WorldWideScience

Sample records for hiding shishir nagaraja

  1. Biological studies on Trichogrammatoidea bactrae Nagaraja (Hymenoptera: Trichogrammatidae), egg parasitoid of Tuta absoluta Meyrick (Lepidoptera: Gelechiidae)

    Energy Technology Data Exchange (ETDEWEB)

    Virgala, Maria B. Riquelme, E-mail: mbriquelme@cnia.inta.gov.a [Universidade Nacional de Lujan, Buenos Aires (Argentina). Lab. de Zoologia Agricola; Botto, Eduardo N., E-mail: enbotto@cnia.inta.gov.a [Instituto de Microbiologia y Zoologia Agricola (IMYZA), Buenos Aires (Argentina)

    2010-07-15

    The tomato moth, Tuta absoluta Meyrick, is one of the most important tomato pests in South America. In Argentina, management strategies include only chemical control. In this work, the parasitoid wasp Trichogrammatoidea bactrae Nagaraja was evaluated as a potential natural enemy against this pest. Biological and population parameters were estimated by developing a life table under laboratory conditions at 25 {+-} 1 degree C, 14:10 photo period and 60 {+-} 10% RH. Three cohorts of 26-30 T. bactrae females each were placed with one of the three following treatments: 1 - Sitotroga cerealella (Olivier) eggs on a piece of cardboard; 2 - S. cerealella eggs on a piece of tomato leaf, and 3- T. absoluta eggs on a piece on tomato leaf. The following parameters were estimated for each cohort: survival (egg to adult), longevity, fecundity and oviposition period of females, sex proportion of the F1, net rate of reproduction (Ro), mean generation time (T) and intrinsic rate of population increase (rm). Survival of the T. bactrae immature was higher than 90% on both, S. cerealella and T. absoluta eggs. The female survival curves corresponded to type III and showed no significant differences among treatments. The three cohorts did not show significant differences between sex ratio, female longevity, oviposition period, fecundity and the population parameters studied. These results indicate that T. bactrae would be a potential biological control agent of T. absoluta. (author)

  2. Hackers in Hiding:

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2016-01-01

    On several occasions Michel Foucault advocated a methodological turn towards what he called a ‘happy positivism’. Foucault’s emphasis on the surface does not deny the importance of structures of hiding, but understands it as a game in which the structures of hiding are viewed as contingently given....... In this paper, I will analyse the conflict between the hacker movement and the field of corporate interests. I argue that the introduction of graphical user interfaces and the maintaining of copyright interests are the contingent background of the ongoing conflict. By bracketing the analyses of hidden...

  3. Information hiding technique

    Science.gov (United States)

    Younger, Michael; Budulas, Peter P.; Young, Stuart H.

    2002-08-01

    Spread spectrum communication techniques have been recognized as a viable method to gain an advantage in interference environments. Many military-oriented systems have been initiated, and some civil systems have been attempted. Spread spectrum allows the ability to hide the signal of interest below or in the noise floor, so as not to be detected. A spread spectrum system is one in which the transmitted signal is spread over a wide frequency band, much wider, in fact, than the minimum bandwidth required to transmit the information being sent. We at Army Research Lab (ARL) are proposing using the same technique on the Internet with port hopping. The information would be transmitted in data packets over multiple ports. The port used would vary per packet or per session basis. This port hopping gives you and the recipients the ability to take datagram's and spread them out over a multitude of ports. This will hide information among the Internet noise. This will allow trusted communications between the transmitter and receiver because of the port coding sequence. There are 64K possible ports to span datagram. Jamming of transmission would be limiting the ability of the sniffer/listener. Also, the listener will find it difficult to use a man in the middle attach, since the data will be spread over multiple ports and only the receiver and transmitter will know the specific port sequencing for the datagram.

  4. Image hiding using optical interference

    Science.gov (United States)

    Zhang, Yan; Wang, Weining

    2010-09-01

    Optical image encryption technology has attracted a lot of attentions due to its large capacitance and fast speed. In conventional image encryption methods, the random phase masks are used as encryption keys to encode the images into white noise distribution. Therefore, this kind of methods requires interference technology to record complex amplitude and is vulnerable to attack techniques. The image hiding methods which employ the phase retrieve algorithm to encode the images into two or more phase masks are proposed, the hiding process is carried out within a computer using iterative algorithm. But the iterative algorithms are time consumed. All method mentioned above are based on the optical diffraction of the phase masks. In this presentation, a new optical image hiding method based on optical interference is proposed. The coherence lights which pass through two phase masks are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are design analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the novelty of the new proposed methods. This method can be expanded for double images hiding.

  5. Optical hiding with visual cryptography

    Science.gov (United States)

    Shi, Yishi; Yang, Xiubo

    2017-11-01

    We propose an optical hiding method based on visual cryptography. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof and image-covered, leading to the high security. During the extraction process, the covered phase-keys are illuminated with laser beams and then incoherently superimposed to extract the hidden information directly by human vision, without complicated optical implementations and any additional computation, resulting in the convenience of extraction. Also, the phase-keys are manufactured as the diffractive optical elements that are robust to the attacks, such as the blocking and the phase-noise. Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.

  6. Family networks and income hiding

    NARCIS (Netherlands)

    Beekman, Gonne; Gatto, Marcel; Nillesen, Eleonora

    2015-01-01

    This study investigates the relationship between family network density and income hiding in rural Liberia. We link people's behaviour in a modified lottery experiment and a time preference game to detailed information about their family networks. We find that individuals with a dense family

  7. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  8. Reflections on Quantum Data Hiding

    Science.gov (United States)

    Winter, Andreas

    Quantum data hiding, originally invented as a limitation on local operations and classical communications (LOCC) in distinguishing globally orthogonal states, is actually a phenomenon arising generically in statistics whenever comparing a `strong' set of measurements (i.e., decision rules) with a `weak' one. The classical statistical analogue of this would be secret sharing, in which two perfectly distinguishable multi-partite hypotheses appear to be indistinguishable when accessing only a marginal. The quantum versions are richer in that for example LOCC allows for state tomography, so the states cannot be come perfectly indistinguishable but only nearly so, and hence the question is one of efficiency. I will discuss two concrete examples and associated sets of problems: 1. Gaussian operations and classical computation (GOCC): Not very surprisingly, GOCC cannot distinguish optimally even two coherent states of a single mode. Here we find states, each a mixture of multi-mode coherent states, which are almost perfectly distinguishable by suitable measurements, by when restricted to GOCC, i.e. linear optics and post-processing, the states appear almost identical. The construction is random and relies on coding arguments. Open questions include whether there one can give a constructive version of the argument, and whether for instance even thermal states can be used, or how efficient the hiding is. 2. Local operation and classical communication (LOCC): It is well-known that in a bipartite dxd-system, asymptotically logd bits can be hidden. Here we show for the first time, using the calculus of min-entropies, that this is asymptotically optimal. In fact, we get bounds on the data hiding capacity of any preparation system; these are however not always tight. While it is known that data hiding by separable states is possible (i.e. the state preparation can be done by LOCC), it is open whether the optimal information efficiency of (asymptotically) log d bits can be

  9. Recent Advances in Information Hiding and Applications

    CERN Document Server

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao

    2013-01-01

    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  10. Optical image hiding based on interference

    Science.gov (United States)

    Zhang, Yan; Wang, Bo

    2009-11-01

    Optical image processing has been paid a lot of attentions recently due to its large capacitance and fast speed. Many image encryption and hiding technologies have been proposed based on the optical technology. In conventional image encryption methods, the random phase masks are usually used as encryption keys to encode the images into random white noise distribution. However, this kind of methods requires interference technology such as holography to record complex amplitude. Furthermore, it is vulnerable to attack techniques. The image hiding methods employ the phase retrieve algorithm to encode the images into two or more phase masks. The hiding process is carried out within a computer and the images are reconstructed optically. But the iterative algorithms need a lot of time to hide the image into the masks. All methods mentioned above are based on the optical diffraction of the phase masks. In this presentation, we will propose a new optical image hiding method based on interference. The coherence lights pass through two phase masks and are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are designed analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the validity of the new proposed methods.

  11. Short term preservation of hide using vacuum: influence on properties of hide and of processed leather.

    Science.gov (United States)

    Gudro, Ilze; Valeika, Virgilijus; Sirvaitytė, Justa

    2014-01-01

    The objective of this work was to investigate vacuum influence on hide preservation time and how it affects hide structure. It was established that vacuum prolongs the storage time without hide tissue putrefaction up to 21 days when the storage temperature is 4°C. The microorganisms act for all storage times, but the action is weak and has no observable influence on the quality of hide during the time period mentioned. The hide shrinkage temperature decrease is negligible, which shows that breaking of intermolecular bonds does not occur. Optical microscopy, infrared spectroscopy and differential scanning calorimetry also did not show any structural changes which can influence the quality of leather produced from such hide. The qualitative indexes of wet blue processed under laboratory conditions and of leather produced during industrial trials are presented. Indexes such as chromium compounds exhaustion, content of chromium in leather, content of soluble matter in dichloromethane, strength properties, and shrinkage temperature were determined. Properties of the leather produced from vacuumed hide under industrial conditions conformed to the requirements of shoe upper leather.

  12. Perception of Stakeholders to the Proposed Ban on Cow Hide ...

    African Journals Online (AJOL)

    User

    Keywords: Cow hide consumption, cow hide value chain, ponmo .... value chain;. 2. identify sources of information of the respondents on the proposed ban; ..... the health risk associated with the consumption of ponmo may favour its proposed.

  13. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  14. Hiding levitating objects above a ground plane

    DEFF Research Database (Denmark)

    Zhang, Jingjing; Luo, Yu; Mortensen, Asger

    2010-01-01

    An approach to hiding objects levitating above a conducting sheet is suggested in this paper. The proposed device makes use of isotropic negative-refractive-index materials without extreme material parameters, and creates an illusion of a remote conducting sheet. Numerical simulations are perform...

  15. HIDE working groups: synchrotron based system: summary

    International Nuclear Information System (INIS)

    Barton, M.Q.

    1978-01-01

    A brief overview is given of the work resulting from a one-week workshop on the use of synchrotrons in heavy ion fusion, i.e., a Heavy Ion Demonstration Experiment (HIDE). Topics discussed concerned the number of beams on target, space charge limitations, choice of ion charge state, and areas identified as needing further work

  16. Matryoshka: Hiding Secret Communication in Plain Sight

    OpenAIRE

    Safaka, Iris; Fragouli, Christina; Argyraki, Katerina

    2016-01-01

    We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small -- existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of...

  17. Children and Robots Learning to Play Hide and Seek

    National Research Council Canada - National Science Library

    Trafton, J. G; Schultz, Alan C; Perznowski, Dennis; Bugajska, Magdalena D; Adams, William; Cassimatis, Nicholas L; Brock, Derek P

    2006-01-01

    ...., containment, under) and use that information to play a credible game of hide and seek. They model this hypothesis within the ACT-R cognitive architecture and put the model on a robot, which is able to mimic the child's hiding behavior. They also take the "hiding" model and use it as the basis for a "seeking" model. They suggest that using the same representations and procedures that a person uses allows better interaction between the human and robotic system.

  18. An Image Encryption Method Based on Bit Plane Hiding Technology

    Institute of Scientific and Technical Information of China (English)

    LIU Bin; LI Zhitang; TU Hao

    2006-01-01

    A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane of several different open images. And then a new hiding image is acquired by a nesting "Exclusive-OR" operation on those images obtained from the first step. At last, by employing image fusion technique, the final hiding result is achieved. The experimental result shows that the method proposed in this paper is effective.

  19. Hiding Information Using different lighting Color images

    Science.gov (United States)

    Majead, Ahlam; Awad, Rash; Salman, Salema S.

    2018-05-01

    The host medium for the secret message is one of the important principles for the designers of steganography method. In this study, the best color image was studied to carrying any secret image.The steganography approach based Lifting Wavelet Transform (LWT) and Least Significant Bits (LSBs) substitution. The proposed method offers lossless and unnoticeable changes in the contrast carrier color image and imperceptible by human visual system (HVS), especially the host images which was captured in dark lighting conditions. The aim of the study was to study the process of masking the data in colored images with different light intensities. The effect of the masking process was examined on the images that are classified by a minimum distance and the amount of noise and distortion in the image. The histogram and statistical characteristics of the cover image the results showed the efficient use of images taken with different light intensities in hiding data using the least important bit substitution method. This method succeeded in concealing textual data without distorting the original image (low light) Lire developments due to the concealment process.The digital image segmentation technique was used to distinguish small areas with masking. The result is that smooth homogeneous areas are less affected as a result of hiding comparing with high light areas. It is possible to use dark color images to send any secret message between two persons for the purpose of secret communication with good security.

  20. Dynamics and driving forces of hides, skins, leather and leather ...

    African Journals Online (AJOL)

    Footwear and leather goods are constrained by lack of factories, competition from used goods, synthetic plastics and uninformed market. Investment in hides, skins and leather industry supported by training programmes has potential to generate great monetary revenue. Keywords: Hides, skin, leather, value chain, slaughter ...

  1. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  2. Efficient Information Hiding Based on Theory of Numbers

    Directory of Open Access Journals (Sweden)

    Yanjun Liu

    2018-01-01

    Full Text Available Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hiding scheme based on the combination of Chinese remainder theorem (CRT and a new extraction function is proposed. By the proposed scheme, the cover image is divided into non-overlapping pixel groups for embedding to increase the embedding capacity. Experimental results show that the embedding capacity of the proposed scheme is significantly higher (greater than 2.5 bpp than previously proposed schemes while ensuring very good visual quality of the stego image. In addition, security analysis is given to show that the proposed scheme can resist visual attack.

  3. Selective Redundancy Removal: A Framework for Data Hiding

    Directory of Open Access Journals (Sweden)

    Ugo Fiore

    2010-02-01

    Full Text Available Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs. Such redundancy may be removed by means of optimization software. Redundancy removal, if applied selectively, enables information hiding. This work introduces Selective Redundancy Removal (SRR as a framework for hiding data. An example application of the framework is given in terms of hiding information in HTML documents. Non-uniformity across documents may raise alarms. Nevertheless, selective application of optimization techniques might be due to the legitimate use of optimization software not supporting all the optimization methods, or configured to not use all of them.

  4. Hiding Critical Targets in Smart Grid Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bao, Wei [Univ. of Arkansas, Fayetteville, AR (United States); Li, Qinghua

    2017-10-23

    With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromised nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.

  5. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  6. Alkali-free method of hide preparation for tanning

    OpenAIRE

    Valeika, V.; Beleska, K.; Sirvaityte, J.

    2012-01-01

    Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming) up to strongly acid (pickling). This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. D...

  7. Mechanical properties of biobased films prepared from collagen solutions derived from bovine hides

    Science.gov (United States)

    The most valuable byproducts of the meat packing industry are hides. The U.S. is the world’s 3rd largest hide producing country and currently produces approximately 35 million cattle hides annually. Due to fierce competition in global markets, the American leather and hides industry is facing chal...

  8. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: RVO:67985998 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  9. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: PRVOUK-P23 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  10. Let’s play hide and seek!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    This week, we would like you to play a small online game called “Virtual Hide & Seek”. The rules are simple: some of our colleagues have published some sensitive or confidential documents on CERN’s central services like Indico, CDS, EDMS or TWiki, as well as on our many websites. Your mission, should you choose to accept it: find them!   If you provide us with documents marked “confidential”, “classified”, “sensitive”, or containing plain text operational passwords, you can win a book on computer security. There are only few conditions: these documents must be visible from outside CERN, must not require a CERN account in order to access them, and must not belong to you or have a direct link with your work. Have fun! But seriously, are you sure that your documents are really properly protected? We regularly find confidential documents stored on one of the CERN central  services and w...

  11. Book Review: No Place To Hide

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2007-03-01

    Full Text Available O'Harrow, R., Jr. (2006. No Place To Hide. New York: Free Press. 352 pages, ISBN: 0-7432-8705-3 (paper, US$26Reviewed by Gary C. Kessler (gary.kessler@champlain.eduPersonal privacy and the protection of personal identifying information are of concern to all of us. Innumerable articles and conferences address our loss of privacy, either through the sale of consumer databases or our own inattention. Opinions vary from "You have no privacy; get over it" to "This is the end of civil liberties as we know them." We teach people to safely maneuver on the Internet and minimize their exposure to bogus sites set up to steal their identity, warn users about the dangers of phishing and posting personal information on social network sites, use firewalls to protect our databases, and enact laws such as the Health Insurance Portability and Accountability Act (HIPAA and the Family Educational Rights and Privacy Act (FERPA to protect information.(see PDF for full review

  12. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  13. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Directory of Open Access Journals (Sweden)

    Andreas Wilke

    Full Text Available Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  14. Alkali-free method of hide preparation for tanning

    Directory of Open Access Journals (Sweden)

    V. Valeika

    2012-06-01

    Full Text Available Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming up to strongly acid (pickling. This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. During both processes, unhairing and oxidative treatment, the opening of the derma structure occurs: 13.3-14.6g of non-collagen proteins are removed and amount of dermatan sulphate decreases by 35%. The hide obtained can be chromed directly after the above processes and subsequent treatment with sodium chloride solution omitted conventional pickling. The pH of the hide varies in the range of 8.3-3.7 during the processes of preparation for tanning.

  15. Perspective taking and theory of mind in hide and seek.

    Science.gov (United States)

    Street, Chris N H; Bischof, Walter F; Kingstone, Alan

    2018-01-01

    Does theory of mind play a significant role in where people choose to hide an item or where they search for an item that has been hidden? Adapting Anderson's "Hide-Find Paradigm" Anderson et al. (Action, Perception and Performance, 76, 907-913, 2014) participants viewed homogenous or popout visual arrays on a touchscreen table. Their task was to indicate where in the array they would hide an item, or to search for an item that had been hidden, by either a friend or a foe. Critically, participants believed that their sitting location at the touchtable was the same as-or opposite to-their partner's location. Replicating Anderson et al., participants tended to (1) select items nearer to themselves on homogenous displays, and this bias was stronger for a friend than foe; and (2) select popout items, and again, more for a friend than foe. These biases were observed only when participants believed that they shared the same physical perspective as their partner. Collectively, the data indicate that theory of mind plays a significant role in hiding and finding, and demonstrate that the hide-find paradigm is a powerful tool for investigating theory of mind in adults.

  16. Market structure and performance of value chain actors in hides and ...

    African Journals Online (AJOL)

    Market structure and performance of value chain actors in hides and skins processing and marketing in Nigeria. ... There was high performance in hides and skins processing and marketing in Nigeria. ... EMAIL FULL TEXT EMAIL FULL TEXT

  17. Probability of error in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2007-01-01

    Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the

  18. On the Bayes risk in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2008-01-01

    Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability

  19. Polycyclic Aromatic Hydrocarbons (PAHs) Content in Cattle Hides ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Vol. 21 (6) 1105-1110. Full-text Available Online at www.ajol.info and ... Keywords: Cattle hide, meat, tyre, singeing, hydrocarbons ... on the substance used as fuel for meat processing. .... through the centrifuge at 200 rpm for 5 min. The.

  20. Intersectional Analysis in Critical Mathematics Education Research: A Response to Figure Hiding

    Science.gov (United States)

    Bullock, Erika C.

    2018-01-01

    In this chapter, I use figure hiding as a metaphor representing the processes of exclusion and suppression that critical mathematics education (CME) seeks to address. Figure hiding renders identities and modes of thought in mathematics education and mathematics education research invisible. CME has a commitment to addressing figure hiding by…

  1. Hiding and Searching Strategies of Adult Humans in a Virtual and a Real-Space Room

    Science.gov (United States)

    Talbot, Katherine J.; Legge, Eric L. G.; Bulitko, Vadim; Spetch, Marcia L.

    2009-01-01

    Adults searched for or cached three objects in nine hiding locations in a virtual room or a real-space room. In both rooms, the locations selected by participants differed systematically between searching and hiding. Specifically, participants moved farther from origin and dispersed their choices more when hiding objects than when searching for…

  2. Effects of dehydration methods on the characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  3. Effects of dehydration methods on characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  4. Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    OpenAIRE

    de Fuentes, Jose Maria; Blasco, Jorge; González-Tablas, Ana Isabel; González-Manzano, Lorena

    2014-01-01

    Vehicular ad hoc networks (VANETs) are a new communication scenario in which vehicles take an active part. Real-time reporting of misbehaving vehicles by surrounding ones is enabled by in-vehicle sensors and VANETs. Thus, sensors allow detecting the misbehavior whereas VANETs allow sending the report to the authority. Nevertheless, these reports should pass unnoticed by the reported driver to avoid his/her potential reprisals. Information hiding techniques could be used to allow vehicles to t...

  5. Unitary embedding for data hiding with the SVD

    Science.gov (United States)

    Bergman, Clifford; Davidson, Jennifer

    2005-03-01

    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  6. Efficient reversible data hiding in encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2014-09-01

    Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.

  7. Hiding Techniques for Dynamic Encryption Text based on Corner Point

    Science.gov (United States)

    Abdullatif, Firas A.; Abdullatif, Alaa A.; al-Saffar, Amna

    2018-05-01

    Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

  8. A New Images Hiding Scheme Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    LIU Nian-sheng; GUO Dong-hui; WU Bo-xi; Parr G

    2005-01-01

    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of covert image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).

  9. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Directory of Open Access Journals (Sweden)

    Sha Edwin Hsing-Mean

    2002-01-01

    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  10. DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Siva Shankar

    2016-08-01

    Full Text Available Digital image steganography has several applications in information security and communication. Data hiding in encrypted images ensure that both the cover image and the secret message can be recovered at the receiver end. This work presents a novel data hiding and image encryption scheme using random diffusion and Two dimensional Arnold cat mapping transform. The secret message bits are placed in the least significant bit positions of the cover image. Then a shared key is used to generate random 8 bit random integer stream and is added to the stego image in the random diffusion step. Arnold cat mapping transformation is done to scramble the pixels. The two steps of random diffusion and Arnold transform mapping are done alternatively several times to completely encrypt the image contents. The process is reversed at the receiver end to get both the secret message and the cover image with little loss. The random diffusion step overcomes the limited period of the Arnold transform. The embedding capacity of one bit per pixel is achieved. Security analysis is carried out which shows that the encryption is highly secure. The number of collisions is low thus preventing brute force attacks. The original cover image is recoverable with minimal losses.

  11. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  12. Reversible data hiding for image based on histogram modification of wavelet coefficients

    NARCIS (Netherlands)

    Liang, Xiaoping; Wu, Xiaoyun; Huang, Jiwu; Hao, Y.; Liu, J.; Wang, Y.; Cheung, Y.; Yin, H.; Jiao, L.; Ma, J.; Jiao, Y.C.

    2005-01-01

    Reversible data hiding has drawn intensive attention recently. Reversibility means to embed data into digital media and restore the original media from marked media losslessly. Reversible data hiding technique is desired in sensitive applications that require no permanent loss of signal fidelity. In

  13. A method for removing adobe-type manure from hides using an oxidizing agent

    Science.gov (United States)

    Adobe-type (hardened) manure attached to bovine hair is a major source of meat contamination, hide quality deterioration, and devalued leather products. Therefore, it is important to develop cleaning solutions that can rapidly remove adobe-type manure to improve the quality of hides delivered to tan...

  14. 9 CFR 310.10 - Carcasses with skin or hide on; cleaning before evisceration; removal of larvae of Hypodermae...

    Science.gov (United States)

    2010-01-01

    ..., DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION... pathological skin conditions. When a carcass is to be dressed with the skin or hide left on, the skin or hide...

  15. Effect of Some Sudanese Traditional Hot Iron Branding on Cattle Hide Quality

    Directory of Open Access Journals (Sweden)

    Rehab Eltejani Abdelkarim

    2016-12-01

    Full Text Available This study was designed in order to assess and evaluate the effect of hot iron branding on cattle hide quality. 62 shapes of hot iron branding were detected and classified. Branding damage was evaluated depending on: purpose of application, location in the animal body, branding area, tribe which applied and hide degree. The results showed that, Baggara tribes branding were causing the greater damage on cattle hides; where 71.4% of its brands placed in the abdominal and animal back area (middle of the hide; in proportion to Misseriya Zuraq tribes (68.4%. According to the location of branding, the less tribe that causing damages to the cattle hides were Darfur tribes (14.3%. In terms of branding area Darfur tribes were causing the most branding damages where 42.8% of its brands on cattle hides were between 20-30cm, followed by Baggara tribes where 57.1% of its brands were between 10-20cm then Misseriya Zuraq tribes by 52.6%, and finally North Kordofan tribes of 37.5%. grading of cattle hides depending on the presence of the brand marks the study revealed that, Misseriya Zuraq tribe's brands were obtained the highest percentage (89.4% of the rejected hides (Scarto= 4 and 5 grades, when compared with North Kordofan tribes (87.5%. For commercial reason brand's were mostly done in the area of 5-10cm but, their effect on cattle hide quality was greater, where 81% of the hides were classified as Scarto.

  16. No place to hide: when shame causes proselfs to cooperate.

    Science.gov (United States)

    Declerck, Carolyn Henriette; Boone, Christophe; Kiyonari, Toko

    2014-01-01

    Shame is considered a social emotion with action tendencies that elicit socially beneficial behavior. Yet, unlike other social emotions, prior experimental studies do not indicate that incidental shame boosts prosocial behavior. Based on the affect as information theory, we hypothesize that incidental feelings of shame can increase cooperation, but only for self-interested individuals, and only in a context where shame is relevant with regards to its action tendency. To test this hypothesis, cooperation levels are compared between a simultaneous prisoner's dilemma (where "defect" may result from multiple motives) and a sequential prisoner's dilemma (where "second player defect" is the result of intentional greediness). As hypothesized, shame positively affected proselfs in a sequential prisoner's dilemma. Hence ashamed proselfs become inclined to cooperate when they believe they have no way to hide their greediness, and not necessarily because they want to make up for earlier wrong-doing.

  17. Universal Steganalysis of Data Hiding in Grayscale Images

    Institute of Scientific and Technical Information of China (English)

    HUANG Ji-feng; LIN Jia-jun

    2007-01-01

    This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy.

  18. Unconventional thermal cloak hiding an object outside the cloak

    Science.gov (United States)

    Gao, Y.; Huang, J. P.

    2013-11-01

    All the thermal cloaks reported in the literature can be used to thermally hide an object inside the cloak. However, a common limitation of this kind of thermal cloaks is that the cloaked object cannot feel the external heat flow since it is located inside the cloak; thus we call these cloaks “conventional thermal cloaks”. Here we manage to overcome this limitation by exploiting a class of unconventional thermal cloaks that enable the cloaked object to feel the external heat flow. Our finite-element simulations in two dimensions show the desired cloaking effect. The underlying mechanism originates from the complementary effect of thermal metamaterials with negative thermal conductivities. This work suggests a different method to design thermal devices where heat conduction can be controlled at will.

  19. Analysis Of Aspects Of Messages Hiding In Text Environments

    Directory of Open Access Journals (Sweden)

    Afanasyeva Olesya

    2015-09-01

    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  20. Efficient hiding of confidential high-utility itemsets with minimal side effects

    Science.gov (United States)

    Lin, Jerry Chun-Wei; Hong, Tzung-Pei; Fournier-Viger, Philippe; Liu, Qiankun; Wong, Jia-Wei; Zhan, Justin

    2017-11-01

    Privacy preserving data mining (PPDM) is an emerging research problem that has become critical in the last decades. PPDM consists of hiding sensitive information to ensure that it cannot be discovered by data mining algorithms. Several PPDM algorithms have been developed. Most of them are designed for hiding sensitive frequent itemsets or association rules. Hiding sensitive information in a database can have several side effects such as hiding other non-sensitive information and introducing redundant information. Finding the set of itemsets or transactions to be sanitised that minimises side effects is an NP-hard problem. In this paper, a genetic algorithm (GA) using transaction deletion is designed to hide sensitive high-utility itemsets for PPUM. A flexible fitness function with three adjustable weights is used to evaluate the goodness of each chromosome for hiding sensitive high-utility itemsets. To speed up the evolution process, the pre-large concept is adopted in the designed algorithm. It reduces the number of database scans required for verifying the goodness of an evaluated chromosome. Substantial experiments are conducted to compare the performance of the designed GA approach (with/without the pre-large concept), with a GA-based approach relying on transaction insertion and a non-evolutionary algorithm, in terms of execution time, side effects, database integrity and utility integrity. Results demonstrate that the proposed algorithm hides sensitive high-utility itemsets with fewer side effects than previous studies, while preserving high database and utility integrity.

  1. Sensitive plant (Mimosa pudica hiding time depends on individual and state

    Directory of Open Access Journals (Sweden)

    Sarah Reed-Guy

    2017-07-01

    Full Text Available The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  2. Motivation to hide emotion and children's understanding of the distinction between real and apparent emotions.

    Science.gov (United States)

    Gosselin, Pierre; Warren, Madeleine; Diotte, Michèle

    2002-12-01

    The authors investigated the extent to which children's understanding of the distinction between real and apparent emotions varied according to the motivation to hide emotions. Children, aged 6-7 and 10-11 years, were read stories designed to elicit either prosocial or self-protective motivated display rules and were asked to predict the facial expressions the protagonists would make to hide felt emotions. Children were found to understand the distinction between real and apparent emotions very well, independently of the type of motivation. Contrary to predictions, boys understood this distinction better than did girls when the motivation to hide positive emotions was prosocial. Children perceived neutralization as the most appropriate strategy to hide felt emotions, followed by masking.

  3. Livestock and Hides and Skins Marketing in Kenya: Problems and investment needs

    OpenAIRE

    Jabbar, Mohammad A.

    2002-01-01

    The paper briefly summarises the historical perspective on the development of livestock marketing in Kenya, current problems of livestock and hides and skins marketing, and recommends investment opportunities to improve the situation.

  4. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  5. An Improved Information Hiding Method Based on Sparse Representation

    Directory of Open Access Journals (Sweden)

    Minghai Yao

    2015-01-01

    Full Text Available A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.

  6. Hiding effort to gain a competitive advantage: Evidence from China.

    Science.gov (United States)

    Zhao, Li; Heyman, Gail D

    2018-06-01

    Previous studies with Western populations have shown that adolescents' tendency to downplay their academic effort is affected by two kinds of motives: ability-related motives (e.g., to appear competent) and social approval motives (e.g., to be popular). In this research, we test for the presence of additional competition-related motives in China, a culture placing strong emphasis on academic competition. Study 1 (N = 150) showed that, in response to a scenario in which a hard-working high-school junior hid effort from classmates, the most highly endorsed explanation was "to influence others to work less hard to maintain a competitive advantage." Study 2 (N = 174) revealed that competition-related explanations were endorsed relatively more often when the speaker and audience had similar academic rankings. This tendency was most evident when both speaker and audience were top performers, and when this was the case, participants' desire to demonstrate superiority over others was a positive predictor of endorsement of competition-related motives. Study 3 (N = 137) verified that competition-related motives were more strongly endorsed among Chinese participants than U.S. These results suggest that at least in cultures that emphasize academic competition and in contexts where competition is salient, hiding effort is often about attempting to gain strategic advantage. © 2016 International Union of Psychological Science.

  7. Strategie del patetico e interludi circensi in Hide and Seek di Wilkie Collins

    OpenAIRE

    De Giovanni, Flora

    2013-01-01

    Starting from Victor Turner’s definitions of cultural performance and liminoid phenomena, the essay aims to analyse Wilkie Collins’s third novel, Hide and Seek (1854), which seems to be a sort of survey of the pastimes Victorian England allowed itself in the age of the increasing commodification of leisure. Though not a proper sensation novel (the genre for which Collins became famous in the 1860s), Hide and Seek draws on the conventions of melodrama, which, as Peter Brook conv...

  8. An information hiding method based on LSB and tent chaotic map

    Science.gov (United States)

    Song, Jianhua; Ding, Qun

    2011-06-01

    In order to protect information security more effectively, a novel information hiding method based on LSB and Tent chaotic map was proposed, first the secret message is Tent chaotic encrypted, and then LSB steganography is executed for the encrypted message in the cover-image. Compared to the traditional image information hiding method, the simulation results indicate that the method greatly improved in imperceptibility and security, and acquired good results.

  9. Effects of gamma rays on the physical and mechanical properties of hide

    International Nuclear Information System (INIS)

    Sutrisno Puspodikoro.

    1976-01-01

    The effect of gamma rays on the physical and mechanical properties of hide has been studied, using Gammacell 220 as an irradiator. The determination of the physical and mechanical properties of the irradiated hide was carried out by Balai Penelitian Kulit (Leather Research Institute) at Yogyakarta. Experiments show that up to a certain dose of irradiation, favourable effects can be obtained, while higher doses impair the physical and mechanical properties of the leather raw materials. (author)

  10. An evaluation of selected methods for the decontamination of cattle hides prior to skinning.

    Science.gov (United States)

    Small, A; Wells-Burr, B; Buncic, S

    2005-02-01

    The effectiveness of different decontamination treatments in reducing microbial loads on cattle hides was assessed. The 10-s hide treatments were conducted using a wet-and-dry vacuum cleaner filled with one of the liquids (heated to 50 °C) indicated below, followed or not by 10-min drying in the air. Also, the hide was clipped, followed or not by 10-s singeing using a hand-held blowtorch. Before and after each decontamination treatment, the hide was sampled (100 cm(2) areas) by a sponge-swabbing method to compare the total viable counts of bacteria (TVC). The largest bacterial reduction (Psanitizer solution (10% Betane Plus) resulted in significant reductions of 1.80 (Peffects. Since hide contamination is associated with microbial contamination of the carcasses, the results indicate that post-killing/pre-skinning hide decontamination (used alone, or in combination with carcass decontamination) has a potential to improve microbial meat safety. Nevertheless, further research is required to optimise the efficacy of these treatments in the reduction of specific pathogens under commercial conditions.

  11. Hiding in plain sight: communication theory in implementation science.

    Science.gov (United States)

    Manojlovich, Milisa; Squires, Janet E; Davies, Barbara; Graham, Ian D

    2015-04-23

    ignoring a key contributor to implementation intervention success. When conceptualized as a transformational process, the focus of communication moves to shared understanding and is grounded in human interactions and the way we go about constructing knowledge. Instead of hiding in plain sight, we suggest explicitly acknowledging the role that communication plays in our implementation efforts. By using both paradigms, we can investigate when communication facilitates implementation, when it does not, and how to improve it so that our implementation and clinical interventions are embraced by clinicians and patients alike.

  12. The Costs of Hiding and Faking Emotions: The Case of Extraverts and Introverts.

    Science.gov (United States)

    Seger-Guttmann, Tali; Medler-Liraz, Hana

    2016-01-01

    The present study examined the moderation effects of extraversion on the relationships between hiding and faking emotions, perceived satisfaction from intimate relationships, and reported physical health concerns. Four hundred and four Israeli participants, who were all involved in intimate relationships at the time of the study, responded to the Extraversion scale from the Big-Five Inventory, the DEELS to measure hiding and faking emotions, the SELF to assess physical health concerns, and the short version of the ENRICH to evaluate perceived satisfaction with intimate relationships. The mean age was 32.3 years (SD = 8.2); and the average length of time as a couple was 7.8 years (SD = 8.2). Of the participants, 198 were married (48.5%). The findings indicate that the effect of hiding negative emotions was stronger for perceived satisfaction with intimate relationships and physical health concerns than that for faking positive emotions. Extraverts who showed a higher frequency of hiding their negative emotions were significantly less satisfied with their relationships than introverts and they also tended to report more concerns with their physical health. These results were not found when extraverts reported a high frequency of faking positive emotions. These results are discussed in the context of the trait-behavior-concordance model and stress the importance of distinguishing faking from hiding.

  13. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization

    Science.gov (United States)

    Bajaj, Ruchika; Bedi, Punam; Pal, S. K.

    Steganography is an art of hiding information in such a way that prevents the detection of hidden messages. Besides security of data, the quantity of data that can be hidden in a single cover medium, is also very important. We present a secure data hiding scheme with high embedding capacity for messages of variable length based on Particle Swarm Optimization. This technique gives the best pixel positions in the cover image, which can be used to hide the secret data. In the proposed scheme, k bits of the secret message are substituted into k least significant bits of the image pixel, where k varies from 1 to 4 depending on the message length. The proposed scheme is tested and results compared with simple LSB substitution, uniform 4-bit LSB hiding (with PSO) for the test images Nature, Baboon, Lena and Kitty. The experimental study confirms that the proposed method achieves high data hiding capacity and maintains imperceptibility and minimizes the distortion between the cover image and the obtained stego image.

  14. Multiple-image hiding using super resolution reconstruction in high-frequency domains

    Science.gov (United States)

    Li, Xiao-Wei; Zhao, Wu-Xiang; Wang, Jun; Wang, Qiong-Hua

    2017-12-01

    In this paper, a robust multiple-image hiding method using the computer-generated integral imaging and the modified super-resolution reconstruction algorithm is proposed. In our work, the host image is first transformed into frequency domains by cellular automata (CA), to assure the quality of the stego-image, the secret images are embedded into the CA high-frequency domains. The proposed method has the following advantages: (1) robustness to geometric attacks because of the memory-distributed property of elemental images, (2) increasing quality of the reconstructed secret images as the scheme utilizes the modified super-resolution reconstruction algorithm. The simulation results show that the proposed multiple-image hiding method outperforms other similar hiding methods and is robust to some geometric attacks, e.g., Gaussian noise and JPEG compression attacks.

  15. Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography

    Directory of Open Access Journals (Sweden)

    Wei-Liang Tai

    2018-01-01

    Full Text Available We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds data in it by using a data-hiding key. The image decryption and data extraction are independent and separable at the receiver side. Even though the receiver, who has only the data-hiding key, does not learn about the decrypted content, he can extract data from the received marked encrypted signal. However, the receiver who has only the private key cannot extract the embedded data, but he can directly decrypt the received marked encrypted signal to obtain the original image without any error. Compared with other schemes using a cipher stream to encrypt the image, the proposed scheme is more appropriate for cloud services without degrading the security level.

  16. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    OpenAIRE

    Kuang Tsan Lin; Sheng Lih Yeh

    2014-01-01

    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  17. Preservation of bovine hide using less salt with low concentration of antiseptic, part I: effectiveness of developed formulations

    Science.gov (United States)

    Bovine raw hides are commercially cured either with high salt concentration of about half the weight of actual hide or 95% saturated brine solution. This conventional technique is very popular due to the availability of common salt (sodium chloride) and its cost effective procedure but it generates ...

  18. Variation in the Level of Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The occurrence of hide damage light flecks and spots was determined on tanned hides from 28 herds during a period of 8 to 12 months. Light flecks and spots are described as small areas of grain loss up to 3 mm in diameter that are seen on dyed crust cattle leather. Damage was found on 75.8% of all hides. The neck and shoulders were the anatomical region with the highest prevalence of damage. Sixty-eight per cent of all hides had light flecks and spots in this region. The forelimbs and dewlap were the anatomical region with the second highest occurrence with a prevalence of 39.1%. This distribution corresponded to the known distribution of lice in cattle. No significant differences were observed in age, sex, prevalence of lice in the herd assessed in March or infestations with different lice species. The frequency of light flecks and spots varied significantly during the year. The frequency was highest in the late winter and early spring, decreased significantly during the summer and was lowest in the autumn. This variation supported the importance of lice in the development of light flecks and spots and suggested a relatively long healing period for the damages induced by lice. PMID:11455905

  19. The impact of a gender and business training on income hiding

    NARCIS (Netherlands)

    Bulte, Erwin H.; Lensink, Robert; Winkel, Anne B.

    2018-01-01

    We use a randomized controlled trial and behavioral game to study the extent and determinants of income hiding in rural Vietnam. We focus on a training program that aims to promote gender equality and entrepreneurship among women in poverty who are engaged in running a small business. In one

  20. Effect of hiding places, straw and territory on agression in group-housed rabbit does

    NARCIS (Netherlands)

    Rommers, J.M.; Reuvekamp, B.F.J.; Gunnink, H.; Jong, de I.C.

    2014-01-01

    Group-housing of rabbit does may be preferred from welfare point of view. However, group-housing causes agonistic behaviour which may cause severe injuries. Severe injuries may be prevented by offering hiding places for attacked does. Providing enrichment (straw) may reduce agonistic behaviour by

  1. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  2. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Energy Technology Data Exchange (ETDEWEB)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C. (Iso-Ster (Pty) Ltd., Kempton Park (South Africa))

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  3. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Science.gov (United States)

    Du Plessis, TA; Russell, AE; Stevens, RCB; Galloway, AC

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  4. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    International Nuclear Information System (INIS)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C.

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem. (author)

  5. Entry points to stimulation of expansion in hides and skins processing

    African Journals Online (AJOL)

    Only 3.4% of respondents add value to hides and skins by processing. ... For this status of the chain, it was proposed that a workable intervention model has to encompass placement of tanneries and slaughter slabs in the chain as new actors, linking chain actors, improving livestock services especially dipping, and ...

  6. Succession of hide-seek and pursuit-evasion at heterogeneous locations.

    Science.gov (United States)

    Gal, Shmuel; Casas, Jérôme

    2014-05-06

    Many interactions between searching agents and their elusive targets are composed of a succession of steps, whether in the context of immune systems, predation or counterterrorism. In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit-escape. Our aim is to link these two processes, usually analysed separately and with different models, in a single game theory context. We define a matrix game in which a searcher looks at a fixed number of discrete locations only once each searching for a hider, which can escape with varying probabilities according to its location. The value of the game is the overall probability of capture after k looks. The optimal search and hide strategies are described. If a searcher looks only once into any of the locations, an optimal hider chooses it's hiding place so as to make all locations equally attractive. This optimal strategy remains true as long as the number of looks is below an easily calculated threshold; however, above this threshold, the optimal position for the hider is where it has the highest probability of escaping once spotted.

  7. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  8. The Use of Polymerized Genipin for the Stabilization of the Collagen Structure of Animal Hides

    Science.gov (United States)

    Animal hides are the major byproduct of meat industry and the collagen fibers is the main constituent. Crosslinkers play a key role in stabilizing the collagen structure for useful applications. Genipin is widely used as an ideal biological protein crosslinking agent due to its low toxicity compare...

  9. Efficacy of citrilow™ and cecure™ spray wash on the levels and prevalence of aerobic bacterials and enterobacteriaceae bacteria on cattle hides

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle skins to the inner meat and hide quality detrition from bacteria is recognized as a severe hygienic problem for commercial beef and hide processing facilities. To circumvent bacterial contamination, cattle are washed during hide p...

  10. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days) after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment. PMID:11455906

  11. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Directory of Open Access Journals (Sweden)

    Grønstøl H

    2001-03-01

    Full Text Available The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment.

  12. Cross-sectional study to estimate the prevalence of enterohaemorrhagic Escherichia coli on hides of market beef cows at harvest.

    Science.gov (United States)

    Schneider, L G; Stromberg, Z R; Lewis, G L; Moxley, R A; Smith, D R

    2018-03-25

    Cattle hides are an important source of enterohaemorrhagic Escherichia coli (EHEC) carcass contamination at slaughter. Seven EHEC serogroups are adulterants in raw, non-intact beef: EHEC O26, O45, O103, O111, O121, O145 and O157. The objective of this study was to estimate the probability for hide contamination with EHEC among US market beef cows at slaughter and to test the effects of season and geographic region on prevalence of hide contamination. Hides (n = 800) of market cows were swabbed at slaughter immediately after exsanguination, prior to hide removal. Cows were sampled from two geographically distinct beef packing plants during four seasons of 2015. Cattle source was categorized by northern or southern region. Samples were tested for EHEC by a molecular screening assay. The effects of region, season and their interaction on the probability of hide contamination by each EHEC serogroup were tested in separate multilevel multivariable logistic regression models, accounting for the random effect of clustering by plant. Statistical significance was set α = .05. Of 800 total samples, at least one EHEC was detected on 630 (79%) hides. Enterohaemorrhagic E. coli O26 was detected on 129 (16%) of all hides sampled, EHEC O45 on 437 (55%), EHEC O103 on 289 (36%), EHEC O111 on 189 (24%), EHEC O121 on 140 (18%), EHEC O145 on 171 (21%) and EHEC O157 on 89 (11%). Detection of EHEC O26 and EHEC O121 was associated with season. Season and region were associated with detecting EHEC O45 and EHEC O157. Season-by-region interactions were associated with the outcome of detecting EHEC O103, EHEC O111 and EHEC O145. Season, region of origin and the interaction of these factors affect hide contamination of market beef cattle at slaughter by EHEC, and each serogroup responds to these factors uniquely. © 2018 Blackwell Verlag GmbH.

