WorldWideScience

Sample records for hiding shishir nagaraja

  1. Short term preservation of hide using vacuum: influence on properties of hide and of processed leather.

    Science.gov (United States)

    Gudro, Ilze; Valeika, Virgilijus; Sirvaitytė, Justa

    2014-01-01

    The objective of this work was to investigate vacuum influence on hide preservation time and how it affects hide structure. It was established that vacuum prolongs the storage time without hide tissue putrefaction up to 21 days when the storage temperature is 4°C. The microorganisms act for all storage times, but the action is weak and has no observable influence on the quality of hide during the time period mentioned. The hide shrinkage temperature decrease is negligible, which shows that breaking of intermolecular bonds does not occur. Optical microscopy, infrared spectroscopy and differential scanning calorimetry also did not show any structural changes which can influence the quality of leather produced from such hide. The qualitative indexes of wet blue processed under laboratory conditions and of leather produced during industrial trials are presented. Indexes such as chromium compounds exhaustion, content of chromium in leather, content of soluble matter in dichloromethane, strength properties, and shrinkage temperature were determined. Properties of the leather produced from vacuumed hide under industrial conditions conformed to the requirements of shoe upper leather.

  2. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  3. Image hiding using optical interference

    Science.gov (United States)

    Zhang, Yan; Wang, Weining

    2010-09-01

    Optical image encryption technology has attracted a lot of attentions due to its large capacitance and fast speed. In conventional image encryption methods, the random phase masks are used as encryption keys to encode the images into white noise distribution. Therefore, this kind of methods requires interference technology to record complex amplitude and is vulnerable to attack techniques. The image hiding methods which employ the phase retrieve algorithm to encode the images into two or more phase masks are proposed, the hiding process is carried out within a computer using iterative algorithm. But the iterative algorithms are time consumed. All method mentioned above are based on the optical diffraction of the phase masks. In this presentation, a new optical image hiding method based on optical interference is proposed. The coherence lights which pass through two phase masks are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are design analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the novelty of the new proposed methods. This method can be expanded for double images hiding.

  4. Hackers in Hiding:

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2016-01-01

    On several occasions Michel Foucault advocated a methodological turn towards what he called a ‘happy positivism’. Foucault’s emphasis on the surface does not deny the importance of structures of hiding, but understands it as a game in which the structures of hiding are viewed as contingently given....... In this paper, I will analyse the conflict between the hacker movement and the field of corporate interests. I argue that the introduction of graphical user interfaces and the maintaining of copyright interests are the contingent background of the ongoing conflict. By bracketing the analyses of hidden...

  5. Optical image hiding based on interference

    Science.gov (United States)

    Zhang, Yan; Wang, Bo

    2009-11-01

    Optical image processing has been paid a lot of attentions recently due to its large capacitance and fast speed. Many image encryption and hiding technologies have been proposed based on the optical technology. In conventional image encryption methods, the random phase masks are usually used as encryption keys to encode the images into random white noise distribution. However, this kind of methods requires interference technology such as holography to record complex amplitude. Furthermore, it is vulnerable to attack techniques. The image hiding methods employ the phase retrieve algorithm to encode the images into two or more phase masks. The hiding process is carried out within a computer and the images are reconstructed optically. But the iterative algorithms need a lot of time to hide the image into the masks. All methods mentioned above are based on the optical diffraction of the phase masks. In this presentation, we will propose a new optical image hiding method based on interference. The coherence lights pass through two phase masks and are combined by a beam splitter. Two beams interfere with each other and the desired image appears at the pre-designed plane. Two phase distribution masks are designed analytically; therefore, the hiding speed can be obviously improved. Simulation results are carried out to demonstrate the validity of the new proposed methods.

  6. Selective Redundancy Removal: A Framework for Data Hiding

    Directory of Open Access Journals (Sweden)

    Ugo Fiore

    2010-02-01

    Full Text Available Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs. Such redundancy may be removed by means of optimization software. Redundancy removal, if applied selectively, enables information hiding. This work introduces Selective Redundancy Removal (SRR as a framework for hiding data. An example application of the framework is given in terms of hiding information in HTML documents. Non-uniformity across documents may raise alarms. Nevertheless, selective application of optimization techniques might be due to the legitimate use of optimization software not supporting all the optimization methods, or configured to not use all of them.

  7. Optical hiding with visual cryptography

    Science.gov (United States)

    Shi, Yishi; Yang, Xiubo

    2017-11-01

    We propose an optical hiding method based on visual cryptography. In the hiding process, we convert the secret information into a set of fabricated phase-keys, which are completely independent of each other, intensity-detected-proof and image-covered, leading to the high security. During the extraction process, the covered phase-keys are illuminated with laser beams and then incoherently superimposed to extract the hidden information directly by human vision, without complicated optical implementations and any additional computation, resulting in the convenience of extraction. Also, the phase-keys are manufactured as the diffractive optical elements that are robust to the attacks, such as the blocking and the phase-noise. Optical experiments verify that the high security, the easy extraction and the strong robustness are all obtainable in the visual-cryptography-based optical hiding.

  8. Biological studies on Trichogrammatoidea bactrae Nagaraja (Hymenoptera: Trichogrammatidae), egg parasitoid of Tuta absoluta Meyrick (Lepidoptera: Gelechiidae)

    Energy Technology Data Exchange (ETDEWEB)

    Virgala, Maria B. Riquelme, E-mail: mbriquelme@cnia.inta.gov.a [Universidade Nacional de Lujan, Buenos Aires (Argentina). Lab. de Zoologia Agricola; Botto, Eduardo N., E-mail: enbotto@cnia.inta.gov.a [Instituto de Microbiologia y Zoologia Agricola (IMYZA), Buenos Aires (Argentina)

    2010-07-15

    The tomato moth, Tuta absoluta Meyrick, is one of the most important tomato pests in South America. In Argentina, management strategies include only chemical control. In this work, the parasitoid wasp Trichogrammatoidea bactrae Nagaraja was evaluated as a potential natural enemy against this pest. Biological and population parameters were estimated by developing a life table under laboratory conditions at 25 {+-} 1 degree C, 14:10 photo period and 60 {+-} 10% RH. Three cohorts of 26-30 T. bactrae females each were placed with one of the three following treatments: 1 - Sitotroga cerealella (Olivier) eggs on a piece of cardboard; 2 - S. cerealella eggs on a piece of tomato leaf, and 3- T. absoluta eggs on a piece on tomato leaf. The following parameters were estimated for each cohort: survival (egg to adult), longevity, fecundity and oviposition period of females, sex proportion of the F1, net rate of reproduction (Ro), mean generation time (T) and intrinsic rate of population increase (rm). Survival of the T. bactrae immature was higher than 90% on both, S. cerealella and T. absoluta eggs. The female survival curves corresponded to type III and showed no significant differences among treatments. The three cohorts did not show significant differences between sex ratio, female longevity, oviposition period, fecundity and the population parameters studied. These results indicate that T. bactrae would be a potential biological control agent of T. absoluta. (author)

  9. Recent Advances in Information Hiding and Applications

    CERN Document Server

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao

    2013-01-01

    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  10. Efficient Information Hiding Based on Theory of Numbers

    Directory of Open Access Journals (Sweden)

    Yanjun Liu

    2018-01-01

    Full Text Available Data hiding is an efficient technique that conceals secret data into a digital medium. In 2006, Zhang and Wang proposed a data hiding scheme called exploiting modification direction (EMD which has become a milestone in the field of data hiding. In recent years, many EMD-type data hiding schemes have been developed, but their embedding capacity remains restricted. In this paper, a novel data hiding scheme based on the combination of Chinese remainder theorem (CRT and a new extraction function is proposed. By the proposed scheme, the cover image is divided into non-overlapping pixel groups for embedding to increase the embedding capacity. Experimental results show that the embedding capacity of the proposed scheme is significantly higher (greater than 2.5 bpp than previously proposed schemes while ensuring very good visual quality of the stego image. In addition, security analysis is given to show that the proposed scheme can resist visual attack.

  11. Alkali-free method of hide preparation for tanning

    Directory of Open Access Journals (Sweden)

    V. Valeika

    2012-06-01

    Full Text Available Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming up to strongly acid (pickling. This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. During both processes, unhairing and oxidative treatment, the opening of the derma structure occurs: 13.3-14.6g of non-collagen proteins are removed and amount of dermatan sulphate decreases by 35%. The hide obtained can be chromed directly after the above processes and subsequent treatment with sodium chloride solution omitted conventional pickling. The pH of the hide varies in the range of 8.3-3.7 during the processes of preparation for tanning.

  12. Alkali-free method of hide preparation for tanning

    OpenAIRE

    Valeika, V.; Beleska, K.; Sirvaityte, J.

    2012-01-01

    Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming) up to strongly acid (pickling). This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. D...

  13. An Image Encryption Method Based on Bit Plane Hiding Technology

    Institute of Scientific and Technical Information of China (English)

    LIU Bin; LI Zhitang; TU Hao

    2006-01-01

    A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane of several different open images. And then a new hiding image is acquired by a nesting "Exclusive-OR" operation on those images obtained from the first step. At last, by employing image fusion technique, the final hiding result is achieved. The experimental result shows that the method proposed in this paper is effective.

  14. Children and Robots Learning to Play Hide and Seek

    National Research Council Canada - National Science Library

    Trafton, J. G; Schultz, Alan C; Perznowski, Dennis; Bugajska, Magdalena D; Adams, William; Cassimatis, Nicholas L; Brock, Derek P

    2006-01-01

    ...., containment, under) and use that information to play a credible game of hide and seek. They model this hypothesis within the ACT-R cognitive architecture and put the model on a robot, which is able to mimic the child's hiding behavior. They also take the "hiding" model and use it as the basis for a "seeking" model. They suggest that using the same representations and procedures that a person uses allows better interaction between the human and robotic system.

  15. Effect of Some Sudanese Traditional Hot Iron Branding on Cattle Hide Quality

    Directory of Open Access Journals (Sweden)

    Rehab Eltejani Abdelkarim

    2016-12-01

    Full Text Available This study was designed in order to assess and evaluate the effect of hot iron branding on cattle hide quality. 62 shapes of hot iron branding were detected and classified. Branding damage was evaluated depending on: purpose of application, location in the animal body, branding area, tribe which applied and hide degree. The results showed that, Baggara tribes branding were causing the greater damage on cattle hides; where 71.4% of its brands placed in the abdominal and animal back area (middle of the hide; in proportion to Misseriya Zuraq tribes (68.4%. According to the location of branding, the less tribe that causing damages to the cattle hides were Darfur tribes (14.3%. In terms of branding area Darfur tribes were causing the most branding damages where 42.8% of its brands on cattle hides were between 20-30cm, followed by Baggara tribes where 57.1% of its brands were between 10-20cm then Misseriya Zuraq tribes by 52.6%, and finally North Kordofan tribes of 37.5%. grading of cattle hides depending on the presence of the brand marks the study revealed that, Misseriya Zuraq tribe's brands were obtained the highest percentage (89.4% of the rejected hides (Scarto= 4 and 5 grades, when compared with North Kordofan tribes (87.5%. For commercial reason brand's were mostly done in the area of 5-10cm but, their effect on cattle hide quality was greater, where 81% of the hides were classified as Scarto.

  16. Mechanical properties of biobased films prepared from collagen solutions derived from bovine hides

    Science.gov (United States)

    The most valuable byproducts of the meat packing industry are hides. The U.S. is the world’s 3rd largest hide producing country and currently produces approximately 35 million cattle hides annually. Due to fierce competition in global markets, the American leather and hides industry is facing chal...

  17. Reflections on Quantum Data Hiding

    Science.gov (United States)

    Winter, Andreas

    Quantum data hiding, originally invented as a limitation on local operations and classical communications (LOCC) in distinguishing globally orthogonal states, is actually a phenomenon arising generically in statistics whenever comparing a `strong' set of measurements (i.e., decision rules) with a `weak' one. The classical statistical analogue of this would be secret sharing, in which two perfectly distinguishable multi-partite hypotheses appear to be indistinguishable when accessing only a marginal. The quantum versions are richer in that for example LOCC allows for state tomography, so the states cannot be come perfectly indistinguishable but only nearly so, and hence the question is one of efficiency. I will discuss two concrete examples and associated sets of problems: 1. Gaussian operations and classical computation (GOCC): Not very surprisingly, GOCC cannot distinguish optimally even two coherent states of a single mode. Here we find states, each a mixture of multi-mode coherent states, which are almost perfectly distinguishable by suitable measurements, by when restricted to GOCC, i.e. linear optics and post-processing, the states appear almost identical. The construction is random and relies on coding arguments. Open questions include whether there one can give a constructive version of the argument, and whether for instance even thermal states can be used, or how efficient the hiding is. 2. Local operation and classical communication (LOCC): It is well-known that in a bipartite dxd-system, asymptotically logd bits can be hidden. Here we show for the first time, using the calculus of min-entropies, that this is asymptotically optimal. In fact, we get bounds on the data hiding capacity of any preparation system; these are however not always tight. While it is known that data hiding by separable states is possible (i.e. the state preparation can be done by LOCC), it is open whether the optimal information efficiency of (asymptotically) log d bits can be

  18. Perception of Stakeholders to the Proposed Ban on Cow Hide ...

    African Journals Online (AJOL)

    User

    Keywords: Cow hide consumption, cow hide value chain, ponmo .... value chain;. 2. identify sources of information of the respondents on the proposed ban; ..... the health risk associated with the consumption of ponmo may favour its proposed.

  19. Efficient hiding of confidential high-utility itemsets with minimal side effects

    Science.gov (United States)

    Lin, Jerry Chun-Wei; Hong, Tzung-Pei; Fournier-Viger, Philippe; Liu, Qiankun; Wong, Jia-Wei; Zhan, Justin

    2017-11-01

    Privacy preserving data mining (PPDM) is an emerging research problem that has become critical in the last decades. PPDM consists of hiding sensitive information to ensure that it cannot be discovered by data mining algorithms. Several PPDM algorithms have been developed. Most of them are designed for hiding sensitive frequent itemsets or association rules. Hiding sensitive information in a database can have several side effects such as hiding other non-sensitive information and introducing redundant information. Finding the set of itemsets or transactions to be sanitised that minimises side effects is an NP-hard problem. In this paper, a genetic algorithm (GA) using transaction deletion is designed to hide sensitive high-utility itemsets for PPUM. A flexible fitness function with three adjustable weights is used to evaluate the goodness of each chromosome for hiding sensitive high-utility itemsets. To speed up the evolution process, the pre-large concept is adopted in the designed algorithm. It reduces the number of database scans required for verifying the goodness of an evaluated chromosome. Substantial experiments are conducted to compare the performance of the designed GA approach (with/without the pre-large concept), with a GA-based approach relying on transaction insertion and a non-evolutionary algorithm, in terms of execution time, side effects, database integrity and utility integrity. Results demonstrate that the proposed algorithm hides sensitive high-utility itemsets with fewer side effects than previous studies, while preserving high database and utility integrity.

  20. Sensitive plant (Mimosa pudica hiding time depends on individual and state

    Directory of Open Access Journals (Sweden)

    Sarah Reed-Guy

    2017-07-01

    Full Text Available The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  1. Intersectional Analysis in Critical Mathematics Education Research: A Response to Figure Hiding

    Science.gov (United States)

    Bullock, Erika C.

    2018-01-01

    In this chapter, I use figure hiding as a metaphor representing the processes of exclusion and suppression that critical mathematics education (CME) seeks to address. Figure hiding renders identities and modes of thought in mathematics education and mathematics education research invisible. CME has a commitment to addressing figure hiding by…

  2. Perspective taking and theory of mind in hide and seek.

    Science.gov (United States)

    Street, Chris N H; Bischof, Walter F; Kingstone, Alan

    2018-01-01

    Does theory of mind play a significant role in where people choose to hide an item or where they search for an item that has been hidden? Adapting Anderson's "Hide-Find Paradigm" Anderson et al. (Action, Perception and Performance, 76, 907-913, 2014) participants viewed homogenous or popout visual arrays on a touchscreen table. Their task was to indicate where in the array they would hide an item, or to search for an item that had been hidden, by either a friend or a foe. Critically, participants believed that their sitting location at the touchtable was the same as-or opposite to-their partner's location. Replicating Anderson et al., participants tended to (1) select items nearer to themselves on homogenous displays, and this bias was stronger for a friend than foe; and (2) select popout items, and again, more for a friend than foe. These biases were observed only when participants believed that they shared the same physical perspective as their partner. Collectively, the data indicate that theory of mind plays a significant role in hiding and finding, and demonstrate that the hide-find paradigm is a powerful tool for investigating theory of mind in adults.

  3. Dynamics and driving forces of hides, skins, leather and leather ...

    African Journals Online (AJOL)

    Footwear and leather goods are constrained by lack of factories, competition from used goods, synthetic plastics and uninformed market. Investment in hides, skins and leather industry supported by training programmes has potential to generate great monetary revenue. Keywords: Hides, skin, leather, value chain, slaughter ...

  4. Effects of dehydration methods on characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  5. Market structure and performance of value chain actors in hides and ...

    African Journals Online (AJOL)

    Market structure and performance of value chain actors in hides and skins processing and marketing in Nigeria. ... There was high performance in hides and skins processing and marketing in Nigeria. ... EMAIL FULL TEXT EMAIL FULL TEXT

  6. Information hiding techniques for steganography and digital watermarking

    CERN Document Server

    Katzenbeisser, Stefan

    2000-01-01

    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  7. Family networks and income hiding

    NARCIS (Netherlands)

    Beekman, Gonne; Gatto, Marcel; Nillesen, Eleonora

    2015-01-01

    This study investigates the relationship between family network density and income hiding in rural Liberia. We link people's behaviour in a modified lottery experiment and a time preference game to detailed information about their family networks. We find that individuals with a dense family

  8. Wrapped up in Covers: Preschoolers' Secrets and Secret Hiding Places

    Science.gov (United States)

    Corson, Kimberly; Colwell, Malinda J.; Bell, Nancy J.; Trejos-Castillo, Elizabeth

    2014-01-01

    In this qualitative study, interviews about children's secret hiding places were conducted with 3-5-year-olds (n?=?17) in a university sponsored preschool programme using art narratives. Since prior studies indicate that children understand the concept of a secret as early as five and that they associate secrets with hiding places, the purpose of…

  9. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization

    Science.gov (United States)

    Bajaj, Ruchika; Bedi, Punam; Pal, S. K.

    Steganography is an art of hiding information in such a way that prevents the detection of hidden messages. Besides security of data, the quantity of data that can be hidden in a single cover medium, is also very important. We present a secure data hiding scheme with high embedding capacity for messages of variable length based on Particle Swarm Optimization. This technique gives the best pixel positions in the cover image, which can be used to hide the secret data. In the proposed scheme, k bits of the secret message are substituted into k least significant bits of the image pixel, where k varies from 1 to 4 depending on the message length. The proposed scheme is tested and results compared with simple LSB substitution, uniform 4-bit LSB hiding (with PSO) for the test images Nature, Baboon, Lena and Kitty. The experimental study confirms that the proposed method achieves high data hiding capacity and maintains imperceptibility and minimizes the distortion between the cover image and the obtained stego image.

  10. Effects of dehydration methods on the characteristics of fibrous networks from un-tanned hides

    Science.gov (United States)

    To improve prospective markets and to secure a viable future for the hides and leather industries, it is important to develop new uses and novel biobased products from hides. We hypothesize collagen fiber networks derived from un-tanned hides can be utilized to prepare high performance green compos...

  11. Information hiding technique

    Science.gov (United States)

    Younger, Michael; Budulas, Peter P.; Young, Stuart H.

    2002-08-01

    Spread spectrum communication techniques have been recognized as a viable method to gain an advantage in interference environments. Many military-oriented systems have been initiated, and some civil systems have been attempted. Spread spectrum allows the ability to hide the signal of interest below or in the noise floor, so as not to be detected. A spread spectrum system is one in which the transmitted signal is spread over a wide frequency band, much wider, in fact, than the minimum bandwidth required to transmit the information being sent. We at Army Research Lab (ARL) are proposing using the same technique on the Internet with port hopping. The information would be transmitted in data packets over multiple ports. The port used would vary per packet or per session basis. This port hopping gives you and the recipients the ability to take datagram's and spread them out over a multitude of ports. This will hide information among the Internet noise. This will allow trusted communications between the transmitter and receiver because of the port coding sequence. There are 64K possible ports to span datagram. Jamming of transmission would be limiting the ability of the sniffer/listener. Also, the listener will find it difficult to use a man in the middle attach, since the data will be spread over multiple ports and only the receiver and transmitter will know the specific port sequencing for the datagram.

  12. Succession of hide-seek and pursuit-evasion at heterogeneous locations.

    Science.gov (United States)

    Gal, Shmuel; Casas, Jérôme

    2014-05-06

    Many interactions between searching agents and their elusive targets are composed of a succession of steps, whether in the context of immune systems, predation or counterterrorism. In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit-escape. Our aim is to link these two processes, usually analysed separately and with different models, in a single game theory context. We define a matrix game in which a searcher looks at a fixed number of discrete locations only once each searching for a hider, which can escape with varying probabilities according to its location. The value of the game is the overall probability of capture after k looks. The optimal search and hide strategies are described. If a searcher looks only once into any of the locations, an optimal hider chooses it's hiding place so as to make all locations equally attractive. This optimal strategy remains true as long as the number of looks is below an easily calculated threshold; however, above this threshold, the optimal position for the hider is where it has the highest probability of escaping once spotted.

  13. An evaluation of selected methods for the decontamination of cattle hides prior to skinning.

    Science.gov (United States)

    Small, A; Wells-Burr, B; Buncic, S

    2005-02-01

    The effectiveness of different decontamination treatments in reducing microbial loads on cattle hides was assessed. The 10-s hide treatments were conducted using a wet-and-dry vacuum cleaner filled with one of the liquids (heated to 50 °C) indicated below, followed or not by 10-min drying in the air. Also, the hide was clipped, followed or not by 10-s singeing using a hand-held blowtorch. Before and after each decontamination treatment, the hide was sampled (100 cm(2) areas) by a sponge-swabbing method to compare the total viable counts of bacteria (TVC). The largest bacterial reduction (Psanitizer solution (10% Betane Plus) resulted in significant reductions of 1.80 (Peffects. Since hide contamination is associated with microbial contamination of the carcasses, the results indicate that post-killing/pre-skinning hide decontamination (used alone, or in combination with carcass decontamination) has a potential to improve microbial meat safety. Nevertheless, further research is required to optimise the efficacy of these treatments in the reduction of specific pathogens under commercial conditions.

  14. Understanding Information Hiding in iOS

    OpenAIRE

    Caviglione, Luca; Mazurczyk, Wojciech

    2014-01-01

    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  15. Reversible data hiding for image based on histogram modification of wavelet coefficients

    NARCIS (Netherlands)

    Liang, Xiaoping; Wu, Xiaoyun; Huang, Jiwu; Hao, Y.; Liu, J.; Wang, Y.; Cheung, Y.; Yin, H.; Jiao, L.; Ma, J.; Jiao, Y.C.

    2005-01-01

    Reversible data hiding has drawn intensive attention recently. Reversibility means to embed data into digital media and restore the original media from marked media losslessly. Reversible data hiding technique is desired in sensitive applications that require no permanent loss of signal fidelity. In

  16. Hiding and Searching Strategies of Adult Humans in a Virtual and a Real-Space Room

    Science.gov (United States)

    Talbot, Katherine J.; Legge, Eric L. G.; Bulitko, Vadim; Spetch, Marcia L.

    2009-01-01

    Adults searched for or cached three objects in nine hiding locations in a virtual room or a real-space room. In both rooms, the locations selected by participants differed systematically between searching and hiding. Specifically, participants moved farther from origin and dispersed their choices more when hiding objects than when searching for…

  17. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  18. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Directory of Open Access Journals (Sweden)

    Andreas Wilke

    Full Text Available Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  19. Unitary embedding for data hiding with the SVD

    Science.gov (United States)

    Bergman, Clifford; Davidson, Jennifer

    2005-03-01

    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  20. Multiple-image hiding using super resolution reconstruction in high-frequency domains

    Science.gov (United States)

    Li, Xiao-Wei; Zhao, Wu-Xiang; Wang, Jun; Wang, Qiong-Hua

    2017-12-01

    In this paper, a robust multiple-image hiding method using the computer-generated integral imaging and the modified super-resolution reconstruction algorithm is proposed. In our work, the host image is first transformed into frequency domains by cellular automata (CA), to assure the quality of the stego-image, the secret images are embedded into the CA high-frequency domains. The proposed method has the following advantages: (1) robustness to geometric attacks because of the memory-distributed property of elemental images, (2) increasing quality of the reconstructed secret images as the scheme utilizes the modified super-resolution reconstruction algorithm. The simulation results show that the proposed multiple-image hiding method outperforms other similar hiding methods and is robust to some geometric attacks, e.g., Gaussian noise and JPEG compression attacks.

  1. An information hiding method based on LSB and tent chaotic map

    Science.gov (United States)

    Song, Jianhua; Ding, Qun

    2011-06-01

    In order to protect information security more effectively, a novel information hiding method based on LSB and Tent chaotic map was proposed, first the secret message is Tent chaotic encrypted, and then LSB steganography is executed for the encrypted message in the cover-image. Compared to the traditional image information hiding method, the simulation results indicate that the method greatly improved in imperceptibility and security, and acquired good results.

  2. Hiding levitating objects above a ground plane

    DEFF Research Database (Denmark)

    Zhang, Jingjing; Luo, Yu; Mortensen, Asger

    2010-01-01

    An approach to hiding objects levitating above a conducting sheet is suggested in this paper. The proposed device makes use of isotropic negative-refractive-index materials without extreme material parameters, and creates an illusion of a remote conducting sheet. Numerical simulations are perform...

  3. A method for removing adobe-type manure from hides using an oxidizing agent

    Science.gov (United States)

    Adobe-type (hardened) manure attached to bovine hair is a major source of meat contamination, hide quality deterioration, and devalued leather products. Therefore, it is important to develop cleaning solutions that can rapidly remove adobe-type manure to improve the quality of hides delivered to tan...

  4. Motivation to hide emotion and children's understanding of the distinction between real and apparent emotions.

    Science.gov (United States)

    Gosselin, Pierre; Warren, Madeleine; Diotte, Michèle

    2002-12-01

    The authors investigated the extent to which children's understanding of the distinction between real and apparent emotions varied according to the motivation to hide emotions. Children, aged 6-7 and 10-11 years, were read stories designed to elicit either prosocial or self-protective motivated display rules and were asked to predict the facial expressions the protagonists would make to hide felt emotions. Children were found to understand the distinction between real and apparent emotions very well, independently of the type of motivation. Contrary to predictions, boys understood this distinction better than did girls when the motivation to hide positive emotions was prosocial. Children perceived neutralization as the most appropriate strategy to hide felt emotions, followed by masking.

  5. Probability of error in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2007-01-01

    Randomized protocols for hiding private information can fruitfully be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the

  6. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: RVO:67985998 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  7. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    Directory of Open Access Journals (Sweden)

    HAMAD, S.

    2014-05-01

    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  8. Hiding information in open auctions with jump bids

    Czech Academy of Sciences Publication Activity Database

    Ettinger, D.; Michelucci, Fabio

    2016-01-01

    Roč. 126, č. 594 (2016), s. 1484-1502 ISSN 0013-0133 Institutional support: PRVOUK-P23 Keywords : hiding information * open auctions * jump bids Subject RIV: AH - Economics Impact factor: 2.608, year: 2016

  9. The Costs of Hiding and Faking Emotions: The Case of Extraverts and Introverts.

    Science.gov (United States)

    Seger-Guttmann, Tali; Medler-Liraz, Hana

    2016-01-01

    The present study examined the moderation effects of extraversion on the relationships between hiding and faking emotions, perceived satisfaction from intimate relationships, and reported physical health concerns. Four hundred and four Israeli participants, who were all involved in intimate relationships at the time of the study, responded to the Extraversion scale from the Big-Five Inventory, the DEELS to measure hiding and faking emotions, the SELF to assess physical health concerns, and the short version of the ENRICH to evaluate perceived satisfaction with intimate relationships. The mean age was 32.3 years (SD = 8.2); and the average length of time as a couple was 7.8 years (SD = 8.2). Of the participants, 198 were married (48.5%). The findings indicate that the effect of hiding negative emotions was stronger for perceived satisfaction with intimate relationships and physical health concerns than that for faking positive emotions. Extraverts who showed a higher frequency of hiding their negative emotions were significantly less satisfied with their relationships than introverts and they also tended to report more concerns with their physical health. These results were not found when extraverts reported a high frequency of faking positive emotions. These results are discussed in the context of the trait-behavior-concordance model and stress the importance of distinguishing faking from hiding.

  10. Data Hiding Based on a Two-Layer Turtle Shell Matrix

    Directory of Open Access Journals (Sweden)

    Xiao-Zhu Xie

    2018-02-01

    Full Text Available Data hiding is a technology that embeds data into a cover carrier in an imperceptible way while still allowing the hidden data to be extracted accurately from the stego-carrier, which is one important branch of computer science and has drawn attention of scholars in the last decade. Turtle shell-based (TSB schemes have become popular in recent years due to their higher embedding capacity (EC and better visual quality of the stego-image than most of the none magic matrices based (MMB schemes. This paper proposes a two-layer turtle shell matrix-based (TTSMB scheme for data hiding, in which an extra attribute presented by a 4-ary digit is assigned to each element of the turtle shell matrix with symmetrical distribution. Therefore, compared with the original TSB scheme, two more bits are embedded into each pixel pair to obtain a higher EC up to 2.5 bits per pixel (bpp. The experimental results reveal that under the condition of the same visual quality, the EC of the proposed scheme outperforms state-of-the-art data hiding schemes.

  11. Content-based Image Hiding Method for Secure Network Biometric Verification

    Directory of Open Access Journals (Sweden)

    Xiangjiu Che

    2011-08-01

    Full Text Available For secure biometric verification, most existing methods embed biometric information directly into the cover image, but content correlation analysis between the biometric image and the cover image is often ignored. In this paper, we propose a novel biometric image hiding approach based on the content correlation analysis to protect the network-based transmitted image. By using principal component analysis (PCA, the content correlation between the biometric image and the cover image is firstly analyzed. Then based on particle swarm optimization (PSO algorithm, some regions of the cover image are selected to represent the biometric image, in which the cover image can carry partial content of the biometric image. As a result of the correlation analysis, the unrepresented part of the biometric image is embedded into the cover image by using the discrete wavelet transform (DWT. Combined with human visual system (HVS model, this approach makes the hiding result perceptually invisible. The extensive experimental results demonstrate that the proposed hiding approach is robust against some common frequency and geometric attacks; it also provides an effective protection for the secure biometric verification.

  12. Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography

    Directory of Open Access Journals (Sweden)

    Wei-Liang Tai

    2018-01-01

    Full Text Available We propose separable reversible data hiding in an encrypted signal with public key cryptography. In our separable framework, the image owner encrypts the original image by using a public key. On receipt of the encrypted signal, the data-hider embeds data in it by using a data-hiding key. The image decryption and data extraction are independent and separable at the receiver side. Even though the receiver, who has only the data-hiding key, does not learn about the decrypted content, he can extract data from the received marked encrypted signal. However, the receiver who has only the private key cannot extract the embedded data, but he can directly decrypt the received marked encrypted signal to obtain the original image without any error. Compared with other schemes using a cipher stream to encrypt the image, the proposed scheme is more appropriate for cloud services without degrading the security level.

  13. Polycyclic Aromatic Hydrocarbons (PAHs) Content in Cattle Hides ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Vol. 21 (6) 1105-1110. Full-text Available Online at www.ajol.info and ... Keywords: Cattle hide, meat, tyre, singeing, hydrocarbons ... on the substance used as fuel for meat processing. .... through the centrifuge at 200 rpm for 5 min. The.

  14. HIDE working groups: synchrotron based system: summary

    International Nuclear Information System (INIS)

    Barton, M.Q.

    1978-01-01

    A brief overview is given of the work resulting from a one-week workshop on the use of synchrotrons in heavy ion fusion, i.e., a Heavy Ion Demonstration Experiment (HIDE). Topics discussed concerned the number of beams on target, space charge limitations, choice of ion charge state, and areas identified as needing further work

  15. Effects of gamma rays on the physical and mechanical properties of hide

    International Nuclear Information System (INIS)

    Sutrisno Puspodikoro.

    1976-01-01

    The effect of gamma rays on the physical and mechanical properties of hide has been studied, using Gammacell 220 as an irradiator. The determination of the physical and mechanical properties of the irradiated hide was carried out by Balai Penelitian Kulit (Leather Research Institute) at Yogyakarta. Experiments show that up to a certain dose of irradiation, favourable effects can be obtained, while higher doses impair the physical and mechanical properties of the leather raw materials. (author)

  16. On the Bayes risk in information-hiding protocols

    NARCIS (Netherlands)

    Chatzikokolakis, K.; Palamidessi, C.; Panangaden, P.

    2008-01-01

    Randomized protocols for hiding private information can be regarded as noisy channels in the information-theoretic sense, and the inference of the concealed information can be regarded as a hypothesis-testing problem. We consider the Bayesian approach to the problem, and investigate the probability

  17. Efficient reversible data hiding in encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2014-09-01

    Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.

  18. Efficient Text Encryption and Hiding with Double-Random Phase-Encoding

    Directory of Open Access Journals (Sweden)

    Mohammad S. Alam

    2012-10-01

    Full Text Available In this paper, a double-random phase-encoding technique-based text encryption and hiding method is proposed. First, the secret text is transformed into a 2-dimensional array and the higher bits of the elements in the transformed array are used to store the bit stream of the secret text, while the lower bits are filled with specific values. Then, the transformed array is encoded with double-random phase-encoding technique. Finally, the encoded array is superimposed on an expanded host image to obtain the image embedded with hidden data. The performance of the proposed technique, including the hiding capacity, the recovery accuracy of the secret text, and the quality of the image embedded with hidden data, is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient. By using optical information processing techniques, the proposed method has been found to significantly improve the security of text information transmission, while ensuring hiding capacity at a prescribed level.

  19. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Energy Technology Data Exchange (ETDEWEB)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C. (Iso-Ster (Pty) Ltd., Kempton Park (South Africa))

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  20. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    Science.gov (United States)

    Du Plessis, TA; Russell, AE; Stevens, RCB; Galloway, AC

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem.

  1. Synergistic effects in the short-term preservation of hides with antiseptics and gamma radiation

    International Nuclear Information System (INIS)

    Du Plessis, T.A.; Russell, A.E.; Stevens, R.C.B.; Galloway, A.C.

    1983-01-01

    The normal time lapse between the skinning and tanning processes of green hides necessitates the need for a short-term preservation technique to be employed. The most common method of bringing about such preservation is the coarse salting of the flesh side of hides. More recently the antiseptic treatment of hides was introduced to overcome the serious environmental pollution brought about by the salting process. The antiseptic treatment, however, must also be carefully controlled to avoid upsetting the biological breakdown processes in effluent plants. The gamma sterilization of such hides presents a non-polluting alternative to these methods. As the nature of this product demands excessively high radiation doses to be effective, which negatively influences the economics of the process and the physical properties of the resultant leather, a combination process employing radiation and antiseptics was investigated. It was observed that the radiation dose could be lowered from 50 kGy to 8 kGy in combination with certain antiseptics, whilst the required antiseptic concentration could be substantially lowered in the presence of radiation. The resultant leather was of an excellent quality whilst minimizing the environmental pollution problem. (author)

  2. Optical multiple-image hiding based on interference and grating modulation

    International Nuclear Information System (INIS)

    He, Wenqi; Peng, Xiang; Meng, Xiangfeng

    2012-01-01

    We present a method for multiple-image hiding on the basis of interference-based encryption architecture and grating modulation. By using a modified phase retrieval algorithm, we can separately hide a number of secret images into one arbitrarily preselected host image associated with a set of phase-only masks (POMs), which are regarded as secret keys. Thereafter, a grating modulation operation is introduced to multiplex and store the different POMs into a single key mask, which is then assigned to the authorized users in privacy. For recovery, after an appropriate demultiplexing process, one can reconstruct the distributions of all the secret keys and then recover the corresponding hidden images with suppressed crosstalk. Computer simulation results are presented to validate the feasibility of our approach. (paper)

  3. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients

    Science.gov (United States)

    Zhang, Xiaoqiang; Wang, Z. Jane

    2013-10-01

    Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 10 to 10 and thus can resist brute-force attack and unauthorized detection watermark attack.

  4. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days) after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment. PMID:11455906

  5. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Directory of Open Access Journals (Sweden)

    Grønstøl H

    2001-03-01

    Full Text Available The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment.

