspected of having reactions to food additives. Information was derived from selected reviews and original articles published in peer-reviewed journals, supplemented by the clinical experience of the authors. Priority was given to studies that used blinded, placebo controlled, oral challenges to confirm adverse reactions to food additives. In addition, selected, appropriately evaluated case reports were included. A large number of food additives are widely used in the food industry. Allergic reactions to additives seem to be rare but are very likely underdiagnosed, primarily due to a low index of suspicion. A wide variety of symptoms to food additives have been reported, but a cause-and-effect relationship has not been well documented in the majority of cases. Reactions to food additives should be suspected in patients who report symptoms related to multiple foods or to a certain food when commercially prepared but not when home made. It is also prudent to investigate food additives in subjects considered to have "idiopathic" reactions. Except for a limited number of natural additives, there is a small role for skin tests or in vitro testing. Oral challenge, in stages, with commonly used additives is the definitive procedure for detecting the offending agent. Once the specific additive is identified, management is strict avoidance, which can be difficult.

  12. Enabling Technologies for Medium Additive Manufacturing (MAAM)

    Energy Technology Data Exchange (ETDEWEB)

    Richardson, Bradley S. [ORNL; Love, Lonnie J. [ORNL; Chesser, Phillip C. [ORNL; Miller, Jason [Cosine Additive, Inc.; McCalip, Andrew [Cosine Additive, Inc.

    2018-02-01

    ORNL has worked with Cosine Additive, Inc. on the design of MAAM extrusion components. The objective is to improve the print speed and part quality. A pellet extruder has been procured and integrated into the MAAM printer. Print speed has been greatly enhanced. In addition, ORNL and Cosine Additive have worked on alternative designs for a pellet drying and feed system.

  13. INFLUENCE OF NATURAL ADDITIVES ON PROTEIN COMPLEX OF BREAD

    Directory of Open Access Journals (Sweden)

    Dana Urminská

    2010-11-01

    Full Text Available The study focuses on researching the influence of natural additives on certain technological characteristics of mixtures used for bread production, more particularly the influence of N substances in used raw material on selected qualitative parameters of bread. The blends for bread production to be analysed were prepared by mixing wheat flour with an addition of oat, buckwheat, lentil and chickpea wholegrain flour in different portions (10, 20, 30, 40 and 50 %. The experiment showed that the addition of natural additives worsened the protein complex of the blends used in bread production (worsening also qualitative parameters known as product volume. The loaves prepared with an addition of buckwheat, oat, lentil and chickpea were evaluated to be of a lesser quality from a technological viewpoint when compared with pure wheat loaves. The lower content of gluten forming proteins and the generally changed protein composition of blends due to additives caused a lower percentage of wet gluten content, its lower extensibility and swelling capacity. The sedimentation value (Zeleny index decreased proportionally with the increase of addition until the level was unsatisfactory for raw material intended for bakery purposes. The N content in experimental loaves was higher than in the reference loaves and it increased according to the selected additive and its portion in the blend (more with the addition of lentil and chickpea, less in case of buckwheat and oat which is considered as positive from a nutritional point of view. But from the technological point of view the additives did not show any positive influence and caused a lower loaf bread volume. The most significant decrease of the loaf bread volume was found with the addition of 50 % of buckwheat (- 45.6 %. Better results were obtained with a lower portion of the additive: loaf with an addition of 30 % of chickpea (volume decreased by 12.8 % > loaf with an addition of 30 % of lentil (volume

  14. New Inspiring Planetarium Show Introduces ALMA to the Public

    Science.gov (United States)

    2009-03-01

    As part of a wide range of education and public outreach activities for the International Year of Astronomy 2009 (IYA2009), ESO, together with the Association of French Language Planetariums (APLF), has produced a 30-minute planetarium show, In Search of our Cosmic Origins. It is centred on the global ground-based astronomical Atacama Large Millimeter/submillimeter Array (ALMA) project and represents a unique chance for planetariums to be associated with the IYA2009. ESO PR Photo 09a/09 Logo of the ALMA Planetarium Show ESO PR Photo 09b/09 Galileo's first observations with a telescope ESO PR Photo 09c/09 The ALMA Observatory ESO PR Photo 09d/09 The Milky Way band ESO PR Video 09a/09 Trailer in English ALMA is the leading telescope for observing the cool Universe -- the relic radiation of the Big Bang, and the molecular gas and dust that constitute the building blocks of stars, planetary systems, galaxies and life itself. It is currently being built in the extremely arid environment of the Chajnantor plateau, at 5000 metres altitude in the Chilean Andes, and will start scientific observations around 2011. ALMA, the largest current astronomical project, is a revolutionary telescope, comprising a state-of-the-art array of 66 giant 12-metre and 7-metre diameter antennas observing at millimetre and submillimetre wavelengths. In Search of our Cosmic Origins highlights the unprecedented window on the Universe that this facility will open for astronomers. "The show gives viewers a fascinating tour of the highest observatory on Earth, and takes them from there out into our Milky Way, and beyond," says Douglas Pierce-Price, the ALMA Public Information Officer at ESO. Edited by world fulldome experts Mirage3D, the emphasis of the new planetarium show is on the incomparable scientific adventure of the ALMA project. A young female astronomer guides the audience through a story that includes unique animations and footage, leading the viewer from the first observations by Galileo

  15. Additive manufacturing of transparent fused quartz

    Science.gov (United States)

    Luo, Junjie; Hostetler, John M.; Gilbert, Luke; Goldstein, Jonathan T.; Urbas, Augustine M.; Bristow, Douglas A.; Landers, Robert G.; Kinzel, Edward C.

    2018-04-01

    This paper investigates a filament-fed process for additive manufacturing (AM) of fused quartz. Glasses such as fused quartz have significant scientific and engineering applications, which include optics, communications, electronics, and hermetic seals. AM has several attractive benefits such as increased design freedom, faster prototyping, and lower processing costs for small production volumes. However, current research into glass AM has focused primarily on nonoptical applications. Fused quartz is studied here because of its desirability for use in high-quality optics due to its high transmissivity and thermal stability. Fused quartz filaments are fed into a CO2 laser-generated molten region, smoothly depositing material onto the workpiece. Spectroscopy and pyrometry are used to measure the thermal radiation incandescently emitted from the molten region. The effects of the laser power and scan speed are determined by measuring the morphology of single tracks. Thin walls are printed to study the effects of layer-to-layer height. This information is used to deposit solid pieces including a cylindrical-convex shape capable of focusing visible light. The transmittance and index homogeneity of the printed fused quartz are measured. These results show that the filament-fed process has the potential to print transmissive optics.