  13. Optical multiple-image hiding based on interference and grating modulation

    International Nuclear Information System (INIS)

    He, Wenqi; Peng, Xiang; Meng, Xiangfeng

    2012-01-01

    We present a method for multiple-image hiding on the basis of interference-based encryption architecture and grating modulation. By using a modified phase retrieval algorithm, we can separately hide a number of secret images into one arbitrarily preselected host image associated with a set of phase-only masks (POMs), which are regarded as secret keys. Thereafter, a grating modulation operation is introduced to multiplex and store the different POMs into a single key mask, which is then assigned to the authorized users in privacy. For recovery, after an appropriate demultiplexing process, one can reconstruct the distributions of all the secret keys and then recover the corresponding hidden images with suppressed crosstalk. Computer simulation results are presented to validate the feasibility of our approach. (paper)

  14. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  15. Information hiding technology and application analysis based on decimal expansion of irrational numbers

    Science.gov (United States)

    Liu, Xiaoyong; Lu, Pei; Shao, Jianxin; Cao, Haibin; Zhu, Zhenmin

    2017-10-01

    In this paper, an information hiding method using decimal expansion of irrational numbers to generate random phase mask is proposed. Firstly, the decimal expansion parts of irrational numbers generate pseudo-random sequences using a new coding schemed, the irrational number and start and end bit numbers were used as keys in image information hiding. Secondly, we apply the coding schemed to the double phase encoding system, the pseudo-random sequences are taken to generate random phase masks. The mean square error is used to calculate the quality of the recovered image information. Finally, two tests had been carried out to verify the security of our method; the experimental results demonstrate that the cipher image has such features, strong robustness, key sensitivity, and resistance to brute force attack.

  16. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    Directory of Open Access Journals (Sweden)

    Ari Shawakat Tahir

    2015-12-01

    Full Text Available The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed.

  17. Impact of Media Richness on Reduction of Knowledge-Hiding Behavior in Enterprises

    DEFF Research Database (Denmark)

    Labafi, Somayeh; Khajeheian, Datis; Williams, Idongesit

    2018-01-01

    in a qualitative study. Thematic analysis is used to analyze transcribed interview data from employees in a software company in Iran. The findings of the analysis show that media richness significantly impacts on organizational learning and influences on knowledge hiding behavior in employees. This article...... suggests that entrepreneurs and managers of small firms should provide employees’ access to rich media content as well as established organizational learning as part of their organizational culture.......Knowledge hiding is one of the major obstacles in the progression of organizations that hinder the use of tacit knowledge of employees. The negative impact of this behavior is more significant in enterprises and small firms because they are more reliant on knowledge of their employees...

  18. 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing

    CERN Document Server

    Tsai, Pei-Wei; Huang, Hsiang-Cheh

    2017-01-01

    This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .

  19. Hiding objects and creating illusions above a carpet filter using a Fourier optics approach.

    Science.gov (United States)

    Wu, Kedi; Wang, Guo Ping

    2010-09-13

    Invisibility carpet cloaks are usually used to hide an object beneath carpet. In this paper we propose and demonstrate a carpet filter to hide objects and create illusions above the filter by using a Fourier optics method. Instead of using transformation optics, we get electromagnetic parameters of the filter by optical transfer functions, which play the role of modulating the propagation of the scattering angular spectrum directly from an object above the filter. By further adding a functional layer onto the filter, we can even camouflage the object so that it appears to be a different object. The analytical results are confirmed by numerical simulations. Our method is completely different from the current coordinate transfer method and may provide another point of view to more clearly understand the mechanism of invisibility cloaks.

  20. Hide depilation and feather disintegration studies with keratinolytic serine protease from a novel Bacillus subtilis isolate.

    Science.gov (United States)

    Pillai, Priya; Archana, G

    2008-03-01

    Keratinases play an important role in biotechnological applications such as improvement of feather meal, enzymatic dehairing and production of amino acids or peptides from high molecular weight substrates. Bacillus subtilis P13, isolated from Vajreshwari hot spring (45-50 degrees C) near Mumbai, India, produces a neutral serine protease and has an optimum temperature of 65 degrees C. This enzyme preparation was keratinolytic in nature and could disintegrate whole chicken feathers, except for the remnants of shafts. The enzyme preparation also exhibited depilation of goat hides with the recovery of intact animal hair. The enzyme preparation could release peptides from ground feathers and bring about their weight reduction; however, similar action on hair was relatively weak. A single major PMSF-sensitive protease band could be detected upon zymogram analysis, indicating that a single enzyme may be responsible for feather degradation and hide depilation. The importance of these findings in the biotechnological application for feather and leather industries is discussed.

  1. A dehydration process for ovine hide to obtain a new collagenous material

    OpenAIRE

    Ollé Otero, Lluís; Sorolla, Silvia; Casas Solé, Concepció; Bacardit Dalmases, Anna

    2014-01-01

    The aim of the present work is to develop a dehydration process for ovine hide to obtain a new collagenous material for use in the leather industry. What is obtained through this new process is a dry and very porous collagenous substrate which allows the application of tanning chemicals by immersion in aqueous solutions. When compared to existing, traditional processes, economic and environmental advantages are obtained from the use of this new material. More specifically, the new process ...

  2. An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining

    OpenAIRE

    Yogendra Kumar Jain,; Vinod Kumar Yadav,; Geetika S. Panday

    2011-01-01

    The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful toolfor discovering relationships which are hidden in large database. Association rules hiding algorithms get strong and efficient performance for protecting confidential and cru...

  3. Suitability of the RGB Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Ante Poljicak

    2010-06-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data  hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  4. Optical image hiding based on chaotic vibration of deformable moiré grating

    Science.gov (United States)

    Lu, Guangqing; Saunoriene, Loreta; Aleksiene, Sandra; Ragulskis, Minvydas

    2018-03-01

    Image hiding technique based on chaotic vibration of deformable moiré grating is presented in this paper. The embedded secret digital image is leaked in a form of a pattern of time-averaged moiré fringes when the deformable cover grating vibrates according to a chaotic law of motion with a predefined set of parameters. Computational experiments are used to demonstrate the features and the applicability of the proposed scheme.

  5. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Institute of Scientific and Technical Information of China (English)

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao

    2004-01-01

    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  6. Prey should hide more randomly when a predator attacks more persistently.

    Science.gov (United States)

    Gal, Shmuel; Alpern, Steve; Casas, Jérôme

    2015-12-06

    When being searched for and then (if found) pursued by a predator, a prey animal has a choice between choosing very randomly among hiding locations so as to be hard to find or alternatively choosing a location from which it is more likely to successfully flee if found. That is, the prey can choose to be hard to find or hard to catch, if found. In our model, capture of prey requires both finding it and successfully pursuing it. We model this dilemma as a zero-sum repeated game between predator and prey, with the eventual capture probability as the pay-off to the predator. We find that the more random hiding strategy is better when the chances of repeated pursuit, which are known to be related to area topography, are high. Our results extend earlier results of Gal and Casas, where there was at most only a single pursuit. In that model, hiding randomly was preferred by the prey when the predator has only a few looks. Thus, our new multistage model shows that the effect of more potential looks is opposite. Our results can be viewed as a generalization of search games to the repeated game context and are in accordance with observed escape behaviour of different animals. © 2015 The Author(s).

  7. Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

    Directory of Open Access Journals (Sweden)

    Xianyi Chen

    2018-01-01

    Full Text Available Compared to the encrypted-image-based reversible data hiding (EIRDH method, the encrypted-signals-based reversible data hiding (ESRDH technique is a novel way to achieve a greater embedding rate and better quality of the decrypted signals. Motivated by ESRDH using signal energy transfer, we propose an improved ESRDH method using code division multiplexing and value expansion. At the beginning, each pixel of the original image is divided into several parts containing a little signal and multiple equal signals. Next, all signals are encrypted by Paillier encryption. And then a large number of secret bits are embedded into the encrypted signals using code division multiplexing and value expansion. Since the sum of elements in any spreading sequence is equal to 0, lossless quality of directly decrypted signals can be achieved using code division multiplexing on the encrypted equal signals. Although the visual quality is reduced, high-capacity data hiding can be accomplished by conducting value expansion on the encrypted little signal. The experimental results show that our method is better than other methods in terms of the embedding rate and average PSNR.

  8. Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

    Directory of Open Access Journals (Sweden)

    Mohammad S. Alam

    2012-10-01

    Full Text Available In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level.

  9. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients

    Science.gov (United States)

    Zhang, Xiaoqiang; Wang, Z. Jane

    2013-10-01

    Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 10 to 10 and thus can resist brute-force attack and unauthorized detection watermark attack.

  10. High-capacity method for hiding data in the discrete cosine transform domain

    Science.gov (United States)

    Qazanfari, Kazem; Safabakhsh, Reza

    2013-10-01

    Steganography is the art and science of hiding data in different media such as texts, audios, images, and videos. Data hiding techniques are generally divided into two groups: spatial and frequency domain techniques. Spatial domain methods generally have low security and, as a result, are less attractive to researchers. Discrete cosine transform (DCT) is the most common transform domain used in steganography and JPEG compression. Since a large number of the DCT coefficients of JPEG images are zero, the capacity of DCT domain-based steganography methods is not very high. We present a high-capacity method for hiding messages in the DCT domain. We describe the method in two classes where the receiver has and where the receiver does not have the cover image. In each class, we consider three cases for each coefficient. By considering n coefficients, there are 3n different situations. The method embeds ⌊log2 3n⌋ bits in these n coefficients. We show that the maximum reachable capacity by our method is 58% higher than the other general steganography methods. Experimental results show that the histogram-based steganalysis methods cannot detect the stego images produced by the proposed method while the capacity is increased significantly.

  11. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    Directory of Open Access Journals (Sweden)

    H. Yang

    2009-12-01

    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  12. Data Hiding Based on a Two-Layer Turtle Shell Matrix

    Directory of Open Access Journals (Sweden)

    Xiao-Zhu Xie

    2018-02-01

    Full Text Available Data hiding is a technology that embeds data into a cover carrier in an imperceptible way while still allowing the hidden data to be extracted accurately from the stego-carrier, which is one important branch of computer science and has drawn attention of scholars in the last decade. Turtle shell-based (TSB schemes have become popular in recent years due to their higher embedding capacity (EC and better visual quality of the stego-image than most of the none magic matrices based (MMB schemes. This paper proposes a two-layer turtle shell matrix-based (TTSMB scheme for data hiding, in which an extra attribute presented by a 4-ary digit is assigned to each element of the turtle shell matrix with symmetrical distribution. Therefore, compared with the original TSB scheme, two more bits are embedded into each pixel pair to obtain a higher EC up to 2.5 bits per pixel (bpp. The experimental results reveal that under the condition of the same visual quality, the EC of the proposed scheme outperforms state-of-the-art data hiding schemes.

  13. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  14. Information Hiding In Digital Video Using DCT, DWT and CvT

    Science.gov (United States)

    Abed Shukur, Wisam; Najah Abdullah, Wathiq; Kareem Qurban, Luheb

    2018-05-01

    The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the Normalized cross Correlation (NC). The experiments shows the error ratio of the proposed technique is (8%) while accuracy ratio is (92%) when the Curvelet Transform (CvT) is used, but compared with Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT), the error rates are 11% and 14% respectively, while the accuracy ratios are (89%) and (86%) respectively. So, the experiments shows the Poisson noise gives better results than other types of noises, while the speckle noise gives worst results compared with other types of noises. The proposed technique has been established by using MATLAB R2016a programming language.

  15. Physicochemical Properties of Gelatin Extracted from Buffalo Hide Pretreated with Different Acids.

    Science.gov (United States)

    Mulyani, Sri; Setyabudi, Francis M C Sigit; Pranoto, Yudi; Santoso, Umar

    2017-01-01

    The acid pretreatment of collagen molecules disrupts their crosslinks and assists in the release of acid-soluble proteins, fats, and other components. Generally, to achieve optimum extraction efficiency, strong acids may be used at a lower acid concentration compared to weak acids. This study aimed to determine the yield and physicochemical properties of gelatins extracted from buffalo hides pretreated with different acids. Hides were extracted with hydrochloric, citric, and acetic acids at concentrations of 0.3, 0.6, 0.9, 1.2, and 1.5 M. A completely randomized design and the least significant difference test were used in the experimental design, and all measurements were performed in triplicate. The highest yield (29.17%) was obtained from pretreatment with 0.9 M HCl. The gel strength did not differ significantly ( p >0.05) according to acid type (280.26-259.62 g Bloom), and the highest viscosity was obtained from the 0.6 M citric acid pretreatment. All the gelatins contained α- and β-chain components and several degraded peptides (24-66 kDa). The color and Fourier-transform infrared spectrum of the gelatin extracted using 0.9 M HCl were similar to those of commercial bovine skin gelatin. In general, the physicochemical properties of the gelatin complied with the industry standard set by the Gelatin Manufacturers Institute of America, revealing that buffalo hide could serve as a potential alternative source of gelatin.

  16. Traceability System Model for Quality Gelatin Raw Material of Cattle Hides

    Directory of Open Access Journals (Sweden)

    S Nur

    2010-09-01

    Full Text Available Several criteria must be accomplished within the provision of quality products in terms of the types of materials, the processing methods and effort to get it. Traceability system involves various parties that have different needs and goals in the process of supplying raw materials. Hence, there is a need for institutional systems engineering that can organize and manage the tracking process, the procurement of raw materials that guarantee the origin of gelatin raw materials, and facilitate the industry and customer to create a standardized quality of product. The purpose of the study formulates the institutional tracking models of gelatin raw material from cattle hide based on various criteria and assessment of the expert opinion. The methods used in this study were Interpretative structural modeling to formulate a representation of institutional tracking efficiently and analytical hierarchy process to determine the tracking strategy of industrial gelatin raw materials from cowhide. The results obtained from the study were some key elements of institutional tracking model for industrial gelatin raw materials from cowhide and the traceability strategies for industrial raw materials from cattle hide gelatin Indonesia. (Animal Production 12(3: 190-198 (2010 Key Words: traceability, institutional model, cattle hide, gelatin

  17. Content-based Image Hiding Method for Secure Network Biometric Verification

    Directory of Open Access Journals (Sweden)

    Xiangjiu Che

    2011-08-01

    Full Text Available For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content correlation analysis to protect the network-based transmitted image. By using principal component analysis (PCA, the content correlation between the biometric image and the cover image is firstly analyzed. Then based on particle swarm optimization (PSO algorithm, some regions of the cover image are selected to represent the biometric image, in which the cover image can carry partial content of the biometric image. As a result of the correlation analysis, the unrepresented part of the biometric image is embedded into the cover image by using the discrete wavelet transform (DWT. Combined with human visual system (HVS model, this approach makes the hiding result perceptually invisible. The extensive experimental results demonstrate that the proposed hiding approach is robust against some common frequency and geometric attacks; it also provides an effective protection for the secure biometric verification.

  18. HIDE & SEEK: End-to-end packages to simulate and process radio survey data

    Science.gov (United States)

    Akeret, J.; Seehars, S.; Chang, C.; Monstein, C.; Amara, A.; Refregier, A.

    2017-01-01

    As several large single-dish radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these datasets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system-from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing single-dish radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single-dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal. The two packages can be used separately or together depending on the application. Their modular and flexible nature allows easy adaptation to other instruments and datasets. We describe the basic architecture of the two packages and examine in detail the noise and RFI modeling in HIDE, as well as the implementation of gain calibration and RFI mitigation in SEEK. We then apply HIDE &SEEK to forward-model a Galactic survey in the frequency range 990-1260 MHz based on data taken at the Bleien Observatory. For this survey, we expect to cover 70% of the full sky and achieve a median signal-to-noise ratio of approximately 5-6 in the cleanest channels including systematic uncertainties. However, we also point out the potential challenges of high RFI contamination and baseline removal when examining the early data from the Bleien Observatory. The fully documented HIDE &SEEK packages are available at http://hideseek.phys.ethz.ch/ and are published

  19. Effect of acanthocephalan parasites on hiding behaviour in two species of shore crabs.

    Science.gov (United States)

    Latham, A D M; Poulin, R

    2002-12-01

    The effect of acanthocephalan parasites (Profilicollis spp.) on the hiding behaviour during low tide of two species of shore crabs (intermediate hosts), Macrophthalmus hirtipes (Brachyura: Ocypodidae) and Hemigrapsus crenulatus (Brachyura: Grapsidae), was examined at Blueskin Bay, South Island, New Zealand. Exposed M. hirtipes were found to have significantly higher infection levels than did hidden conspecifics. This pattern was not observed for H. crenulatus. Mean cystacanth numbers were found to be considerably higher in M. hirtipes than H. crenulatus. Crabs exposed at low tide are at a greater risk of predation by definitive shorebird hosts than are hidden conspecifics. Preferential manipulation of one intermediate host species over another could influence diversity within ecosystems.

  20. A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fujisaki, Eiichiro

    2002-01-01

    We present a statistically-hiding commitment scheme allowing commitment to arbitrary size integers, based on any (Abelian) group with certain properties, most importantly, that it is hard for the committer to compute its order. We also give efficient zero-knowledge protocols for proving knowledge...... input is chosen by the (possibly cheating) prover. -  - Our results apply to any group with suitable properties. In particular, they apply to a much larger class of RSA moduli than the safe prime products proposed in [14] - Potential examples include RSA moduli, class groups and, with a slight...

  1. Characterization of biofilms produced by Escherichia coli O157 isolated from cattle hides

    Science.gov (United States)

    Milojević, L.; Velebit, B.; Baltić, T.; Nikolić, A.; Mitrović, R.; Đorđević, V.

    2017-09-01

    This study aimed to investigate possibility E. coli O157 from cattle hides to produced biofilms. We had 28 suspect primoisolates and 17 were confirmed to be E. coli O157. Biofilm production test showed that more than 50% of this isolates did not produce biofilm. From the other half of the isolates, 5 of them were weakly adherent, 3 were moderately adherent. Since E. coli O157 are one of the main foodborne hazards in meat processing industry and the discovery that some of them can produce moderately adherent biofilms, request necessity of strict implementation of HACCP procedures to prevent further expansion this pathogen.

  2. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  3. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    DEFF Research Database (Denmark)

    Christandl, Matthias; Ferrara, Roberto

    2017-01-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005)]. The construction of those states was based...... on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable...

  4. What Hides Behind an Umemployment Rate: Comparing Portuguese and U.S. Unemployment

    OpenAIRE

    Olivier Blanchard; Pedro Portugal

    1998-01-01

    Over the last 15 years, Portugal and the United States have had the same average unemployment rate, about 6.5%. But behind these similar rates hide two very different labor markets. Unemployment duration in Portugal is more than three times that of the United States. Symmetrically, the flow of workers into unemployment in Portugal is, in proportion to the labor force, less than a third of what it is in the United States. Relying on evidence from Portuguese and U.S. micro data sets, we show th...

  5. Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding

    OpenAIRE

    Wu, Han-Zhou; Wang, Hong-Xia; Shi, Yun-Qing

    2016-01-01

    This paper presents a novel reversible data hiding (RDH) algorithm for gray-scaled images, in which the prediction-error of prediction error (PPE) of a pixel is used to carry the secret data. In the proposed method, the pixels to be embedded are firstly predicted with their neighboring pixels to obtain the corresponding prediction errors (PEs). Then, by exploiting the PEs of the neighboring pixels, the prediction of the PEs of the pixels can be determined. And, a sorting technique based on th...

  6. Sensor and Actuator Fault-Hiding Reconfigurable Control Design for a Four-Tank System Benchmark

    DEFF Research Database (Denmark)

    Hameed, Ibrahim; El-Madbouly, Esam I; Abdo, Mohamed I

    2015-01-01

    Invariant (LTI) system where virtual sensors and virtual actuators are used to correct faulty performance through the use of a pre-fault performance. Simulation results showed that the developed approach can handle different types of faults and able to completely and instantly recover the original system......Fault detection and compensation plays a key role to fulfill high demands for performance and security in today's technological systems. In this paper, a fault-hiding (i.e., tolerant) control scheme that detects and compensates for actuator and sensor faults in a four-tank system benchmark...

  7. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  8. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    Science.gov (United States)

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  9. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  10. An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm

    Science.gov (United States)

    Zhang, B.; Sang, Jun; Alam, Mohammad S.

    2013-03-01

    An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.

  11. A REVIEW ON HEAVY METALS CONTENTS IN HIDE, SKIN AND PROCESSED LEATHERS

    Directory of Open Access Journals (Sweden)

    KOIZHAIGANOVA Meruyert

    2016-05-01

    Full Text Available Heavy metals are metals with high atomic weight which can be deposited in soil, water, plants and animals. It is generally known that mammal tissues are good bioindicators of trace elements, including heavy metals. Heavy metal analysis serves to identify and quantify the elements that are a potential hazard to the consumer after varying levels of contact. Usage area of leather is increasingly expanding in these days and it has also become a material requested and demanded by effect of fashion. Leather must protect its appearance and physical stability and also be problem-free in ecological terms and harmless to human health. There is a lack of data concerning the content of toxic elements in raw hide and skin of animals. Mainly information concerning metals content, including toxic ones, in processed leathers may be found in the literature. The aim of the present study was to review and compare the content of some heavy metals in raw hide, skin and the processed leathers in order to evaluate their accumulation and transition to the end-up product.

  12. Hide unhairing and characterization of commercial enzymes used in leather manufacture

    Directory of Open Access Journals (Sweden)

    A Dettmer

    2011-09-01

    Full Text Available The enzymatic treatment of hides in tannery processes is a promising technology. However, the reaction kinetics of commercial enzymes available to the leather industry are not fully understood and their activities have been mainly determined with model proteins such as casein as substrate, which are not of direct relevance for cattle hides. Therefore, it is important to determine their activities on collagen and keratin, the main proteins of skin, in order to use these enzymes in leather processing. This work describes the study of five proteases, used commercially in tanneries, to assess their ability to act upon collagen and keratin and to determine their unhairing. Results showed that all commercial enzymes tested had more activity on collagen than on keratin. Unhairing was also tested and four out of the five enzymes tested showed some unhairing activity. Optima of the temperature and pH of the enzymes were very similar for all five enzymes, with maximal activities around 55ºC and pH 9 to 12, respectively.

  13. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Ding Qing-Yan; Zhang Shu-Hui; Chen Xiu-Bo

    2016-01-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. (paper)

  14. Suggested Method for Encryption and Hiding ‎Image using LCG and LSB

    Directory of Open Access Journals (Sweden)

    Atheer Hussein Zyara

    2017-12-01

    Full Text Available Maintaining the confidentiality of the data of the very important areas in computer applications , Where many researchers work in the fields of concealment and encryption . So in this research we are working on the combining of the two methods , where confidential data is encrypted by using  a proposed method , Then the cover is encrypted (regular image by LCG algorithm (which generates a series of random numbers to generate the encrypted cover (irregular image , After that ,we hide the encrypted data in encrypted cover by depending on the LSB technique, then we convert the irregular image into regular image and thereby getting  hidden data in random locations in the  cover image  , This method is characterized by flexibility in terms of the possibility of hiding the different  types of confidential data in different types of media , and durability as that data be hidden in random locations and this  what distinguishes the proposed algorithm , and the results showed high security, because the data is hidden in random locations in encrypted image then convert to the original regular image For clarification of the proposed algorithm , it has been applied on a digital image of the gray type using MATLAB language  by using the efficiency scales PSNR and MSE

  15. HIDING TEXT IN DIGITAL IMAGES USING PERMUTATION ORDERING AND COMPACT KEY BASED DICTIONARY

    Directory of Open Access Journals (Sweden)

    Nagalinga Rajan

    2017-05-01

    Full Text Available Digital image steganography is an emerging technique in secure communication for the modern connected world. It protects the content of the message without arousing suspicion in a passive observer. A novel steganography method is presented to hide text in digital images. A compact dictionary is designed to efficiently communicate all types of secret messages. The sorting order of pixels in image blocks are chosen as the carrier of embedded information. The high correlation in image pixel values means reordering within image blocks do not cause high distortion. The image is divided into blocks and perturbed to create non repeating sequences of intensity values. These values are then sorted according to the message. At the receiver end, the message is read from the sorting order of the pixels in image blocks. Only those image blocks with standard deviation lesser than a given threshold are chosen for embedding to alleviate visual distortion. Information Security is provided by shuffling the dictionary according to a shared key. Experimental Results and Analysis show that the method is capable of hiding text with more than 4000 words in a 512×512 grayscale image with a peak signal to noise ratio above 40 decibels.

  16. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm

    Directory of Open Access Journals (Sweden)

    Ching-Yu Yang

    2012-01-01

    Full Text Available This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.

  17. Efficacy of Citrilow® and Cecure® spray wash on the prevalence of aerobic and enterobacteriaceae/gram negative enteric bacilli and cattle hide quality

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle to the inner meat as well as hide quality deterioration from bacteria are hygienic problems for meat and hide processing facilities. This study investigated spray wash treatments independently with two antimicrobials used in the ...

  18. Hiding the interior region of core-shell nanoparticles with quantum invisible cloaks

    Science.gov (United States)

    Lee, Jeng Yi; Lee, Ray-Kuang

    2014-04-01

    Based on the scattering cancellation, we provide a method not only making a nanoparticle nearly invisible, but also hiding its interior region from the outside probing matter wave. By applying the interplay among the nodal points of partial waves along with the concept of streamline in fluid dynamics for probability flux, a quantum invisible cloak to the electron transport in a host semiconductor is demonstrated by simultaneously guiding the probability flux outside a hidden region and keeping the total scattering cross section negligible. As the probability flux vanishes in the interior region, one can embed any materials inside a multiple core-shell nanoparticle without affecting physical observables from the outside. Our results reveal the possibility to design a protection shield layer for fragile interior parts from the impact of transport electrons.

  19. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  20. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  1. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2015-01-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. (paper)

  2. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  3. Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload

    Directory of Open Access Journals (Sweden)

    Zhaoxia Yin

    2014-01-01

    Full Text Available This paper proposes a separable reversible data-hiding scheme in encrypted image which offers high payload and error-free data extraction. The cover image is partitioned into nonoverlapping blocks and multigranularity encryption is applied to obtain the encrypted image. The data hider preprocesses the encrypted image and randomly selects two basic pixels in each block to estimate the block smoothness and indicate peak points. Additional data are embedded into blocks in the sorted order of block smoothness by using local histogram shifting under the guidance of the peak points. At the receiver side, image decryption and data extraction are separable and can be free to choose. Compared to previous approaches, the proposed method is simpler in calculation while offering better performance: larger payload, better embedding quality, and error-free data extraction, as well as image recovery.

  4. An Algorithm for Data Hiding in Radiographic Images and ePHI/R Application

    Directory of Open Access Journals (Sweden)

    Aqsa Rashid

    2018-01-01

    Full Text Available Telemedicine is the use of Information and Communication Technology (ICT for clinical health care from a distance. The exchange of radiographic images and electronic patient health information/records (ePHI/R for diagnostic purposes has the risk of confidentiality, ownership identity, and authenticity. In this paper, a data hiding technique for ePHI/R is proposed. The color information in the cover image is used for key generation, and stego-images are produced with ideal case. As a result, the whole stego-system is perfectly secure. This method includes the features of watermarking and steganography techniques. The method is applied to radiographic images. For the radiographic images, this method resembles watermarking, which is an ePHI/R data system. Experiments show promising results for the application of this method to radiographic images in ePHI/R for both transmission and storage purpose.

  5. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    Directory of Open Access Journals (Sweden)

    A.A. Mohamed

    2014-07-01

    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.

  6. A novel attack method about double-random-phase-encoding-based image hiding method

    Science.gov (United States)

    Xu, Hongsheng; Xiao, Zhijun; Zhu, Xianchen

    2018-03-01

    By using optical image processing techniques, a novel text encryption and hiding method applied by double-random phase-encoding technique is proposed in the paper. The first step is that the secret message is transformed into a 2-dimension array. The higher bits of the elements in the array are used to fill with the bit stream of the secret text, while the lower bits are stored specific values. Then, the transformed array is encoded by double random phase encoding technique. Last, the encoded array is embedded on a public host image to obtain the image embedded with hidden text. The performance of the proposed technique is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient.

  7. Alien invasions and the game of hide and seek in Patagonia.

    Directory of Open Access Journals (Sweden)

    Martin Lindegren

    Full Text Available The introduction, establishment and spread of alien species is a major threat to biodiversity and the provision of ecosystem services for human wellbeing. In order to reduce further loss of biodiversity and maintain productive and sustainable ecosystems, understanding the ecological mechanisms underlying species invasions and avoiding potentially harmful effects on native communities is urgently needed, but largely lacking. We here demonstrate, by means of hydroacoustics and advanced spatial modelling, how native fish species as a result of previous exposure to native predators may successfully respond to invasive novel predators through a complicated game of hide and seek, minimizing spatio-temporal overlap with predators, and potentially facilitating coexistence between native prey species (Galaxiids and introduced novel predators (Salmonids in a deep Andean lake, Patagonia.

  8. Antibacterial activities of leave extracts as bactericides for soaking of skin or hide

    Science.gov (United States)

    Suparno, Ono; Panandita, Tania; Afifah, Amalia; Marimin; Purnawati, Rini

    2018-03-01

    Antibacteria, a subtance inhibiting the growth of bacteria, can be obtained from tropical-almond (Terminalia catappa), morinda (Morinda citrifolia), and white leadtree (Leucaena leucocephala) plants, since the plants have phytochemical content functioning as antibacterial agent. Commonly, part of plant that contains higher antibacterial substances is its leaf. The objectives of this study were to determine antibacterial activity of tropical-almond, morinda, and white leadtree leaves extracts, and to analyse the potency of the three extracts as natural bactericide for soaking of skin or hide. The responses measured in this study were phytochemical contents, total flavonoid, tannin content, the inhibition zone, the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Phytochemical contents containing the three leaves extracts were alkaloid, flavonoid, tannin, saponin, phenolic, and glycoside. Total flavonoid and tannin contents of the three extracts were tropical-almond extract of 1.14 % and 1.51 %, respectively; morinda extract of 0.61 % and 0.36 %, respectively; and white leadtree extract of 0.60 % and 4.82 %, respectively. White leadtree leaf extract gave the highest inhibition zone against B. subtilis, S. aureus and E. coli, i.e. 1.50, 1.3, and 1.65 cm, respectively; and the lowest MIC and MBC against B. subtilis, S. aureus and E. coli, i.e. 1500, 3000, and 1500 μg/ml, respectively. Therefore, the white leadtree leave extract had more potential as bactericide for soaking of skin or hide compared to those of the tropical-almond and morinda leaves extracts.

  9. Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function

    Directory of Open Access Journals (Sweden)

    Najme Maleki

    2014-07-01

    Full Text Available This paper presents two adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Our adaptive scheme is based on the concept of human vision sensitivity, so the pixels in edge areas than to smooth areas can tolerate much more changes without making visible distortion for human eyes. In our adaptive scheme, the average differencing value of four neighborhood pixels into a block via a threshold secret key determines whether current block is located in edge or smooth area. Pixels in the edge areas are embedded by Q-bit of secret data with a larger value of Q than that of pixels placed in smooth areas. Also in this scholar, we represent one non-adaptive data hiding algorithm. Our non-adaptive scheme, via an error reduction procedure, produces a high visual quality for stego-image. The proposed schemes present several advantages. 1-of aspects the embedding capacity and visual quality of stego-image are scalable. In other words, the embedding rate as well as the image quality can be scaled for practical applications 2-the high embedding capacity with minimal visual distortion can be achieved, 3-our methods require little memory space for secret data embedding and extracting phases, 4-secret keys have used to protect of the embedded secret data. Thus, level of security is high, 5-the problem of overflow or underflow does not occur. Experimental results indicated that the proposed adaptive scheme significantly is superior to the currently existing scheme, in terms of stego-image visual quality, embedding capacity and level of security and also our non-adaptive method is better than other non-adaptive methods, in view of stego-image quality. Results show which our adaptive algorithm can resist against the RS steganalysis attack.

  10. Hiding a Heavy Higgs Boson at the 7 TeV LHC

    Energy Technology Data Exchange (ETDEWEB)

    Bai, Yang; Fan, JiJi; Hewett, JoAnne L.

    2012-03-20

    A heavy Standard Model Higgs boson is not only disfavored by electroweak precision observables but is also excluded by direct searches at the 7 TeV LHC for a wide range of masses. Here, we examine scenarios where a heavy Higgs boson can be made consistent with both the indirect constraints and the direct null searches by adding only one new particle beyond the Standard Model. This new particle should be a weak multiplet in order to have additional contributions to the oblique parameters. If it is a color singlet, we find that a heavy Higgs with an intermediate mass of 200-300 GeV can decay into the new states, suppressing the branching ratios for the standard model modes, and thus hiding a heavy Higgs at the LHC. If the new particle is also charged under QCD, the Higgs production cross section from gluon fusion can be reduced significantly due to the new colored particle one-loop contribution. Current collider constraints on the new particles allow for viable parameter space to exist in order to hide a heavy Higgs boson. We categorize the general signatures of these new particles, identify favored regions of their parameter space and point out that discovering or excluding them at the LHC can provide important indirect information for a heavy Higgs. Finally, for a very heavy Higgs boson, beyond the search limit at the 7 TeV LHC, we discuss three additional scenarios where models would be consistent with electroweak precision tests: including an additional vector-like fermion mixing with the top quark, adding another U(1) gauge boson and modifying triple-gauge boson couplings.

  11. Hide out return test and blowndown crud composition under ETA chemistry

    International Nuclear Information System (INIS)

    Chocron, Mauricio; Rodriguez, Ivanna; Saucedo, Ramona; Rodriguez-Aliciardi, Matias; Montes, Juan

    2012-09-01

    Among the techniques recommended for the surveillance of the Steam Generators (SGs) are (i) the follow-up of the corrosion products in the Feed Water and Blown down water and the corresponding accumulation mass balance and (ii) The follow-up of ionic impurities normally present in the main condensate and feed water that can enter the cycle either by condenser leakages or even by the make-up water. This is so, no matter how well the the cycle is constructed or the make-up water plant behaves given the continuous phase change present in it and the subsequent concentration. A synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in the deposits creating a potentially risky environment for the steam generator tubes. Hide out return determination consists in the measurement of the concentration of ions, anions and cations, present in the blown-down water which are eluted during the shutdown along with the reduction of power and temperature. The integrated value provides figures to perform several evaluations like: (i) how well the make-up water plant has performed during the cycle, (ii) presence of condenser in leakages, (iii) amount of deposits present in the steam generator and (iv) it allows to estimate the chemistry in operation inside the steam generator liquid phase inside the sludge pile. Embalse, a CANDU 6 pressurized heavy water reactor located in Cordoba Province, Argentina, is close to reach the end-of-design-life and a project of life extension is currently ongoing. There, also the chemistry in the BOP has been modified from Morpholine to Ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of steam generator internals and new steam generators will be installed. It is of interest then to set up a hide-out return procedure and analysis of blown down crud collected during the shut down as a base line for the second period of operation

  12. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    Directory of Open Access Journals (Sweden)

    Novella Isabel S

    2003-06-01

    Full Text Available Abstract Background In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, RED, was found to avoid extinction and remain in the population for long periods of time. Since RED characterizes the past evolutionary history of the population, this observation was called quasispecies memory. While the quasispecies theory predicts the existence of these memory genomes, there is a disagreement between the expected and observed mutant frequency values. Therefore, the origin of quasispecies memory is not fully understood. Results We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry, the likely cause of fitness differences between wild type and RED mutants. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.. If the RED mutant is constantly recreated by mutations, then its frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases their fitness to the wild-type level. Moreover, even at low m.o.i. the equilibrium frequency of the mutant is higher than predicted by the standard quasispecies model, because a fraction of mutant virions generated from wild-type parents will also be encapsidated by wild-type protein. Conclusions Our model predicts that phenotypic hiding will strongly influence the population dynamics of viruses, particularly at high m.o.i., and will also have important effects on the mutation-selection balance at low m.o.i. The delay in mutant extinction and increase in mutant

  13. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding.

    Science.gov (United States)

    Wang, Xiaogang; Chen, Wen; Chen, Xudong

    2014-09-22

    We present a novel image hiding method based on phase retrieval algorithm under the framework of nonlinear double random phase encoding in fractional Fourier domain. Two phase-only masks (POMs) are efficiently determined by using the phase retrieval algorithm, in which two cascaded phase-truncated fractional Fourier transforms (FrFTs) are involved. No undesired information disclosure, post-processing of the POMs or digital inverse computation appears in our proposed method. In order to achieve the reduction in key transmission, a modified image hiding method based on the modified phase retrieval algorithm and logistic map is further proposed in this paper, in which the fractional orders and the parameters with respect to the logistic map are regarded as encryption keys. Numerical results have demonstrated the feasibility and effectiveness of the proposed algorithms.

  14. A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

    Directory of Open Access Journals (Sweden)

    Milad Taleby Ahvanooey

    2018-01-01

    Full Text Available With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.

  15. Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2015-05-01

    A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  16. Costly hide and seek pays: unexpected consequences of deceit in a social dilemma

    International Nuclear Information System (INIS)

    Szolnoki, Attila; Perc, Matjaž

    2014-01-01

    Deliberate deceptiveness intended to gain an advantage is commonplace in human and animal societies. In a social dilemma, an individual may only pretend to be a cooperator to elicit cooperation from others, while in reality he is a defector. With this as motivation, we study a simple variant of the evolutionary prisoner's dilemma game entailing deceitful defectors and conditional cooperators that lifts the veil on the impact of such two-faced behavior. Defectors are able to hide their true intentions at a personal cost, while conditional cooperators are probabilistically successful at identifying defectors and act accordingly. By focusing on the evolutionary outcomes in structured populations, we observe a number of unexpected and counterintuitive phenomena. We show that deceitful behavior may fare better if it is costly, and that a higher success rate of identifying defectors does not necessarily favor cooperative behavior. These results are rooted in the spontaneous emergence of cycling dominance and spatial patterns that give rise to fascinating phase transitions, which in turn reveal the hidden complexity behind the evolution of deception. (paper)

  17. What is hiding behind ontogenic d13C variations in mollusk shells: New insights from scallops.

    Science.gov (United States)

    Chauvaud, L.; Lorrain, A.; Gillikin, D. P.; Thebault, J.; Paulet, Y.; Strand, O.; Blamart, D.; Guarini, J.; Clavier, J.

    2008-12-01

    We examined d13Ccalcite variations along scallop shells (Pecten maximus) sampled in Norway, France and Spain. Time series of shell calcite d13C show a consistent pattern of decreasing d13C with age. This almost linear d13C trend reflects an increasing contribution of metabolic CO2 to skeletal carbonate throughout ontogeny. We have removed this ontogenic trend to try to extract other information from our shell calcite d13C dataset. Scallops from the Bay of Brest (western Brittany, France) were then used to interpret the data as many environmental parameters were available for this site. d13Ccalcite variations were compared to d13C of dissolved inorganic carbon (DIC) and Chl a. The detrended calcite d13C profiles seem to follow a seasonal pattern, but surprisingly are inversely related to the d13C DIC and chlorophyll a concentrations measured within the water column. Theses results suggest that shell d13C variations are not controlled by isotopic variation of DIC. Since scallops eat phytoplankton and microphytobenthos cells, and, as a consequence respire organic mater largely depleted in 13C, we therefore suggest that in mollusk suspension feeders the shell d13Ccalcite might still be used to track the annual number of phytoplankton blooms when d13C values of calcite are detrended. We must consider this trend as a potential biological filter hiding precious environmental records.

  18. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

    Directory of Open Access Journals (Sweden)

    Tzu-Chuen Lu

    2017-10-01

    Full Text Available The concept of a dual-image based scheme in information sharing consists of concealing secret messages in two cover images; only someone who has both stego-images can extract the secret messages. In 2015, Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit to reduce the distortion of the stego-image. Then, in 2016, Lu et al. used a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. Because the folding strategy can obviously reduce the value, the proposed scheme includes the folding operation twice to further decrease the reduced digit. We use a frequency-based encoding strategy to encode a secret message and then use the block folding technique by performing the center-folding operation twice to embed secret messages. An indicator is needed to identify the sequence number of the folding operation. The proposed scheme collects several indicators to produce a combined code and hides the code in a pixel to reduce the size of the indicators. The experimental results show that the proposed method can achieve higher image quality under the same embedding rate or higher payload, which is better than other methods.

  19. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    Science.gov (United States)

    Christandl, Matthias; Ferrara, Roberto

    2017-12-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005), 10.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.

  20. Chlamydia pneumoniae hides inside apoptotic neutrophils to silently infect and propagate in macrophages.

    Directory of Open Access Journals (Sweden)

    Jan Rupp

    Full Text Available BACKGROUND: Intracellular pathogens have developed elaborate strategies for silent infection of preferred host cells. Chlamydia pneumoniae is a common pathogen in acute infections of the respiratory tract (e.g. pneumonia and associated with chronic lung sequelae in adults and children. Within the lung, alveolar macrophages and polymorph nuclear neutrophils (PMN are the first line of defense against bacteria, but also preferred host phagocytes of chlamydiae. METHODOLOGY/PRINCIPAL FINDINGS: We could show that C. pneumoniae easily infect and hide inside neutrophil granulocytes until these cells become apoptotic and are subsequently taken up by macrophages. C. pneumoniae infection of macrophages via apoptotic PMN results in enhanced replicative activity of chlamydiae when compared to direct infection of macrophages, which results in persistence of the pathogen. Inhibition of the apoptotic recognition of C. pneumoniae infected PMN using PS- masking Annexin A5 significantly lowered the transmission of chlamydial infection to macrophages. Transfer of apoptotic C. pneumoniae infected PMN to macrophages resulted in an increased TGF-ss production, whereas direct infection of macrophages with chlamydiae was characterized by an enhanced TNF-alpha response. CONCLUSIONS/SIGNIFICANCE: Taken together, our data suggest that C. pneumoniae uses neutrophil granulocytes to be silently taken up by long-lived macrophages, which allows for efficient propagation and immune protection within the human host.

  1. Synthesis of Citric-Acrylate Oligomer and its in-Situ Reaction with Chrome Tanned Collagen (hide powder)

    International Nuclear Information System (INIS)

    Haroun, A.A.; Masoud, R.A.; Bronco, S.; Ciardelli, F.

    2005-01-01

    The purpose of this study was to formulate the new combined system of acrylic and citric acids, which has been prepared by free radical polymerization and esterification reaction at the same time to form citric acrylate (CAC) oligomer through ester linkage and low molecular weight (Mw 2241), in compared with polyacrylic acid. The chemical structure and the reaction mechanism of this oligomer were confirmed by different spectroscopic tools (1 H , 13 C-NMR, ATR-IR), gel permeation chromatography and thermogravimetric analysis (TGA/DTA). The problem of the effect of the masking agents in the chrome tanning of the collagen and the pickling of the hide has been approached from the study of the hydrothermal and mechanical properties, using this new eco-friendly oligomer, which was carried out in-situ treated/grafted chrome tanned collagen (hide powder), and pickled hide. The microemulsion grafting copolymerization of (CAC) using 2.2-azo-bis isobutyronitrile (ABIN), via direct coupling reaction, onto the chrome tanned collagen showed that the free amino groups of the collagen were considered to be a potential site for the in-situ reaction with (CAC) oligomer. Also, using of citric-acrylate (CAC) oligomer, during chrome tanning of leather, instead of the traditional strong acids (sulfuric, hydrochloric and formic) resulted in significant improvement in chrome exhaustion and physical properties

  2. A Data Hiding Technique to Synchronously Embed Physiological Signals in H.264/AVC Encoded Video for Medicine Healthcare.

    Science.gov (United States)

    Peña, Raul; Ávila, Alfonso; Muñoz, David; Lavariega, Juan

    2015-01-01

    The recognition of clinical manifestations in both video images and physiological-signal waveforms is an important aid to improve the safety and effectiveness in medical care. Physicians can rely on video-waveform (VW) observations to recognize difficult-to-spot signs and symptoms. The VW observations can also reduce the number of false positive incidents and expand the recognition coverage to abnormal health conditions. The synchronization between the video images and the physiological-signal waveforms is fundamental for the successful recognition of the clinical manifestations. The use of conventional equipment to synchronously acquire and display the video-waveform information involves complex tasks such as the video capture/compression, the acquisition/compression of each physiological signal, and the video-waveform synchronization based on timestamps. This paper introduces a data hiding technique capable of both enabling embedding channels and synchronously hiding samples of physiological signals into encoded video sequences. Our data hiding technique offers large data capacity and simplifies the complexity of the video-waveform acquisition and reproduction. The experimental results revealed successful embedding and full restoration of signal's samples. Our results also demonstrated a small distortion in the video objective quality, a small increment in bit-rate, and embedded cost savings of -2.6196% for high and medium motion video sequences.