  6. Strategie del patetico e interludi circensi in Hide and Seek di Wilkie Collins

    OpenAIRE

    De Giovanni, Flora

    2013-01-01

    Starting from Victor Turner’s definitions of cultural performance and liminoid phenomena, the essay aims to analyse Wilkie Collins’s third novel, Hide and Seek (1854), which seems to be a sort of survey of the pastimes Victorian England allowed itself in the age of the increasing commodification of leisure. Though not a proper sensation novel (the genre for which Collins became famous in the 1860s), Hide and Seek draws on the conventions of melodrama, which, as Peter Brook conv...

  7. Efficacy of citrilow™ and cecure™ spray wash on the levels and prevalence of aerobic bacterials and enterobacteriaceae bacteria on cattle hides

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle skins to the inner meat and hide quality detrition from bacteria is recognized as a severe hygienic problem for commercial beef and hide processing facilities. To circumvent bacterial contamination, cattle are washed during hide p...

  8. Cross-sectional study to estimate the prevalence of enterohaemorrhagic Escherichia coli on hides of market beef cows at harvest.

    Science.gov (United States)

    Schneider, L G; Stromberg, Z R; Lewis, G L; Moxley, R A; Smith, D R

    2018-03-25

    Cattle hides are an important source of enterohaemorrhagic Escherichia coli (EHEC) carcass contamination at slaughter. Seven EHEC serogroups are adulterants in raw, non-intact beef: EHEC O26, O45, O103, O111, O121, O145 and O157. The objective of this study was to estimate the probability for hide contamination with EHEC among US market beef cows at slaughter and to test the effects of season and geographic region on prevalence of hide contamination. Hides (n = 800) of market cows were swabbed at slaughter immediately after exsanguination, prior to hide removal. Cows were sampled from two geographically distinct beef packing plants during four seasons of 2015. Cattle source was categorized by northern or southern region. Samples were tested for EHEC by a molecular screening assay. The effects of region, season and their interaction on the probability of hide contamination by each EHEC serogroup were tested in separate multilevel multivariable logistic regression models, accounting for the random effect of clustering by plant. Statistical significance was set α = .05. Of 800 total samples, at least one EHEC was detected on 630 (79%) hides. Enterohaemorrhagic E. coli O26 was detected on 129 (16%) of all hides sampled, EHEC O45 on 437 (55%), EHEC O103 on 289 (36%), EHEC O111 on 189 (24%), EHEC O121 on 140 (18%), EHEC O145 on 171 (21%) and EHEC O157 on 89 (11%). Detection of EHEC O26 and EHEC O121 was associated with season. Season and region were associated with detecting EHEC O45 and EHEC O157. Season-by-region interactions were associated with the outcome of detecting EHEC O103, EHEC O111 and EHEC O145. Season, region of origin and the interaction of these factors affect hide contamination of market beef cattle at slaughter by EHEC, and each serogroup responds to these factors uniquely. © 2018 Blackwell Verlag GmbH.

  9. Variation in the Level of Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The occurrence of hide damage light flecks and spots was determined on tanned hides from 28 herds during a period of 8 to 12 months. Light flecks and spots are described as small areas of grain loss up to 3 mm in diameter that are seen on dyed crust cattle leather. Damage was found on 75.8% of all hides. The neck and shoulders were the anatomical region with the highest prevalence of damage. Sixty-eight per cent of all hides had light flecks and spots in this region. The forelimbs and dewlap were the anatomical region with the second highest occurrence with a prevalence of 39.1%. This distribution corresponded to the known distribution of lice in cattle. No significant differences were observed in age, sex, prevalence of lice in the herd assessed in March or infestations with different lice species. The frequency of light flecks and spots varied significantly during the year. The frequency was highest in the late winter and early spring, decreased significantly during the summer and was lowest in the autumn. This variation supported the importance of lice in the development of light flecks and spots and suggested a relatively long healing period for the damages induced by lice. PMID:11455905

  10. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    Directory of Open Access Journals (Sweden)

    H. Yang

    2009-12-01

    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  11. Prey should hide more randomly when a predator attacks more persistently.

    Science.gov (United States)

    Gal, Shmuel; Alpern, Steve; Casas, Jérôme

    2015-12-06

    When being searched for and then (if found) pursued by a predator, a prey animal has a choice between choosing very randomly among hiding locations so as to be hard to find or alternatively choosing a location from which it is more likely to successfully flee if found. That is, the prey can choose to be hard to find or hard to catch, if found. In our model, capture of prey requires both finding it and successfully pursuing it. We model this dilemma as a zero-sum repeated game between predator and prey, with the eventual capture probability as the pay-off to the predator. We find that the more random hiding strategy is better when the chances of repeated pursuit, which are known to be related to area topography, are high. Our results extend earlier results of Gal and Casas, where there was at most only a single pursuit. In that model, hiding randomly was preferred by the prey when the predator has only a few looks. Thus, our new multistage model shows that the effect of more potential looks is opposite. Our results can be viewed as a generalization of search games to the repeated game context and are in accordance with observed escape behaviour of different animals. © 2015 The Author(s).

  12. Information Hiding In Digital Video Using DCT, DWT and CvT

    Science.gov (United States)

    Abed Shukur, Wisam; Najah Abdullah, Wathiq; Kareem Qurban, Luheb

    2018-05-01

    The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the Normalized cross Correlation (NC). The experiments shows the error ratio of the proposed technique is (8%) while accuracy ratio is (92%) when the Curvelet Transform (CvT) is used, but compared with Discrete Wavelet Transform (DWT) and Discrete Cosine Transform (DCT), the error rates are 11% and 14% respectively, while the accuracy ratios are (89%) and (86%) respectively. So, the experiments shows the Poisson noise gives better results than other types of noises, while the speckle noise gives worst results compared with other types of noises. The proposed technique has been established by using MATLAB R2016a programming language.

  13. Traceability System Model for Quality Gelatin Raw Material of Cattle Hides

    Directory of Open Access Journals (Sweden)

    S Nur

    2010-09-01

    Full Text Available Several criteria must be accomplished within the provision of quality products in terms of the types of materials, the processing methods and effort to get it. Traceability system involves various parties that have different needs and goals in the process of supplying raw materials. Hence, there is a need for institutional systems engineering that can organize and manage the tracking process, the procurement of raw materials that guarantee the origin of gelatin raw materials, and facilitate the industry and customer to create a standardized quality of product. The purpose of the study formulates the institutional tracking models of gelatin raw material from cattle hide based on various criteria and assessment of the expert opinion. The methods used in this study were Interpretative structural modeling to formulate a representation of institutional tracking efficiently and analytical hierarchy process to determine the tracking strategy of industrial gelatin raw materials from cowhide. The results obtained from the study were some key elements of institutional tracking model for industrial gelatin raw materials from cowhide and the traceability strategies for industrial raw materials from cattle hide gelatin Indonesia. (Animal Production 12(3: 190-198 (2010 Key Words: traceability, institutional model, cattle hide, gelatin

  14. 9 CFR 310.10 - Carcasses with skin or hide on; cleaning before evisceration; removal of larvae of Hypodermae...

    Science.gov (United States)

    2010-01-01

    ..., DEPARTMENT OF AGRICULTURE AGENCY ORGANIZATION AND TERMINOLOGY; MANDATORY MEAT AND POULTRY PRODUCTS INSPECTION... pathological skin conditions. When a carcass is to be dressed with the skin or hide left on, the skin or hide...

  15. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Science.gov (United States)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  16. HIDE & SEEK: End-to-end packages to simulate and process radio survey data

    Science.gov (United States)

    Akeret, J.; Seehars, S.; Chang, C.; Monstein, C.; Amara, A.; Refregier, A.

    2017-01-01

    As several large single-dish radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these datasets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system-from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing single-dish radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single-dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal. The two packages can be used separately or together depending on the application. Their modular and flexible nature allows easy adaptation to other instruments and datasets. We describe the basic architecture of the two packages and examine in detail the noise and RFI modeling in HIDE, as well as the implementation of gain calibration and RFI mitigation in SEEK. We then apply HIDE &SEEK to forward-model a Galactic survey in the frequency range 990-1260 MHz based on data taken at the Bleien Observatory. For this survey, we expect to cover 70% of the full sky and achieve a median signal-to-noise ratio of approximately 5-6 in the cleanest channels including systematic uncertainties. However, we also point out the potential challenges of high RFI contamination and baseline removal when examining the early data from the Bleien Observatory. The fully documented HIDE &SEEK packages are available at http://hideseek.phys.ethz.ch/ and are published

  17. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    Directory of Open Access Journals (Sweden)

    S. Malalla,

    2017-04-01

    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  18. Impact of Media Richness on Reduction of Knowledge-Hiding Behavior in Enterprises

    DEFF Research Database (Denmark)

    Labafi, Somayeh; Khajeheian, Datis; Williams, Idongesit

    2018-01-01

    in a qualitative study. Thematic analysis is used to analyze transcribed interview data from employees in a software company in Iran. The findings of the analysis show that media richness significantly impacts on organizational learning and influences on knowledge hiding behavior in employees. This article...... suggests that entrepreneurs and managers of small firms should provide employees’ access to rich media content as well as established organizational learning as part of their organizational culture.......Knowledge hiding is one of the major obstacles in the progression of organizations that hinder the use of tacit knowledge of employees. The negative impact of this behavior is more significant in enterprises and small firms because they are more reliant on knowledge of their employees...

  19. 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing

    CERN Document Server

    Tsai, Pei-Wei; Huang, Hsiang-Cheh

    2017-01-01

    This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .

  20. Matryoshka: Hiding Secret Communication in Plain Sight

    OpenAIRE

    Safaka, Iris; Fragouli, Christina; Argyraki, Katerina

    2016-01-01

    We want to enable a pair of communicating users to exchange secret messages while hiding the fact that secret communication is taking place. We propose a linguistic steganography approach, where each human message is hidden in another human-like message. A hard open question is how to keep the steganographic message small -- existing related tools tend to blow up its size, thereby revealing the use of steganography. We encrypt by compressing each message, mapping it to a plausible sequence of...

  1. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  2. High-capacity method for hiding data in the discrete cosine transform domain

    Science.gov (United States)

    Qazanfari, Kazem; Safabakhsh, Reza

    2013-10-01

    Steganography is the art and science of hiding data in different media such as texts, audios, images, and videos. Data hiding techniques are generally divided into two groups: spatial and frequency domain techniques. Spatial domain methods generally have low security and, as a result, are less attractive to researchers. Discrete cosine transform (DCT) is the most common transform domain used in steganography and JPEG compression. Since a large number of the DCT coefficients of JPEG images are zero, the capacity of DCT domain-based steganography methods is not very high. We present a high-capacity method for hiding messages in the DCT domain. We describe the method in two classes where the receiver has and where the receiver does not have the cover image. In each class, we consider three cases for each coefficient. By considering n coefficients, there are 3n different situations. The method embeds ⌊log2 3n⌋ bits in these n coefficients. We show that the maximum reachable capacity by our method is 58% higher than the other general steganography methods. Experimental results show that the histogram-based steganalysis methods cannot detect the stego images produced by the proposed method while the capacity is increased significantly.

  3. Preservation of bovine hide using less salt with low concentration of antiseptic, part I: effectiveness of developed formulations

    Science.gov (United States)

    Bovine raw hides are commercially cured either with high salt concentration of about half the weight of actual hide or 95% saturated brine solution. This conventional technique is very popular due to the availability of common salt (sodium chloride) and its cost effective procedure but it generates ...

  4. DATA HIDING IN ENCRYPTED IMAGES USING ARNOLD TRANSFORM

    Directory of Open Access Journals (Sweden)

    S. Siva Shankar

    2016-08-01

    Full Text Available Digital image steganography has several applications in information security and communication. Data hiding in encrypted images ensure that both the cover image and the secret message can be recovered at the receiver end. This work presents a novel data hiding and image encryption scheme using random diffusion and Two dimensional Arnold cat mapping transform. The secret message bits are placed in the least significant bit positions of the cover image. Then a shared key is used to generate random 8 bit random integer stream and is added to the stego image in the random diffusion step. Arnold cat mapping transformation is done to scramble the pixels. The two steps of random diffusion and Arnold transform mapping are done alternatively several times to completely encrypt the image contents. The process is reversed at the receiver end to get both the secret message and the cover image with little loss. The random diffusion step overcomes the limited period of the Arnold transform. The embedding capacity of one bit per pixel is achieved. Security analysis is carried out which shows that the encryption is highly secure. The number of collisions is low thus preventing brute force attacks. The original cover image is recoverable with minimal losses.

  5. Hiding Information Using different lighting Color images

    Science.gov (United States)

    Majead, Ahlam; Awad, Rash; Salman, Salema S.

    2018-05-01

    The host medium for the secret message is one of the important principles for the designers of steganography method. In this study, the best color image was studied to carrying any secret image.The steganography approach based Lifting Wavelet Transform (LWT) and Least Significant Bits (LSBs) substitution. The proposed method offers lossless and unnoticeable changes in the contrast carrier color image and imperceptible by human visual system (HVS), especially the host images which was captured in dark lighting conditions. The aim of the study was to study the process of masking the data in colored images with different light intensities. The effect of the masking process was examined on the images that are classified by a minimum distance and the amount of noise and distortion in the image. The histogram and statistical characteristics of the cover image the results showed the efficient use of images taken with different light intensities in hiding data using the least important bit substitution method. This method succeeded in concealing textual data without distorting the original image (low light) Lire developments due to the concealment process.The digital image segmentation technique was used to distinguish small areas with masking. The result is that smooth homogeneous areas are less affected as a result of hiding comparing with high light areas. It is possible to use dark color images to send any secret message between two persons for the purpose of secret communication with good security.

  6. Livestock and Hides and Skins Marketing in Kenya: Problems and investment needs

    OpenAIRE

    Jabbar, Mohammad A.

    2002-01-01

    The paper briefly summarises the historical perspective on the development of livestock marketing in Kenya, current problems of livestock and hides and skins marketing, and recommends investment opportunities to improve the situation.

  7. Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion

    Directory of Open Access Journals (Sweden)

    Xianyi Chen

    2018-01-01

    Full Text Available Compared to the encrypted-image-based reversible data hiding (EIRDH method, the encrypted-signals-based reversible data hiding (ESRDH technique is a novel way to achieve a greater embedding rate and better quality of the decrypted signals. Motivated by ESRDH using signal energy transfer, we propose an improved ESRDH method using code division multiplexing and value expansion. At the beginning, each pixel of the original image is divided into several parts containing a little signal and multiple equal signals. Next, all signals are encrypted by Paillier encryption. And then a large number of secret bits are embedded into the encrypted signals using code division multiplexing and value expansion. Since the sum of elements in any spreading sequence is equal to 0, lossless quality of directly decrypted signals can be achieved using code division multiplexing on the encrypted equal signals. Although the visual quality is reduced, high-capacity data hiding can be accomplished by conducting value expansion on the encrypted little signal. The experimental results show that our method is better than other methods in terms of the embedding rate and average PSNR.

  8. Physicochemical Properties of Gelatin Extracted from Buffalo Hide Pretreated with Different Acids.

    Science.gov (United States)

    Mulyani, Sri; Setyabudi, Francis M C Sigit; Pranoto, Yudi; Santoso, Umar

    2017-01-01

    The acid pretreatment of collagen molecules disrupts their crosslinks and assists in the release of acid-soluble proteins, fats, and other components. Generally, to achieve optimum extraction efficiency, strong acids may be used at a lower acid concentration compared to weak acids. This study aimed to determine the yield and physicochemical properties of gelatins extracted from buffalo hides pretreated with different acids. Hides were extracted with hydrochloric, citric, and acetic acids at concentrations of 0.3, 0.6, 0.9, 1.2, and 1.5 M. A completely randomized design and the least significant difference test were used in the experimental design, and all measurements were performed in triplicate. The highest yield (29.17%) was obtained from pretreatment with 0.9 M HCl. The gel strength did not differ significantly ( p >0.05) according to acid type (280.26-259.62 g Bloom), and the highest viscosity was obtained from the 0.6 M citric acid pretreatment. All the gelatins contained α- and β-chain components and several degraded peptides (24-66 kDa). The color and Fourier-transform infrared spectrum of the gelatin extracted using 0.9 M HCl were similar to those of commercial bovine skin gelatin. In general, the physicochemical properties of the gelatin complied with the industry standard set by the Gelatin Manufacturers Institute of America, revealing that buffalo hide could serve as a potential alternative source of gelatin.

  9. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    Directory of Open Access Journals (Sweden)

    W. Saqer

    2016-06-01

    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  10. Information hiding technology and application analysis based on decimal expansion of irrational numbers

    Science.gov (United States)

    Liu, Xiaoyong; Lu, Pei; Shao, Jianxin; Cao, Haibin; Zhu, Zhenmin

    2017-10-01

    In this paper, an information hiding method using decimal expansion of irrational numbers to generate random phase mask is proposed. Firstly, the decimal expansion parts of irrational numbers generate pseudo-random sequences using a new coding schemed, the irrational number and start and end bit numbers were used as keys in image information hiding. Secondly, we apply the coding schemed to the double phase encoding system, the pseudo-random sequences are taken to generate random phase masks. The mean square error is used to calculate the quality of the recovered image information. Finally, two tests had been carried out to verify the security of our method; the experimental results demonstrate that the cipher image has such features, strong robustness, key sensitivity, and resistance to brute force attack.

  11. The impact of a gender and business training on income hiding

    NARCIS (Netherlands)

    Bulte, Erwin H.; Lensink, Robert; Winkel, Anne B.

    2018-01-01

    We use a randomized controlled trial and behavioral game to study the extent and determinants of income hiding in rural Vietnam. We focus on a training program that aims to promote gender equality and entrepreneurship among women in poverty who are engaged in running a small business. In one

  12. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    OpenAIRE

    Kuang Tsan Lin; Sheng Lih Yeh

    2014-01-01

    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  13. Entry points to stimulation of expansion in hides and skins processing

    African Journals Online (AJOL)

    Only 3.4% of respondents add value to hides and skins by processing. ... For this status of the chain, it was proposed that a workable intervention model has to encompass placement of tanneries and slaughter slabs in the chain as new actors, linking chain actors, improving livestock services especially dipping, and ...

  14. Hide unhairing and characterization of commercial enzymes used in leather manufacture

    Directory of Open Access Journals (Sweden)

    A Dettmer

    2011-09-01

    Full Text Available The enzymatic treatment of hides in tannery processes is a promising technology. However, the reaction kinetics of commercial enzymes available to the leather industry are not fully understood and their activities have been mainly determined with model proteins such as casein as substrate, which are not of direct relevance for cattle hides. Therefore, it is important to determine their activities on collagen and keratin, the main proteins of skin, in order to use these enzymes in leather processing. This work describes the study of five proteases, used commercially in tanneries, to assess their ability to act upon collagen and keratin and to determine their unhairing. Results showed that all commercial enzymes tested had more activity on collagen than on keratin. Unhairing was also tested and four out of the five enzymes tested showed some unhairing activity. Optima of the temperature and pH of the enzymes were very similar for all five enzymes, with maximal activities around 55ºC and pH 9 to 12, respectively.

  15. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    Directory of Open Access Journals (Sweden)

    Ari Shawakat Tahir

    2015-12-01

    Full Text Available The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed.

  16. Hiding objects and creating illusions above a carpet filter using a Fourier optics approach.

    Science.gov (United States)

    Wu, Kedi; Wang, Guo Ping

    2010-09-13

    Invisibility carpet cloaks are usually used to hide an object beneath carpet. In this paper we propose and demonstrate a carpet filter to hide objects and create illusions above the filter by using a Fourier optics method. Instead of using transformation optics, we get electromagnetic parameters of the filter by optical transfer functions, which play the role of modulating the propagation of the scattering angular spectrum directly from an object above the filter. By further adding a functional layer onto the filter, we can even camouflage the object so that it appears to be a different object. The analytical results are confirmed by numerical simulations. Our method is completely different from the current coordinate transfer method and may provide another point of view to more clearly understand the mechanism of invisibility cloaks.

  17. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    Science.gov (United States)

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  18. A REVIEW ON HEAVY METALS CONTENTS IN HIDE, SKIN AND PROCESSED LEATHERS

    Directory of Open Access Journals (Sweden)

    KOIZHAIGANOVA Meruyert

    2016-05-01

    Full Text Available Heavy metals are metals with high atomic weight which can be deposited in soil, water, plants and animals. It is generally known that mammal tissues are good bioindicators of trace elements, including heavy metals. Heavy metal analysis serves to identify and quantify the elements that are a potential hazard to the consumer after varying levels of contact. Usage area of leather is increasingly expanding in these days and it has also become a material requested and demanded by effect of fashion. Leather must protect its appearance and physical stability and also be problem-free in ecological terms and harmless to human health. There is a lack of data concerning the content of toxic elements in raw hide and skin of animals. Mainly information concerning metals content, including toxic ones, in processed leathers may be found in the literature. The aim of the present study was to review and compare the content of some heavy metals in raw hide, skin and the processed leathers in order to evaluate their accumulation and transition to the end-up product.

  19. A New Images Hiding Scheme Based on Chaotic Sequences

    Institute of Scientific and Technical Information of China (English)

    LIU Nian-sheng; GUO Dong-hui; WU Bo-xi; Parr G

    2005-01-01

    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of covert image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).

  20. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm

    Directory of Open Access Journals (Sweden)

    Ching-Yu Yang

    2012-01-01

    Full Text Available This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.

  1. Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    OpenAIRE

    de Fuentes, Jose Maria; Blasco, Jorge; González-Tablas, Ana Isabel; González-Manzano, Lorena

    2014-01-01

    Vehicular ad hoc networks (VANETs) are a new communication scenario in which vehicles take an active part. Real-time reporting of misbehaving vehicles by surrounding ones is enabled by in-vehicle sensors and VANETs. Thus, sensors allow detecting the misbehavior whereas VANETs allow sending the report to the authority. Nevertheless, these reports should pass unnoticed by the reported driver to avoid his/her potential reprisals. Information hiding techniques could be used to allow vehicles to t...

  2. Universal Steganalysis of Data Hiding in Grayscale Images

    Institute of Scientific and Technical Information of China (English)

    HUANG Ji-feng; LIN Jia-jun

    2007-01-01

    This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy.

  3. Efficacy of Citrilow® and Cecure® spray wash on the prevalence of aerobic and enterobacteriaceae/gram negative enteric bacilli and cattle hide quality

    Science.gov (United States)

    Bacterial cross-contamination from the haired outer surface of cattle to the inner meat as well as hide quality deterioration from bacteria are hygienic problems for meat and hide processing facilities. This study investigated spray wash treatments independently with two antimicrobials used in the ...

  4. Prediction-error of Prediction Error (PPE)-based Reversible Data Hiding

    OpenAIRE

    Wu, Han-Zhou; Wang, Hong-Xia; Shi, Yun-Qing

    2016-01-01

    This paper presents a novel reversible data hiding (RDH) algorithm for gray-scaled images, in which the prediction-error of prediction error (PPE) of a pixel is used to carry the secret data. In the proposed method, the pixels to be embedded are firstly predicted with their neighboring pixels to obtain the corresponding prediction errors (PEs). Then, by exploiting the PEs of the neighboring pixels, the prediction of the PEs of the pixels can be determined. And, a sorting technique based on th...

  5. Effect of hiding places, straw and territory on agression in group-housed rabbit does

    NARCIS (Netherlands)

    Rommers, J.M.; Reuvekamp, B.F.J.; Gunnink, H.; Jong, de I.C.

    2014-01-01

    Group-housing of rabbit does may be preferred from welfare point of view. However, group-housing causes agonistic behaviour which may cause severe injuries. Severe injuries may be prevented by offering hiding places for attacked does. Providing enrichment (straw) may reduce agonistic behaviour by

  6. Let’s play hide and seek!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    This week, we would like you to play a small online game called “Virtual Hide & Seek”. The rules are simple: some of our colleagues have published some sensitive or confidential documents on CERN’s central services like Indico, CDS, EDMS or TWiki, as well as on our many websites. Your mission, should you choose to accept it: find them!   If you provide us with documents marked “confidential”, “classified”, “sensitive”, or containing plain text operational passwords, you can win a book on computer security. There are only few conditions: these documents must be visible from outside CERN, must not require a CERN account in order to access them, and must not belong to you or have a direct link with your work. Have fun! But seriously, are you sure that your documents are really properly protected? We regularly find confidential documents stored on one of the CERN central  services and w...

  7. Book Review: No Place To Hide

    Directory of Open Access Journals (Sweden)

    Gary Kessler

    2007-03-01

    Full Text Available O'Harrow, R., Jr. (2006. No Place To Hide. New York: Free Press. 352 pages, ISBN: 0-7432-8705-3 (paper, US$26Reviewed by Gary C. Kessler (gary.kessler@champlain.eduPersonal privacy and the protection of personal identifying information are of concern to all of us. Innumerable articles and conferences address our loss of privacy, either through the sale of consumer databases or our own inattention. Opinions vary from "You have no privacy; get over it" to "This is the end of civil liberties as we know them." We teach people to safely maneuver on the Internet and minimize their exposure to bogus sites set up to steal their identity, warn users about the dangers of phishing and posting personal information on social network sites, use firewalls to protect our databases, and enact laws such as the Health Insurance Portability and Accountability Act (HIPAA and the Family Educational Rights and Privacy Act (FERPA to protect information.(see PDF for full review

  8. An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining

    OpenAIRE

    Yogendra Kumar Jain,; Vinod Kumar Yadav,; Geetika S. Panday

    2011-01-01

    The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful toolfor discovering relationships which are hidden in large database. Association rules hiding algorithms get strong and efficient performance for protecting confidential and cru...

  9. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Science.gov (United States)

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels

    2004-06-01

    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  10. Synthesis of Citric-Acrylate Oligomer and its in-Situ Reaction with Chrome Tanned Collagen (hide powder)

    International Nuclear Information System (INIS)

    Haroun, A.A.; Masoud, R.A.; Bronco, S.; Ciardelli, F.

    2005-01-01

    The purpose of this study was to formulate the new combined system of acrylic and citric acids, which has been prepared by free radical polymerization and esterification reaction at the same time to form citric acrylate (CAC) oligomer through ester linkage and low molecular weight (Mw 2241), in compared with polyacrylic acid. The chemical structure and the reaction mechanism of this oligomer were confirmed by different spectroscopic tools (1 H , 13 C-NMR, ATR-IR), gel permeation chromatography and thermogravimetric analysis (TGA/DTA). The problem of the effect of the masking agents in the chrome tanning of the collagen and the pickling of the hide has been approached from the study of the hydrothermal and mechanical properties, using this new eco-friendly oligomer, which was carried out in-situ treated/grafted chrome tanned collagen (hide powder), and pickled hide. The microemulsion grafting copolymerization of (CAC) using 2.2-azo-bis isobutyronitrile (ABIN), via direct coupling reaction, onto the chrome tanned collagen showed that the free amino groups of the collagen were considered to be a potential site for the in-situ reaction with (CAC) oligomer. Also, using of citric-acrylate (CAC) oligomer, during chrome tanning of leather, instead of the traditional strong acids (sulfuric, hydrochloric and formic) resulted in significant improvement in chrome exhaustion and physical properties

  11. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Institute of Scientific and Technical Information of China (English)

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao

    2004-01-01

    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  12. Journal of Earth System Science | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science. Santimoy Kundu. Articles written in Journal of Earth System Science. Volume 124 Issue 1 February 2015 pp 161-170. Influence of rigid boundary on the propagation of torsional surface wave in an inhomogeneous layer · Shishir Gupta Rehena Sultana Santimoy Kundu.

  13. Journal of Earth System Science | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science. Rehena Sultana. Articles written in Journal of Earth System Science. Volume 124 Issue 1 February 2015 pp 161-170. Influence of rigid boundary on the propagation of torsional surface wave in an inhomogeneous layer · Shishir Gupta Rehena Sultana Santimoy Kundu.

  14. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Directory of Open Access Journals (Sweden)

    Sha Edwin Hsing-Mean

    2002-01-01

    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  15. Optical image hiding based on chaotic vibration of deformable moiré grating

    Science.gov (United States)

    Lu, Guangqing; Saunoriene, Loreta; Aleksiene, Sandra; Ragulskis, Minvydas

    2018-03-01

    Image hiding technique based on chaotic vibration of deformable moiré grating is presented in this paper. The embedded secret digital image is leaked in a form of a pattern of time-averaged moiré fringes when the deformable cover grating vibrates according to a chaotic law of motion with a predefined set of parameters. Computational experiments are used to demonstrate the features and the applicability of the proposed scheme.

  16. Sadhana | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Sadhana. Predhiman Kaw. Articles written in Sadhana. Volume 38 Issue 5 October 2013 pp 839-848. Fusion research programme in India · Shishir Deshpande Predhiman Kaw · More Details Abstract Fulltext PDF. The fusion energy research program of India is summarized in the context of energy needs ...

  17. Suggested Method for Encryption and Hiding ‎Image using LCG and LSB

    Directory of Open Access Journals (Sweden)

    Atheer Hussein Zyara

    2017-12-01

    Full Text Available Maintaining the confidentiality of the data of the very important areas in computer applications , Where many researchers work in the fields of concealment and encryption . So in this research we are working on the combining of the two methods , where confidential data is encrypted by using  a proposed method , Then the cover is encrypted (regular image by LCG algorithm (which generates a series of random numbers to generate the encrypted cover (irregular image , After that ,we hide the encrypted data in encrypted cover by depending on the LSB technique, then we convert the irregular image into regular image and thereby getting  hidden data in random locations in the  cover image  , This method is characterized by flexibility in terms of the possibility of hiding the different  types of confidential data in different types of media , and durability as that data be hidden in random locations and this  what distinguishes the proposed algorithm , and the results showed high security, because the data is hidden in random locations in encrypted image then convert to the original regular image For clarification of the proposed algorithm , it has been applied on a digital image of the gray type using MATLAB language  by using the efficiency scales PSNR and MSE

  18. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia)

    OpenAIRE

    Donatas Brandišauskas

    2010-01-01

    This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imp...

  19. Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number

    OpenAIRE

    Kohei Arai; Yuji Yamada

    2011-01-01

    An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images...

  20. The Use of Polymerized Genipin for the Stabilization of the Collagen Structure of Animal Hides

    Science.gov (United States)

    Animal hides are the major byproduct of meat industry and the collagen fibers is the main constituent. Crosslinkers play a key role in stabilizing the collagen structure for useful applications. Genipin is widely used as an ideal biological protein crosslinking agent due to its low toxicity compare...

  1. A Data Hiding Technique to Synchronously Embed Physiological Signals in H.264/AVC Encoded Video for Medicine Healthcare.

    Science.gov (United States)

    Peña, Raul; Ávila, Alfonso; Muñoz, David; Lavariega, Juan

    2015-01-01

    The recognition of clinical manifestations in both video images and physiological-signal waveforms is an important aid to improve the safety and effectiveness in medical care. Physicians can rely on video-waveform (VW) observations to recognize difficult-to-spot signs and symptoms. The VW observations can also reduce the number of false positive incidents and expand the recognition coverage to abnormal health conditions. The synchronization between the video images and the physiological-signal waveforms is fundamental for the successful recognition of the clinical manifestations. The use of conventional equipment to synchronously acquire and display the video-waveform information involves complex tasks such as the video capture/compression, the acquisition/compression of each physiological signal, and the video-waveform synchronization based on timestamps. This paper introduces a data hiding technique capable of both enabling embedding channels and synchronously hiding samples of physiological signals into encoded video sequences. Our data hiding technique offers large data capacity and simplifies the complexity of the video-waveform acquisition and reproduction. The experimental results revealed successful embedding and full restoration of signal's samples. Our results also demonstrated a small distortion in the video objective quality, a small increment in bit-rate, and embedded cost savings of -2.6196% for high and medium motion video sequences.

  2. Hiding Critical Targets in Smart Grid Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bao, Wei [Univ. of Arkansas, Fayetteville, AR (United States); Li, Qinghua

    2017-10-23

    With the integration of advanced communication technologies, the power grid is expected to greatly enhance efficiency and reliability of future power systems. However, since most electrical devices in power grid substations are connected via communication networks, cyber security of these communication networks becomes a critical issue. Real-World incidents such as Stuxnet have shown the feasibility of compromising a device in the power grid network to further launch more sophisticated attacks. To deal with security attacks of this spirit, this paper aims to hide critical targets from compromised internal nodes and hence protect them from further attacks launched by those compromised nodes. In particular, we consider substation networks and propose to add carefully-controlled dummy traffic to a substation network to make critical target nodes indistinguishable from other nodes in network traffic patterns. This paper describes the design and evaluation of such a scheme. Evaluations show that the scheme can effectively protect critical nodes with acceptable communication cost.

  3. Hiding secret data into a carrier image

    Directory of Open Access Journals (Sweden)

    Ovidiu COSMA

    2012-06-01

    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  4. A dehydration process for ovine hide to obtain a new collagenous material

    OpenAIRE

    Ollé Otero, Lluís; Sorolla, Silvia; Casas Solé, Concepció; Bacardit Dalmases, Anna

    2014-01-01

    The aim of the present work is to develop a dehydration process for ovine hide to obtain a new collagenous material for use in the leather industry. What is obtained through this new process is a dry and very porous collagenous substrate which allows the application of tanning chemicals by immersion in aqueous solutions. When compared to existing, traditional processes, economic and environmental advantages are obtained from the use of this new material. More specifically, the new process ...

  5. Herbicide toxicity, selectivity and hormesis of nicosulfuron on 10 Trichogrammatidae (Hymenoptera) species parasitizing Anagasta ( = Ephestia) kuehniella (Lepidoptera: Pyralidae) eggs.

    Science.gov (United States)

    Leite, Germano L D; de Paulo, Paula D; Zanuncio, José C; Tavares, Wagner De S; Alvarenga, Anarelly C; Dourado, Luan R; Bispo, Edilson P R; Soares, Marcus A

    2017-01-02

    Selective agrochemicals including herbicides that do not affect non-target organisms such as natural enemies are important in the integrated pest management (IPM) programs. The aim of this study was to evaluate the herbicide toxicity, selectivity and hormesis of nicosulfuron, recommended for the corn Zea mays L. (Poaceae) crop, on 10 Trichogrammatidae (Hymenoptera) species. A female of each Trichogramma spp. or Trichogrammatoidea annulata De Santis, 1972 was individually placed in plastic test tubes (no choice) with a cardboard containing 45 flour moth Anagasta ( = Ephestia) kuehniella Zeller, 1879 (Lepidoptera: Pyralidae) eggs. Parasitism by these natural enemies was allowed for 48 h and the cardboards were sprayed with the herbicide nicosulfuron at 1.50 L.ha -1 , along with the control (only distilled water). Nicosulfuron reduced the emergence rate of Trichogramma bruni Nagaraja, 1983 females, but increased that of Trichogramma pretiosum Riley, 1879, Trichogramma acacioi Brun, Moraes and Smith, 1984 and T. annulata females. Conversely, this herbicide increased the emergence rate of Trichogramma brasiliensis Ashmead, 1904, T. bruni, Trichogramma galloi Zucchi, 1988 and Trichogramma soaresi Nagaraja, 1983 males and decreased those of T. acacioi, Trichogramma atopovilia Oatman and Platner, 1983 and T. pretiosum males. In addition, nicosulfuron reduced the sex ratio of T. galloi, Trichogramma bennetti Nagaraja and Nagarkatti, 1973 and T. pretiosum and increased that of T. acacioi, T. bruni, T. annulata, Trichogramma demoraesi Nagaraja, 1983, T. soaresi and T. brasiliensis. The herbicide nicosulfuron was "harmless" (class 1, <30% reduction) for females and the sex ratio of all Trichogrammatidae species based on the International Organization for Biological Control (IOBC) classification. The possible hormesis effect of nicosulfuron on Trichogrammatidae species and on the bacterium Wolbachia sp. (Rickettsiales: Rickettsiaceae) was also discussed.

  6. Hiding Techniques for Dynamic Encryption Text based on Corner Point

    Science.gov (United States)

    Abdullatif, Firas A.; Abdullatif, Alaa A.; al-Saffar, Amna

    2018-05-01

    Hiding technique for dynamic encryption text using encoding table and symmetric encryption method (AES algorithm) is presented in this paper. The encoding table is generated dynamically from MSB of the cover image points that used as the first phase of encryption. The Harris corner point algorithm is applied on cover image to generate the corner points which are used to generate dynamic AES key to second phase of text encryption. The embedded process in the LSB for the image pixels except the Harris corner points for more robust. Experimental results have demonstrated that the proposed scheme have embedding quality, error-free text recovery, and high value in PSNR.

  7. Unconventional thermal cloak hiding an object outside the cloak

    Science.gov (United States)

    Gao, Y.; Huang, J. P.

    2013-11-01

    All the thermal cloaks reported in the literature can be used to thermally hide an object inside the cloak. However, a common limitation of this kind of thermal cloaks is that the cloaked object cannot feel the external heat flow since it is located inside the cloak; thus we call these cloaks “conventional thermal cloaks”. Here we manage to overcome this limitation by exploiting a class of unconventional thermal cloaks that enable the cloaked object to feel the external heat flow. Our finite-element simulations in two dimensions show the desired cloaking effect. The underlying mechanism originates from the complementary effect of thermal metamaterials with negative thermal conductivities. This work suggests a different method to design thermal devices where heat conduction can be controlled at will.