  16. HUBBLE VISION: A Planetarium Show About Hubble Space Telescope

    Science.gov (United States)

    Petersen, Carolyn Collins

    1995-05-01

    In 1991, a planetarium show called "Hubble: Report From Orbit" outlining the current achievements of the Hubble Space Telescope was produced by the independent planetarium production company Loch Ness Productions, for distribution to facilities around the world. The program was subsequently converted to video. In 1994, that program was updated and re-produced under the name "Hubble Vision" and offered to the planetarium community. It is periodically updated and remains a sought-after and valuable resource within the community. This paper describes the production of the program, and the role of the astronomical community in the show's production (and subsequent updates). The paper is accompanied by a video presentation of Hubble Vision.

  17. Political Show-Technology in the Post-Soviet Space

    Directory of Open Access Journals (Sweden)

    O. E. Grishin

    2015-01-01

    Full Text Available In the modern political process of Russia actively used technology show. With their help, political actors can influence public opinion and shape the public interest in certain issues. In Russia, these technologies are relevant, and are especially well developed. The pressing of the problem is due to a new round of information war on the territory of Ukraine. Inclusion in the information space, and discuss the pressing issues of modern Ukraine by media people such as C. Shuster and V. Solovyov, suggests that the political show has entertainment figures, actuality, the ambiguity of the proposed conclusions. At the same time it becomes part of the information war and political reality of the normal state.

  18. Migraine patients consistently show abnormal vestibular bedside tests

    Directory of Open Access Journals (Sweden)

    Eliana Teixeira Maranhão

    2015-01-01

    Full Text Available Migraine and vertigo are common disorders, with lifetime prevalences of 16% and 7% respectively, and co-morbidity around 3.2%. Vestibular syndromes and dizziness occur more frequently in migraine patients. We investigated bedside clinical signs indicative of vestibular dysfunction in migraineurs.Objective To test the hypothesis that vestibulo-ocular reflex, vestibulo-spinal reflex and fall risk (FR responses as measured by 14 bedside tests are abnormal in migraineurs without vertigo, as compared with controls.Method Cross-sectional study including sixty individuals – thirty migraineurs, 25 women, 19-60 y-o; and 30 gender/age healthy paired controls.Results Migraineurs showed a tendency to perform worse in almost all tests, albeit only the Romberg tandem test was statistically different from controls. A combination of four abnormal tests better discriminated the two groups (93.3% specificity.Conclusion Migraine patients consistently showed abnormal vestibular bedside tests when compared with controls.

  19. Migraine patients consistently show abnormal vestibular bedside tests.

    Science.gov (United States)

    Maranhão, Eliana Teixeira; Maranhão-Filho, Péricles; Luiz, Ronir Raggio; Vincent, Maurice Borges

    2016-01-01

    Migraine and vertigo are common disorders, with lifetime prevalences of 16% and 7% respectively, and co-morbidity around 3.2%. Vestibular syndromes and dizziness occur more frequently in migraine patients. We investigated bedside clinical signs indicative of vestibular dysfunction in migraineurs. To test the hypothesis that vestibulo-ocular reflex, vestibulo-spinal reflex and fall risk (FR) responses as measured by 14 bedside tests are abnormal in migraineurs without vertigo, as compared with controls. Cross-sectional study including sixty individuals - thirty migraineurs, 25 women, 19-60 y-o; and 30 gender/age healthy paired controls. Migraineurs showed a tendency to perform worse in almost all tests, albeit only the Romberg tandem test was statistically different from controls. A combination of four abnormal tests better discriminated the two groups (93.3% specificity). Migraine patients consistently showed abnormal vestibular bedside tests when compared with controls.

  20. CT findings of rectosigmoid carcinoma showing exophytic growth

    International Nuclear Information System (INIS)

    Ohgi, Kazuyuki; Kohno, Atsushi; Higuchi, Mutsumi

    1987-01-01

    CT findings of 7 rectosigmoid carcinomas showing exophytic growth were evaluated. All cases had bulky masses, ranging from 6.0 to 11.5 cm in maximum diameter. All masses were difficult to differentiate from the other pelvic masses on CT, presumably due to their exophytic growth and/or invasion to the surrounding organs. However, 3 out of 7 cases showed diffuse rectosigmoidal wall thickening adjacent to the primary tumor, and it is considered to be valuable in the determination of primary site. All female cases had gynecological symptom such as genital bleeding, due to uterine and/or vaginal invasion. When indeterminate pelvic mass is revealed by CT, rectosigmoid carcinoma should be considered into differential diagnosis. (author)

  1. Preschoolers show less trust in physically disabled or obese informants

    Directory of Open Access Journals (Sweden)

    Sara eJaffer

    2015-01-01

    Full Text Available This research examined whether preschool-aged children show less trust in physically disabled or obese informants. In Study 1, when learning about novel physical activities and facts, 4- and 5-year-olds preferred to endorse the testimony of a physically abled, non-obese informant rather than a physically disabled or obese one. In Study 2, after seeing that the physically disabled or obese informant was previously reliable whereas the physically abled, non-obese one was unreliable, 4- and 5-year-olds did not show a significant preference for either informant. We conclude that in line with the literature on children’s negative stereotypes of physically disabled or obese others, preschoolers are biased against these individuals as potential sources of new knowledge. This bias is robust in that past reliability might undermine its effect on children, but cannot reverse it.

  2. El reality show a la hora de la merienda

    Directory of Open Access Journals (Sweden)

    Lic. Rosa María Ganga Ganga

    2000-01-01

    Full Text Available Los programas de testimonio, inscritos dentro del género televisivo del Reality Show, son una variante del más amplio subgénero del Talk Show y tienen ya una cierta tradición en nuestro país. El presente trabajo se centrará en este tipo de programas de testimonio que basan su estrategia discursiva en la presentación y representación del relato autobiográfico del hombre o la mujer anónimos, integrándose de esta forma en las corrientes más recientes de la sociología y la historiografía, y persigue esclarecer algunas de sus características y funciones, especialmente su función socializadora, a través del mecanismo biográfico y del concepto de habitus tomado de Pierre Bourdieu.

  3. High-frequency parameters of magnetic films showing magnetization dispersion

    International Nuclear Information System (INIS)

    Sidorenkov, V.V.; Zimin, A.B.; Kornev, Yu.V.

    1988-01-01

    Magnetization dispersion leads to skewed resonance curves shifted towards higher magnetizing fields, together with considerable reduction in the resonant absorption, while the FMR line width is considerably increased. These effects increase considerably with frequency, in contrast to films showing magnetic-anisotropy dispersion, where they decrease. It is concluded that there may be anomalies in the frequency dependence of the resonance parameters for polycrystalline magnetic films

  4. Persistent cannabis users show neuropsychological decline from childhood to midlife

    OpenAIRE

    Meier, Madeline H.; Caspi, Avshalom; Ambler, Antony; Harrington, HonaLee; Houts, Renate; Keefe, Richard S. E.; McDonald, Kay; Ward, Aimee; Poulton, Richie; Moffitt, Terrie E.