  3. Assessing theory of mind nonverbally in those with intellectual disability and ASD: the penny hiding game.

    Science.gov (United States)

    San José Cáceres, Antonia; Keren, Noa; Booth, Rhonda; Happé, Francesca

    2014-10-01

    Individuals with autism spectrum disorder (ASD) and low intellectual/language abilities are often omitted from experimental studies because of the challenges of testing these individuals. It is vital to develop appropriate and accessible tasks so that this significant part of the spectrum is not neglected. The theory of mind (ToM) has been extensively assessed in ASD, predominantly in relatively high-functioning individuals with reasonable language skills. This study aims to assess the ToM abilities of a sample of 132 participants with intellectual disability (ID) with and without ASD, matched in verbal mental age (VMA) and chronological age, using a naturalistic and nonverbal deception task: the Penny Hiding Game (PHG). The relationship between performance on the PHG and everyday adaptation was also studied. The PHG proved accessible to most participants, suggesting its suitability for use with individuals with low cognitive skills, attentional problems, and limited language. The ASD + ID group showed significantly more PHG errors, and fewer tricks, than the ID group. PHG performance correlated with Vineland adaptation scores for both groups. VMA was a major predictor of passing the task in both groups, and participants with ASD + ID required, on average, 2 years higher VMA than those with ID only, to achieve the same level of PHG success. VMA moderated the association between PHG performance and real-life social skills for the ASD + ID more than the ID group, suggesting that severely impaired individuals with ASD may rely on verbal ability to overcome their social difficulties, whereas individuals with ID alone may use more intuitive social understanding both in the PHG and everyday situations. © 2014 International Society for Autism Research, Wiley Periodicals, Inc.

  4. Information hiding techniques for infrared images: exploring the state-of-the art and challenges

    Science.gov (United States)

    Pomponiu, Victor; Cavagnino, Davide; Botta, Marco; Nejati, Hossein

    2015-10-01

    The proliferation of Infrared technology and imaging systems enables a different perspective to tackle many computer vision problems in defense and security applications. Infrared images are widely used by the law enforcement, Homeland Security and military organizations to achieve a significant advantage or situational awareness, and thus is vital to protect these data against malicious attacks. Concurrently, sophisticated malware are developed which are able to disrupt the security and integrity of these digital media. For instance, illegal distribution and manipulation are possible malicious attacks to the digital objects. In this paper we explore the use of a new layer of defense for the integrity of the infrared images through the aid of information hiding techniques such as watermarking. In this context, we analyze the efficiency of several optimal decoding schemes for the watermark inserted into the Singular Value Decomposition (SVD) domain of the IR images using an additive spread spectrum (SS) embedding framework. In order to use the singular values (SVs) of the IR images with the SS embedding we adopt several restrictions that ensure that the values of the SVs will maintain their statistics. For both the optimal maximum likelihood decoder and sub-optimal decoders we assume that the PDF of SVs can be modeled by the Weibull distribution. Furthermore, we investigate the challenges involved in protecting and assuring the integrity of IR images such as data complexity and the error probability behavior, i.e., the probability of detection and the probability of false detection, for the applied optimal decoders. By taking into account the efficiency and the necessary auxiliary information for decoding the watermark, we discuss the suitable decoder for various operating situations. Experimental results are carried out on a large dataset of IR images to show the imperceptibility and efficiency of the proposed scheme against various attack scenarios.

  5. Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number

    OpenAIRE

    Kohei Arai; Yuji Yamada

    2011-01-01

    An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images...

  6. An Internal Data Non-hiding Type Real-time Kernel and its Application to the Mechatronics Controller

    Science.gov (United States)

    Yoshida, Toshio

    For the mechatronics equipment controller that controls robots and machine tools, high-speed motion control processing is essential. The software system of the controller like other embedded systems is composed of three layers software such as real-time kernel layer, middleware layer, and application software layer on the dedicated hardware. The application layer in the top layer is composed of many numbers of tasks, and application function of the system is realized by the cooperation between these tasks. In this paper we propose an internal data non-hiding type real-time kernel in which customizing the task control is possible only by change in the program code of the task side without any changes in the program code of real-time kernel. It is necessary to reduce the overhead caused by the real-time kernel task control for the speed-up of the motion control of the mechatronics equipment. For this, customizing the task control function is needed. We developed internal data non-cryptic type real-time kernel ZRK to evaluate this method, and applied to the control of the multi system automatic lathe. The effect of the speed-up of the task cooperation processing was able to be confirmed by combined task control processing on the task side program code using an internal data non-hiding type real-time kernel ZRK.

  7. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia)

    OpenAIRE

    Donatas Brandišauskas

    2010-01-01

    This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imp...

  8. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2011-05-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  9. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2010-12-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  10. Intraspecific variation in Trichogramma bruni Nagaraja, 1983 (Hymenoptera: Trichogrammatidae) associated with different hosts.

    Science.gov (United States)

    Querino, R B; Zucchi, R A

    2002-11-01

    Trichogramma bruni is an insufficiently studied South American species whose limits are still not well defined. Thus, the objective of the present study was to characterize T. bruni taxonomically and to determine the association between morphological variations as well as host and habitat, based on morphological and biological studies. Specimens from the Escola Superior de Agricultura "Luiz de Queiroz" (ESALQ) collection, and from the University of California Riverside (UCR) and specimens collected from the vegetation of forest parks with native areas planted with eucalyptus in Piracicaba and Itatinga, State of São Paulo, were also analyzed. The holotype deposited at Univeridade Federal de Minas Gerais (UFMG) collection was also examined. The variability in the genital capsule of T. bruni observed both among individuals of the same progeny and among specimens from different hosts is remarkable and is mainly related to the dorsal lamina. Therefore, an association of diagnostic characters rather than the dorsal lamina alone should be used for the identification of T. bruni and intraspecific variations should be considered. The intraspecific variation observed for T. bruni is a factor that should be considered for its identification, since the influence of the environment (habitat + host) and the variation among individuals itself is responsible for the plasticity observed in the genital capsule. Heliconius erato phyllis, Hamadryas feronia, Erosina hyberniata and Mechanitis lysiminia are new hosts of T. bruni.

  11. Young Stars in Old Galaxies - a Cosmic Hide and Seek Game

    Science.gov (United States)

    2002-05-01

    of its stars are found in large elliptical galaxies (this refers to their form) whose overall appearance has so far led us to believe that they, and their stars as well, are very old, indeed among the oldest objects in the Universe. These elliptical galaxies do shine with the diffuse, reddish glow normally associated with stars that are many billions of years old. However, what is really the underlying mix of stars that produces this elderly appearance? Could perhaps a significant number of much younger stars be "hiding" among the older ones? Whatever the case, this question must obviously be looked into, before it is possible to claim understanding of the evolution of these old galaxies. It is a very challenging investigation and it is only now that new and more detailed observations with the world's premier telescopes have been obtained that cast more light on this central question and thus on the true behaviour of some of the major building blocks of the Universe. Cosmic archaeology In order to identify the constitutents of the stellar "cocktail" in elliptical galaxies, a team of European and American astronomers [2] observed massive stellar clusters in and around several nearby galaxies. These clusters, referred to as "globular" because of their shape, are present in large numbers around most galaxies and together they form a kind of "skeleton" within their host galaxies. These "bones" receive an imprint for every episode of star formation they undergo. Thus, by reading the ages of the globular clusters in a galaxy, it is possible to identify the past epoch(s) of active star formation in that galaxy. This is like digging into the ruins of an ancient archaeological city site and to find those layers and establish those times when the city underwent bursts of building activity. In this way, by the study of the distribution and ages of the globular clusters in an elliptical galaxy, astronomers can reveal when many of its stars were formed. A surprise discovery ESO

  12. Hide-Scrapers from Arukhlo I Settlement in Georgia (on correspondence of the shape and function of prehistoric implements

    Directory of Open Access Journals (Sweden)

    Esakia Ketevan M.

    2017-09-01

    Full Text Available The article analyses one of the primary categories of the implement complex discovered at Arukhlo I Neolithic settlement (Georgia, Kvemo Kartli Region. The stone implements discovered at the site are characterized by their great variety. Comprehensive functional research conducted by the authors demonstrated that the typological and morphological characteristics of the various categories of stone implements do not always correspond to their functions. Thus, the shapes and functions of the hide-scrapers were fully identical for 18 of 39 implements only, whereas the other tools were used for different purposes and did not feature traces of utilization. A microanalysis of their working parts allowed to determine the types of processed raw material, means of processing, and in certain cases the type of obtained articles as well. The authors made a conclusion on the importance of the comprehensive research of production inventory for the reconstruction of the characteristic features of prehistoric economy.

  13. [Missed diagnosis of hiding posterior marginal fracture of ankle with pronation-external rotation type and its treatment].

    Science.gov (United States)

    Wang, Jia; Zhang, Yun-Tong; Zhang, Chun-Cai; Tang, Yang

    2014-01-01

    To analyze causes of missed diagnosis of hiding post-malleolar fractures in treating ankle joint fractures of pronation-external rotation type according to Lauge-Hansen classification and assess its medium-term outcomes. Among 103 patients with ankle joint fracture of pronation-external rotation type treated from March 2002 to June 2010,9 patients were missed diagnosis,including 6 males and 3 females,with a mean age of 35.2 years old (ranged, 18 to 55 years old) . Four patients were diagnosed during operation, 2 patients were diagnosed 2 or 3 days after first surgery and 3 patients came from other hospital. All the patients were treated remedially with lag screws and lock plates internal fixation. After operation,ankle joint function was evaluated according to American Orthopaedic Foot and Ankle Society (AOFAS). All the 9 patients were followed up, and the duration ranged from 14 to 30 months (averaged, 17 months). No incision infection was found, and all incision healed at the first stage. At the latest follow-up, AOFAS was 83.0 +/- 4.4, the score of 4 patients diagnosed during operation was 85.0 +/- 2.9, and the score of 5 patients treated by secondary operation was 81.0 +/- 5.3. All the patients got fracture union observed by X-ray at a mean time of 2.2 months after operation. There were no complications such as internal fixation loosing, broken and vascular or nerve injuries. Ankle joint fracture of pronation-external rotation type may be combined with hiding post-malleolar fractures. So to patients with ankle joint fracture of pronation-external rotation type, lateral X-ray should be read carefully, and if necessary, CT or MRI examination should be performed. If adding lateral X-ray examination after reduction of exterior and interior ankle joint fixation, the missed diagnosis may be avoided.

  14. No Place to Hide: Missing Primitive Stars Outside Milky Way Uncovered

    Science.gov (United States)

    2010-02-01

    , Sculptor, Sextans and Carina dwarf galaxies. Since the dwarf galaxies are typically 300 000 light years away - which is about three times the size of our Milky Way - only strong features in the spectrum could be measured, like a vague, smeared fingerprint. The team found that none of their large collection of spectral fingerprints actually seemed to belong to the class of stars they were after, the rare, extremely metal-poor stars found in the Milky Way. The team of astronomers around Starkenburg has now shed new light on the problem through careful comparison of spectra to computer-based models. They found that only subtle differences distinguish the chemical fingerprint of a normal metal-poor star from that of an extremely metal-poor star, explaining why previous methods did not succeed in making the identification. The astronomers also confirmed the almost pristine status of several extremely metal-poor stars thanks to much more detailed spectra obtained with the UVES instrument on ESO's Very Large Telescope. "Compared to the vague fingerprints we had before, this would be as if we looked at the fingerprint through a microscope," explains team member Vanessa Hill. "Unfortunately, just a small number of stars can be observed this way because it is very time consuming." "Among the new extremely metal-poor stars discovered in these dwarf galaxies, three have a relative amount of heavy chemical elements between only 1/3000 and 1/10 000 of what is observed in our Sun, including the current record holder of the most primitive star found outside the Milky Way," says team member Martin Tafelmeyer. "Not only has our work revealed some of the very interesting, first stars in these galaxies, but it also provides a new, powerful technique to uncover more such stars," concludes Starkenburg. "From now on there is no place left to hide!" Notes [1] According to the definition used in astronomy, "metals" are all the elements other than hydrogen and helium. Such metals, except for a very

  15. Analysis of hide-out return and the composition of the steam generators' combined blowdown under ethanolamine chemistry

    International Nuclear Information System (INIS)

    Rodriguez Aliciardi, M; Belloni, M; Croatto, F; Ferrari, F; Herrera, C; Mendizabal, M; Montes, J; Saucedo, R; Rodriguez, I; Chocron, M

    2012-01-01

    Among the techniques recommended for the surveillance of the steam generators (SG's) are (i) the follow-up of the corrosion products in the feed water and blown-down water and the corresponding accumulation mass balance and (ii) the follow-up of the ionic impurities normally present in the main condensate and feed water that can enter in the cycle either through condenser leakages or even with the make-up water. This is, no matter how well the cycle is constructed or the make-up water plant behaves, given the continuous phase change present in the cycle, a concentration equilibrium is established. Moreover, a synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in crevices and deposits creating a potentially corrosion risky environment for the SG's tubes. Hide-out return determination consists in the measurement of ions' concentrations, present in the blown-down water which are eluted in the shutdown during the power and temperature reduction. The integrated values allow graphical representations for performing several evaluations like: (i) the performance make-up water plant during a period, (ii) the presence of condenser in-leakages, (iii) the SG's deposits estimation and (iv) the internal chemistry of the SG's liquid phase inside the sludge pile. CNE, a CANDU 6 pressurized heavy-water reactor (PHWR) located in Embalse, Cordoba Province, Argentina, is close to reach the end-of-design-life and a life extension project is currently ongoing. In the plant also the chemistry of the BOP has been modified from a morpholine to an ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of SG's internals and new SG's will be installed. Then, it is of interest to set up a hide-out return procedure and analysis of the combined blown-down crud collected during the shut down as a base line for the second period of

  16. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    OpenAIRE

    El-Monem, Farouk Abd; Hussain, Ahmed I.; Nashy, EL-Shahat H.A.; El-Wahhab, Hamada Abd; Naser, Abd El-Rahman M.

    2014-01-01

    Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA) and butyl acrylate (BA). The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leat...

  17. Prevalence and relatedness of Escherichia coli O157:H7 strains in the feces and on the hides and carcasses of U.S. meat goats at slaughter.

    Science.gov (United States)

    Jacob, M E; Foster, D M; Rogers, A T; Balcomb, C C; Sanderson, M W

    2013-07-01

    We determined the prevalences of Escherichia coli O157:H7 in feces, hide, and carcasses of meat goats at a U.S. processing plant. Prevalences were 11.1%, 2.7%, and 2.7%, respectively. Sixteen pulsed-field gel electrophoresis (PFGE) subtypes were identified among 49 E. coli O157:H7 isolates, some of which were present on multiple sample types or collection days.

  18. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Directory of Open Access Journals (Sweden)

    Vishakha Kelkar

    2017-01-01

    Full Text Available In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient’s information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image.

  19. Can organic matter hide from decomposers in the labyrinth of soil aggregates? Micro-engineered Soil Chips challenging foraging fungi

    Science.gov (United States)

    Hammer, Edith C.; Aleklett, Kristin; Arellano Caicedo, Carlos G.; Bengtsson, Martin; Micaela Mafla Endara, Paola; Ohlsson, Pelle

    2017-04-01

    From the point of view of microorganisms, the soil environment is an enormously complex labyrinth with paths and dead-end streets, where resources and shelters are unevenly distributed. We study foraging strategies of soil organisms, especially fungi, and the possibility of physio-spatial stabilization of organic matter by "hiding" in occluded soil spaces. We manipulate growth habitat microstructure with lab-on-a-chip techniques, where we designed complex environments with channels and obstacle at dimensions of the size of hyphae, and construct them in the transparent, gas-permeable polymer PDMS. We fill those with different nutrient solutions or combine with mineral nutrient gradients, and inoculate them with soil organisms. We analyze organisms and substrates with microscopy, fluorescence microscopy and analytical chemistry. We compared different soil litter decomposers and an arbuscular mycorrhizal fungus for their ability to forage through complex air-gap structures and attempt to classify them into functional traits concerning their mycelium directionality, space-exploring approach and ability to grow through acute angles and narrow constrictions. We identified structures which are very difficult to penetrate for most species, and compounds located behind such features may thus be spatially unavailable for decomposers. We discuss our approach in comparison to soil pore space tomographic analyses and findings we made in the pore space of colonized wood biochar.

  20. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Science.gov (United States)

    Tuckley, Kushal

    2017-01-01

    In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient's information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB) obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image. PMID:29104744

  1. Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images

    Directory of Open Access Journals (Sweden)

    Mehdi Hussain

    2016-05-01

    Full Text Available The goal of image steganographic methods considers three main key issues: high embedding capacity, good visual symmetry/quality, and security. In this paper, a hybrid data hiding method combining the right-most digit replacement (RMDR with an adaptive least significant bit (ALSB is proposed to provide not only high embedding capacity but also maintain a good visual symmetry. The cover-image is divided into lower texture (symmetry patterns and higher texture (asymmetry patterns areas and these textures determine the selection of RMDR and ALSB methods, respectively, according to pixel symmetry. This paper has three major contributions. First, the proposed hybrid method enhanced the embedding capacity due to efficient ALSB utilization in the higher texture areas of cover images. Second, the proposed hybrid method maintains the high visual quality because RMDR has the closest selection process to generate the symmetry between stego and cover pixels. Finally, the proposed hybrid method is secure against statistical regular or singular (RS steganalysis and pixel difference histogram steganalysis because RMDR is capable of evading the risk of RS detection attacks due to pixel digits replacement instead of bits. Extensive experimental tests (over 1500+ cover images are conducted with recent least significant bit (LSB-based hybrid methods and it is demonstrated that the proposed hybrid method has a high embedding capacity (800,019 bits while maintaining good visual symmetry (39.00% peak signal-to-noise ratio (PSNR.

  2. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications.

    Science.gov (United States)

    Loan, Nazir A; Parah, Shabir A; Sheikh, Javaid A; Akhoon, Jahangir A; Bhat, Ghulam M

    2017-09-01

    A high capacity and semi-reversible data hiding scheme based on Pixel Repetition Method (PRM) and hybrid edge detection for scalable medical images has been proposed in this paper. PRM has been used to scale up the small sized image (seed image) and hybrid edge detection ensures that no important edge information is missed. The scaled up version of seed image has been divided into 2×2 non overlapping blocks. In each block there is one seed pixel whose status decides the number of bits to be embedded in the remaining three pixels of that block. The Electronic Patient Record (EPR)/data have been embedded by using Least Significant and Intermediate Significant Bit Substitution (ISBS). The RC4 encryption has been used to add an additional security layer for embedded EPR/data. The proposed scheme has been tested for various medical and general images and compared with some state of art techniques in the field. The experimental results reveal that the proposed scheme besides being semi-reversible and computationally efficient is capable of handling high payload and as such can be used effectively for electronic healthcare applications. Copyright © 2017. Published by Elsevier Inc.

  3. Can a Bright and Energetic X-Ray Pulsar Be Hiding Amid the Debris of SN 1987A?

    Science.gov (United States)

    Esposito, Paolo; Rea, Nanda; Lazzati, Davide; Matsuura, Mikako; Perna, Rosalba; Pons, José A.

    2018-04-01

    The mass of the stellar precursor of supernova (SN) 1987A and the burst of neutrinos observed at the moment of the explosion are consistent with the core-collapse formation of a neutron star. However, no compelling evidence for the presence of a compact object of any kind in SN 1987A has been found yet in any band of the electromagnetic spectrum, prompting questions on whether the neutron star survived and, if it did, on its properties. Beginning with an analysis of recent Chandra observations, here we appraise the current observational situation. We derived limits on the X-ray luminosity of a compact object with a nonthermal, Crab-pulsar-like spectrum of the order of ≈(1–5) × 1035 erg s‑1, corresponding to limits on the rotational energy loss of a possible X-ray pulsar in SN 1987A of ≈(0.5–1.5) × 1038 erg s‑1. However, a much brighter X-ray source cannot be excluded if, as is likely, it is enshrouded in a cloud of absorbing matter with a metallicity similar to that expected in the outer layers of a massive star toward the end of its life. We found that other limits obtained from various arguments and observations in other energy ranges either are unbinding or allow a similar maximum luminosity of the order of ≈1035 erg s‑1. We conclude that while a pulsar alike the one in the Crab Nebula in both luminosity and spectrum is hardly compatible with the observations, there is ample space for an “ordinary” X-ray-emitting young neutron star, born with normal initial spin period, temperature, and magnetic field, to be hiding inside the evolving remnant of SN 1987A.

  4. Nothing to Hide

    DEFF Research Database (Denmark)

    Raun, Tobias; Keegan, Cael

    2018-01-01

    of sexualized consumption. We argue that in order to understand the gendered and sexual complexities of this image, it is necessary to contextualize it within Dowling’s comprehensive selfie-practice on YouTube and Instagram. Although this image is not a selfie per se, it is almost impossible to separate from...

  5. Hide and seek

    DEFF Research Database (Denmark)

    Radel, Dietrich; Sand, Andreas; Steel, Mike

    2013-01-01

    criterion. This provides, for the first time, a rigorous way to test tree search algorithms on homoplasy-rich data, where we know in advance what the ‘best’ tree is. In this short note we consider just one search program (TNT) but show that it is able to locate the globally optimal tree correctly for 32......Finding optimal evolutionary trees from sequence data is typically an intractable problem, and there is usually no way of knowing how close to optimal the best tree from some search truly is. The problem would seem to be particularly acute when we have many taxa and when that data has high levels...... of homoplasy, in which the individual characters require many changes to fit on the best tree. However, a recent mathematical result has provided a precise tool to generate a short number of high-homoplasy characters for any given tree, so that this tree is provably the optimal tree under the maximum parsimony...

  6. Validation of a hot water rinse and lactic acid spray in combination with scaling for treating hide-on carcasses to control biotype I strains of Escherichia coli used as surrogates for Shiga toxin-producing E. coli

    Science.gov (United States)

    Scalding of hide-on bob veal carcasses with or without standard scalding chemical agents typically used for hogs, followed by an 82.2degreeC hot water wash and lactic acid spray (applied at ambient temperature) prior to chilling, was evaluated to determine its effectiveness in reducing the levels of...

  7. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    Directory of Open Access Journals (Sweden)

    Farouk Abd El-Monem

    2017-05-01

    Full Text Available Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA and butyl acrylate (BA. The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leather were studied and evaluated using SEM, shrinkage temperature and the mechanical properties of the pre-tanned leather. The results showed that, the prepared polymers A & C are the best polymers in improving the physical properties of the treated leather. Furthermore, the shrinkage temperature and the mechanical properties of the tanned leather were improved. In addition, a significant enhancement in the texture of the leather treated by the polymers was noticed as proved by scanning electron microscopy (SEM.

  8. Optical image-hiding method with false information disclosure based on the interference principle and partial-phase-truncation in the fractional Fourier domain

    International Nuclear Information System (INIS)

    Dai, Chaoqing; Wang, Xiaogang; Zhou, Guoquan; Chen, Junlang

    2014-01-01

    An image-hiding method based on the optical interference principle and partial-phase-truncation in the fractional Fourier domain is proposed. The primary image is converted into three phase-only masks (POMs) using an analytical algorithm involved partial-phase-truncation and a fast random pixel exchange process. A procedure of a fake silhouette for a decryption key is suggested to reinforce the encryption and give a hint of the position of the key. The fractional orders of FrFT effectively enhance the security of the system. In the decryption process, the POM with false information and the other two POMs are, respectively, placed in the input and fractional Fourier planes to recover the primary image. There are no unintended information disclosures and iterative computations involved in the proposed method. Simulation results are presented to verify the validity of the proposed approach. (letters)

  9. Hiding the tobacco power wall reduces cigarette smoking risk in adolescents: using an experimental convenience store to assess tobacco regulatory options at retail point-of-sale.

    Science.gov (United States)

    Shadel, William G; Martino, Steven C; Setodji, Claude M; Scharf, Deborah M; Kusuke, Daniela; Sicker, Angela; Gong, Min

    2015-11-23

    This experiment tested whether changing the location or visibility of the tobacco power wall in a life sized replica of a convenience store had any effect on adolescents' susceptibility to future cigarette smoking. The study was conducted in the RAND StoreLab (RSL), a life sized replica of a convenience store that was developed to experimentally evaluate how changing aspects of tobacco advertising displays in retail point-of-sale environments influences tobacco use risk and behaviour. A randomised, between-subjects experimental design with three conditions that varied the location or visibility of the tobacco power wall within the RSL was used. The conditions were: cashier (the tobacco power wall was located in its typical position behind the cash register counter); sidewall (the tobacco power wall was located on a sidewall away from the cash register); or hidden (the tobacco power wall was located behind the cashier but was hidden behind an opaque wall). The sample included 241 adolescents. Hiding the tobacco power wall significantly reduced adolescents' susceptibility to future cigarette smoking compared to leaving it exposed (ie, the cashier condition; p=0.02). Locating the tobacco power wall on a sidewall away from the cashier had no effect on future cigarette smoking susceptibility compared to the cashier condition (p=0.80). Hiding the tobacco power wall at retail point-of-sale locations is a strong regulatory option for reducing the impact of the retail environment on cigarette smoking risk in adolescents. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  10. Probing the crucial role of Leu31 and Thr33 of the Bacillus pumilus CBS alkaline protease in substrate recognition and enzymatic depilation of animal hide.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    Full Text Available The sapB gene, encoding Bacillus pumilus CBS protease, and seven mutated genes (sapB-L31I, sapB-T33S, sapB-N99Y, sapB-L31I/T33S, sapB-L31I/N99Y, sapB-T33S/N99Y, and sapB-L31I/T33S/N99Y were overexpressed in protease-deficient Bacillus subtilis DB430 and purified to homogeneity. SAPB-N99Y and rSAPB displayed the highest levels of keratinolytic activity, hydrolysis efficiency, and enzymatic depilation. Interestingly, and at the semi-industrial scale, rSAPB efficiently removed the hair of goat hides within a short time interval of 8 h, thus offering a promising opportunity for the attainment of a lime and sulphide-free depilation process. The efficacy of the process was supported by submitting depilated pelts and dyed crusts to scanning electron microscopic analysis, and the results showed well opened fibre bundles and no apparent damage to the collagen layer. The findings also revealed better physico-chemical properties and less effluent loads, which further confirmed the potential candidacy of the rSAPB enzyme for application in the leather industry to attain an ecofriendly process of animal hide depilation. More interestingly, the findings on the substrate specificity and kinetic properties of the enzyme using the synthetic peptide para-nitroanilide revealed strong preferences for an aliphatic amino-acid (valine at position P1 for keratinases and an aromatic amino-acid (phenylalanine at positions P1/P4 for subtilisins. Molecular modeling suggested the potential involvement of a Leu31 residue in a network of hydrophobic interactions, which could have shaped the S4 substrate binding site. The latter could be enlarged by mutating L31I, fitting more easily in position P4 than a phenylalanine residue. The molecular modeling of SAPB-T33S showed a potential S2 subside widening by a T33S mutation, thus suggesting its importance in substrate specificity.

  11. Development of methods for the neutron activation analysis to the determination of essential and toxic trace elements of biological and environmental samples: application of enzyme activity of raw hides

    International Nuclear Information System (INIS)

    Sipos, T.; Nagy, L.G.; Toeroek, G.; Kollar, J.

    1974-01-01

    Investigations on the post mortem enzymatic processes pointed out the fact, that significant deviations can be observed in the extent and in the results of the autolytic transformations occurring during the storage of raw hide. A neutron activation analysis procedure, based on a semiautomated radiochemical separation procedure and scintillation gamma spectrometry, was selected for the determination of some trace elements. Six trace elements, Cu, Mn, Zn, Au, As, and Cr, and one minor component,Br, were detected and/or determined in the concentration region of 0,1-10 3 ppM. According to preliminary investigations evaluated at the time being, concentration differences of some orders of magnitude were obtained for some trace elements: copper, zinc and manganese, whereas the concentration of bromine remained practically constant. These findings seem to correlate with large differences in appearance due to different enzyme activities in the raw hides

  12. Analysis of the bacterial diversity existing on animal hide and wool: development of a preliminary PCR-restriction fragment length polymorphism fingerprint database for identifying isolates.

    Science.gov (United States)

    Chen, Yu; Gao, Hongwei; Zhang, Yanming; Deng, Mingjun; Wu, Zhenxing; Zhu, Laihua; Duan, Qing; Xu, Biao; Liang, Chengzhu; Yue, Zhiqin; Xiao, Xizhi

    2012-01-01

    Twenty-one bacterial strains were isolated from imported cattle hide and rabbit wool using two types of media, nutrient broth, and nutrient broth with serum. The bacteria identified were Brevibacillus laterosporus, Leclercia adecarboxylata, Peptococcus niger, Bacillus circulans, Raoultella ornithinolytica, Bacillus subtilis, Bacillus cereus, Bacillus thermobacillus, Bacillus choshinensis, Bacillus sphaericus, Acinetobacter haemolyticus, Sphingomonas paucimobilis, Bacillus thuringiensis, Staphylococcus intermedius, Mycobacteria, Moraxella, Klebsiella pneumoniae, Ralstonia pickettii, Staphylococcus chromogenes, Comamonas testosteroni, and Cupriavidus pauculus. The 16s rDNA gene of each bacterium was amplified using the universal primers 27f and 1492r. The amplicons were digested with AvaI, BamHI, BgII, DraI, EcoRI, EcoRV, HindIII, HinfI, HpaI, PstI, SmaI, TaqII, XbaI, XmaI, AluI, XhoI, and PvuI individually. A specific fingerprint from the PCR-restriction fragment length polymorphism method based on 16s rDNA was obtained for each bacterium. The results showed that the method developed was useful not only for bacterial identification but also for the etiological investigation of pathogens in imported animal hair and wool.

  13. Rapid Determination of Amino Acids in Beer, Red Wine, and Donkey-Hide Gelatin by Gradient Elution of HPLC: From Micellar Liquid Chromatography to High Submicellar Liquid Chromatography.

    Science.gov (United States)

    Xie, Yunfei; Luo, Tian; Yang, Jing; Dong, Yuming

    2018-01-01

    Amino acids (AAs) in beer, red wine, and donkey-hide gelatin were rapidly determined by gradient LC elution from micellar LC to high submicellar LC. Mobile phase A was a 0.075 M sodium dodecyl sulfate solution containing 20 mM ammonium acetate with a pH value adjusted to 3.5 with acetic acid solution, and mobile phase B was acetonitrile. Optimized chromatographic conditions were as follows: mobile phase B increased from 25 to 60% (v/v) in 30 min and the use of a Venusil XBP C18 column (5 µm, 250 × 4.6 mm) as the stationary phase, with a column temperature of 35°C, flow rate of 1.2 mL/min, and detection wavelength of 266 nm. The results indicated good linearity (r2 ≥ 0.9924). The intraday precision of the retention time was RSD ≤ 1.1%, whereas interday was RSD ≤ 3.2%; intraday precision of the peak area was RSD ≤ 3.3%, whereas interday was RSD ≤ 4.9%. The range of recovery was 94.6-102.4%. The RSDs of the retention time for the AAs for the different samples were 0.04-0.31%.

  14. Effects of Ultrasound Assisted Extraction in Conjugation with Aid of Actinidin on the Molecular and Physicochemical Properties of Bovine Hide Gelatin

    Directory of Open Access Journals (Sweden)

    Tanbir Ahmad

    2018-03-01

    Full Text Available Actinidin was used to pretreat the bovine hide and ultrasonic wave (53 kHz and 500 W was used for the time durations of 2, 4 and 6 h at 60 °C to extract gelatin samples (UA2, UA4 and UA6, respectively. Control (UAC gelatin was extracted using ultrasound for 6 h at 60 °C without enzyme pretreatment. There was significant (p < 0.05 increase in gelatin yield as the time duration of ultrasound treatment increased with UA6 giving the highest yield of 19.65%. Gel strength and viscosity of UAC and UA6 extracted gelatin samples were 627.53 and 502.16 g and 16.33 and 15.60 mPa.s, respectively. Longer duration of ultrasound treatment increased amino acids content of the extracted gelatin and UAC exhibited the highest content of amino acids. Progressive degradation of polypeptide chains was observed in the protein pattern of the extracted gelatin as the time duration of ultrasound extraction increased. Fourier transform infrared (FTIR spectroscopy depicted loss of molecular order and degradation in UA6. Scanning electron microscopy (SEM revealed protein aggregation and network formation in the gelatin samples with increasing time of ultrasound treatment. The study indicated that ultrasound assisted gelatin extraction using actinidin exhibited high yield with good quality gelatin.

  15. Biochemical and molecular characterization of a serine keratinase from Brevibacillus brevis US575 with promising keratin-biodegradation and hide-dehairing activities.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    chemicals used for the dehairing of rabbit, goat, sheep and bovine hides in the leather processing industry.

  16. Information Hiding: an Annotated Bibliography

    National Research Council Canada - National Science Library

    Anderson, Ross

    1999-01-01

    ... so. These steganography, copyright marking, the study of covert channels in operating systems, low-probability of intercept communications, and the study of subliminal channels in digital signature schemes...

  17. Information Hiding: an Annotated Bibliography

    Science.gov (United States)

    1999-04-13

    www.springer.de/catalog/html-files/deutsch/comp/3540619968. html>. [325] 063213, ‘A Multiversion Transaction Scheduler for Centralized Multilevel Se- cure...an MLS DBMS. The authors pro- pose getting around these problems by using multiversion schedulers. An abstract model is developed and shown to

  18. Hiding Crimes in Cyberspace (PREPRINT)

    National Research Council Canada - National Science Library

    Denning, Dorothy E; Baugh, Jr, William E

    1999-01-01

    .... Individuals need it to protect their private communications and confidential data. Encryption is critical to building a secure and trusted global information infrastructure for communications and electronic commerce...

  19. That Man Behind the Curtain: Investigating the Sexual Online Dating Behavior of Men Who Have Sex With Men but Hide Their Same-Sex Sexual Attraction in Offline Surroundings.

    Science.gov (United States)

    Lemke, Richard; Weber, Mathias

    2017-01-01

    This study investigates how men who have sex with men (MSM) use chat and dating sites based on theories of stigma-related offline behavior and online self-disclosure. We hypothesize that hidden MSM (those who self-label as heterosexual or who hide their same-sex sexual attraction from family, friends, acquaintances, or a female romantic partner) differ from open MSM in how they behave on gay chat and dating sites and in offline gay venues. Drawing on a survey of 12,002 MSM, we show that hidden MSM tend to mask their identity on gay chat and dating sites while avoiding offline gay venues. They also focus more strongly on online sexual activities (e.g., masturbating during online chats) when using gay chat and dating sites. However, they spend the same amount of time on these sites, and they use them to initiate offline sexual encounters as often and as fast as open MSM.

  20. Ordered Data Analysis, Models and Health Research Methods : an International Conference in Honor of H.N. Nagaraja for his 60th Birthday

    CERN Document Server

    Nagaraja, Chaitra; Ng, Hon

    2015-01-01

    This volume presents an eclectic mix of original research articles in areas covering the analysis of ordered data, stochastic modeling and biostatistics. These areas were featured in a conference held at the University of Texas at Dallas from March 7 to 9, 2014 in honor of Professor H. N. Nagaraja’s 60th birthday and his distinguished contributions to statistics. The articles were written by leading experts who were invited to contribute to the volume from among the conference participants. The volume is intended for all researchers with an interest in order statistics, distribution theory, analysis of censored data, stochastic modeling, time series analysis, and statistical methods for the health sciences, including statistical genetics.

  1. Genetic diversity and antimicrobial resistance among isolates of Escherichia coli O157: H7 from feces and hides of super-shedders and low-shedding pen-mates in two commercial beef feedlots

    Directory of Open Access Journals (Sweden)

    Stanford Kim

    2012-09-01

    Full Text Available Abstract Background Cattle shedding at least 104 CFU Escherichia coli O157:H7/g feces are described as super-shedders and have been shown to increase transmission of E. coli O157:H7 to other cattle in feedlots. This study investigated relationships among fecal isolates from super-shedders (n = 162, perineal hide swab isolates (PS from super-shedders (n = 137 and fecal isolates from low-shedder (4 CFU/g feces pen-mates (n = 496 using pulsed-field gel electrophoresis (PFGE. A subsample of these fecal isolates (n = 474 was tested for antimicrobial resistance. Isolates of E. coli O157:H7 were obtained from cattle in pens (avg. 181 head at 2 commercial feedlots in southern Alberta with each steer sampled at entry to the feedlot and prior to slaughter. Results Only 1 steer maintained super-shedder status at both samplings, although approximately 30% of super-shedders in sampling 1 had low-shedder status at sampling 2. A total of 85 restriction endonuclease digestion clusters (REPC; 90% or greater similarity and 86 unique isolates (P = 0.94. Only 2/21 super-shedders had fecal isolates in the same REPC at both samplings. Fecal and PS isolates from individual super-shedders generally belonged to different REPCs, although fecal isolates of E. coli O157:H7 from super- and low-shedders showed greater similarity (P P = 0.69, although all super-shedder isolates with antimicrobial resistance (n = 3 were resistant to multiple antimicrobials. Conclusions Super-shedders did not have increased antimicrobial resistance compared to low-shedder pen mates. Our data demonstrated that PFGE profiles of individual super-shedders varied over time and that only 1/162 steers remained a super-shedder at 2 samplings. In these two commercial feedlots, PFGE subtypes of E. coli O157:H7 from fecal isolates of super- and low-shedders were frequently different as were subtypes of fecal and perineal hide isolates from super-shedders.

  2. Ação de diferentes agentes curtentes utilizados no curtimento de peles de coelhos: testes físico-mecânicos dos couros = Action of different tanning agents used on rabbit hide tanning: physicalmechanic tests

    Directory of Open Access Journals (Sweden)

    Nilson do Prado Franco

    2009-10-01

    Full Text Available O objetivo do experimento foi avaliar a ação de diferentes agentes curtentes no processamento das peles de coelhos, sobre a resistência do couro. Cinquenta peles de coelhos foram submetidas a diferentes agentes curtentes na etapa de curtimento (T1 = 6% sais de cromoChromossal B®, T2 = 22% tanino vegetal Clarotan-x8®; T3 = 22% tanino sintético Syntac CW®; T4 = 12% tanino vegetal Weibull® + 10% tanino sintético Syntac F®; T5 = 22% tanino vegetal Weibull®. Foram retirados os corpos de prova do couro, na região dorsal, no sentidolongitudinal e transversal em relação ao eixo céfalo-caudal. Os agentes curtentes e retirada dos corpos de prova não influenciaram no teste de tração (9,28 N mm-2 a 11,63 N mm-2 e força aplicada (17,91 N a 24,85 N nos testes. Os curtimentos com sais de cromo (62,85% e Clarotan–x8® (70,28% proporcionaram maiores valores de alongamento em relação aos demais agentes curtentes utilizados. Os corpos de prova do couro no sentido transversal (59,12% apresentaram maior alongamento comparado ao longitudinal (49,72%. Os curtimentos com sais de cromo (22,70 N mm-1, Clarotan–x8® (25,94 N mm-1 e Weibull® (21,58 N mm-1 proporcionaram couros com maior resistência ao rasgamento. O sentido de retirada dos corpos de prova no couro não influenciou no rasgamento progressivo. As técnicas de curtimento com sais de cromo e Clarotan-x8® proporcionaram couros com melhores valores de resistência ao alongamento e rasgamento progressivo.The objective of the experiment was to evaluate the action of different tanning agents in the processing of rabbit hides over skin resistance. Fifty skins of rabbit hides were submitted to different tanning agents in the tanning stage (T1 = 6% Chromossal B® chromesalts; T2 = 22% Clarotan–x8® vegetable tannin; T3 = 22% Syntac CW® synthetic tannin; T4 = 12% Weibull® vegetable tannin + 10% Syntac F® synthetic tannin; T5 = 22% Weibull® vegetable tannin. The specimens were removed

  3. Influence of Therapeutic Ceftiofur Treatments of Feedlot Cattle on Fecal and Hide Prevalences of Commensal Escherichia coli Resistant to Expanded-Spectrum Cephalosporins, and Molecular Characterization of Resistant Isolates

    Science.gov (United States)

    Griffin, Dee; Kuehn, Larry A.; Brichta-Harhay, Dayna M.

    2013-01-01

    In the United States, the blaCMY-2 gene contained within incompatibility type A/C (IncA/C) plasmids is frequently identified in extended-spectrum-cephalosporin-resistant (ESCr) Escherichia coli strains from both human and cattle sources. Concerns have been raised that therapeutic use of ceftiofur in cattle may increase the prevalence of ESCr E. coli. We report that herd ESCr E. coli fecal and hide prevalences throughout the residency of cattle at a feedlot, including during the period of greatest ceftiofur use at the feedlot, were either not significantly different (P ≥ 0.05) or significantly less (P E. coli shedding that follows ceftiofur injection abated, ceftiofur-injected cattle were no more likely than untreated members of the same herd to shed ESCr E. coli. Pulsed-field gel electrophoresis (PFGE) genotyping, antibiotic resistance phenotyping, screening for presence of the blaCMY-2 gene, and plasmid replicon typing were performed on 312 ESCr E. coli isolates obtained during six sampling periods spanning the 10-month residence of cattle at the feedlot. The identification of only 26 unique PFGE genotypes, 12 of which were isolated during multiple sampling periods, suggests that clonal expansion of feedlot-adapted blaCMY-2 E. coli strains contributed more to the persistence of blaCMY-2 than horizontal transfer of IncA/C plasmids between E. coli strains at this feedlot. We conclude that therapeutic use of ceftiofur at this cattle feedlot did not significantly increase the herd prevalence of ESCr E. coli. PMID:23354706

  4. A GAO hiding among the PAO

    DEFF Research Database (Denmark)

    McIlroy, Simon Jon; Albertsen, Mads; Stokholm-Bjerregaard, Mikkel

    “Candidatus Accumulibacter phosphatis” (Accumulibacter) and the model GAO being the gammaproteobacterial “Candidatus Competibacter phosphatis” (see Oehmen et al., 2007). Here, we report the discovery of a GAO from the genus Propionivibrio, which is closely related to Accumulibacter. Propionivibrio is often...

  5. Human Infrastructure Detection and Exploitation (HIDE)

    Science.gov (United States)

    2009-11-01

    7  Figure 4. Picture of the fluxgate magnetometer and the coil-type magnetic sensor...may also be used to detect the usage of computer monitors. We used two different B-field sensors (figure 4), namely, (1) a fluxgate magnetometer ...collected at 256 samples per second. The three-axis fluxgate magnetometer used was an Applied Physics Systems Model 1540. It has the sensitivity

  6. Know Where Lead May Be Hiding

    Science.gov (United States)

    ... might like ... Sing-Along Songs With words and music! Go! What's That Word Scientific Dictionary Not sure of what a word means? Find Out! For teachers The Environmental Health Science Education website provides educators, students and scientists with ...

  7. [Simulation of homicide to hide child's suicide].

    Science.gov (United States)

    Schmidt, P; Driever, F; Madea, B

    2001-01-01

    A case of pretending a homicide to conceal a child suicide is reported in which characteristic findings of the postmortem examination and conclusions from the analysis of forensic autopsy series provided substantial support for the police investigation. In the late night hours of a spring day the police authorities were informed that a 10-year-old girl had been found dead on a playground near its parents' house. As injuries of the neck were recognized by the police officers a homicide investigation was initiated. The post mortem examination showed a furrow symmetrically slanting from the front to the nape of the neck, discrete punctate haemorrhages of the skin of the face and numerous 'tram-line' bruises of the back, buttocks and extremities. These findings indicated as cause and manner of death suicidal hanging following corporal punishment. Confronted with these conclusions the mother immediately made a corresponding confession.