  8. HIDING TEXT IN DIGITAL IMAGES USING PERMUTATION ORDERING AND COMPACT KEY BASED DICTIONARY

    Directory of Open Access Journals (Sweden)

    Nagalinga Rajan

    2017-05-01

    Full Text Available Digital image steganography is an emerging technique in secure communication for the modern connected world. It protects the content of the message without arousing suspicion in a passive observer. A novel steganography method is presented to hide text in digital images. A compact dictionary is designed to efficiently communicate all types of secret messages. The sorting order of pixels in image blocks are chosen as the carrier of embedded information. The high correlation in image pixel values means reordering within image blocks do not cause high distortion. The image is divided into blocks and perturbed to create non repeating sequences of intensity values. These values are then sorted according to the message. At the receiver end, the message is read from the sorting order of the pixels in image blocks. Only those image blocks with standard deviation lesser than a given threshold are chosen for embedding to alleviate visual distortion. Information Security is provided by shuffling the dictionary according to a shared key. Experimental Results and Analysis show that the method is capable of hiding text with more than 4000 words in a 512×512 grayscale image with a peak signal to noise ratio above 40 decibels.

  9. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin

    2014-01-01

    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  10. Hide depilation and feather disintegration studies with keratinolytic serine protease from a novel Bacillus subtilis isolate.

    Science.gov (United States)

    Pillai, Priya; Archana, G

    2008-03-01

    Keratinases play an important role in biotechnological applications such as improvement of feather meal, enzymatic dehairing and production of amino acids or peptides from high molecular weight substrates. Bacillus subtilis P13, isolated from Vajreshwari hot spring (45-50 degrees C) near Mumbai, India, produces a neutral serine protease and has an optimum temperature of 65 degrees C. This enzyme preparation was keratinolytic in nature and could disintegrate whole chicken feathers, except for the remnants of shafts. The enzyme preparation also exhibited depilation of goat hides with the recovery of intact animal hair. The enzyme preparation could release peptides from ground feathers and bring about their weight reduction; however, similar action on hair was relatively weak. A single major PMSF-sensitive protease band could be detected upon zymogram analysis, indicating that a single enzyme may be responsible for feather degradation and hide depilation. The importance of these findings in the biotechnological application for feather and leather industries is discussed.

  11. Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase encoding.

    Science.gov (United States)

    Wang, Xiaogang; Chen, Wen; Chen, Xudong

    2014-09-22

    We present a novel image hiding method based on phase retrieval algorithm under the framework of nonlinear double random phase encoding in fractional Fourier domain. Two phase-only masks (POMs) are efficiently determined by using the phase retrieval algorithm, in which two cascaded phase-truncated fractional Fourier transforms (FrFTs) are involved. No undesired information disclosure, post-processing of the POMs or digital inverse computation appears in our proposed method. In order to achieve the reduction in key transmission, a modified image hiding method based on the modified phase retrieval algorithm and logistic map is further proposed in this paper, in which the fractional orders and the parameters with respect to the logistic map are regarded as encryption keys. Numerical results have demonstrated the feasibility and effectiveness of the proposed algorithms.

  12. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Ding Qing-Yan; Zhang Shu-Hui; Chen Xiu-Bo

    2016-01-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. (paper)

  13. An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm

    Science.gov (United States)

    Zhang, B.; Sang, Jun; Alam, Mohammad S.

    2013-03-01

    An image hiding method based on cascaded iterative Fourier transform and public-key encryption algorithm was proposed. Firstly, the original secret image was encrypted into two phase-only masks M1 and M2 via cascaded iterative Fourier transform (CIFT) algorithm. Then, the public-key encryption algorithm RSA was adopted to encrypt M2 into M2' . Finally, a host image was enlarged by extending one pixel into 2×2 pixels and each element in M1 and M2' was multiplied with a superimposition coefficient and added to or subtracted from two different elements in the 2×2 pixels of the enlarged host image. To recover the secret image from the stego-image, the two masks were extracted from the stego-image without the original host image. By applying public-key encryption algorithm, the key distribution was facilitated, and also compared with the image hiding method based on optical interference, the proposed method may reach higher robustness by employing the characteristics of the CIFT algorithm. Computer simulations show that this method has good robustness against image processing.

  14. Sadhana | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Sadhana. S Sam Baskar. Articles written in Sadhana. Volume 34 Issue 4 August 2009 pp 663-675. System integration design in MEMS – A case study of micromachined load cell · Shishir Kumar K P Venkatesh S Sam Baskar S P Madhavi · More Details Abstract Fulltext PDF. One of the critical issues in large ...

  15. What Hides Behind an Umemployment Rate: Comparing Portuguese and U.S. Unemployment

    OpenAIRE

    Olivier Blanchard; Pedro Portugal

    1998-01-01

    Over the last 15 years, Portugal and the United States have had the same average unemployment rate, about 6.5%. But behind these similar rates hide two very different labor markets. Unemployment duration in Portugal is more than three times that of the United States. Symmetrically, the flow of workers into unemployment in Portugal is, in proportion to the labor force, less than a third of what it is in the United States. Relying on evidence from Portuguese and U.S. micro data sets, we show th...

  16. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    DEFF Research Database (Denmark)

    Christandl, Matthias; Ferrara, Roberto

    2017-01-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005)]. The construction of those states was based...... on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable...

  17. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2011-05-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  18. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Directory of Open Access Journals (Sweden)

    Donatas Brandišauskas

    2010-12-01

    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  19. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Directory of Open Access Journals (Sweden)

    Chun-Wei Lin

    2014-01-01

    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  20. A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Fujisaki, Eiichiro

    2002-01-01

    We present a statistically-hiding commitment scheme allowing commitment to arbitrary size integers, based on any (Abelian) group with certain properties, most importantly, that it is hard for the committer to compute its order. We also give efficient zero-knowledge protocols for proving knowledge...... input is chosen by the (possibly cheating) prover. -  - Our results apply to any group with suitable properties. In particular, they apply to a much larger class of RSA moduli than the safe prime products proposed in [14] - Potential examples include RSA moduli, class groups and, with a slight...

  1. Hiding a Heavy Higgs Boson at the 7 TeV LHC

    Energy Technology Data Exchange (ETDEWEB)

    Bai, Yang; Fan, JiJi; Hewett, JoAnne L.

    2012-03-20

    A heavy Standard Model Higgs boson is not only disfavored by electroweak precision observables but is also excluded by direct searches at the 7 TeV LHC for a wide range of masses. Here, we examine scenarios where a heavy Higgs boson can be made consistent with both the indirect constraints and the direct null searches by adding only one new particle beyond the Standard Model. This new particle should be a weak multiplet in order to have additional contributions to the oblique parameters. If it is a color singlet, we find that a heavy Higgs with an intermediate mass of 200-300 GeV can decay into the new states, suppressing the branching ratios for the standard model modes, and thus hiding a heavy Higgs at the LHC. If the new particle is also charged under QCD, the Higgs production cross section from gluon fusion can be reduced significantly due to the new colored particle one-loop contribution. Current collider constraints on the new particles allow for viable parameter space to exist in order to hide a heavy Higgs boson. We categorize the general signatures of these new particles, identify favored regions of their parameter space and point out that discovering or excluding them at the LHC can provide important indirect information for a heavy Higgs. Finally, for a very heavy Higgs boson, beyond the search limit at the 7 TeV LHC, we discuss three additional scenarios where models would be consistent with electroweak precision tests: including an additional vector-like fermion mixing with the top quark, adding another U(1) gauge boson and modifying triple-gauge boson couplings.

  2. Antibacterial activities of leave extracts as bactericides for soaking of skin or hide

    Science.gov (United States)

    Suparno, Ono; Panandita, Tania; Afifah, Amalia; Marimin; Purnawati, Rini

    2018-03-01

    Antibacteria, a subtance inhibiting the growth of bacteria, can be obtained from tropical-almond (Terminalia catappa), morinda (Morinda citrifolia), and white leadtree (Leucaena leucocephala) plants, since the plants have phytochemical content functioning as antibacterial agent. Commonly, part of plant that contains higher antibacterial substances is its leaf. The objectives of this study were to determine antibacterial activity of tropical-almond, morinda, and white leadtree leaves extracts, and to analyse the potency of the three extracts as natural bactericide for soaking of skin or hide. The responses measured in this study were phytochemical contents, total flavonoid, tannin content, the inhibition zone, the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Phytochemical contents containing the three leaves extracts were alkaloid, flavonoid, tannin, saponin, phenolic, and glycoside. Total flavonoid and tannin contents of the three extracts were tropical-almond extract of 1.14 % and 1.51 %, respectively; morinda extract of 0.61 % and 0.36 %, respectively; and white leadtree extract of 0.60 % and 4.82 %, respectively. White leadtree leaf extract gave the highest inhibition zone against B. subtilis, S. aureus and E. coli, i.e. 1.50, 1.3, and 1.65 cm, respectively; and the lowest MIC and MBC against B. subtilis, S. aureus and E. coli, i.e. 1500, 3000, and 1500 μg/ml, respectively. Therefore, the white leadtree leave extract had more potential as bactericide for soaking of skin or hide compared to those of the tropical-almond and morinda leaves extracts.

  3. Analysis Of Aspects Of Messages Hiding In Text Environments

    Directory of Open Access Journals (Sweden)

    Afanasyeva Olesya

    2015-09-01

    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  4. Slide 6

    Indian Academy of Sciences (India)

    Besides these, Mahadevan(1941), Gordon(1951,1958), Allchin & Allchin(1968), Nagaraja Rao (1965), Paddayya (1968), Mathpal (1984), Neumayer (1983), Sadaksharayya(1990) have added to the list of Rock art sites in Karnataka and Kerala.

  5. Information hiding based on double random-phase encoding and public-key cryptography.

    Science.gov (United States)

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li

    2009-03-02

    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  6. Journal of Genetics | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Author Affiliations. Shyam Unniraman1 Valakunja Nagaraja1 2. Department of Microbiology and Cell Biology, Indian Institute of Science, Bangalore 560 012, India; Jawaharlal Nehru Centre for Advanced Scientific Research, Jakkur, Bangalore 560 064, India ...

  7. Alien invasions and the game of hide and seek in Patagonia.

    Directory of Open Access Journals (Sweden)

    Martin Lindegren

    Full Text Available The introduction, establishment and spread of alien species is a major threat to biodiversity and the provision of ecosystem services for human wellbeing. In order to reduce further loss of biodiversity and maintain productive and sustainable ecosystems, understanding the ecological mechanisms underlying species invasions and avoiding potentially harmful effects on native communities is urgently needed, but largely lacking. We here demonstrate, by means of hydroacoustics and advanced spatial modelling, how native fish species as a result of previous exposure to native predators may successfully respond to invasive novel predators through a complicated game of hide and seek, minimizing spatio-temporal overlap with predators, and potentially facilitating coexistence between native prey species (Galaxiids and introduced novel predators (Salmonids in a deep Andean lake, Patagonia.

  8. Sensor and Actuator Fault-Hiding Reconfigurable Control Design for a Four-Tank System Benchmark

    DEFF Research Database (Denmark)

    Hameed, Ibrahim; El-Madbouly, Esam I; Abdo, Mohamed I

    2015-01-01

    Invariant (LTI) system where virtual sensors and virtual actuators are used to correct faulty performance through the use of a pre-fault performance. Simulation results showed that the developed approach can handle different types of faults and able to completely and instantly recover the original system......Fault detection and compensation plays a key role to fulfill high demands for performance and security in today's technological systems. In this paper, a fault-hiding (i.e., tolerant) control scheme that detects and compensates for actuator and sensor faults in a four-tank system benchmark...

  9. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    Directory of Open Access Journals (Sweden)

    Novella Isabel S

    2003-06-01

    Full Text Available Abstract Background In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, RED, was found to avoid extinction and remain in the population for long periods of time. Since RED characterizes the past evolutionary history of the population, this observation was called quasispecies memory. While the quasispecies theory predicts the existence of these memory genomes, there is a disagreement between the expected and observed mutant frequency values. Therefore, the origin of quasispecies memory is not fully understood. Results We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry, the likely cause of fitness differences between wild type and RED mutants. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.. If the RED mutant is constantly recreated by mutations, then its frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases their fitness to the wild-type level. Moreover, even at low m.o.i. the equilibrium frequency of the mutant is higher than predicted by the standard quasispecies model, because a fraction of mutant virions generated from wild-type parents will also be encapsidated by wild-type protein. Conclusions Our model predicts that phenotypic hiding will strongly influence the population dynamics of viruses, particularly at high m.o.i., and will also have important effects on the mutation-selection balance at low m.o.i. The delay in mutant extinction and increase in mutant

  10. No place to hide: when shame causes proselfs to cooperate.

    Science.gov (United States)

    Declerck, Carolyn Henriette; Boone, Christophe; Kiyonari, Toko

    2014-01-01

    Shame is considered a social emotion with action tendencies that elicit socially beneficial behavior. Yet, unlike other social emotions, prior experimental studies do not indicate that incidental shame boosts prosocial behavior. Based on the affect as information theory, we hypothesize that incidental feelings of shame can increase cooperation, but only for self-interested individuals, and only in a context where shame is relevant with regards to its action tendency. To test this hypothesis, cooperation levels are compared between a simultaneous prisoner's dilemma (where "defect" may result from multiple motives) and a sequential prisoner's dilemma (where "second player defect" is the result of intentional greediness). As hypothesized, shame positively affected proselfs in a sequential prisoner's dilemma. Hence ashamed proselfs become inclined to cooperate when they believe they have no way to hide their greediness, and not necessarily because they want to make up for earlier wrong-doing.

  11. Characterization of biofilms produced by Escherichia coli O157 isolated from cattle hides

    Science.gov (United States)

    Milojević, L.; Velebit, B.; Baltić, T.; Nikolić, A.; Mitrović, R.; Đorđević, V.

    2017-09-01

    This study aimed to investigate possibility E. coli O157 from cattle hides to produced biofilms. We had 28 suspect primoisolates and 17 were confirmed to be E. coli O157. Biofilm production test showed that more than 50% of this isolates did not produce biofilm. From the other half of the isolates, 5 of them were weakly adherent, 3 were moderately adherent. Since E. coli O157 are one of the main foodborne hazards in meat processing industry and the discovery that some of them can produce moderately adherent biofilms, request necessity of strict implementation of HACCP procedures to prevent further expansion this pathogen.

  12. Suitability of the RGB Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Directory of Open Access Journals (Sweden)

    Ante Poljicak

    2010-06-01

    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data  hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  13. An Internal Data Non-hiding Type Real-time Kernel and its Application to the Mechatronics Controller

    Science.gov (United States)

    Yoshida, Toshio

    For the mechatronics equipment controller that controls robots and machine tools, high-speed motion control processing is essential. The software system of the controller like other embedded systems is composed of three layers software such as real-time kernel layer, middleware layer, and application software layer on the dedicated hardware. The application layer in the top layer is composed of many numbers of tasks, and application function of the system is realized by the cooperation between these tasks. In this paper we propose an internal data non-hiding type real-time kernel in which customizing the task control is possible only by change in the program code of the task side without any changes in the program code of real-time kernel. It is necessary to reduce the overhead caused by the real-time kernel task control for the speed-up of the motion control of the mechatronics equipment. For this, customizing the task control function is needed. We developed internal data non-cryptic type real-time kernel ZRK to evaluate this method, and applied to the control of the multi system automatic lathe. The effect of the speed-up of the task cooperation processing was able to be confirmed by combined task control processing on the task side program code using an internal data non-hiding type real-time kernel ZRK.

  14. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  15. Effect of acanthocephalan parasites on hiding behaviour in two species of shore crabs.

    Science.gov (United States)

    Latham, A D M; Poulin, R

    2002-12-01

    The effect of acanthocephalan parasites (Profilicollis spp.) on the hiding behaviour during low tide of two species of shore crabs (intermediate hosts), Macrophthalmus hirtipes (Brachyura: Ocypodidae) and Hemigrapsus crenulatus (Brachyura: Grapsidae), was examined at Blueskin Bay, South Island, New Zealand. Exposed M. hirtipes were found to have significantly higher infection levels than did hidden conspecifics. This pattern was not observed for H. crenulatus. Mean cystacanth numbers were found to be considerably higher in M. hirtipes than H. crenulatus. Crabs exposed at low tide are at a greater risk of predation by definitive shorebird hosts than are hidden conspecifics. Preferential manipulation of one intermediate host species over another could influence diversity within ecosystems.

  16. Hide out return test and blowndown crud composition under ETA chemistry

    International Nuclear Information System (INIS)

    Chocron, Mauricio; Rodriguez, Ivanna; Saucedo, Ramona; Rodriguez-Aliciardi, Matias; Montes, Juan

    2012-09-01

    Among the techniques recommended for the surveillance of the Steam Generators (SGs) are (i) the follow-up of the corrosion products in the Feed Water and Blown down water and the corresponding accumulation mass balance and (ii) The follow-up of ionic impurities normally present in the main condensate and feed water that can enter the cycle either by condenser leakages or even by the make-up water. This is so, no matter how well the the cycle is constructed or the make-up water plant behaves given the continuous phase change present in it and the subsequent concentration. A synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in the deposits creating a potentially risky environment for the steam generator tubes. Hide out return determination consists in the measurement of the concentration of ions, anions and cations, present in the blown-down water which are eluted during the shutdown along with the reduction of power and temperature. The integrated value provides figures to perform several evaluations like: (i) how well the make-up water plant has performed during the cycle, (ii) presence of condenser in leakages, (iii) amount of deposits present in the steam generator and (iv) it allows to estimate the chemistry in operation inside the steam generator liquid phase inside the sludge pile. Embalse, a CANDU 6 pressurized heavy water reactor located in Cordoba Province, Argentina, is close to reach the end-of-design-life and a project of life extension is currently ongoing. There, also the chemistry in the BOP has been modified from Morpholine to Ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of steam generator internals and new steam generators will be installed. It is of interest then to set up a hide-out return procedure and analysis of blown down crud collected during the shut down as a base line for the second period of operation

  17. Hiding the interior region of core-shell nanoparticles with quantum invisible cloaks

    Science.gov (United States)

    Lee, Jeng Yi; Lee, Ray-Kuang

    2014-04-01

    Based on the scattering cancellation, we provide a method not only making a nanoparticle nearly invisible, but also hiding its interior region from the outside probing matter wave. By applying the interplay among the nodal points of partial waves along with the concept of streamline in fluid dynamics for probability flux, a quantum invisible cloak to the electron transport in a host semiconductor is demonstrated by simultaneously guiding the probability flux outside a hidden region and keeping the total scattering cross section negligible. As the probability flux vanishes in the interior region, one can embed any materials inside a multiple core-shell nanoparticle without affecting physical observables from the outside. Our results reveal the possibility to design a protection shield layer for fragile interior parts from the impact of transport electrons.

  18. An Improved Information Hiding Method Based on Sparse Representation

    Directory of Open Access Journals (Sweden)

    Minghai Yao

    2015-01-01

    Full Text Available A novel biometric authentication information hiding method based on the sparse representation is proposed for enhancing the security of biometric information transmitted in the network. In order to make good use of abundant information of the cover image, the sparse representation method is adopted to exploit the correlation between the cover and biometric images. Thus, the biometric image is divided into two parts. The first part is the reconstructed image, and the other part is the residual image. The biometric authentication image cannot be restored by any one part. The residual image and sparse representation coefficients are embedded into the cover image. Then, for the sake of causing much less attention of attackers, the visual attention mechanism is employed to select embedding location and embedding sequence of secret information. Finally, the reversible watermarking algorithm based on histogram is utilized for embedding the secret information. For verifying the validity of the algorithm, the PolyU multispectral palmprint and the CASIA iris databases are used as biometric information. The experimental results show that the proposed method exhibits good security, invisibility, and high capacity.

  19. Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function

    Directory of Open Access Journals (Sweden)

    Najme Maleki

    2014-07-01

    Full Text Available This paper presents two adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Our adaptive scheme is based on the concept of human vision sensitivity, so the pixels in edge areas than to smooth areas can tolerate much more changes without making visible distortion for human eyes. In our adaptive scheme, the average differencing value of four neighborhood pixels into a block via a threshold secret key determines whether current block is located in edge or smooth area. Pixels in the edge areas are embedded by Q-bit of secret data with a larger value of Q than that of pixels placed in smooth areas. Also in this scholar, we represent one non-adaptive data hiding algorithm. Our non-adaptive scheme, via an error reduction procedure, produces a high visual quality for stego-image. The proposed schemes present several advantages. 1-of aspects the embedding capacity and visual quality of stego-image are scalable. In other words, the embedding rate as well as the image quality can be scaled for practical applications 2-the high embedding capacity with minimal visual distortion can be achieved, 3-our methods require little memory space for secret data embedding and extracting phases, 4-secret keys have used to protect of the embedded secret data. Thus, level of security is high, 5-the problem of overflow or underflow does not occur. Experimental results indicated that the proposed adaptive scheme significantly is superior to the currently existing scheme, in terms of stego-image visual quality, embedding capacity and level of security and also our non-adaptive method is better than other non-adaptive methods, in view of stego-image quality. Results show which our adaptive algorithm can resist against the RS steganalysis attack.

  20. Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy

    Science.gov (United States)

    Christandl, Matthias; Ferrara, Roberto

    2017-12-01

    An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005), 10.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.

  1. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    OpenAIRE

    El-Monem, Farouk Abd; Hussain, Ahmed I.; Nashy, EL-Shahat H.A.; El-Wahhab, Hamada Abd; Naser, Abd El-Rahman M.

    2014-01-01

    Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA) and butyl acrylate (BA). The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leat...

  2. New Fellows and Honorary Fellow

    Indian Academy of Sciences (India)

    Home; Fellowship. Fellow Profile. Elected: 1935 Section: Chemistry. Rao, Argula Nagaraja. Date of birth: 15 November 1906. Specialization: Sugar Technology. YouTube; Twitter; Facebook; Blog. Academy News. IAS Logo. 29th Mid-year meeting. Posted on 19 January 2018. The 29th Mid-year meeting of the Academy will ...

  3. Pawpaw

    African Journals Online (AJOL)

    DR. MISS BLESSING

    jam, marmalade, canned fruit balls or cubes in syrup, crystallized fruit, candies ... preparation of food as meat tenderizer and is of industrial importance. ..... Horticulturae, 851: 527 – 532. Ganjewala, D., Nagaraja, C., Nayak, M.R. and. Devi, S.A. (2010). Effects of sodium nitroprusside on activity of acid and alkaline invertase in.

  4. Journal of Genetics | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    An orphan gyrB in the Mycobacterium smegmatis genome uncovered by comparative genomics · P. Jain V. Nagaraja · More Details Abstract Fulltext PDF. DNA gyrase is an essential topoisomerase found in all bacteria. It is encoded by gyrB and gyrA genes. These genes are organized differently in different bacteria.

  5. Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload

    Directory of Open Access Journals (Sweden)

    Zhaoxia Yin

    2014-01-01

    Full Text Available This paper proposes a separable reversible data-hiding scheme in encrypted image which offers high payload and error-free data extraction. The cover image is partitioned into nonoverlapping blocks and multigranularity encryption is applied to obtain the encrypted image. The data hider preprocesses the encrypted image and randomly selects two basic pixels in each block to estimate the block smoothness and indicate peak points. Additional data are embedded into blocks in the sorted order of block smoothness by using local histogram shifting under the guidance of the peak points. At the receiver side, image decryption and data extraction are separable and can be free to choose. Compared to previous approaches, the proposed method is simpler in calculation while offering better performance: larger payload, better embedding quality, and error-free data extraction, as well as image recovery.

  6. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian

    2015-01-01

    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. (paper)

  7. An Algorithm for Data Hiding in Radiographic Images and ePHI/R Application

    Directory of Open Access Journals (Sweden)

    Aqsa Rashid

    2018-01-01

    Full Text Available Telemedicine is the use of Information and Communication Technology (ICT for clinical health care from a distance. The exchange of radiographic images and electronic patient health information/records (ePHI/R for diagnostic purposes has the risk of confidentiality, ownership identity, and authenticity. In this paper, a data hiding technique for ePHI/R is proposed. The color information in the cover image is used for key generation, and stego-images are produced with ideal case. As a result, the whole stego-system is perfectly secure. This method includes the features of watermarking and steganography techniques. The method is applied to radiographic images. For the radiographic images, this method resembles watermarking, which is an ePHI/R data system. Experiments show promising results for the application of this method to radiographic images in ePHI/R for both transmission and storage purpose.

  8. Reversible Dual-Image-Based Hiding Scheme Using Block Folding Technique

    Directory of Open Access Journals (Sweden)

    Tzu-Chuen Lu

    2017-10-01

    Full Text Available The concept of a dual-image based scheme in information sharing consists of concealing secret messages in two cover images; only someone who has both stego-images can extract the secret messages. In 2015, Lu et al. proposed a center-folding strategy where each secret symbol is folded into the reduced digit to reduce the distortion of the stego-image. Then, in 2016, Lu et al. used a frequency-based encoding strategy to reduce the distortion of the frequency of occurrence of the maximum absolute value. Because the folding strategy can obviously reduce the value, the proposed scheme includes the folding operation twice to further decrease the reduced digit. We use a frequency-based encoding strategy to encode a secret message and then use the block folding technique by performing the center-folding operation twice to embed secret messages. An indicator is needed to identify the sequence number of the folding operation. The proposed scheme collects several indicators to produce a combined code and hides the code in a pixel to reduce the size of the indicators. The experimental results show that the proposed method can achieve higher image quality under the same embedding rate or higher payload, which is better than other methods.

  9. On the implementation of IP protection using biometrics based information hiding and firewall

    Science.gov (United States)

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar

    2016-02-01

    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  10. A novel attack method about double-random-phase-encoding-based image hiding method

    Science.gov (United States)

    Xu, Hongsheng; Xiao, Zhijun; Zhu, Xianchen

    2018-03-01

    By using optical image processing techniques, a novel text encryption and hiding method applied by double-random phase-encoding technique is proposed in the paper. The first step is that the secret message is transformed into a 2-dimension array. The higher bits of the elements in the array are used to fill with the bit stream of the secret text, while the lower bits are stored specific values. Then, the transformed array is encoded by double random phase encoding technique. Last, the encoded array is embedded on a public host image to obtain the image embedded with hidden text. The performance of the proposed technique is tested via analytical modeling and test data stream. Experimental results show that the secret text can be recovered either accurately or almost accurately, while maintaining the quality of the host image embedded with hidden data by properly selecting the method of transforming the secret text into an array and the superimposition coefficient.

  11. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    Directory of Open Access Journals (Sweden)

    A.A. Mohamed

    2014-07-01

    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.

  12. Hiding effort to gain a competitive advantage: Evidence from China.

    Science.gov (United States)

    Zhao, Li; Heyman, Gail D

    2018-06-01

    Previous studies with Western populations have shown that adolescents' tendency to downplay their academic effort is affected by two kinds of motives: ability-related motives (e.g., to appear competent) and social approval motives (e.g., to be popular). In this research, we test for the presence of additional competition-related motives in China, a culture placing strong emphasis on academic competition. Study 1 (N = 150) showed that, in response to a scenario in which a hard-working high-school junior hid effort from classmates, the most highly endorsed explanation was "to influence others to work less hard to maintain a competitive advantage." Study 2 (N = 174) revealed that competition-related explanations were endorsed relatively more often when the speaker and audience had similar academic rankings. This tendency was most evident when both speaker and audience were top performers, and when this was the case, participants' desire to demonstrate superiority over others was a positive predictor of endorsement of competition-related motives. Study 3 (N = 137) verified that competition-related motives were more strongly endorsed among Chinese participants than U.S. These results suggest that at least in cultures that emphasize academic competition and in contexts where competition is salient, hiding effort is often about attempting to gain strategic advantage. © 2016 International Union of Psychological Science.

  13. [Missed diagnosis of hiding posterior marginal fracture of ankle with pronation-external rotation type and its treatment].

    Science.gov (United States)

    Wang, Jia; Zhang, Yun-Tong; Zhang, Chun-Cai; Tang, Yang

    2014-01-01

    To analyze causes of missed diagnosis of hiding post-malleolar fractures in treating ankle joint fractures of pronation-external rotation type according to Lauge-Hansen classification and assess its medium-term outcomes. Among 103 patients with ankle joint fracture of pronation-external rotation type treated from March 2002 to June 2010,9 patients were missed diagnosis,including 6 males and 3 females,with a mean age of 35.2 years old (ranged, 18 to 55 years old) . Four patients were diagnosed during operation, 2 patients were diagnosed 2 or 3 days after first surgery and 3 patients came from other hospital. All the patients were treated remedially with lag screws and lock plates internal fixation. After operation,ankle joint function was evaluated according to American Orthopaedic Foot and Ankle Society (AOFAS). All the 9 patients were followed up, and the duration ranged from 14 to 30 months (averaged, 17 months). No incision infection was found, and all incision healed at the first stage. At the latest follow-up, AOFAS was 83.0 +/- 4.4, the score of 4 patients diagnosed during operation was 85.0 +/- 2.9, and the score of 5 patients treated by secondary operation was 81.0 +/- 5.3. All the patients got fracture union observed by X-ray at a mean time of 2.2 months after operation. There were no complications such as internal fixation loosing, broken and vascular or nerve injuries. Ankle joint fracture of pronation-external rotation type may be combined with hiding post-malleolar fractures. So to patients with ankle joint fracture of pronation-external rotation type, lateral X-ray should be read carefully, and if necessary, CT or MRI examination should be performed. If adding lateral X-ray examination after reduction of exterior and interior ankle joint fixation, the missed diagnosis may be avoided.

  14. Development of methods for the neutron activation analysis to the determination of essential and toxic trace elements of biological and environmental samples: application of enzyme activity of raw hides

    International Nuclear Information System (INIS)

    Sipos, T.; Nagy, L.G.; Toeroek, G.; Kollar, J.

    1974-01-01

    Investigations on the post mortem enzymatic processes pointed out the fact, that significant deviations can be observed in the extent and in the results of the autolytic transformations occurring during the storage of raw hide. A neutron activation analysis procedure, based on a semiautomated radiochemical separation procedure and scintillation gamma spectrometry, was selected for the determination of some trace elements. Six trace elements, Cu, Mn, Zn, Au, As, and Cr, and one minor component,Br, were detected and/or determined in the concentration region of 0,1-10 3 ppM. According to preliminary investigations evaluated at the time being, concentration differences of some orders of magnitude were obtained for some trace elements: copper, zinc and manganese, whereas the concentration of bromine remained practically constant. These findings seem to correlate with large differences in appearance due to different enzyme activities in the raw hides

  15. Costly hide and seek pays: unexpected consequences of deceit in a social dilemma

    International Nuclear Information System (INIS)

    Szolnoki, Attila; Perc, Matjaž

    2014-01-01

    Deliberate deceptiveness intended to gain an advantage is commonplace in human and animal societies. In a social dilemma, an individual may only pretend to be a cooperator to elicit cooperation from others, while in reality he is a defector. With this as motivation, we study a simple variant of the evolutionary prisoner's dilemma game entailing deceitful defectors and conditional cooperators that lifts the veil on the impact of such two-faced behavior. Defectors are able to hide their true intentions at a personal cost, while conditional cooperators are probabilistically successful at identifying defectors and act accordingly. By focusing on the evolutionary outcomes in structured populations, we observe a number of unexpected and counterintuitive phenomena. We show that deceitful behavior may fare better if it is costly, and that a higher success rate of identifying defectors does not necessarily favor cooperative behavior. These results are rooted in the spontaneous emergence of cycling dominance and spatial patterns that give rise to fascinating phase transitions, which in turn reveal the hidden complexity behind the evolution of deception. (paper)

  16. Work Satisfaction Influence Toward Employee Prosperity

    OpenAIRE

    Indryawati, Rini; Widiyarsih, Widiyarsih

    2007-01-01

    Work satisfaction has an effect to employee wealthy at PT. Nagaraja Lestari in taking the policy and to motivate employee to enhancing the work performance in giving wages, salary, incentives, job promotion and employee healthy. This research is using qualitative approach and using observation and interview as tool research. Data collecting is in naration, description, story, written and unwritten documents. When employee has higher work satisfaction they will psychological wealthy fullfilness.

  17. A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

    Directory of Open Access Journals (Sweden)

    Milad Taleby Ahvanooey

    2018-01-01

    Full Text Available With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.

  18. Prevalence and relatedness of Escherichia coli O157:H7 strains in the feces and on the hides and carcasses of U.S. meat goats at slaughter.

    Science.gov (United States)

    Jacob, M E; Foster, D M; Rogers, A T; Balcomb, C C; Sanderson, M W

    2013-07-01

    We determined the prevalences of Escherichia coli O157:H7 in feces, hide, and carcasses of meat goats at a U.S. processing plant. Prevalences were 11.1%, 2.7%, and 2.7%, respectively. Sixteen pulsed-field gel electrophoresis (PFGE) subtypes were identified among 49 E. coli O157:H7 isolates, some of which were present on multiple sample types or collection days.

  19. Chlamydia pneumoniae hides inside apoptotic neutrophils to silently infect and propagate in macrophages.

    Directory of Open Access Journals (Sweden)

    Jan Rupp

    Full Text Available BACKGROUND: Intracellular pathogens have developed elaborate strategies for silent infection of preferred host cells. Chlamydia pneumoniae is a common pathogen in acute infections of the respiratory tract (e.g. pneumonia and associated with chronic lung sequelae in adults and children. Within the lung, alveolar macrophages and polymorph nuclear neutrophils (PMN are the first line of defense against bacteria, but also preferred host phagocytes of chlamydiae. METHODOLOGY/PRINCIPAL FINDINGS: We could show that C. pneumoniae easily infect and hide inside neutrophil granulocytes until these cells become apoptotic and are subsequently taken up by macrophages. C. pneumoniae infection of macrophages via apoptotic PMN results in enhanced replicative activity of chlamydiae when compared to direct infection of macrophages, which results in persistence of the pathogen. Inhibition of the apoptotic recognition of C. pneumoniae infected PMN using PS- masking Annexin A5 significantly lowered the transmission of chlamydial infection to macrophages. Transfer of apoptotic C. pneumoniae infected PMN to macrophages resulted in an increased TGF-ss production, whereas direct infection of macrophages with chlamydiae was characterized by an enhanced TNF-alpha response. CONCLUSIONS/SIGNIFICANCE: Taken together, our data suggest that C. pneumoniae uses neutrophil granulocytes to be silently taken up by long-lived macrophages, which allows for efficient propagation and immune protection within the human host.

  20. Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos

    Science.gov (United States)

    Xu, Dawen; Wang, Rangding

    2015-05-01

    A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  1. Analysis of hide-out return and the composition of the steam generators' combined blowdown under ethanolamine chemistry

    International Nuclear Information System (INIS)

    Rodriguez Aliciardi, M; Belloni, M; Croatto, F; Ferrari, F; Herrera, C; Mendizabal, M; Montes, J; Saucedo, R; Rodriguez, I; Chocron, M

    2012-01-01

    Among the techniques recommended for the surveillance of the steam generators (SG's) are (i) the follow-up of the corrosion products in the feed water and blown-down water and the corresponding accumulation mass balance and (ii) the follow-up of the ionic impurities normally present in the main condensate and feed water that can enter in the cycle either through condenser leakages or even with the make-up water. This is, no matter how well the cycle is constructed or the make-up water plant behaves, given the continuous phase change present in the cycle, a concentration equilibrium is established. Moreover, a synergistic effect exists between both, corrosion products and impurities, (i) and (ii), because impurities concentrate in crevices and deposits creating a potentially corrosion risky environment for the SG's tubes. Hide-out return determination consists in the measurement of ions' concentrations, present in the blown-down water which are eluted in the shutdown during the power and temperature reduction. The integrated values allow graphical representations for performing several evaluations like: (i) the performance make-up water plant during a period, (ii) the presence of condenser in-leakages, (iii) the SG's deposits estimation and (iv) the internal chemistry of the SG's liquid phase inside the sludge pile. CNE, a CANDU 6 pressurized heavy-water reactor (PHWR) located in Embalse, Cordoba Province, Argentina, is close to reach the end-of-design-life and a life extension project is currently ongoing. In the plant also the chemistry of the BOP has been modified from a morpholine to an ethanolamine chemistry (Fernandez et. al, NPC'2010, October 3-7, Quebec City, Canada) to enhance protection of SG's internals and new SG's will be installed. Then, it is of interest to set up a hide-out return procedure and analysis of the combined blown-down crud collected during the shut down as a base line for the second period of

  2. Variasi Kebugaran Jenis/Strain Trichogramma pada Telur Plutella xylostella (L. (Lepidoptera: Plutellidae

    Directory of Open Access Journals (Sweden)

    Siti Herlinda

    2005-07-01

    Full Text Available Laboratory experiments were conducted to evaluate fitness traits of trichogrammatid species/strains reared on eggs of the diamondback moth, Plutella xylostella (L.. The experiments used eleven trichogrammatid species/strains collected from different host species and locations. They were Trichogrammatoidea cojuangcoi Nagaraja collected from parasitized P. xylostella eggs in Jarai, Muarasiban, Kerinjing, and Bogar, Trichogrammatoidea sp. A and B collected from parasitized Helicoverpa armigera (Hubner eggs in Bogor, Trichogrammatoidea armigera Nagaraja collected from parasitized H. armigera eggs in Bogor, Trichogramma chilonis Ishii, Trichogramma japanicum Ashmead, Trichogramma australicum Girault, and Trichogrammatoidea nana (Zehntner collected from parasitized Chilo sp. eggs in Cinta Manis, South Sumatera. When a female of Trichogramma was constantly exposed to 100 P. xylostella eggs per day throughout her lifetime, T. cojuangcoi from Jarai produced more parasitized host eggs (50.67% and progenies (50.67 adults/female compared to other species/strains. Sex ratio was predominantly female, the most female progenies were produced ( 38 adults/ female by T. cojuangcoi from Jarai. There were no significant differences in larval (0-3.27% and pupal (0-3.75% mortality of all species/strains. Survival emerging adults of T. japanicum (90.24% were significantly lower than those of other species/strains. These data showed that T. cojuangcoi from Jarai could be developed as biocontrol agents of P. xylostella.