    2012-01-01

    Recent reports show that fewer adolescents believe that regular cannabis use is harmful to health. Concomitantly, adolescents are initiating cannabis use at younger ages, and more adolescents are using cannabis on a daily basis. The purpose of the present study was to test the association between persistent cannabis use and neuropsychological decline and determine whether decline is concentrated among adolescent-onset cannabis users. Participants were members of the Dunedin Study, a prospecti...

  5. Bonobos (Pan paniscus) show an attentional bias toward conspecifics' emotions.

    Science.gov (United States)

    Kret, Mariska E; Jaasma, Linda; Bionda, Thomas; Wijnen, Jasper G

    2016-04-05

    In social animals, the fast detection of group members' emotional expressions promotes swift and adequate responses, which is crucial for the maintenance of social bonds and ultimately for group survival. The dot-probe task is a well-established paradigm in psychology, measuring emotional attention through reaction times. Humans tend to be biased toward emotional images, especially when the emotion is of a threatening nature. Bonobos have rich, social emotional lives and are known for their soft and friendly character. In the present study, we investigated (i) whether bonobos, similar to humans, have an attentional bias toward emotional scenes compared with conspecifics showing a neutral expression, and (ii) which emotional behaviors attract their attention the most. As predicted, results consistently showed that bonobos' attention was biased toward the location of the emotional versus neutral scene. Interestingly, their attention was grabbed most by images showing conspecifics such as sexual behavior, yawning, or grooming, and not as much-as is often observed in humans-by signs of distress or aggression. The results suggest that protective and affiliative behaviors are pivotal in bonobo society and therefore attract immediate attention in this species.

  6. An Undergraduate Endeavor: Assembling a Live Planetarium Show About Mars

    Science.gov (United States)

    McGraw, Allison M.

    2016-10-01

    Viewing the mysterious red planet Mars goes back thousands of years with just the human eye but in more recent years the growth of telescopes, satellites and lander missions unveil unrivaled detail of the Martian surface that tells a story worth listening to. This planetarium show will go through the observations starting with the ancients to current understandings of the Martian surface, atmosphere and inner-workings through past and current Mars missions. Visual animations of its planetary motions, display of high resolution images from the Hi-RISE (High Resolution Imaging Science Experiment) and CTX (Context Camera) data imagery aboard the MRO (Mars Reconnaissance Orbiter) as well as other datasets will be used to display the terrain detail and imagery of the planet Mars with a digital projection system. Local planetary scientists and Mars specialists from the Lunar and Planetary Lab at the University of Arizona (Tucson, AZ) will be interviewed and used in the show to highlight current technology and understandings of the red planet. This is an undergraduate project that is looking for collaborations and insight in order gain structure in script writing that will teach about this planetary body to all ages in the format of a live planetarium show.

  7. Compliance With Recommended Food Safety Practices in Television Cooking Shows.

    Science.gov (United States)

    Cohen, Nancy L; Olson, Rita Brennan

    Examine compliance with recommended food safety practices in television cooking shows. Using a tool based on the Massachusetts Food Establishment Inspection Report, raters examined 39 episodes from 10 television cooking shows. Chefs demonstrated conformance with good retail practices for proper use and storage of utensils in 78% of episodes; preventing contamination (62%), and fingernail care (82%). However, 50% to 88% of episodes were found to be out of compliance with other personal hygiene practices, proper use of gloves and barriers (85% to 100%), and maintaining proper time and temperature controls (93%). Over 90% failed to conform to recommendations regarding preventing contamination through wiping cloths and washing produce. In only 13% of episodes were food safety practices mentioned. There appears to be little attention to food safety during most cooking shows. Celebrity and competing chefs have the opportunity to model and teach good food safety practices for millions of viewers. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  8. Architectures for Quantum Simulation Showing a Quantum Speedup

    Science.gov (United States)

    Bermejo-Vega, Juan; Hangleiter, Dominik; Schwarz, Martin; Raussendorf, Robert; Eisert, Jens

    2018-04-01

    One of the main aims in the field of quantum simulation is to achieve a quantum speedup, often referred to as "quantum computational supremacy," referring to the experimental realization of a quantum device that computationally outperforms classical computers. In this work, we show that one can devise versatile and feasible schemes of two-dimensional, dynamical, quantum simulators showing such a quantum speedup, building on intermediate problems involving nonadaptive, measurement-based, quantum computation. In each of the schemes, an initial product state is prepared, potentially involving an element of randomness as in disordered models, followed by a short-time evolution under a basic translationally invariant Hamiltonian with simple nearest-neighbor interactions and a mere sampling measurement in a fixed basis. The correctness of the final-state preparation in each scheme is fully efficiently certifiable. We discuss experimental necessities and possible physical architectures, inspired by platforms of cold atoms in optical lattices and a number of others, as well as specific assumptions that enter the complexity-theoretic arguments. This work shows that benchmark settings exhibiting a quantum speedup may require little control, in contrast to universal quantum computing. Thus, our proposal puts a convincing experimental demonstration of a quantum speedup within reach in the near term.

  9. Eccentric muscle challenge shows osteopontin polymorphism modulation of muscle damage.

    Science.gov (United States)

    Barfield, Whitney L; Uaesoontrachoon, Kitipong; Wu, Chung-Sheih; Lin, Stephen; Chen, Yue; Wang, Paul C; Kanaan, Yasmine; Bond, Vernon; Hoffman, Eric P

    2014-08-01

    A promoter polymorphism of the osteopontin (OPN) gene (rs28357094) has been associated with multiple inflammatory states, severity of Duchenne muscular dystrophy (DMD) and muscle size in healthy young adults. We sought to define the mechanism of action of the polymorphism, using allele-specific in vitro reporter assays in muscle cells, and a genotype-stratified intervention in healthy controls. In vitro reporter constructs showed the G allele to respond to estrogen treatment, whereas the T allele showed no transcriptional response. Young adult volunteers (n = 187) were enrolled into a baseline study, and subjects with specific rs28357094 genotypes enrolled into an eccentric muscle challenge intervention [n = 3 TT; n = 3 GG/GT (dominant inheritance model)]. Female volunteers carrying the G allele showed significantly greater inflammation and increased muscle volume change as determined by magnetic resonance imaging T1- and T2-weighted images after eccentric challenge, as well as greater decrement in biceps muscle force. Our data suggest a model where the G allele enables enhanced activities of upstream enhancer elements due to loss of Sp1 binding at the polymorphic site. This results in significantly greater expression of the pro-inflammatory OPN cytokine during tissue remodeling in response to challenge in G allele carriers, promoting muscle hypertrophy in normal females, but increased damage in DMD patients. © The Author 2014. Published by Oxford University Press.