  8. Are QSO2 hiding among EROs?

    OpenAIRE

    Brusa, Marcella

    2004-01-01

    We present the results of a deep (80 ks) XMM-Newton survey of one of the largest sample of near-infrared selected Extremely Red Objects (R-K>5) available to date (~300 objects, Daddi et al. 2000). The fraction of individually detected, X-ray emitting EROs is of the order of ~3.5%, down to F_x > 4x10^-15 cgs and Ks

  9. Hiding neutrino mass in modified gravity cosmologies

    Energy Technology Data Exchange (ETDEWEB)

    Bellomo, Nicola; Bellini, Emilio; Hu, Bin; Jimenez, Raul; Verde, Licia [ICC, University of Barcelona (UB-IEEC), Marti i Franques 1, 08028, Barcelona (Spain); Pena-Garay, Carlos, E-mail: nicola.bellomo@icc.ub.edu, E-mail: emilio.bellini@physics.ox.ac.uk, E-mail: binhu@icc.ub.edu, E-mail: raul.jimenez@icc.ub.edu, E-mail: penya@ific.uv.es, E-mail: liciaverde@icc.ub.edu [Instituto de Fisica Corpuscular, CSIC-UVEG, P.O. 22085, Valencia, 46071 (Spain)

    2017-02-01

    Cosmological observables show a dependence with the neutrino mass, which is partially degenerate with parameters of extended models of gravity. We study and explore this degeneracy in Horndeski generalized scalar-tensor theories of gravity. Using forecasted cosmic microwave background and galaxy power spectrum datasets, we find that a single parameter in the linear regime of the effective theory dominates the correlation with the total neutrino mass. For any given mass, a particular value of this parameter approximately cancels the power suppression due to the neutrino mass at a given redshift. The extent of the cancellation of this degeneracy depends on the cosmological large-scale structure data used at different redshifts. We constrain the parameters and functions of the effective gravity theory and determine the influence of gravity on the determination of the neutrino mass from present and future surveys.

  10. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  11. Cryptic cuckoo eggs hide from competing cuckoos

    Science.gov (United States)

    Gloag, Ros; Keller, Laurie-Anne; Langmore, Naomi E.

    2014-01-01

    Interspecific arms races between cuckoos and their hosts have produced remarkable examples of mimicry, with parasite eggs evolving to match host egg appearance and so evade removal by hosts. Certain bronze-cuckoo species, however, lay eggs that are cryptic rather than mimetic. These eggs are coated in a low luminance pigment that camouflages them within the dark interiors of hosts' nests. We investigated whether cuckoo egg crypsis is likely to have arisen from the same coevolutionary processes known to favour egg mimicry. We added high and low luminance-painted eggs to the nests of large-billed gerygones (Gerygone magnirostris), a host of the little bronze-cuckoo (Chalcites minutillus). Gerygones rarely rejected either egg type, and did not reject natural cuckoo eggs. Cuckoos, by contrast, regularly removed an egg from clutches before laying their own and were five times more likely to remove a high luminance model than its low luminance counterpart. Given that we found one-third of all parasitized nests were exploited by multiple cuckoos, our results suggest that competition between cuckoos has been the key selective agent for egg crypsis. In such intraspecific arms races, crypsis may be favoured over mimicry because it can reduce the risk of egg removal to levels below chance. PMID:25122227

  12. HIDE working groups. A. Synchrotron based system

    International Nuclear Information System (INIS)

    Barton, M.Q.

    1977-01-01

    A summary is given of a week's discussions on an ion source to target scenario for a synchrotron for heavy ion fusion. Topics considered include: the number of beams on the target; beam dynamics; and a number of areas explicitly identified as needing further work

  13. Hiding Lorentz invariance violation with MOND

    International Nuclear Information System (INIS)

    Sanders, R. H.

    2011-01-01

    Horava-Lifshitz gravity is an attempt to construct a renormalizable theory of gravity by breaking the Lorentz invariance of the gravitational action at high energies. The underlying principle is that Lorentz invariance is an approximate symmetry and its violation by gravitational phenomena is somehow hidden to present limits of observational precision. Here I point out that a simple modification of the low-energy limit of Horava-Lifshitz gravity in its nonprojectable form can effectively camouflage the presence of a preferred frame in regions where the Newtonian gravitational field gradient is higher than cH 0 ; this modification results in the phenomenology of modified Newtonian dynamics (MOND) at lower accelerations. As a relativistic theory of MOND, this modified Horava-Lifshitz theory presents several advantages over its predecessors.

  14. Hiding in Plain Sight: Street artists online

    Directory of Open Access Journals (Sweden)

    Kim Barbour

    2013-10-01

    Full Text Available Identity and privacy concerns related to social media are the subject of widespread academic enquiry and mass media reporting. Although in most circumstances academic research tends to present identity play and online self­presentation as positive, media reporting in Australia makes much of the risks of identity theft, privacy breaches and online predators. This research explores the phenomenological experience of creating an online persona, focusing particularly on street artists. For street artists, the threat of unwanted exposure has to be balanced with the positive implications of sharing their creative work outside its geographical and temporal constraints. I argue that street artists use complex persona­creation strategies in order to both protect and promote themselves. The two street artists discussed in this article experience their engagement with social media and digital networks in ways that offer new insight into the opportunities and problems associated with the presentation of a persona online.

  15. Soliciting Performance, Hiding Bias: Whiteness and Librarianship

    Directory of Open Access Journals (Sweden)

    Angela Galvan

    2015-06-01

    Full Text Available Image by Flickr user tweng (CC BY-SA 2.0 In Brief: Despite the growing body of research on our professional demographics and multi-year diversity initiatives, librarianship in the United States remains overwhelmingly white. I suggest the interview process is a series of repetitive gestures designed to mimic and reinforce white middle class values, which ultimately influence […

  16. Reviews Opera: Doctor Atomic DVD: Doctor Atomic Equipment: Digital stopclock with external trigger Book: I Cyborg Book: Flat Earth: The History of an Infamous Idea Book: Mere Thermodynamics Book: CGP revision guides Book: Hiding the Elephant: How Magicians Invented the Impossible Book: Back of the Envelope Physics Web Watch

    Science.gov (United States)

    2009-07-01

    WE RECOMMEND Doctor Atomic The new Doctor Atomic opera provkes discussion on ethics I Cyborg The world's first human cyborg shares his life story in I Cyborg Flat Earth: The History of an Infamous Idea Flat Earth gives us a different perspective on creationism Mere Thermodynamics An introductory text on the three laws CGP revision guides This revision guide suits all courses and every pocket Hiding the Elephant: How Magicians Invented the Impossible The mystery of many illusions are solved in this book Back of the Envelope Physics This reference deserves a place on your bookshelf WORTH A LOOK Doctor Atomic The DVD doesn't do justice to the live performance Digital stopclock with external trigger Use these stopclocks when you need an external trigger WEB WATCH Webcasts reach out to an online audience

  17. Ação de diferentes agentes curtentes utilizados no curtimento de peles de coelhos: testes físico-mecânicos dos couros - DOI: 10.4025/actascianimsci.v31i4.5592 Action of different tanning agents used on rabbit hide tanning: physical-mechanic tests - DOI: 10.4025/actascianimsci.v31i4.5592

    Directory of Open Access Journals (Sweden)

    Nilson do Prado Franco

    2009-10-01

    Full Text Available O objetivo do experimento foi avaliar a ação de diferentes agentes curtentes no processamento das peles de coelhos, sobre a resistência do couro. Cinquenta peles de coelhos foram submetidas a diferentes agentes curtentes na etapa de curtimento (T1 = 6% sais de cromo Chromossal B®, T2 = 22% tanino vegetal Clarotan-x8®; T3 = 22% tanino sintético Syntac CW®; T4 = 12% tanino vegetal Weibull® + 10% tanino sintético Syntac F®; T5 = 22% tanino vegetal Weibull®. Foram retirados os corpos de prova do couro, na região dorsal, no sentido longitudinal e transversal em relação ao eixo céfalo-caudal. Os agentes curtentes e retirada dos corpos de prova não influenciaram no teste de tração (9,28 a 11,63 N mm-2 e força aplicada (17,91 N a 24,85 N nos testes. Os curtimentos com sais de cromo (62,85% e Clarotan–x8® (70,28% proporcionaram maiores valores de alongamento em relação aos demais agentes curtentes utilizados. Os corpos de prova do couro no sentido transversal (59,12% apresentaram maior alongamento comparado ao longitudinal (49,72%. Os curtimentos com sais de cromo (22,70 N mm-1, Clarotan–x8® (25,94 N mm-1 e Weibull® (21,58 N mm-1 proporcionaram couros com maior resistência ao rasgamento. O sentido de retirada dos corpos de prova no couro não influenciou no rasgamento progressivo. As técnicas de curtimento com sais de cromo e Clarotan-x8® proporcionaram couros com melhores valores de resistência ao alongamento e rasgamento progressivo.The objective of the experiment was to evaluate the action of different tanning agents in the processing of rabbit hides over skin resistance. Fifty skins of rabbit hides were submitted to different tanning agents in the tanning stage (T1 = 6% Chromossal B® chrome salts; T2 = 22% Clarotan–x8® vegetable tannin; T3 = 22% Syntac CW® synthetic tannin; T4 = 12% Weibull® vegetable tannin + 10% Syntac F® synthetic tannin; T5 = 22% Weibull® vegetable tannin. The specimens were removed from

  18. Hide-and-Seek: Narcissism and "Selfie"-Related Behavior.

    Science.gov (United States)

    Lee, Jung-Ah; Sung, Yongjun

    2016-05-01

    While prior research has examined the relationship between narcissism and self-promoting behaviors on social media (e.g., posting selfies), little is known about the extent to which individuals' level of narcissism relates to how involved they are in other people's feedback (e.g., comments and "likes") received on their selfies, or how observant and responsive they are to other people's selfie postings. The present study investigates how narcissism relates to such selfie-related behaviors, as well as overall evaluation of selfie-posting behavior and intention to post selfies in the future. By employing a total of 315 Korean subjects who take and post selfies on social networking sites, the present study indicates that individuals higher in narcissism are more likely to evaluate selfie-posting behavior favorably, be involved in the feedback provided by others, and be observant of other people's selfies. However, level of narcissism did not moderate the relationship between how much one observes others' selfies and the likelihood of providing a comment or "like" on other people's selfies.

  19. Using DNS amplification DDoS attack for hiding data

    Science.gov (United States)

    Mehić, M.; Voznak, M.; Safarik, J.; Partila, P.; Mikulec, M.

    2014-05-01

    This paper concerns available steganographic techniques that can be used for sending hidden data through public network. Typically, in steganographic communication it is advised to use popular/often used method for sending hidden data and amount of that data need to be high as much as possible. We confirmed this by choosing a Domain Name System (DNS) as a vital protocol of each network and choosing Distributed denial of service (DDoS) attacks that are most popular network attacks currently represented in the world. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols fields and is known for IP, UDP or TCP protocols, but has never been applied to DNS (Domain Name Server) which are the fundamental part of network communications. The second explains the usage of DNS Amplification DDoS Attack to send seamlessly data through public network. The calculation that was performed to estimate the total amount of data that can be covertly transferred by using these technique, regardless of steganalysis, is included in this paper.

  20. Data Security by Preprocessing the Text with Secret Hiding

    OpenAIRE

    Ajit Singh; Upasana Jauhari

    2012-01-01

    With the advent of the Internet, an open forum, the massive increase in the data travel across networkmake an issue for secure transmission. Cryptography is the term that involves many encryption method to make data secure. But the transmission of the secure data is an intricate task. Steganography here comes with effect of transmission without revealing the secure data. The research paper provide the mechanism which enhance the security of data by using a crypto+stegano combination to increa...

  1. Hiding in plain sight: communication theory in implementation science

    OpenAIRE

    Manojlovich, Milisa; Squires, Janet E; Davies, Barbara; Graham, Ian D

    2015-01-01

    Background Poor communication among healthcare professionals is a pressing problem, contributing to widespread barriers to patient safety. The word ?communication? means to share or make common. In the literature, two communication paradigms dominate: (1) communication as a transactional process responsible for information exchange, and (2) communication as a transformational process responsible for causing change. Implementation science has focused on information exchange attributes while la...

  2. Polycyclic Aromatic Hydrocarbons (PAHs) Content in Cattle Hides ...

    African Journals Online (AJOL)

    ADOWIE PERE

    ABSTRACT: Scrap rubber tyre is used as fuel for singeing animal carcasses in third world countries despite the fact that it can .... test method and the quantification of the PAH analytes using ... waste, SW-846 methods) with some modifications.

  3. Assessment of contamination of singed hides from cattle and goats ...

    African Journals Online (AJOL)

    African Journal of Environmental Science and Technology. Journal Home · ABOUT · Advanced Search · Current Issue · Archives · Journal Home > Vol 2, No 8 (2008) >. Log in or Register to get access to full text downloads.

  4. Nowhere to Hide: The Growing Threat to Air Bases

    Science.gov (United States)

    2013-06-01

    occurred. On 22 July 2011, for example, Anders Breivik , a Norwegian, set off a vehicle bomb near government buildings in Oslo, killing eight, and...usatoday30.usatoday.com/news/washington/2009-04-19-homeland -memo_N.htm. 26. “Anders Breivik Describes Norway Island Massacre,” BBC, 20 April 2012, http

  5. A semantic medical multimedia retrieval approach using ontology information hiding.

    Science.gov (United States)

    Guo, Kehua; Zhang, Shigeng

    2013-01-01

    Searching useful information from unstructured medical multimedia data has been a difficult problem in information retrieval. This paper reports an effective semantic medical multimedia retrieval approach which can reflect the users' query intent. Firstly, semantic annotations will be given to the multimedia documents in the medical multimedia database. Secondly, the ontology that represented semantic information will be hidden in the head of the multimedia documents. The main innovations of this approach are cross-type retrieval support and semantic information preservation. Experimental results indicate a good precision and efficiency of our approach for medical multimedia retrieval in comparison with some traditional approaches.

  6. Chern Numbers Hiding in Time of Flight Images

    Science.gov (United States)

    Satija, Indubala; Zhao, Erhai; Ghosh, Parag; Bray-Ali, Noah

    2011-03-01

    Since the experimental realization of synthetic magnetic fields in neural ultracold atoms, transport measurement such as quantized Hall conductivity remains an open challenge. Here we propose a novel and feasible scheme to measure the topological invariants, namely the chern numbers, in the time of flight images. We study both the commensurate and the incommensurate flux, with the later being the main focus here. The central concept underlying our proposal is the mapping between the chern numbers and the size of the dimerized states that emerge when the two-dimensional hopping is tuned to the highly anisotropic limit. In a uncoupled double quantum Hall system exhibiting time reversal invariance, only odd-sized dimer correlation functions are non-zero and hence encode quantized spin current. Finally, we illustrate that inspite of highly fragmented spectrum, a finite set of chern numbers are meaningful. Our results are supported by direct numerical computation of transverse conductivity. NBA acknowledges support from a National Research Council postdoctoral research associateship.

  7. Ultrashort soliton switching based on coherent energy hiding.

    Science.gov (United States)

    Romagnoli, M; Wabnitz, S; Zoccolotti, L

    1991-08-15

    Coherent coupling between light and atoms may be exploited for conceiving a novel class of all-optical signalprocessing devices without a direct counterpart in the continuous-wave regime. We show that the self-switching of ultrashort soliton pulses on resonance with a transition of doping centers in a slab waveguide directional coupler is based on nonlinear group-velocity (instead of the usual phase-velocity) changes.

  8. No need to hide : Protecting safe regions on commodity hardware

    NARCIS (Netherlands)

    Koning, Koen; Chen, Xi; Bos, Herbert; Giuffrida, Cristiano; Athanasopoulos, Elias

    2017-01-01

    As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit predecessors, most research projects assume that strong in-process memory isolation is no longer an affordable option. Instead of strong, deterministic isolation, new defense systems therefore rely on the

  9. Protocols for data hiding in pseudo-random state

    Science.gov (United States)

    Craver, Scott; Li, Enping; Yu, Jun

    2009-02-01

    An emerging form of steganographic communication uses ciphertext to replace the output of a random or strong pseudo-random number generator. PRNG-driven media, for example computer animated backdrops in video-conferencing channels, can then be used as a covert channel, if the PRNG bits that generated a piece of content can be estimated by the recipient. However, all bits sent over such a channel must be computationally indistinguishable from i.i.d. coin flips. Ciphertext messages and even key exchange datagrams are easily shaped to match this distribution; however, when placing these messages into a continous stream of PRNG bits, the sender is unable to provide synchronization markers, metadata, or error correction to ensure the message's location and proper decoding. In this paper we explore methods for message transmission and steganographic key exchange in such a "coin flip" channel. We establish that key exchange is generally not possible in this channel if an adversary possesses even a modest noise budget. If the warden is not vigilant in adding noise, however, communication is very simple.

  10. Hiding the weakness: structural robustness using origami design

    Science.gov (United States)

    Liu, Bin; Santangelo, Christian; Cohen, Itai

    2015-03-01

    A non-deformable structure is typically associated with infinitely stiff materials that resist distortion. In this work, we designed a structure with a region that will not deform even though it is made of arbitrarily compliant materials. More specifically, we show that a foldable sheet with a circular hole in the middle can be deformed externally with the internal geometry of the hole unaffected. Instead of strengthening the local stiffness, we fine tune the crease patterns so that all the soft modes that can potentially deform the internal geometry are not accessible through strain on the external boundary. The inner structure is thus protected by the topological mechanics, based on the detailed geometry of how the vertices in the foldable sheet are connected. In this way, we isolate the structural robustness from the mechanical properties of the materials, which introduces an extra degree of freedom for structural design.

  11. Hiding in Plain Sight: The Anatomy of Malicious Facebook Pages

    OpenAIRE

    Dewan, Prateek; Kumaraguru, Ponnurangam

    2015-01-01

    Facebook is the world's largest Online Social Network, having more than 1 billion users. Like most other social networks, Facebook is home to various categories of hostile entities who abuse the platform by posting malicious content. In this paper, we identify and characterize Facebook pages that engage in spreading URLs pointing to malicious domains. We used the Web of Trust API to determine domain reputations of URLs published by pages, and identified 627 pages publishing untrustworthy info...

  12. Secure Oblivious Hiding, Authentication, Tamper Proofing, and Verification Techniques

    National Research Council Canada - National Science Library

    Fridrich, Jessica

    2002-01-01

    In this report, we describe an algorithm for robust visual hash functions with applications to digital image watermarking for authentication and integrity verification of video data and still images...

  13. Are mammal olfactory signals hiding right under our noses?

    Science.gov (United States)

    Apps, Peter James

    2013-06-01

    Chemical communication via olfactory semiochemicals plays a central role in the social behaviour and reproduction of mammals, but even after four decades of research, only a few mammal semiochemicals have been chemically characterized. Expectations that mammal chemical signals are coded by quantitative relationships among multiple components have persisted since the earliest studies of mammal semiochemistry, and continue to direct research strategies. Nonetheless, the chemistry of mammal excretions and secretions and the characteristics of those semiochemicals that have been identified show that mammal semiochemicals are as likely to be single compounds as to be mixtures, and are as likely to be coded by the presence and absence of chemical compounds as by their quantities. There is very scant support for the view that mammal semiochemicals code signals as specific ratios between components, and no evidence that they depend on a Gestalt or a chemical image. Of 31 semiochemicals whose chemical composition is known, 15 have a single component and 16 are coded by presence/absence, one may depend on a ratio between two compounds and none of them are chemical images. The expectation that mammal chemical signals have multiple components underpins the use of multivariate statistical analyses of chromatographic data, but the ways in which multivariate statistics are commonly used to search for active mixtures leads to single messenger compounds and signals that are sent by the presence and absence of compounds being overlooked. Research on mammal semiochemicals needs to accommodate the possibility that simple qualitative differences are no less likely than complex quantitative differences to encode chemical signals.

  14. Hiding correlation-based Watermark templates using secret modulation

    NARCIS (Netherlands)

    Lichtenauer, J.; Setyawan, I.; Lagendijk, R.

    2004-01-01

    A possible solution to the difficult problem of geometrical distortion of watermarked images in a blind watermarking scenario is to use a template grid in the autocorrelation function. However, the important drawback of this method is that the watermark itself can be estimated and subtracted, or the

  15. Medical apps in endocrine diseases - hide and seek.

    Science.gov (United States)

    Albrecht, Urs-Vito; von Jan, Ute

    2014-04-01

    Quantitative review and categorization of available endocrinology related mobile apps for the iOS platform (Apple®) and outline of search strategies to identify appropriate mobile apps for this field. A total of 80 endocrinology related search terms were collected and grouped into 8 main categories covering different areas of endocrinology. These terms were then used to perform comprehensive searches in three categories of Apple's app store, namely 'Medicine', 'Health and Fitness', and 'Reference'. Altogether, matches were found for only 33 of the 80 collected endocrinology related search terms; the majority of matches were found in the medical category, followed by matches for the health and fitness (27/33), and reference (16/33) categories. Restricting the search to these categories significantly helped in discriminating between health related apps and those having another purpose. The distribution of apps per category roughly matches what one can expect considering available data for incidence and prevalence of corresponding endocrinological conditions. Apps matching terms belonging to the spectrum of glucose homeostasis disorders are the most common. For conditions where patients do not have to constantly monitor their condition, apps tend to have a reference or educational character, while for conditions that require a high level of involvement from patients, there are proportionally more apps for self-management. With a single exception, the identified apps had not undergone regulation, and information about the data sources, professional backgrounds, and reliability of the content and integrated information sources was rare. While applying a good search strategy is important for finding apps for endocrinology related problems, users also need to consider whether the app they have found respects all necessary criteria regarding reliability, privacy and data protection before they place their trust in it.

  16. Medical apps in endocrine diseases – hide and seek

    Science.gov (United States)

    von Jan, Ute

    2014-01-01

    Objectives: Quantitative review and categorization of available endocrinology related mobile apps for the iOS platform (Apple®) and outline of search strategies to identify appropriate mobile apps for this field. Methods: A total of 80 endocrinology related search terms were collected and grouped into 8 main categories covering different areas of endocrinology. These terms were then used to perform comprehensive searches in three categories of Apple’s app store, namely ‘Medicine’, ‘Health and Fitness’, and ‘Reference’. Results: Altogether, matches were found for only 33 of the 80 collected endocrinology related search terms; the majority of matches were found in the medical category, followed by matches for the health and fitness (27/33), and reference (16/33) categories. Restricting the search to these categories significantly helped in discriminating between health related apps and those having another purpose. The distribution of apps per category roughly matches what one can expect considering available data for incidence and prevalence of corresponding endocrinological conditions. Apps matching terms belonging to the spectrum of glucose homeostasis disorders are the most common. For conditions where patients do not have to constantly monitor their condition, apps tend to have a reference or educational character, while for conditions that require a high level of involvement from patients, there are proportionally more apps for self-management. With a single exception, the identified apps had not undergone regulation, and information about the data sources, professional backgrounds, and reliability of the content and integrated information sources was rare. Conclusions: While applying a good search strategy is important for finding apps for endocrinology related problems, users also need to consider whether the app they have found respects all necessary criteria regarding reliability, privacy and data protection before they place their trust in it. PMID:25152809

  17. A logarithmic quantization index modulation for perceptually better data hiding.

    Science.gov (United States)

    Kalantari, Nima Khademi; Ahadi, Seyed Mohammad

    2010-06-01

    In this paper, a novel arrangement for quantizer levels in the Quantization Index Modulation (QIM) method is proposed. Due to perceptual advantages of logarithmic quantization, and in order to solve the problems of a previous logarithmic quantization-based method, we used the compression function of mu-Law standard for quantization. In this regard, the host signal is first transformed into the logarithmic domain using the mu-Law compression function. Then, the transformed data is quantized uniformly and the result is transformed back to the original domain using the inverse function. The scalar method is then extended to vector quantization. For this, the magnitude of each host vector is quantized on the surface of hyperspheres which follow logarithmic radii. Optimum parameter mu for both scalar and vector cases is calculated according to the host signal distribution. Moreover, inclusion of a secret key in the proposed method, similar to the dither modulation in QIM, is introduced. Performance of the proposed method in both cases is analyzed and the analytical derivations are verified through extensive simulations on artificial signals. The method is also simulated on real images and its performance is compared with previous scalar and vector quantization-based methods. Results show that this method features stronger a watermark in comparison with conventional QIM and, as a result, has better performance while it does not suffer from the drawbacks of a previously proposed logarithmic quantization algorithm.

  18. Surprising structures hiding in Penrose’s future null infinity

    Science.gov (United States)

    Newman, Ezra T.

    2017-07-01

    Since the late1950s, almost all discussions of asymptotically flat (Einstein-Maxwell) space-times have taken place in the context of Penrose’s null infinity, I+. In addition, almost all calculations have used the Bondi coordinate and tetrad systems. Beginning with a known asymptotically flat solution to the Einstein-Maxwell equations, we show first, that there are other natural coordinate systems, near I+, (analogous to light-cones in flat-space) that are based on (asymptotically) shear-free null geodesic congruences (analogous to the flat-space case). Using these new coordinates and their associated tetrad, we define the complex dipole moment, (the mass dipole plus i times angular momentum), from the l  =  1 harmonic coefficient of a component of the asymptotic Weyl tensor. Second, from this definition, from the Bianchi identities and from the Bondi-Sachs mass and linear momentum, we show that there exists a large number of results—identifications and dynamics—identical to those of classical mechanics and electrodynamics. They include, among many others, {P}=M{v}+..., {L}= {r} × {P} , spin, Newton’s second law with the rocket force term (\\dotM v) and radiation reaction, angular momentum conservation and others. All these relations take place in the rather mysterious H-space rather than in space-time. This leads to the enigma: ‘why do these well known relations of classical mechanics take place in H-space?’ and ‘What is the physical meaning of H-space?’

  19. PALM and STORM: what hides beyond the Rayleigh limit?

    CSIR Research Space (South Africa)

    Henriques, R

    2009-06-01

    Full Text Available Super-resolution imaging allows the imaging of fluorescently labeled probes at a resolution of just tens of nanometers, surpassing classic light microscopy by at least one order of magnitude. Recent advances such as the development of photo...

  20. STRATEGI CAMP DALAM NOVEL HIDING MY CANDY KARYA LADY CHABLIS

    Directory of Open Access Journals (Sweden)

    Sri Saraswati

    2016-07-01

    Penerapan strategi Camp tersebut ditujukan sebagai upaya untuk meraih kebertahanan transgender. Selanjutnya, kebertahanan transgender dapat dicerminkan melalui visibilitas sosial, terbentuknya wacana normalitas alternatif dan pemberdayaan transgender

  1. HIDING IN THE SHADOWS. II. COLLISIONAL DUST AS EXOPLANET MARKERS

    International Nuclear Information System (INIS)

    Dobinson, Jack; Leinhardt, Zoë M.; Lines, Stefan; Carter, Philip J.; Dodson-Robinson, Sarah E.; Teanby, Nick A.

    2016-01-01

    Observations of the youngest planets (∼1–10 Myr for a transitional disk) will increase the accuracy of our planet formation models. Unfortunately, observations of such planets are challenging and time-consuming to undertake, even in ideal circumstances. Therefore, we propose the determination of a set of markers that can preselect promising exoplanet-hosting candidate disks. To this end, N-body simulations were conducted to investigate the effect of an embedded Jupiter-mass planet on the dynamics of the surrounding planetesimal disk and the resulting creation of second-generation collisional dust. We use a new collision model that allows fragmentation and erosion of planetesimals, and dust-sized fragments are simulated in a post-process step including non-gravitational forces due to stellar radiation and a gaseous protoplanetary disk. Synthetic images from our numerical simulations show a bright double ring at 850 μm for a low-eccentricity planet, whereas a high-eccentricity planet would produce a characteristic inner ring with asymmetries in the disk. In the presence of first-generation primordial dust these markers would be difficult to detect far from the orbit of the embedded planet, but would be detectable inside a gap of planetary origin in a transitional disk

  2. A ceramide sensor hiding in a family of sphingomyelin synthases

    NARCIS (Netherlands)

    Tafesse, F.G.

    2009-01-01

    Sphingolipids are vital components of cellular membranes that provide mechanical stability and play key roles in signal transduction, cell recognition and molecular sorting. They are synthesized from ceramide, a potent mediator of programmed cell death. Hence, cells face the dilemma of how to

  3. Hiding State in CλaSH Hardware Descriptions

    NARCIS (Netherlands)

    Gerards, Marco Egbertus Theodorus; Baaij, C.P.R.; Kuper, Jan; Kooijman, Matthijs

    Synchronous hardware can be modelled as a mapping from input and state to output and a new state, such mappings are referred to as transition functions. It is natural to use a functional language to implement transition functions. The CaSH compiler is capable of translating transition functions to

  4. "Hiding in Plain Sight": An Interview with Cara Hoffman

    Science.gov (United States)

    Hosey, Sara

    2014-01-01

    Cara Hoffman's work enacts George Orwell's imperative to "pay attention to the obvious" (an idea that several sympathetic characters repeat in her 2011 novel "So Much Pretty"), probing aspects of twenty-first century life in the United States that have become so accepted as to be unremarkable, such as epidemic levels of…

  5. Erosion can't hide from laser scanner

    International Nuclear Information System (INIS)

    Konstant, D.A.

    1991-01-01

    Particles of topsoil blown by wind will bounce along the soil surface and finally escape a field, leaving it less able to support crops. Water will wash away valuable topsoil and nutrients. And how rough the soil surface is influences whether the soil will erode. Until now, soil scientists have had no suitable technique to measure soil roughness - or microtopography - on the small scale. ARS soil scientists Joe M. Bradford and Chi-hua Huang, of the National Soil Erosion Research Laboratory in West Lafayette, Indiana, have developed a portable scanner that can. It measures the tiny ridges left in the soil by tilling or clods of soil particles that clump together naturally. What does the scanner do? It measures soil elevation by shining a low-power laser beam onto the surface and detecting the position of the laser spot reflected from the soil with a 35-mm camera. In place of film, the scanner camera uses electronic circuitry somewhat similar to that in a video camera to transmit the spot's position to a small computer about 30,000 times a minute. The laser and camera are mounted on the frame of a motor-driven carriage. The computer controls the carriage movement. At the end of a scan, a microtopographic map is stored in the computer. Scientists can analyze it immediately and can compare it to previous maps to see whether erosion has occurred

  6. Hiding the Source Based on Limited Flooding for Sensor Networks.

    Science.gov (United States)

    Chen, Juan; Lin, Zhengkui; Hu, Ying; Wang, Bailing

    2015-11-17

    Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.

  7. HIDE-AND-SEEK WITH THE FUNDAMENTAL METALLICITY RELATION

    Energy Technology Data Exchange (ETDEWEB)

    Kashino, D. [Division of Particle and Astrophysical Science, Graduate School of Science, Nagoya University, Nagoya, 464-8602 (Japan); Renzini, A. [INAF Osservatorio Astronomico di Padova, vicolo dell’Osservatorio 5, I-35122 Padova (Italy); Silverman, J. D. [Kavli Institute for the Physics and Mathematics of the Universe (WPI), Todai Institutes for Advanced Study, the University of Tokyo, Kashiwanoha, Kashiwa, 277-8583 (Japan); Daddi, E., E-mail: daichi@nagoya-u.jp [Laboratoire AIM-Paris-Saclay, CEA/DSM-CNRS-Université Paris Diderot, Irfu/CEA-Saclay, Service d’Astrophysique, F-91191 Gif-sur-Yvette (France)

    2016-06-01

    We use ∼83,000 star-forming galaxies at 0.04 < z < 0.3 from the Sloan Digital Sky Survey to study the so-called fundamental metallicity relation (FMR) and report on the disappearance of its anti-correlation between metallicity and star formation rate (SFR) when using the new metallicity indicator recently proposed by Dopita et al. In this calibration, metallicity is primarily sensitive to the emission line ratio [N ii] λ 6584/[S ii] λλ 6717, 6731 that is insensitive to dilution by pristine infalling gas that may drive the FMR anti-correlation with SFR. Therefore, we conclude that the apparent disappearance of the FMR (using this new metallicity indicator) does not rule out its existence.

  8. Mathematics Hiding in the Nets for a Cube

    Science.gov (United States)

    Jeon, Kyungsoon

    2009-01-01

    Whether they are third graders or teacher candidates, students can learn about perimeter and area while having fun manipulating two-dimensional figures into three-dimensional objects. In this article, the author describes a common mathematical activity for geometry students by creating nets for a cube. By making connections between nets in two…

  9. Hiding the Source Based on Limited Flooding for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Juan Chen

    2015-11-01

    Full Text Available Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.

  10. Fugitive carbon dioxide: It's not hiding in the ocean

    International Nuclear Information System (INIS)

    Kerr, R.A.

    1992-01-01

    The fugitive carbon is the difference between the 7 billion or so tons that spew as carbon dioxide from smokestacks and burning tropical forests and the 3.4 billion tons known to stay in the atmosphere. Finding the other 3 billion or 4 billion tons has frustrated researchers for the past 15 years. The oceans certainly take up some of it. Any forecast of global warming has to be based on how much of the carbon dioxide released by human activity will remain in the atmosphere, and predictions vary by 30% depending on the mix of oceanic and terrestrial processes assumed to be removing the gas. What's more, those predictions assume that the processes at work today will go on operating. But not knowing where all the carbon is going raises the unnerving possibility that whatever processes are removing it may soon fall down on the job without warning, accelerating any warming. Such concerns add urgency to the question of whether the ocean harbors the missing carbon. But there's no simple way to find out. The obvious strategy might seem to be to measure the carbon content of the ocean repeatedly to see how much it increases year by year. The trouble is that several billion tons of added carbon, though impressive on a human scale, are undetectable against the huge swings in ocean carbon that occur from season to season, year to year, and place to place

  11. Whiteliness and Institutional Racism: Hiding behind (Un)Conscious Bias

    Science.gov (United States)

    Tate, Shirley Anne; Page, Damien

    2018-01-01

    'Unconscious bias happens by our brains making incredibly quick judgements and assessments without us realising. Biases are influenced by background, cultural environment and experiences and we may not be aware of these views and opinions, or of their full impact and implications. This article opposes this point of view by arguing that bias is not…

  12. 76 FR 28886 - Importation of Swine Hides and Skins, Bird Trophies, and Ruminant Hides and Skins; Technical...

    Science.gov (United States)

    2011-05-19

    ... of animal byproducts to, among other things, provide specific conditions under which deer and other... importation of animal byproducts to, among other things, provide specific conditions under which deer and... skins from Mexico may enter the United States without other restriction if they are hard dried...

  13. Slide 6

    Indian Academy of Sciences (India)

    Besides these, Mahadevan(1941), Gordon(1951,1958), Allchin & Allchin(1968), Nagaraja Rao (1965), Paddayya (1968), Mathpal (1984), Neumayer (1983), Sadaksharayya(1990) have added to the list of Rock art sites in Karnataka and Kerala.

  14. Journal of Genetics | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Author Affiliations. Shyam Unniraman1 Valakunja Nagaraja1 2. Department of Microbiology and Cell Biology, Indian Institute of Science, Bangalore 560 012, India; Jawaharlal Nehru Centre for Advanced Scientific Research, Jakkur, Bangalore 560 064, India ...

  15. Sadhana | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Sadhana. S Sam Baskar. Articles written in Sadhana. Volume 34 Issue 4 August 2009 pp 663-675. System integration design in MEMS – A case study of micromachined load cell · Shishir Kumar K P Venkatesh S Sam Baskar S P Madhavi · More Details Abstract Fulltext PDF. One of the critical issues in large ...

  16. Journal of Earth System Science | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science. Santimoy Kundu. Articles written in Journal of Earth System Science. Volume 124 Issue 1 February 2015 pp 161-170. Influence of rigid boundary on the propagation of torsional surface wave in an inhomogeneous layer · Shishir Gupta Rehena Sultana Santimoy Kundu.

  17. Journal of Earth System Science | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science. Rehena Sultana. Articles written in Journal of Earth System Science. Volume 124 Issue 1 February 2015 pp 161-170. Influence of rigid boundary on the propagation of torsional surface wave in an inhomogeneous layer · Shishir Gupta Rehena Sultana Santimoy Kundu.

  18. Sadhana | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Sadhana. Predhiman Kaw. Articles written in Sadhana. Volume 38 Issue 5 October 2013 pp 839-848. Fusion research programme in India · Shishir Deshpande Predhiman Kaw · More Details Abstract Fulltext PDF. The fusion energy research program of India is summarized in the context of energy needs ...

  19. Can R-parity violation hide vanilla supersymmetry at the LHC?

    International Nuclear Information System (INIS)

    Asano, Masaki

    2012-09-01

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  20. Auditing HIV Testing Rates across Europe: Results from the HIDES 2 Study.

    Directory of Open Access Journals (Sweden)

    D Raben

    Full Text Available European guidelines recommend the routine offer of an HIV test in patients with a number of AIDS-defining and non-AIDS conditions believed to share an association with HIV; so called indicator conditions (IC. Adherence with this guidance across Europe is not known. We audited HIV testing behaviour in patients accessing care for a number of ICs. Participating centres reviewed the case notes of either 100 patients or of all consecutive patients in one year, presenting for each of the following ICs: tuberculosis, non-Hodgkins lymphoma, anal and cervical cancer, hepatitis B and C and oesophageal candidiasis. Observed HIV-positive rates were applied by region and IC to estimate the number of HIV diagnoses potentially missed. Outcomes examined were: HIV test rate (% of total patients with IC, HIV test accepted (% of tests performed/% of tests offered and new HIV diagnosis rate (%. There were 49 audits from 23 centres, representing 7037 patients. The median test rate across audits was 72% (IQR 32-97, lowest in Northern Europe (median 44%, IQR 22-68% and highest in Eastern Europe (median 99%, IQR 86-100. Uptake of testing was close to 100% in all regions. The median HIV+ rate was 0.9% (IQR 0.0-4.9, with 29 audits (60.4% having an HIV+ rate >0.1%. After adjustment, there were no differences between regions of Europe in the proportion with >0.1% testing positive (global p = 0.14. A total of 113 patients tested HIV+. Applying the observed rates of testing HIV+ within individual ICs and regions to all persons presenting with an IC suggested that 105 diagnoses were potentially missed. Testing rates in well-established HIV ICs remained low across Europe, despite high prevalence rates, reflecting missed opportunities for earlier HIV diagnosis and care. Significant numbers may have had an opportunity for HIV diagnosis if all persons included in IC audits had been tested.

  1. Saving lives with public access defibrillation: A deadly game of hide and seek.

    Science.gov (United States)

    Sidebottom, David B; Potter, Ryan; Newitt, Laura K; Hodgetts, Gillian A; Deakin, Charles D

    2018-07-01

    Early defibrillation is a critical link in the chain of survival. Public access defibrillation (PAD) programmes utilising automated external defibrillators (AEDs) aim to decrease the time-to-first-shock, and improve survival from out-of-hospital cardiac arrest. Effective use of PADs requires rapid location of the device, facilitated by adequate signage. We aimed to therefore assess the quality of signage for PADs in the community. From April 2017 to January 2018 we surveyed community PADs available for public use on the 'Save a Life' AED locator mobile application in and around Southampton, UK. Location and signage characteristics were collected, and the distance from the furthest sign to the AED was measured. Researchers evaluated 201 separate PADs. All devices visited were included in the final analysis. No signage at all was present for 135 (67.2%) devices. Only 15/201 (7.5%) AEDs had signage at a distance from AED itself. In only 5 of these cases (2.5%) was signage mounted more than 5.0 m from the AED. When signage was present, 46 used 2008 ILCOR signage and 15 used 2006 Resuscitation Council (UK) signage. Signage visibility was partially or severely obstructed at 27/66 (40.9%) sites. None of the 45 GP surgeries surveyed used exterior signage or an exterior 24/7 access box. Current signage of PADs is poor and limits the device effectiveness by impeding public awareness and location of AEDs. Recommendations should promote visible signage within the operational radius of each AED. Copyright © 2018 Elsevier B.V. All rights reserved.

  2. Hunting for hiding hosts : the behavioral ecology of the stemborer parasitoid Cotesia flavipes

    NARCIS (Netherlands)

    Potting, R.P.J.

    1996-01-01


    Classical biological control involves the introduction of an exotic natural enemy to control an introduced pest species. In 1991 the department of Entomology of the Wageningen Agricultural University started a collaborative project with the International Centre for Insect Physiology and

  3. Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization

    Science.gov (United States)

    2016-05-30

    HMACs generated us- ing 128-bit AES encryption . We do not use AES en- cryption to generate HMACs due to its high overhead; the authors of CCFI report...execute-only permissions on memory accesses, (ii) code pointer hid- ing (e.g., indirection or encryption ), and (iii) decoys (e.g., booby traps). Among...lowing techniques: they a) enforce execute-only permis- sions on code pages to mitigate direct information leak- age, b) introduce an encryption or

  4. Pediatric writer's cramp in myoclonus-dystonia: Maternal imprinting hides positive family history

    NARCIS (Netherlands)

    Gerrits, M. C. F.; Foncke, E. M. J.; Koelman, J. H. T. M.; Tijssen, M. A. J.

    2009-01-01

    Myoclonus-dystonia (M-D) is an autosomal dominantly inherited movement disorder with myoclonic jerks and dystonic contractions most frequently due to a mutation in the epsilon-sarcoglycan (SGCE, DYT11) gene. We describe two unrelated children with M-D (DYT11) who presented with writer's cramp. Due

  5. Pediatric writer's cramp in myoclonus-dystonia : Maternal imprinting hides positive family history

    NARCIS (Netherlands)

    Gerrits, M. C. F.; Foncke, E. M. J.; Koelman, J. H. T. M.; Tijssen, M. A. J.

    Myoclonus-dystonia (M-D) is an autosomal dominantly inherited movement disorder with myoclonic jerks and dystonic contractions most frequently due to a mutation in the epsilon-sarcoglycan (SGCE, DYT11) gene. We describe two unrelated children with M-D (DYT11) who presented with writer's cramp. Due

  6. Hiding behind High-Stakes Testing: Meritocracy, Objectivity and Inequality in U.S. Education

    Science.gov (United States)

    Au, Wayne

    2013-01-01

    This paper analyses how high-stakes, standardised testing became the policy tool in the U.S. that it is today and discusses its role in advancing an ideology of meritocracy that fundamentally masks structural inequalities related to race and economic class. This paper first traces the early history of high-stakes testing within the U.S. context,…

  7. Hiding in plain sight: immune evasion by the staphylococcal protein SdrE.

    Science.gov (United States)

    Herr, Andrew B; Thorman, Alexander W

    2017-05-10

    The human immune system is responsible for identification and destruction of invader cells, such as the bacterial pathogen Staphylococcus aureus In response, S. aureus brings to the fight a large number of virulence factors, including several that allow it to evade the host immune response. The staphylococcal surface protein SdrE was recently reported to bind to complement Factor H, an important regulator of complement activation. Factor H attaches to the surface of host cells to inhibit complement activation and amplification, preventing the destruction of the host cell. SdrE binding to Factor H allows S. aureus to mimic a host cell and reduces bacterial killing by granulocytes. In a new study published in Biochemical Journal , Zhang et al. describe crystal structures of SdrE and its complex with the C-terminal portion of Factor H. The structure of SdrE and its interaction with the Factor H peptide closely resemble a family of surface proteins that recognize extracellular matrix components such as fibrinogen. However, unbound SdrE forms a novel 'Closed' conformation with an occluded peptide-binding groove. These structures reveal a fascinating mechanism for immune evasion and provide a potential avenue for the development of novel antimicrobial agents to target SdrE. © 2017 The Author(s); published by Portland Press Limited on behalf of the Biochemical Society.

  8. Three-Year-Olds Hide Their Communicative Intentions in Appropriate Contexts

    Science.gov (United States)

    Grosse, Gerlind; Scott-Phillips, Thomas C.; Tomasello, Michael

    2013-01-01

    Human cooperative communication involves both an informative intention that the recipient understands the content of the signal and also a (Gricean) communicative intention that the recipient recognizes that the speaker has an informative intention. The degree to which children understand this 2-layered nature of communication is the subject of…

  9. HIDING IN PLAIN SIGHT: RECORD-BREAKING COMPACT STELLAR SYSTEMS IN THE SLOAN DIGITAL SKY SURVEY

    International Nuclear Information System (INIS)

    Sandoval, Michael A.; Vo, Richard P.; Romanowsky, Aaron J.; Strader, Jay; Choi, Jieun; Conroy, Charlie; Jennings, Zachary G.; Villaume, Alexa; Brodie, Jean P.; Foster, Caroline; Norris, Mark A.; Janz, Joachim; Forbes, Duncan A.

    2015-01-01

    Motivated by the recent, serendipitous discovery of the densest known galaxy, M60-UCD1, we present two initial findings from a follow-up search, using the Sloan Digital Sky Survey, Subaru/Suprime-Cam, and Hubble Space Telescope imaging, and SOuthern Astrophysical Research (SOAR)/Goodman spectroscopy. The first object discovered, M59-UCD3, has a similar size to M60-UCD1 (half-light radius of r h ∼ 20 pc) but is 40% more luminous (M V ∼ −14.6), making it the new densest-known galaxy. The second, M85-HCC1, has a size like a typical globular cluster (GC; r h ∼ 1.8 pc) but is much more luminous (M V ∼ −12.5). This hypercompact cluster is by far the densest confirmed free-floating stellar system, and is equivalent to the densest known nuclear star clusters. From spectroscopy, we find that both objects are relatively young (∼9 and ∼3 Gyr, respectively), with metal-abundances that resemble those of galaxy centers. Their host galaxies show clear signs of large-scale disturbances, and we conclude that these dense objects are the remnant nuclei of recently accreted galaxies. M59-UCD3 is an ideal target for follow-up with high-resolution imaging and spectroscopy to search for an overweight central supermassive black hole as was discovered in M60-UCD1. These findings also emphasize the potential value of ultra-compact dwarfs and massive GCs as tracers of the assembly histories of galaxies

  10. A primary intestinal lymphangiectasia hiding the diagnosis of pleural and pericardial tuberculosis: a clinical observation.