  3. Hiding in plain sight: communication theory in implementation science.

    Science.gov (United States)

    Manojlovich, Milisa; Squires, Janet E; Davies, Barbara; Graham, Ian D

    2015-04-23

    ignoring a key contributor to implementation intervention success. When conceptualized as a transformational process, the focus of communication moves to shared understanding and is grounded in human interactions and the way we go about constructing knowledge. Instead of hiding in plain sight, we suggest explicitly acknowledging the role that communication plays in our implementation efforts. By using both paradigms, we can investigate when communication facilitates implementation, when it does not, and how to improve it so that our implementation and clinical interventions are embraced by clinicians and patients alike.

  4. Hide-Scrapers from Arukhlo I Settlement in Georgia (on correspondence of the shape and function of prehistoric implements

    Directory of Open Access Journals (Sweden)

    Esakia Ketevan M.

    2017-09-01

    Full Text Available The article analyses one of the primary categories of the implement complex discovered at Arukhlo I Neolithic settlement (Georgia, Kvemo Kartli Region. The stone implements discovered at the site are characterized by their great variety. Comprehensive functional research conducted by the authors demonstrated that the typological and morphological characteristics of the various categories of stone implements do not always correspond to their functions. Thus, the shapes and functions of the hide-scrapers were fully identical for 18 of 39 implements only, whereas the other tools were used for different purposes and did not feature traces of utilization. A microanalysis of their working parts allowed to determine the types of processed raw material, means of processing, and in certain cases the type of obtained articles as well. The authors made a conclusion on the importance of the comprehensive research of production inventory for the reconstruction of the characteristic features of prehistoric economy.

  5. Validation of a hot water rinse and lactic acid spray in combination with scaling for treating hide-on carcasses to control biotype I strains of Escherichia coli used as surrogates for Shiga toxin-producing E. coli

    Science.gov (United States)

    Scalding of hide-on bob veal carcasses with or without standard scalding chemical agents typically used for hogs, followed by an 82.2degreeC hot water wash and lactic acid spray (applied at ambient temperature) prior to chilling, was evaluated to determine its effectiveness in reducing the levels of...

  6. Nano-emulsion based on acrylic acid ester co-polymer derivatives as an efficient pre-tanning agent for buffalo hide

    Directory of Open Access Journals (Sweden)

    Farouk Abd El-Monem

    2017-05-01

    Full Text Available Acrylic copolymer nanoemulsions were prepared based on methyl methacrylate (MMA and butyl acrylate (BA. The prepared acrylic copolymer emulsions were characterized using solid content, rheological properties, molecular weight, MFFT and TEM. The prepared polymers were used as pre-tanning of the depickled hide to enhance the physico-mechanical properties of tanned leather. The key parameters which affect exhaustion and fixation of chrome tan as well as shrinkage temperature of the tanned leather were studied and evaluated using SEM, shrinkage temperature and the mechanical properties of the pre-tanned leather. The results showed that, the prepared polymers A & C are the best polymers in improving the physical properties of the treated leather. Furthermore, the shrinkage temperature and the mechanical properties of the tanned leather were improved. In addition, a significant enhancement in the texture of the leather treated by the polymers was noticed as proved by scanning electron microscopy (SEM.

  7. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Directory of Open Access Journals (Sweden)

    Vishakha Kelkar

    2017-01-01

    Full Text Available In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient’s information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image.

  8. Novel Variants of a Histogram Shift-Based Reversible Watermarking Technique for Medical Images to Improve Hiding Capacity

    Science.gov (United States)

    Tuckley, Kushal

    2017-01-01

    In telemedicine systems, critical medical data is shared on a public communication channel. This increases the risk of unauthorised access to patient's information. This underlines the importance of secrecy and authentication for the medical data. This paper presents two innovative variations of classical histogram shift methods to increase the hiding capacity. The first technique divides the image into nonoverlapping blocks and embeds the watermark individually using the histogram method. The second method separates the region of interest and embeds the watermark only in the region of noninterest. This approach preserves the medical information intact. This method finds its use in critical medical cases. The high PSNR (above 45 dB) obtained for both techniques indicates imperceptibility of the approaches. Experimental results illustrate superiority of the proposed approaches when compared with other methods based on histogram shifting techniques. These techniques improve embedding capacity by 5–15% depending on the image type, without affecting the quality of the watermarked image. Both techniques also enable lossless reconstruction of the watermark and the host medical image. A higher embedding capacity makes the proposed approaches attractive for medical image watermarking applications without compromising the quality of the image. PMID:29104744

  9. Hiding the tobacco power wall reduces cigarette smoking risk in adolescents: using an experimental convenience store to assess tobacco regulatory options at retail point-of-sale.

    Science.gov (United States)

    Shadel, William G; Martino, Steven C; Setodji, Claude M; Scharf, Deborah M; Kusuke, Daniela; Sicker, Angela; Gong, Min

    2015-11-23

    This experiment tested whether changing the location or visibility of the tobacco power wall in a life sized replica of a convenience store had any effect on adolescents' susceptibility to future cigarette smoking. The study was conducted in the RAND StoreLab (RSL), a life sized replica of a convenience store that was developed to experimentally evaluate how changing aspects of tobacco advertising displays in retail point-of-sale environments influences tobacco use risk and behaviour. A randomised, between-subjects experimental design with three conditions that varied the location or visibility of the tobacco power wall within the RSL was used. The conditions were: cashier (the tobacco power wall was located in its typical position behind the cash register counter); sidewall (the tobacco power wall was located on a sidewall away from the cash register); or hidden (the tobacco power wall was located behind the cashier but was hidden behind an opaque wall). The sample included 241 adolescents. Hiding the tobacco power wall significantly reduced adolescents' susceptibility to future cigarette smoking compared to leaving it exposed (ie, the cashier condition; p=0.02). Locating the tobacco power wall on a sidewall away from the cashier had no effect on future cigarette smoking susceptibility compared to the cashier condition (p=0.80). Hiding the tobacco power wall at retail point-of-sale locations is a strong regulatory option for reducing the impact of the retail environment on cigarette smoking risk in adolescents. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  10. Optical image-hiding method with false information disclosure based on the interference principle and partial-phase-truncation in the fractional Fourier domain

    International Nuclear Information System (INIS)

    Dai, Chaoqing; Wang, Xiaogang; Zhou, Guoquan; Chen, Junlang

    2014-01-01

    An image-hiding method based on the optical interference principle and partial-phase-truncation in the fractional Fourier domain is proposed. The primary image is converted into three phase-only masks (POMs) using an analytical algorithm involved partial-phase-truncation and a fast random pixel exchange process. A procedure of a fake silhouette for a decryption key is suggested to reinforce the encryption and give a hint of the position of the key. The fractional orders of FrFT effectively enhance the security of the system. In the decryption process, the POM with false information and the other two POMs are, respectively, placed in the input and fractional Fourier planes to recover the primary image. There are no unintended information disclosures and iterative computations involved in the proposed method. Simulation results are presented to verify the validity of the proposed approach. (letters)

  11. Hiding Electronic Patient Record (EPR) in medical images: A high capacity and computationally efficient technique for e-healthcare applications.

    Science.gov (United States)

    Loan, Nazir A; Parah, Shabir A; Sheikh, Javaid A; Akhoon, Jahangir A; Bhat, Ghulam M

    2017-09-01

    A high capacity and semi-reversible data hiding scheme based on Pixel Repetition Method (PRM) and hybrid edge detection for scalable medical images has been proposed in this paper. PRM has been used to scale up the small sized image (seed image) and hybrid edge detection ensures that no important edge information is missed. The scaled up version of seed image has been divided into 2×2 non overlapping blocks. In each block there is one seed pixel whose status decides the number of bits to be embedded in the remaining three pixels of that block. The Electronic Patient Record (EPR)/data have been embedded by using Least Significant and Intermediate Significant Bit Substitution (ISBS). The RC4 encryption has been used to add an additional security layer for embedded EPR/data. The proposed scheme has been tested for various medical and general images and compared with some state of art techniques in the field. The experimental results reveal that the proposed scheme besides being semi-reversible and computationally efficient is capable of handling high payload and as such can be used effectively for electronic healthcare applications. Copyright © 2017. Published by Elsevier Inc.

  12. What is hiding behind ontogenic d13C variations in mollusk shells: New insights from scallops.

    Science.gov (United States)

    Chauvaud, L.; Lorrain, A.; Gillikin, D. P.; Thebault, J.; Paulet, Y.; Strand, O.; Blamart, D.; Guarini, J.; Clavier, J.

    2008-12-01

    We examined d13Ccalcite variations along scallop shells (Pecten maximus) sampled in Norway, France and Spain. Time series of shell calcite d13C show a consistent pattern of decreasing d13C with age. This almost linear d13C trend reflects an increasing contribution of metabolic CO2 to skeletal carbonate throughout ontogeny. We have removed this ontogenic trend to try to extract other information from our shell calcite d13C dataset. Scallops from the Bay of Brest (western Brittany, France) were then used to interpret the data as many environmental parameters were available for this site. d13Ccalcite variations were compared to d13C of dissolved inorganic carbon (DIC) and Chl a. The detrended calcite d13C profiles seem to follow a seasonal pattern, but surprisingly are inversely related to the d13C DIC and chlorophyll a concentrations measured within the water column. Theses results suggest that shell d13C variations are not controlled by isotopic variation of DIC. Since scallops eat phytoplankton and microphytobenthos cells, and, as a consequence respire organic mater largely depleted in 13C, we therefore suggest that in mollusk suspension feeders the shell d13Ccalcite might still be used to track the annual number of phytoplankton blooms when d13C values of calcite are detrended. We must consider this trend as a potential biological filter hiding precious environmental records.

  13. Information hiding techniques for infrared images: exploring the state-of-the art and challenges

    Science.gov (United States)

    Pomponiu, Victor; Cavagnino, Davide; Botta, Marco; Nejati, Hossein

    2015-10-01

    The proliferation of Infrared technology and imaging systems enables a different perspective to tackle many computer vision problems in defense and security applications. Infrared images are widely used by the law enforcement, Homeland Security and military organizations to achieve a significant advantage or situational awareness, and thus is vital to protect these data against malicious attacks. Concurrently, sophisticated malware are developed which are able to disrupt the security and integrity of these digital media. For instance, illegal distribution and manipulation are possible malicious attacks to the digital objects. In this paper we explore the use of a new layer of defense for the integrity of the infrared images through the aid of information hiding techniques such as watermarking. In this context, we analyze the efficiency of several optimal decoding schemes for the watermark inserted into the Singular Value Decomposition (SVD) domain of the IR images using an additive spread spectrum (SS) embedding framework. In order to use the singular values (SVs) of the IR images with the SS embedding we adopt several restrictions that ensure that the values of the SVs will maintain their statistics. For both the optimal maximum likelihood decoder and sub-optimal decoders we assume that the PDF of SVs can be modeled by the Weibull distribution. Furthermore, we investigate the challenges involved in protecting and assuring the integrity of IR images such as data complexity and the error probability behavior, i.e., the probability of detection and the probability of false detection, for the applied optimal decoders. By taking into account the efficiency and the necessary auxiliary information for decoding the watermark, we discuss the suitable decoder for various operating situations. Experimental results are carried out on a large dataset of IR images to show the imperceptibility and efficiency of the proposed scheme against various attack scenarios.

  14. Probing the crucial role of Leu31 and Thr33 of the Bacillus pumilus CBS alkaline protease in substrate recognition and enzymatic depilation of animal hide.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    Full Text Available The sapB gene, encoding Bacillus pumilus CBS protease, and seven mutated genes (sapB-L31I, sapB-T33S, sapB-N99Y, sapB-L31I/T33S, sapB-L31I/N99Y, sapB-T33S/N99Y, and sapB-L31I/T33S/N99Y were overexpressed in protease-deficient Bacillus subtilis DB430 and purified to homogeneity. SAPB-N99Y and rSAPB displayed the highest levels of keratinolytic activity, hydrolysis efficiency, and enzymatic depilation. Interestingly, and at the semi-industrial scale, rSAPB efficiently removed the hair of goat hides within a short time interval of 8 h, thus offering a promising opportunity for the attainment of a lime and sulphide-free depilation process. The efficacy of the process was supported by submitting depilated pelts and dyed crusts to scanning electron microscopic analysis, and the results showed well opened fibre bundles and no apparent damage to the collagen layer. The findings also revealed better physico-chemical properties and less effluent loads, which further confirmed the potential candidacy of the rSAPB enzyme for application in the leather industry to attain an ecofriendly process of animal hide depilation. More interestingly, the findings on the substrate specificity and kinetic properties of the enzyme using the synthetic peptide para-nitroanilide revealed strong preferences for an aliphatic amino-acid (valine at position P1 for keratinases and an aromatic amino-acid (phenylalanine at positions P1/P4 for subtilisins. Molecular modeling suggested the potential involvement of a Leu31 residue in a network of hydrophobic interactions, which could have shaped the S4 substrate binding site. The latter could be enlarged by mutating L31I, fitting more easily in position P4 than a phenylalanine residue. The molecular modeling of SAPB-T33S showed a potential S2 subside widening by a T33S mutation, thus suggesting its importance in substrate specificity.

  15. Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images

    Directory of Open Access Journals (Sweden)

    Mehdi Hussain

    2016-05-01

    Full Text Available The goal of image steganographic methods considers three main key issues: high embedding capacity, good visual symmetry/quality, and security. In this paper, a hybrid data hiding method combining the right-most digit replacement (RMDR with an adaptive least significant bit (ALSB is proposed to provide not only high embedding capacity but also maintain a good visual symmetry. The cover-image is divided into lower texture (symmetry patterns and higher texture (asymmetry patterns areas and these textures determine the selection of RMDR and ALSB methods, respectively, according to pixel symmetry. This paper has three major contributions. First, the proposed hybrid method enhanced the embedding capacity due to efficient ALSB utilization in the higher texture areas of cover images. Second, the proposed hybrid method maintains the high visual quality because RMDR has the closest selection process to generate the symmetry between stego and cover pixels. Finally, the proposed hybrid method is secure against statistical regular or singular (RS steganalysis and pixel difference histogram steganalysis because RMDR is capable of evading the risk of RS detection attacks due to pixel digits replacement instead of bits. Extensive experimental tests (over 1500+ cover images are conducted with recent least significant bit (LSB-based hybrid methods and it is demonstrated that the proposed hybrid method has a high embedding capacity (800,019 bits while maintaining good visual symmetry (39.00% peak signal-to-noise ratio (PSNR.

  16. Assessing theory of mind nonverbally in those with intellectual disability and ASD: the penny hiding game.

    Science.gov (United States)

    San José Cáceres, Antonia; Keren, Noa; Booth, Rhonda; Happé, Francesca

    2014-10-01

    Individuals with autism spectrum disorder (ASD) and low intellectual/language abilities are often omitted from experimental studies because of the challenges of testing these individuals. It is vital to develop appropriate and accessible tasks so that this significant part of the spectrum is not neglected. The theory of mind (ToM) has been extensively assessed in ASD, predominantly in relatively high-functioning individuals with reasonable language skills. This study aims to assess the ToM abilities of a sample of 132 participants with intellectual disability (ID) with and without ASD, matched in verbal mental age (VMA) and chronological age, using a naturalistic and nonverbal deception task: the Penny Hiding Game (PHG). The relationship between performance on the PHG and everyday adaptation was also studied. The PHG proved accessible to most participants, suggesting its suitability for use with individuals with low cognitive skills, attentional problems, and limited language. The ASD + ID group showed significantly more PHG errors, and fewer tricks, than the ID group. PHG performance correlated with Vineland adaptation scores for both groups. VMA was a major predictor of passing the task in both groups, and participants with ASD + ID required, on average, 2 years higher VMA than those with ID only, to achieve the same level of PHG success. VMA moderated the association between PHG performance and real-life social skills for the ASD + ID more than the ID group, suggesting that severely impaired individuals with ASD may rely on verbal ability to overcome their social difficulties, whereas individuals with ID alone may use more intuitive social understanding both in the PHG and everyday situations. © 2014 International Society for Autism Research, Wiley Periodicals, Inc.

  17. Can organic matter hide from decomposers in the labyrinth of soil aggregates? Micro-engineered Soil Chips challenging foraging fungi

    Science.gov (United States)

    Hammer, Edith C.; Aleklett, Kristin; Arellano Caicedo, Carlos G.; Bengtsson, Martin; Micaela Mafla Endara, Paola; Ohlsson, Pelle

    2017-04-01

    From the point of view of microorganisms, the soil environment is an enormously complex labyrinth with paths and dead-end streets, where resources and shelters are unevenly distributed. We study foraging strategies of soil organisms, especially fungi, and the possibility of physio-spatial stabilization of organic matter by "hiding" in occluded soil spaces. We manipulate growth habitat microstructure with lab-on-a-chip techniques, where we designed complex environments with channels and obstacle at dimensions of the size of hyphae, and construct them in the transparent, gas-permeable polymer PDMS. We fill those with different nutrient solutions or combine with mineral nutrient gradients, and inoculate them with soil organisms. We analyze organisms and substrates with microscopy, fluorescence microscopy and analytical chemistry. We compared different soil litter decomposers and an arbuscular mycorrhizal fungus for their ability to forage through complex air-gap structures and attempt to classify them into functional traits concerning their mycelium directionality, space-exploring approach and ability to grow through acute angles and narrow constrictions. We identified structures which are very difficult to penetrate for most species, and compounds located behind such features may thus be spatially unavailable for decomposers. We discuss our approach in comparison to soil pore space tomographic analyses and findings we made in the pore space of colonized wood biochar.

  18. Intraspecific variation in Trichogramma bruni Nagaraja, 1983 (Hymenoptera: Trichogrammatidae) associated with different hosts.

    Science.gov (United States)

    Querino, R B; Zucchi, R A

    2002-11-01

    Trichogramma bruni is an insufficiently studied South American species whose limits are still not well defined. Thus, the objective of the present study was to characterize T. bruni taxonomically and to determine the association between morphological variations as well as host and habitat, based on morphological and biological studies. Specimens from the Escola Superior de Agricultura "Luiz de Queiroz" (ESALQ) collection, and from the University of California Riverside (UCR) and specimens collected from the vegetation of forest parks with native areas planted with eucalyptus in Piracicaba and Itatinga, State of São Paulo, were also analyzed. The holotype deposited at Univeridade Federal de Minas Gerais (UFMG) collection was also examined. The variability in the genital capsule of T. bruni observed both among individuals of the same progeny and among specimens from different hosts is remarkable and is mainly related to the dorsal lamina. Therefore, an association of diagnostic characters rather than the dorsal lamina alone should be used for the identification of T. bruni and intraspecific variations should be considered. The intraspecific variation observed for T. bruni is a factor that should be considered for its identification, since the influence of the environment (habitat + host) and the variation among individuals itself is responsible for the plasticity observed in the genital capsule. Heliconius erato phyllis, Hamadryas feronia, Erosina hyberniata and Mechanitis lysiminia are new hosts of T. bruni.

  19. Analysis of the bacterial diversity existing on animal hide and wool: development of a preliminary PCR-restriction fragment length polymorphism fingerprint database for identifying isolates.

    Science.gov (United States)

    Chen, Yu; Gao, Hongwei; Zhang, Yanming; Deng, Mingjun; Wu, Zhenxing; Zhu, Laihua; Duan, Qing; Xu, Biao; Liang, Chengzhu; Yue, Zhiqin; Xiao, Xizhi

    2012-01-01

    Twenty-one bacterial strains were isolated from imported cattle hide and rabbit wool using two types of media, nutrient broth, and nutrient broth with serum. The bacteria identified were Brevibacillus laterosporus, Leclercia adecarboxylata, Peptococcus niger, Bacillus circulans, Raoultella ornithinolytica, Bacillus subtilis, Bacillus cereus, Bacillus thermobacillus, Bacillus choshinensis, Bacillus sphaericus, Acinetobacter haemolyticus, Sphingomonas paucimobilis, Bacillus thuringiensis, Staphylococcus intermedius, Mycobacteria, Moraxella, Klebsiella pneumoniae, Ralstonia pickettii, Staphylococcus chromogenes, Comamonas testosteroni, and Cupriavidus pauculus. The 16s rDNA gene of each bacterium was amplified using the universal primers 27f and 1492r. The amplicons were digested with AvaI, BamHI, BgII, DraI, EcoRI, EcoRV, HindIII, HinfI, HpaI, PstI, SmaI, TaqII, XbaI, XmaI, AluI, XhoI, and PvuI individually. A specific fingerprint from the PCR-restriction fragment length polymorphism method based on 16s rDNA was obtained for each bacterium. The results showed that the method developed was useful not only for bacterial identification but also for the etiological investigation of pathogens in imported animal hair and wool.

  20. Genetic diversity and antimicrobial resistance among isolates of Escherichia coli O157: H7 from feces and hides of super-shedders and low-shedding pen-mates in two commercial beef feedlots

    Directory of Open Access Journals (Sweden)

    Stanford Kim

    2012-09-01

    Full Text Available Abstract Background Cattle shedding at least 104 CFU Escherichia coli O157:H7/g feces are described as super-shedders and have been shown to increase transmission of E. coli O157:H7 to other cattle in feedlots. This study investigated relationships among fecal isolates from super-shedders (n = 162, perineal hide swab isolates (PS from super-shedders (n = 137 and fecal isolates from low-shedder (4 CFU/g feces pen-mates (n = 496 using pulsed-field gel electrophoresis (PFGE. A subsample of these fecal isolates (n = 474 was tested for antimicrobial resistance. Isolates of E. coli O157:H7 were obtained from cattle in pens (avg. 181 head at 2 commercial feedlots in southern Alberta with each steer sampled at entry to the feedlot and prior to slaughter. Results Only 1 steer maintained super-shedder status at both samplings, although approximately 30% of super-shedders in sampling 1 had low-shedder status at sampling 2. A total of 85 restriction endonuclease digestion clusters (REPC; 90% or greater similarity and 86 unique isolates (P = 0.94. Only 2/21 super-shedders had fecal isolates in the same REPC at both samplings. Fecal and PS isolates from individual super-shedders generally belonged to different REPCs, although fecal isolates of E. coli O157:H7 from super- and low-shedders showed greater similarity (P P = 0.69, although all super-shedder isolates with antimicrobial resistance (n = 3 were resistant to multiple antimicrobials. Conclusions Super-shedders did not have increased antimicrobial resistance compared to low-shedder pen mates. Our data demonstrated that PFGE profiles of individual super-shedders varied over time and that only 1/162 steers remained a super-shedder at 2 samplings. In these two commercial feedlots, PFGE subtypes of E. coli O157:H7 from fecal isolates of super- and low-shedders were frequently different as were subtypes of fecal and perineal hide isolates from super-shedders.

  1. Can a Bright and Energetic X-Ray Pulsar Be Hiding Amid the Debris of SN 1987A?

    Science.gov (United States)

    Esposito, Paolo; Rea, Nanda; Lazzati, Davide; Matsuura, Mikako; Perna, Rosalba; Pons, José A.

    2018-04-01

    The mass of the stellar precursor of supernova (SN) 1987A and the burst of neutrinos observed at the moment of the explosion are consistent with the core-collapse formation of a neutron star. However, no compelling evidence for the presence of a compact object of any kind in SN 1987A has been found yet in any band of the electromagnetic spectrum, prompting questions on whether the neutron star survived and, if it did, on its properties. Beginning with an analysis of recent Chandra observations, here we appraise the current observational situation. We derived limits on the X-ray luminosity of a compact object with a nonthermal, Crab-pulsar-like spectrum of the order of ≈(1–5) × 1035 erg s‑1, corresponding to limits on the rotational energy loss of a possible X-ray pulsar in SN 1987A of ≈(0.5–1.5) × 1038 erg s‑1. However, a much brighter X-ray source cannot be excluded if, as is likely, it is enshrouded in a cloud of absorbing matter with a metallicity similar to that expected in the outer layers of a massive star toward the end of its life. We found that other limits obtained from various arguments and observations in other energy ranges either are unbinding or allow a similar maximum luminosity of the order of ≈1035 erg s‑1. We conclude that while a pulsar alike the one in the Crab Nebula in both luminosity and spectrum is hardly compatible with the observations, there is ample space for an “ordinary” X-ray-emitting young neutron star, born with normal initial spin period, temperature, and magnetic field, to be hiding inside the evolving remnant of SN 1987A.

  2. Effects of Ultrasound Assisted Extraction in Conjugation with Aid of Actinidin on the Molecular and Physicochemical Properties of Bovine Hide Gelatin

    Directory of Open Access Journals (Sweden)

    Tanbir Ahmad

    2018-03-01

    Full Text Available Actinidin was used to pretreat the bovine hide and ultrasonic wave (53 kHz and 500 W was used for the time durations of 2, 4 and 6 h at 60 °C to extract gelatin samples (UA2, UA4 and UA6, respectively. Control (UAC gelatin was extracted using ultrasound for 6 h at 60 °C without enzyme pretreatment. There was significant (p < 0.05 increase in gelatin yield as the time duration of ultrasound treatment increased with UA6 giving the highest yield of 19.65%. Gel strength and viscosity of UAC and UA6 extracted gelatin samples were 627.53 and 502.16 g and 16.33 and 15.60 mPa.s, respectively. Longer duration of ultrasound treatment increased amino acids content of the extracted gelatin and UAC exhibited the highest content of amino acids. Progressive degradation of polypeptide chains was observed in the protein pattern of the extracted gelatin as the time duration of ultrasound extraction increased. Fourier transform infrared (FTIR spectroscopy depicted loss of molecular order and degradation in UA6. Scanning electron microscopy (SEM revealed protein aggregation and network formation in the gelatin samples with increasing time of ultrasound treatment. The study indicated that ultrasound assisted gelatin extraction using actinidin exhibited high yield with good quality gelatin.

  3. That Man Behind the Curtain: Investigating the Sexual Online Dating Behavior of Men Who Have Sex With Men but Hide Their Same-Sex Sexual Attraction in Offline Surroundings.

    Science.gov (United States)

    Lemke, Richard; Weber, Mathias

    2017-01-01

    This study investigates how men who have sex with men (MSM) use chat and dating sites based on theories of stigma-related offline behavior and online self-disclosure. We hypothesize that hidden MSM (those who self-label as heterosexual or who hide their same-sex sexual attraction from family, friends, acquaintances, or a female romantic partner) differ from open MSM in how they behave on gay chat and dating sites and in offline gay venues. Drawing on a survey of 12,002 MSM, we show that hidden MSM tend to mask their identity on gay chat and dating sites while avoiding offline gay venues. They also focus more strongly on online sexual activities (e.g., masturbating during online chats) when using gay chat and dating sites. However, they spend the same amount of time on these sites, and they use them to initiate offline sexual encounters as often and as fast as open MSM.

  4. The effects of titanium dioxide coatings on light-derived heating and transdermal heat transfer in bovine skin

    Science.gov (United States)

    Bartle, S. J.; Thomson, D. U.; Gehring, R.; van der Merwe, D.

    2017-11-01

    The effects of titanium dioxide coatings of bovine hides on light absorption and transdermal transfer of light-derived heat were investigated. Four hair-on rug hides from Holstein cattle were purchased. Twelve samples about 20 cm on a side were cut from each hide; nine from the black-colored areas, and three from the white areas. Samples were randomized and assigned to four coating treatments: (1) white hide with no coating (White), (2) black hide with no coating (Black), (3) black hide with 50% coating (Mid), and (4) black hide with 100% coating (High). Coatings were applied to the black hide samples using a hand sprayer. Lux measurements were taken using a modified lux meter at three light intensities generated with a broad spectrum, cold halogen light source. Reflectance over a wavelength range of 380 to 900 nm was measured using a spectroradiometer. The transdermal transfer of heat derived from absorbed light was measured by applying a broad spectrum, cold halogen light source to the stratum corneum (coated) side of the sample and recording the temperature of the dermis-side using a thermal camera for 10 min at 30-s intervals. At the high light level, the White, Black, Mid, and High coating treatments had different ( P 400 to 750 nm), Black hides reflected 10 to 15% of the light energy, hides with the Mid coating treatment reflected 35 to 40%, and hides with the High coating treatment reflected 70 to 80% of the light energy. The natural White hide samples reflected 60 to 80% of the light energy. The average maximum temperatures at the dermis-side of the hides due to transferred heat were 34.5, 70.1, 55.0, and 31.7, for the White, Black, Mid, and High treatments, respectively. Reflective coatings containing titanium dioxide on cattle hides were effective in reducing light energy absorption and reduced light-derived heat transfer from the skin surface to deeper skin layers.

  5. Photokopolimerisasi monomer akrilat degan kulit kras sapi

    Directory of Open Access Journals (Sweden)

    Dwi Wahini Nurhajati

    1997-06-01

    Full Text Available The research on photocopolymerization of acrylate monomer with cow crust hide had object to observe the resulted copolymer onto cow crust hide. Crust hides, saturated with aqueous emulsions containing 25 wt % of n-butyl acrylate (n-BA or tripropylene glycol diacrylate (TPGDA were irradiated by cobalt – 60 gamma rays with doses ranges from 5 to 25 kGy. The irradiated hides were washed with water, dried in air and extracted in soxhlet apparatus for 48 hours to remove homopolymer. The highest yield of photocopolymerization of n – butyl acrylate monomer with crust hides was found 17,7878% at dose 25 kGy, and for photocopolymerization of tripropylene glycol diacrylate with crust hides was found 39,4245% at dose 20 kGy.

  6. Rapid Determination of Amino Acids in Beer, Red Wine, and Donkey-Hide Gelatin by Gradient Elution of HPLC: From Micellar Liquid Chromatography to High Submicellar Liquid Chromatography.

    Science.gov (United States)

    Xie, Yunfei; Luo, Tian; Yang, Jing; Dong, Yuming

    2018-01-01

    Amino acids (AAs) in beer, red wine, and donkey-hide gelatin were rapidly determined by gradient LC elution from micellar LC to high submicellar LC. Mobile phase A was a 0.075 M sodium dodecyl sulfate solution containing 20 mM ammonium acetate with a pH value adjusted to 3.5 with acetic acid solution, and mobile phase B was acetonitrile. Optimized chromatographic conditions were as follows: mobile phase B increased from 25 to 60% (v/v) in 30 min and the use of a Venusil XBP C18 column (5 µm, 250 × 4.6 mm) as the stationary phase, with a column temperature of 35°C, flow rate of 1.2 mL/min, and detection wavelength of 266 nm. The results indicated good linearity (r2 ≥ 0.9924). The intraday precision of the retention time was RSD ≤ 1.1%, whereas interday was RSD ≤ 3.2%; intraday precision of the peak area was RSD ≤ 3.3%, whereas interday was RSD ≤ 4.9%. The range of recovery was 94.6-102.4%. The RSDs of the retention time for the AAs for the different samples were 0.04-0.31%.

  7. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity

    NARCIS (Netherlands)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-01-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity

  8. Young Stars in Old Galaxies - a Cosmic Hide and Seek Game

    Science.gov (United States)

    2002-05-01

    of its stars are found in large elliptical galaxies (this refers to their form) whose overall appearance has so far led us to believe that they, and their stars as well, are very old, indeed among the oldest objects in the Universe. These elliptical galaxies do shine with the diffuse, reddish glow normally associated with stars that are many billions of years old. However, what is really the underlying mix of stars that produces this elderly appearance? Could perhaps a significant number of much younger stars be "hiding" among the older ones? Whatever the case, this question must obviously be looked into, before it is possible to claim understanding of the evolution of these old galaxies. It is a very challenging investigation and it is only now that new and more detailed observations with the world's premier telescopes have been obtained that cast more light on this central question and thus on the true behaviour of some of the major building blocks of the Universe. Cosmic archaeology In order to identify the constitutents of the stellar "cocktail" in elliptical galaxies, a team of European and American astronomers [2] observed massive stellar clusters in and around several nearby galaxies. These clusters, referred to as "globular" because of their shape, are present in large numbers around most galaxies and together they form a kind of "skeleton" within their host galaxies. These "bones" receive an imprint for every episode of star formation they undergo. Thus, by reading the ages of the globular clusters in a galaxy, it is possible to identify the past epoch(s) of active star formation in that galaxy. This is like digging into the ruins of an ancient archaeological city site and to find those layers and establish those times when the city underwent bursts of building activity. In this way, by the study of the distribution and ages of the globular clusters in an elliptical galaxy, astronomers can reveal when many of its stars were formed. A surprise discovery ESO

  9. Restricted evaluation of Trichodectes canis (Phthiraptera: Trichodectidae detection methods in Alaska gray wolves

    Directory of Open Access Journals (Sweden)

    Theresa M. Woldstad

    2014-12-01

    Full Text Available Trichodectes canis (Phthiraptera: Trichodectidae was first documented on Alaska (USA gray wolves (Canis lupus on the Kenai Peninsula in 1981. In subsequent years, numerous wolves exhibited visually apparent, moderate to severe infestations. Currently, the Alaska Department of Fish and Game utilizes visual inspection, histopathology, and potassium hydroxide (KOH hide digestion for T. canis detection. Our objective was to determine optimal sampling locations for T. canis detection. Wolf hides were subjected to lice enumeration using KOH hide digestion. Thirty nine of the 120 wolves examined had lice. Of these 39, total louse burdens ranged from 14 to an extrapolated 80,000. The hides of 12 infested animals were divided into 10 cm by 10 cm subsections and the lice enumerated on a subsection from each of four regions: neck; shoulder; groin; and rump. Combining the data from these 12 wolves, the highest mean proportions of the total louse burdens on individual wolves were found on the rump and differed significantly from the lowest mean proportion on the neck. However, examination of the four subsections failed to detect all infested wolves. Hides from 16 of the 39 infested animals were cut into left and right sides, and each side then cut into four, approximately equal sections: neck and shoulder; chest; abdomen; and rump. Half hides were totally digested from 11 wolves, and whole hides from 5. For these 21 half hides, the highest mean proportions of total louse burdens were found on the rump, and this section had the highest sensitivity for louse detection, regardless of burden. However, removal of this large section from a hide would likely be opposed by hunters and trappers.

  10. The effects of titanium dioxide coatings on light-derived heating and transdermal heat transfer in bovine skin

    NARCIS (Netherlands)

    Bartle, S J; Thomson, D U; Gehring, R; van der Merwe, B. D.

    2017-01-01

    The effects of titanium dioxide coatings of bovine hides on light absorption and transdermal transfer of light-derived heat were investigated. Four hair-on rug hides from Holstein cattle were purchased. Twelve samples about 20 cm on a side were cut from each hide; nine from the black-colored areas,

  11. Nothing to Hide

    DEFF Research Database (Denmark)

    Raun, Tobias; Keegan, Cael

    2018-01-01

    of sexualized consumption. We argue that in order to understand the gendered and sexual complexities of this image, it is necessary to contextualize it within Dowling’s comprehensive selfie-practice on YouTube and Instagram. Although this image is not a selfie per se, it is almost impossible to separate from...

  12. Hide and seek

    DEFF Research Database (Denmark)

    Radel, Dietrich; Sand, Andreas; Steel, Mike

    2013-01-01

    criterion. This provides, for the first time, a rigorous way to test tree search algorithms on homoplasy-rich data, where we know in advance what the ‘best’ tree is. In this short note we consider just one search program (TNT) but show that it is able to locate the globally optimal tree correctly for 32......Finding optimal evolutionary trees from sequence data is typically an intractable problem, and there is usually no way of knowing how close to optimal the best tree from some search truly is. The problem would seem to be particularly acute when we have many taxa and when that data has high levels...... of homoplasy, in which the individual characters require many changes to fit on the best tree. However, a recent mathematical result has provided a precise tool to generate a short number of high-homoplasy characters for any given tree, so that this tree is provably the optimal tree under the maximum parsimony...