  10. Fat stigmatization in television shows and movies: a content analysis.

    Science.gov (United States)

    Himes, Susan M; Thompson, J Kevin

    2007-03-01

    To examine the phenomenon of fat stigmatization messages presented in television shows and movies, a content analysis was used to quantify and categorize fat-specific commentary and humor. Fat stigmatization vignettes were identified using a targeted sampling procedure, and 135 scenes were excised from movies and television shows. The material was coded by trained raters. Reliability indices were uniformly high for the seven categories (percentage agreement ranged from 0.90 to 0.98; kappas ranged from 0.66 to 0.94). Results indicated that fat stigmatization commentary and fat humor were often verbal, directed toward another person, and often presented directly in the presence of the overweight target. Results also indicated that male characters were three times more likely to engage in fat stigmatization commentary or fat humor than female characters. To our knowledge, these findings provide the first information regarding the specific gender, age, and types of fat stigmatization that occur frequently in movies and television shows. The stimuli should prove useful in future research examining the role of individual difference factors (e.g., BMI) in the reaction to viewing such vignettes.

  11. Remembering Operación Triunfo: a Latin Music Reality Show in the Era of Talent Shows

    NARCIS (Netherlands)

    Savini, Paola

    2016-01-01

    abstractThe music format Operación Triunfo (2001–2011), which aired on RTVE for the first time in 2001, started as a television (TV) and musical success in Spain and today is one of the most famous shows around the world as well as an incredible socio-economic phenomenon in Spanish TV. This paper

  12. Significance of Glucose Addition on Chitosan-Glycerophosphate Hydrogel Properties

    Directory of Open Access Journals (Sweden)

    Dian Susanthy

    2016-03-01

    Full Text Available Chitosan-glycerophosphate hydrogel can be used as dental scaffold due to its thermosensitivity, gelation performance at body temperature, suitable acidity for body condition, biocompatibility, and ability to provide good environment for cell proliferation and differentiation. Previous study showed that glucose addition to the chitosan solution before steam sterilization improved its hydrogel mechanical strength. However, the effectiveness of glucose addition was still doubted because glucose might undergo Maillard reaction in that particular condition. The aims of this study are to confirm whether the glucose addition can increase the hydrogel mechanical strength and gelation rate effectively and also to compare their performance to be dental scaffold. This research was performed through several steps, namely preparation of chitosan-glycerophosphate solution, addition of glucose, gelation time test, gel mechanical strength measurement, functional group analysis, and physical properties measurements (pH, viscosity, and pore size. The result showed that glucose addition did not improve the hydrogel mechanical strength and gelation rate, neither when it was added before nor after steam sterilization. Glucose addition before steam sterilization seemed to trigger Maillard reaction or browning effect, while glucose addition after steam sterilization increased the amount of free water molecules in the hydrogel. Chitosan and glycerophosphate interact physically, but interaction between chitosan and glucose seems to occur chemically and followed by the formation of free water molecules. Glucose addition decreases the solution viscosity and hydrogel pore size so the hydrogel performance as dental scaffold is lowered.

  13. Economic impact and market analysis of a special event: The Great New England Air Show

    Science.gov (United States)

    Rodney B. Warnick; David C. Bojanic; Atul Sheel; Apurv Mather; Deepak Ninan

    2010-01-01

    We conducted a post-event evaluation for the Great New England Air Show to assess its general economic impact and to refine economic estimates where possible. In addition to the standard economic impact variables, we examined travel distance, purchase decision involvement, event satisfaction, and frequency of attendance. Graphic mapping of event visitors' home ZIP...

  14. Serotonin Transporter Knockout Rats Show Improved Strategy Set-Shifting and Reduced Latent Inhibition

    Science.gov (United States)

    Nonkes, Lourens J. P.; van de Vondervoort, Ilse I. G. M.; de Leeuw, Mark J. C.; Wijlaars, Linda P.; Maes, Joseph H. R.; Homberg, Judith R.

    2012-01-01

    Behavioral flexibility is a cognitive process depending on prefrontal areas allowing adaptive responses to environmental changes. Serotonin transporter knockout (5-HTT[superscript -/-]) rodents show improved reversal learning in addition to orbitofrontal cortex changes. Another form of behavioral flexibility, extradimensional strategy set-shifting…

  15. The Contributions of Political Fashion Shows and Fabric to Visual Arts-Based Practice

    Science.gov (United States)

    Butterwick, Shauna

    2017-01-01

    This chapter explores how working with the genre of fashion shows and using fabric are two important additions to the various genres employed in visual arts-based practice. These genres are particularly attuned to feminist approaches to popular education, research, and teaching, enabling embodied knowing and the expression of imagination and…

  16. Addition of electric arc furnace dust in hot metal changing the form of addition

    International Nuclear Information System (INIS)

    Marques Sobrinho, Vicente de Paulo Ferreira; Oliveira, Jose Roberto de; Vieira, Estefano Aparecido; Telles, Victor Bridi; Grillo, Felipe Fardin; Tenorio, Jorge Alberto Soares; Espinosa, Denise Crocce Romano

    2014-01-01

    This research aims to study the incorporation of the mass of electric arc furnace dust (EAFD), by addition in hot metal (1.78% Si) at a temperature of 1,400 degrees Celsius. The EAFD is from a steel plant producing long steel. The addition of the EAFD was as received, in the form of briquettes without agitation of the hot metal and in the form of briquettes with agitation of the hot metal. Previously, the EAFD was characterized using the following techniques: chemical analysis, size analysis, X-ray diffraction, scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) microanalysis. The achievement of fusion experiments in laboratory scale, took place in a vertical tubular furnace with temperature control. The fusion experiments to assess the incorporation of EAFD mass used graphite crucibles. After cooling, the hot metal and the slag, remaining in the crucible, were weighed to do a mass balance. A flow of inert gas (argon) was maintained inside the furnace during the experiments. Results show that the experiment with addition of EAFD as received presents the best result of incorporating the mass of the final hot metal (1.73%) combined with the lowest percentage of volatilized mass of EAFD (46.52%). The experiment addition of EAFD in the form of briquette with agitation of hot metal presents the lowest percentage of slag mass (4.58%). The zinc content of volatilized EAFD (64.30%) is higher than the zinc content of the imported ore concentrate (52%) and zinc content of the national ore concentrate (12% to 39%). The presence of lead and cadmium in the slag characterizing it as a hazardous solid waste. (author)

  17. Perforating pilomatrixoma showing atypical presentation: A rare clinical variant

    Directory of Open Access Journals (Sweden)

    Nevra Seyhan

    2018-03-01

    Full Text Available Pilomatrixoma, also known as calcifying epithelioma of Malherbe, is a rare benign skin tumor arising from hair follicle stem cells. The most common localization is the head and neck region. Female/male ratio is 3/2. It shows deep subcutaneous placement and occurs in the first two decades of life. Its diameter ranges from 0.5 cm to 3 cm. Multiple lesions are rarely seen. Histopathologically it is characterized by basoloid and ghost cells. Perforating type is a rare clinical variant. Treatment is surgical excision. Our case is presented to draw attention to a rare clinical variant of pilomatrixioma.