    Science.gov (United States)

    Hammi, Sanaa; Berrani, Hajar; Benouchen, Thami; Lamlami, Naima; Elkhiyat, Imane; Bourkadi, Jamal Eddine

    2017-01-01

    Primary intestinal lymphangiectasia (Waldmann's disease) is an exudative enteropathy characterized by lymph leakage into the small bowel lumen leading to hypoalbuminemia, hypogammaglobulinemia and lymphopenia (particularly T-cell). The diagnosis is based on viewing the duodenal lymphangiectasia. A 20 years old female patient, treated for a primary intestinal lymphangiectasia, has consulted for anasarca. Etiological work-up reveals pleural and pericardial tuberculosis. The clinical aggravation of an enteropathy, particularly in adulthood, requires a search for a secondary etiology. Tuberculosis should be sought systematically.

  11. Data Hiding and Security for XML Database: A TRBAC- Based Approach

    Institute of Scientific and Technical Information of China (English)

    ZHANG Wan-song; SUN Wei; LIU Da-xin

    2005-01-01

    In order to cope with varying protection granularity levels of XML (eXtensible Markup Language) documents, we propose a TXAC (Two-level XML Access Control) framework, in which an extended TRBAC (Temporal Role-Based Access Control) approach is proposed to deal with the dynamic XML data. With different system components,TXAC algorithm evaluates access requests efficiently by appropriate access control policy in dynamic web environment.The method is a flexible and powerful security system offering a multi-level access control solution.

  12. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

    Directory of Open Access Journals (Sweden)

    Jong Hyuk Park

    2016-10-01

    Full Text Available Long Term Evolution (LTE and Long Term Evolution-Advanced (LTE-A support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI and Radio Network Temporary Identities (RNTI are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME. The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.

  13. HIDE AND SEEK BETWEEN ANDROMEDA'S HALO, DISK, AND GIANT STREAM

    Energy Technology Data Exchange (ETDEWEB)

    Clementini, Gisella; Contreras Ramos, Rodrigo; Federici, Luciana; Macario, Giulia; Tosi, Monica; Bellazzini, Michele; Fusi Pecci, Flavio; Diolaiti, Emiliano; Cacciari, Carla [INAF, Osservatorio Astronomico di Bologna, Bologna (Italy); Beccari, Giacomo [European Southern Observatory, 85748 Garching bei Munchen (Germany); Testa, Vincenzo; Giallongo, Emanuele; Di Paola, Andrea; Gallozzi, Stefano [INAF, Osservatorio Astronomico di Roma, Monteporzio (Italy); Cignoni, Michele; Marano, Bruno [Dipartimento di Astronomia, Universita di Bologna, Bologna (Italy); Marconi, Marcella; Ripepi, Vincenzo [INAF, Osservatorio Astronomico di Capodimonte, Napoli (Italy); Ragazzoni, Roberto [INAF, Osservatorio Astronomico di Padova, Padova (Italy); Smareglia, Riccardo, E-mail: gisella.clementini@oabo.inaf.it [INAF, Osservatorio Astronomico di Trieste, Trieste (Italy)

    2011-12-10

    Photometry in B, V (down to V {approx} 26 mag) is presented for two 23' Multiplication-Sign 23' fields of the Andromeda galaxy (M31) that were observed with the blue channel camera of the Large Binocular Telescope during the Science Demonstration Time. Each field covers an area of about 5.1 Multiplication-Sign 5.1 kpc{sup 2} at the distance of M31 ({mu}{sub M31} {approx} 24.4 mag), sampling, respectively, a northeast region close to the M31 giant stream (field S2) and an eastern portion of the halo in the direction of the galaxy minor axis (field H1). The stream field spans a region that includes Andromeda's disk and giant stream, and this is reflected in the complexity of the color-magnitude diagram of the field. One corner of the halo field also includes a portion of the giant stream. Even though these demonstration time data were obtained under non-optimal observing conditions, the B photometry, which was acquired in time-series mode, allowed us to identify 274 variable stars (among which 96 are bona fide and 31 are candidate RR Lyrae stars, 71 are Cepheids, and 16 are binary systems) by applying the image subtraction technique to the selected portions of the observed fields. Differential flux light curves were obtained for the vast majority of these variables. Our sample mainly includes pulsating stars that populate the instability strip from the Classical Cepheids down to the RR Lyrae stars, thus tracing the different stellar generations in these regions of M31 down to the horizontal branch of the oldest (t {approx} 10 Gyr) component.

  14. HIDING IN PLAIN SIGHT: RECORD-BREAKING COMPACT STELLAR SYSTEMS IN THE SLOAN DIGITAL SKY SURVEY

    Energy Technology Data Exchange (ETDEWEB)

    Sandoval, Michael A.; Vo, Richard P.; Romanowsky, Aaron J. [Department of Physics and Astronomy, San José State University, One Washington Square, San Jose, CA 95192 (United States); Strader, Jay [Department of Physics and Astronomy, Michigan State University, East Lansing, MI 48824 (United States); Choi, Jieun; Conroy, Charlie [Harvard–Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States); Jennings, Zachary G.; Villaume, Alexa [Department of Astronomy and Astrophysics, University of California, Santa Cruz, CA 95064 (United States); Brodie, Jean P. [University of California Observatories, 1156 High Street, Santa Cruz, CA 95064 (United States); Foster, Caroline [Australian Astronomical Observatory, P.O. Box 915, North Ryde, NSW 1670 (Australia); Norris, Mark A. [Max Planck Institut für Astronomie, Königstuhl 17, D-69117, Heidelberg (Germany); Janz, Joachim; Forbes, Duncan A. [Centre for Astrophysics and Supercomputing, Swinburne University, Hawthorn, VIC 3122 (Australia)

    2015-07-20

    Motivated by the recent, serendipitous discovery of the densest known galaxy, M60-UCD1, we present two initial findings from a follow-up search, using the Sloan Digital Sky Survey, Subaru/Suprime-Cam, and Hubble Space Telescope imaging, and SOuthern Astrophysical Research (SOAR)/Goodman spectroscopy. The first object discovered, M59-UCD3, has a similar size to M60-UCD1 (half-light radius of r{sub h} ∼ 20 pc) but is 40% more luminous (M{sub V} ∼ −14.6), making it the new densest-known galaxy. The second, M85-HCC1, has a size like a typical globular cluster (GC; r{sub h} ∼ 1.8 pc) but is much more luminous (M{sub V} ∼ −12.5). This hypercompact cluster is by far the densest confirmed free-floating stellar system, and is equivalent to the densest known nuclear star clusters. From spectroscopy, we find that both objects are relatively young (∼9 and ∼3 Gyr, respectively), with metal-abundances that resemble those of galaxy centers. Their host galaxies show clear signs of large-scale disturbances, and we conclude that these dense objects are the remnant nuclei of recently accreted galaxies. M59-UCD3 is an ideal target for follow-up with high-resolution imaging and spectroscopy to search for an overweight central supermassive black hole as was discovered in M60-UCD1. These findings also emphasize the potential value of ultra-compact dwarfs and massive GCs as tracers of the assembly histories of galaxies.

  15. Double Strand Break Repair, one mechanism can hide another: Alternative non-homologous end joining

    International Nuclear Information System (INIS)

    Rass, E.; Grabarz, A.; Bertrand, P.; Lopez, B.S.

    2012-01-01

    DNA double strand breaks are major cytotoxic lesions encountered by the cells. They can be induced by ionizing radiation or endogenous stress and can lead to genetic instability. Two mechanisms compete for the repair of DNA double strand breaks: homologous recombination and non-homologous end joining (NHEJ). Homologous recombination requires DNA sequences homology and is initiated by single strand resection. Recently, advances have been made concerning the major steps and proteins involved in resection. NHEJ, in contrast, does not require sequence homology. The existence of a DNA double strand break repair mechanism, independent of KU and ligase IV, the key proteins of the canonical non homologous end joining pathway, has been revealed lately and named alternative non homologous end joining. The hallmarks of this highly mutagenic pathway are deletions at repair junctions and frequent use of distal micro-homologies. This mechanism is also initiated by a single strand resection of the break. The aim of this review is firstly to present recent data on single strand resection, and secondly the alternative NHEJ pathway, including a discussion on the fidelity of NHEJ. Based on current knowledge, canonical NHEJ does not appear as an intrinsically mutagenic mechanism, but in contrast, as a conservative one. The structure of broken DNA ends actually dictates the quality repair of the alternative NHEJ and seems the actual responsible for the mutagenesis attributed beforehand to the canonical NHEJ. The existence of this novel DNA double strand breaks repair mechanism needs to be taken into account in the development of radiosensitizing strategies in order to optimise the efficiency of radiotherapy. (authors)

  16. Is Hiding Foot and Mouth Disease Sensitive Behavior for Farmers? A Survey Study in Sri Lanka

    Directory of Open Access Journals (Sweden)

    Anoma Gunarathne

    2016-02-01

    Full Text Available Foot and mouth disease (FMD has a long history in Sri Lanka and was found to be endemic in various parts of the country and constitutes a constant threat to farmers. In Sri Lanka, currently there is no regular, nationwide vaccination programme devised to control FMD. Therefore, improving farmers’ knowledge regarding distinguishing FMD from other diseases and ensuring prompt reporting of any suspicion of FMD as well as restricting movement of animals are critical activities for an effective FMD response effort. Therefore, the main purpose of this study was to clarify the relationship between farmers’ knowledge levels and their behaviors to establish a strategy to control FMD. In our study, item count technique was applied to estimate the number of farmers that under-report and sell FMD-infected animals, although to do so is prohibited by law. The following findings were observed: about 63% of farmers have very poor knowledge of routes of FMD transmission; ‘under-reporting’ was found to be a sensitive behavior and nearly 23% of the farmers were reluctant to report FMD-infected animals; and ‘selling FMD-infected animals’ is a sensitive behavior among high-level knowledge group while it is a non-sensitive behavior among the low-level knowledge group. If farmers would understand the importance of prompt reporting, they may report any suspected cases of FMD to veterinary officials. However, even if farmers report honestly, they do not want to cull FMD-infected animals. Thus, education programs should be conducted not only on FMD introduction and transmission, but also its impact. Furthermore, consumers may criticize the farmers for culling their infected animals. Hence, not only farmers, but also consumers need to be educated on the economic impact of FMD and the importance of controlling an outbreak. If farmers have a high knowledge of FMD transmission, they consider selling FMD-infected animals as a sensitive behavior. Therefore, severe punishment should be levied for selling FMD-infected animals.

  17. Hide and go seek with temperature signals of Northeastern US Tree Species

    Science.gov (United States)

    Alexander, M. R.; Pederson, N.; Bishop, D. A.; Pearl, J. K.; Anchukaitis, K. J.

    2017-12-01

    Improving reconstructions of past climate is vital in providing long-term context for regional climate change. There have been only two published reconstructions of past temperatures in the northeastern U.S. (NEUS) since the 1980s, one based on Picea rubens, and one out in 2017 based upon Chamaecyparis thyoides (Atlantic white cedar; AWC). Because increased species diversity generally improves dendrohydroclimatic reconstructions and both Picea rubens and AWC have limitations as paleoproxies due to land-use and air pollution, we conducted a series of tests to ask, "Does species diversity improve reconstructions of temperature history in the northeastern United States?" The first two tests were performed on AWC and then a network of AWC and Picea rubens. Subsequent tests added groups of species or genera from a network of 230 tree-ring chronologies beginning with those having the strongest relation between warming temperatures and increased growth. PC1 of the AWC test represented 40% of the variance and showed a significant positive relation with winter temperature (r = 0.38). As additional species were included, the "winter temperature PC" accounted for less of the overall variance, ranging from 26% of the variance in test 2 to 5% by test 5. AWC is swamped by the hydroclimatic signal that dominates our network. Populations of species such as Fagus grandifolia, Fraxinus nigra, Juniperus virginiana, Liriodendron tulipifera, Pinus rigida, and Pinus strobus from our network loaded strongest with AWC on the winter temperature PC. Including multiple species accounted for almost 20% more variance in the winter temperature record than AWC alone. Although drought is a dominating influence of tree growth in this region, our results suggest that winter temperatures are recorded within NEUS tree rings. Increasing the species diversity of tree proxies has the potential for improving reconstruction of paleotemperatures in regions lacking latitudinal or altitudinal tree lines, such as those found in the NEUS.

  18. Hiding behind the Cloth: Child Sexual Abuse and the Catholic Church

    Science.gov (United States)

    Dale, Kathryn A.; Alpert, Judith L.

    2007-01-01

    The existence of child sexual abuse within the Catholic Church has shocked many. In this article, the authors review the history of child sexual abuse in the church, the recent events that brought this tragedy into societal consciousness, and the efforts by the church to conceal the abuse. Two sources of empirical literature, the general…

  19. "Hiding Our Snickers": "Weekly Mail" Journalists' Indirect Resistance in Apartheid South Africa

    Science.gov (United States)

    Trabold, Bryan

    2006-01-01

    In the mid- to late 1980s, the challenges facing the editors and journalists working for the South African antiapartheid newspaper, the "Weekly Mail," were formidable. In addition to the more than one hundred censorship laws already in place, the apartheid government had declared a series of states of emergency in a final and desperate…

  20. Hide and Seek. Aspects of the dynamics of bible translation 1 ...

    African Journals Online (AJOL)

    Translation thus requires a process of deducing and reducing meaning from relative chaos. ... This view affords Bible translators a more balanced status, namely one of humanity with dignity, than is at times ... AJOL African Journals Online.

  1. Improvement of uptake of chrome tan on hide protein by basic oxides

    International Nuclear Information System (INIS)

    Nashya, E.H.A.; Aggiagh, A.E.; Khedra, M.H.; El-Sayeda, N.H.E.

    2005-01-01

    Three basic oxides were used to improve uptake of chrome tan as well as shrinkage temperature of the tanned leather. In addition, the skin quality is one of the most important factors taking into consideration. Three basic oxides, named magnesium oxide, manganese oxide and sodium bicarbonate. The process was optimized taking into the account the shaking rate, chrome concentration (%), initial ph, basic oxides concentration, temperature and contact time. The optimum conditions for exhaustion, fixation, shrinkage temperature as well as skin quality showed that agitation rate of 150 rpm, chrome concentration of 16%, initial ph of 2.5, basic oxide concentration of 4% magnesium oxide, temperature of 35 degree C and contact time of 24 hr. The best results obtained are 88% exhaustion, 90.03% fixation and 109 degree C shrinkage temperature in aqueous medium

  2. Difference between two species of emu hides a test for lepton flavour violation

    Energy Technology Data Exchange (ETDEWEB)

    Lester, Christopher G.; Brunt, Benjamin H. [University of Cambridge, Department of Physics, Cavendish Laboratory,JJ Thomson Avenue, Cambridge, CB3 0HE (United Kingdom)

    2017-03-28

    We argue that an LHC measurement of some simple quantities related to the ratio of rates of e{sup +}μ{sup −} to e{sup −}μ{sup +} events is surprisingly sensitive to as-yet unexcluded R-parity violating supersymmetric models with non-zero λ{sub 231}{sup ′} couplings. The search relies upon the approximate lepton universality in the Standard Model, the sign of the charge of the proton, and a collection of favourable detector biases. The proposed search is unusual because: it does not require any of the displaced vertices, hadronic neutralino decay products, or squark/gluino production relied upon by existing LHC RPV searches; it could work in cases in which the only light sparticles were smuons and neutralinos; and it could make a discovery (though not necessarily with optimal significance) without requiring the computation of a leading-order Monte Carlo estimate of any background rate. The LHC has shown no strong hints of post-Higgs physics and so precision Standard Model measurements are becoming ever more important. We argue that in this environment growing profits are to be made from searches that place detector biases and symmetries of the Standard Model at their core — searches based around ‘controls’ rather than around signals.

  3. Hiding in plain sight: Jung, astrology, and the psychology of the unconscious.

    Science.gov (United States)

    Buck, Stephanie

    2018-04-01

    Astrology was a lifelong interest for C.G. Jung and an important aid in his formulation of psyche and psychic process. Archetypally configured, astrology provided Jung an objective means to a fuller understanding of the analysand's true nature and unique individuation journey. Jung credits astrology with helping to unlock the mystery of alchemy and in so doing providing the symbol language necessary for deciphering the historically remote cosmology of Gnosticism. Astrology also aided Jung's work on synchronicity. Despite astrology's worth to Jung's development of analytical psychology, its fundamental role in guiding his discoveries is all but absent from historical notice. The astrological natal chart seems rarely used clinically, and many clinicians seem unaware of its value as a dynamic diagram of the personality and the potentialities within which nature and nurture foster and/or discourage for individual growth and development over the lifespan. This paper charts Jung's interest in astrology and suggests why his great regard for it and other paranormal or occult practices remains largely neglected and unknown. © 2018, The Society of Analytical Psychology.

  4. Hiding from swans: optimal burial depth of sago pondweed tubers foraged by Bewick's swans

    NARCIS (Netherlands)

    Santamaría, L.; Rodriguez-Girones, M.A.

    2002-01-01

    1 We used a combination of laboratory and field experiments to test the hypothesis that the burial depth of Potamogeton pectinatus tubers will vary with local sediment type and swan predation pressure. 2 In the field, mortality due to predation by swans decreased linearly with burial depth (from 100

  5. Steganalytic methods for the detection of histogram shifting data-hiding schemes

    OpenAIRE

    Lerch Hostalot, Daniel

    2011-01-01

    In this paper, some steganalytic techniques designed to detect the existence of hidden messages using histogram shifting methods are presented. Firstly, some techniques to identify specific methods of histogram shifting, based on visible marks on the histogram or abnormal statistical distributions are suggested. Then, we present a general technique capable of detecting all histogram shifting techniques analyzed. This technique is based on the effect of histogram shifting methods on the "volat...

  6. Mammary prostheses may hide breast cancer. Silicon implants and cancer diagnosis

    Energy Technology Data Exchange (ETDEWEB)

    Heywang, S H

    1987-10-30

    Mammoplasty with silicon implants is risky: In women wearing protheses of this type, carcinomas of the breast may be diagnosed in a more advanced stage than in women without silicon implants. This is the result of a study by US oncologists and was proved by observation in Grosshadern hospital, Munich. (orig.)

  7. Hidden losses in financial reporting and the manner of hiding case Serbia: Part two

    Directory of Open Access Journals (Sweden)

    Kaluđerović Nenad

    2016-01-01

    Full Text Available There has always been a dilemma whether financial statements are a reflection of the real situation. When financial statements are subject to various conveniences in order to be presented according to the wish of the purchaser, it leads us to the dilemma when and how this happens. This thesis deals with the attempt to start to solve the dilemmas where and when manipulative actions in financial reporting occur. We have carried out researches on selected samples of money losing companies for the period from 2010 to 2013, on the example of financial indicators of the companies which operated in Serbia. Detection of manipulations by means of which loss is hidden in financial statements is very important for the state economy. Under these conditions, development of an adequate method in this area is limited with the international standards of financial reporting. Numerous qualitative and quantitative methods have been used for evaluation of the real and objective components of losses in order to reflect the level of losses in the economy much better. However, in our conditions, there is an universally accepted method which can foresee and evaluate all events and actions that detect hidden losses in financial statements. This thesis presents methods of evaluation (quantitative and qualitative data mining and how they may be applied in detection of hidden losses in financial statements, by trying to identify a combination of methods which satisfies real needs of a certain task best.

  8. Duty and dilemma: Perioperative nurses hiding an objection to participate in organ procurement surgery.

    Science.gov (United States)

    Smith, Zaneta

    2017-07-01

    Perioperative nurses assist in organ procurement surgery; however, there is a dearth of information of how they encounter making conscientious objection requests or refusals to participate in organ procurement surgery. Organ procurement surgical procedures can present to the operating room ad hoc and can catch a nurse who may not desire to participate by surprise with little opportunity to refuse as a result of staffing, skill mix or organizational work demands. This paper that stems from a larger doctoral research study exploring the experiences of perioperative nurses participating in multi-organ procurement surgery used a grounded theory method to develop a substantive theory of the nurses' experiences. This current paper aimed to highlight the experiences of perioperative nurses when confronted with expressing a conscientious objection towards their participation in these procedures. A number of organizational and cultural barriers within the healthcare organization were seen to hamper their ability in expressing a conscience-based refusal, which lead to their reluctant participation. Perioperative nurses must feel safe to express a conscientious objection towards these types of surgical procedures and feel supported in doing so by their respective hospital organizations and not be forced to participate unwillingly. © 2016 John Wiley & Sons Ltd.

  9. Hiding an elephant: heavy sterile neutrino with large mixing angle does not contradict cosmology

    Energy Technology Data Exchange (ETDEWEB)

    Bezrukov, F. [The University of Manchester, School of Physics and Astronomy, Oxford Road, Manchester M13 9PL (United Kingdom); Chudaykin, A.; Gorbunov, D., E-mail: Fedor.Bezrukov@manchester.ac.uk, E-mail: chudy@ms2.inr.ac.ru, E-mail: gorby@ms2.inr.ac.ru [Institute for Nuclear Research of the Russian Academy of Sciences, 60th October Anniversary prospect 7a, Moscow 117312 (Russian Federation)

    2017-06-01

    We study a model of a keV-scale sterile neutrino with a relatively large mixing with the Standard Model sector. Usual considerations predict active generation of such particles in the early Universe, which leads to constraints from the total Dark Matter density and absence of X-ray signal from sterile neutrino decay. These bounds together may deem any attempt of creation of the keV scale sterile neutrino in the laboratory unfeasible. We argue that for models with a hidden sector coupled to the sterile neutrino these bounds can be evaded, opening new perspectives for the direct studies at neutrino experiments such as Troitsk ν-mass and KATRIN. We estimate the generation of sterile neutrinos in scenarios with the hidden sector dynamics keeping the sterile neutrinos either massless or superheavy in the early Universe. In both cases the generation by oscillations from active neutrinos in plasma is suppressed.

  10. Hiding data selected topics : Rudolf Ahlswede’s lectures on information theory 3

    CERN Document Server

    Althöfer, Ingo; Deppe, Christian; Tamm, Ulrich

    2016-01-01

    Devoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon’s historical work on secrecy systems is detailed, followed by an introduction to an information-theoretic model of wiretap channels, and such important concepts as homophonic coding and authentication. Once the theoretical arguments have been presented, comprehensive technical details of AES are given. Furthermore, a short introduction to the history of public-key cryptology, RSA and El Gamal cryptosystems is provided, followed by a look at the basic theory of elliptic curves, and algorithms for efficient addition in elliptic curves. Lastly, the important topic of “oblivious transfer” is discussed, which is strongly conne...

  11. Hiding in Fresh Fruits and Vegetables: Opportunistic Pathogens May Cross Geographical Barriers

    Directory of Open Access Journals (Sweden)

    Zahra S. Al-Kharousi

    2016-01-01

    Full Text Available Different microbial groups of the microbiome of fresh produce can have diverse effects on human health. This study was aimed at identifying some microbial communities of fresh produce by analyzing 105 samples of imported fresh fruits and vegetables originated from different countries in the world including local samples (Oman for aerobic plate count and the counts of Enterobacteriaceae, Enterococcus, and Staphylococcus aureus. The isolated bacteria were identified by molecular (PCR and biochemical methods (VITEK 2. Enterobacteriaceae occurred in 60% of fruits and 91% of vegetables. Enterococcus was isolated from 20% of fruits and 42% of vegetables. E. coli and S. aureus were isolated from 22% and 7% of vegetables, respectively. Ninety-seven bacteria comprising 21 species were similarly identified by VITEK 2 and PCR to species level. E. coli, Klebsiella pneumoniae, Enterococcus casseliflavus, and Enterobacter cloacae were the most abundant species; many are known as opportunistic pathogens which may raise concern to improve the microbial quality of fresh produce. Phylogenetic trees showed no relationship between clustering of the isolates based on the 16S rRNA gene and the original countries of fresh produce. Intercountry passage of opportunistic pathogens in fresh produce cannot be ruled out, which requires better management.

  12. Hiding in Fresh Fruits and Vegetables: Opportunistic Pathogens May Cross Geographical Barriers

    OpenAIRE

    Al-Kharousi, Zahra S.; Guizani, Nejib; Al-Sadi, Abdullah M.; Al-Bulushi, Ismail M.; Shaharoona, Baby

    2016-01-01

    Different microbial groups of the microbiome of fresh produce can have diverse effects on human health. This study was aimed at identifying some microbial communities of fresh produce by analyzing 105 samples of imported fresh fruits and vegetables originated from different countries in the world including local samples (Oman) for aerobic plate count and the counts of Enterobacteriaceae, Enterococcus, and Staphylococcus aureus. The isolated bacteria were identified by molecular (PCR) and bioc...

  13. CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Cemal Kocak

    2017-03-01

    Full Text Available Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio and SSIM (Structural Similarity Index. In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD method, Simulated Annealing (SA Algorithm and Mix column transform based on irreducible polynomial mathematics methods.

  14. Emperors in hiding: when ice-breakers and satellites complement each other in Antarctic exploration.

    Directory of Open Access Journals (Sweden)

    André Ancel

    Full Text Available Evaluating the demographic trends of marine top predators is critical to understanding the processes involved in the ongoing rapid changes in Antarctic ecosystems. However, the remoteness and logistical complexity of operating in Antarctica, especially during winter, make such an assessment difficult. Satellite imaging is increasingly recognised as a valuable method for remote animal population monitoring, yet its accuracy and reliability are still to be fully evaluated. We report here the first ground visit of an emperor penguin colony first discovered by satellite, but also the discovery of a second one not indicated by satellite survey at that time. Several successive remote surveys in this coastal region of East Antarctica, both before and after sudden local changes, had indeed only identified one colony. These two colonies (with a total of ca. 7,400 breeding pairs are located near the Mertz Glacier in an area that underwent tremendous habitat change after the glacier tongue broke off in February 2010. Our findings therefore suggest that a satellite survey, although offering a major advance since it allows a global imaging of emperor penguin colonies, may miss certain colony locations when challenged by certain features of polar ecosystems, such as snow cover, evolving ice topology, and rapidly changing habitat. Moreover our survey shows that this large seabird has considerable potential for rapid adaptation to sudden habitat loss, as the colony detected in 2009 may have moved and settled on new breeding grounds. Overall, the ability of emperor penguin colonies to relocate following habitat modification underlines the continued need for a mix of remote sensing and field surveys (aerial photography and ground counts, especially in the less-frequented parts of Antarctica, to gain reliable knowledge about the population demography and dynamics of this flagship species of the Antarctic ecosystem.

  15. Hide and Seek. Roads, Lookouts and Directional Visibility Cones in Central Anatolia

    Directory of Open Access Journals (Sweden)

    Turchetto Jacopo

    2017-01-01

    Full Text Available In Cappadocia (central Turkey, routes that were only of a secondary importance during the Roman age acquired a new relevance starting from the end of the 7th century. In this framework, to what extent did the archaeological evidence match the picture recalled by the written sources? To address this question, the relationship between movement and visibility was considered and view shed analyses were conducted from targeted and strategic spots set along the routes considered. This allowed to better understand the role and the different functions of those axes crossing Cappadocia, and to evaluate the Byzantine/Arab military strategies in central Anatolia.

  16. Analysis of Multiple Data Hiding Combined Coloured Visual Cryptography and LSB

    Science.gov (United States)

    Maulana, Halim; Rahman Syahputra, Edy

    2017-12-01

    Currently the level of data security becoming a major factor in data transfer. As we know every process of sending data through any medium the risk of that data gets hacked will still be there. Some techniques for securing data such as steganography and cryptography also often used as a solution for securing data. But it does not last long because it has been found out the weaknesses of the algorithm so that the security be assured. So, in need of variety of new algorithms to be able to protect the data so that data security can be guaranteed. In this study tries to combine two visual algorithms that steganography and cryptography. Where in these experiments will try to secure two pieces of data type that is the type of image data and text data where both the data is regarded as a message so to obtain the correct information receiver should get that two types of data.

  17. Emperors in hiding: when ice-breakers and satellites complement each other in Antarctic exploration.

    Science.gov (United States)

    Ancel, André; Cristofari, Robin; Fretwell, Peter T; Trathan, Phil N; Wienecke, Barbara; Boureau, Matthieu; Morinay, Jennifer; Blanc, Stéphane; Le Maho, Yvon; Le Bohec, Céline

    2014-01-01

    Evaluating the demographic trends of marine top predators is critical to understanding the processes involved in the ongoing rapid changes in Antarctic ecosystems. However, the remoteness and logistical complexity of operating in Antarctica, especially during winter, make such an assessment difficult. Satellite imaging is increasingly recognised as a valuable method for remote animal population monitoring, yet its accuracy and reliability are still to be fully evaluated. We report here the first ground visit of an emperor penguin colony first discovered by satellite, but also the discovery of a second one not indicated by satellite survey at that time. Several successive remote surveys in this coastal region of East Antarctica, both before and after sudden local changes, had indeed only identified one colony. These two colonies (with a total of ca. 7,400 breeding pairs) are located near the Mertz Glacier in an area that underwent tremendous habitat change after the glacier tongue broke off in February 2010. Our findings therefore suggest that a satellite survey, although offering a major advance since it allows a global imaging of emperor penguin colonies, may miss certain colony locations when challenged by certain features of polar ecosystems, such as snow cover, evolving ice topology, and rapidly changing habitat. Moreover our survey shows that this large seabird has considerable potential for rapid adaptation to sudden habitat loss, as the colony detected in 2009 may have moved and settled on new breeding grounds. Overall, the ability of emperor penguin colonies to relocate following habitat modification underlines the continued need for a mix of remote sensing and field surveys (aerial photography and ground counts), especially in the less-frequented parts of Antarctica, to gain reliable knowledge about the population demography and dynamics of this flagship species of the Antarctic ecosystem.

  18. Endemic zoonoses in the tropics: a public health problem hiding in plain sight.

    Science.gov (United States)

    Halliday, Jo E B; Allan, Kathryn J; Ekwem, Divine; Cleaveland, Sarah; Kazwala, Rudovick R; Crump, John A

    2015-02-28

    Zoonotic diseases are a significant burden on animal and human health, particularly in developing countries. Despite recognition of this fact, endemic zoonoses often remain undiagnosed in people, instead being mistaken for febrile diseases such as malaria. Here, as part of Veterinary Record's ongoing series of articles on One Health, a multidisciplinary team of researchers from Scotland, Tanzania and New Zealand argues that a One Health approach is needed to effectively combat these diseases. British Veterinary Association.

  19. You can hide but you have to run: direct detection with vector mediators

    Energy Technology Data Exchange (ETDEWEB)

    D’Eramo, Francesco [Department of Physics, University of California Santa Cruz,1156 High St., Santa Cruz, CA 95064 (United States); Santa Cruz Institute for Particle Physics,1156 High St., Santa Cruz, CA 95064 (United States); Kavanagh, Bradley J. [Laboratoire de Physique Théorique et Hautes Energies, CNRS, UMR 7589,4 Place Jussieu, F-75252, Paris (France); Institut de Physique Théorique, Université Paris Saclay, CNRS, CEA,Orme des Merisiers batiment 774, F-91191 Gif-sur-Yvette Cedex (France); Panci, Paolo [Institut d’Astrophysique de Paris, UMR 7095 CNRS, Université Pierre et Marie Curie,98 bis Boulevard Arago, Paris 75014 (France)

    2016-08-18

    We study direct detection in simplified models of Dark Matter (DM) in which interactions with Standard Model (SM) fermions are mediated by a heavy vector boson. We consider fully general, gauge-invariant couplings between the SM, the mediator and both scalar and fermion DM. We account for the evolution of the couplings between the energy scale of the mediator mass and the nuclear energy scale. This running arises from virtual effects of SM particles and its inclusion is not optional. We compare bounds on the mediator mass from direct detection experiments with and without accounting for the running. In some cases the inclusion of these effects changes the bounds by several orders of magnitude, as a consequence of operator mixing which generates new interactions at low energy. We also highlight the importance of these effects when translating LHC limits on the mediator mass into bounds on the direct detection cross section. For an axial-vector mediator, the running can alter the derived bounds on the spin-dependent DM-nucleon cross section by a factor of two or more. Finally, we provide tools to facilitate the inclusion of these effects in future studies: general approximate expressions for the low energy couplings and a public code runDM to evolve the couplings between arbitrary energy scales.

  20. Hiding in Plain Sight: A Case for Cryptic Metapopulations in Brook Trout (Salvelinus fontinalis.

    Directory of Open Access Journals (Sweden)

    David C Kazyak

    Full Text Available A fundamental issue in the management and conservation of biodiversity is how to define a population. Spatially contiguous fish occupying a stream network have often been considered to represent a single, homogenous population. However, they may also represent multiple discrete populations, a single population with genetic isolation-by-distance, or a metapopulation. We used microsatellite DNA and a large-scale mark-recapture study to assess population structure in a spatially contiguous sample of Brook Trout (Salvelinus fontinalis, a species of conservation concern. We found evidence for limited genetic exchange across small spatial scales and in the absence of barriers to physical movement. Mark-recapture and stationary passive integrated transponder antenna records demonstrated that fish from two tributaries very seldom moved into the opposite tributary, but movements between the tributaries and mainstem were more common. Using Bayesian genetic clustering, we identified two genetic groups that exhibited significantly different growth rates over three years of study, yet survival rates were very similar. Our study highlights the importance of considering the possibility of multiple genetically distinct populations occurring within spatially contiguous habitats, and suggests the existence of a cryptic metapopulation: a spatially continuous distribution of organisms exhibiting metapopulation-like behaviors.

  1. How the leopard hides its spots: ASIP mutations and melanism in wild cats.

    Directory of Open Access Journals (Sweden)

    Alexsandra Schneider

    Full Text Available The occurrence of melanism (darkening of the background coloration is documented in 13 felid species, in some cases reaching high frequencies at the population level. Recent analyses have indicated that it arose multiple times in the Felidae, with three different species exhibiting unique mutations associated with this trait. The causative mutations in the remaining species have so far not been identified, precluding a broader assessment of the evolutionary dynamics of melanism in the Felidae. Among these, the leopard (Panthera pardus is a particularly important target for research, given the iconic status of the 'black panther' and the extremely high frequency of melanism observed in some Asian populations. Another felid species from the same region, the Asian golden cat (Pardofelis temminckii, also exhibits frequent records of melanism in some areas. We have sequenced the coding region of the Agouti Signaling Protein (ASIP gene in multiple leopard and Asian golden cat individuals, and identified distinct mutations strongly associated with melanism in each of them. The single nucleotide polymorphism (SNP detected among the P. pardus individuals was caused by a nonsense mutation predicted to completely ablate ASIP function. A different SNP was identified in P. temminckii, causing a predicted amino acid change that should also induce loss of function. Our results reveal two additional cases of species-specific mutations implicated in melanism in the Felidae, and indicate that ASIP mutations may play an important role in naturally-occurring coloration polymorphism.

  2. Human vision-based algorithm to hide defective pixels in LCDs

    Science.gov (United States)

    Kimpe, Tom; Coulier, Stefaan; Van Hoey, Gert

    2006-02-01

    Producing displays without pixel defects or repairing defective pixels is technically not possible at this moment. This paper presents a new approach to solve this problem: defects are made invisible for the user by using image processing algorithms based on characteristics of the human eye. The performance of this new algorithm has been evaluated using two different methods. First of all the theoretical response of the human eye was analyzed on a series of images and this before and after applying the defective pixel compensation algorithm. These results show that indeed it is possible to mask a defective pixel. A second method was to perform a psycho-visual test where users were asked whether or not a defective pixel could be perceived. The results of these user tests also confirm the value of the new algorithm. Our "defective pixel correction" algorithm can be implemented very efficiently and cost-effectively as pixel-dataprocessing algorithms inside the display in for instance an FPGA, a DSP or a microprocessor. The described techniques are also valid for both monochrome and color displays ranging from high-quality medical displays to consumer LCDTV applications.

  3. Hiding or hospitalising? On dilemmas of pregnancy management in East Cameroon.

    Science.gov (United States)

    van der Sijpt, Erica

    2013-01-01

    Current international debates and policies on safe motherhood mainly propose biomedical interventions to reduce the risks during pregnancy and delivery. Yet, the conceptualisations of risk that underlie this framework may not correspond with local perceptions of reproductive dangers; consequently, hospital services may remain underutilised. Inspired by a growing body of anthropological literature exploring local fertility-related fears, and drawing on 15 months of fieldwork, this paper describes ideas about risky reproduction and practices of pregnancy protection in a Cameroonian village. It shows that social and supernatural threats to fertility are deemed more significant than the physical threats of fertility stressed at the (inter)national level. To protect their pregnancies from those social and supernatural influences, however, women take very physical measures. It is in this respect that biomedical interventions, physical in their very nature, do connect to local methods of pregnancy management. Furthermore, some pregnant women purposefully deploy hospital care in an attempt to reduce relational uncertainties. Explicit attention to the intersections of the social and the physical, and of the supernatural and the biomedical, furthers anthropological knowledge on fertility management and offers a starting point for more culturally sensitive safe motherhood interventions.

  4. Sarcopenia in hiding: The risk and consequence of underestimating muscle dysfunction in nonalcoholic steatohepatitis.

    Science.gov (United States)

    Bhanji, Rahima A; Narayanan, Praveena; Allen, Alina M; Malhi, Harmeet; Watt, Kymberly D

    2017-12-01

    Nonalcoholic fatty liver disease (NAFLD) is the most common cause of chronic liver disease worldwide. Up to one third of individuals with NAFLD will develop nonalcoholic steatohepatitis (NASH), which is associated with progression to cirrhosis and is rapidly becoming the leading indication for liver transplantation. Sarcopenia is defined as a progressive and generalized loss of skeletal muscle mass, strength, and function. It is observed in up to 60% of patients with end-stage liver disease and portends a poor prognosis. Recent studies have shown that sarcopenia is a novel risk factor for developing NAFLD. Pathophysiological mechanisms relating sarcopenia and NASH may include insulin resistance (IR) and increased inflammation. IR leads to accumulation of triglycerides in both muscle tissue and the liver. It also exacerbates proteolysis and leads to muscle depletion. Chronic inflammation leads to liver injury and progression of fibrosis. The inflammatory milieu also stimulates protein catabolism. Viewing skeletal muscle as an endocrine organ that secretes various salutary myokines may help us understand its role in the development of steatosis. A better understanding of the pathophysiology will aid in developing physical and pharmacological therapeutic interventions. In this review, we will explore the complex inter-relationships between sarcopenia and NASH. We will discuss the impact of sarcopenia in patients with NASH and therapeutic options for the management of sarcopenia. (Hepatology 2017;66:2055-2065). © 2017 by the American Association for the Study of Liver Diseases.

  5. Hiding in plain sight: Recognition and resistance in recent queer artists’ moving image

    OpenAIRE

    Guy, Laura

    2016-01-01

    In lieu of an abstract, here is the first paragraph of this article: Pauline Boudry and Renate Lorenz’s film Opaque (2014) opens with a monologue that establishes its speaker as a member of an unspecified underground faction. Concealed by a black curtain that hangs from a frame erected in the bluish depths of a disused swimming pool, at first all that we see of this fugitive is a vague outline. When the curtain is eventually pulled back, tugged slowly by a disembodied arm, it reveals another ...

  6. HIDING IN THE SHADOWS: SEARCHING FOR PLANETS IN PRE-TRANSITIONAL AND TRANSITIONAL DISKS

    International Nuclear Information System (INIS)

    Dobinson, Jack; Leinhardt, Zoë M.; Dodson-Robinson, Sarah E.; Teanby, Nick A.

    2013-01-01

    Transitional and pre-transitional disks can be explained by a number of mechanisms. This work aims to find a single observationally detectable marker that would imply a planetary origin for the gap and, therefore, indirectly indicate the presence of a young planet. N-body simulations were conducted to investigate the effect of an embedded planet of one Jupiter mass on the production of instantaneous collisional dust derived from a background planetesimal disk. Our new model allows us to predict the dust distribution and resulting observable markers with greater accuracy than previous works. Dynamical influences from a planet on a circular orbit are shown to enhance dust production in the disk interior and exterior to the planet orbit, while removing planetesimals from the orbit itself, creating a clearly defined gap. In the case of an eccentric planet, the gap opened by the planet is not as clear as the circular case, but there is a detectable asymmetry in the dust disk

  7. What are you hiding? : The underlying and contributing mechanisms of physiological memory detection

    NARCIS (Netherlands)

    klein Selle, N.

    2017-01-01

    The notion that physiological and behavioral measures can be used to detect concealed memories is intriguing, to say the least. Although years of research on the Concealed Information Test (CIT) have proven the validity of this method, it also raised new questions. The present dissertation focused

  8. Playing hide-and-seek: detecting the manipulation of android timestamps

    CSIR Research Space (South Africa)

    Pieterse, H

    2015-08-01

    Full Text Available Mobile technology continues to evolve in the 21st century, providing users with improved capabilities and advance functionality. The current leader of this evolution is Android, a mobile operating system that continuously elevates existing features...

  9. To run or hide?: escape behaviour in a cryptic African snake | Maritz ...

    African Journals Online (AJOL)

    Optimal escape theory predicts that escape behaviour of an organism is best understood in terms of costs and benefits of escaping relative to risk of predation. However, risk of predation facing an organism is dependent on various biotic and abiotic factors. In order to better understand escape behaviour of an African snake, ...

  10. 16 CFR 1631.61 - Hide carpets and rugs-alternative washing procedure.

    Science.gov (United States)

    2010-01-01

    ... normally used for that type of carpet or rug in service. (b) On February 10, 1972 (37 FR 3010) the Federal... 2″ in diameter and 9″ long composed of nonabsorbent material such as glass or plastic. (4) Select... remove all excess water and wrap around the operating applicator. (7) Immediately, with light pressure...

  11. 16 CFR 1630.61 - Hide carpets and rugs-alternative washing procedure.

    Science.gov (United States)

    2010-01-01

    ... normally used for that type of carpet or rug in service. (b) On February 10, 1972 (37 FR 3010) the Federal... 2″ in diameter and 9″ long composed of nonabsorbant material such as glass or plastic. (4) Select... remove all excess water and wrap around the operating applicator. (7) Immediately with light pressure...

  12. (Re)Searching Culture in Foreign Language Textbooks, or the Politics of Hide and Seek

    Science.gov (United States)

    Canale, Germán

    2016-01-01

    Textbooks are curriculum artefacts that embody particular ideologies and legitimise specific types of knowledge [Apple, M. W. (1982). "Education and power." Boston: Routledge & Kegan Paul; Apple, M. W., & Christian-Smith, L. K. (1991). "The politics of the textbook." In M. W. Apple & L. K. Christian-Smith (Eds.),…

  13. Hiding the evidence: two strategies for innate immune evasion by hemorrhagic fever viruses.

    Science.gov (United States)

    Hastie, Kathryn M; Bale, Shridhar; Kimberlin, Christopher R; Saphire, Erica Ollmann

    2012-04-01

    The innate immune system is one of the first lines of defense against invading pathogens. Pathogens have, in turn, evolved different strategies to counteract these responses. Recent studies have illuminated how the hemorrhagic fever viruses Ebola and Lassa fever prevent host sensing of double-stranded RNA (dsRNA), a key hallmark of viral infection. The ebolavirus protein VP35 adopts a unique bimodal configuration to mask key cellular recognition sites on dsRNA. Conversely, the Lassa fever virus nucleoprotein actually digests the dsRNA signature. Collectively, these structural and functional studies shed new light on the mechanisms of pathogenesis of these viruses and provide new targets for therapeutic intervention. Copyright © 2012. Published by Elsevier B.V.