  13. Statistical secrecy and multibit commitments

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Pedersen, Torben P.; Pfitzmann, Birgit

    1998-01-01

    nothing about it. One definition is based on the L1-norm distance between probability distributions, the other on information theory. We prove that the two definitions are essentially equivalent. We also show that statistical counterparts of definitions of computational secrecy are essentially equivalent......We present and compare definitions of "statistically hiding" protocols, and we propose a novel statistically hiding commitment scheme. Informally, a protocol statistically hides a secret if a computationally unlimited adversary who conducts the protocol with the owner of the secret learns almost...... to our main definitions. Commitment schemes are an important cryptologic primitive. Their purpose is to commit one party to a certain value, while hiding this value from the other party until some later time. We present a statistically hiding commitment scheme allowing commitment to many bits...

  14. Limb anomaly and associated conditions: our clinical experience

    Directory of Open Access Journals (Sweden)

    Ragavan M

    2011-03-01

    Full Text Available Munisamy Ragavan1, Uppalu Haripriya1, Janarthanam Sarvavinothini2, Nagaraja Rao3, Ramamoorthy Gokulkrishnan31Department of Pediatric Surgery, 2Department of Anesthesia, 3Department of Pediatrics, Narayana Medical College and Superspeciality Hospital, Nellore, Andhra Pradesh, IndiaAbstract: Limb anomalies are a common clinical problem with a various spectrum of involvement. There are many conditions associated with these anomalies. There is a variable extent of involvement in the form of agenesis, overgrowth, and duplication, and there is no standard classification to describe all these lesions. Studying limb anomalies provides insights into limb development which may be useful for etiologic studies and public health monitoring. We pooled our data for 12 limb anomaly cases presenting from January 2008 to May 2009 and investigated their associated conditions. A descriptive system for the nomenclature and classification of congenital limb malformations suitable for clinical, epidemiological, and experimental use is discussed.Keywords: limb anomaly, phocomelia, amelia 

  15. Molecular spectroscopic study for suggested mechanism of chrome tanned leather

    Science.gov (United States)

    Nashy, Elshahat H. A.; Osman, Osama; Mahmoud, Abdel Aziz; Ibrahim, Medhat

    2012-03-01

    Collagen represents the structural protein of the extracellular matrix, which gives strength of hides and/or skin under tanning process. Chrome tan is the most important tanning agent all over the world. The methods for production of leather evolved over several centuries as art and engineering with little understanding of the underlying science. The present work is devoted to suggest the most probable mechanistic action of chrome tan on hide proteins. First the affect of Cr upon hide protein is indicated by the studied mechanical properties. Then the spectroscopic characterization of the hide protein as well as chrome tanned leather was carried out with Horizontal Attenuated Total Reflection (HATR) FT-IR. The obtained results indicate how the chromium can attached with the active sites of collagen. Molecular modeling confirms that chromium can react with amino as well as carboxylate groups. Four schemes were obtained to describe the possible interactions of chrome tan with hide proteins.

  16. Biochemical and molecular characterization of a serine keratinase from Brevibacillus brevis US575 with promising keratin-biodegradation and hide-dehairing activities.

    Directory of Open Access Journals (Sweden)

    Nadia Zaraî Jaouadi

    chemicals used for the dehairing of rabbit, goat, sheep and bovine hides in the leather processing industry.

  17. Niektóre operacje technologiczne przyczyniające się do powstawania wad i nietrwałości skór wyprawionych (część 2)

    OpenAIRE

    Kozielec, Tomasz

    2011-01-01

    In the second part of the article author focused on descriptions of such processesof hide converting to leather as: liming (treating hide by calcium hydroxide, andsodium sulphide in the form of suspension or mash), unhairing and fleshing(by hand and machine), removing so called “dirts” from hide structure (namelyremains of follicles and hairs, pigments, fats etc) which remained after previouslymentioned processes, deliming (removing of alkaline compounds after theliming process by using of or...

  18. 40 CFR 432.102 - Effluent limitations attainable by the application of the best practicable control technology...

    Science.gov (United States)

    2010-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS MEAT... derived for a renderer which does not cure cattle hide. If a renderer does cure cattle hide, the following...

  19. Evaluación de algunos insecticidas para el control de la «polilla del tomate», Tuta absoluta (Lepidoptera: Gelechiidae y su efecto residual sobre el parasitoide Trichogrammatoidea bactrae (Hymenoptera: Trichogrammatidae Efficacy of insecticides against the «tomato moth», Tuta absoluta (Lepidoptera: Gelechiidae and their residual effects on the parasitoid Trichogrammatoidea bactrae (Hymenoptera: Trichogrammatidae

    Directory of Open Access Journals (Sweden)

    María B. Riquelme Virgala

    2006-12-01

    Full Text Available La «polilla del tomate», Tuta absoluta (Meyrick, es una plaga clave de este cultivo en Argentina. Su manejo integrado debería incluir una selección de productos fitosanitarios que sean eficaces para su control y, al mismo tiempo, selectivos respecto de sus enemigos naturales. El objetivo de este trabajo fue evaluar la capacidad de control de los insecticidas triflumurón, clorfenapir, abamectin y una cepa experimental de Bacillus thuringiensis (Bt sobre la plaga, y el poder residual de los mismos sobre Trichogrammatoidea bactrae Nagaraja. Se registró la mortalidad de la polilla cada cuatro días, desde la aplicación hasta la emergencia de los adultos. El efecto sobre el parasitoide, se evaluó a través del número de huevos parasitados por hembra expuesta durante 48 horas a folíolos tratados, y su mortalidad luego de 1, 3, 7, 14 y 30 días de la pulverización. Todos los productos ocasionaron una mortalidad de T. absoluta mayor al 65% después de 12 días de aplicados. El Bt fue el único insecticida que no afectó la supervivencia y el parasitismo de T. bactrae . Estos resultados aportan información de interés para la selección de plaguicidas, a emplearse en programas de manejo integrado.The «tomato moth», Tuta absoluta (Meyrick is one of the key pests of tomato crops in Argentina. The compatible use of chemical and biological control is the main purpose of integrated pest management. Selective pesticides that can be successfully used to control pest without adverse side effects on natural enemies are highly required. The aim of this work was to evaluate the efficacy of control of T. absoluta and the residual effect on the oophagous parasitoid, Trichogrammatoidea bactrae Nagaraja of the following insecticides: triflumuron, abamectin, chlorfenapyr, and an experimental strain of Bacillus thuringiensis (Bt. Mortality of T. absoluta was evaluated every 4 days from pesticide spraying until adult emergency. The effect of pesticides on

  20. Tabela de vida de fertilidade de três espécies neotropicais de Trichogrammatidae em ovos de hospedeiros alternativos como critério de seleção hospedeira Fertility life table of three neotropical species of Trichogrammatidae on factitious hosts as a criterion for selection of hosts

    Directory of Open Access Journals (Sweden)

    Nivia da Silva Dias

    2010-03-01

    Full Text Available Tabela de vida de fertilidade de três espécies neotropicais de Trichogrammatidae em ovos de hospedeiros alternativos como critério de seleção hospedeira. O objetivo deste trabalho foi selecionar o hospedeiro alternativo que permita o melhor desenvolvimento das três espécies neotropicais de tricogramatídeos, Trichogramma atopovirilia Oatman & Platner, 1983; Trichogramma bruni Nagaraja, 1983 e Trichogrammatoidea annulata De Santis, 1972, utilizando-se como parâmetro comparativo as tabelas de vida de fertilidade nos respectivos hospedeiros. Foram estimados a duração média de uma geração (T, taxa líquida de reprodução (Ro, razão infinitesimal (r m e a razão finita de aumento (λ. A tabela de vida de fertilidade pode ser utilizada para selecionar o hospedeiro alternativo mais adequado para as espécies de tricogramatídeos. Corcyra cephalonica (Stainton, 1865 (Lepidoptera, Pyralidae foi o hospedeiro alternativo mais adequado para criação de T. annulata e de T. bruni, enquanto que para T. atopovirilia, Anagasta kuehniella (Zeller, 1879 (Lepidoptera, Pyralidae e/ou C. cephalonica foram os hospedeiros mais adequados. Sitotroga cerealella (Olivier, 1819 (Lepidoptera, Gelechiidae apresentou baixa capacidade de aumento populacional para as três espécies de parasitóides, sendo, portanto, uma espécie inadequada como hospedeiro alternativo para as mesmas.The objective of this work was to select the factitious host that permit the best development of three neotropical Trichogrammatidae species, Trichogramma atopovirilia Oatman & Platner, 1983; Trichogramma bruni Nagaraja, 1983, and Trichogrammatoidea annulata De Santis, 1972, using the fertility life table on their respective hosts as a comparative parameter. Mean generation time (T, net reproductive rate (Ro, intrinsic rate of natural increase (r m and the finite rate of increase (λ were estimated. A fertility life table is useful to select the most adequate factitious hosts for the

  1. Tail position affects the body temperature of rats during cold exposure in a low-energy state.

    Science.gov (United States)

    Uchida, Yuki; Tokizawa, Ken; Nakamura, Mayumi; Lin, Cheng-Hsien; Nagashima, Kei

    2012-02-01

    Rats place their tails underneath their body trunks when cold (tail-hiding behavior). The aim of the present study was to determine whether this behavior is necessary to maintain body temperature. Male Wistar rats were divided into 'fed' and '42-h fasting' groups. A one-piece tail holder (8.4 cm in length) that prevented the tail-hiding behavior or a three-piece tail holder (2.8 cm in length) that allowed for the tail-hiding behavior was attached to the tails of the rats. The rats were exposed to 27°C for 180 min or to 20°C for 90 min followed by 15°C for 90 min with continuous body temperature and oxygen consumption measurements. Body temperature decreased by -1.0 ± 0.1°C at 15°C only in the rats that prevented tail-hiding behavior of the 42-h fasting group, and oxygen consumption increased at 15°C in all animals. Oxygen consumption was not different between the rats that prevented tail-hiding behavior and the rats that allowed the behavior in the fed and 42-h fasting groups under ambient conditions. These results show that the tail-hiding behavior is involved in thermoregulation in the cold in fasting rats.

  2. 40 CFR 432.105 - New source performance standards (NSPS).

    Science.gov (United States)

    2010-07-01

    ... GUIDELINES AND STANDARDS MEAT AND POULTRY PRODUCTS POINT SOURCE CATEGORY Renderers § 432.105 New source... renderer that does not cure cattle hide as part of the plant operations. If a renderer does cure hide, the...

  3. EFFICIENT ADAPTIVE STEGANOGRAPHY FOR COLOR IMAGESBASED ON LSBMR ALGORITHM

    Directory of Open Access Journals (Sweden)

    B. Sharmila

    2012-02-01

    Full Text Available Steganography is the art of hiding the fact that communication is taking place, by hiding information in other medium. Many different carrier file formats can be used, but digital images are the most popular because of their frequent use on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques. The Least Significant Bit (LSB based approach is a simplest type of steganographic algorithm. In all the existing approaches, the decision of choosing the region within a cover image is performed without considering the relationship between image content and the size of secret message. Thus, the plain regions in the cover will be ruin after data hiding even at a low data rate. Hence choosing the edge region for data hiding will be a solution. Many algorithms are deal with edges in images for data hiding. The Paper 'Edge adaptive image steganography based on LSBMR algorithm' is a LSB steganography presented the results of algorithms on gray-scale images only. This paper presents the results of analyzing the performance of edge adaptive steganography for colored images (JPEG. The algorithms have been slightly modified for colored image implementation and are compared on the basis of evaluation parameters like peak signal noise ratio (PSNR and mean square error (MSE. This method can select the edge region depending on the length of secret message and difference between two consecutive bits in the cover image. For length of message is short, only small edge regions are utilized while on leaving other region as such. When the data rate increases, more regions can be used adaptively for data hiding by adjusting the parameters. Besides this, the message is encrypted using efficient cryptographic algorithm which further increases the security.

  4. Morphology of the leather defect light flecks and spots.

    Science.gov (United States)

    Nafstad, O; Wisløff, H; Grønstøl, H

    2001-01-01

    The skin histology and the scanning electron microscope morphology of the hide defect light flecks and spots after tanning were studied in 11 steers infested with biting lice (Damalinia bovis). Nine steers from herds free of lice were used as controls. Skin biopsies from 6 of the animals in the lice infested group showed mild to moderate hyperkeratosis and moderate perivascular to diffuse dermatitis with infiltration of mainly mononuclear cells and some eosinophilic granulocytes. The steers were slaughtered at an age of 18 to 23 months. Light flecks and spots occurred on all examined hides from the infested group after tanning. No examined hides from the control group demonstrated similar damage. Both light microscopic examination of sections of tanned hide with light flecks and spots and scanning electron microscopy of the same defects showed superficial grain loss and craters with a irregular fibre base encircled by smooth and intact grain. The association between louse infestation at an early age and damage of hides following slaughter 6 to 15 months later, suggested that louse infestations lead to a prolonged or lifelong weakening in the dermis. This weakening may cause superficial grain loss during the tanning process.

  5. Morphology of the Leather Defect Light Flecks and Spots

    Directory of Open Access Journals (Sweden)

    Grønstøl H

    2001-03-01

    Full Text Available The skin histology and the scanning electron microscope morphology of the hide defect light flecks and spots after tanning were studied in 11 steers infested with biting lice (Damalinia bovis. Nine steers from herds free of lice were used as controls. Skin biopsies from 6 of the animals in the lice infested group showed mild to moderate hyperkeratosis and moderate perivascular to diffuse dermatitis with infiltration of mainly mononuclear cells and some eosinophilic granulocytes. The steers were slaughtered at an age of 18 to 23 months. Light flecks and spots occurred on all examined hides from the infested group after tanning. No examined hides from the control group demonstrated similar damage. Both light microscopic examination of sections of tanned hide with light flecks and spots and scanning electron microscopy of the same defects showed superficial grain loss and craters with a irregular fibre base encircled by smooth and intact grain. The association between louse infestation at an early age and damage of hides following slaughter 6 to 15 months later, suggested that louse infestations lead to a prolonged or lifelong weakening in the dermis. This weakening may cause superficial grain loss during the tanning process.

  6. Reviews Opera: Doctor Atomic DVD: Doctor Atomic Equipment: Digital stopclock with external trigger Book: I Cyborg Book: Flat Earth: The History of an Infamous Idea Book: Mere Thermodynamics Book: CGP revision guides Book: Hiding the Elephant: How Magicians Invented the Impossible Book: Back of the Envelope Physics Web Watch

    Science.gov (United States)

    2009-07-01

    WE RECOMMEND Doctor Atomic The new Doctor Atomic opera provkes discussion on ethics I Cyborg The world's first human cyborg shares his life story in I Cyborg Flat Earth: The History of an Infamous Idea Flat Earth gives us a different perspective on creationism Mere Thermodynamics An introductory text on the three laws CGP revision guides This revision guide suits all courses and every pocket Hiding the Elephant: How Magicians Invented the Impossible The mystery of many illusions are solved in this book Back of the Envelope Physics This reference deserves a place on your bookshelf WORTH A LOOK Doctor Atomic The DVD doesn't do justice to the live performance Digital stopclock with external trigger Use these stopclocks when you need an external trigger WEB WATCH Webcasts reach out to an online audience

  7. The Estonian president: the Baltics are not afraid of migrants or Russians / Sten Hankewitz

    Index Scriptorium Estoniae

    Hankewitz, Sten A., 1979-

    2016-01-01

    President Kersti Kaljulaidi avalikust vastusest EurActivis ilmunud James Crispi artiklile "The Brief: Europe’s elites rush to hide behind Mutti’s skirts" http://www.euractiv.com/section/all/news/the-brief-europes-elites-rush-to-hide-behind-muttis-skirts/

  8. Influence of Therapeutic Ceftiofur Treatments of Feedlot Cattle on Fecal and Hide Prevalences of Commensal Escherichia coli Resistant to Expanded-Spectrum Cephalosporins, and Molecular Characterization of Resistant Isolates

    Science.gov (United States)

    Griffin, Dee; Kuehn, Larry A.; Brichta-Harhay, Dayna M.

    2013-01-01

    In the United States, the blaCMY-2 gene contained within incompatibility type A/C (IncA/C) plasmids is frequently identified in extended-spectrum-cephalosporin-resistant (ESCr) Escherichia coli strains from both human and cattle sources. Concerns have been raised that therapeutic use of ceftiofur in cattle may increase the prevalence of ESCr E. coli. We report that herd ESCr E. coli fecal and hide prevalences throughout the residency of cattle at a feedlot, including during the period of greatest ceftiofur use at the feedlot, were either not significantly different (P ≥ 0.05) or significantly less (P E. coli shedding that follows ceftiofur injection abated, ceftiofur-injected cattle were no more likely than untreated members of the same herd to shed ESCr E. coli. Pulsed-field gel electrophoresis (PFGE) genotyping, antibiotic resistance phenotyping, screening for presence of the blaCMY-2 gene, and plasmid replicon typing were performed on 312 ESCr E. coli isolates obtained during six sampling periods spanning the 10-month residence of cattle at the feedlot. The identification of only 26 unique PFGE genotypes, 12 of which were isolated during multiple sampling periods, suggests that clonal expansion of feedlot-adapted blaCMY-2 E. coli strains contributed more to the persistence of blaCMY-2 than horizontal transfer of IncA/C plasmids between E. coli strains at this feedlot. We conclude that therapeutic use of ceftiofur at this cattle feedlot did not significantly increase the herd prevalence of ESCr E. coli. PMID:23354706

  9. 40 CFR 425.10 - Applicability; description of the hair pulp, chrome tan, retan-wet finishing subcategory.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING... addition to other unhairing and tanning operation, processes raw or cured cattle or cattle-like hides into finished leather by chemically dissolving the hide hair, chrome tanning, and retan-wet finishing. ...

  10. KONSEP PENYANDIAN FILE JPEG DENGAN MENGGUNAKAN METODE LSB

    Directory of Open Access Journals (Sweden)

    Haikal Nando Winata

    2017-03-01

    Full Text Available Steganography is a technique to hide text or messages that other people do not know the contents of the text or the secret message. Steganography technique is often used to avoid suspicion and to avoid other people desire to know the contents of the text or the secret message. Digital image is one of the most well-known media and the public by the author. Digital image acts as a medium or a text container you want to hide a secret message. Methods LSB (Least Significant Bit that hides the bytes of text or message you want to hide into the last byte in the digital image. LSB method has the advantage of not changing the size and shape of the digital image by naked eye, text data or messages hidden can be restored without any change in size and shape

  11. Defense.gov Special Report: Employer Support Freedom Awards

    Science.gov (United States)

    , asset management and other financial and risk management products and services. Army Reserve Col management." Navy Commander Christopher Myers, U.S. Navy Reserve More More Hide Story Hide Story , offering a wide range of health and wellness products and services incorporating an integrated, holistic

  12. Histogram Modification and Wavelet Transform for High Performance Watermarking

    Directory of Open Access Journals (Sweden)

    Ying-Shen Juang

    2012-01-01

    Full Text Available This paper proposes a reversible watermarking technique for natural images. According to the similarity of neighbor coefficients’ values in wavelet domain, most differences between two adjacent pixels are close to zero. The histogram is built based on these difference statistics. As more peak points can be used for secret data hiding, the hiding capacity is improved compared with those conventional methods. Moreover, as the differences concentricity around zero is improved, the transparency of the host image can be increased. Experimental results and comparison show that the proposed method has both advantages in hiding capacity and transparency.

  13. A new Watermarking System based on Discrete Cosine Transform (DCT) in color biometric images.

    Science.gov (United States)

    Dogan, Sengul; Tuncer, Turker; Avci, Engin; Gulten, Arif

    2012-08-01

    This paper recommend a biometric color images hiding approach An Watermarking System based on Discrete Cosine Transform (DCT), which is used to protect the security and integrity of transmitted biometric color images. Watermarking is a very important hiding information (audio, video, color image, gray image) technique. It is commonly used on digital objects together with the developing technology in the last few years. One of the common methods used for hiding information on image files is DCT method which used in the frequency domain. In this study, DCT methods in order to embed watermark data into face images, without corrupting their features.

  14. 40 CFR 425.02 - General definitions.

    Science.gov (United States)

    2010-07-01

    ... STANDARDS LEATHER TANNING AND FINISHING POINT SOURCE CATEGORY General Provisions § 425.02 General...) “Chrome tan” means the process of converting hide into leather using a form of chromium. (g) “Vegetable tan” means the process of converting hides into leather using chemicals either derived from vegetable...

  15. Prevalence of Escherichia coli O157:H7 and Salmonella in camels, cattle, goats, and sheep harvested for meat in Riyadh.

    Science.gov (United States)

    Bosilevac, Joseph M; Gassem, Mustafa A; Al Sheddy, Ibraheem A; Almaiman, Salah A; Al-Mohizea, Ibrahim S; Alowaimer, Abdullah; Koohmaraie, Mohammad

    2015-01-01

    Escherichia coli O157:H7 and Salmonella are significant foodborne pathogens that can be found in the feces and on the hides of meat animals. When hides are removed during the harvest process, the carcass and subsequent meat products can become contaminated. Camels, cattle, sheep, and goats are harvested for meat in Riyadh, Saudi Arabia. The prevalence of E. coli O157:H7 and Salmonella are unknown in these animals, and it is assumed that if the animals carry the pathogens in their feces or on their hides, meat products are likely to become contaminated. To this end, a minimum of 206 samples each from hides and feces of camels, cattle, goats, and sheep were collected over the course of 8 months and tested for E. coli O157:H7 and Salmonella. It was found that E. coli O157:H7 was present in feces (10.7, 1.4, 2.4, and 2.4%) and on hides (17.9, 8.2, 2.9, and 9.2%) of cattle, goats, camels, and sheep, respectively. The prevalence of Salmonella was 11.2, 13.5, 23.2, and 18.8% in feces and 80.2, 51.2 67.6, and 60.2% on hides of cattle, goats, camels, and sheep, respectively. The prevalence of E coli O157:H7 was nearly zero in all samples collected in June and July, while Salmonella did not exhibit any seasonal variation. These results constitute the first comprehensive study of E. coli O157:H7 and Salmonella prevalence in Saudi Arabian meat animals at harvest.

  16. Was it for walrus? Viking Age settlement and medieval walrus ivory trade in Iceland and Greenland

    DEFF Research Database (Denmark)

    Frei, Karin M.; Coutu, Ashley N.; Smiarowski, Konrad

    2015-01-01

    Walrus-tusk ivory and walrus-hide rope were highly desired goods in Viking Age north-west Europe. New finds of walrus bone and ivory in early Viking Age contexts in Iceland are concentrated in the south-west, and suggest extensive exploitation of nearby walrus for meat, hide and ivory during the ...

  17. Birth Control Explorer

    Science.gov (United States)

    Menu Sex Ed Ask Us Anything Videos Games & Quizzes Connect Search About Find a Health Center X Sort by Advanced Search Show/Hide Content Types Article Game Poll Q&A Series Quiz Video Leave un-checked to search all types Search Sex Ed by Topic show topics hide topics Birth ...

  18. 40 CFR 432.107 - Effluent limitations attainable by the application of the best control technology for...

    Science.gov (United States)

    2010-07-01

    ... Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS MEAT... BOD5 and TSS specified in paragraph (a) of this section were derived for a renderer which does not cure cattle hide. If a renderer does cure hide, the following formulas should be used to calculate BOD5 and...

  19. An ancient Maya ritual cache at Pook's Hill, Belize

    DEFF Research Database (Denmark)

    Stemp, W. James; Braswell, Geoffrey E.; Helmke, Christophe

    2018-01-01

    , the edge and surface wear on most of the used obsidian blades are consistent with other functions, including cutting meat/skin/fresh hide, cutting or sawing wood and dry hide, cutting or sawing other soft and hard materials, and scraping hard materials. Clearly, not all blades from this ritual deposit were...

  20. No Place to Hide: Missing Primitive Stars Outside Milky Way Uncovered

    Science.gov (United States)

    2010-02-01

    , Sculptor, Sextans and Carina dwarf galaxies. Since the dwarf galaxies are typically 300 000 light years away - which is about three times the size of our Milky Way - only strong features in the spectrum could be measured, like a vague, smeared fingerprint. The team found that none of their large collection of spectral fingerprints actually seemed to belong to the class of stars they were after, the rare, extremely metal-poor stars found in the Milky Way. The team of astronomers around Starkenburg has now shed new light on the problem through careful comparison of spectra to computer-based models. They found that only subtle differences distinguish the chemical fingerprint of a normal metal-poor star from that of an extremely metal-poor star, explaining why previous methods did not succeed in making the identification. The astronomers also confirmed the almost pristine status of several extremely metal-poor stars thanks to much more detailed spectra obtained with the UVES instrument on ESO's Very Large Telescope. "Compared to the vague fingerprints we had before, this would be as if we looked at the fingerprint through a microscope," explains team member Vanessa Hill. "Unfortunately, just a small number of stars can be observed this way because it is very time consuming." "Among the new extremely metal-poor stars discovered in these dwarf galaxies, three have a relative amount of heavy chemical elements between only 1/3000 and 1/10 000 of what is observed in our Sun, including the current record holder of the most primitive star found outside the Milky Way," says team member Martin Tafelmeyer. "Not only has our work revealed some of the very interesting, first stars in these galaxies, but it also provides a new, powerful technique to uncover more such stars," concludes Starkenburg. "From now on there is no place left to hide!" Notes [1] According to the definition used in astronomy, "metals" are all the elements other than hydrogen and helium. Such metals, except for a very

  1. Determinants of Leather and Leather products Exports in Tanzania

    Directory of Open Access Journals (Sweden)

    Francis Lwesya

    2018-03-01

    Full Text Available This study examines the determinants of Leather and Leather products Exports in Tanzania. We apply Ordinary Least Square (OLS analysis on time series data from 1980 to 2015. The findings show that export of raw hides and skins, and high costs of production are among the deterring factors to leather and leather products export in Tanzania. Export of raw hides and skins and costs of production recorded negative and significant relationship with leather exports. On the other hand, hides and skins collection recorded insignificant relationship while leather price in the world market had negative and significant relationship with leather exports. This suggests that other factors such as low quality of leather and leather products exported, inadequate capital investment, stiff competition with foreign companies for hides and skins and inadequate market information explain the state of current Tanzania’s leather exports. Thus, attracting local and Foreign Direct Investment (FDI in the leather subsector by providing friendly investment climate and addressing the supply side constraints will enable increased high quality leather and leather products diversification and exports

  2. Information Hiding: an Annotated Bibliography

    National Research Council Canada - National Science Library

    Anderson, Ross

    1999-01-01

    ... so. These steganography, copyright marking, the study of covert channels in operating systems, low-probability of intercept communications, and the study of subliminal channels in digital signature schemes...

  3. Information Hiding: an Annotated Bibliography

    Science.gov (United States)

    1999-04-13

    www.springer.de/catalog/html-files/deutsch/comp/3540619968. html>. [325] 063213, ‘A Multiversion Transaction Scheduler for Centralized Multilevel Se- cure...an MLS DBMS. The authors pro- pose getting around these problems by using multiversion schedulers. An abstract model is developed and shown to

  4. Hiding Crimes in Cyberspace (PREPRINT)

    National Research Council Canada - National Science Library

    Denning, Dorothy E; Baugh, Jr, William E

    1999-01-01

    .... Individuals need it to protect their private communications and confidential data. Encryption is critical to building a secure and trusted global information infrastructure for communications and electronic commerce...

  5. Elk and mule deer responses to variation in hunting pressure.

    Science.gov (United States)

    Bruce K. Johnson; Alan A. Ager; James H. Noyes; Norm. Cimon

    2004-01-01

    Hunting can exert a variety of effects on both targeted and nontargeted ungulates, and animals either run or hide in response to hunting pressure. If animals successfully elude hunters by running, the energetic cost may deplete fat reserves needed for survival during winter in temperate regions. If animals successfully elude hunters by hiding, there may be an energetic...

  6. Parasitoid dan Parasitisasi Plutella xylostella (L. (Lepidoptera: Yponomeutidae di Sumatera Selatan

    Directory of Open Access Journals (Sweden)

    SITI HERLINDA

    2005-12-01

    Full Text Available Surveys from May 2003 to January 2004 in South Sumatera were conducted to determine parasitoid attacking Plutella xylostella (L. and to estimate P. xylostella parasitization by the parasitoids. The eggs and the larvae of P. xylostella were collected from brassicaceous crops, i.e. mustard, Indian mustard, and cabbage. Six parasitoids found were Trichogrammatoidea cojuangcoi Nagaraja (Hymenoptera: Trichogrammatidae, Cotesia plutellae (Kurdj. (Hymenoptera: Braconidae, Diadegma semiclausum Hellen (Hymenoptera: Ichneumonidae, Oomyzus sokolowskii (Kurdj. (Hymenoptera: Eulophidae, Tetrastichus (Hymenoptera: Eulophidae, and a ceraphronid wasp (unidentified species. Trichogrammatoidea cojuangcoi parasitized P. xylostella eggs, however, the others parasitized the larvae except the ceraphronid wasp. In South Sumatera, the ceraphronid wasp was reported for the first time parasitizing D. semiclausum pupae, and its parasitization reached 6.2%. Oomyzus sokolowskii and Tetrastichus were found in this area for the first time, as well. In the highland, D. semiclausum was the most abundant compared to the others where its parasitization reached 79.2%. In the lowland P. xylostella larvae was mainly attacked by C. plutellae with the parasitization reaching 64.9% In the dry and rainy seasons, the parasitization was mainly exerted by T. cojuangcoi (77.0% and D. semiclausum (79.2%.

  7. Parasitoid and Parasitization of Plutella xylostella (L. (Lepidoptera: Yponomeutidae in South Sumatera

    Directory of Open Access Journals (Sweden)

    SITI HERLINDA

    2005-12-01

    Full Text Available Surveys from May 2003 to January 2004 in South Sumatera were conducted to determine parasitoid attacking Plutella xylostella (L. and to estimate P. xylostella parasitization by the parasitoids. The eggs and the larvae of P. xylostella were collected from brassicaceous crops, i.e. mustard, Indian mustard, and cabbage. Six parasitoids found were Trichogrammatoidea cojuangcoi Nagaraja (Hymenoptera: Trichogrammatidae, Cotesia plutellae (Kurdj. (Hymenoptera: Braconidae, Diadegma semiclausum Hellen (Hymenoptera: Ichneumonidae, Oomyzus sokolowskii (Kurdj. (Hymenoptera: Eulophidae, Tetrastichus (Hymenoptera: Eulophidae, and a ceraphronid wasp (unidentified species. Trichogrammatoidea cojuangcoi parasitized P. xylostella eggs, however, the others parasitized the larvae except the ceraphronid wasp. In South Sumatera, the ceraphronid wasp was reported for the first time parasitizing D. semiclausum pupae, and its parasitization reached 6.2%. Oomyzus sokolowskii and Tetrastichus were found in this area for the first time, as well. In the highland, D. semiclausum was the most abundant compared to the others where its parasitization reached 79.2%. In the lowland P. xylostella larvae was mainly attacked by C. plutellae with the parasitization reaching 64.9%. In the dry and rainy seasons, the parasitization was mainly exerted by T. cojuangcoi (77.0% and D. semiclausum (79.2%.

  8. Succession of hide–seek and pursuit–evasion at heterogeneous locations

    Science.gov (United States)

    Gal, Shmuel; Casas, Jérôme

    2014-01-01

    Many interactions between searching agents and their elusive targets are composed of a succession of steps, whether in the context of immune systems, predation or counterterrorism. In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit–escape. Our aim is to link these two processes, usually analysed separately and with different models, in a single game theory context. We define a matrix game in which a searcher looks at a fixed number of discrete locations only once each searching for a hider, which can escape with varying probabilities according to its location. The value of the game is the overall probability of capture after k looks. The optimal search and hide strategies are described. If a searcher looks only once into any of the locations, an optimal hider chooses it's hiding place so as to make all locations equally attractive. This optimal strategy remains true as long as the number of looks is below an easily calculated threshold; however, above this threshold, the optimal position for the hider is where it has the highest probability of escaping once spotted. PMID:24621817

  9. Environmental enrichment choices of shelter cats.

    Science.gov (United States)

    Ellis, J J; Stryhn, H; Spears, J; Cockram, M S

    2017-08-01

    Choices made by cats between different types of environmental enrichment may help shelters to prioritize how to most effectively enrich cat housing, especially when limited by space or funds. This study investigates the environmental enrichment use of cats in a choice test. Twenty-six shelter cats were kept singularly in choice chambers for 10days. Each chamber had a central area and four centrally-linked compartments containing different types of environmental enrichment: 1) an empty control, 2) a prey-simulating toy, 3) a perching opportunity, and 4) a hiding opportunity. Cat movement between compartments was quantitatively recorded using a data-logger. Enriched compartments were visited significantly more frequently during the light period than during the dark period. Cats spent a significantly greater percentage of time in the hiding compartment (median=55%, IQR=46) than in the toy compartment (median=2%, IQR=9), or in the empty control compartment (median=4%, IQR=4). These results provide additional evidence to support the value of a hiding box to cats housed in a novel environment, in that they choose hiding relative to other types of environmental enrichment. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. COMPARATIVE STUDY OF EDGE BASED LSB MATCHING STEGANOGRAPHY FOR COLOR IMAGES

    Directory of Open Access Journals (Sweden)

    A.J. Umbarkar

    2016-02-01

    Full Text Available Steganography is a very pivotal technique mainly used for covert transfer of information over a covert communication channel. This paper proposes a significant comparative study of the spatial LSB domain technique that focuses on sharper edges of the color as well as gray scale images for the purpose of data hiding and hides secret message first in sharper edge regions and then in smooth regions of the image. Message embedding depends on content of the image and message size. The experimental results illustrate that, for low embedding rate the method hides the message in sharp edges of cover image to get better stego image visualization quality. For high embedding rate, smooth regions and edges of the cover image are used for the purpose of data hiding. In this steganography method, color image and textured kind of image preserves better visual quality of stego image. The novelty of the comparative study is that, it helps to analyze the efficiency and performance of the method as it gives better results because it directly works on color images instead of converting to gray scale image.

  11. Shell colour, temperature, (micro)habitat structure and predator pressure affect the behaviour of Cepaea nemoralis

    Science.gov (United States)

    Rosin, Zuzanna M.; Kwieciński, Zbigniew; Lesicki, Andrzej; Skórka, Piotr; Kobak, Jarosław; Szymańska, Anna; Osiejuk, Tomasz S.; Kałuski, Tomasz; Jaskulska, Monika; Tryjanowski, Piotr

    2018-06-01

    Although shell colour polymorphism of the land snail Cepaea nemoralis is a well-known phenomenon, proximate and ultimate factors driving its evolution remain uncertain. Polymorphic species show variation in behavioural responses to selective forces. Therefore, we estimated effects of various environmental factors (temperature, humidity, food availability, (micro)habitat structure and predatory pressure) on behavioural response (frequency of locomotion, climbing and hiding) of C. nemoralis morphs, in experimental and natural conditions. In the experimental part of study, the frequency of locomotion was negatively affected by temperature and the presence of food and positively influenced by the presence of light. Morphs significantly differed in behavioural responses to environmental variability. Pink mid-banded and yellow five-banded morphs climbed less often and hide in shelter more often than yellow and pink unbanded individuals when temperature was low and food was absent. Snails fed most often at moderate temperature compared to low and high temperatures. Field investigations partially confirmed differences among morphs in frequency of climbing, but not in terms of probability of hiding in sheltered sites. In natural colonies, temperature and (micro)habitat structure significantly affected frequency of climbing as well as hiding in shelter. Snails more often hid in sheltered sites where thrushes preyed on Cepaea. Tendency of unbanded morphs to climb trees may have evolved under avian predatory pressure as thrushes forage on a ground. Tendency of banded morphs to hide in sheltered sites may reflect prey preferences for cryptic background. The results implicate that differential behaviour of C. nemoralis morphs compensate for their morphological and physiological limitations of adaptation to habitat.

  12. [The zoological garden of Amsterdam Natura Artis Magistra during world War II].

    Science.gov (United States)

    Frankenhuis, Maarten Th

    2009-01-01

    Thanks to the wise management of its director, dr. Armand Sunier, and his team, 'Artis' survived the difficult war period without great losses of its animals and only material damage to some buildings. Artis has meant very much for the inhabitants of the city of Amsterdam during the war. In the first place for the employees and their families, that were kept for starvation and forced labour by extra rations of food and safe hiding places. But also for jewish persons in hiding, who could escape from a certain death by hiding in animal houses or other buildings in the garden. And also for hundreds of thousands people of Amsterdam who found in their zoological garden an oasis of relaxation in a town full of threat and violence.