  18. PROTOTIPE VIDEO EDITOR DENGAN MENGGUNAKAN DIRECT X DAN DIRECT SHOW

    Directory of Open Access Journals (Sweden)

    Djoni Haryadi Setiabudi

    2004-01-01

    Full Text Available Technology development had given people the chance to capture their memorable moments in video format. A high quality digital video is a result of a good editing process. Which in turn, arise the new need of an editor application. In accordance to the problem, here the process of making a simple application for video editing needs. The application development use the programming techniques often applied in multimedia applications, especially video. First part of the application will begin with the video file compression and decompression, then we'll step into the editing part of the digital video file. Furthermore, the application also equipped with the facilities needed for the editing processes. The application made with Microsoft Visual C++ with DirectX technology, particularly DirectShow. The application provides basic facilities that will help the editing process of a digital video file. The application will produce an AVI format file after the editing process is finished. Through the testing process of this application shows the ability of this application to do the 'cut' and 'insert' of video files in AVI, MPEG, MPG and DAT formats. The 'cut' and 'insert' process only can be done in static order. Further, the aplication also provide the effects facility for transition process in each clip. Lastly, the process of saving the new edited video file in AVI format from the application. Abstract in Bahasa Indonesia : Perkembangan teknologi memberi kesempatan masyarakat untuk mengabadikan saat - saat yang penting menggunakan video. Pembentukan video digital yang baik membutuhkan proses editing yang baik pula. Untuk melakukan proses editing video digital dibutuhkan program editor. Berdasarkan permasalahan diatas maka pada penelitian ini dibuat prototipe editor sederhana untuk video digital. Pembuatan aplikasi memakai teknik pemrograman di bidang multimedia, khususnya video. Perencanaan dalam pembuatan aplikasi tersebut dimulai dengan pembentukan

  19. Pseudo Random Coins Show More Heads Than Tails

    OpenAIRE

    Bauke, Heiko; Mertens, Stephan

    2003-01-01

    Tossing a coin is the most elementary Monte Carlo experiment. In a computer the coin is replaced by a pseudo random number generator. It can be shown analytically and by exact enumerations that popular random number generators are not capable of imitating a fair coin: pseudo random coins show more heads than tails. This bias explains the empirically observed failure of some random number generators in random walk experiments. It can be traced down to the special role of the value zero in the ...

  20. Model shows future cut in U.S. ozone levels

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    A joint U.S. auto-oil industry research program says modeling shows that changing gasoline composition can reduce ozone levels for Los Angeles in 2010 and for New York City and Dallas-Fort Worth in 2005. The air quality modeling was based on vehicle emissions research data released late last year (OGJ, Dec. 24, 1990, p. 20). The effort is sponsored by the big three auto manufacturers and 14 oil companies. Sponsors the cars and small trucks account for about one third of ozone generated in the three cities studied but by 2005-10 will account for only 5-9%

  1. The use of computerized tomography in patients showing tardive dyskinesia

    International Nuclear Information System (INIS)

    Themelis, I.

    1983-01-01

    29 patients showing moderate to markedly pronounced tardive dyskinesia (TD) and a further 29 control patients (C) under a similar long-term medication with neuroleptics that had been so chosen as to match the age and sex distributions of the former group were subjected to computered tomography, neurological examination and psychological testing. The results did not point to any correlations between the structural changes and duration of treatment and the clinical signs or symptoms of extrapyramidal disorder. This was taken as further evidence in support of the theory that the initial damage in tardive dyskinesia mainly is at the level of the basal ganglia. (orig./MG) [de

  2. DIME Students Show Off their Lego(TM) Challenge Creation

    Science.gov (United States)

    2002-01-01

    Two students show the Lego (TM) Challenge device they designed and built to operate in the portable drop tower demonstrator as part of the second Dropping in a Microgravity Environment (DIME) competition held April 23-25, 2002, at NASA's Glenn Research Center. Competitors included two teams from Sycamore High School, Cincinnati, OH, and one each from Bay High School, Bay Village, OH, and COSI Academy, Columbus, OH. DIME is part of NASA's education and outreach activities. Details are on line at http://microgravity.grc.nasa.gov/DIME_2002.html.

  3. Intracerebral metastasis showing restricted diffusion: Correlation with histopathologic findings

    Energy Technology Data Exchange (ETDEWEB)

    Duygulu, G. [Radiology Department, Ege University Medicine School, Izmir (Turkey); Ovali, G. Yilmaz [Radiology Department, Celal Bayar University Medicine School, Manisa (Turkey)], E-mail: gulgun.yilmaz@bayar.edu.tr; Calli, C.; Kitis, O.; Yuenten, N. [Radiology Department, Ege University Medicine School, Izmir (Turkey); Akalin, T. [Pathology Department, Ege University Medicine School, Izmir (Turkey); Islekel, S. [Neurosurgery Department, Ege University Medicine School, Izmir (Turkey)