  14. A Rogue's Gallery of Academic Racialists: Racism Hiding behind a Ph.D.

    Science.gov (United States)

    Journal of Blacks in Higher Education, 2001

    2001-01-01

    Presents a list of academics and scientists who attempt to prove inherent racial differences. Some of their theories suggest that: blacks evolved in areas of the world where intelligence was not necessary for survival; lower intelligence among blacks produces a propensity to commit crimes; and the high black birth rate is causing the human race to…

  15. Hide and seek: a comparative autoradiographic in vitro investigation of the adenosine A3 receptor

    Energy Technology Data Exchange (ETDEWEB)

    Haeusler, D.; Fuchshuber, F.; Girschele, F.; Hacker, M.; Wadsak, W.; Mitterhauser, Markus [Medical University of Vienna, Department of Biomedical Imaging and Image-guided Therapy, Vienna (Austria); Grassinger, L. [University of Applied Sciences Wiener Neustadt, Department of Biomedical Analytics, Wiener Neustadt (Austria); Hoerleinsberger, W.J. [Medical University of Vienna, Department of Biomedical Imaging and Image-guided Therapy, Vienna (Austria); University of Vienna, Cognitive Science Research Platform, Vienna (Austria); Hoeftberger, R.; Leisser, I. [Medical University of Vienna, Institute of Neurology, Vienna (Austria); Shanab, K.; Spreitzer, H. [University of Vienna, Department of Drug and Natural Product Synthesis, Vienna (Austria); Gerdenitsch, W. [Medical University of Vienna, Institute of Biomedicinal Research, Vienna (Austria)

    2015-05-01

    Since the adenosine A3 receptor (A3R) is considered to be of high clinical importance in the diagnosis and treatment of ischaemic conditions (heart and brain), glaucoma, asthma, arthritis, cancer and inflammation, a suitable and selective A3R PET tracer such as [{sup 18}F]FE rate at SUPPY would be of high clinical value for clinicians as well as patients. A3R was discovered in the late 1990s, but there is still little known regarding its distribution in the CNS and periphery. Hence, in autoradiographic experiments the distribution of A3R in human brain and rat tissues was investigated and the specific binding of the A3R antagonist FE rate at SUPPY and MRS1523 compared. Immunohistochemical staining (IHC) experiments were also performed to validate the autoradiographic findings. For autoradiographic competition experiments human post-mortem brain and rat tissues were incubated with [{sup 125}I]AB-MECA and highly selective compounds to block the other adenosine receptor subtypes. Additionally, IHC was performed with an A3 antibody. Specific A3R binding of MRS1523 and FE rate at SUPPY was found in all rat peripheral tissues examined with the highest amounts in the spleen (44.0 % and 46.4 %), lung (44.5 % and 45.0 %), heart (39.9 % and 42.9 %) and testes (27.4 % and 29.5 %, respectively). Low amounts of A3R were found in rat brain tissues (5.9 % and 5.6 %, respectively) and human brain tissues (thalamus 8.0 % and 9.1 %, putamen 7.8 % and 8.2 %, cerebellum 6.0 % and 7.8 %, hippocampus 5.7 % and 5.6 %, caudate nucleus 4.9 % and 6.4 %, cortex 4.9 % and 6.3 %, respectively). The outcome of the A3 antibody staining experiments complemented the results of the autoradiographic experiments. The presence of A3R protein was verified in central and peripheral tissues by autoradiography and IHC. The specificity and selectivity of FE rate at SUPPY was confirmed by direct comparison with MRS1523, providing further evidence that [{sup 18}F]FE rate at SUPPY may be a suitable A3 PET tracer for use in humans. (orig.)

  16. AP-IO: asynchronous pipeline I/O for hiding periodic output cost in CFD simulation.

    Science.gov (United States)

    Xiaoguang, Ren; Xinhai, Xu

    2014-01-01

    Computational fluid dynamics (CFD) simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO) optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  17. AP-IO: Asynchronous Pipeline I/O for Hiding Periodic Output Cost in CFD Simulation

    Directory of Open Access Journals (Sweden)

    Ren Xiaoguang

    2014-01-01

    Full Text Available Computational fluid dynamics (CFD simulation often needs to periodically output intermediate results to files in the form of snapshots for visualization or restart, which seriously impacts the performance. In this paper, we present asynchronous pipeline I/O (AP-IO optimization scheme for the periodically snapshot output on the basis of asynchronous I/O and CFD application characteristics. In AP-IO, dedicated background I/O processes or threads are in charge of handling the file write in pipeline mode, therefore the write overhead can be hidden with more calculation than classic asynchronous I/O. We design the framework of AP-IO and implement it in OpenFOAM, providing CFD users with a user-friendly interface. Experimental results on the Tianhe-2 supercomputer demonstrate that AP-IO can achieve a good optimization effect for the periodical snapshot output in CFD application, and the effect is especially better for massively parallel CFD simulations, which can reduce the total execution time up to about 40%.

  18. No place to hide? The ethics and analytics of tracking mobility using mobile phone data

    NARCIS (Netherlands)

    Taylor, L.

    2016-01-01

    This paper examines the ethical and methodological problems with tracking human mobility using data from mobile phones, focusing on research involving low- and middle-income countries. Such datasets are becoming accessible to an increasingly broad community of researchers and data scientists, with a

  19. Hiding of the conserved (anti)baryonic charge into black holes

    International Nuclear Information System (INIS)

    Dolgov, A.D.

    1980-01-01

    The problem of the baryon asymmetry of the Universe is considered. It is suggested that the baryon asymmetry of the Universe is generated by black hole evaporation in a specific mechanism proposed by Zeldovich. Net amount of baryons evaporated by a black hole is shown can be unequal to that of antibaryons, even if the baryon charge is microscopically conserved. It is concluded that the discussed mechanism can provide the observed baryon assymetry of the Universe if primary black holes with the mass M=10sup(4+-2)Msub(P), where Msub(P)=10sup(19) GeV is the Planck mass, give noticeable contribution into the total energy density of the Universe

  20. The Advantage of Hiding Both Hands : Foreign Exchange Intervention, Ambiguity and Private Information

    NARCIS (Netherlands)

    Eijffinger, S.C.W.; Verhagen, W.H.

    1997-01-01

    This paper analyzes a dynamic exchange rate policy game in which the central bank has private information about its short-term exchange rate target, on the one hand, and in which the market is faced with a certain degree of ambiguity concerning the actual intervention volume, on the other.

  1. Can R-parity violation hide vanilla supersymmetry at the LHC?

    Energy Technology Data Exchange (ETDEWEB)

    Asano, Masaki [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Rolbiecki, Krzysztof; Sakurai, Kazuki [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2012-09-15

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  2. Journal of Genetics | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    An orphan gyrB in the Mycobacterium smegmatis genome uncovered by comparative genomics · P. Jain V. Nagaraja · More Details Abstract Fulltext PDF. DNA gyrase is an essential topoisomerase found in all bacteria. It is encoded by gyrB and gyrA genes. These genes are organized differently in different bacteria.

  3. Pawpaw

    African Journals Online (AJOL)

    DR. MISS BLESSING

    jam, marmalade, canned fruit balls or cubes in syrup, crystallized fruit, candies ... preparation of food as meat tenderizer and is of industrial importance. ..... Horticulturae, 851: 527 – 532. Ganjewala, D., Nagaraja, C., Nayak, M.R. and. Devi, S.A. (2010). Effects of sodium nitroprusside on activity of acid and alkaline invertase in.

  4. New Fellows and Honorary Fellow

    Indian Academy of Sciences (India)

    Home; Fellowship. Fellow Profile. Elected: 1935 Section: Chemistry. Rao, Argula Nagaraja. Date of birth: 15 November 1906. Specialization: Sugar Technology. YouTube; Twitter; Facebook; Blog. Academy News. IAS Logo. 29th Mid-year meeting. Posted on 19 January 2018. The 29th Mid-year meeting of the Academy will ...

  5. Nonstandard gravitational waves imply gravitational slip: on the difficulty of partially hiding new gravitational degrees of freedom

    Czech Academy of Sciences Publication Activity Database

    Sawicki, Ignacy; Saltas, I.D.; Motta, M.; Amendola, L.; Kunz, M.

    2017-01-01

    Roč. 95, č. 8 (2017), s. 1-16, č. článku 083520. ISSN 2470-0010 R&D Projects: GA MŠk EF15_003/0000437 Grant - others:OP VVV - CoGraDS(XE) CZ.02.1.01/0.0/0.0/15_003/0000437 Institutional support: RVO:68378271 Keywords : modified gravity * gravitational waves * cosmology * large scale structure Subject RIV: BN - Astronomy, Celestial Mechanics, Astrophysics OBOR OECD: Astronomy (including astrophysics,space science) Impact factor: 4.568, year: 2016

  6. Playing Hide and Seek: How Glycosylation of the Influenza Virus Hemagglutinin Can Modulate the Immune Response to Infection

    Directory of Open Access Journals (Sweden)

    Michelle D. Tate

    2014-03-01

    Full Text Available Seasonal influenza A viruses (IAV originate from pandemic IAV and have undergone changes in antigenic structure, including addition of glycans to the hemagglutinin (HA glycoprotein. The viral HA is the major target recognized by neutralizing antibodies and glycans have been proposed to shield antigenic sites on HA, thereby promoting virus survival in the face of widespread vaccination and/or infection. However, addition of glycans can also interfere with the receptor binding properties of HA and this must be compensated for by additional mutations, creating a fitness barrier to accumulation of glycosylation sites. In addition, glycans on HA are also recognized by phylogenetically ancient lectins of the innate immune system and the benefit provided by evasion of humoral immunity is balanced by attenuation of infection. Therefore, a fine balance must exist regarding the optimal pattern of HA glycosylation to offset competing pressures associated with recognition by innate defenses, evasion of humoral immunity and maintenance of virus fitness. In this review, we examine HA glycosylation patterns of IAV associated with pandemic and seasonal influenza and discuss recent advancements in our understanding of interactions between IAV glycans and components of innate and adaptive immunity.

  7. Playing Hide and Seek: How Glycosylation of the Influenza Virus Hemagglutinin Can Modulate the Immune Response to Infection

    Science.gov (United States)

    Tate, Michelle D.; Job, Emma R.; Deng, Yi-Mo; Gunalan, Vithiagaran; Maurer-Stroh, Sebastian; Reading, Patrick C.

    2014-01-01

    Seasonal influenza A viruses (IAV) originate from pandemic IAV and have undergone changes in antigenic structure, including addition of glycans to the hemagglutinin (HA) glycoprotein. The viral HA is the major target recognized by neutralizing antibodies and glycans have been proposed to shield antigenic sites on HA, thereby promoting virus survival in the face of widespread vaccination and/or infection. However, addition of glycans can also interfere with the receptor binding properties of HA and this must be compensated for by additional mutations, creating a fitness barrier to accumulation of glycosylation sites. In addition, glycans on HA are also recognized by phylogenetically ancient lectins of the innate immune system and the benefit provided by evasion of humoral immunity is balanced by attenuation of infection. Therefore, a fine balance must exist regarding the optimal pattern of HA glycosylation to offset competing pressures associated with recognition by innate defenses, evasion of humoral immunity and maintenance of virus fitness. In this review, we examine HA glycosylation patterns of IAV associated with pandemic and seasonal influenza and discuss recent advancements in our understanding of interactions between IAV glycans and components of innate and adaptive immunity. PMID:24638204

  8. Antimicrobial potential of sophorolipids for anti-acne, anti-dental caries, hide preservation and food safety applications

    Science.gov (United States)

    Sophorolipids (SLs) are microbial glycolipids that can be produced via fermentation in relatively large yields (reportedly as high as 400 g/L under appropriate growth conditions). These versatile molecules have demonstrated usefulness as additives in detergent, cleaner, cosmetic, and stabilizer appl...

  9. Can sea trout Salmo trutta compromise successful eradication of Gyrodactylus salaris by hiding from CFT Legumin (rotenone) treatments?

    DEFF Research Database (Denmark)

    Davidsen, J. G.; Thorstad, E. B.; Baktoft, H.

    2013-01-01

    In this study, 34 anadromous brown trout (sea trout) Salmo trutta were equipped with acoustic transmitters in order to examine whether they performed avoidance behaviour in response to a CFT Legumin (rotenone) treatment in the Norwegian River Vefsna. Migratory behaviour of the S. trutta was monit...

  10. "I Don't Hide My Feelings, Even though I Try To": Insight into Teacher Educator Emotion Display

    Science.gov (United States)

    Hagenauer, Gerda; Volet, Simone E.

    2014-01-01

    This article addresses the issue of teacher educators' emotion display when teaching and interacting with students. Little is known about this phenomenon in higher education generally, and teacher education specifically. An empirical study was conducted to address this gap by investigating teacher educators' views on appropriate and inappropriate…

  11. Lost but can't be neglected: Huge quantities of small microplastics hide in the South China Sea.

    Science.gov (United States)

    Cai, Minggang; He, Haixia; Liu, Mengyang; Li, Siwei; Tang, Guowen; Wang, Weimin; Huang, Peng; Wei, Ge; Lin, Yan; Chen, Bin; Hu, Jiahui; Cen, Zhengnan

    2018-08-15

    Large quantities of microplastics with small particle sizes were found in the South China Sea (SCS). The abundances of microplastics in seawater were 0.045±0.093and 2569±1770particles/m 3 according to the bongo net and pumping sampling methods, respectively. Smaller-size fractions (sizeseas with ocean currents. The distribution characteristics showed that it was mainly controlled by terrestrial input of the Pearl River. This study, as the first report from SCS on microplastics in water for its distribution and influence factors, provided impetus for further research on the transportation fate and the behavior of this emerging pollutant from coastal zone to the open oceans. Copyright © 2018 Elsevier B.V. All rights reserved.

  12. Playing hide and seek with repeats in local and global de novo transcriptome assembly of short RNA-seq reads.

    Science.gov (United States)

    Lima, Leandro; Sinaimeri, Blerina; Sacomoto, Gustavo; Lopez-Maestre, Helene; Marchet, Camille; Miele, Vincent; Sagot, Marie-France; Lacroix, Vincent

    2017-01-01

    The main challenge in de novo genome assembly of DNA-seq data is certainly to deal with repeats that are longer than the reads. In de novo transcriptome assembly of RNA-seq reads, on the other hand, this problem has been underestimated so far. Even though we have fewer and shorter repeated sequences in transcriptomics, they do create ambiguities and confuse assemblers if not addressed properly. Most transcriptome assemblers of short reads are based on de Bruijn graphs (DBG) and have no clear and explicit model for repeats in RNA-seq data, relying instead on heuristics to deal with them. The results of this work are threefold. First, we introduce a formal model for representing high copy-number and low-divergence repeats in RNA-seq data and exploit its properties to infer a combinatorial characteristic of repeat-associated subgraphs. We show that the problem of identifying such subgraphs in a DBG is NP-complete. Second, we show that in the specific case of local assembly of alternative splicing (AS) events, we can implicitly avoid such subgraphs, and we present an efficient algorithm to enumerate AS events that are not included in repeats. Using simulated data, we show that this strategy is significantly more sensitive and precise than the previous version of KisSplice (Sacomoto et al. in WABI, pp 99-111, 1), Trinity (Grabherr et al. in Nat Biotechnol 29(7):644-652, 2), and Oases (Schulz et al. in Bioinformatics 28(8):1086-1092, 3), for the specific task of calling AS events. Third, we turn our focus to full-length transcriptome assembly, and we show that exploring the topology of DBGs can improve de novo transcriptome evaluation methods. Based on the observation that repeats create complicated regions in a DBG, and when assemblers try to traverse these regions, they can infer erroneous transcripts, we propose a measure to flag transcripts traversing such troublesome regions, thereby giving a confidence level for each transcript. The originality of our work when compared to other transcriptome evaluation methods is that we use only the topology of the DBG, and not read nor coverage information. We show that our simple method gives better results than Rsem-Eval (Li et al. in Genome Biol 15(12):553, 4) and TransRate (Smith-Unna et al. in Genome Res 26(8):1134-1144, 5) on both real and simulated datasets for detecting chimeras, and therefore is able to capture assembly errors missed by these methods.

  13. Hiding vegetables to reduce energy density: an effective strategy to increase children's vegetable intake and reduce energy intake.

    Science.gov (United States)

    Spill, Maureen K; Birch, Leann L; Roe, Liane S; Rolls, Barbara J

    2011-09-01

    Strategies are needed to increase children's intake of a variety of vegetables, including vegetables that are not well liked. We investigated whether incorporating puréed vegetables into entrées to reduce the energy density (ED; in kcal/g) affected vegetable and energy intake over 1 d in preschool children. In this crossover study, 3- to 5-y-old children (n = 40) were served all meals and snacks 1 d/wk for 3 wk. Across conditions, entrées at breakfast, lunch, dinner, and evening snack were reduced in ED by increasing the proportion of puréed vegetables. The conditions were 100% ED (standard), 85% ED (tripled vegetable content), and 75% ED (quadrupled vegetable content). Entrées were served with unmanipulated side dishes and snacks, and children were instructed to eat as much as they liked. The daily vegetable intake increased significantly by 52 g (50%) in the 85% ED condition and by 73 g (73%) in the 75% ED condition compared with that in the standard condition (both P daily energy intake decreased by 142 kcal (12%) from the 100% to 75% ED conditions (P daily vegetable intake and decrease the energy intake in young children. This trial was registered at clinicaltrials.gov as NCT01252433.

  14. Biallelic MLH1 SNP cDNA expression or constitutional promoter methylation can hide genomic rearrangements causing Lynch syndrome.

    Science.gov (United States)

    Morak, Monika; Koehler, Udo; Schackert, Hans Konrad; Steinke, Verena; Royer-Pokora, Brigitte; Schulmann, Karsten; Kloor, Matthias; Höchter, Wilhelm; Weingart, Josef; Keiling, Cortina; Massdorf, Trisari; Holinski-Feder, Elke

    2011-08-01

    A positive family history, germline mutations in DNA mismatch repair genes, tumours with high microsatellite instability, and loss of mismatch repair protein expression are the hallmarks of hereditary non-polyposis colorectal cancer (Lynch syndrome). However, in ~10-15% of cases of suspected Lynch syndrome, no disease-causing mechanism can be detected. Oligo array analysis was performed to search for genomic imbalances in patients with suspected mutation-negative Lynch syndrome with MLH1 deficiency in their colorectal tumours. A deletion in the LRRFIP2 (leucine-rich repeat flightless-interacting protein 2) gene flanking the MLH1 gene was detected, which turned out to be a paracentric inversion on chromosome 3p22.2 creating two new stable fusion transcripts between MLH1 and LRRFIP2. A single-nucleotide polymorphism in MLH1 exon 8 was expressed from both alleles, initially pointing to appropriate MLH1 function at least in peripheral cells. In a second case, an inherited duplication of the MLH1 gene region resulted in constitutional MLH1 promoter methylation. Constitutional MLH1 promoter methylation may therefore in rare cases be a heritable disease mechanism and should not be overlooked in seemingly sporadic patients.

  15. Nowhere to hide: Effects of linear features on predator-prey dynamics in a large mammal system.

    Science.gov (United States)

    DeMars, Craig A; Boutin, Stan

    2018-01-01

    Rapid landscape alteration associated with human activity is currently challenging the evolved dynamical stability of many predator-prey systems by forcing species to behaviourally respond to novel environmental stimuli. In many forested systems, linear features (LFs) such as roads, pipelines and resource exploration lines (i.e. seismic lines) are a ubiquitous form of landscape alteration that have been implicated in altering predator-prey dynamics. One hypothesized effect is that LFs facilitate predator movement into and within prey refugia, thereby increasing predator-prey spatial overlap. We evaluated this hypothesis in a large mammal system, focusing on the interactions between boreal woodland caribou (Rangifer tarandus caribou) and their two main predators, wolves (Canis lupus) and black bears (Ursus americanus), during the calving season of caribou. In this system, LFs extend into and occur within peatlands (i.e. bogs and nutrient-poor fens), a habitat type highly used by caribou due to its refugia effects. Using resource selection analyses, we found that LFs increased predator selection of peatlands. Female caribou appeared to respond by avoiding LFs and areas with high LF density. However, in our study area, most caribou cannot completely avoid exposure to LFs and variation in female response had demographic effects. In particular, increasing proportional use of LFs by females negatively impacted survival of their neonate calves. Collectively, these results demonstrate how LFs can reduce the efficacy of prey refugia. Mitigating such effects will require limiting or restoring LFs within prey refugia, although the effectiveness of mitigation efforts will depend upon spatial scale, which in turn will be influenced by the life-history traits of predator and prey. © 2017 The Authors. Journal of Animal Ecology © 2017 British Ecological Society.

  16. Playing hide-and-seek with host macrophages through the use of mycobacterial cell envelope phthiocerol dimycocerosates and phenolic glycolipids

    Directory of Open Access Journals (Sweden)

    Ainhoa eARBUES

    2014-12-01

    Full Text Available Mycobacterial pathogens, including Mycobacterium tuberculosis, the etiological agent of tuberculosis (TB, have evolved a remarkable ability to evade the immune system in order to survive and to colonize the host. Among the most important evasion strategies is the capacity of these bacilli to parasitize host macrophages, since these are major effector cells against intracellular pathogens that can be used as long-term cellular reservoirs. Mycobacterial pathogens employ an array of virulence factors that manipulate macrophage function to survive and establish infection. Until recently, however, the role of mycobacterial cell envelope lipids as virulence factors in macrophage subversion has remained elusive. Here, we will address exclusively the proposed role for phthiocerol dimycocerosates (DIM in the modulation of the resident macrophage response and that of phenolic glycolipids (PGL in the regulation of the recruitment and phenotype of incoming macrophage precursors to the site of infection. We will provide a unique perspective of potential additional functions for these lipids, and highlight obstacles and opportunities to further understand their role in the pathogenesis of TB and other mycobacterial diseases.

  17. Nowhere to run, or hide. Current economic downturn may exacerbate hospitals' weakness with buildings, technology costs, reimbursements.

    Science.gov (United States)

    Becker, Cinda

    2008-04-21

    As the economy moves through what many believe is a recession, healthcare won't be immune, experts say. "I don't know much in the economy that is recession-proof, and I don't think healthcare is either," says W. David Bradford, left, a Medical University of South Carolina economics professor. Because of the current economic conditions, some systems are rethinking where they put their money.

  18. Chiral hide-and-seek: retention of enantiomorphism in laser-induced nucleation of molten sodium chlorate.

    Science.gov (United States)

    Ward, Martin R; Copeland, Gary W; Alexander, Andrew J

    2011-09-21

    We report the observation of non-photochemical laser-induced nucleation (NPLIN) of sodium chlorate from its melt using nanosecond pulses of light at 1064 nm. The fraction of samples that nucleate is shown to depend linearly on the peak power density of the laser pulses. Remarkably, we observe that most samples are nucleated by the laser back into the enantiomorph (dextrorotatory or levorotatory) of the solid prior to melting. We do not observe a significant dependence on polarization of the light, and we put forward symmetry arguments that rule out an optical Kerr effect mechanism. Our observations of retention of chirality can be explained by decomposition of small amounts of the sodium chlorate to form sodium chloride, which provide cavities for retention of clusters of sodium chlorate even 18 °C above the melting point. These clusters remain sub-critical on cooling, but can be activated by NPLIN via an isotropic polarizability mechanism. We have developed a heterogeneous model of NPLIN in cavities, which reproduces the experimental data using simple physical data available for sodium chlorate.

  19. Traditional knowledge hiding in plain sight - twenty-first century ethnobotany of the Chácobo in Beni, Bolivia.

    Science.gov (United States)

    Paniagua Zambrana, Narel Y; Bussmann, Rainer W; Hart, Robbie E; Moya Huanca, Araceli L; Ortiz Soria, Gere; Ortiz Vaca, Milton; Ortiz Álvarez, David; Soria Morán, Jorge; Soria Morán, María; Chávez, Saúl; Chávez Moreno, Bertha; Chávez Moreno, Gualberto; Roca, Oscar; Siripi, Erlin

    2017-10-10

    The Chácobo are a Panoan speaking tribe of about 1000 members (300+ adults) in Beni, Bolivia. Originally nomadic, the Chácabo were relocated to their current main location in the 1960s. Researchers have visited the Chácabo since 1911. A first more detailed anthropological report exists from the late 1960s, and ecological-ethnobotanical studies were conducted in the 1980s and 1990s. The presented work represents a complete ethnobotanical inventory of the entire adult Chácobo population, with interviews and plant collection conducted directly by Chácobo counterparts. Based on previous reports and our preliminary studies, we hypothesized that twenty-first century Chácobo plant use centered on income generation, and that traditional plant use related to household utensils, medicine and traditional crop varieties had almost disappeared. To test this hypothesis, we started the "Chácobo Ethnobotany Project," training 10 indigenous Chácobo participants in ethnobotanical interview and plant collection techniques, in order to more fully document Chácobo knowledge and avoid the influence of foreign interviewers. Our study found 331 useful plant species in 241genera of 95 plant families, with leaves, roots and bark being the most commonly used plant parts The comprehensive documentation that these methods enabled completely nullified our initial hypothesis of knowledge loss. Traditional crop varieties are still widely grown and traditional knowledge is alive. Moreover, it is being actively recuperated in certain domains by the younger generation. Most Chácobo know, and can name, traditional utensils and tools, although only the older generation has still the skills to manufacture them. While many Chácobo still know the names and uses of medicinal species, the younger generation is however often unsure how to identify them. In this paper we illustrate the complexity of perspectives on knowledge at different ages, and the persistence of knowledge over almost a century. We found that traditional knowledge was only partially affected by the processes of exposure to a market economy, and that different knowledge domains experienced different trends as a result of these changes. Overall knowledge was widely distributed, and we did not observe a directional knowledge loss. We stress the importance to not directly conclude processes of knowledge loss, cultural erosion or acculturation when comparing the knowledge of different age groups.

  20. Hiding and feeding in floating seaweed: Floating seaweed clumps as possible refuges or feeding grounds for fishes

    Science.gov (United States)

    Vandendriessche, Sofie; Messiaen, Marlies; O'Flynn, Sarah; Vincx, Magda; Degraer, Steven

    2007-02-01

    Floating seaweed is considered to be an important habitat for juvenile fishes due to the provision of food, shelter, a visual orientation point and passive transport. The importance of the presence of the highly dynamical seaweed clumps from the North Sea to juvenile neustonic fishes was investigated by analysing both neuston samples (without seaweed) and seaweed samples concerning fish community structure, and length-frequency distributions and feeding habits of five associated fish species. While the neustonic fish community was mainly seasonally structured, the seaweed-associated fish community was more complex: the response of the associated fish species to environmental variables was species specific and probably influenced by species interactions, resulting in a large multivariate distance between the samples dominated by Chelon labrosus and the samples dominated by Cyclopterus lumpus, Trachurus trachurus and Ciliata mustela. The results of the stomach analysis confirmed that C. lumpus is a weedpatch specialist that has a close spatial affinity with the seaweed and feeds intensively on the seaweed-associated invertebrate fauna. Similarly, C. mustela juveniles also fed on the seaweed fauna, but in a more opportunistic way. The shape of the size-frequency distribution suggested enhanced growth when associated with floating seaweed. Chelon labrosus and T. trachurus juveniles were generally large in seaweed samples, but large individuals were also encountered in the neuston. The proportion of associated invertebrate fauna in their diet was of minor importance, compared to the proportions in C. lumpus. Individuals of Syngnathus rostellatus mainly fed on planktonic invertebrates but had a discontinuous size-frequency distribution, suggesting that some of the syngnathids were carried with the seaweed upon detachment and stayed associated. Floating seaweeds can therefore be regarded as ephemeral habitats shared between several fish species (mainly juveniles) that use them for different reasons and with varying intensity.

  1. Hide and seek: How do DNA glycosylases locate oxidatively damaged DNA bases amidst a sea of undamaged bases?

    Science.gov (United States)

    Lee, Andrea J; Wallace, Susan S

    2017-06-01

    The first step of the base excision repair (BER) pathway responsible for removing oxidative DNA damage utilizes DNA glycosylases to find and remove the damaged DNA base. How glycosylases find the damaged base amidst a sea of undamaged bases has long been a question in the BER field. Single molecule total internal reflection fluorescence microscopy (SM TIRFM) experiments have allowed for an exciting look into this search mechanism and have found that DNA glycosylases scan along the DNA backbone in a bidirectional and random fashion. By comparing the search behavior of bacterial glycosylases from different structural families and with varying substrate specificities, it was found that glycosylases search for damage by periodically inserting a wedge residue into the DNA stack as they redundantly search tracks of DNA that are 450-600bp in length. These studies open up a wealth of possibilities for further study in real time of the interactions of DNA glycosylases and other BER enzymes with various DNA substrates. Copyright © 2016 Elsevier Inc. All rights reserved.

  2. Do You Have Anything to Hide? Infidelity-Related Behaviors on Social Media Sites and Marital Satisfaction.

    Science.gov (United States)

    McDaniel, Brandon T; Drouin, Michelle; Cravens, Jaclyn D

    2017-01-01

    Social media provides one route to behaviors that may be potentially harmful to romantic relationships, such as communicating with alternative partners, which can sometimes create relationship conflict, breakups, or divorce. Limited empirical evidence exists concerning social media infidelity-related behaviors and marital relationships. This study examined whether married/cohabiting individuals are using social media sites to engage in online infidelity-related behaviors and to what extent this related to relationship satisfaction, ambivalence, and relational attachment characteristics as reported by 338 married/cohabiting individuals from 176 families. Only a small percentage of married/cohabiting couples reported engaging in social media infidelity-related behaviors; however, more engagement in infidelity-related behaviors on social media was significantly related to lower relationship satisfaction, higher relationship ambivalence, and greater attachment avoidance and anxiety in both women and men. Additionally, attachment anxiety and gender interacted with relationship satisfaction in predicting online infidelity-related behaviors when controlling for other variables. Implications are discussed.

  3. 9 CFR 310.9 - Anthrax; carcasses not to be eviscerated; disposition of affected carcasses; hides, hoofs, horns...

    Science.gov (United States)

    2010-01-01

    ... have handled anthrax material is thorough cleansing of the hands and arms with liquid soap and running... Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND... request to the Scientific Services, Meat and Poultry Inspection, Food Safety and Inspection Service, U.S...

  4. The Hide-and-Seek of Grain Boundaries from Moiré Pattern Fringe of Two-Dimensional Graphene

    Science.gov (United States)

    Kim, Jung Hwa; Kim, Kwanpyo; Lee, Zonghoon

    2015-01-01

    Grain boundaries (GBs) commonly exist in crystalline materials and affect various properties of materials. The facile identification of GBs is one of the significant requirements for systematical study of polycrystalline materials including recently emerging two-dimensional materials. Previous observations of GBs have been performed by various tools including high resolution transmission electron microscopy. However, a method to easily identify GBs, especially in the case of low-angle GBs, has not yet been well established. In this paper, we choose graphene bilayers with a GB as a model system and investigate the effects of interlayer rotations to the identification of GBs. We provide a critical condition between adjacent moiré fringe spacings, which determines the possibility of GB recognition. In addition, for monolayer graphene with a grain boundary, we demonstrate that low-angle GBs can be distinguished easily by inducing moiré patterns deliberately with an artificial reference overlay. PMID:26216628

  5. Hiding from the moonlight: luminosity and temperature affect activity of Asian nocturnal primates in a highly seasonal forest.

    Directory of Open Access Journals (Sweden)

    Carly Starr

    Full Text Available The effect of moonlight and temperature on activity of slow lorises was previously little known and this knowledge might be useful for understanding many aspects of their behavioural ecology, and developing strategies to monitor and protect populations. In this study we aimed to determine if the activity of the pygmy loris (Nycticebus pygmaeus is affected by ambient temperature and/or moonlight in a mixed deciduous forest. We radio-collared five females and five males in the Seima Protection Forest, Cambodia, in February to May, 2008 and January to March, 2009 and recorded their behaviour at 5 minutes intervals, totalling 2736 observations. We classified each observation as either inactive (sleeping or alert or active behaviour (travel, feeding, grooming, or others. Moon luminosity (bright/dark and ambient temperature were recorded for each observation. The response variable, activity, was binary (active or inactive, and a logit link function was used. Ambient temperature alone did not significantly affect mean activity. Although mean activity was significantly affected by moonlight, the interaction between moonlight and temperature was also significant: on bright nights, studied animals were increasingly more active with higher temperature; and on dark nights they were consistently active regardless of temperature. The most plausible explanation is that on bright cold nights the combined risk of being seen and attacked by predators and heat loss outweigh the benefit of active behaviours.

  6. Kissing loops hide premature termination codons in pre-mRNAof selenoprotein genes and in genes containing programmedribosomal frameshifts

    DEFF Research Database (Denmark)

    Knudsen, Steen; Brunak, Søren

    1997-01-01

    A novel RNA secondary structure that places the selenocysteine codon UGA in one hairpin and a donor splice site in another, has been discovered in selenoprotein genes. The presence of the structure resolves the discrepancy that the selenocysteine triplet, UGA, should block splicing. Without a spe...

  7. An Automatic Caption Filtering and Partial Hiding Approach to Improving the English Listening Comprehension of EFL Students

    Science.gov (United States)

    Hsu, Ching-Kun; Hwang, Gwo-Jen; Chang, Chih-Kai

    2014-01-01

    Fostering the listening comprehension of English as Foreign Language (EFL) learners has been recognized as an important and challenging issue. Videos have been used as one of the English listening learning resources; however, without effective learning supports, EFL students are likely to encounter difficulties in comprehending the video content,…

  8. One Analogy Can Hide Another: Physics and Biology in Alchian’s “Economic Natural Selection”

    NARCIS (Netherlands)

    C. Levallois (Clément)

    2008-01-01

    textabstractToday, Alchian's "Uncertainty, evolution and economic theory" (1950) is hailed by evolutionary economists as a most important piece, which resumed an evolutionary brand of theorizing in economics after the eclipse of the interwar period. On the other hand, Alchian's article is also

  9. On a hiding to nothing? Assessing the corporate governance of hospital and health services in New Zealand 1993-1998.

    Science.gov (United States)

    Barnett, P; Perkins, R; Powell, M

    2001-01-01

    In New Zealand the governance of public sector hospital and health services has changed significantly over the past decade. For most of the century hospitals had been funded by central government grants but run by locally elected boards. In 1989 a reforming Labour government restructured health services along managerialist lines, including changing governance structures so that some area health board members were government appointments, with the balance elected by the community. More market oriented reform under a new National government abolished this arrangement and introduced (1993) a corporate approach to the management of hospitals and related services. The hospitals were established as limited liability companies under the Companies Act. This was an explicitly corporate model and, although there was some modification of arrangements following the election of a more politically moderate centre-right coalition government in 1996, the corporate model was largely retained. Although significant changes occurred again after the election of a Labour government in 1999, the corporate governance experience in New Zealand health services is one from which lessons can, nevertheless, be learnt. This paper examines aspects of the performance and process of corporate governance arrangements for public sector health services in New Zealand, 1993-1998.

  10. HIV in hiding: methods and data requirements for the estimation of the number of people living with undiagnosed HIV

    DEFF Research Database (Denmark)

    Lundgren, Jens

    2011-01-01

    Many people who are HIV positive are unaware of their infection status. Estimation of the number of people with undiagnosed HIV within a country or region is vital for understanding future need for treatment and for motivating testing programs. We review the available estimation approaches which...... are in current use. They can be broadly classified into those based on prevalence surveys and those based on reported HIV and AIDS cases. Estimation based on prevalence data requires data from regular prevalence surveys in different population groups together with estimates of the size of these groups....... The recommended minimal case reporting data needed to estimate the number of patients with undiagnosed HIV are HIV diagnoses, including CD4 count at diagnosis and whether there has been an AIDS diagnosis in the 3 months before or after HIV diagnosis, and data on deaths in people with HIV. We would encourage all...

  11. Hiding the Complexity: Building a Distributed ATLAS Tier-2 with a Single Resource Interface using ARC Middleware

    International Nuclear Information System (INIS)

    Purdie, S; Stewart, G; Skipsey, S; Washbrook, A; Bhimji, W; Filipcic, A; Kenyon, M

    2011-01-01

    Since their inception, Grids for high energy physics have found management of data to be the most challenging aspect of operations. This problem has generally been tackled by the experiment's data management framework controlling in fine detail the distribution of data around the grid and the careful brokering of jobs to sites with co-located data. This approach, however, presents experiments with a difficult and complex system to manage as well as introducing a rigidity into the framework which is very far from the original conception of the grid. In this paper we describe how the ScotGrid distributed Tier-2, which has sites in Glasgow, Edinburgh and Durham, was presented to ATLAS as a single, unified resource using the ARC middleware stack. In this model the ScotGrid 'data store' is hosted at Glasgow and presented as a single ATLAS storage resource. As jobs are taken from the ATLAS PanDA framework, they are dispatched to the computing cluster with the fastest response time. An ARC compute element at each site then asynchronously stages the data from the data store into a local cache hosted at each site. The job is then launched in the batch system and accesses data locally. We discuss the merits of this system compared to other operational models and consider, from the point of view of the resource providers (sites), and from the resource consumers (experiments); and consider issues involved in transitions to this model.

  12. Hiding in a crowd-does diversity facilitate persistence of a low-quality fungal partner in the mycorrhizal symbiosis?

    Czech Academy of Sciences Publication Activity Database

    Hart, M. M.; Forsythe, J.; Oshowski, B.; Buecking, H.; Jansa, Jan; Kiers, E. T.

    2013-01-01

    Roč. 59, č. 1 (2013), s. 47-56 ISSN 0334-5114 Institutional support: RVO:61388971 Keywords : Mutualism * Host detection * Cheaters Subject RIV: EE - Microbiology, Virology Impact factor: 0.941, year: 2013

  13. Molecular epidemiology of anthrax cases associated with recreational use of animal hides and yarn in the United States.

    Directory of Open Access Journals (Sweden)

    Chung K Marston

    Full Text Available To determine potential links between the clinical isolate to animal products and their geographic origin, we genotyped (MLVA-8, MVLA-15, and canSNP analysis 80 environmental and 12 clinical isolates and 2 clinical specimens from five cases of anthrax (California in 1976 [n = 1], New York in 2006 [n = 1], Connecticut in 2007 [n = 2], and New Hampshire in 2009[n = 1] resulting from recreational handling of animal products. For the California case, four clinical isolates were identified as MLVA-8 genotype (GT 76 and in the canSNP A.Br.Vollum lineage, which is consistent with the Pakistani origin of the yarn. Twenty eight of the California isolates were in the A.Br.Vollum canSNP lineage and one isolate was in the A.Br. 003/004 canSNP sub-group. All 52 isolates and both clinical specimens related to the New York and Connecticut cases were MLVA-8 GT 1. The animal products associated with the NY and CT cases were believed to originate from West Africa, but no isolates from this region are available to be genotyped for comparison. All isolates associated with the New Hampshire case were identical and had a new genotype (GT 149. Isolates from the NY, CT and NH cases diverge from the established canSNP phylogeny near the base of the A.Br.011/009. This report illustrates the power of the current genotyping methods and the dramatically different epidemiological conditions that can lead to infections (i.e., contamination by a single genotype versus widespread contamination of numerous genotypes. These cases illustrate the need to acquire and genotype global isolates so that accurate assignments can be made about isolate origins.

  14. Best of both worlds : clear exterior finishes : in search of finishes that protect wood without hiding its natural beauty

    Science.gov (United States)

    Tom Daniels; Marc Hirsch; Ken McClelland; Alan Ross; Sam Williams

    2000-01-01

    In recent years, a number of clear wood finishes have been developed that protect wood while accentuating its natural beauty. The focus of this publication is on those finishes having little visible pigment. In some cases, the pigments are included but are finely ground to create a coating that is transparent to visible light. Most natural clear wood finishes are...

  15. Work Satisfaction Influence Toward Employee Prosperity

    OpenAIRE

    Indryawati, Rini; Widiyarsih, Widiyarsih

    2007-01-01

    Work satisfaction has an effect to employee wealthy at PT. Nagaraja Lestari in taking the policy and to motivate employee to enhancing the work performance in giving wages, salary, incentives, job promotion and employee healthy. This research is using qualitative approach and using observation and interview as tool research. Data collecting is in naration, description, story, written and unwritten documents. When employee has higher work satisfaction they will psychological wealthy fullfilness.

  16. Herbicide toxicity, selectivity and hormesis of nicosulfuron on 10 Trichogrammatidae (Hymenoptera) species parasitizing Anagasta ( = Ephestia) kuehniella (Lepidoptera: Pyralidae) eggs.

    Science.gov (United States)

    Leite, Germano L D; de Paulo, Paula D; Zanuncio, José C; Tavares, Wagner De S; Alvarenga, Anarelly C; Dourado, Luan R; Bispo, Edilson P R; Soares, Marcus A

    2017-01-02

    Selective agrochemicals including herbicides that do not affect non-target organisms such as natural enemies are important in the integrated pest management (IPM) programs. The aim of this study was to evaluate the herbicide toxicity, selectivity and hormesis of nicosulfuron, recommended for the corn Zea mays L. (Poaceae) crop, on 10 Trichogrammatidae (Hymenoptera) species. A female of each Trichogramma spp. or Trichogrammatoidea annulata De Santis, 1972 was individually placed in plastic test tubes (no choice) with a cardboard containing 45 flour moth Anagasta ( = Ephestia) kuehniella Zeller, 1879 (Lepidoptera: Pyralidae) eggs. Parasitism by these natural enemies was allowed for 48 h and the cardboards were sprayed with the herbicide nicosulfuron at 1.50 L.ha -1 , along with the control (only distilled water). Nicosulfuron reduced the emergence rate of Trichogramma bruni Nagaraja, 1983 females, but increased that of Trichogramma pretiosum Riley, 1879, Trichogramma acacioi Brun, Moraes and Smith, 1984 and T. annulata females. Conversely, this herbicide increased the emergence rate of Trichogramma brasiliensis Ashmead, 1904, T. bruni, Trichogramma galloi Zucchi, 1988 and Trichogramma soaresi Nagaraja, 1983 males and decreased those of T. acacioi, Trichogramma atopovilia Oatman and Platner, 1983 and T. pretiosum males. In addition, nicosulfuron reduced the sex ratio of T. galloi, Trichogramma bennetti Nagaraja and Nagarkatti, 1973 and T. pretiosum and increased that of T. acacioi, T. bruni, T. annulata, Trichogramma demoraesi Nagaraja, 1983, T. soaresi and T. brasiliensis. The herbicide nicosulfuron was "harmless" (class 1, <30% reduction) for females and the sex ratio of all Trichogrammatidae species based on the International Organization for Biological Control (IOBC) classification. The possible hormesis effect of nicosulfuron on Trichogrammatidae species and on the bacterium Wolbachia sp. (Rickettsiales: Rickettsiaceae) was also discussed.

  17. Foxfire 3: Animal Care, Banjos and Dulcimers, Hide Tanning, Summer and Fall Wild Plant Foods, Butter Churns, Ginseng, and Still More Affairs of Plain Living.

    Science.gov (United States)

    Wigginton, Eliot, Ed.

    A window into the customs, folklore, and cultural heritage of Appalachia is provided in this volume, the third in the series of "Foxfire" books. Compiled by high school students at Rabun Gap-Nacoochee school, it is based on personal interviews with long-time residents of Appalachian Georgia. In many cases the material is in the words of…

  18. Experimental validation of an ultra-thin metasurface cloak for hiding a metallic obstacle from an antenna radiation at low frequencies

    Science.gov (United States)

    Teperik, Tatiana V.; Burokur, Shah Nawaz; de Lustrac, André; Sabanowski, Guy; Piau, Gérard-Pascal

    2017-07-01

    We demonstrate numerically and experimentally an ultra-thin (≈ λ/240) metasurface-based invisibility cloak for low frequency antenna applications. We consider a monopole antenna mounted on a ground plane and a cylindrical metallic obstacle of diameter smaller than the wavelength located in its near-field. To restore the intrinsic radiation patterns of the antenna perturbed by this obstacle, a metasurface cloak consisting simply of a metallic patch printed on a dielectric substrate is wrapped around the obstacle. Using a finite element method based commercial electromagnetic solver, we show that the radiation patterns of the monopole antenna can be restored completely owing to electromagnetic modes of the resonant cavity formed between the patch and obstacle. The metasurface cloak is fabricated, and the concept is experimentally demonstrated at 125 MHz. Performed measurements are in good agreement with numerical simulations, verifying the efficiency of the proposed cloak.

  19. CSU Final Report on the Math/CS Institute CACHE: Communication-Avoiding and Communication-Hiding at the Extreme Scale

    Energy Technology Data Exchange (ETDEWEB)

    Strout, Michelle [Colorado State University

    2014-06-10

    The CACHE project entails researching and developing new versions of numerical algorithms that result in data reuse that can be scheduled in a communication avoiding way. Since memory accesses take more time than any computation and require the most power, the focus on turning data reuse into data locality is critical to improving performance and reducing power usage in scientific simulations. This final report summarizes the accomplishments at Colorado State University as part of the CACHE project.