  13. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    Science.gov (United States)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  14. Ação de diferentes agentes curtentes utilizados no curtimento de peles de coelhos: testes físico-mecânicos dos couros = Action of different tanning agents used on rabbit hide tanning: physicalmechanic tests

    Directory of Open Access Journals (Sweden)

    Nilson do Prado Franco

    2009-10-01

    Full Text Available O objetivo do experimento foi avaliar a ação de diferentes agentes curtentes no processamento das peles de coelhos, sobre a resistência do couro. Cinquenta peles de coelhos foram submetidas a diferentes agentes curtentes na etapa de curtimento (T1 = 6% sais de cromoChromossal B®, T2 = 22% tanino vegetal Clarotan-x8®; T3 = 22% tanino sintético Syntac CW®; T4 = 12% tanino vegetal Weibull® + 10% tanino sintético Syntac F®; T5 = 22% tanino vegetal Weibull®. Foram retirados os corpos de prova do couro, na região dorsal, no sentidolongitudinal e transversal em relação ao eixo céfalo-caudal. Os agentes curtentes e retirada dos corpos de prova não influenciaram no teste de tração (9,28 N mm-2 a 11,63 N mm-2 e força aplicada (17,91 N a 24,85 N nos testes. Os curtimentos com sais de cromo (62,85% e Clarotan–x8® (70,28% proporcionaram maiores valores de alongamento em relação aos demais agentes curtentes utilizados. Os corpos de prova do couro no sentido transversal (59,12% apresentaram maior alongamento comparado ao longitudinal (49,72%. Os curtimentos com sais de cromo (22,70 N mm-1, Clarotan–x8® (25,94 N mm-1 e Weibull® (21,58 N mm-1 proporcionaram couros com maior resistência ao rasgamento. O sentido de retirada dos corpos de prova no couro não influenciou no rasgamento progressivo. As técnicas de curtimento com sais de cromo e Clarotan-x8® proporcionaram couros com melhores valores de resistência ao alongamento e rasgamento progressivo.The objective of the experiment was to evaluate the action of different tanning agents in the processing of rabbit hides over skin resistance. Fifty skins of rabbit hides were submitted to different tanning agents in the tanning stage (T1 = 6% Chromossal B® chromesalts; T2 = 22% Clarotan–x8® vegetable tannin; T3 = 22% Syntac CW® synthetic tannin; T4 = 12% Weibull® vegetable tannin + 10% Syntac F® synthetic tannin; T5 = 22% Weibull® vegetable tannin. The specimens were removed

  15. I saw where you have been--The topography of human demonstration affects dogs' search patterns and perseverative errors.

    Science.gov (United States)

    Péter, András; Topál, József; Miklósi, Ádám; Pongrácz, Péter

    2016-04-01

    Performance in object search tasks is not only influenced by the subjects' object permanence ability. For example, ostensive cues of the human manipulating the target markedly affect dogs' choices. However, the interference between the target's location and the spatial cues of the human hiding the object is still unknown. In a five-location visible displacement task, the experimental groups differed in the hiding route of the experimenter. In the 'direct' condition he moved straight towards the actual location, hid the object and returned to the dog. In the 'indirect' conditions, he additionally walked behind each screen before returning. The two 'indirect' conditions differed from each other in that the human either visited the previously baited locations before (proactive interference) or after (retroactive interference) hiding the object. In the 'indirect' groups, dogs' performance was significantly lower than in the 'direct' group, demonstrating that for dogs, in an ostensive context, spatial cues of the hider are as important as the observed location of the target. Based on their incorrect choices, dogs were most attracted to the previously baited locations that the human visited after hiding the object in the actual trial. This underlines the importance of retroactive interference in multiple choice tasks. Copyright © 2016 Elsevier B.V. All rights reserved.

  16. Pemanfaatan kulit skrotom sapi sebagai bahan baku industri barang kuli

    Directory of Open Access Journals (Sweden)

    Muchtar Lutfi

    1999-12-01

    Full Text Available The aim of the research was to make use of cow scrotum hides to be raw material in leathergood manufacturing. Forty five pieces of scrotum hides were tanned to crust leather using subsequently 6%, 8% and 10% mineral tanning agent; 15%, 20% and 25% vegetable tanning agent; 15%, 20% and 25% synthetic tanning agent. The physical test results indicated that scrotum cow hides were able to be made use as raw material in leathergood manufacturing. The best tensile strength value was achieved by those tanned with mineral tanning agent 10% (175,33 kg/cm2 and the best elongation at break was achieved by those tanned with synthetic tanning agent 15% (41,00%. Where as by using vegetable tanning agent, no single sample fulfilled the requirements of SNI. 06-0253-1989, Quality and Testing method for Glaced Kid Leather.

  17. Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory

    OpenAIRE

    A. M. de Paor

    1998-01-01

    International audience; Hide (Nonlinear Processes in Geophysics, 1998) has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ? has the value 1 is proved via ...

  18. Ownership structure and earnings management

    DEFF Research Database (Denmark)

    Farooq, Omar; El Jai, Hind

    2012-01-01

    Does poor legal protection of minority shareholders provide enough incentives for majority shareholders to expropriate minority shareholders and hide their unscrupulous behavior through accounting manipulations? This paper attempts to study the effect of ownership structure (ownership of the larg......Does poor legal protection of minority shareholders provide enough incentives for majority shareholders to expropriate minority shareholders and hide their unscrupulous behavior through accounting manipulations? This paper attempts to study the effect of ownership structure (ownership...

  19. Liaudiškieji žaliaminės odos išdirbimo būdai: savitumai ir etnokultūrinės sąveikos

    OpenAIRE

    Morkūnienė, Janina

    2001-01-01

    The subject of the article is folk methods of dressing raw hide in Lithuania and their analysis. The article aims on the basis of ethnographic literature and data from ethnographic expeditions of 1992-1998 collected by the author from all ethnic regions of Lithuania to analyze folk methods of dressing raw hide, their occurrence, used technique and technology, their particularities and to compare interaction of analyzed realities with analogous phenomena in neighbouring countries. The dressing...

  20. Using of Hyperbranched Poly(amidoamine) as Pretanning Agent for Leather

    OpenAIRE

    Ibrahim, Amal Amin; Youssef, Moshera S. A.; Nashy, El-Shahat H. A.; Eissa, Mohamed M.

    2013-01-01

    Although chrome is considered as the major tanning agent in the production of all types of hides and leather worldwide, it represents a serious source of environmental pollution. Therefore, polyamidoamine hyperbranched polymer (HPAM) was involved in pretanning of the depickled hides to enhance the chromium uptake during the tanning process. The key parameters which affect the exhaustion and fixation of chrome tan including shrinkage temperature of the tanned leather were studied. The results ...

  1. Know Where Lead May Be Hiding

    Science.gov (United States)

    ... might like ... Sing-Along Songs With words and music! Go! What's That Word Scientific Dictionary Not sure of what a word means? Find Out! For teachers The Environmental Health Science Education website provides educators, students and scientists with ...

  2. Human Infrastructure Detection and Exploitation (HIDE)

    Science.gov (United States)

    2009-11-01

    7  Figure 4. Picture of the fluxgate magnetometer and the coil-type magnetic sensor...may also be used to detect the usage of computer monitors. We used two different B-field sensors (figure 4), namely, (1) a fluxgate magnetometer ...collected at 256 samples per second. The three-axis fluxgate magnetometer used was an Applied Physics Systems Model 1540. It has the sensitivity

  3. A GAO hiding among the PAO

    DEFF Research Database (Denmark)

    McIlroy, Simon Jon; Albertsen, Mads; Stokholm-Bjerregaard, Mikkel

    “Candidatus Accumulibacter phosphatis” (Accumulibacter) and the model GAO being the gammaproteobacterial “Candidatus Competibacter phosphatis” (see Oehmen et al., 2007). Here, we report the discovery of a GAO from the genus Propionivibrio, which is closely related to Accumulibacter. Propionivibrio is often...

  4. Are QSO2 hiding among EROs?

    OpenAIRE

    Brusa, Marcella

    2004-01-01

    We present the results of a deep (80 ks) XMM-Newton survey of one of the largest sample of near-infrared selected Extremely Red Objects (R-K>5) available to date (~300 objects, Daddi et al. 2000). The fraction of individually detected, X-ray emitting EROs is of the order of ~3.5%, down to F_x > 4x10^-15 cgs and Ks

  5. Hiding Lorentz invariance violation with MOND

    International Nuclear Information System (INIS)

    Sanders, R. H.

    2011-01-01

    Horava-Lifshitz gravity is an attempt to construct a renormalizable theory of gravity by breaking the Lorentz invariance of the gravitational action at high energies. The underlying principle is that Lorentz invariance is an approximate symmetry and its violation by gravitational phenomena is somehow hidden to present limits of observational precision. Here I point out that a simple modification of the low-energy limit of Horava-Lifshitz gravity in its nonprojectable form can effectively camouflage the presence of a preferred frame in regions where the Newtonian gravitational field gradient is higher than cH 0 ; this modification results in the phenomenology of modified Newtonian dynamics (MOND) at lower accelerations. As a relativistic theory of MOND, this modified Horava-Lifshitz theory presents several advantages over its predecessors.

  6. 76 FR 28886 - Importation of Swine Hides and Skins, Bird Trophies, and Ruminant Hides and Skins; Technical...

    Science.gov (United States)

    2011-05-19

    ... of animal byproducts to, among other things, provide specific conditions under which deer and other... importation of animal byproducts to, among other things, provide specific conditions under which deer and... skins from Mexico may enter the United States without other restriction if they are hard dried...

  7. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Fadhil Mahmood

    2013-04-01

    Full Text Available     Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.        In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.      This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secures data transmission applications

  8. Chromium removal from tanning industries effluents

    International Nuclear Information System (INIS)

    Chaudry, M.A.; Ahmad, S.

    1997-01-01

    Air and water are the basic needs of human being and other living entities on the earth. Tanning industry uses water and some chemicals and so creates environmental problems, depending basically on two principal sources, hide and water. The processes of tanning are based on chromium sulphate and vegetable treatment of hide. According to the national environmental quality standards (NEQS) the effluent or disposed water should contain phenol less than 0.5 ppm, Cr, sulphates, chloride and other salts content. About 30-40 liters of water are used to process one Kg of raw hide into finished goods. Total installed capacity of hides and skins chrome tanning is 53.5 million square meter, earning a large amount of foreign exchange for our country. In the present work, seven tanning industries effluents from the suburbs of Multan city have been collected and analysed. The pH of the liquors have been found to vary from 2.72 to 4.4 and the constituent Cr have been found to be from zero to 8000 ppm from vegetable to chrome tanning industrial effluents studied. The stages involved in tanning and treatment of the effluent water waste including chemical treatment of Cr has been described with a special reference to supported liquid membranes process for removal of chromium ions. (author)

  9. An FPGA Implementation of Secured Steganography Communication System

    Directory of Open Access Journals (Sweden)

    Ahlam Mahmood

    2014-04-01

    Full Text Available Steganography is the idea of hiding secret message in multimedia cover which will be transmitted through the Internet. The cover carriers can be image, video, sound or text data. This paper presents an implementation of color image steganographic system on Field Programmable Gate Array and the information hiding/extracting techniques in various images. The proposed algorithm is based on merge between the idea from the random pixel manipulation methods and the Least Significant Bit (LSB matching of Steganography embedding and extracting method.  In a proposed steganography hardware approach, Linear Feedback Shift Register (LFSR method has been used in stego architecture to hide the information in the image. The LFSRs are utilized in this approach as address generators. Different LFSR arrangements using different connection unit have been implemented at the hardware level for hiding/extracting the secret data. Multilayer embedding is implemented in parallel manner with a three-stage pipeline on FPGA.  This work showed attractive results especially in the high throughputs, better stego-image quality, requires little calculation and less utilization of FPGA area. The imperceptibility of the technique combined with high payload, robustness of embedded data and accurate data retrieval renders the proposed Steganography system is suitable for covert communication and secure data transmission applications

  10. Latex peptidases of Calotropis procera for dehairing of leather as an alternative to environmentally toxic sodium sulfide treatment.

    Science.gov (United States)

    Lopéz, Laura M I; Viana, Carolina A; Errasti, María E; Garro, María L; Martegani, José E; Mazzilli, Germán A; Freitas, Cléverson D T; Araújo, Ídila M S; da Silva, Rafaela O; Ramos, Márcio V

    2017-09-01

    Dehairing of crude leather is a critical stage performed at the beginning of its processing to obtain industrially useful pieces. Tanneries traditionally apply a chemical process based on sodium sulfide. Since this chemical reactive is environmentally toxic and inefficiently recycled, innovative protocols for reducing or eliminating its use in leather depilation are welcomed. Therefore, latex peptidases from Calotropis procera (CpLP) and Cryptostegia grandiflora (CgLP) were assayed for this purpose. Enzyme activity on substrates representative of skin such as hide powder azure (U HPA ), elastin (U E ), azocollagen (U AZOCOL ), keratin (U K ), and epidermis (U EP ) was determined, while depilation activity was assayed on cow hide. Only CpLP was active against keratin (13.4 U K ) and only CgLP was active against elastin (0.12 U E ). CpLP (93.0 U HPA , 403.6 U AZOCOL , 36.3 U EP ) showed higher activity against the other substrates than CgLP (47.6 U HPA , 261.5 U AZOCOL , 8.5 U EP ). In pilot assays, CpLP (0.05% w/v with sodium sulfite 0.6% w/v as activator) released hairs from cow hide pieces. Macroscopic and microscopic analyses of the hide revealed that the dehairing process was complete and the leather structure was preserved. The proteolytic system of C. procera is a suitable bioresources to be exploited by tanneries.

  11. Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory

    Science.gov (United States)

    de Paor, A. M.

    Hide (Nonlinear Processes in Geophysics, 1998) has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ɛ has the value 1 is proved via the Popov theorem from feedback system stability theory.

  12. Towards zero solid waste: utilising tannery waste as a protein source for poultry feed

    OpenAIRE

    Paul, Hiralal; Antunes, A Paula M; Covington, Anthony D; Evans, Paul; Phillips, Paul S

    2013-01-01

    Zero waste is now a strongly emerging issue for sustainable industrial development where minimisation and utilisation of waste are a priority in the leather industry. In a tannery hides and skins converted in to leather through various processes. Approximately 20% (w/w) of the chrome containing tannery solid waste (TSW) is generated from one tonne of raw hides and skins. However, tannery solid waste may also be a resource if it is managed expertly as we move towards zero waste.\\ud This resear...

  13. Pembuatan kulit tahan air untuk bagian atas sepatu

    OpenAIRE

    Suliestiyah Wiryodiningrat

    2008-01-01

    The aim of research non manufacturing of waterproof leather for shoe upper is to find the best formula in producing waterproof cow hide leather for shoe uppers. Today, the tanners trying their best effort to fulfill the shoes. The research used salted raw cow hide 18 sides were utilized. Leather treatment process begining with soaking stage up to tanning stage and using the same formula in each treatment. In the fatliquoring stage, the treatment varied in the number of fatliquoring chemical m...

  14. Pembuatan Kulit Tahan Air Untuk Bagian Atas Sepatu

    OpenAIRE

    Wiryodiningrat, Suliestiyah

    2008-01-01

    The aim of research non manufacturing of waterproof leather for shoe upper is to find the best formula in producing waterproof cow hide leather for shoe uppers. Today, the tanners trying their best effort to fulfill the shoes. The research used salted raw cow hide 18 sides were utilized. Leather treatment process begining with soaking stage up to tanning stage and using the same formula in each treatment. In the fatliquoring stage, the treatment varied in the number of fatliquoring chemical m...

  15. An Efficient Method for Image and Audio Steganography using Least Significant Bit (LSB) Substitution

    Science.gov (United States)

    Chadha, Ankit; Satam, Neha; Sood, Rakshak; Bade, Dattatray

    2013-09-01

    In order to improve the data hiding in all types of multimedia data formats such as image and audio and to make hidden message imperceptible, a novel method for steganography is introduced in this paper. It is based on Least Significant Bit (LSB) manipulation and inclusion of redundant noise as secret key in the message. This method is applied to data hiding in images. For data hiding in audio, Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) both are used. All the results displayed prove to be time-efficient and effective. Also the algorithm is tested for various numbers of bits. For those values of bits, Mean Square Error (MSE) and Peak-Signal-to-Noise-Ratio (PSNR) are calculated and plotted. Experimental results show that the stego-image is visually indistinguishable from the original cover-image when nsteganography process does not reveal presence of any hidden message, thus qualifying the criteria of imperceptible message.

  16. Mini review : Pengolahan kerupuk “Rambak” kulit di Indonesia

    Directory of Open Access Journals (Sweden)

    Dedes Amertaningtyas

    2011-12-01

    Full Text Available ABSTRACT: Hide a waste product of animal slaughter house is still can be utilized as food in the form of cracker. Cattle, buffalo, rabbit, chicken shank and fish skin can be used of raw materials for cracker production. This process include hide selection, washing, immersing, liming, deliming, boiling, cutting, immersing in sauce, drying and frying. In Indonesia, the skin cracker industriesare consentralised in certain area of west, central and east java provinces where Sumatra skin cracker are popular knows as “ kerupuk jangek”. Although skin cracker have a high protein content, however its quality are low comparedto other meat processed products. The most dominant amino acid in this product is glycine. Some important issues such as it is not recommended for people suffering uric acid, addition of harmfull additives i.e. formalin and borax, containg chrome which originated from hide prosessing industry and unreligion system of slaughtering (is not halal. Key words: waste product, skin animal, rambak cracker.

  17. Non-linear quenching of current fluctuations in a self-exciting homopolar dynamo, proved by feedback system theory

    Directory of Open Access Journals (Sweden)

    A. M. de Paor

    1998-01-01

    Full Text Available Hide (Nonlinear Processes in Geophysics, 1998 has produced a new mathematical model of a self-exciting homopolar dynamo driving a series- wound motor, as a continuing contribution to the theory of the geomagnetic field. By a process of exact perturbation analysis, followed by combination and partial solution of differential equations, the complete nonlinear quenching of current fluctuations reported by Hide in the case that a parameter ε has the value 1 is proved via the Popov theorem from feedback system stability theory.

  18. Developing a Hypercard-UNIX Interface for Electronic Mail Transfer

    Science.gov (United States)

    1992-06-01

    My thanks to Greqg for his support. Many of the comments for -- the MacTCP version are his. His code is set ,%ppart by borders. on openStacK put the...HUES-ModemVersion......- *-*-*-* STACK SCRIPTi "-*-*-* on openStack put the seconds into card fid theTime of card interface hide menubar global...34Loqin" hide fid receiving put empty into cd tia msqname of card theoessaqe end openStack on closeStack global logoutme put eqFpty into card fld text of

  19. How does co-product handling affect the carbon footprint of milk? Case study of milk production in New Zealand and Sweden

    DEFF Research Database (Denmark)

    Flysjö, Anna Maria; Cederberg, Christel; Henriksson, Maria

    2011-01-01

    Purpose This paper investigates different methodologies of handling co-products in life cycle assessment (LCA) or carbon footprint (CF) studies. Co-product handling can have a significant effect on final LCA/CF results, and although there are guidelines on the preferred order for different methods...... (when slaughtered), calves, manure, hides, etc., the environmental burden (here GHG emissions) must be distributed between these outputs (in the present study no emissions are attributed to hides specifically, or to manure which is recycled on-farm). Different methodologically approaches, (1) system...

  20. Does the A-not-B error in adult pet dogs indicate sensitivity to human communication?

    Science.gov (United States)

    Kis, Anna; Topál, József; Gácsi, Márta; Range, Friederike; Huber, Ludwig; Miklósi, Adám; Virányi, Zsófia

    2012-07-01

    Recent dog-infant comparisons have indicated that the experimenter's communicative signals in object hide-and-search tasks increase the probability of perseverative (A-not-B) errors in both species (Topál et al. 2009). These behaviourally similar results, however, might reflect different mechanisms in dogs and in children. Similar errors may occur if the motor response of retrieving the object during the A trials cannot be inhibited in the B trials or if the experimenter's movements and signals toward the A hiding place in the B trials ('sham-baiting') distract the dogs' attention. In order to test these hypotheses, we tested dogs similarly to Topál et al. (2009) but eliminated the motor search in the A trials and 'sham-baiting' in the B trials. We found that neither an inability to inhibit previously rewarded motor response nor insufficiencies in their working memory and/or attention skills can explain dogs' erroneous choices. Further, we replicated the finding that dogs have a strong tendency to commit the A-not-B error after ostensive-communicative hiding and demonstrated the crucial effect of socio-communicative cues as the A-not-B error diminishes when location B is ostensively enhanced. These findings further support the hypothesis that the dogs' A-not-B error may reflect a special sensitivity to human communicative cues. Such object-hiding and search tasks provide a typical case for how susceptibility to human social signals could (mis)lead domestic dogs.

  1. Dirty Secrets: How Tax Havens Destroy the Economy

    OpenAIRE

    Murphy, R.

    2017-01-01

    What happens when the rich are allowed to hide their money in tax havens, and what we should do about it\\ud The Panama Papers were a reminder of how the superrich are allowed to hide their wealth from the rest of us. Dirty Secrets uncovers the extent of the corruption behind this crisis and shows what needs to be done in the face of this unregulated spread of rampant greed.\\ud \\ud Tax havens, we are often told, are part of the global architecture of capitalism, providing a freedom from regula...

  2. Esibire o nascondere? Osservazioni sulla citazione nel “Furioso”

    Directory of Open Access Journals (Sweden)

    Maria Cristina Cabani

    2013-06-01

    Full Text Available Starting by remarking that Ariosto programmatically avoids mentioning his models, this essay endeavours to clarify Ariosto’s attitude (displaying or hiding? towards the Vernacular auctoritates (first of all, Dante and Petrarca, and to understand the reasons why he is so reluctant to mention his models – indeed, much more reluctant in comparison with the sixteenth-century common practice. Ariosto likes hiding rather than exhibiting, as he does not believe in the concept of auctoritas per se; above all, he denies the possibility of predominance of a single voice over the others.

  3. Emotion Regulation Characteristics Development in Iranian Primary School Pupils

    Directory of Open Access Journals (Sweden)

    Asghar Dadkhah

    2014-12-01

    Full Text Available Objectives: Emotion regulations refer to the ability of experiencing emotions as a basic human capacity and the experience of the basic emotions happiness, anger, sadness and fear are considered as reular characteristics among nations. In school-age children, problems in socioemotional development typically shows themselves as challenging, socially disruptive paterns of behavior. The purpose of the present study was to understand Emotion Regulation characteristics in Iranian primary school pupils and whether Iranian children enable to identify common emotions. Methods: Participants included 900 children, 9 to 10 years, from elementary schools from 21 provinces in Iran. In pilot work we presented 200 children with four hypothetical vignettes of the kind typically used in display rule research. In the main study children’s knowledge regarding hiding their emotions was assessed through a structured interview. The participants were presented with the interview questions after the vignettes. The answers were coded by two people and the interrater reliability was high. The children were assessed on the basis of four common emotions:Happiness, Anger,Fear,and, Sadness. Results: The analysis of the data indicated that: 1 all children were enabled to identify and differentiate all four emotions from each other, most of students hide their happiness, anger, fear and sadness, they hide their emotions in specific situation such as school and home, hide happiness and anger against peers and hide fear and sadness in front of adults. Discussion: The study indicates that Iranian children not only differ from other culture peers in the amount of display rule use in daily life, but also in the situations they report using it and their motives for doing so they suppress their overall emotions more frequently, especially in presence of family and for pro-social and self-protective reasons. These findings provides the basic knowledge about Iranian children

  4. LSB-Based Steganography Using Reflected Gray Code

    Science.gov (United States)

    Chen, Chang-Chu; Chang, Chin-Chen

    Steganography aims to hide secret data into an innocuous cover-medium for transmission and to make the attacker cannot recognize the presence of secret data easily. Even the stego-medium is captured by the eavesdropper, the slight distortion is hard to be detected. The LSB-based data hiding is one of the steganographic methods, used to embed the secret data into the least significant bits of the pixel values in a cover image. In this paper, we propose an LSB-based scheme using reflected-Gray code, which can be applied to determine the embedded bit from secret information. Following the transforming rule, the LSBs of stego-image are not always equal to the secret bits and the experiment shows that the differences are up to almost 50%. According to the mathematical deduction and experimental results, the proposed scheme has the same image quality and payload as the simple LSB substitution scheme. In fact, our proposed data hiding scheme in the case of G1 (one bit Gray code) system is equivalent to the simple LSB substitution scheme.

  5. Knowledge and the Experience of Women Living Underground During the Portuguese Dictatorship

    Directory of Open Access Journals (Sweden)

    Cristina Marques Nogueira

    2015-05-01

    Full Text Available This paper assumes that formative processes are not limited to the school context or model but that other life contexts and experiences, even if not intentionally, have educational effects. These informal formative contexts and experiences can play a key role individual´s development, resulting not only in superficial changes, but also in deep changes in terms of subjectivity and identity. Our research involves clandestine militants of the Portuguese Communist Party during the dictatorship, and explores the type of knowledge acquired during their hiding experience (1940-1974 that allowed them to resist and survive over long periods. As our focus is the experience of women, based on narrative discourses of women (or about them we will consider the role and status of women in hiding. The discourses were collected through several published autobiographical narratives and mainly interviews where we tried to identify the learning processes, the people seen as significant for knowledge acquisition, and also how knowing, knowing how to do and knowing how to be were constructed during living in hiding.

  6. Automated packing systems: review of industrial implementations

    Science.gov (United States)

    Whelan, Paul F.; Batchelor, Bruce G.

    1993-08-01

    A rich theoretical background to the problems that occur in the automation of material handling can be found in operations research, production engineering, systems engineering and automation, more specifically machine vision, literature. This work has contributed towards the design of intelligent handling systems. This paper will review the application of these automated material handling and packing techniques to industrial problems. The discussion will also highlight the systems integration issues involved in these applications. An outline of one such industrial application, the automated placement of shape templates on to leather hides, is also discussed. The purpose of this system is to arrange shape templates on a leather hide in an efficient manner, so as to minimize the leather waste, before they are automatically cut from the hide. These pieces are used in the furniture and car manufacturing industries for the upholstery of high quality leather chairs and car seats. Currently this type of operation is semi-automated. The paper will outline the problems involved in the full automation of such a procedure.

  7. Listeria prevalence and Listeria monocytogenes serovar diversity at cull cow and bull processing plants in the United States.

    Science.gov (United States)

    Guerini, Michael N; Brichta-Harhay, Dayna M; Shackelford, T Steven D; Arthur, Terrance M; Bosilevac, Joseph M; Kalchayanand, Norasak; Wheeler, Tommy L; Koohmaraie, Mohammad

    2007-11-01

    Listeria monocytogenes, the causative agent of epidemic and sporadic listeriosis, is routinely isolated from many sources, including cattle, yet information on the prevalence of Listeria in beef processing plants in the United States is minimal. From July 2005 through April 2006, four commercial cow and bull processing plants were sampled in the United States to determine the prevalence of Listeria and the serovar diversity of L. monocytogenes. Samples were collected during the summer, fall, winter, and spring. Listeria prevalence on hides was consistently higher during cooler weather (28 to 92% of samples) than during warmer weather (6 and 77% of samples). The Listeria prevalence data collected from preevisceration carcass ranged from undetectable in some warm season samples to as high as 71% during cooler weather. Listeria on postintervention carcasses in the chill cooler was normally undetectable, with the exception of summer and spring samples from one plant where > 19% of the carcasses were positive for Listeria. On hides, L. monocytogenes serovar 1/2a was the predominant serovar observed, with serovars 1/2b and 4b present 2.5 times less often and serovar 1/2c not detected on any hides sampled. L. monocytogenes serovars 1/2a, 1/2c, and 4b were found on postintervention carcasses. This prevalence study demonstrates that Listeria species are more prevalent on hides during the winter and spring and that interventions being used in cow and bull processing plants appear to be effective in reducing or eliminating Listeria contamination on carcasses.

  8. Ordered Data Analysis, Models and Health Research Methods : an International Conference in Honor of H.N. Nagaraja for his 60th Birthday

    CERN Document Server

    Nagaraja, Chaitra; Ng, Hon

    2015-01-01

    This volume presents an eclectic mix of original research articles in areas covering the analysis of ordered data, stochastic modeling and biostatistics. These areas were featured in a conference held at the University of Texas at Dallas from March 7 to 9, 2014 in honor of Professor H. N. Nagaraja’s 60th birthday and his distinguished contributions to statistics. The articles were written by leading experts who were invited to contribute to the volume from among the conference participants. The volume is intended for all researchers with an interest in order statistics, distribution theory, analysis of censored data, stochastic modeling, time series analysis, and statistical methods for the health sciences, including statistical genetics.

  9. [Simulation of homicide to hide child's suicide].

    Science.gov (United States)

    Schmidt, P; Driever, F; Madea, B

    2001-01-01

    A case of pretending a homicide to conceal a child suicide is reported in which characteristic findings of the postmortem examination and conclusions from the analysis of forensic autopsy series provided substantial support for the police investigation. In the late night hours of a spring day the police authorities were informed that a 10-year-old girl had been found dead on a playground near its parents' house. As injuries of the neck were recognized by the police officers a homicide investigation was initiated. The post mortem examination showed a furrow symmetrically slanting from the front to the nape of the neck, discrete punctate haemorrhages of the skin of the face and numerous 'tram-line' bruises of the back, buttocks and extremities. These findings indicated as cause and manner of death suicidal hanging following corporal punishment. Confronted with these conclusions the mother immediately made a corresponding confession.

  10. Hiding neutrino mass in modified gravity cosmologies

    Energy Technology Data Exchange (ETDEWEB)

    Bellomo, Nicola; Bellini, Emilio; Hu, Bin; Jimenez, Raul; Verde, Licia [ICC, University of Barcelona (UB-IEEC), Marti i Franques 1, 08028, Barcelona (Spain); Pena-Garay, Carlos, E-mail: nicola.bellomo@icc.ub.edu, E-mail: emilio.bellini@physics.ox.ac.uk, E-mail: binhu@icc.ub.edu, E-mail: raul.jimenez@icc.ub.edu, E-mail: penya@ific.uv.es, E-mail: liciaverde@icc.ub.edu [Instituto de Fisica Corpuscular, CSIC-UVEG, P.O. 22085, Valencia, 46071 (Spain)

    2017-02-01

    Cosmological observables show a dependence with the neutrino mass, which is partially degenerate with parameters of extended models of gravity. We study and explore this degeneracy in Horndeski generalized scalar-tensor theories of gravity. Using forecasted cosmic microwave background and galaxy power spectrum datasets, we find that a single parameter in the linear regime of the effective theory dominates the correlation with the total neutrino mass. For any given mass, a particular value of this parameter approximately cancels the power suppression due to the neutrino mass at a given redshift. The extent of the cancellation of this degeneracy depends on the cosmological large-scale structure data used at different redshifts. We constrain the parameters and functions of the effective gravity theory and determine the influence of gravity on the determination of the neutrino mass from present and future surveys.

  11. Cryptic cuckoo eggs hide from competing cuckoos

    Science.gov (United States)

    Gloag, Ros; Keller, Laurie-Anne; Langmore, Naomi E.

    2014-01-01

    Interspecific arms races between cuckoos and their hosts have produced remarkable examples of mimicry, with parasite eggs evolving to match host egg appearance and so evade removal by hosts. Certain bronze-cuckoo species, however, lay eggs that are cryptic rather than mimetic. These eggs are coated in a low luminance pigment that camouflages them within the dark interiors of hosts' nests. We investigated whether cuckoo egg crypsis is likely to have arisen from the same coevolutionary processes known to favour egg mimicry. We added high and low luminance-painted eggs to the nests of large-billed gerygones (Gerygone magnirostris), a host of the little bronze-cuckoo (Chalcites minutillus). Gerygones rarely rejected either egg type, and did not reject natural cuckoo eggs. Cuckoos, by contrast, regularly removed an egg from clutches before laying their own and were five times more likely to remove a high luminance model than its low luminance counterpart. Given that we found one-third of all parasitized nests were exploited by multiple cuckoos, our results suggest that competition between cuckoos has been the key selective agent for egg crypsis. In such intraspecific arms races, crypsis may be favoured over mimicry because it can reduce the risk of egg removal to levels below chance. PMID:25122227

  12. HIDE working groups. A. Synchrotron based system

    International Nuclear Information System (INIS)

    Barton, M.Q.

    1977-01-01

    A summary is given of a week's discussions on an ion source to target scenario for a synchrotron for heavy ion fusion. Topics considered include: the number of beams on the target; beam dynamics; and a number of areas explicitly identified as needing further work

  13. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  14. Soliciting Performance, Hiding Bias: Whiteness and Librarianship

    Directory of Open Access Journals (Sweden)

    Angela Galvan

    2015-06-01

    Full Text Available Image by Flickr user tweng (CC BY-SA 2.0 In Brief: Despite the growing body of research on our professional demographics and multi-year diversity initiatives, librarianship in the United States remains overwhelmingly white. I suggest the interview process is a series of repetitive gestures designed to mimic and reinforce white middle class values, which ultimately influence […

  15. Hiding in Plain Sight: Street artists online

    Directory of Open Access Journals (Sweden)

    Kim Barbour

    2013-10-01

    Full Text Available Identity and privacy concerns related to social media are the subject of widespread academic enquiry and mass media reporting. Although in most circumstances academic research tends to present identity play and online self­presentation as positive, media reporting in Australia makes much of the risks of identity theft, privacy breaches and online predators. This research explores the phenomenological experience of creating an online persona, focusing particularly on street artists. For street artists, the threat of unwanted exposure has to be balanced with the positive implications of sharing their creative work outside its geographical and temporal constraints. I argue that street artists use complex persona­creation strategies in order to both protect and promote themselves. The two street artists discussed in this article experience their engagement with social media and digital networks in ways that offer new insight into the opportunities and problems associated with the presentation of a persona online.

  16. Using of Hyperbranched Poly(amidoamine as Pretanning Agent for Leather

    Directory of Open Access Journals (Sweden)

    Amal Amin Ibrahim

    2013-01-01

    Full Text Available Although chrome is considered as the major tanning agent in the production of all types of hides and leather worldwide, it represents a serious source of environmental pollution. Therefore, polyamidoamine hyperbranched polymer (HPAM was involved in pretanning of the depickled hides to enhance the chromium uptake during the tanning process. The key parameters which affect the exhaustion and fixation of chrome tan including shrinkage temperature of the tanned leather were studied. The results showed a significant improvement in the chrome exhaustion, the shrinkage temperature, and the texture and softness of the leather treated by HPAM.

  17. Evaluación de algunos insecticidas para el control de la «polilla del tomate», Tuta absoluta (Lepidoptera: Gelechiidae y su efecto residual sobre el parasitoide Trichogrammatoidea bactrae (Hymenoptera: Trichogrammatidae

    Directory of Open Access Journals (Sweden)

    María B. RIQUELME VIRGALA

    2006-01-01

    Full Text Available La «polilla del tomate», Tuta absoluta (Meyrick, es una plaga clave de este cultivo en Argentina. Su manejo integrado debería incluir una selección de productos fitosanitarios que sean eficaces para su control y, al mismo tiempo, selectivos respecto de sus enemigos naturales. El objetivo de este trabajo fue evaluar la capacidad de control de los insecticidas triflumurón, clorfenapir, abamectin y una cepa experimental de Bacillus thuringiensis (Bt sobre la plaga, y el poder residual de los mismos sobre Trichogrammatoidea bactrae Nagaraja. Se registró la mortalidad de la polilla cada cuatro días, desde la aplicación hasta la emergencia de los adultos. El efecto sobre el parasitoide, se evaluó a través del número de huevos parasitados por hembra expuesta durante 48 horas a folíolos tratados, y su mortalidad luego de 1, 3, 7, 14 y 30 días de la pulverización. Todos los productos ocasionaron una mortalidad de T. absoluta mayor al 65% después de 12 días de aplicados. El Bt fue el único insecticida que no afectó la supervivencia y el parasitismo de T. bactrae . Estos resultados aportan información de interés para la selección de plaguicidas, a emplearse en programas de manejo integrado.

  18. Prevalence and serotypes of Listeria monocytogenes contamination in Chinese beef processing plants.

    Science.gov (United States)

    Zhu, Lixian; Feng, Xiaohui; Zhang, Lihua; Zhu, Ruiliang; Luo, Xin

    2012-06-01

    The aim of this work was to study the epidemiology of Listeria spp., particularly Listeria monocytogenes, and to identify the serotypes present in contaminated samples from beef processing plants in China. A total of 439 samples were obtained from bovine feces, hides, and carcasses at three commercial processing plants. A standard protocol (ISO 11290-1) was followed to detect Listeria spp. and L. monocytogenes, and multiplex polymerase chain reaction was used to identify the various L. monocytogenes serotypes. The overall prevalences of Listeria spp. and L. monocytogenes were 65.6% and 26.4%, respectively, and the contamination was highest in the hide samples. The identified L. monocytogenes serotypes were 1/2c and 1/2a. The results of the current study indicate that Listeria spp. contamination is common in Chinese beef processing plants; specific measures should be taken to prevent and/or treat L. monocytogenes contamination of feces and hides in beef slaughter plants. Furthermore, because Listeria spp. contamination was found to be prevalent, it should, therefore, be studied further. The prevention of cases of sporadic listeriosis in China should also be addressed.