    2010-04-15

    Objective: We aimed to detect the frequency of restricted diffusion in intracerebral metastases and to find whether there is correlation between the primary tumor pathology and diffusion-weighted MR imaging (DWI) findings of these metastases. Material and methods: 87 patients with intracerebral metastases were examined with routine MR imaging and DWI. 11 hemorrhagic metastatic lesions were excluded. The routine MR imaging included three plans before and after contrast enhancement. The DWI was performed with spin-echo EPI sequence with three b values (0, 500 and 1000), and ADC maps were calculated. 76 patients with metastases were grouped according to primary tumor histology and the ratios of restricted diffusion were calculated according to these groups. ADCmin values were measured within the solid components of the tumors and the ratio of metastases with restricted diffusion to that which do not show restricted diffusion were calculated. Fisher's exact and Mann-Whitney U tests were used for the statistical analysis. Results: Restricted diffusion was observed in a total of 15 metastatic lesions (19, 7%). Primary malignancy was lung carcinoma in 10 of these cases (66, 6%) (5 small cell carcinoma, 5 non-small cell carcinoma), and breast carcinoma in three cases (20%). Colon carcinoma and testicular teratocarcinoma were the other two primary tumors in which restricted diffusion in metastasis was detected. There was no statistical significant difference between the primary pathology groups which showed restricted diffusion (p > 0.05). ADCmin values of solid components of the metastasis with restricted diffusion and other metastasis without restricted diffusion also showed no significant statistical difference (0.72 {+-} 0.16 x 10{sup -3} mm{sup 2}/s and 0.78 {+-} 21 x 10{sup -3} mm{sup 2}/s respectively) (p = 0.325). Conclusion: Detection of restricted diffusion on DWI in intracerebral metastasis is not rare, particularly if the primary tumor is lung or breast

  4. Russian refining shows signs of revival, needs investment

    International Nuclear Information System (INIS)

    Plotnikov, V.S.; Avgerinos, G.F.; Dvorets, N.L.; Tyukov, V.M.

    1996-01-01

    The Russian refining industry appears ready for a comeback but needs investment from abroad. After 7 years of annual decline, output of petroleum products in the former Soviet Union (FSU), most of it from Russian refineries, is estimated to have dropped marginally last year. And an increase is possible this year. In 1994, Russia's refineries, which account for two thirds of total FSU distillation capacity, yielded 176.2 million metric tons of oil products, compared with 214.1 million tons in 1993. Despite the precipitous decline in refinery production, net FSU exports oil refined products were down only 5% in 1994 at about 51.3 million tons. This occurred despite the decline in refinery production because of sizable contraction in oil consumption in Russian and the other republics. Russia, like the rest of the FSU, needs more than loans to produce oil or restore wells. According to the Ministries of Economics and Fuels and Energy, 90% of Russian enterprises need foreign capital. Investments to rebuild refining, gas processing, and petrochemicals are necessary, as are funds for modern technologies and equipment. Capital also is needed for extraction of resources that are remotely located or difficult to produce. In addition to providing a legal structure that provides a solid basis for investment, Russian must promote competition, change its tax system to raise revenue but allow companies to retain profits, and remove disincentives to investment for domestic and foreign enterprises

  5. Do horses with poor welfare show `pessimistic' cognitive biases?

    Science.gov (United States)

    Henry, S.; Fureix, C.; Rowberry, R.; Bateson, M.; Hausberger, M.

    2017-02-01

    This field study tested the hypothesis that domestic horses living under putatively challenging-to-welfare conditions (for example involving social, spatial, feeding constraints) would present signs of poor welfare and co-occurring pessimistic judgement biases. Our subjects were 34 horses who had been housed for over 3 years in either restricted riding school situations ( e.g. kept in single boxes, with limited roughage, ridden by inexperienced riders; N = 25) or under more naturalistic conditions ( e.g. access to free-range, kept in stable social groups, leisure riding; N = 9). The horses' welfare was assessed by recording health-related, behavioural and postural indicators. Additionally, after learning a location task to discriminate a bucket containing either edible food (`positive' location) or unpalatable food (`negative' location), the horses were presented with a bucket located near the positive position, near the negative position and halfway between the positive and negative positions to assess their judgement biases. The riding school horses displayed the highest levels of behavioural and health-related problems and a pessimistic judgment bias, whereas the horses living under more naturalistic conditions displayed indications of good welfare and an optimistic bias. Moreover, pessimistic bias data strongly correlated with poor welfare data. This suggests that a lowered mood impacts a non-human species' perception of its environment and highlights cognitive biases as an appropriate tool to assess the impact of chronic living conditions on horse welfare.

  6. Do horses with poor welfare show 'pessimistic' cognitive biases?

    Science.gov (United States)

    Henry, S; Fureix, C; Rowberry, R; Bateson, M; Hausberger, M

    2017-02-01

    This field study tested the hypothesis that domestic horses living under putatively challenging-to-welfare conditions (for example involving social, spatial, feeding constraints) would present signs of poor welfare and co-occurring pessimistic judgement biases. Our subjects were 34 horses who had been housed for over 3 years in either restricted riding school situations (e.g. kept in single boxes, with limited roughage, ridden by inexperienced riders; N = 25) or under more naturalistic conditions (e.g. access to free-range, kept in stable social groups, leisure riding; N = 9). The horses' welfare was assessed by recording health-related, behavioural and postural indicators. Additionally, after learning a location task to discriminate a bucket containing either edible food ('positive' location) or unpalatable food ('negative' location), the horses were presented with a bucket located near the positive position, near the negative position and halfway between the positive and negative positions to assess their judgement biases. The riding school horses displayed the highest levels of behavioural and health-related problems and a pessimistic judgment bias, whereas the horses living under more naturalistic conditions displayed indications of good welfare and an optimistic bias. Moreover, pessimistic bias data strongly correlated with poor welfare data. This suggests that a lowered mood impacts a non-human species' perception of its environment and highlights cognitive biases as an appropriate tool to assess the impact of chronic living conditions on horse welfare.

  7. Oklahoma Cherokee formation study shows benefits of gas tax credits

    International Nuclear Information System (INIS)

    Stanley, B.J.; Cline, S.B.

    1994-01-01

    To no one's surprise, the administration's recently released energy initiative package does not advocate the use of tax incentives such as the Internal Revenue Code Sec. 29 (tight sand gas) credit that expired Dec. 31, 1992. This is unfortunate since tax credits do stimulate drilling, as the authors' recent study of Oklahoma's Pennsylvanian age Cherokee formation demonstrates. Within this 783,000 acre study area, more than 130 additional wells were drilled between 1991--92 because of tax credit incentives. And such tax credits also increase total federal tax revenues by causing wells to be drilled that would not have been drilled or accelerating the drilling of wells, thereby increasing taxable revenue. In short, tax credits create a win-win situation: they stimulate commerce, increase tax revenues, reduce the outflow of capital to foreign petroleum projects, and add to the nation's natural gas reserve, which is beneficial for national security, balance of payments, the environment, and gas market development. The paper discusses the study assumptions, study results, and the tax credit policy

  8. Dynamic hubs show competitive and static hubs non-competitive regulation of their interaction partners.

    Directory of Open Access Journals (Sweden)

    Apurv Goel

    Full Text Available Date hub proteins have 1 or 2 interaction interfaces but many interaction partners. This raises the question of whether all partner proteins compete for the interaction interface of the hub or if the cell carefully regulates aspects of this process? Here, we have used real-time rendering of protein interaction networks to analyse the interactions of all the 1 or 2 interface hubs of Saccharomyces cerevisiae during the cell cycle. By integrating previously determined structural and gene expression data, and visually hiding the nodes (proteins and their edges (interactions during their troughs of expression, we predict when interactions of hubs and their partners are likely to exist. This revealed that 20 out of all 36 one- or two- interface hubs in the yeast interactome fell within two main groups. The first was dynamic hubs with static partners, which can be considered as 'competitive hubs'. Their interaction partners will compete for the interaction interface of the hub and the success of any interaction will be dictated by the kinetics of interaction (abundance and affinity and subcellular localisation. The second was static hubs with dynamic partners, which we term 'non-competitive hubs'. Regulatory mechanisms are finely tuned to lessen the presence and/or effects of competition between the interaction partners of the hub. It is possible that these regulatory processes may also be used by the cell for the regulation of other, non-cell cycle processes.