  20. Evaluations of methods for the isolation of high quality RNA from bovine and cervine hide biopsies for use in gene expression studies

    Science.gov (United States)

    Molecular investigations of the ruminant response to ectoparasites at the parasite-host interface are critically dependent upon the quality of RNA. The complexity of ruminant skin decreases the capacity to obtain high quality RNA from biopsy samples, which directly affects the reliability of data pr...

  1. €œWhere Does a Wise Man Hide a Leaf?”: Modernising the Laws of Disclosure in the Information Age

    OpenAIRE

    Wong, Denise

    2014-01-01

    Litigation practice has been significantly altered by the advent of electronically stored information in daily corporate life. It is argued that the laws of disclosure should be updated to recognise that technology-assisted document review via keyword searching is crucial in ensuring that the costs of litigation are well managed. In order to facilitate keyword searching, a new legal concept of accuracy in the selection of keywords should be introduced into the laws of disclosure. At the same ...

  2. To be seen or to hide: visual characteristics of body patterns for camouflage and communication in the Australian giant cuttlefish Sepia apama.

    Science.gov (United States)

    Zylinski, S; How, M J; Osorio, D; Hanlon, R T; Marshall, N J

    2011-05-01

    It might seem obvious that a camouflaged animal must generally match its background whereas to be conspicuous an organism must differ from the background. However, the image parameters (or statistics) that evaluate the conspicuousness of patterns and textures are seldom well defined, and animal coloration patterns are rarely compared quantitatively with their respective backgrounds. Here we examine this issue in the Australian giant cuttlefish Sepia apama. We confine our analysis to the best-known and simplest image statistic, the correlation in intensity between neighboring pixels. Sepia apama can rapidly change their body patterns from assumed conspicuous signaling to assumed camouflage, thus providing an excellent and unique opportunity to investigate how such patterns differ in a single visual habitat. We describe the intensity variance and spatial frequency power spectra of these differing body patterns and compare these patterns with the backgrounds against which they are viewed. The measured image statistics of camouflaged animals closely resemble their backgrounds, while signaling animals differ significantly from their backgrounds. Our findings may provide the basis for a set of general rules for crypsis and signals. Furthermore, our methods may be widely applicable to the quantitative study of animal coloration.

  3. Limited analytical capacity for cyanotoxins in developing countries may hide serious environmental health problems: simple and affordable methods may be the answer.

    Science.gov (United States)

    Pírez, Macarena; Gonzalez-Sapienza, Gualberto; Sienra, Daniel; Ferrari, Graciela; Last, Michael; Last, Jerold A; Brena, Beatriz M

    2013-01-15

    In recent years, the international demand for commodities has prompted enormous growth in agriculture in most South American countries. Due to intensive use of fertilizers, cyanobacterial blooms have become a recurrent phenomenon throughout the continent, but their potential health risk remains largely unknown due to the lack of analytical capacity. In this paper we report the main results and conclusions of more than five years of systematic monitoring of cyanobacterial blooms in 20 beaches of Montevideo, Uruguay, on the Rio de la Plata, the fifth largest basin in the world. A locally developed microcystin ELISA was used to establish a sustainable monitoring program that revealed seasonal peaks of extremely high toxicity, more than one-thousand-fold greater than the WHO limit for recreational water. Comparison with cyanobacterial cell counts and chlorophyll-a determination, two commonly used parameters for indirect estimation of toxicity, showed that such indicators can be highly misleading. On the other hand, the accumulated experience led to the definition of a simple criterion for visual classification of blooms, that can be used by trained lifeguards and technicians to take rapid on-site decisions on beach management. The simple and low cost approach is broadly applicable to risk assessment and risk management in developing countries. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. "I'm not hiding in the shadows anymore": o queer e a performance musical na representação midiática de Mykki Banco

    Directory of Open Access Journals (Sweden)

    Francisco Menegat

    2016-06-01

    Full Text Available O objetivo geral deste artigo é apresentar uma análise da multiplicidade performática do rapper Mykki Blanco no vídeo Mykki Blanco On Set For Milk, objeto escolhido por seu caráter híbrido quanto aos formatos comunicacionais. O vídeo dialoga com a maneira como Blanco é midiaticamente representado: um corpo em constante transformação que exalta sua multiplicidade e subverte concepções normativas sobre identidade na cultura musical na qual está inserido. A partir da análise do audiovisual, cruzando concepções de identidade e teoria queer, aliadas à perspectiva dos Estudos Culturais, o texto aborda as subversões das normas reguladoras de gênero e sexualidade no universo musical e as desconstruções dos elementos que compõem a performance musical de Blanco.

  5. Hiding in Plain Sight: Contaminated Ice Machines Are a Potential Source for Dissemination of Gram-Negative Bacteria and Candida Species in Healthcare Facilities.

    Science.gov (United States)

    Kanwar, Anubhav; Cadnum, Jennifer L; Xu, Dongyan; Jencson, Annette L; Donskey, Curtis J

    2018-03-01

    BACKGROUND Contaminated ice machines have been linked to transmission of pathogens in healthcare facilities. OBJECTIVE To determine the frequency and sites of contamination of ice machines in multiple healthcare facilities and to investigate potential mechanisms of microorganism dispersal from contaminated ice machines to patients. DESIGN Multicenter culture survey and simulation study. SETTING The study took place in 5 hospitals and 2 nursing homes in northeastern Ohio. METHODS We cultured multiple sites on ice machines from patient care areas. To investigate potential mechanisms of microbial dispersal from contaminated ice machines, we observed the use of ice machines and conducted simulations using a fluorescent tracer and cultures. RESULTS Samples from 64 ice machines in the 5 hospitals and 2 nursing homes (range, 3-16 per facility) were cultured. Gram-negative bacilli and/or Candida spp were recovered from 100% of drain pans, 52% of ice and/or water chutes, and 72% of drain-pan grilles. During the operation of ice machines, ice often fell through the grille, resulting in splattering, with dispersal of contaminated water from the drain pan to the drain-pan grille, cups, and the hands of those using the ice machine. Contamination of the inner surface of the ice chute resulted in contamination of ice cubes exiting the chute. CONCLUSIONS Our findings demonstrate that ice machines in healthcare facilities are often contaminated with gram-negative bacilli and Candida species, and provide a potential mechanism by which these organisms may be dispersed. Effective interventions are needed to reduce the risk of dissemination of pathogenic organisms from ice machines. Infect Control Hosp Epidemiol 2018;39:253-258.

  6. Hide and vanish: data sets where the most parsimonious tree is known but hard to find, and their implications for tree search methods.

    Science.gov (United States)

    Goloboff, Pablo A

    2014-10-01

    Three different types of data sets, for which the uniquely most parsimonious tree can be known exactly but is hard to find with heuristic tree search methods, are studied. Tree searches are complicated more by the shape of the tree landscape (i.e. the distribution of homoplasy on different trees) than by the sheer abundance of homoplasy or character conflict. Data sets of Type 1 are those constructed by Radel et al. (2013). Data sets of Type 2 present a very rugged landscape, with narrow peaks and valleys, but relatively low amounts of homoplasy. For such a tree landscape, subjecting the trees to TBR and saving suboptimal trees produces much better results when the sequence of clipping for the tree branches is randomized instead of fixed. An unexpected finding for data sets of Types 1 and 2 is that starting a search from a random tree instead of a random addition sequence Wagner tree may increase the probability that the search finds the most parsimonious tree; a small artificial example where these probabilities can be calculated exactly is presented. Data sets of Type 3, the most difficult data sets studied here, comprise only congruent characters, and a single island with only one most parsimonious tree. Even if there is a single island, missing entries create a very flat landscape which is difficult to traverse with tree search algorithms because the number of equally parsimonious trees that need to be saved and swapped to effectively move around the plateaus is too large. Minor modifications of the parameters of tree drifting, ratchet, and sectorial searches allow travelling around these plateaus much more efficiently than saving and swapping large numbers of equally parsimonious trees with TBR. For these data sets, two new related criteria for selecting taxon addition sequences in Wagner trees (the "selected" and "informative" addition sequences) produce much better results than the standard random or closest addition sequences. These new methods for Wagner trees and for moving around plateaus can be useful when analyzing phylogenomic data sets formed by concatenation of genes with uneven taxon representation ("sparse" supermatrices), which are likely to present a tree landscape with extensive plateaus. Copyright © 2014 Elsevier Inc. All rights reserved.

  7. Meta-GWAS Accuracy and Power (MetaGAP Calculator Shows that Hiding Heritability Is Partially Due to Imperfect Genetic Correlations across Studies.

    Directory of Open Access Journals (Sweden)

    Ronald de Vlaming

    2017-01-01

    Full Text Available Large-scale genome-wide association results are typically obtained from a fixed-effects meta-analysis of GWAS summary statistics from multiple studies spanning different regions and/or time periods. This approach averages the estimated effects of genetic variants across studies. In case genetic effects are heterogeneous across studies, the statistical power of a GWAS and the predictive accuracy of polygenic scores are attenuated, contributing to the so-called 'missing heritability'. Here, we describe the online Meta-GWAS Accuracy and Power (MetaGAP calculator (available at www.devlaming.eu which quantifies this attenuation based on a novel multi-study framework. By means of simulation studies, we show that under a wide range of genetic architectures, the statistical power and predictive accuracy provided by this calculator are accurate. We compare the predictions from the MetaGAP calculator with actual results obtained in the GWAS literature. Specifically, we use genomic-relatedness-matrix restricted maximum likelihood to estimate the SNP heritability and cross-study genetic correlation of height, BMI, years of education, and self-rated health in three large samples. These estimates are used as input parameters for the MetaGAP calculator. Results from the calculator suggest that cross-study heterogeneity has led to attenuation of statistical power and predictive accuracy in recent large-scale GWAS efforts on these traits (e.g., for years of education, we estimate a relative loss of 51-62% in the number of genome-wide significant loci and a relative loss in polygenic score R2 of 36-38%. Hence, cross-study heterogeneity contributes to the missing heritability.

  8. Economic assessment and pathogenic bacteria inhibition of bovine hide presoaking solutions formulated with enzymes that can remove adobe-type manure

    Science.gov (United States)

    The presoaking formulations that have recently been developed are effective in removing the damaging adobe type bovine manure and eco-friendly because the ingredients used are recycled and required only a quarter of the amount of biocide and surfactant that the industry is commonly using. The goal ...

  9. Human Immunodeficiency Virus Playing Hide-and-Seek: Understanding the TFH Cell Reservoir and Proposing Strategies to Overcome the Follicle Sanctuary

    Directory of Open Access Journals (Sweden)

    Yew Ann Leong

    2017-05-01

    Full Text Available Human immunodeficiency virus (HIV infects millions of people worldwide, and new cases continue to emerge. Once infected, the virus cannot be cleared by the immune system and causes acquired immunodeficiency syndrome. Combination antiretroviral therapeutic regimen effectively suppresses viral replication and halts disease progression. The treatment, however, does not eliminate the virus-infected cells, and interruption of treatment inevitably leads to viral rebound. The rebound virus originates from a group of virus-infected cells referred to as the cellular reservoir of HIV. Identifying and eliminating the HIV reservoir will prevent viral rebound and cure HIV infection. In this review, we focus on a recently discovered HIV reservoir in a subset of CD4+ T cells called the follicular helper T (TFH cells. We describe the potential mechanisms for the emergence of reservoir in TFH cells, and the strategies to target and eliminate this viral reservoir.

  10. "I Do Not Take My Medicine while Hiding" - A Longitudinal Qualitative Assessment of HIV Discordant Couples' Beliefs in Discordance and ART as Prevention in Uganda.

    Directory of Open Access Journals (Sweden)

    Rachel King

    Full Text Available HIV negative members of serostatus discordant couples are at high risk for HIV acquisition, but few interventions are in place to target them in sub-Saharan Africa.In this study, we interviewed 28 couples, 3 times over a period of one year to understand their perceptions and attitudes around discordance, their relationship dynamics, their HIV risk behaviour, their beliefs and attitudes about antiretroviral therapy (ART and their views of the community perceptions of discordance and treatment for HIV.Findings revealed that at baseline there were multiple complex explanations and interpretations about discordance among discordant couples and their surrounding community. Shifts in beliefs and attitudes about discordance, HIV risk reduction and ART over time were enabled through re-testing negative members of discordant couples and repeat counselling but some beliefs remain solidly embedded in cultural imperatives of the importance of childbearing as well as culturally determined and enforced gender roles.Interventions that aim to target discordant couples must embrace the complex and dynamic understandings of HIV diagnosis and treatment in context of fluid relationships, and changing beliefs about HIV risk and treatment.

  11. 隐匿、凸显、弥散:媒介学视野中的宗教安全问题研究%Religious Security in the Viewpoint of Media Science and its Evolution:Hiding, Appearing, and Dispersing

    Institute of Scientific and Technical Information of China (English)

    谭苑芳; 涂家颖

    2017-01-01

    宗教安全问题主要是由媒介接触而产生的,媒介变革对宗教安全具有重要影响.在工业媒介时代,宗教安全问题被世俗的国家利益冲突所遮蔽,隐匿于传统安全问题之后;随着媒介技术进入电子时代,宗教安全问题开始凸显,并表现以其虚拟化传播,成为非传统安全的重大问题;新世纪以来,媒介进入移动新媒体时代,使宗教安全问题趋于弥散,出现了生活化转向,并分别作用于传统宗教、新兴宗教和带有宗教性质的精神信仰活动.后两者在新媒体上的迅速传播,需要全社会进行持续关注.在中国化进程中积累了相当历史经验的传统宗教应多利用新媒体进行传播,以树立宗教发展中国化的典范意义.%Religious security issues is mainly caused by media contact, and is substantially influenced by media reform.In the era of industrial media, they are obscured by secular national conflicts of interest, and are hidden behind traditional security issues.In the age of electronic media, they began to appear, and were spread through the virtual performance, becoming a major issue of the non-traditional security.In the new century of mobile media era, religious security issues tend to disperse in the everyday life.This shift is applied to traditional religions, emerging religions and spiritual beliefs with religious nature.The rapid spread of the latter two in the new media requires sustained attention from the society, while the traditional religion which has accumulated considerable historical experience should apply more new media in the process of Chinization, so as to establish the exemplary significance of religious development in China.

  12. "If my husband leaves me, I will go home and suffer, so better cling to him and hide this thing": The influence of gender on Option B+ prevention of mother-to-child transmission participation in Malawi and Uganda.

    Science.gov (United States)

    Flax, Valerie L; Yourkavitch, Jennifer; Okello, Elialilia S; Kadzandira, John; Katahoire, Anne Ruhweza; Munthali, Alister C

    2017-01-01

    The role of gender in prevention of mother-to-child transmission (PMTCT) participation under Option B+ has not been adequately studied, but it is critical for reducing losses to follow-up. This study used qualitative methods to examine the interplay of gender and individual, interpersonal, health system, and community factors that contribute to PMTCT participation in Malawi and Uganda. We conducted in-depth interviews with women in PMTCT, women lost to follow-up, government health workers, and stakeholders at organizations supporting PMTCT as well as focus group discussions with men. We analyzed the data using thematic content analysis. We found many similarities in key themes across respondent groups and between the two countries. The main facilitators of PMTCT participation were knowledge of the health benefits of ART, social support, and self-efficacy. The main barriers were fear of HIV disclosure and stigma and lack of social support, male involvement, self-efficacy, and agency. Under Option B+, women learn about their HIV status and start lifelong ART on the same day, before they have a chance to talk to their husbands or families. Respondents explained that very few husbands accompanied their wives to the clinic, because they felt it was a female space and were worried that others would think their wives were controlling them. Many respondents said women fear disclosing, because they fear HIV stigma as well as the risk of divorce and loss of economic support. If women do not disclose, it is difficult for them to participate in PMTCT in secret. If they do disclose, they must abide by their husbands' decisions about their PMTCT participation, and some husbands are unsupportive or actively discouraging. To improve PMTCT participation, Ministries of Health should use evidence-based strategies to address HIV stigma, challenges related to disclosure, insufficient social support and male involvement, and underlying gender inequality.

  13. Variasi Kebugaran Jenis/Strain Trichogramma pada Telur Plutella xylostella (L. (Lepidoptera: Plutellidae

    Directory of Open Access Journals (Sweden)

    Siti Herlinda

    2005-07-01

    Full Text Available Laboratory experiments were conducted to evaluate fitness traits of trichogrammatid species/strains reared on eggs of the diamondback moth, Plutella xylostella (L.. The experiments used eleven trichogrammatid species/strains collected from different host species and locations. They were Trichogrammatoidea cojuangcoi Nagaraja collected from parasitized P. xylostella eggs in Jarai, Muarasiban, Kerinjing, and Bogar, Trichogrammatoidea sp. A and B collected from parasitized Helicoverpa armigera (Hubner eggs in Bogor, Trichogrammatoidea armigera Nagaraja collected from parasitized H. armigera eggs in Bogor, Trichogramma chilonis Ishii, Trichogramma japanicum Ashmead, Trichogramma australicum Girault, and Trichogrammatoidea nana (Zehntner collected from parasitized Chilo sp. eggs in Cinta Manis, South Sumatera. When a female of Trichogramma was constantly exposed to 100 P. xylostella eggs per day throughout her lifetime, T. cojuangcoi from Jarai produced more parasitized host eggs (50.67% and progenies (50.67 adults/female compared to other species/strains. Sex ratio was predominantly female, the most female progenies were produced ( 38 adults/ female by T. cojuangcoi from Jarai. There were no significant differences in larval (0-3.27% and pupal (0-3.75% mortality of all species/strains. Survival emerging adults of T. japanicum (90.24% were significantly lower than those of other species/strains. These data showed that T. cojuangcoi from Jarai could be developed as biocontrol agents of P. xylostella.

  14. 40 CFR 432.102 - Effluent limitations attainable by the application of the best practicable control technology...

    Science.gov (United States)

    2010-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS MEAT... derived for a renderer which does not cure cattle hide. If a renderer does cure cattle hide, the following...

  15. 40 CFR 432.105 - New source performance standards (NSPS).

    Science.gov (United States)

    2010-07-01

    ... GUIDELINES AND STANDARDS MEAT AND POULTRY PRODUCTS POINT SOURCE CATEGORY Renderers § 432.105 New source... renderer that does not cure cattle hide as part of the plant operations. If a renderer does cure hide, the...

  16. The effects of titanium dioxide coatings on light-derived heating and transdermal heat transfer in bovine skin

    NARCIS (Netherlands)

    Bartle, S J; Thomson, D U; Gehring, R; van der Merwe, B. D.

    2017-01-01

    The effects of titanium dioxide coatings of bovine hides on light absorption and transdermal transfer of light-derived heat were investigated. Four hair-on rug hides from Holstein cattle were purchased. Twelve samples about 20 cm on a side were cut from each hide; nine from the black-colored areas,

  17. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity

    NARCIS (Netherlands)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-01-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity

  18. Limb anomaly and associated conditions: our clinical experience

    Directory of Open Access Journals (Sweden)

    Ragavan M

    2011-03-01

    Full Text Available Munisamy Ragavan1, Uppalu Haripriya1, Janarthanam Sarvavinothini2, Nagaraja Rao3, Ramamoorthy Gokulkrishnan31Department of Pediatric Surgery, 2Department of Anesthesia, 3Department of Pediatrics, Narayana Medical College and Superspeciality Hospital, Nellore, Andhra Pradesh, IndiaAbstract: Limb anomalies are a common clinical problem with a various spectrum of involvement. There are many conditions associated with these anomalies. There is a variable extent of involvement in the form of agenesis, overgrowth, and duplication, and there is no standard classification to describe all these lesions. Studying limb anomalies provides insights into limb development which may be useful for etiologic studies and public health monitoring. We pooled our data for 12 limb anomaly cases presenting from January 2008 to May 2009 and investigated their associated conditions. A descriptive system for the nomenclature and classification of congenital limb malformations suitable for clinical, epidemiological, and experimental use is discussed.Keywords: limb anomaly, phocomelia, amelia 

  19. The effects of titanium dioxide coatings on light-derived heating and transdermal heat transfer in bovine skin

    Science.gov (United States)

    Bartle, S. J.; Thomson, D. U.; Gehring, R.; van der Merwe, D.

    2017-11-01

    The effects of titanium dioxide coatings of bovine hides on light absorption and transdermal transfer of light-derived heat were investigated. Four hair-on rug hides from Holstein cattle were purchased. Twelve samples about 20 cm on a side were cut from each hide; nine from the black-colored areas, and three from the white areas. Samples were randomized and assigned to four coating treatments: (1) white hide with no coating (White), (2) black hide with no coating (Black), (3) black hide with 50% coating (Mid), and (4) black hide with 100% coating (High). Coatings were applied to the black hide samples using a hand sprayer. Lux measurements were taken using a modified lux meter at three light intensities generated with a broad spectrum, cold halogen light source. Reflectance over a wavelength range of 380 to 900 nm was measured using a spectroradiometer. The transdermal transfer of heat derived from absorbed light was measured by applying a broad spectrum, cold halogen light source to the stratum corneum (coated) side of the sample and recording the temperature of the dermis-side using a thermal camera for 10 min at 30-s intervals. At the high light level, the White, Black, Mid, and High coating treatments had different ( P 400 to 750 nm), Black hides reflected 10 to 15% of the light energy, hides with the Mid coating treatment reflected 35 to 40%, and hides with the High coating treatment reflected 70 to 80% of the light energy. The natural White hide samples reflected 60 to 80% of the light energy. The average maximum temperatures at the dermis-side of the hides due to transferred heat were 34.5, 70.1, 55.0, and 31.7, for the White, Black, Mid, and High treatments, respectively. Reflective coatings containing titanium dioxide on cattle hides were effective in reducing light energy absorption and reduced light-derived heat transfer from the skin surface to deeper skin layers.

  20. Photokopolimerisasi monomer akrilat degan kulit kras sapi

    Directory of Open Access Journals (Sweden)

    Dwi Wahini Nurhajati

    1997-06-01

    Full Text Available The research on photocopolymerization of acrylate monomer with cow crust hide had object to observe the resulted copolymer onto cow crust hide. Crust hides, saturated with aqueous emulsions containing 25 wt % of n-butyl acrylate (n-BA or tripropylene glycol diacrylate (TPGDA were irradiated by cobalt – 60 gamma rays with doses ranges from 5 to 25 kGy. The irradiated hides were washed with water, dried in air and extracted in soxhlet apparatus for 48 hours to remove homopolymer. The highest yield of photocopolymerization of n – butyl acrylate monomer with crust hides was found 17,7878% at dose 25 kGy, and for photocopolymerization of tripropylene glycol diacrylate with crust hides was found 39,4245% at dose 20 kGy.

  1. Niektóre operacje technologiczne przyczyniające się do powstawania wad i nietrwałości skór wyprawionych (część 2)

    OpenAIRE

    Kozielec, Tomasz

    2011-01-01

    In the second part of the article author focused on descriptions of such processesof hide converting to leather as: liming (treating hide by calcium hydroxide, andsodium sulphide in the form of suspension or mash), unhairing and fleshing(by hand and machine), removing so called “dirts” from hide structure (namelyremains of follicles and hairs, pigments, fats etc) which remained after previouslymentioned processes, deliming (removing of alkaline compounds after theliming process by using of or...

  2. Foreign Banks: Internal Control and Audit Weaknesses in U.S. Branches

    National Research Council Canada - National Science Library

    1997-01-01

    .... Weaknesses in the branch's internal controls, including inadequate segregation of duties in trading and electronic funds transfer activities, had enabled an employee to trade illegally and to hide...

  3. Revelando o vírus, ocultando pessoas: exames de monitoramento (CD4 e CVP e relação médico-paciente no contexto da AIDS Disclosing the virus, hiding the patients: follow-up tests (CD4 and VL and the physician-patient relationship in the AIDS setting

    Directory of Open Access Journals (Sweden)

    Julio L. D. Guzmán

    2009-05-01

    Full Text Available O objetivo deste artigo é discutir os significados associados aos exames de contagem de linfócitos CD4 e quantificação da carga viral plasmática do HIV (CVP para pacientes vivendo com AIDS e médicos da atenção, buscando analisar os reflexos de sua crescente utilização na relação terapêutica. Foi realizado um estudo qualitativo em dois centros de referência em HIV/AIDS com observação participante e entrevistas semi-estruturadas com 27 pacientes vivendo com AIDS e quatro médicos. A observação das consultas médicas mostrou que elas são rápidas, objetivas e centradas no resultado dos exames CD4 e CVP, o que reforça uma visão hegemônica do saber médico e uma perspectiva biomédica que instrumentaliza a sua prática. Para médicos e pacientes, os exames passam a refletir a "verdade" sobre a doença do paciente em detrimento da anamnese e do exame clínico, fato que se reflete na relação terapêutica e na desatenção por parte dos médicos à subjetividade dos pacientes. Mais do que nunca há necessidade da retomada da prática da boa clínica e do reconhecimento do papel do sujeito na prática da medicina como arte de curar.The aim of this study is to discuss the meanings associated with the CD4 lymphocyte count and HIV plasma viral load (VL for patients living with AIDS and the attending physicians, seeking to analyze the impacts of the increasing use of these tests in the treatment setting. A qualitative study was performed in two HIV/AIDS referral centers with participant observation and semi-structured interviews with 27 patients living with AIDS and four physicians. Observation of the medical consultations showed that they are quick, objective, and centered on the CD4 and VL test results, thus reinforcing a hegemonic view of medical knowledge and a biomedical perspective that instrumentalizes their practice. For physicians and patients, the tests tend to reflect the "truth" on the patient's disease, to the detriment of the patient history and clinical examination, impacting the therapeutic relationship and leading to the physician's lack of attention to the patients' subjectivity. More than ever, there is a need to reclaim good clinical practice and acknowledge the subject's role in medical practice as a healing art.

  4. Birth Control Explorer

    Science.gov (United States)

    Menu Sex Ed Ask Us Anything Videos Games & Quizzes Connect Search About Find a Health Center X Sort by Advanced Search Show/Hide Content Types Article Game Poll Q&A Series Quiz Video Leave un-checked to search all types Search Sex Ed by Topic show topics hide topics Birth ...

  5. Elk and mule deer responses to variation in hunting pressure.

    Science.gov (United States)

    Bruce K. Johnson; Alan A. Ager; James H. Noyes; Norm. Cimon

    2004-01-01

    Hunting can exert a variety of effects on both targeted and nontargeted ungulates, and animals either run or hide in response to hunting pressure. If animals successfully elude hunters by running, the energetic cost may deplete fat reserves needed for survival during winter in temperate regions. If animals successfully elude hunters by hiding, there may be an energetic...

  6. 40 CFR 432.107 - Effluent limitations attainable by the application of the best control technology for...

    Science.gov (United States)

    2010-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS MEAT... BOD5 and TSS specified in paragraph (a) of this section were derived for a renderer which does not cure cattle hide. If a renderer does cure hide, the following formulas should be used to calculate BOD5 and...

  7. 40 CFR 425.10 - Applicability; description of the hair pulp, chrome tan, retan-wet finishing subcategory.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING... addition to other unhairing and tanning operation, processes raw or cured cattle or cattle-like hides into finished leather by chemically dissolving the hide hair, chrome tanning, and retan-wet finishing. ...

  8. 40 CFR 425.02 - General definitions.

    Science.gov (United States)

    2010-07-01

    ... STANDARDS LEATHER TANNING AND FINISHING POINT SOURCE CATEGORY General Provisions § 425.02 General...) “Chrome tan” means the process of converting hide into leather using a form of chromium. (g) “Vegetable tan” means the process of converting hides into leather using chemicals either derived from vegetable...

  9. Was it for walrus? Viking Age settlement and medieval walrus ivory trade in Iceland and Greenland

    DEFF Research Database (Denmark)

    Frei, Karin M.; Coutu, Ashley N.; Smiarowski, Konrad

    2015-01-01

    Walrus-tusk ivory and walrus-hide rope were highly desired goods in Viking Age north-west Europe. New finds of walrus bone and ivory in early Viking Age contexts in Iceland are concentrated in the south-west, and suggest extensive exploitation of nearby walrus for meat, hide and ivory during the ...

  10. Defense.gov Special Report: Employer Support Freedom Awards

    Science.gov (United States)

    , asset management and other financial and risk management products and services. Army Reserve Col management." Navy Commander Christopher Myers, U.S. Navy Reserve More More Hide Story Hide Story , offering a wide range of health and wellness products and services incorporating an integrated, holistic

  11. The Estonian president: the Baltics are not afraid of migrants or Russians / Sten Hankewitz

    Index Scriptorium Estoniae

    Hankewitz, Sten A., 1979-

    2016-01-01

    President Kersti Kaljulaidi avalikust vastusest EurActivis ilmunud James Crispi artiklile "The Brief: Europe’s elites rush to hide behind Mutti’s skirts" http://www.euractiv.com/section/all/news/the-brief-europes-elites-rush-to-hide-behind-muttis-skirts/

  12. An ancient Maya ritual cache at Pook's Hill, Belize

    DEFF Research Database (Denmark)

    Stemp, W. James; Braswell, Geoffrey E.; Helmke, Christophe

    2018-01-01

    , the edge and surface wear on most of the used obsidian blades are consistent with other functions, including cutting meat/skin/fresh hide, cutting or sawing wood and dry hide, cutting or sawing other soft and hard materials, and scraping hard materials. Clearly, not all blades from this ritual deposit were...

  13. Tabela de vida de fertilidade de três espécies neotropicais de Trichogrammatidae em ovos de hospedeiros alternativos como critério de seleção hospedeira Fertility life table of three neotropical species of Trichogrammatidae on factitious hosts as a criterion for selection of hosts

    Directory of Open Access Journals (Sweden)

    Nivia da Silva Dias

    2010-03-01

    Full Text Available Tabela de vida de fertilidade de três espécies neotropicais de Trichogrammatidae em ovos de hospedeiros alternativos como critério de seleção hospedeira. O objetivo deste trabalho foi selecionar o hospedeiro alternativo que permita o melhor desenvolvimento das três espécies neotropicais de tricogramatídeos, Trichogramma atopovirilia Oatman & Platner, 1983; Trichogramma bruni Nagaraja, 1983 e Trichogrammatoidea annulata De Santis, 1972, utilizando-se como parâmetro comparativo as tabelas de vida de fertilidade nos respectivos hospedeiros. Foram estimados a duração média de uma geração (T, taxa líquida de reprodução (Ro, razão infinitesimal (r m e a razão finita de aumento (λ. A tabela de vida de fertilidade pode ser utilizada para selecionar o hospedeiro alternativo mais adequado para as espécies de tricogramatídeos. Corcyra cephalonica (Stainton, 1865 (Lepidoptera, Pyralidae foi o hospedeiro alternativo mais adequado para criação de T. annulata e de T. bruni, enquanto que para T. atopovirilia, Anagasta kuehniella (Zeller, 1879 (Lepidoptera, Pyralidae e/ou C. cephalonica foram os hospedeiros mais adequados. Sitotroga cerealella (Olivier, 1819 (Lepidoptera, Gelechiidae apresentou baixa capacidade de aumento populacional para as três espécies de parasitóides, sendo, portanto, uma espécie inadequada como hospedeiro alternativo para as mesmas.The objective of this work was to select the factitious host that permit the best development of three neotropical Trichogrammatidae species, Trichogramma atopovirilia Oatman & Platner, 1983; Trichogramma bruni Nagaraja, 1983, and Trichogrammatoidea annulata De Santis, 1972, using the fertility life table on their respective hosts as a comparative parameter. Mean generation time (T, net reproductive rate (Ro, intrinsic rate of natural increase (r m and the finite rate of increase (λ were estimated. A fertility life table is useful to select the most adequate factitious hosts for the

  14. Evaluación de algunos insecticidas para el control de la «polilla del tomate», Tuta absoluta (Lepidoptera: Gelechiidae y su efecto residual sobre el parasitoide Trichogrammatoidea bactrae (Hymenoptera: Trichogrammatidae Efficacy of insecticides against the «tomato moth», Tuta absoluta (Lepidoptera: Gelechiidae and their residual effects on the parasitoid Trichogrammatoidea bactrae (Hymenoptera: Trichogrammatidae

    Directory of Open Access Journals (Sweden)

    María B. Riquelme Virgala

    2006-12-01

    Full Text Available La «polilla del tomate», Tuta absoluta (Meyrick, es una plaga clave de este cultivo en Argentina. Su manejo integrado debería incluir una selección de productos fitosanitarios que sean eficaces para su control y, al mismo tiempo, selectivos respecto de sus enemigos naturales. El objetivo de este trabajo fue evaluar la capacidad de control de los insecticidas triflumurón, clorfenapir, abamectin y una cepa experimental de Bacillus thuringiensis (Bt sobre la plaga, y el poder residual de los mismos sobre Trichogrammatoidea bactrae Nagaraja. Se registró la mortalidad de la polilla cada cuatro días, desde la aplicación hasta la emergencia de los adultos. El efecto sobre el parasitoide, se evaluó a través del número de huevos parasitados por hembra expuesta durante 48 horas a folíolos tratados, y su mortalidad luego de 1, 3, 7, 14 y 30 días de la pulverización. Todos los productos ocasionaron una mortalidad de T. absoluta mayor al 65% después de 12 días de aplicados. El Bt fue el único insecticida que no afectó la supervivencia y el parasitismo de T. bactrae . Estos resultados aportan información de interés para la selección de plaguicidas, a emplearse en programas de manejo integrado.The «tomato moth», Tuta absoluta (Meyrick is one of the key pests of tomato crops in Argentina. The compatible use of chemical and biological control is the main purpose of integrated pest management. Selective pesticides that can be successfully used to control pest without adverse side effects on natural enemies are highly required. The aim of this work was to evaluate the efficacy of control of T. absoluta and the residual effect on the oophagous parasitoid, Trichogrammatoidea bactrae Nagaraja of the following insecticides: triflumuron, abamectin, chlorfenapyr, and an experimental strain of Bacillus thuringiensis (Bt. Mortality of T. absoluta was evaluated every 4 days from pesticide spraying until adult emergency. The effect of pesticides on

  15. Statistical secrecy and multibit commitments

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Pedersen, Torben P.; Pfitzmann, Birgit

    1998-01-01

    nothing about it. One definition is based on the L1-norm distance between probability distributions, the other on information theory. We prove that the two definitions are essentially equivalent. We also show that statistical counterparts of definitions of computational secrecy are essentially equivalent......We present and compare definitions of "statistically hiding" protocols, and we propose a novel statistically hiding commitment scheme. Informally, a protocol statistically hides a secret if a computationally unlimited adversary who conducts the protocol with the owner of the secret learns almost...... to our main definitions. Commitment schemes are an important cryptologic primitive. Their purpose is to commit one party to a certain value, while hiding this value from the other party until some later time. We present a statistically hiding commitment scheme allowing commitment to many bits...

  16. Molecular spectroscopic study for suggested mechanism of chrome tanned leather

    Science.gov (United States)

    Nashy, Elshahat H. A.; Osman, Osama; Mahmoud, Abdel Aziz; Ibrahim, Medhat

    2012-03-01

    Collagen represents the structural protein of the extracellular matrix, which gives strength of hides and/or skin under tanning process. Chrome tan is the most important tanning agent all over the world. The methods for production of leather evolved over several centuries as art and engineering with little understanding of the underlying science. The present work is devoted to suggest the most probable mechanistic action of chrome tan on hide proteins. First the affect of Cr upon hide protein is indicated by the studied mechanical properties. Then the spectroscopic characterization of the hide protein as well as chrome tanned leather was carried out with Horizontal Attenuated Total Reflection (HATR) FT-IR. The obtained results indicate how the chromium can attached with the active sites of collagen. Molecular modeling confirms that chromium can react with amino as well as carboxylate groups. Four schemes were obtained to describe the possible interactions of chrome tan with hide proteins.

  17. Evaluación de algunos insecticidas para el control de la «polilla del tomate», Tuta absoluta (Lepidoptera: Gelechiidae y su efecto residual sobre el parasitoide Trichogrammatoidea bactrae (Hymenoptera: Trichogrammatidae

    Directory of Open Access Journals (Sweden)

    María B. RIQUELME VIRGALA

    2006-01-01

    Full Text Available La «polilla del tomate», Tuta absoluta (Meyrick, es una plaga clave de este cultivo en Argentina. Su manejo integrado debería incluir una selección de productos fitosanitarios que sean eficaces para su control y, al mismo tiempo, selectivos respecto de sus enemigos naturales. El objetivo de este trabajo fue evaluar la capacidad de control de los insecticidas triflumurón, clorfenapir, abamectin y una cepa experimental de Bacillus thuringiensis (Bt sobre la plaga, y el poder residual de los mismos sobre Trichogrammatoidea bactrae Nagaraja. Se registró la mortalidad de la polilla cada cuatro días, desde la aplicación hasta la emergencia de los adultos. El efecto sobre el parasitoide, se evaluó a través del número de huevos parasitados por hembra expuesta durante 48 horas a folíolos tratados, y su mortalidad luego de 1, 3, 7, 14 y 30 días de la pulverización. Todos los productos ocasionaron una mortalidad de T. absoluta mayor al 65% después de 12 días de aplicados. El Bt fue el único insecticida que no afectó la supervivencia y el parasitismo de T. bactrae . Estos resultados aportan información de interés para la selección de plaguicidas, a emplearse en programas de manejo integrado.

  18. Parasitoid dan Parasitisasi Plutella xylostella (L. (Lepidoptera: Yponomeutidae di Sumatera Selatan

    Directory of Open Access Journals (Sweden)

    SITI HERLINDA

    2005-12-01

    Full Text Available Surveys from May 2003 to January 2004 in South Sumatera were conducted to determine parasitoid attacking Plutella xylostella (L. and to estimate P. xylostella parasitization by the parasitoids. The eggs and the larvae of P. xylostella were collected from brassicaceous crops, i.e. mustard, Indian mustard, and cabbage. Six parasitoids found were Trichogrammatoidea cojuangcoi Nagaraja (Hymenoptera: Trichogrammatidae, Cotesia plutellae (Kurdj. (Hymenoptera: Braconidae, Diadegma semiclausum Hellen (Hymenoptera: Ichneumonidae, Oomyzus sokolowskii (Kurdj. (Hymenoptera: Eulophidae, Tetrastichus (Hymenoptera: Eulophidae, and a ceraphronid wasp (unidentified species. Trichogrammatoidea cojuangcoi parasitized P. xylostella eggs, however, the others parasitized the larvae except the ceraphronid wasp. In South Sumatera, the ceraphronid wasp was reported for the first time parasitizing D. semiclausum pupae, and its parasitization reached 6.2%. Oomyzus sokolowskii and Tetrastichus were found in this area for the first time, as well. In the highland, D. semiclausum was the most abundant compared to the others where its parasitization reached 79.2%. In the lowland P. xylostella larvae was mainly attacked by C. plutellae with the parasitization reaching 64.9% In the dry and rainy seasons, the parasitization was mainly exerted by T. cojuangcoi (77.0% and D. semiclausum (79.2%.

  19. Parasitoid and Parasitization of Plutella xylostella (L. (Lepidoptera: Yponomeutidae in South Sumatera

    Directory of Open Access Journals (Sweden)

    SITI HERLINDA

    2005-12-01

    Full Text Available Surveys from May 2003 to January 2004 in South Sumatera were conducted to determine parasitoid attacking Plutella xylostella (L. and to estimate P. xylostella parasitization by the parasitoids. The eggs and the larvae of P. xylostella were collected from brassicaceous crops, i.e. mustard, Indian mustard, and cabbage. Six parasitoids found were Trichogrammatoidea cojuangcoi Nagaraja (Hymenoptera: Trichogrammatidae, Cotesia plutellae (Kurdj. (Hymenoptera: Braconidae, Diadegma semiclausum Hellen (Hymenoptera: Ichneumonidae, Oomyzus sokolowskii (Kurdj. (Hymenoptera: Eulophidae, Tetrastichus (Hymenoptera: Eulophidae, and a ceraphronid wasp (unidentified species. Trichogrammatoidea cojuangcoi parasitized P. xylostella eggs, however, the others parasitized the larvae except the ceraphronid wasp. In South Sumatera, the ceraphronid wasp was reported for the first time parasitizing D. semiclausum pupae, and its parasitization reached 6.2%. Oomyzus sokolowskii and Tetrastichus were found in this area for the first time, as well. In the highland, D. semiclausum was the most abundant compared to the others where its parasitization reached 79.2%. In the lowland P. xylostella larvae was mainly attacked by C. plutellae with the parasitization reaching 64.9%. In the dry and rainy seasons, the parasitization was mainly exerted by T. cojuangcoi (77.0% and D. semiclausum (79.2%.

  20. Restricted evaluation of Trichodectes canis (Phthiraptera: Trichodectidae detection methods in Alaska gray wolves

    Directory of Open Access Journals (Sweden)

    Theresa M. Woldstad

    2014-12-01

    Full Text Available Trichodectes canis (Phthiraptera: Trichodectidae was first documented on Alaska (USA gray wolves (Canis lupus on the Kenai Peninsula in 1981. In subsequent years, numerous wolves exhibited visually apparent, moderate to severe infestations. Currently, the Alaska Department of Fish and Game utilizes visual inspection, histopathology, and potassium hydroxide (KOH hide digestion for T. canis detection. Our objective was to determine optimal sampling locations for T. canis detection. Wolf hides were subjected to lice enumeration using KOH hide digestion. Thirty nine of the 120 wolves examined had lice. Of these 39, total louse burdens ranged from 14 to an extrapolated 80,000. The hides of 12 infested animals were divided into 10 cm by 10 cm subsections and the lice enumerated on a subsection from each of four regions: neck; shoulder; groin; and rump. Combining the data from these 12 wolves, the highest mean proportions of the total louse burdens on individual wolves were found on the rump and differed significantly from the lowest mean proportion on the neck. However, examination of the four subsections failed to detect all infested wolves. Hides from 16 of the 39 infested animals were cut into left and right sides, and each side then cut into four, approximately equal sections: neck and shoulder; chest; abdomen; and rump. Half hides were totally digested from 11 wolves, and whole hides from 5. For these 21 half hides, the highest mean proportions of total louse burdens were found on the rump, and this section had the highest sensitivity for louse detection, regardless of burden. However, removal of this large section from a hide would likely be opposed by hunters and trappers.

  1. Histogram Modification and Wavelet Transform for High Performance Watermarking

    Directory of Open Access Journals (Sweden)

    Ying-Shen Juang

    2012-01-01

    Full Text Available This paper proposes a reversible watermarking technique for natural images. According to the similarity of neighbor coefficients’ values in wavelet domain, most differences between two adjacent pixels are close to zero. The histogram is built based on these difference statistics. As more peak points can be used for secret data hiding, the hiding capacity is improved compared with those conventional methods. Moreover, as the differences concentricity around zero is improved, the transparency of the host image can be increased. Experimental results and comparison show that the proposed method has both advantages in hiding capacity and transparency.

  2. A new Watermarking System based on Discrete Cosine Transform (DCT) in color biometric images.

    Science.gov (United States)

    Dogan, Sengul; Tuncer, Turker; Avci, Engin; Gulten, Arif

    2012-08-01

    This paper recommend a biometric color images hiding approach An Watermarking System based on Discrete Cosine Transform (DCT), which is used to protect the security and integrity of transmitted biometric color images. Watermarking is a very important hiding information (audio, video, color image, gray image) technique. It is commonly used on digital objects together with the developing technology in the last few years. One of the common methods used for hiding information on image files is DCT method which used in the frequency domain. In this study, DCT methods in order to embed watermark data into face images, without corrupting their features.

  3. Fortify Your Knowledge about Vitamins

    Medline Plus

    Full Text Available ... alcohol or you have liver problems, high cholesterol levels or don't get enough protein. D (calciferol): ... stones, increased iron absorption. Folic Acid (folate): High levels may, especially in older adults, hide signs of ...

  4. 40 CFR 425.40 - Applicability; description of the retan-wet finish-sides subcategory.

    Science.gov (United States)

    2010-07-01

    ... PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING POINT SOURCE... resulting from any tannery which processes previously tanned hides and skins (grain side only) into finished...

  5. 40 CFR 425.35 - Pretreatment standards for existing sources (PSES).

    Science.gov (United States)

    2010-07-01

    ...) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING POINT SOURCE CATEGORY Hair Save or Pulp... subject to this subpart which processes less than 350 hides/day shall comply with § 425.35(a), except that...

  6. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  7. The Linux Operating System

    Indian Academy of Sciences (India)

    of America to exercise control over the production, management and use of information resources by promoting the .... development of stable 'production quality' versions. This ... obscurity', to hide potential security problems from malicious.