  19. ON THE THERMAL BEHAVIOR OF DIFFERENT TANNED BOVINE LEATHERS

    Directory of Open Access Journals (Sweden)

    VARGANICI Cristian-Dragoş

    2017-05-01

    Full Text Available Leather is one of the most globally spread biomaterial which is obtained by the processing of different animal skins. It encompasses a wide palette of applications, from footwear and clothing to upholsteries and different types of furniture [1], [2], [3]. The main constituent of animal skins is collagen, a supramolecular fibrillar protein in the form of a triple helix. This form endows leather with elasticity, good mechanical properties and softness. A major disadvantage resides in the inapplicability of raw animal hides, due to their microbiological instability and decay through rotting. Microbiological stability is obtained through the tanning process, characterized by protein crosslinking and drying afterwards. After tanning the leather exhibits the required properties for the desired specific applications in terms of aspect, availability and sustainability [4], [5]. The study aims to elucidate the thermal decomposition process of chrome-free tanned bovine hide (wet-white using a new product based on titanium and aluminium salts compared with the same hide tanned by chromium salts (wet-blue. The thermal behavior was studied by dynamic thermogravimetry in nitrogen atmosphere, up to 700 oC. A comparative thermal decomposition study between the different tanned bovine leathers was undertaken.

  20. On the Complexity of Computing Optimal Private Park-and-Ride Plans

    DEFF Research Database (Denmark)

    Olsen, Martin

    2013-01-01

    or size of the parties inputs. This is despite the fact that in many cases the size of a party’s input can be confidential. The reason for this omission seems to have been the folklore belief that, as with encryption, it is impossible to carry out non-trivial secure computation while hiding the size...... that the folklore belief may not be fully accurate. In this work, we initiate a theoretical study of input-size hiding secure computation, and focus on the two-party case. We present definitions for this task, and deal with the subtleties that arise in the setting where there is no a priori polynomial bound...

  1. Psychosocial work environment exposures as risk factors for long-term sickness absence among Danish employees: results from DWECS/DREAM

    DEFF Research Database (Denmark)

    Lund, Thomas; Labriola, Merete; Christensen, Karl Bang

    2005-01-01

    and followed up during the proceeding 1.5 years regarding onset of long-term sickness absence. RESULTS: Long-term sickness absence among female employees was associated with role conflict, low reward, and poor management quality. Demands for hiding emotions and high emotional demands predicted long......-term sickness absence among men. No significant interactions between psychosocial and physical exposures were found for female or male employees. CONCLUSIONS: The study suggests a potential for reducing long-term sickness absence through interventions targeted toward reducing role conflict, and improving reward...... and management quality among female employees, and through reducing emotional demands and demands for hiding emotions among male employees....

  2. Video copy protection and detection framework (VPD) for e-learning systems

    Science.gov (United States)

    ZandI, Babak; Doustarmoghaddam, Danial; Pour, Mahsa R.

    2013-03-01

    This Article reviews and compares the copyright issues related to the digital video files, which can be categorized as contended based and Digital watermarking copy Detection. Then we describe how to protect a digital video by using a special Video data hiding method and algorithm. We also discuss how to detect the copy right of the file, Based on expounding Direction of the technology of the video copy detection, and Combining with the own research results, brings forward a new video protection and copy detection approach in terms of plagiarism and e-learning systems using the video data hiding technology. Finally we introduce a framework for Video protection and detection in e-learning systems (VPD Framework).

  3. Carpet cloak with graded dielectric metasurface (Presentation Recording)

    Science.gov (United States)

    Hsu, LiYi; Lepetit, Thomas; Kante, Boubacar

    2015-09-01

    We demonstrate a method to hide a Gaussian-shaped bump on a ground plane from an incoming plane wave. In essence, we use a graded metasurface to shape the wavefronts like those of a flat ground plane[1,2].The metasurface provides additional phase to the electromagnetic field to control the reflection angle. To mimic a flat ground plane, the reflection angle is chosen to be equal to the incident angle. The desired phase distribution is calculated based on generalized Snell's laws[3]. We design our metasurface in the microwave range using sub-wavelength dielectric resonators. We verify the design by full-wave time-domain simulations and show that the result matches our theory well. This approach can be applied to hide any object on a ground plane not only at microwave frequencies but also at higher frequencies up to the infrared. 1. Jensen Li and J. B. Pendry, Hiding under the Carpet: A New Strategy for Cloaking. Phys. Rev. Lett. 101, 203901 (2008) 2. Andrea Alu, Mantle cloak: Invisibility induced by a surface. Phys. Rev. B 80, 245115 (2009) 3. Yu N, et al. Light propagation with phase discontinuities: Generalized laws of reflection and refraction. Science 334(6054):333-337 (2011)

  4. A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection

    Directory of Open Access Journals (Sweden)

    Guo-Jheng Yang

    2013-08-01

    Full Text Available The fragile watermarking technique is used to protect intellectual property rights while also providing security and rigorous protection. In order to protect the copyright of the creators, it can be implanted in some representative text or totem. Because all of the media on the Internet are digital, protection has become a critical issue, and determining how to use digital watermarks to protect digital media is thus the topic of our research. This paper uses the Logistic map with parameter u = 4 to generate chaotic dynamic behavior with the maximum entropy 1. This approach increases the security and rigor of the protection. The main research target of information hiding is determining how to hide confidential data so that the naked eye cannot see the difference. Next, we introduce one method of information hiding. Generally speaking, if the image only goes through Arnold’s cat map and the Logistic map, it seems to lack sufficient security. Therefore, our emphasis is on controlling Arnold’s cat map and the initial value of the chaos system to undergo small changes and generate different chaos sequences. Thus, the current time is used to not only make encryption more stringent but also to enhance the security of the digital media.

  5. Penelitian pemanfaatan kulit sapi mentah dari nusa tenggara barat untuk kulit boks

    Directory of Open Access Journals (Sweden)

    Suliestiyah Wiryodiningrat

    1992-08-01

    Full Text Available The aim of this study was to identify of the quality upper leather made from dry cow hide taken from West Nusa Tenggara either of leather produced before or after being provided a technical assistance, were compared to them taken from Java. It was carried out by tanning both kinds of hides using selected IRDLAI tanning method. The upper leather produced in this research were physically tested (water absorption, tensile strength, flexibility and bursting strength, chemically tested (water content, ash content, Cr2O3 content, fat content and pH, as well as organoleptic inspection. The physical and chemical tests were six time repeated. A consclusion could be drawn from the organoleptic test result that the quality of Java upper leather were better compared to them of West Nusa Tenggara either before or after having technical assistance, while the quality of upper leathers after having technical guidance by IRDLAI were considered better compared to them before having it. The test result also shown that there was significant difference on fat, water and ash contents, bursting strength of upper leathers, the dry cow hides of which were taken from West Nusa Tenggara, either before or after having technical assistance.

  6. Adaptive PVD Steganography Using Horizontal, Vertical, and Diagonal Edges in Six-Pixel Blocks

    Directory of Open Access Journals (Sweden)

    Anita Pradhan

    2017-01-01

    Full Text Available The traditional pixel value differencing (PVD steganographical schemes are easily detected by pixel difference histogram (PDH analysis. This problem could be addressed by adding two tricks: (i utilizing horizontal, vertical, and diagonal edges and (ii using adaptive quantization ranges. This paper presents an adaptive PVD technique using 6-pixel blocks. There are two variants. The proposed adaptive PVD for 2×3-pixel blocks is known as variant 1, and the proposed adaptive PVD for 3×2-pixel blocks is known as variant 2. For every block in variant 1, the four corner pixels are used to hide data bits using the middle column pixels for detecting the horizontal and diagonal edges. Similarly, for every block in variant 2, the four corner pixels are used to hide data bits using the middle row pixels for detecting the vertical and diagonal edges. The quantization ranges are adaptive and are calculated using the correlation of the two middle column/row pixels with the four corner pixels. The technique performs better as compared to the existing adaptive PVD techniques by possessing higher hiding capacity and lesser distortion. Furthermore, it has been proven that the PDH steganalysis and RS steganalysis cannot detect this proposed technique.

  7. The use of fan scrapers: Microwear evidence from Late Pottery Neolithic and Early Bronze Age, Ein Zippori, Israel

    Directory of Open Access Journals (Sweden)

    Richard W. Yerkes

    2016-09-01

    Full Text Available The results of a microwear analysis of samples of fan scrapers and fan scrapers spalls from late Pottery Neolithic (PN and Early Bronze Age (EBA occupation layers at Ein Zippori, Lower Galilee, Israel are presented. The goal of the microwear analysis was to determine the function of the fan scrapers and compare the visible usewear on the scrapers found in late PN and EBA lithic assemblages. The results indicate that during both periods most of the fan scrapers were used to skin and butcher animals, while some were also used for hide processing and bone working. The working edges of the fan scrapers had sharp, moderate, or steep edge-angles, and different edges were used for different tasks. Edges with microwear from scraping meat, bone, and hides (including some hides that may have been treated with abrasives had steep edge-angles, while there were moderate or sharp edge-angles on the edges of fan scrapers used for cutting. Two sub-types of fan scrapers were identified, flat cortex fan scrapers (FCFS, and cortical fan scrapers (CFS with convex dorsal faces. The CFS were abundant in PN contexts, while the FCFS were more common in EBA layers. However both of the sub-types had similar microwear traces.

  8. Ring Confidential Transactions

    Directory of Open Access Journals (Sweden)

    Shen Noether

    2016-12-01

    Full Text Available This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is a cryptocurrency which is distributed through a proof-of-work “mining” process having no central party or trusted setup. The original Monero protocol was based on CryptoNote, which uses ring signatures and one-time keys to hide the destination and origin of transactions. Recently the technique of using a commitment scheme to hide the amount of a transaction has been discussed and implemented by Bitcoin Core developer Gregory Maxwell. In this article, a new type of ring signature, A Multilayered Linkable Spontaneous Anonymous Group signature is described which allows one to include a Pedersen Commitment in a ring signature. This construction results in a digital currency with hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation. The author would like to note that early drafts of this were publicized in the Monero Community and on the #bitcoin-wizards IRC channel. Blockchain hashed drafts are available showing that this work was started in Summer 2015, and completed in early October 2015. An eprint is also available at http://eprint.iacr.org/2015/1098.

  9. Foreign Banks: Internal Control and Audit Weaknesses in U.S. Branches

    National Research Council Canada - National Science Library

    1997-01-01

    .... Weaknesses in the branch's internal controls, including inadequate segregation of duties in trading and electronic funds transfer activities, had enabled an employee to trade illegally and to hide...

  10. 40 CFR 425.20 - Applicability; description of the hair save, chrome tan, retan-wet finish subcategory.

    Science.gov (United States)

    2010-07-01

    ... ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING... cattle-like hides into finished leather by hair save unhairing, chrome tanning, and retan-wet finishing. ...

  11. Hiding correlation-based Watermark templates using secret modulation

    NARCIS (Netherlands)

    Lichtenauer, J.; Setyawan, I.; Lagendijk, R.

    2004-01-01

    A possible solution to the difficult problem of geometrical distortion of watermarked images in a blind watermarking scenario is to use a template grid in the autocorrelation function. However, the important drawback of this method is that the watermark itself can be estimated and subtracted, or the

  12. Chern Numbers Hiding in Time of Flight Images

    Science.gov (United States)

    Satija, Indubala; Zhao, Erhai; Ghosh, Parag; Bray-Ali, Noah

    2011-03-01

    Since the experimental realization of synthetic magnetic fields in neural ultracold atoms, transport measurement such as quantized Hall conductivity remains an open challenge. Here we propose a novel and feasible scheme to measure the topological invariants, namely the chern numbers, in the time of flight images. We study both the commensurate and the incommensurate flux, with the later being the main focus here. The central concept underlying our proposal is the mapping between the chern numbers and the size of the dimerized states that emerge when the two-dimensional hopping is tuned to the highly anisotropic limit. In a uncoupled double quantum Hall system exhibiting time reversal invariance, only odd-sized dimer correlation functions are non-zero and hence encode quantized spin current. Finally, we illustrate that inspite of highly fragmented spectrum, a finite set of chern numbers are meaningful. Our results are supported by direct numerical computation of transverse conductivity. NBA acknowledges support from a National Research Council postdoctoral research associateship.

  13. Ultrashort soliton switching based on coherent energy hiding.

    Science.gov (United States)

    Romagnoli, M; Wabnitz, S; Zoccolotti, L

    1991-08-15

    Coherent coupling between light and atoms may be exploited for conceiving a novel class of all-optical signalprocessing devices without a direct counterpart in the continuous-wave regime. We show that the self-switching of ultrashort soliton pulses on resonance with a transition of doping centers in a slab waveguide directional coupler is based on nonlinear group-velocity (instead of the usual phase-velocity) changes.

  14. Hiding the weakness: structural robustness using origami design

    Science.gov (United States)

    Liu, Bin; Santangelo, Christian; Cohen, Itai

    2015-03-01

    A non-deformable structure is typically associated with infinitely stiff materials that resist distortion. In this work, we designed a structure with a region that will not deform even though it is made of arbitrarily compliant materials. More specifically, we show that a foldable sheet with a circular hole in the middle can be deformed externally with the internal geometry of the hole unaffected. Instead of strengthening the local stiffness, we fine tune the crease patterns so that all the soft modes that can potentially deform the internal geometry are not accessible through strain on the external boundary. The inner structure is thus protected by the topological mechanics, based on the detailed geometry of how the vertices in the foldable sheet are connected. In this way, we isolate the structural robustness from the mechanical properties of the materials, which introduces an extra degree of freedom for structural design.

  15. Protocols for data hiding in pseudo-random state

    Science.gov (United States)

    Craver, Scott; Li, Enping; Yu, Jun

    2009-02-01

    An emerging form of steganographic communication uses ciphertext to replace the output of a random or strong pseudo-random number generator. PRNG-driven media, for example computer animated backdrops in video-conferencing channels, can then be used as a covert channel, if the PRNG bits that generated a piece of content can be estimated by the recipient. However, all bits sent over such a channel must be computationally indistinguishable from i.i.d. coin flips. Ciphertext messages and even key exchange datagrams are easily shaped to match this distribution; however, when placing these messages into a continous stream of PRNG bits, the sender is unable to provide synchronization markers, metadata, or error correction to ensure the message's location and proper decoding. In this paper we explore methods for message transmission and steganographic key exchange in such a "coin flip" channel. We establish that key exchange is generally not possible in this channel if an adversary possesses even a modest noise budget. If the warden is not vigilant in adding noise, however, communication is very simple.

  16. Hide-and-Seek: Narcissism and "Selfie"-Related Behavior.

    Science.gov (United States)

    Lee, Jung-Ah; Sung, Yongjun

    2016-05-01

    While prior research has examined the relationship between narcissism and self-promoting behaviors on social media (e.g., posting selfies), little is known about the extent to which individuals' level of narcissism relates to how involved they are in other people's feedback (e.g., comments and "likes") received on their selfies, or how observant and responsive they are to other people's selfie postings. The present study investigates how narcissism relates to such selfie-related behaviors, as well as overall evaluation of selfie-posting behavior and intention to post selfies in the future. By employing a total of 315 Korean subjects who take and post selfies on social networking sites, the present study indicates that individuals higher in narcissism are more likely to evaluate selfie-posting behavior favorably, be involved in the feedback provided by others, and be observant of other people's selfies. However, level of narcissism did not moderate the relationship between how much one observes others' selfies and the likelihood of providing a comment or "like" on other people's selfies.

  17. Polycyclic Aromatic Hydrocarbons (PAHs) Content in Cattle Hides ...

    African Journals Online (AJOL)

    ADOWIE PERE

    ABSTRACT: Scrap rubber tyre is used as fuel for singeing animal carcasses in third world countries despite the fact that it can .... test method and the quantification of the PAH analytes using ... waste, SW-846 methods) with some modifications.

  18. Medical apps in endocrine diseases - hide and seek.

    Science.gov (United States)

    Albrecht, Urs-Vito; von Jan, Ute

    2014-04-01

    Quantitative review and categorization of available endocrinology related mobile apps for the iOS platform (Apple®) and outline of search strategies to identify appropriate mobile apps for this field. A total of 80 endocrinology related search terms were collected and grouped into 8 main categories covering different areas of endocrinology. These terms were then used to perform comprehensive searches in three categories of Apple's app store, namely 'Medicine', 'Health and Fitness', and 'Reference'. Altogether, matches were found for only 33 of the 80 collected endocrinology related search terms; the majority of matches were found in the medical category, followed by matches for the health and fitness (27/33), and reference (16/33) categories. Restricting the search to these categories significantly helped in discriminating between health related apps and those having another purpose. The distribution of apps per category roughly matches what one can expect considering available data for incidence and prevalence of corresponding endocrinological conditions. Apps matching terms belonging to the spectrum of glucose homeostasis disorders are the most common. For conditions where patients do not have to constantly monitor their condition, apps tend to have a reference or educational character, while for conditions that require a high level of involvement from patients, there are proportionally more apps for self-management. With a single exception, the identified apps had not undergone regulation, and information about the data sources, professional backgrounds, and reliability of the content and integrated information sources was rare. While applying a good search strategy is important for finding apps for endocrinology related problems, users also need to consider whether the app they have found respects all necessary criteria regarding reliability, privacy and data protection before they place their trust in it.

  19. Hiding State in CλaSH Hardware Descriptions

    NARCIS (Netherlands)

    Gerards, Marco Egbertus Theodorus; Baaij, C.P.R.; Kuper, Jan; Kooijman, Matthijs

    Synchronous hardware can be modelled as a mapping from input and state to output and a new state, such mappings are referred to as transition functions. It is natural to use a functional language to implement transition functions. The CaSH compiler is capable of translating transition functions to

  20. Erosion can't hide from laser scanner

    International Nuclear Information System (INIS)

    Konstant, D.A.

    1991-01-01

    Particles of topsoil blown by wind will bounce along the soil surface and finally escape a field, leaving it less able to support crops. Water will wash away valuable topsoil and nutrients. And how rough the soil surface is influences whether the soil will erode. Until now, soil scientists have had no suitable technique to measure soil roughness - or microtopography - on the small scale. ARS soil scientists Joe M. Bradford and Chi-hua Huang, of the National Soil Erosion Research Laboratory in West Lafayette, Indiana, have developed a portable scanner that can. It measures the tiny ridges left in the soil by tilling or clods of soil particles that clump together naturally. What does the scanner do? It measures soil elevation by shining a low-power laser beam onto the surface and detecting the position of the laser spot reflected from the soil with a 35-mm camera. In place of film, the scanner camera uses electronic circuitry somewhat similar to that in a video camera to transmit the spot's position to a small computer about 30,000 times a minute. The laser and camera are mounted on the frame of a motor-driven carriage. The computer controls the carriage movement. At the end of a scan, a microtopographic map is stored in the computer. Scientists can analyze it immediately and can compare it to previous maps to see whether erosion has occurred

  1. Mathematics Hiding in the Nets for a Cube

    Science.gov (United States)

    Jeon, Kyungsoon

    2009-01-01

    Whether they are third graders or teacher candidates, students can learn about perimeter and area while having fun manipulating two-dimensional figures into three-dimensional objects. In this article, the author describes a common mathematical activity for geometry students by creating nets for a cube. By making connections between nets in two…

  2. HIDE-AND-SEEK WITH THE FUNDAMENTAL METALLICITY RELATION

    Energy Technology Data Exchange (ETDEWEB)

    Kashino, D. [Division of Particle and Astrophysical Science, Graduate School of Science, Nagoya University, Nagoya, 464-8602 (Japan); Renzini, A. [INAF Osservatorio Astronomico di Padova, vicolo dell’Osservatorio 5, I-35122 Padova (Italy); Silverman, J. D. [Kavli Institute for the Physics and Mathematics of the Universe (WPI), Todai Institutes for Advanced Study, the University of Tokyo, Kashiwanoha, Kashiwa, 277-8583 (Japan); Daddi, E., E-mail: daichi@nagoya-u.jp [Laboratoire AIM-Paris-Saclay, CEA/DSM-CNRS-Université Paris Diderot, Irfu/CEA-Saclay, Service d’Astrophysique, F-91191 Gif-sur-Yvette (France)

    2016-06-01

    We use ∼83,000 star-forming galaxies at 0.04 < z < 0.3 from the Sloan Digital Sky Survey to study the so-called fundamental metallicity relation (FMR) and report on the disappearance of its anti-correlation between metallicity and star formation rate (SFR) when using the new metallicity indicator recently proposed by Dopita et al. In this calibration, metallicity is primarily sensitive to the emission line ratio [N ii] λ 6584/[S ii] λλ 6717, 6731 that is insensitive to dilution by pristine infalling gas that may drive the FMR anti-correlation with SFR. Therefore, we conclude that the apparent disappearance of the FMR (using this new metallicity indicator) does not rule out its existence.

  3. 32 CFR 229.3 - Definitions.

    Science.gov (United States)

    2010-07-01

    ..., bone, ivory, shell, metal, wood, hide, feathers, pigments, and flaked, ground, or pecked stone); (iv.../agricultural gardens or fields, bedrock mortars or grinding surfaces, rock alignments, cairns, trails, borrow...

  4. 22 CFR 1104.2 - Definitions.

    Science.gov (United States)

    2010-04-01

    ..., hide, feathers, pigments, and flaked, ground, or pecked stone); (iv) By-products, waste products, or... fields, bedrock mortars or grinding surfaces, rock alignments, cairns, trails, borrow pits, cooking pits...

  5. 18 CFR 1312.3 - Definitions.

    Science.gov (United States)

    2010-04-01

    ..., hide, feathers, pigments, and flaked, ground, or pecked stone); (iv) By-products, waste products, or..., bedrock mortars or grinding surfaces, rock alignments, cairns, trails, borrow pits, cooking pits, refuse...

  6. 40 CFR 425.40 - Applicability; description of the retan-wet finish-sides subcategory.

    Science.gov (United States)

    2010-07-01

    ... PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING POINT SOURCE... resulting from any tannery which processes previously tanned hides and skins (grain side only) into finished...

  7. Opening Up Architectures of Software-Intensive Systems: A First Prototype Implementation

    National Research Council Canada - National Science Library

    Charland, Philippe; Dessureault, Dany; Ouellet, David; Lizotte, Michel

    2007-01-01

    .... One approach to deal with this problem is information hiding. This technical memorandum presents a prototype which implements this technique to reverse engineer dynamic models from Java software systems...

  8. Effects due to induced azimuthal eddy currents in a self-exciting Faraday disk homopolar dynamo with a nonlinear series motor. I.. Two special cases

    Science.gov (United States)

    Hide, Raymond; Moroz, Irene M.

    1999-10-01

    The elucidation of the behaviour of physically realistic self-exciting Faraday-disk dynamos bears inter alia on attempts by theoretical geophysicists to interpret observations of geomagnetic polarity reversals. Hide [The nonlinear differential equations governing a hierarchy of self-exciting coupled Faraday-disk homopolar dynamos, Phys. Earth Planet. Interiors 103 (1997) 281-291; Nonlinear quenching of current fluctuations in a self-exciting homopolar dynamo, Nonlinear Processes in Geophysics 4 (1998) 201-205] has introduced a novel 4-mode set of nonlinear ordinary differential equations to describe such a dynamo in which a nonlinear electric motor is connected in series with the coil. The applied couple, α, driving the disk is steady and the Lorentz couple driving the motor is a quadratic function, x(1-ɛ)+ɛσx 2, of the dynamo-generated current x, with 0≤ɛ≤1. When there are no additional biasing effects due to background magnetic fields etc., the behaviour of the dynamo is determined by eight independent non-negative control parameters. These include ρ, proportional to the resistance of the disk to azimuthal eddy currents, and β, an inverse measure of the moment of inertia of the armature of the motor. When β=0 (the case when the motor is absent and ɛ and σ are redundant) and ρ -1≠0 , the 4-mode dynamo equations reduce to the 3-mode Lorenz equations, which can behave chaotically [E. Knobloch, Chaos in the segmented disc dynamo, Phys. Lett. A 82 (1981) 439-440]. When β≠0 but ρ -1=0 , the 4-mode set of equations reduces to a 3-mode dynamo [R. Hide (1997), see above], which can also behave chaotically when ɛ=0 [R. Hide, A.C. Skeldon, D.J. Acheson, A study of two novel self-exciting single-disk homopolar dynamos: theory, Proc. R. Soc. Lond. A 452 (1996) 1369-1395] but not when ɛ=1 [R. Hide (1998), see above]. In the latter case, however, all persistent fluctuations are completely quenched [R. Hide (1998), see above]. In this paper we investigate

  9. Incentive Contract in Supply Chain with Asymmetric Information

    Directory of Open Access Journals (Sweden)

    Yingsheng Su

    2014-01-01

    Full Text Available The supply chain always appears inefficient because of the different targets of members and information asymmetry, especially when upstream enterprises not only hide information about their effort levels, but also hide information about their technology level. The paper uses principal-agent theory and the theory of regulation to design the contract to realize the maximization of principal's profit on the condition that the contract satisfies the participant and incentive conditions of agent. As a result, it is obvious that the contract achieves the goal of control. In addition, it also can be concluded that the amount of rent that the manufacturer can obtain is up to the value of his information and the condition of his resource.

  10. Differential sensitivity to human communication in dogs, wolves, and human infants.

    Science.gov (United States)

    Topál, József; Gergely, György; Erdohegyi, Agnes; Csibra, Gergely; Miklósi, Adám

    2009-09-04

    Ten-month-old infants persistently search for a hidden object at its initial hiding place even after observing it being hidden at another location. Recent evidence suggests that communicative cues from the experimenter contribute to the emergence of this perseverative search error. We replicated these results with dogs (Canis familiaris), who also commit more search errors in ostensive-communicative (in 75% of the total trials) than in noncommunicative (39%) or nonsocial (17%) hiding contexts. However, comparative investigations suggest that communicative signals serve different functions for dogs and infants, whereas human-reared wolves (Canis lupus) do not show doglike context-dependent differences of search errors. We propose that shared sensitivity to human communicative signals stems from convergent social evolution of the Homo and the Canis genera.

  11. Force Protection in Urban and Unconventional Environments

    National Research Council Canada - National Science Library

    Gold, Theodore; Hartzog, William

    2006-01-01

    ...; the same populace that adaptive enemies attempt to hide within. While its subject is force protection, the task force has little to say about armor, fences, portals, and other defensive measures...

  12. The Linux Operating System

    Indian Academy of Sciences (India)

    of America to exercise control over the production, management and use of information resources by promoting the .... development of stable 'production quality' versions. This ... obscurity', to hide potential security problems from malicious.

  13. The Myth of "Pop Warner": Carlisle Revisited.

    Science.gov (United States)

    Howell, Reet A; Howell, Maxwell L.

    1978-01-01

    The myth of Pop Warner's sterling character hides the distasteful story behind the closure of Warner's Carlisle School for Indians on the grounds of moral corruption and misuse of athletic funds. (LH)

  14. The role of team climate in the management of emotional labour: implications for nurse retention.

    Science.gov (United States)

    Cheng, Cindy; Bartram, Timothy; Karimi, Leila; Leggat, Sandra G

    2013-12-01

    This article examines the relationships among emotional labour, team climate, burnout, perceived quality of care and turnover intention among nurses in Australia, with the aim of addressing nurse retention and burnout. Emotional labour refers to the regulation of emotion during interpersonal transactions. It may involve faking unfelt emotions, hiding genuine emotions and deep acting whereby the individuals attempt to influence their inner feelings to induce the appropriate outward countenance. Currently, there is a dearth of literature that investigates the link between emotional labour and perceived quality of care and ultimately turnover intention. The contribution of team climate in the relationship between emotional labour and burnout is still uncertain. A cross-sectional quantitative study conducted with self-completed questionnaires. The study was conducted in 2011 with 201 registered nurses. Validated measures were used to measure the aforementioned constructs. Confirmatory factor analyses were used to examine the factor structure of the measured variables and hypotheses were tested using structural equation modelling. The final model demonstrates that faking has a significant negative influence on perceived quality of care. Hiding predicts burnout, leading to an increase in turnover intention. Team climate moderates the relationship between hiding and burnout, which may subsequently influence turnover intention. The establishment of a strong team climate may help nurses to manage the emotional demands of their role, promote their well-being and retention. © 2013 John Wiley & Sons Ltd.

  15. Why do adult dogs (Canis familiaris) commit the A-not-B search error?

    Science.gov (United States)

    Sümegi, Zsófia; Kis, Anna; Miklósi, Ádám; Topál, József

    2014-02-01

    It has been recently reported that adult domestic dogs, like human infants, tend to commit perseverative search errors; that is, they select the previously rewarded empty location in Piagetian A-not-B search task because of the experimenter's ostensive communicative cues. There is, however, an ongoing debate over whether these findings reveal that dogs can use the human ostensive referential communication as a source of information or the phenomenon can be accounted for by "more simple" explanations like insufficient attention and learning based on local enhancement. In 2 experiments the authors systematically manipulated the type of human cueing (communicative or noncommunicative) adjacent to the A hiding place during both the A and B trials. Results highlight 3 important aspects of the dogs' A-not-B error: (a) search errors are influenced to a certain extent by dogs' motivation to retrieve the toy object; (b) human communicative and noncommunicative signals have different error-inducing effects; and (3) communicative signals presented at the A hiding place during the B trials but not during the A trials play a crucial role in inducing the A-not-B error and it can be induced even without demonstrating repeated hiding events at location A. These findings further confirm the notion that perseverative search error, at least partially, reflects a "ready-to-obey" attitude in the dog rather than insufficient attention and/or working memory.

  16. Plaadid / Mart Normet

    Index Scriptorium Estoniae

    Normet, Mart, 1979-

    2005-01-01

    Uutest heliplaatidest Black Rebel Motorcycle Club "HOWL", The gathering "Accessories", Joshua redman Elastic Band "Momentum", The Rasmus "Hide From The Sun", Nihilistikrypt "Required Sacrifices", "Gasolina - 100% Reggaeton", Bond "Explosive: The Best of Bond"

  17. The contribution of embarrassment to phobic dental anxiety: a qualitative research study.

    Science.gov (United States)

    Moore, Rod; Brødsgaard, Inger; Rosenberg, Nicole

    2004-04-19

    Embarrassment is emphasized, yet scantily described as a factor in extreme dental anxiety or phobia. Present study aimed to describe details of social aspects of anxiety in dental situations, especially focusing on embarrassment phenomena. Subjects (Ss) were consecutive specialist clinic patients, 16 men, 14 women, 20-65 yr, who avoided treatment mean 12.7 yr due to anxiety. Electronic patient records and transcribed initial assessment and exit interviews were analyzed using QSR"N4" software to aid in exploring contexts related to social aspects of dental anxiety and embarrassment phenomena. Qualitative findings were co-validated with tests of association between embarrassment intensity ratings, years of treatment avoidance, and mouth-hiding behavioral ratings. Embarrassment was a complaint in all but three cases. Chief complaints in the sample: 30% had fear of pain; 47% cited powerlessness in relation to dental social situations, some specific to embarrassment and 23% named co-morbid psychosocial dysfunction due to effects of sexual abuse, general anxiety, gagging, fainting or panic attacks. Intense embarrassment was manifested in both clinical and non-clinical situations due to poor dental status or perceived neglect, often (n = 9) with fear of negative social evaluation as chief complaint. These nine cases were qualitatively different from other cases with chief complaints of social powerlessness associated with conditioned distrust of dentists and their negative behaviors. The majority of embarrassed Ss to some degree inhibited smiling/laughing by hiding with lips, hands or changed head position. Secrecy, taboo-thinking, and mouth-hiding were associated with intense embarrassment. Especially after many years of avoidance, embarrassment phenomena lead to feelings of self-punishment, poor self-image/esteem and in some cases personality changes in a vicious circle of anxiety and avoidance. Embarrassment intensity ratings were positively correlated with years of

  18. Nitrogen fixation in Red Sea seagrass meadows

    KAUST Repository

    Abdallah, Malak

    2017-01-01

    Seagrasses are key coastal ecosystems, providing many ecosystem services. Seagrasses increase biodiversity as they provide habitat for a large set of organisms. In addition, their structure provides hiding places to avoid predation. Seagrasses can

  19. prevalence of malarial parasites in pregnant women attending sir

    African Journals Online (AJOL)

    DR. AMINU

    Keyword: Prevalence, Malarial Parasite, Pregnant Women, Kano. INTRODUCTION ... protective semi-immunity against plasmodium falciparum is acquired during the first 10-. 15 years of life and .... hiding place for the mosquito? It is therefore ...

  20. Game Theory: An Application to Tanners and 'Pomo' Wholesalers in ...

    African Journals Online (AJOL)

    Game Theory: An Application to Tanners and 'Pomo' Wholesalers in Hides Marketing Competition in Nigeria. ... Agricultural economics is an applied social science so game theory was applied practically from a ... AJOL African Journals Online.

  1. EPA-Registered Bed Bug Products

    Science.gov (United States)

    ... rest or hide in hampers, bed frames, even furniture); Failing to treat adjacent areas where bed bugs ... to work (some pesticides, such as desiccators or growth regulators, may be very effective but take some ...

  2. Bedbugs

    Science.gov (United States)

    ... be linked to: Increased international travel Changes in pest control practices Insecticide resistance Where do they hide? ... of uncleanliness? Bedbugs don't care if their environment is clean or dirty. All they need is ...

  3. Reverse engineering the world: a commentary on Hoffman, Singh, and Prakash, "The interface theory of perception".

    Science.gov (United States)

    Fields, Chris

    2015-12-01

    Does perception hide the truth? Information theory, computer science, and quantum theory all suggest that the answer is "yes." They suggest, indeed, that useful perception is only feasible because the truth can be hidden.

  4. Limited distortion in LSB steganography

    Science.gov (United States)

    Kim, Younhee; Duric, Zoran; Richards, Dana

    2006-02-01

    It is well known that all information hiding methods that modify the least significant bits introduce distortions into the cover objects. Those distortions have been utilized by steganalysis algorithms to detect that the objects had been modified. It has been proposed that only coefficients whose modification does not introduce large distortions should be used for embedding. In this paper we propose an effcient algorithm for information hiding in the LSBs of JPEG coefficients. Our algorithm uses parity coding to choose the coefficients whose modifications introduce minimal additional distortion. We derive the expected value of the additional distortion as a function of the message length and the probability distribution of the JPEG quantization errors of cover images. Our experiments show close agreement between the theoretical prediction and the actual additional distortion.

  5. Intelligent techniques in signal processing for multimedia security

    CERN Document Server

    Santhi, V

    2017-01-01

    This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face condi...

  6. Directed Hidden-Code Extractor for Environment-Sensitive Malwares

    Science.gov (United States)

    Jia, Chunfu; Wang, Zhi; Lu, Kai; Liu, Xinhai; Liu, Xin

    Malware writers often use packing technique to hide malicious payload. A number of dynamic unpacking tools are.designed in order to identify and extract the hidden code in the packed malware. However, such unpacking methods.are all based on a highly controlled environment that is vulnerable to various anti-unpacking techniques. If execution.environment is suspicious, malwares may stay inactive for a long time or stop execution immediately to evade.detection. In this paper, we proposed a novel approach that automatically reasons about the environment requirements.imposed by malware, then directs a unpacking tool to change the controlled environment to extract the hide code at.the new environment. The experimental results show that our approach significantly increases the resilience of the.traditional unpacking tools to environment-sensitive malware.

  7. The contribution of embarrassment to phobic dental anxiety: a qualitative research study

    DEFF Research Database (Denmark)

    Moore, R.; Brødsgaard, I.; Rosenberg, N.

    2004-01-01

    . Qualitative findings were co-validated with tests of association between embarrassment intensity ratings, years of treatment avoidance, and mouth-hiding behavioral ratings. Embarrassment was a complaint in all but three cases. Chief complaints in the sample: 30% had fear of pain; 47% cited powerlessness...... status or perceived neglect, often (n = 9) with fear of negative social evaluation as chief complaint. These nine cases were qualitatively different from other cases with chief complaints of social powerlessness associated with conditioned distrust of dentists and their negative behaviors. The majority......-image/esteem and in some cases personality changes in a vicious circle of anxiety and avoidance. Embarrassment intensity ratings were positively correlated with years of avoidance and degree of mouth-hiding behaviors. Embarrassment is a complex dental anxiety manifestation with qualitative differences by complaint...

  8. Protecting whistle-blowers: Anonymity on the internet

    International Nuclear Information System (INIS)

    Guinnessy, P.