  9. Gun Shows and Gun Violence: Fatally Flawed Study Yields Misleading Results

    Science.gov (United States)

    Hemenway, David; Webster, Daniel; Pierce, Glenn; Braga, Anthony A.

    2010-01-01

    A widely publicized but unpublished study of the relationship between gun shows and gun violence is being cited in debates about the regulation of gun shows and gun commerce. We believe the study is fatally flawed. A working paper entitled “The Effect of Gun Shows on Gun-Related Deaths: Evidence from California and Texas” outlined this study, which found no association between gun shows and gun-related deaths. We believe the study reflects a limited understanding of gun shows and gun markets and is not statistically powered to detect even an implausibly large effect of gun shows on gun violence. In addition, the research contains serious ascertainment and classification errors, produces results that are sensitive to minor specification changes in key variables and in some cases have no face validity, and is contradicted by 1 of its own authors’ prior research. The study should not be used as evidence in formulating gun policy. PMID:20724672

  10. Herbarium specimens show contrasting phenological responses to Himalayan climate.

    Science.gov (United States)

    Hart, Robbie; Salick, Jan; Ranjitkar, Sailesh; Xu, Jianchu

    2014-07-22

    Responses by flowering plants to climate change are complex and only beginning to be understood. Through analyses of 10,295 herbarium specimens of Himalayan Rhododendron collected by plant hunters and botanists since 1884, we were able to separate these responses into significant components. We found a lack of directional change in mean flowering time over the past 45 y of rapid warming. However, over the full 125 y of collections, mean flowering time shows a significant response to year-to-year changes in temperature, and this response varies with season of warming. Mean flowering advances with annual warming (2.27 d earlier per 1 °C warming), and also is delayed with fall warming (2.54 d later per 1 °C warming). Annual warming may advance flowering through positive effects on overwintering bud formation, whereas fall warming may delay flowering through an impact on chilling requirements. The lack of a directional response suggests that contrasting phenological responses to temperature changes may obscure temperature sensitivity in plants. By drawing on large collections from multiple herbaria, made over more than a century, we show how these data may inform studies even of remote localities, and we highlight the increasing value of these and other natural history collections in understanding long-term change.

  11. High-Resolution Observations of a Filament showing Activated Barb

    Science.gov (United States)

    Joshi, Anand; Martin, Sara F.; Mathew, Shibu; Srivastava, Nandita

    2012-07-01

    Analysis of a filament showing an activated barb using observations from the Dutch Open Telescope (DOT) on 2010 August 20 are presented. The DOT takes Doppler images in Hα, among other wavelengths, in a region about 110 × 110 arcsec^{2} in area, at a cadence of 30~seconds. The offline image restoration technique of speckle reconstruction is applied to obtain diffraction limited images. The filament developed a new barb in 10~minutes, which disappeared within the next 35~minutes. Such a rapid formation and disappearance of a filament barb is unusual, and has not been reported earlier. Line-of-sight velocity maps were constructed from the Doppler images of the target filament. We observe flows in the filament spine towards the barb location prior to its formation, and flows in the barb towards the spine during its disappearance. Photospheric magnetograms from Heliospheric Magnetic Imager on board the Solar Dynamics Observatory, at a cadence of 45~seconds, were used to determine the changes in magnetic flux in the region surrounding the barb location. The variation of magnetic flux in this duration supports the view that barbs are rooted in minor magnetic polarity. Our analysis shows that barbs can be short-lived and formation and disappearance of the barb was associated with cancellation of magnetic flux.

  12. [How children show positive and negative relationships on their drawings].

    Science.gov (United States)

    Gramel, Sabine

    2005-01-01

    This study analyses, whether pictures of children showing a positive relationship are significantly different from those showing a negative one with respect to several criteria. The study involved a random selection of 45 children aged 4;6 to 11;6 years. The children painted a picture with themselves and a person they liked and a picture of themselves with someone they disliked. For the most part, the children drew pictures of themselves with peers both with respect to positive as well as negative images. In an interview afterwards, the children specified the criteria in their drawings by which the quality of the particular relationship can be identified. Positive and negative relationship paintings differ in the character of activity described. The sun as an element in children's paintings is painted not more frequent on positive compared to negative pictures. The colour black is used more often in the drawings signifying negative relationships. While girls used more colour in negative relationship drawings, boys used more colour in the positive ones. There was no significant difference in the use of favourite colours and decorative elements between the two groups. Only in negative relationship drawings people were looking away from each other. Smiling individuals were more common in the positive relationship pictures and in pictures painted by the 6 to 8 year olds. A greater distance between the individuals emerged on negative relationship drawings of the girls.

  13. Double polymer sheathed carbon nanotube supercapacitors show enhanced cycling stability

    Science.gov (United States)

    Zhao, Wenqi; Wang, Shanshan; Wang, Chunhui; Wu, Shiting; Xu, Wenjing; Zou, Mingchu; Ouyang, An; Cao, Anyuan; Li, Yibin

    2015-12-01

    Pseudo-materials are effective in boosting the specific capacitance of supercapacitors, but during service their degradation may also be very strong, causing reduced cycling stability. Here, we show that a carbon nanotube sponge grafted by two conventional pseudo-polymer layers in sequence can serve as a porous supercapacitor electrode with significantly enhanced cycling stability compared with single polymer grafting. Creating conformal polymer coatings on the nanotube surface and the resulting double-sheath configuration are important structural factors leading to the enhanced performance. Combining different polymers as double sheaths as reported here might be a potential route to circumvent the dilemma of pseudo-materials, and to simultaneously improve the capacitance and stability for various energy storage devices.Pseudo-materials are effective in boosting the specific capacitance of supercapacitors, but during service their degradation may also be very strong, causing reduced cycling stability. Here, we show that a carbon nanotube sponge grafted by two conventional pseudo-polymer layers in sequence can serve as a porous supercapacitor electrode with significantly enhanced cycling stability compared with single polymer grafting. Creating conformal polymer coatings on the nanotube surface and the resulting double-sheath configuration are important structural factors leading to the enhanced performance. Combining different polymers as double sheaths as reported here might be a potential route to circumvent the dilemma of pseudo-materials, and to simultaneously improve the capacitance and stability for various energy storage devices. Electronic supplementary information (ESI) available. See DOI: 10.1039/c5nr05978j