  8. 32 CFR 229.3 - Definitions.

    Science.gov (United States)

    2010-07-01

    ..., bone, ivory, shell, metal, wood, hide, feathers, pigments, and flaked, ground, or pecked stone); (iv.../agricultural gardens or fields, bedrock mortars or grinding surfaces, rock alignments, cairns, trails, borrow...

  9. 22 CFR 1104.2 - Definitions.

    Science.gov (United States)

    2010-04-01

    ..., hide, feathers, pigments, and flaked, ground, or pecked stone); (iv) By-products, waste products, or... fields, bedrock mortars or grinding surfaces, rock alignments, cairns, trails, borrow pits, cooking pits...

  10. 18 CFR 1312.3 - Definitions.

    Science.gov (United States)

    2010-04-01

    ..., hide, feathers, pigments, and flaked, ground, or pecked stone); (iv) By-products, waste products, or..., bedrock mortars or grinding surfaces, rock alignments, cairns, trails, borrow pits, cooking pits, refuse...

  11. Game Theory: An Application to Tanners and 'Pomo' Wholesalers in ...

    African Journals Online (AJOL)

    Game Theory: An Application to Tanners and 'Pomo' Wholesalers in Hides Marketing Competition in Nigeria. ... Agricultural economics is an applied social science so game theory was applied practically from a ... AJOL African Journals Online.

  12. Investigating multi-thread utilization as a software defence mechanism against side channel attacks

    CSIR Research Space (South Africa)

    Frieslaar, Ibraheem

    2016-11-01

    Full Text Available out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from...

  13. prevalence of malarial parasites in pregnant women attending sir

    African Journals Online (AJOL)

    DR. AMINU

    Keyword: Prevalence, Malarial Parasite, Pregnant Women, Kano. INTRODUCTION ... protective semi-immunity against plasmodium falciparum is acquired during the first 10-. 15 years of life and .... hiding place for the mosquito? It is therefore ...

  14. Stigma, treatment beliefs, and substance abuse treatment use in ...

    African Journals Online (AJOL)

    with individuals who need help tending to deny or hide their condition for fear ..... Centers for Disease Control and Prevention, Atlanta, Georgia, U. S. A,. 2004. 19. Strauss ... Community based organizations for substance users in Cape Town,.

  15. Role of human Cytomegalovirus in the etiology of nasopharyngeal carcinoma

    Directory of Open Access Journals (Sweden)

    Hussain Gadelkarim Ahmed

    2018-01-01

    Conclusion: The present study has shown a relatively considerable association between HCMV and NPC. The great majority of samples sheltering HCMV were also found to hide EBV, which proposes the potentiality of EBV over HCMV.

  16. Creative Artist 2

    African Journals Online (AJOL)

    Precious

    Between Aidoo's Feminism and Sofola's De-Womanisation: Issues and Perspectives... Imoh Abang ... for the moral and physical strength which the playwright infuses into her major ... through their partnership in Hide and Skin business. But the.

  17. With its magnet rolled back during a shut-down of the Proton Synchrotron in 1969, the body of the 2 m hydrogen bubble chamber becomes visible

    CERN Multimedia

    CERN PhotoLab

    1969-01-01

    The 2 m hydrogen bubble chamber is undergoing modifications during the annual PS shutdown. For this, the two halves of the magnet, which normally hide the chamber, safety tanks, cooling pipes etc, are rolled back.

  18. Nitrogen fixation in Red Sea seagrass meadows

    KAUST Repository

    Abdallah, Malak

    2017-01-01

    Seagrasses are key coastal ecosystems, providing many ecosystem services. Seagrasses increase biodiversity as they provide habitat for a large set of organisms. In addition, their structure provides hiding places to avoid predation. Seagrasses can

  19. Information Technologies for the Control of Money Laundering

    National Research Council Canada - National Science Library

    1995-01-01

    .... It is estimated that $300 billion of dirty money may be laundered each year, its origin and ownership obscured as it passes through financial institutions and across national boundaries in an effort to hide and protect...

  20. Urine drainage bags

    Science.gov (United States)

    Leg bag ... the catheter from your bladder into the leg bag. Your leg bag will be attached to you all day. You ... freely with it. You can hide your leg bag under skirts, dresses, or pants. They come in ...

  1. Bedbugs

    Science.gov (United States)

    ... be linked to: Increased international travel Changes in pest control practices Insecticide resistance Where do they hide? ... of uncleanliness? Bedbugs don't care if their environment is clean or dirty. All they need is ...

  2. 40 CFR 425.50 - Applicability; description of the no beamhouse subcategory.

    Science.gov (United States)

    2010-07-01

    ... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING POINT SOURCE CATEGORY No... cattle hides, sheepskins, or splits (hair previously removed and pickled) into finished leather by chrome or non-chrome tanning, and retan-wet finishing. ...

  3. 40 CFR 425.20 - Applicability; description of the hair save, chrome tan, retan-wet finish subcategory.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING... cattle-like hides into finished leather by hair save unhairing, chrome tanning, and retan-wet finishing. ...

  4. The Myth of "Pop Warner": Carlisle Revisited.

    Science.gov (United States)

    Howell, Reet A; Howell, Maxwell L.

    1978-01-01

    The myth of Pop Warner's sterling character hides the distasteful story behind the closure of Warner's Carlisle School for Indians on the grounds of moral corruption and misuse of athletic funds. (LH)

  5. An application of sparse inversion on the calculation of the inverse data space of geophysical data

    KAUST Repository

    Saragiotis, Christos; Doulgeris, Panagiotis C.; Verschuur, Eric

    2011-01-01

    Multiple reflections as observed in seismic reflection measurements often hide arrivals from the deeper target reflectors and need to be removed. The inverse data space provides a natural separation of primaries and surface-related multiples

  6. Maremoto nell'universo

    CERN Multimedia

    Valsecchi, Maria-Cristina

    2002-01-01

    It seemed only a different signal. But the anomaly, registered both by the Nuclear Physics Institute in Rome and the CERN in Geneva may hide something else: the first disclosure of gravitational waves (4 pages)

  7. KONSEP PENYANDIAN FILE JPEG DENGAN MENGGUNAKAN METODE LSB

    Directory of Open Access Journals (Sweden)

    Haikal Nando Winata

    2017-03-01

    Full Text Available Steganography is a technique to hide text or messages that other people do not know the contents of the text or the secret message. Steganography technique is often used to avoid suspicion and to avoid other people desire to know the contents of the text or the secret message. Digital image is one of the most well-known media and the public by the author. Digital image acts as a medium or a text container you want to hide a secret message. Methods LSB (Least Significant Bit that hides the bytes of text or message you want to hide into the last byte in the digital image. LSB method has the advantage of not changing the size and shape of the digital image by naked eye, text data or messages hidden can be restored without any change in size and shape

  8. Lighthouse Guild

    Science.gov (United States)

    ... Contact Us About Us Programs & Services Health Plans eLearning Vision + Health Donate Need Help? Show Menu Hide ... Find a health plan Coping with vision loss eLearning Support for parents of children with visual impairments ...

  9. Fortify Your Knowledge about Vitamins

    Medline Plus

    Full Text Available ... high cholesterol levels or don't get enough protein. D (calciferol): Nausea, vomiting, poor appetite, constipation, weakness, ... in older adults, hide signs of B-12 deficiency, a condition that can cause nerve damage Taking ...

  10. Tanzania's Revealed Comparative Advantage and Structural ...

    African Journals Online (AJOL)

    example, the contribution from vegetable products fell by 7%, and that from textiles .... 43 -‐ Furskins and artificial fur, manufactures thereof ... example, while Tanzania has comparative advantage in raw hides and skins (see Figure 6), it.

  11. Middleware Platform Management based on Portable Interceptors

    NARCIS (Netherlands)

    Kath, O.; van Halteren, Aart; Stoinski, F.; Wegdam, M.; Fisher, M.; Ambler, A.; Calo, S.B.; Kar, G.

    2000-01-01

    Object middleware is an enabling technology for distributed applications that are required to operate in heterogeneous computing and communication environments. Although hiding distribution aspects to application designers proves beneficial, in an operational environment system managers may need

  12. EPA-Registered Bed Bug Products

    Science.gov (United States)

    ... rest or hide in hampers, bed frames, even furniture); Failing to treat adjacent areas where bed bugs ... to work (some pesticides, such as desiccators or growth regulators, may be very effective but take some ...

  13. Fortify Your Knowledge about Vitamins

    Medline Plus

    Full Text Available ... from a varied diet. If you are an older adult, have dark skin, or are exposed to insufficient ... Folic Acid (folate): High levels may, especially in older adults, hide signs of B-12 deficiency, a condition ...

  14. Opening Up Architectures of Software-Intensive Systems: A First Prototype Implementation

    National Research Council Canada - National Science Library

    Charland, Philippe; Dessureault, Dany; Ouellet, David; Lizotte, Michel

    2007-01-01

    .... One approach to deal with this problem is information hiding. This technical memorandum presents a prototype which implements this technique to reverse engineer dynamic models from Java software systems...

  15. Actuators for smart applications

    NARCIS (Netherlands)

    Paternoster, Alexandre; de Boer, Andries; Loendersloot, Richard; Akkerman, Remko; D. Brei,; M. Frecker,

    2010-01-01

    Actuator manufacturers are developing promising technologies which meet high requirements in performance, weight and power consumption. Conventionally, actuators are characterized by their displacement and load performance. This hides the dynamic aspects of those actuation solutions. Work per weight

  16. Reverse engineering the world: a commentary on Hoffman, Singh, and Prakash, "The interface theory of perception".

    Science.gov (United States)

    Fields, Chris

    2015-12-01

    Does perception hide the truth? Information theory, computer science, and quantum theory all suggest that the answer is "yes." They suggest, indeed, that useful perception is only feasible because the truth can be hidden.

  17. Dynamic analyses, FPGA implementation and engineering ...

    Indian Academy of Sciences (India)

    QIANG LAI

    2017-12-14

    Dec 14, 2017 ... the model of the generalised Sprott C system and anal- yses its equilibria. ..... the Matlab simulations. ... RNG design processes are given in Algorithm 1 as the ... RNG applications (simulation, modelling, arts, data hiding ...

  18. Force Protection in Urban and Unconventional Environments

    National Research Council Canada - National Science Library

    Gold, Theodore; Hartzog, William

    2006-01-01

    ...; the same populace that adaptive enemies attempt to hide within. While its subject is force protection, the task force has little to say about armor, fences, portals, and other defensive measures...

  19. Plaadid / Mart Normet

    Index Scriptorium Estoniae

    Normet, Mart, 1979-

    2005-01-01

    Uutest heliplaatidest Black Rebel Motorcycle Club "HOWL", The gathering "Accessories", Joshua redman Elastic Band "Momentum", The Rasmus "Hide From The Sun", Nihilistikrypt "Required Sacrifices", "Gasolina - 100% Reggaeton", Bond "Explosive: The Best of Bond"

  20. When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

    KAUST Repository

    Liu, Xiao; Liu, An; Zhang, Xiangliang; Li, Zhixu; Liu, Guanfeng; Zhao, Lei; Zhou, Xiaofang

    2017-01-01

    result. However, none is designed for both hiding users’ private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP

  1. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  2. Liaudiškieji žaliaminės odos išdirbimo būdai: savitumai ir etnokultūrinės sąveikos

    OpenAIRE

    Morkūnienė, Janina

    2001-01-01

    The subject of the article is folk methods of dressing raw hide in Lithuania and their analysis. The article aims on the basis of ethnographic literature and data from ethnographic expeditions of 1992-1998 collected by the author from all ethnic regions of Lithuania to analyze folk methods of dressing raw hide, their occurrence, used technique and technology, their particularities and to compare interaction of analyzed realities with analogous phenomena in neighbouring countries. The dressing...

  3. Pembuatan kulit tahan air untuk bagian atas sepatu

    OpenAIRE

    Suliestiyah Wiryodiningrat

    2008-01-01

    The aim of research non manufacturing of waterproof leather for shoe upper is to find the best formula in producing waterproof cow hide leather for shoe uppers. Today, the tanners trying their best effort to fulfill the shoes. The research used salted raw cow hide 18 sides were utilized. Leather treatment process begining with soaking stage up to tanning stage and using the same formula in each treatment. In the fatliquoring stage, the treatment varied in the number of fatliquoring chemical m...

  4. Pembuatan Kulit Tahan Air Untuk Bagian Atas Sepatu

    OpenAIRE

    Wiryodiningrat, Suliestiyah

    2008-01-01

    The aim of research non manufacturing of waterproof leather for shoe upper is to find the best formula in producing waterproof cow hide leather for shoe uppers. Today, the tanners trying their best effort to fulfill the shoes. The research used salted raw cow hide 18 sides were utilized. Leather treatment process begining with soaking stage up to tanning stage and using the same formula in each treatment. In the fatliquoring stage, the treatment varied in the number of fatliquoring chemical m...

  5. Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory

    Science.gov (United States)

    de Paor, A. M.

    Hide (Nonlinear Processes in Geophysics, 1998) has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ɛ has the value 1 is proved via the Popov theorem from feedback system stability theory.

  6. Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory

    OpenAIRE

    A. M. de Paor

    1998-01-01

    International audience; Hide (Nonlinear Processes in Geophysics, 1998) has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ? has the value 1 is proved via ...

  7. Ownership structure and earnings management

    DEFF Research Database (Denmark)

    Farooq, Omar; El Jai, Hind

    2012-01-01

    Does poor legal protection of minority shareholders provide enough incentives for majority shareholders to expropriate minority shareholders and hide their unscrupulous behavior through accounting manipulations? This paper attempts to study the effect of ownership structure (ownership of the larg......Does poor legal protection of minority shareholders provide enough incentives for majority shareholders to expropriate minority shareholders and hide their unscrupulous behavior through accounting manipulations? This paper attempts to study the effect of ownership structure (ownership...

  8. Using of Hyperbranched Poly(amidoamine) as Pretanning Agent for Leather

    OpenAIRE

    Ibrahim, Amal Amin; Youssef, Moshera S. A.; Nashy, El-Shahat H. A.; Eissa, Mohamed M.

    2013-01-01

    Although chrome is considered as the major tanning agent in the production of all types of hides and leather worldwide, it represents a serious source of environmental pollution. Therefore, polyamidoamine hyperbranched polymer (HPAM) was involved in pretanning of the depickled hides to enhance the chromium uptake during the tanning process. The key parameters which affect the exhaustion and fixation of chrome tan including shrinkage temperature of the tanned leather were studied. The results ...

  9. Tail position affects the body temperature of rats during cold exposure in a low-energy state.

    Science.gov (United States)

    Uchida, Yuki; Tokizawa, Ken; Nakamura, Mayumi; Lin, Cheng-Hsien; Nagashima, Kei

    2012-02-01

    Rats place their tails underneath their body trunks when cold (tail-hiding behavior). The aim of the present study was to determine whether this behavior is necessary to maintain body temperature. Male Wistar rats were divided into 'fed' and '42-h fasting' groups. A one-piece tail holder (8.4 cm in length) that prevented the tail-hiding behavior or a three-piece tail holder (2.8 cm in length) that allowed for the tail-hiding behavior was attached to the tails of the rats. The rats were exposed to 27°C for 180 min or to 20°C for 90 min followed by 15°C for 90 min with continuous body temperature and oxygen consumption measurements. Body temperature decreased by -1.0 ± 0.1°C at 15°C only in the rats that prevented tail-hiding behavior of the 42-h fasting group, and oxygen consumption increased at 15°C in all animals. Oxygen consumption was not different between the rats that prevented tail-hiding behavior and the rats that allowed the behavior in the fed and 42-h fasting groups under ambient conditions. These results show that the tail-hiding behavior is involved in thermoregulation in the cold in fasting rats.

  10. EFFICIENT ADAPTIVE STEGANOGRAPHY FOR COLOR IMAGESBASED ON LSBMR ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. Sharmila

    2012-02-01

    Full Text Available Steganography is the art of hiding the fact that communication is taking place, by hiding information in other medium. Many different carrier file formats can be used, but digital images are the most popular because of their frequent use on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques. The Least Significant Bit (LSB based approach is a simplest type of steganographic algorithm. In all the existing approaches, the decision of choosing the region within a cover image is performed without considering the relationship between image content and the size of secret message. Thus, the plain regions in the cover will be ruin after data hiding even at a low data rate. Hence choosing the edge region for data hiding will be a solution. Many algorithms are deal with edges in images for data hiding. The Paper 'Edge adaptive image steganography based on LSBMR algorithm' is a LSB steganography presented the results of algorithms on gray-scale images only. This paper presents the results of analyzing the performance of edge adaptive steganography for colored images (JPEG. The algorithms have been slightly modified for colored image implementation and are compared on the basis of evaluation parameters like peak signal noise ratio (PSNR and mean square error (MSE. This method can select the edge region depending on the length of secret message and difference between two consecutive bits in the cover image. For length of message is short, only small edge regions are utilized while on leaving other region as such. When the data rate increases, more regions can be used adaptively for data hiding by adjusting the parameters. Besides this, the message is encrypted using efficient cryptographic algorithm which further increases the security.

  11. The effect of fatigue on the corrosion resistance of common medical alloys.

    Science.gov (United States)

    Di Prima, Matthew; Gutierrez, Erick; Weaver, Jason D

    2017-10-01

    The effect of mechanical fatigue on the corrosion resistance of medical devices has been a concern for devices that experience significant fatigue during their lifespan and devices made from metallic alloys. The Food and Drug Administration had recommended in some instances for corrosion testing to be performed on post-fatigued devices [Non-clinical tests and recommended labeling for intravascular stents and associated delivery systems: guidance for industry and FDA staff. 2005: Food and Drug Administration, Center for Devices and Radiological Health], although the need for this has been debated [Nagaraja S, et al., J Biomed Mater Res Part B: Appl Biomater 2016, 8.] This study seeks to evaluate the effect of fatigue on the corrosion resistance of 5 different materials commonly used in medical devices: 316 LVM stainless steel, MP35N cobalt chromium, electropolished nitinol, mechanically polished nitinol, and black oxide nitinol. Prior to corrosion testing per ASTM F2129, wires of each alloy were split into subgroups and subjected to either nothing (that is, as received); high strain fatigue for less than 8 min; short-term phosphate buffered saline (PBS) soak for less than 8 min; low strain fatigue for 8 days; or long-term PBS soak for 8 days. Results from corrosion testing showed that the rest potential trended to an equilibrium potential with increasing time in PBS and that there was no statistical (p > 0.05) difference in breakdown potential between the fatigued and matching PBS soak groups for 9 out of 10 test conditions. Our results suggest that under these nonfretting conditions, corrosion susceptibility as measured by breakdown potential per ASTM F2129 was unaffected by the fatigue condition. 2016 Wiley Periodicals, Inc. J Biomed Mater Res Part B: Appl Biomater, 105B: 2019-2026, 2017. Published 2016. This article is a U.S. Government work and is in the public domain in the USA.

  12. Morphology of the leather defect light flecks and spots.

    Science.gov (United States)

    Nafstad, O; Wisløff, H; Grønstøl, H

    2001-01-01

    The skin histology and the scanning electron microscope morphology of the hide defect light flecks and spots after tanning were studied in 11 steers infested with biting lice (Damalinia bovis). Nine steers from herds free of lice were used as controls. Skin biopsies from 6 of the animals in the lice infested group showed mild to moderate hyperkeratosis and moderate perivascular to diffuse dermatitis with infiltration of mainly mononuclear cells and some eosinophilic granulocytes. The steers were slaughtered at an age of 18 to 23 months. Light flecks and spots occurred on all examined hides from the infested group after tanning. No examined hides from the control group demonstrated similar damage. Both light microscopic examination of sections of tanned hide with light flecks and spots and scanning electron microscopy of the same defects showed superficial grain loss and craters with a irregular fibre base encircled by smooth and intact grain. The association between louse infestation at an early age and damage of hides following slaughter 6 to 15 months later, suggested that louse infestations lead to a prolonged or lifelong weakening in the dermis. This weakening may cause superficial grain loss during the tanning process.

  13. Morphology of the Leather Defect Light Flecks and Spots

    Directory of Open Access Journals (Sweden)

    Grønstøl H

    2001-03-01

    Full Text Available The skin histology and the scanning electron microscope morphology of the hide defect light flecks and spots after tanning were studied in 11 steers infested with biting lice (Damalinia bovis. Nine steers from herds free of lice were used as controls. Skin biopsies from 6 of the animals in the lice infested group showed mild to moderate hyperkeratosis and moderate perivascular to diffuse dermatitis with infiltration of mainly mononuclear cells and some eosinophilic granulocytes. The steers were slaughtered at an age of 18 to 23 months. Light flecks and spots occurred on all examined hides from the infested group after tanning. No examined hides from the control group demonstrated similar damage. Both light microscopic examination of sections of tanned hide with light flecks and spots and scanning electron microscopy of the same defects showed superficial grain loss and craters with a irregular fibre base encircled by smooth and intact grain. The association between louse infestation at an early age and damage of hides following slaughter 6 to 15 months later, suggested that louse infestations lead to a prolonged or lifelong weakening in the dermis. This weakening may cause superficial grain loss during the tanning process.

  14. [The zoological garden of Amsterdam Natura Artis Magistra during world War II].

    Science.gov (United States)

    Frankenhuis, Maarten Th

    2009-01-01

    Thanks to the wise management of its director, dr. Armand Sunier, and his team, 'Artis' survived the difficult war period without great losses of its animals and only material damage to some buildings. Artis has meant very much for the inhabitants of the city of Amsterdam during the war. In the first place for the employees and their families, that were kept for starvation and forced labour by extra rations of food and safe hiding places. But also for jewish persons in hiding, who could escape from a certain death by hiding in animal houses or other buildings in the garden. And also for hundreds of thousands people of Amsterdam who found in their zoological garden an oasis of relaxation in a town full of threat and violence.

  15. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    Science.gov (United States)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  16. Pemanfaatan kulit skrotom sapi sebagai bahan baku industri barang kuli

    Directory of Open Access Journals (Sweden)

    Muchtar Lutfi

    1999-12-01

    Full Text Available The aim of the research was to make use of cow scrotum hides to be raw material in leathergood manufacturing. Forty five pieces of scrotum hides were tanned to crust leather using subsequently 6%, 8% and 10% mineral tanning agent; 15%, 20% and 25% vegetable tanning agent; 15%, 20% and 25% synthetic tanning agent. The physical test results indicated that scrotum cow hides were able to be made use as raw material in leathergood manufacturing. The best tensile strength value was achieved by those tanned with mineral tanning agent 10% (175,33 kg/cm2 and the best elongation at break was achieved by those tanned with synthetic tanning agent 15% (41,00%. Where as by using vegetable tanning agent, no single sample fulfilled the requirements of SNI. 06-0253-1989, Quality and Testing method for Glaced Kid Leather.

  17. An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution

    Science.gov (United States)

    Chadha, Ankit; Satam, Neha; Sood, Rakshak; Bade, Dattatray

    2013-09-01

    In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) both are used. All the results displayed prove to be time-efficient and effective. Also the algorithm is tested for various numbers of bits. For those values of bits, Mean Square Error (MSE) and Peak-Signal-to-Noise-Ratio (PSNR) are calculated and plotted. Experimental results show that the stego-image is visually indistinguishable from the original cover-image when nsteganography process does not reveal presence of any hidden message, thus qualifying the criteria of imperceptible message.

  18. Mini review : Pengolahan kerupuk “Rambak” kulit di Indonesia

    Directory of Open Access Journals (Sweden)

    Dedes Amertaningtyas

    2011-12-01

    Full Text Available ABSTRACT: Hide a waste product of animal slaughter house is still can be utilized as food in the form of cracker. Cattle, buffalo, rabbit, chicken shank and fish skin can be used of raw materials for cracker production. This process include hide selection, washing, immersing, liming, deliming, boiling, cutting, immersing in sauce, drying and frying. In Indonesia, the skin cracker industriesare consentralised in certain area of west, central and east java provinces where Sumatra skin cracker are popular knows as “ kerupuk jangek”. Although skin cracker have a high protein content, however its quality are low comparedto other meat processed products. The most dominant amino acid in this product is glycine. Some important issues such as it is not recommended for people suffering uric acid, addition of harmfull additives i.e. formalin and borax, containg chrome which originated from hide prosessing industry and unreligion system of slaughtering (is not halal. Key words: waste product, skin animal, rambak cracker.

  19. Prevalence of Escherichia coli O157:H7 and Salmonella in camels, cattle, goats, and sheep harvested for meat in Riyadh.

    Science.gov (United States)

    Bosilevac, Joseph M; Gassem, Mustafa A; Al Sheddy, Ibraheem A; Almaiman, Salah A; Al-Mohizea, Ibrahim S; Alowaimer, Abdullah; Koohmaraie, Mohammad

    2015-01-01

    Escherichia coli O157:H7 and Salmonella are significant foodborne pathogens that can be found in the feces and on the hides of meat animals. When hides are removed during the harvest process, the carcass and subsequent meat products can become contaminated. Camels, cattle, sheep, and goats are harvested for meat in Riyadh, Saudi Arabia. The prevalence of E. coli O157:H7 and Salmonella are unknown in these animals, and it is assumed that if the animals carry the pathogens in their feces or on their hides, meat products are likely to become contaminated. To this end, a minimum of 206 samples each from hides and feces of camels, cattle, goats, and sheep were collected over the course of 8 months and tested for E. coli O157:H7 and Salmonella. It was found that E. coli O157:H7 was present in feces (10.7, 1.4, 2.4, and 2.4%) and on hides (17.9, 8.2, 2.9, and 9.2%) of cattle, goats, camels, and sheep, respectively. The prevalence of Salmonella was 11.2, 13.5, 23.2, and 18.8% in feces and 80.2, 51.2 67.6, and 60.2% on hides of cattle, goats, camels, and sheep, respectively. The prevalence of E coli O157:H7 was nearly zero in all samples collected in June and July, while Salmonella did not exhibit any seasonal variation. These results constitute the first comprehensive study of E. coli O157:H7 and Salmonella prevalence in Saudi Arabian meat animals at harvest.

  20. Developing a Hypercard-UNIX Interface for Electronic Mail Transfer

    Science.gov (United States)

    1992-06-01

    My thanks to Greqg for his support. Many of the comments for -- the MacTCP version are his. His code is set ,%ppart by borders. on openStacK put the...HUES-ModemVersion......- *-*-*-* STACK SCRIPTi "-*-*-* on openStack put the seconds into card fid theTime of card interface hide menubar global...34Loqin" hide fid receiving put empty into cd tia msqname of card theoessaqe end openStack on closeStack global logoutme put eqFpty into card fld text of

  1. Dirty Secrets: How Tax Havens Destroy the Economy

    OpenAIRE

    Murphy, R.

    2017-01-01

    What happens when the rich are allowed to hide their money in tax havens, and what we should do about it\\ud The Panama Papers were a reminder of how the superrich are allowed to hide their wealth from the rest of us. Dirty Secrets uncovers the extent of the corruption behind this crisis and shows what needs to be done in the face of this unregulated spread of rampant greed.\\ud \\ud Tax havens, we are often told, are part of the global architecture of capitalism, providing a freedom from regula...

  2. Using of Hyperbranched Poly(amidoamine as Pretanning Agent for Leather

    Directory of Open Access Journals (Sweden)

    Amal Amin Ibrahim

    2013-01-01

    Full Text Available Although chrome is considered as the major tanning agent in the production of all types of hides and leather worldwide, it represents a serious source of environmental pollution. Therefore, polyamidoamine hyperbranched polymer (HPAM was involved in pretanning of the depickled hides to enhance the chromium uptake during the tanning process. The key parameters which affect the exhaustion and fixation of chrome tan including shrinkage temperature of the tanned leather were studied. The results showed a significant improvement in the chrome exhaustion, the shrinkage temperature, and the texture and softness of the leather treated by HPAM.

  3. Towards zero solid waste: utilising tannery waste as a protein source for poultry feed

    OpenAIRE

    Paul, Hiralal; Antunes, A Paula M; Covington, Anthony D; Evans, Paul; Phillips, Paul S

    2013-01-01

    Zero waste is now a strongly emerging issue for sustainable industrial development where minimisation and utilisation of waste are a priority in the leather industry. In a tannery hides and skins converted in to leather through various processes. Approximately 20% (w/w) of the chrome containing tannery solid waste (TSW) is generated from one tonne of raw hides and skins. However, tannery solid waste may also be a resource if it is managed expertly as we move towards zero waste.\\ud This resear...

  4. On the Complexity of Computing Optimal Private Park-and-Ride Plans

    DEFF Research Database (Denmark)

    Olsen, Martin

    2013-01-01

    or size of the parties inputs. This is despite the fact that in many cases the size of a party’s input can be confidential. The reason for this omission seems to have been the folklore belief that, as with encryption, it is impossible to carry out non-trivial secure computation while hiding the size...... that the folklore belief may not be fully accurate. In this work, we initiate a theoretical study of input-size hiding secure computation, and focus on the two-party case. We present definitions for this task, and deal with the subtleties that arise in the setting where there is no a priori polynomial bound...

  5. Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory

    Directory of Open Access Journals (Sweden)

    A. M. de Paor

    1998-01-01

    Full Text Available Hide (Nonlinear Processes in Geophysics, 1998 has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ε has the value 1 is proved via the Popov theorem from feedback system stability theory.

  6. Psychosocial work environment exposures as risk factors for long-term sickness absence among Danish employees: results from DWECS/DREAM

    DEFF Research Database (Denmark)

    Lund, Thomas; Labriola, Merete; Christensen, Karl Bang

    2005-01-01

    and followed up during the proceeding 1.5 years regarding onset of long-term sickness absence. RESULTS: Long-term sickness absence among female employees was associated with role conflict, low reward, and poor management quality. Demands for hiding emotions and high emotional demands predicted long......-term sickness absence among men. No significant interactions between psychosocial and physical exposures were found for female or male employees. CONCLUSIONS: The study suggests a potential for reducing long-term sickness absence through interventions targeted toward reducing role conflict, and improving reward...... and management quality among female employees, and through reducing emotional demands and demands for hiding emotions among male employees....

  7. How does co-product handling affect the carbon footprint of milk? Case study of milk production in New Zealand and Sweden

    DEFF Research Database (Denmark)

    Flysjö, Anna Maria; Cederberg, Christel; Henriksson, Maria

    2011-01-01

    Purpose This paper investigates different methodologies of handling co-products in life cycle assessment (LCA) or carbon footprint (CF) studies. Co-product handling can have a significant effect on final LCA/CF results, and although there are guidelines on the preferred order for different methods...... (when slaughtered), calves, manure, hides, etc., the environmental burden (here GHG emissions) must be distributed between these outputs (in the present study no emissions are attributed to hides specifically, or to manure which is recycled on-farm). Different methodologically approaches, (1) system...

  8. Esibire o nascondere? Osservazioni sulla citazione nel “Furioso”

    Directory of Open Access Journals (Sweden)

    Maria Cristina Cabani

    2013-06-01

    Full Text Available Starting by remarking that Ariosto programmatically avoids mentioning his models, this essay endeavours to clarify Ariosto’s attitude (displaying or hiding? towards the Vernacular auctoritates (first of all, Dante and Petrarca, and to understand the reasons why he is so reluctant to mention his models – indeed, much more reluctant in comparison with the sixteenth-century common practice. Ariosto likes hiding rather than exhibiting, as he does not believe in the concept of auctoritas per se; above all, he denies the possibility of predominance of a single voice over the others.

  9. Teen Suicide

    Science.gov (United States)

    ... episodes, or a mix of both types. Some teens will try to hide depression or thoughts of suicide. They might withdraw, or act out. This can ... teen depression? What should I do if my teen is depressed? Did I do ... antidepressants cause suicide? Once my teenager is treated for suicide or ...

  10. 75 FR 10186 - Beauveria bassiana HF23; Amendment of Exemption from the Requirement of a Tolerance

    Science.gov (United States)

    2010-03-05

    ... and hides from livestock during dressing operations and meat and poultry preparation. These measures..., poultry, eggs, or other products derived from chickens or livestock present in such facilities. In... meat, milk, poultry, eggs, or other products derived from chickens or livestock, the Agency has...

  11. Will They Report It? Ethical Attitude of Graduate Software Engineers in Reporting Bad News

    Science.gov (United States)

    Sajeev, A. S. M.; Crnkovic, Ivica

    2012-01-01

    Hiding critical information has resulted in disastrous failures of some major software projects. This paper investigates, using a subset of Keil's test, how graduates (70% of them with work experience) from different cultural backgrounds who are enrolled in a postgraduate course on global software development would handle negative information that…

  12. Architectural Survey at Joint Base Langley-Eustis of Fort Eustis Buildings and Structures Built 1946-1975: Volume 2 (Inventory Forms)

    Science.gov (United States)

    2015-12-01

    three large vertical sections of the wall are tan brick laid in a running bond. Two of the vertical sections frame the entry, while the third is located...the exception of one detail on the south elevation. A portion of the south elevation is designed as a perforated brick wall enclosure to hide

  13. Chromium removal from tanning industries effluents

    International Nuclear Information System (INIS)

    Chaudry, M.A.; Ahmad, S.

    1997-01-01

    Air and water are the basic needs of human being and other living entities on the earth. Tanning industry uses water and some chemicals and so creates environmental problems, depending basically on two principal sources, hide and water. The processes of tanning are based on chromium sulphate and vegetable treatment of hide. According to the national environmental quality standards (NEQS) the effluent or disposed water should contain phenol less than 0.5 ppm, Cr, sulphates, chloride and other salts content. About 30-40 liters of water are used to process one Kg of raw hide into finished goods. Total installed capacity of hides and skins chrome tanning is 53.5 million square meter, earning a large amount of foreign exchange for our country. In the present work, seven tanning industries effluents from the suburbs of Multan city have been collected and analysed. The pH of the liquors have been found to vary from 2.72 to 4.4 and the constituent Cr have been found to be from zero to 8000 ppm from vegetable to chrome tanning industrial effluents studied. The stages involved in tanning and treatment of the effluent water waste including chemical treatment of Cr has been described with a special reference to supported liquid membranes process for removal of chromium ions. (author)

  14. Secure Location Provenance for Mobile Devices

    Science.gov (United States)

    2015-07-01

    A malicious user should not be able to hide a temporary off-track movement from the claimed location provenance. • A malicious user may want to...Seltzer, “Provenance-aware storage systems,” in Proc. of USENIX ATC. USENIX Association, May 2006, pp. 43–56. [48] D. Bhagwat, L. Chiticariu, W.-C. Tan

  15. The use of poultry dejections for the reduction of the environmental impact

    International Nuclear Information System (INIS)

    Dall'Ara, Alice; Sangiorgi Sergio; La Peruta, Maria Teresa

    2015-01-01

    The use of livestock products such as poultry dejections, contained in the manure of poultry farming in substitution of chemical formulations, generates economic benefits but above all of environmental impact. Subject of this paper is the use of poultry manure in the cycle of tanning hides and in the production of fertilizers. [it

  16. The use of the droppings for the reduction environmental impact

    International Nuclear Information System (INIS)

    Dall'Ara, Alice; Sangiorgi, Sergio

    2015-01-01

    The use of by-products of livestock such as poultry manure, obtained from the manure of poultry farming, in substitution of chemical formulations, generates benefits of economic nature but especially impact environmental. Subject of this paper is the use manure in the cycle of tanning hides and that of the production of fertilizers. [it

  17. “Omega-team is Moving to Another Premise over My Dead Body…”

    DEFF Research Database (Denmark)

    Hekkala, Riitta; Stein, Mari-Klara; Rossi, Matti

    2014-01-01

    ', 'forbidding', 'hiding', and 'criticizing' emerging – each with their own characteristic linguistic moves and material objects mediating the practices. Each of these practices circulates power through what can be called ‘power-resistance’ cycles – in short, the same practice may be harnessed for achieving one...

  18. 40 CFR 425.60 - Applicability; description of the through-the-blue subcategory.

    Science.gov (United States)

    2010-07-01

    ... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING POINT SOURCE CATEGORY... processes raw or cured cattle or cattle-like hides through the blue tanned state by hair pulp unhairing and chrome tanning; no retan-wet finishing is performed. ...

  19. Ecology and conservation of lynx in the United States

    Science.gov (United States)

    Leonard F. Ruggiero; Keith B. Aubry; Steven W. Buskirk; Gary M. Koehler; Charles J. Krebs; Kevin S. McKelvey; John R. Squires

    1999-01-01

    Once found throughout the Rocky Mountains and forests of the northern states, the lynx now hides in pockets of its former range while feeding mostly on small animals like snowshoe hares. A team of government and university scientists review the newest scientific knowledge of this unique cat's history, distribution, and ecology. The chapters on this web site...

  20. Recognition of In-Vehicle Group Activities (iVGA): Phase-I, Feasibility Study

    Science.gov (United States)

    2014-08-27

    the driver is either adjusting his/her eyeglasses , adjusting his/her makeup, or possibly attempt to hiding his/her face from getting recognized. In... bearing of the biological states. Arms in extended configuration typically require more energy for their control and hence a tiring kinematic

  1. Rhetorical Effects of Grammar

    NARCIS (Netherlands)

    Leeuwen, van M.

    2012-01-01

    In the analysis of political discourse, relatively sparse attention is paid to grammatical phenomena. As far as grammatical phenomena are analyzed, the focus is generally on linguistic means that can be used to hide agency, like nominalization and passivization, or on transitivity analysis. In this

  2. Brief Report: Sensitivity of Children with Autism Spectrum Disorders to Face Appearance in Selective Trust

    Science.gov (United States)

    Li, Pengli; Zhang, Chunhua; Yi, Li

    2016-01-01

    The current study examined how children with Autism Spectrum Disorders (ASD) could selectively trust others based on three facial cues: the face race, attractiveness, and trustworthiness. In a computer-based hide-and-seek game, two face images, which differed significantly in one of the three facial cues, were presented as two cues for selective…

  3. Algorithms for boundary detection in radiographic images

    International Nuclear Information System (INIS)

    Gonzaga, Adilson; Franca, Celso Aparecido de

    1996-01-01

    Edge detecting techniques applied to radiographic digital images are discussed. Some algorithms have been implemented and the results are displayed to enhance boundary or hide details. An algorithm applied in a pre processed image with contrast enhanced is proposed and the results are discussed

  4. Effect of heat stress on six beef breeds in the Zastron district: The ...

    African Journals Online (AJOL)

    A study was done to determine which factors had the greatest influence on a heifer's susceptibility to heat stress. Parameters tested were breed, coat colour, coat score, hide thickness, weight gain, respiration rate and body condition score. The study was conducted in the southeastern Free State. Afrikaner, Bonsmara ...

  5. Policy-Aware Sender Anonymity in Location-Based Services

    Science.gov (United States)

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  6. Escape from Metaignorance: How Children Develop an Understanding of Their Own Lack of Knowledge

    Science.gov (United States)

    Rohwer, Michael; Kloo, Daniela; Perner, Josef

    2012-01-01

    Previous research yielded conflicting results about when children can accurately assess their epistemic states in different hiding tasks. In Experiment 1, ninety-two 3- to 7-year-olds were either shown which object was hidden inside a box, were totally ignorant about what it could be, or were presented with two objects one of which was being put…

  7. Superspace

    International Nuclear Information System (INIS)

    Gates, V.; Kangaroo, E.; Roachcock, M.; Gall, W.C.

    1985-01-01

    We prove, once and for all, that people who don't use superspace are really out of it. This includes QCDers, who always either wave their hands or gamble with lettuce (Monte Zuma calculations). Besides, all nonsupersymmetric theories have divergences which lead to problems with things like renormalons, instantons anomalons, and other phenomenons. Also, they can't hide from gravity forever. (orig.)

  8. By Force or by Fraud: Optimizing U.S. Information Strategy With Deception

    Science.gov (United States)

    2016-06-01

    WITH DECEPTION Ryan Q. Flaherty Major, United States Army B.S., Sacred Heart University, 2001 M.B.A., Sacred Heart University, 2004...to hide their religious agenda of establishing an Islamic Republic under the cloak of Lebanese nationalism.163 B. UNITY OF EFFORT State Unity of

  9. Preparation of nonwoven and green composites from tannery solid wastes

    Science.gov (United States)

    The disposal of solid wastes, such as trimmings and splits generated in various manufacturing processes in a tannery, is a serious challenge to the hides and leather industries. Our effort to address this challenge is to develop new uses and novel biobased products from solid wastes to improve prosp...

  10. 9 CFR 311.29 - Unborn and stillborn animals.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Unborn and stillborn animals. 311.29 Section 311.29 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE... Unborn and stillborn animals. All unborn and stillborn animals shall be condemned and no hide or skin...

  11. “GOBERNANZA” y “GOBERNANZA EN SALUD”: ¿UNA NUEVA FORMA DE PRIVATIZAR EL PODER POLÍTICO?

    Directory of Open Access Journals (Sweden)

    María De Ortuzar

    2015-02-01

    health” (III. My general hypothesis is the following one: under the global speech of the governance he hides the appellant attacks to the Welfare State, promoting a model of efficiency that reduces the power of the distributive State to minimal State, generating major inequality for asymmetries of power

  12. [Papaver bracteatum, influence of cold treatment and cloning on Thebaine content of the capsules.].

    Science.gov (United States)

    Bastart-Malsot, M; Paris, M

    1982-05-01

    A high heterogeneity of thébaïne yields is revealed in capsules of plants obtained from seeds cultivated in a phytotron. Clonage methods could be used to perform culture. Heterogeneity of plants hides influence of low temperature on thebaïne production. With clone this influence appears to be slight but appreciable.

  13. Subliminal Messages in Advertising.

    Science.gov (United States)

    Olson, Miles C.

    The technique of subliminal information giving has been considerably broadened in recent years so that magazine ads now employ it by carefully hiding images where they are not usually perceived with the conscious eye. In his recent book, "Subliminal Seduction: Ad Media's Manipulation of a Not So Innocent America," Wilson B. Key…

  14. A rare case of Cystic artery arising from Gastroduodenal artery ...

    African Journals Online (AJOL)

    The tortuous cystic artery arose outside hepatobiliary triangle, crossed the common bile duct anteriorly and was lying anterior to the cystic duct hiding it from view. On reaching the neck of gall bladder, it again travelled for short distance before its termination. The non-peritonealised surface of the gall bladder was receiving ...

  15. Student production: making a realistic stereo CG short film in six months

    Science.gov (United States)

    Ramasamy, Celambarasan

    2010-02-01

    This paper breaks down the R&D and production challenges faced on a stereoscopic CG short film that was developed on a six month time budget. Using this film as an example, the manner in which technical innovation and story telling techniques can be used to emphasize the strengths and hide the weaknesses of a limited timeframe student production is discussed.

  16. School Phobia

    Science.gov (United States)

    Tyrrell, Maureen

    2005-01-01

    School phobia is a serious disorder affecting up to 5% of elementary and middle school children. Long-term consequences include academic failure, diminished peer relationships, parental conflict, and development of additional psychiatric disorders. Hiding behind such common physical symptoms as headaches, stomachaches, and fatigue, school phobia…

  17. Customisation of Indico pages - Layout and Menus

    CERN Multimedia

    CERN. Geneva; Ferreira, Pedro

    2017-01-01

    In this tutorial you are going to learn how to customize the layout of your Indico pages (for example you can change the color of the background images or change the logo) and the menus on your Indico pages  (for example you can add or hide certain blocks, or change their name and order).  

  18. Experience of stigma and discrimination and the implications for ...

    African Journals Online (AJOL)

    Background: Stigma and discrimination can limit access to care and treatment services. Stigma hides HIV from the public, resulting in reduced pressure for behavioral change. For effective behavior change, empirically grounded and theory-based behavioral change approaches are fundamental as a prevention ...

  19. Ethnography and organizational processes

    NARCIS (Netherlands)

    van Hulst, M..; Ybema, S.B.; Yanow, D.; Tsoukas, H.; Langley, A.

    2017-01-01

    In recent decades, organizational scholars have set out to explore the processual character of organizations. They have investigated both the overtly ephemeral and sometimes dramatically unstable aspects of contemporary organizing and the social flux and flow of everyday organizing hiding beneath

  20. 78 FR 34131 - Notice of Intent To Repatriate Cultural Items: U.S. Department of Agriculture, Forest Service...

    Science.gov (United States)

    2013-06-06

    ..., USDA Forest Service Law Enforcement seized a hide robe from Flora's daughter that had been collected by Flora at the Falls Creek Rock Shelters. Subsequently, in 2009, Bureau of Land Management Law Enforcement..., Cambridge, MA, and by the University of Colorado Museum of Natural History, Boulder, CO. In February 2009...