  14. Ovalbumin with Glycated Carboxyl Groups Shows Membrane-Damaging Activity

    Directory of Open Access Journals (Sweden)

    Ching-Chia Tang

    2017-02-01

    Full Text Available The aim of the present study was to investigate whether glycated ovalbumin (OVA showed novel activity at the lipid-water interface. Mannosylated OVA (Man-OVA was prepared by modification of the carboxyl groups with p-aminophenyl α-dextro (d-mannopyranoside. An increase in the number of modified carboxyl groups increased the membrane-damaging activity of Man-OVA on cell membrane-mimicking vesicles, whereas OVA did not induce membrane permeability in the tested phospholipid vesicles. The glycation of carboxyl groups caused a notable change in the gross conformation of OVA. Moreover, owing to their spatial positions, the Trp residues in Man-OVA were more exposed, unlike those in OVA. Fluorescence quenching studies suggested that the Trp residues in Man-OVA were located on the interface binds with the lipid vesicles, and their microenvironment was abundant in positively charged residues. Although OVA and Man-OVA showed a similar binding affinity for lipid vesicles, the lipid-interacting feature of Man-OVA was distinct from that of OVA. Chemical modification studies revealed that Lys and Arg residues, but not Trp residues, played a crucial role in the membrane-damaging activity of Man-OVA. Taken together, our data suggest that glycation of carboxyl groups causes changes in the structural properties and membrane-interacting features of OVA, generating OVA with membrane-perturbing activities at the lipid-water interface.

  15. Fish kidney cells show higher tolerance to hyperosmolality than amphibian

    Directory of Open Access Journals (Sweden)

    Lang Gui

    2018-05-01

    Full Text Available In contrast to fish, amphibians inhabit both aquatic and terrestrial environments. To better understand osmoregulation in fish and amphibian, we have investigated the morphological changes in kidney cells to osmotic stress. To address this, kidney cell line isolated from the freshwater grass carp (CIK and Chinese giant salamander (GSK were challenged to different mediums with distinct osmotic pressures (100, 300 and 700 mOsm. Morphological alterations of the fish and amphibian cells were compared by optical and electron microscopy. Following hyposmotic treatment (100 mOsm, both CIK and GSK cells became unhealthy and show condensed chromatin, swollen mitochondria and cytoplasmic vacuole. Meanwhile, after hyperosmotic treatment (700 mOsm, shrunken CIK cells with multipolar shape, pale or lightly stained cytoplasm, condensed chromatin, vacuoles and swollen mitochondria were detected. GSK cells were seriously damaged and most were completely lysed. The results suggest that fish kidney cells show a higher degree of tolerance to hyperosmoticity by comparing to amphibians and provide novel insights on the osmoregulatory capacity and adaptability of kidney cells between the two animal groups.

  16. Phytoceramide Shows Neuroprotection and Ameliorates Scopolamine-Induced Memory Impairment

    Directory of Open Access Journals (Sweden)

    Seikwan Oh

    2011-10-01

    Full Text Available The function and the role phytoceramide (PCER and phytosphingosine (PSO in the central nervous system has not been well studied. This study was aimed at investigating the possible roles of PCER and PSO in glutamate-induced neurotoxicity in cultured neuronal cells and memory function in mice. Phytoceramide showed neuro-protective activity in the glutamate-induced toxicity in cultured cortical neuronal cells. Neither phytosphingosine nor tetraacetylphytosphingosine (TAPS showed neuroproective effects in neuronal cells. PCER (50 mg/kg, p.o. recovered the scopolamine-induced reduction in step-through latency in the passive avoidance test; however, PSO did not modulate memory function on this task. The ameliorating effects of PCER on spatial memory were confirmed by the Morris water maze test. In conclusion, through behavioral and neurochemical experimental results, it was demonstrated that central administration of PCER produces amelioration of memory impairment. These results suggest that PCER plays an important role in neuroprotection and memory enhancement and PCER could be a potential new therapeutic agent for the treatment of neurodegenerative diseases such as Alzheimer’s disease.

  17. Face and body recognition show similar improvement during childhood.

    Science.gov (United States)

    Bank, Samantha; Rhodes, Gillian; Read, Ainsley; Jeffery, Linda

    2015-09-01

    Adults are proficient in extracting identity cues from faces. This proficiency develops slowly during childhood, with performance not reaching adult levels until adolescence. Bodies are similar to faces in that they convey identity cues and rely on specialized perceptual mechanisms. However, it is currently unclear whether body recognition mirrors the slow development of face recognition during childhood. Recent evidence suggests that body recognition develops faster than face recognition. Here we measured body and face recognition in 6- and 10-year-old children and adults to determine whether these two skills show different amounts of improvement during childhood. We found no evidence that they do. Face and body recognition showed similar improvement with age, and children, like adults, were better at recognizing faces than bodies. These results suggest that the mechanisms of face and body memory mature at a similar rate or that improvement of more general cognitive and perceptual skills underlies improvement of both face and body recognition. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  19. Biocompatibility of photopolymers for additive manufacturing

    OpenAIRE

    Leonhardt Stefan; Klare Martin; Scheer Maurice; Fischer Theresa; Cordes Burghard; Eblenkamp Markus

    2016-01-01

    To establish photopolymers for the production of class II or class III medical products by additive manufacturing it is essential to know which components of photopolymeric systems, consisting of monomers, photoinitiators and additives, are the determining factors on their biocompatible properties. In this study the leachable substances of a cured photopolymeric system were eluted and identified by HPLC-MS detection. In addition the cured photopolymer was testes for cytotoxicity and genotoxic...

  20. Harnessing the Potential of Additive Manufacturing

    Science.gov (United States)

    2016-12-01

    31 Defense AT&L: November-December 2016 Harnessing the Potential of Additive Manufacturing Bill Decker Decker is director of Technology...achieve its goal of competition throughout the acquisition life cycle. When we look at additive manufacturing , we have a much different environment. To...Titanium-6 Aluminum-4 Vanadium with Powder Bed Fusion. This specification covers additively manufactured titanium-6 aluminum-4 vanadium (Ti-6Al-4V