    1997-01-01

    Even though strict legislation exists in many countries, it appears that the next few years should be a golden opportunity for groups to successfully monitor and publish the activity of the nuclear states, and human right violations through use of the Internet. The reasons for this are: 1. The Internet is becoming widespread even in repressive regimes; 2. Software is available to either hide messages from others or hide the mailers account; 3. Information from sites in other countries can be easily obtained to be read inside repressive regimes from the Internet. In this regard It is suggested the Pugwash or a similar organization should set up either an anonymous account to receive information or maybe use a more heavily protected cyperpunk remailer. Such an ability would hopefully prompt more people to notify treaty violations

  9. Maremoto nell'universo

    CERN Multimedia

    Valsecchi, Maria-Cristina

    2002-01-01

    It seemed only a different signal. But the anomaly, registered both by the Nuclear Physics Institute in Rome and the CERN in Geneva may hide something else: the first disclosure of gravitational waves (4 pages)

  10. 40 CFR 425.35 - Pretreatment standards for existing sources (PSES).

    Science.gov (United States)

    2010-07-01

    ...) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING POINT SOURCE CATEGORY Hair Save or Pulp... subject to this subpart which processes less than 350 hides/day shall comply with § 425.35(a), except that...

  11. Creative Artist 2

    African Journals Online (AJOL)

    Precious

    Between Aidoo's Feminism and Sofola's De-Womanisation: Issues and Perspectives... Imoh Abang ... for the moral and physical strength which the playwright infuses into her major ... through their partnership in Hide and Skin business. But the.

  12. With its magnet rolled back during a shut-down of the Proton Synchrotron in 1969, the body of the 2 m hydrogen bubble chamber becomes visible

    CERN Multimedia

    CERN PhotoLab

    1969-01-01

    The 2 m hydrogen bubble chamber is undergoing modifications during the annual PS shutdown. For this, the two halves of the magnet, which normally hide the chamber, safety tanks, cooling pipes etc, are rolled back.

  13. Role of human Cytomegalovirus in the etiology of nasopharyngeal carcinoma

    Directory of Open Access Journals (Sweden)

    Hussain Gadelkarim Ahmed

    2018-01-01

    Conclusion: The present study has shown a relatively considerable association between HCMV and NPC. The great majority of samples sheltering HCMV were also found to hide EBV, which proposes the potentiality of EBV over HCMV.

  14. An application of sparse inversion on the calculation of the inverse data space of geophysical data

    KAUST Repository

    Saragiotis, Christos; Doulgeris, Panagiotis C.; Verschuur, Eric

    2011-01-01

    Multiple reflections as observed in seismic reflection measurements often hide arrivals from the deeper target reflectors and need to be removed. The inverse data space provides a natural separation of primaries and surface-related multiples

  15. Information Technologies for the Control of Money Laundering

    National Research Council Canada - National Science Library

    1995-01-01

    .... It is estimated that $300 billion of dirty money may be laundered each year, its origin and ownership obscured as it passes through financial institutions and across national boundaries in an effort to hide and protect...

  16. Tanzania's Revealed Comparative Advantage and Structural ...

    African Journals Online (AJOL)

    example, the contribution from vegetable products fell by 7%, and that from textiles .... 43 -‐ Furskins and artificial fur, manufactures thereof ... example, while Tanzania has comparative advantage in raw hides and skins (see Figure 6), it.

  17. 40 CFR 425.50 - Applicability; description of the no beamhouse subcategory.

    Science.gov (United States)

    2010-07-01

    ... (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING POINT SOURCE CATEGORY No... cattle hides, sheepskins, or splits (hair previously removed and pickled) into finished leather by chrome or non-chrome tanning, and retan-wet finishing. ...

  18. Lighthouse Guild

    Science.gov (United States)

    ... Contact Us About Us Programs & Services Health Plans eLearning Vision + Health Donate Need Help? Show Menu Hide ... Find a health plan Coping with vision loss eLearning Support for parents of children with visual impairments ...

  19. Fortify Your Knowledge about Vitamins

    Medline Plus

    Full Text Available ... alcohol or you have liver problems, high cholesterol levels or don't get enough protein. D (calciferol): ... stones, increased iron absorption. Folic Acid (folate): High levels may, especially in older adults, hide signs of ...

  20. Fortify Your Knowledge about Vitamins

    Medline Plus

    Full Text Available ... high cholesterol levels or don't get enough protein. D (calciferol): Nausea, vomiting, poor appetite, constipation, weakness, ... in older adults, hide signs of B-12 deficiency, a condition that can cause nerve damage Taking ...

  1. Middleware Platform Management based on Portable Interceptors

    NARCIS (Netherlands)

    Kath, O.; van Halteren, Aart; Stoinski, F.; Wegdam, M.; Fisher, M.; Ambler, A.; Calo, S.B.; Kar, G.

    2000-01-01

    Object middleware is an enabling technology for distributed applications that are required to operate in heterogeneous computing and communication environments. Although hiding distribution aspects to application designers proves beneficial, in an operational environment system managers may need

  2. Stigma, treatment beliefs, and substance abuse treatment use in ...

    African Journals Online (AJOL)

    with individuals who need help tending to deny or hide their condition for fear ..... Centers for Disease Control and Prevention, Atlanta, Georgia, U. S. A,. 2004. 19. Strauss ... Community based organizations for substance users in Cape Town,.

  3. Dynamic analyses, FPGA implementation and engineering ...

    Indian Academy of Sciences (India)

    QIANG LAI

    2017-12-14

    Dec 14, 2017 ... the model of the generalised Sprott C system and anal- yses its equilibria. ..... the Matlab simulations. ... RNG design processes are given in Algorithm 1 as the ... RNG applications (simulation, modelling, arts, data hiding ...

  4. When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System

    KAUST Repository

    Liu, Xiao; Liu, An; Zhang, Xiangliang; Li, Zhixu; Liu, Guanfeng; Zhao, Lei; Zhou, Xiaofang

    2017-01-01

    result. However, none is designed for both hiding users’ private data and preventing privacy inference. To achieve this goal, we propose in this paper a hybrid approach for privacy-preserving recommender systems by combining differential privacy (DP

  5. California scrub-jays reduce visual cues available to potential pilferers by matching food colour to caching substrate.

    Science.gov (United States)

    Kelley, Laura A; Clayton, Nicola S

    2017-07-01

    Some animals hide food to consume later; however, these caches are susceptible to theft by conspecifics and heterospecifics. Caching animals can use protective strategies to minimize sensory cues available to potential pilferers, such as caching in shaded areas and in quiet substrate. Background matching (where object patterning matches the visual background) is commonly seen in prey animals to reduce conspicuousness, and caching animals may also use this tactic to hide caches, for example, by hiding coloured food in a similar coloured substrate. We tested whether California scrub-jays ( Aphelocoma californica ) camouflage their food in this way by offering them caching substrates that either matched or did not match the colour of food available for caching. We also determined whether this caching behaviour was sensitive to social context by allowing the birds to cache when a conspecific potential pilferer could be both heard and seen (acoustic and visual cues present), or unseen (acoustic cues only). When caching events could be both heard and seen by a potential pilferer, birds cached randomly in matching and non-matching substrates. However, they preferentially hid food in the substrate that matched the food colour when only acoustic cues were present. This is a novel cache protection strategy that also appears to be sensitive to social context. We conclude that studies of cache protection strategies should consider the perceptual capabilities of the cacher and potential pilferers. © 2017 The Author(s).

  6. Influence of body condition score on live and carcass value of cull beef cows.

    Science.gov (United States)

    Apple, J K

    1999-10-01

    Mature beef cows (n = 88) were slaughtered to determine the influence of body condition score (BCS) on carcass and live animal value. Cows were weighed and assigned a BCS (9-point scale), 24 h before slaughter. Hide and by-products weights were recorded during harvest. After a 48-h chill period, the right side of each carcass was fabricated into boneless subprimal cuts, minor cuts, lean trim, fat, and bone. Weights were recorded at all stages of fabrication. Carcass values (U.S.$/100 kg of hot carcass weight) were calculated for U.S. Utility and U.S. Cutter grades, as well as for the Utility/Cutter mix for each BCS. Gross value included the carcass value and the value of the hide and byproducts, whereas net value was calculated after harvest and fabrication costs and by-product value were considered. Live value (U.S.$/100 kg of live weight) was computed by dividing the net value by the animal's live weight 24 h before harvest. The value of the hide and by-products for BCS-2 cows was greater (Pmix, cows designated with a BCS of 7 and 8 had greater (P.05) to BCS-7 cows. Information from this study can be used by the non-fed beef industry to establish a value-based marketing system. Data from this study would indicate that marketing cull beef cows at a BCS of 6 could optimize economic returns to both cow-calf producers and non-fed beef packers.

  7. Assessment of exposure to chemical agents and ergonomic stressors in tanneries in Kanpur, India.

    Science.gov (United States)

    Ory, F G; Rahman, F U; Katagade, V; Shukla, A; Burdorf, A

    1997-10-01

    In developing countries qualitative assessment of exposure at the workplace may be an essential tool in evaluating hazardous working conditions. This survey reports on qualitative assessment of exposure to chemicals, dust, and ergonomic stressors among 298 workers in 15 tanneries in Kanpur, India. In general, chemical exposure and dermal exposure were highest among beamhouse workers, less for workers involved in dry finishing activities, and lowest for those performing the wet finishing of hides. Dermal exposure was rated as high to very high during beamhouse activities, reflecting direct contact with wet hides and manual handling of hides in soak tanks. Relevant dust exposure was observed only during dry finishing activities. Most workers experienced severe postural load due to working in trunk flexion and rotation for more than 50% of their daily work time. In addition, manual materials handling with loads over 20 kg frequently occurred. The size of the tannery, in general a reflection of state of technology, showed no systematic influence on exposure profiles. The survey suggested that mechanization of material transfer and application of trolleys reduced the work time with trunk flexion and rotation and implied less manual lifting. The presence of local exhaust ventilation in large tanneries seemed to reduce the chemical exposure. This survey has demonstrated the importance of rapid appraisal techniques for evaluating hazardous conditions at the workplace. In developing countries this approach may facilitate occupational hygiene research and practice.

  8. Penyisipan Media Teks dan Citra Menggunakan Teknik Steganografi pada Media Pembawa Citra Digital

    Directory of Open Access Journals (Sweden)

    Alim Muadzani

    2016-08-01

    Full Text Available Information has now become an  important comodity in human life, with the rapid development of communications technology has enable people to communicate and exchange information more easily. Internet is very popular and used by billions users worldwide, the information passing through the internet is very large, and some certain people trying to get this information for profit. The information need to be secured to prevent the others to get the information that send through the internet, steganography can be used to  hide the information before sending it and the receiver can recover the hidden data. Digital steganography using computer can use a variety of digital file, digital image file is one of them. With the infomation being hidden inside the image-carrier, the others will not aware about the hidden information. Application created using C# programming leanguage and the steganoraphy method using Least Significant Bit Insertion (LSBI. Microsoft Visual Studio used as Integrated Development Environtment (IDE to code and design the user interface. Software develpment model using Extreme Programming, and the testing using black box method. Application designed to hide text or image inside an image-carrier and the hidden text or image can be recovered. The result of this research are an application that can hide text or image into  image-carrier, and the hidden text or image can be recovered. Based on the testing application can run as expected and fulfill all the requirements.

  9. Non-goal-directed recall of specific events in apes after long delays.

    Science.gov (United States)

    Lewis, Amy; Call, Josep; Berntsen, Dorthe

    2017-07-12

    We examined if apes spontaneously remember one-time, distinctive events across long delays when probed by discriminant cues. Apes witnessed an experimenter hide a cache of food, which they could then retrieve. They retrieved one of two food types; one more distinctive than the other. Two, 10 or 50 weeks later, the apes returned to the same enclosure and found a piece of the previously hidden food on the ground. An experimenter who had not hidden the food was also present. Apes immediately searched the location where the food was previously hidden (no food was here), showing recall of the event. One week later, apes returned to the same enclosure, with the same food on the ground, but now the experimenter that had hidden the food was present. Again, apes immediately searched the hiding location. Apes that had not witnessed the hiding event did not search. There was no significant effect of food type, and retention declined from exposure to the two-week delay, then levelled, consistent with the forgetting curve in humans (Ebbinghaus, H. 1964 Memory: a contribution to experimental psychology (transl. H.A. Ruger & C.E. Bussenvis). New York, NY: Dover. (Original work published 1885.)). This is the first study to show apes can recall a one-time, non-goal-directed event longer than two weeks ago and that apes' recall declines in accordance with a standard retention function. © 2017 The Author(s).

  10. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  11. Actuators for smart applications

    NARCIS (Netherlands)

    Paternoster, Alexandre; de Boer, Andries; Loendersloot, Richard; Akkerman, Remko; D. Brei,; M. Frecker,

    2010-01-01

    Actuator manufacturers are developing promising technologies which meet high requirements in performance, weight and power consumption. Conventionally, actuators are characterized by their displacement and load performance. This hides the dynamic aspects of those actuation solutions. Work per weight

  12. Are mammal olfactory signals hiding right under our noses?

    Science.gov (United States)

    Apps, Peter James

    2013-06-01

    Chemical communication via olfactory semiochemicals plays a central role in the social behaviour and reproduction of mammals, but even after four decades of research, only a few mammal semiochemicals have been chemically characterized. Expectations that mammal chemical signals are coded by quantitative relationships among multiple components have persisted since the earliest studies of mammal semiochemistry, and continue to direct research strategies. Nonetheless, the chemistry of mammal excretions and secretions and the characteristics of those semiochemicals that have been identified show that mammal semiochemicals are as likely to be single compounds as to be mixtures, and are as likely to be coded by the presence and absence of chemical compounds as by their quantities. There is very scant support for the view that mammal semiochemicals code signals as specific ratios between components, and no evidence that they depend on a Gestalt or a chemical image. Of 31 semiochemicals whose chemical composition is known, 15 have a single component and 16 are coded by presence/absence, one may depend on a ratio between two compounds and none of them are chemical images. The expectation that mammal chemical signals have multiple components underpins the use of multivariate statistical analyses of chromatographic data, but the ways in which multivariate statistics are commonly used to search for active mixtures leads to single messenger compounds and signals that are sent by the presence and absence of compounds being overlooked. Research on mammal semiochemicals needs to accommodate the possibility that simple qualitative differences are no less likely than complex quantitative differences to encode chemical signals.

  13. Nowhere to Hide: The Growing Threat to Air Bases

    Science.gov (United States)

    2013-06-01

    occurred. On 22 July 2011, for example, Anders Breivik , a Norwegian, set off a vehicle bomb near government buildings in Oslo, killing eight, and...usatoday30.usatoday.com/news/washington/2009-04-19-homeland -memo_N.htm. 26. “Anders Breivik Describes Norway Island Massacre,” BBC, 20 April 2012, http

  14. Hiding in plain sight: communication theory in implementation science

    OpenAIRE

    Manojlovich, Milisa; Squires, Janet E; Davies, Barbara; Graham, Ian D

    2015-01-01

    Background Poor communication among healthcare professionals is a pressing problem, contributing to widespread barriers to patient safety. The word ?communication? means to share or make common. In the literature, two communication paradigms dominate: (1) communication as a transactional process responsible for information exchange, and (2) communication as a transformational process responsible for causing change. Implementation science has focused on information exchange attributes while la...

  15. Using DNS amplification DDoS attack for hiding data

    Science.gov (United States)

    Mehić, M.; Voznak, M.; Safarik, J.; Partila, P.; Mikulec, M.

    2014-05-01

    This paper concerns available steganographic techniques that can be used for sending hidden data through public network. Typically, in steganographic communication it is advised to use popular/often used method for sending hidden data and amount of that data need to be high as much as possible. We confirmed this by choosing a Domain Name System (DNS) as a vital protocol of each network and choosing Distributed denial of service (DDoS) attacks that are most popular network attacks currently represented in the world. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols fields and is known for IP, UDP or TCP protocols, but has never been applied to DNS (Domain Name Server) which are the fundamental part of network communications. The second explains the usage of DNS Amplification DDoS Attack to send seamlessly data through public network. The calculation that was performed to estimate the total amount of data that can be covertly transferred by using these technique, regardless of steganalysis, is included in this paper.

  16. Medical apps in endocrine diseases – hide and seek

    Science.gov (United States)

    von Jan, Ute

    2014-01-01

    Objectives: Quantitative review and categorization of available endocrinology related mobile apps for the iOS platform (Apple®) and outline of search strategies to identify appropriate mobile apps for this field. Methods: A total of 80 endocrinology related search terms were collected and grouped into 8 main categories covering different areas of endocrinology. These terms were then used to perform comprehensive searches in three categories of Apple’s app store, namely ‘Medicine’, ‘Health and Fitness’, and ‘Reference’. Results: Altogether, matches were found for only 33 of the 80 collected endocrinology related search terms; the majority of matches were found in the medical category, followed by matches for the health and fitness (27/33), and reference (16/33) categories. Restricting the search to these categories significantly helped in discriminating between health related apps and those having another purpose. The distribution of apps per category roughly matches what one can expect considering available data for incidence and prevalence of corresponding endocrinological conditions. Apps matching terms belonging to the spectrum of glucose homeostasis disorders are the most common. For conditions where patients do not have to constantly monitor their condition, apps tend to have a reference or educational character, while for conditions that require a high level of involvement from patients, there are proportionally more apps for self-management. With a single exception, the identified apps had not undergone regulation, and information about the data sources, professional backgrounds, and reliability of the content and integrated information sources was rare. Conclusions: While applying a good search strategy is important for finding apps for endocrinology related problems, users also need to consider whether the app they have found respects all necessary criteria regarding reliability, privacy and data protection before they place their trust in it. PMID:25152809

  17. Secure Oblivious Hiding, Authentication, Tamper Proofing, and Verification Techniques

    National Research Council Canada - National Science Library

    Fridrich, Jessica

    2002-01-01

    In this report, we describe an algorithm for robust visual hash functions with applications to digital image watermarking for authentication and integrity verification of video data and still images...

  18. Data Security by Preprocessing the Text with Secret Hiding

    OpenAIRE

    Ajit Singh; Upasana Jauhari

    2012-01-01

    With the advent of the Internet, an open forum, the massive increase in the data travel across networkmake an issue for secure transmission. Cryptography is the term that involves many encryption method to make data secure. But the transmission of the secure data is an intricate task. Steganography here comes with effect of transmission without revealing the secure data. The research paper provide the mechanism which enhance the security of data by using a crypto+stegano combination to increa...

  19. PALM and STORM: what hides beyond the Rayleigh limit?

    CSIR Research Space (South Africa)

    Henriques, R

    2009-06-01

    Full Text Available Super-resolution imaging allows the imaging of fluorescently labeled probes at a resolution of just tens of nanometers, surpassing classic light microscopy by at least one order of magnitude. Recent advances such as the development of photo...

  20. Surprising structures hiding in Penrose’s future null infinity

    Science.gov (United States)

    Newman, Ezra T.

    2017-07-01

    Since the late1950s, almost all discussions of asymptotically flat (Einstein-Maxwell) space-times have taken place in the context of Penrose’s null infinity, I+. In addition, almost all calculations have used the Bondi coordinate and tetrad systems. Beginning with a known asymptotically flat solution to the Einstein-Maxwell equations, we show first, that there are other natural coordinate systems, near I+, (analogous to light-cones in flat-space) that are based on (asymptotically) shear-free null geodesic congruences (analogous to the flat-space case). Using these new coordinates and their associated tetrad, we define the complex dipole moment, (the mass dipole plus i times angular momentum), from the l  =  1 harmonic coefficient of a component of the asymptotic Weyl tensor. Second, from this definition, from the Bianchi identities and from the Bondi-Sachs mass and linear momentum, we show that there exists a large number of results—identifications and dynamics—identical to those of classical mechanics and electrodynamics. They include, among many others, {P}=M{v}+..., {L}= {r} × {P} , spin, Newton’s second law with the rocket force term (\\dotM v) and radiation reaction, angular momentum conservation and others. All these relations take place in the rather mysterious H-space rather than in space-time. This leads to the enigma: ‘why do these well known relations of classical mechanics take place in H-space?’ and ‘What is the physical meaning of H-space?’

  1. "Hiding in Plain Sight": An Interview with Cara Hoffman

    Science.gov (United States)

    Hosey, Sara

    2014-01-01

    Cara Hoffman's work enacts George Orwell's imperative to "pay attention to the obvious" (an idea that several sympathetic characters repeat in her 2011 novel "So Much Pretty"), probing aspects of twenty-first century life in the United States that have become so accepted as to be unremarkable, such as epidemic levels of…

  2. Fugitive carbon dioxide: It's not hiding in the ocean

    International Nuclear Information System (INIS)

    Kerr, R.A.

    1992-01-01

    The fugitive carbon is the difference between the 7 billion or so tons that spew as carbon dioxide from smokestacks and burning tropical forests and the 3.4 billion tons known to stay in the atmosphere. Finding the other 3 billion or 4 billion tons has frustrated researchers for the past 15 years. The oceans certainly take up some of it. Any forecast of global warming has to be based on how much of the carbon dioxide released by human activity will remain in the atmosphere, and predictions vary by 30% depending on the mix of oceanic and terrestrial processes assumed to be removing the gas. What's more, those predictions assume that the processes at work today will go on operating. But not knowing where all the carbon is going raises the unnerving possibility that whatever processes are removing it may soon fall down on the job without warning, accelerating any warming. Such concerns add urgency to the question of whether the ocean harbors the missing carbon. But there's no simple way to find out. The obvious strategy might seem to be to measure the carbon content of the ocean repeatedly to see how much it increases year by year. The trouble is that several billion tons of added carbon, though impressive on a human scale, are undetectable against the huge swings in ocean carbon that occur from season to season, year to year, and place to place

  3. Whiteliness and Institutional Racism: Hiding behind (Un)Conscious Bias

    Science.gov (United States)

    Tate, Shirley Anne; Page, Damien

    2018-01-01

    'Unconscious bias happens by our brains making incredibly quick judgements and assessments without us realising. Biases are influenced by background, cultural environment and experiences and we may not be aware of these views and opinions, or of their full impact and implications. This article opposes this point of view by arguing that bias is not…

  4. Quantum red-green-blue image steganography

    Science.gov (United States)

    Heidari, Shahrokh; Pourarian, Mohammad Rasoul; Gheibi, Reza; Naseri, Mosayeb; Houshmand, Monireh

    One of the most considering matters in the field of quantum information processing is quantum data hiding including quantum steganography and quantum watermarking. This field is an efficient tool for protecting any kind of digital data. In this paper, three quantum color images steganography algorithms are investigated based on Least Significant Bit (LSB). The first algorithm employs only one of the image’s channels to cover secret data. The second procedure is based on LSB XORing technique, and the last algorithm utilizes two channels to cover the color image for hiding secret quantum data. The performances of the proposed schemes are analyzed by using software simulations in MATLAB environment. The analysis of PSNR, BER and Histogram graphs indicate that the presented schemes exhibit acceptable performances and also theoretical analysis demonstrates that the networks complexity of the approaches scales squarely.

  5. Cognitive development in kittens (Felis catus): an observational study of object permanence and sensorimotor intelligence.

    Science.gov (United States)

    Dumas, C; Doré, F Y

    1991-12-01

    Spontaneous behavior of kittens (Felis catus) was filmed from birth until the end of Month 5 and coded according to Piagetian criteria of sensorimotor intelligence (SI) and object permanence (OP). Data revealed that Stages 2, 3, and 4 of SI were reached at Days 10, 26, and 45, respectively, whereas Stages 2, 3, and 4 of OP were reached at Days 31, 37, and 41, respectively. Spontaneous search behavior was exhibited both in searching for an object that disappeared and in hiding while moving toward a target object. From Day 45 on, search behavior was integrated into a playful social interaction in the form of hide-and-seek. Hence, kittens' spontaneous activity provided them with contexts in which OP was necessary for activity. Lastly, it is proposed that the mobility of both social and physical objects triggered circular activity in this species.

  6. Decorin Content and Near Infrared Spectroscopy Analysis of Dried Collagenous Biomaterial Samples

    Directory of Open Access Journals (Sweden)

    Suzanne Schreyer

    2012-12-01

    Full Text Available The efficient removal of proteoglycans, such as decorin, from the hide when processing it to leather by traditional means is generally acceptable and beneficial for leather quality, especially for softness and flexibility. A patented waterless or acetone dehydration method that can generate a product similar to leather called Dried Collagenous Biomaterial (known as BCD was developed but has no effect on decorin removal efficiency. The Alcian Blue colorimetric technique was used to assay the sulfated glycosaminoglycan (sGAG portion of decorin. The corresponding residual decorin content was correlated to the mechanical properties of the BCD samples and was comparable to the control leather made traditionally. The waterless dehydration and instantaneous chrome tanning process is a good eco-friendly alternative to transforming hides to leather because no additional effects were observed after examination using NIR spectroscopy and additional chemometric analysis.

  7. Decorin content and near infrared spectroscopy analysis of dried collagenous biomaterial samples.

    Science.gov (United States)

    Aldema-Ramos, Mila L; Castell, Joan Carles; Muir, Zerlina E; Adzet, Jose Maria; Sabe, Rosa; Schreyer, Suzanne

    2012-12-14

    The efficient removal of proteoglycans, such as decorin, from the hide when processing it to leather by traditional means is generally acceptable and beneficial for leather quality, especially for softness and flexibility. A patented waterless or acetone dehydration method that can generate a product similar to leather called Dried Collagenous Biomaterial (known as BCD) was developed but has no effect on decorin removal efficiency. The Alcian Blue colorimetric technique was used to assay the sulfated glycosaminoglycan (sGAG) portion of decorin. The corresponding residual decorin content was correlated to the mechanical properties of the BCD samples and was comparable to the control leather made traditionally. The waterless dehydration and instantaneous chrome tanning process is a good eco-friendly alternative to transforming hides to leather because no additional effects were observed after examination using NIR spectroscopy and additional chemometric analysis.

  8. A review of scalp camouflaging agents and prostheses for individuals with hair loss.

    Science.gov (United States)

    Donovan, Jeff C H; Shapiro, Ron L; Shapiro, Paul; Zupan, Matt; Pierre-Louis, Margareth; Hordinsky, Maria K

    2012-08-15

    Hair loss is a common problem for both men and women and may impact negatively on self-esteem. A variety of medical and surgical treatment options are available depending on the type of alopecia. Many patients also seek the advice of their physicians about options to hide or reduce the appearance of hair loss with hair prostheses (wigs, hairpieces, and extensions) or hair camouflaging agents (hair fibers, powder cakes, lotions, sprays, hair crayons, and scalp tattooing). Herein, we review current methods to hide or reduce the appearance of hair loss and discuss their associated costs, advantages, and disadvantages. Knowledge of products available to cover scalp, eyebrow, and eyelash hair loss may not only better equip clinicians to respond to questions from concerned patients, but may provide additional options to help these patients best cope with their hair loss.

  9. "I listened with my eyes": writing speech and reading deafness in the fiction of Charles Dickens and Wilkie Collins.

    Science.gov (United States)

    Esmail, Jennifer

    2011-01-01

    While characters with disabilities appear frequently in Victorian fiction, deaf characters, specifically, are almost entirely absent. In fact, the only deaf characters who use sign language in Victorian fiction are Madonna Blyth in Wilkie Collins’s Hide and Seek and Sophy Marigold in Charles Dickens’s “Doctor Marigold.” Grounding its analysis in these two texts, this article contends that it is, in particular, a deaf character’s relationship to language that disqualifies him or her from conventional representation in Victorian fiction. Through reading Hide and Seek and “Doctor Marigold” in the context of Victorian deaf history, Collins and Dickens’s realist aims, and Victorian generic conventions rooted in transcribing orality, this essay argues that the absence of deaf characters reveals the investment of mid-Victorian fiction in a particular and normativized relationship between bodies, spoken language, and textuality.

  10. Decorin Content and Near Infrared Spectroscopy Analysis of Dried Collagenous Biomaterial Samples

    Science.gov (United States)

    Aldema-Ramos, Mila L.; Castell, Joan Carles; Muir, Zerlina E.; Adzet, Jose Maria; Sabe, Rosa; Schreyer, Suzanne

    2012-01-01

    The efficient removal of proteoglycans, such as decorin, from the hide when processing it to leather by traditional means is generally acceptable and beneficial for leather quality, especially for softness and flexibility. A patented waterless or acetone dehydration method that can generate a product similar to leather called Dried Collagenous Biomaterial (known as BCD) was developed but has no effect on decorin removal efficiency. The Alcian Blue colorimetric technique was used to assay the sulfated glycosaminoglycan (sGAG) portion of decorin. The corresponding residual decorin content was correlated to the mechanical properties of the BCD samples and was comparable to the control leather made traditionally. The waterless dehydration and instantaneous chrome tanning process is a good eco-friendly alternative to transforming hides to leather because no additional effects were observed after examination using NIR spectroscopy and additional chemometric analysis. PMID:24970152

  11. A high capacity text steganography scheme based on LZW compression and color coding

    Directory of Open Access Journals (Sweden)

    Aruna Malik

    2017-02-01

    Full Text Available In this paper, capacity and security issues of text steganography have been considered by employing LZW compression technique and color coding based approach. The proposed technique uses the forward mail platform to hide the secret data. This algorithm first compresses secret data and then hides the compressed secret data into the email addresses and also in the cover message of the email. The secret data bits are embedded in the message (or cover text by making it colored using a color coding table. Experimental results show that the proposed method not only produces a high embedding capacity but also reduces computational complexity. Moreover, the security of the proposed method is significantly improved by employing stego keys. The superiority of the proposed method has been experimentally verified by comparing with recently developed existing techniques.

  12. Urine drainage bags

    Science.gov (United States)

    Leg bag ... the catheter from your bladder into the leg bag. Your leg bag will be attached to you all day. You ... freely with it. You can hide your leg bag under skirts, dresses, or pants. They come in ...

  13. Investigating multi-thread utilization as a software defence mechanism against side channel attacks

    CSIR Research Space (South Africa)

    Frieslaar, Ibraheem

    2016-11-01

    Full Text Available out information at critical points in the cryptographic algorithm and confuse the attacker. This research demonstrates it is capable of outperforming the known countermeasure of hiding and shuffling in terms of preventing the secret information from...

  14. Multithreaded Asynchronous Graph Traversal for In-Memory and Semi-External Memory

    KAUST Repository

    Pearce, Roger; Gokhale, Maya; Amato, Nancy M.

    2010-01-01

    . Our highly parallel asynchronous approach hides data latency due to both poor locality and delays in the underlying graph data storage. We present an experimental study applying our technique to both In-Memory and Semi-External Memory graphs utilizing

  15. Facts about Type 2

    Medline Plus

    Full Text Available ... Diabetes Research & Practice Home We Are Research Leaders World's Largest Diabetes Meeting Recent Advances Type 1 Research ... survey-loading').remove(); $('#emailsurvey').hide(); $('#emailsurveythanks').show(); } } }; /* bind any forms with the "luminateApi" class */ luminateExtend.api.bind(); }); })( ...

  16. Create Your Plate

    Medline Plus

    Full Text Available ... Diabetes Research & Practice Home We Are Research Leaders World's Largest Diabetes Meeting Recent Advances Type 1 Research ... survey-loading').remove(); $('#emailsurvey').hide(); $('#emailsurveythanks').show(); } } }; /* bind any forms with the "luminateApi" class */ luminateExtend.api.bind(); }); })( ...

  17. Fortify Your Knowledge about Vitamins

    Medline Plus

    Full Text Available ... from a varied diet. If you are an older adult, have dark skin, or are exposed to insufficient ... Folic Acid (folate): High levels may, especially in older adults, hide signs of B-12 deficiency, a condition ...

  18. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  19. Development and deployment of a novel vaccine against babesiosis ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2018-03-13

    Mar 13, 2018 ... This parasite hides in red blood cells and causes them to stick to blood ... the parasite to avoid host immunity and causing acute infection and death. ... food insecurity in a recent paper published by the International Centre fo.

  20. Ruler : High-speed packet matching and rewriting on NPUs

    NARCIS (Netherlands)

    Hruby, Tomas; Van Reeuwijk, Kees; Bos, Herbert

    2007-01-01

    Programming specialized network processors (NPU) is inherently difficult. Unlike mainstream processors where architectural features such as out-of-order execution and caches hide most of the complexities of efficient program execution, programmers of NPUs face a 'bare-metal' view of the

  1. 40 CFR 425.60 - Applicability; description of the through-the-blue subcategory.

    Science.gov (United States)

    2010-07-01

    ... AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND FINISHING POINT SOURCE CATEGORY... processes raw or cured cattle or cattle-like hides through the blue tanned state by hair pulp unhairing and chrome tanning; no retan-wet finishing is performed. ...

  2. Ethnography and organizational processes

    NARCIS (Netherlands)

    van Hulst, M..; Ybema, S.B.; Yanow, D.; Tsoukas, H.; Langley, A.

    2017-01-01

    In recent decades, organizational scholars have set out to explore the processual character of organizations. They have investigated both the overtly ephemeral and sometimes dramatically unstable aspects of contemporary organizing and the social flux and flow of everyday organizing hiding beneath

  3. Encopresis

    Science.gov (United States)

    ... Starting toilet training when the child was too young Emotional problems, such as oppositional defiant disorder or conduct disorder Whatever the cause, the child may feel shame, guilt, or low self-esteem, and may hide signs of encopresis. Factors that ...

  4. Original Research Original Research

    African Journals Online (AJOL)

    RAGHAVENDRA

    camel market and used in a 120 days fattening study. Th where the camels were ... libitum and a supplement of concentrate mix of ... l of camel hides as a product. Ethiopia .... the Ethiopian Leather and Leather Products Technology. Institute ...

  5. Unifying refinement and hoare-style reasoning in a logic for higher-order concurrency

    DEFF Research Database (Denmark)

    Turon, Aaron; Dreyer, Derek; Birkedal, Lars

    2013-01-01

    Modular programming and modular verification go hand in hand, but most existing logics for concurrency ignore two crucial forms of modularity: *higher-order functions*, which are essential for building reusable components, and *granularity abstraction*, a key technique for hiding the intricacies ...

  6. Ação de diferentes agentes curtentes utilizados no curtimento de peles de coelhos: testes físico-mecânicos dos couros - DOI: 10.4025/actascianimsci.v31i4.5592 Action of different tanning agents used on rabbit hide tanning: physical-mechanic tests - DOI: 10.4025/actascianimsci.v31i4.5592

    Directory of Open Access Journals (Sweden)

    Nilson do Prado Franco

    2009-10-01

    Full Text Available O objetivo do experimento foi avaliar a ação de diferentes agentes curtentes no processamento das peles de coelhos, sobre a resistência do couro. Cinquenta peles de coelhos foram submetidas a diferentes agentes curtentes na etapa de curtimento (T1 = 6% sais de cromo Chromossal B®, T2 = 22% tanino vegetal Clarotan-x8®; T3 = 22% tanino sintético Syntac CW®; T4 = 12% tanino vegetal Weibull® + 10% tanino sintético Syntac F®; T5 = 22% tanino vegetal Weibull®. Foram retirados os corpos de prova do couro, na região dorsal, no sentido longitudinal e transversal em relação ao eixo céfalo-caudal. Os agentes curtentes e retirada dos corpos de prova não influenciaram no teste de tração (9,28 a 11,63 N mm-2 e força aplicada (17,91 N a 24,85 N nos testes. Os curtimentos com sais de cromo (62,85% e Clarotan–x8® (70,28% proporcionaram maiores valores de alongamento em relação aos demais agentes curtentes utilizados. Os corpos de prova do couro no sentido transversal (59,12% apresentaram maior alongamento comparado ao longitudinal (49,72%. Os curtimentos com sais de cromo (22,70 N mm-1, Clarotan–x8® (25,94 N mm-1 e Weibull® (21,58 N mm-1 proporcionaram couros com maior resistência ao rasgamento. O sentido de retirada dos corpos de prova no couro não influenciou no rasgamento progressivo. As técnicas de curtimento com sais de cromo e Clarotan-x8® proporcionaram couros com melhores valores de resistência ao alongamento e rasgamento progressivo.The objective of the experiment was to evaluate the action of different tanning agents in the processing of rabbit hides over skin resistance. Fifty skins of rabbit hides were submitted to different tanning agents in the tanning stage (T1 = 6% Chromossal B® chrome salts; T2 = 22% Clarotan–x8® vegetable tannin; T3 = 22% Syntac CW® synthetic tannin; T4 = 12% Weibull® vegetable tannin + 10% Syntac F® synthetic tannin; T5 = 22% Weibull® vegetable tannin. The specimens were removed from

  7. The contribution of embarrassment to phobic dental anxiety: a qualitative research study

    Directory of Open Access Journals (Sweden)

    Rosenberg Nicole

    2004-04-01

    Full Text Available Abstract Background Embarrassment is emphasized, yet scantily described as a factor in extreme dental anxiety or phobia. Present study aimed to describe details of social aspects of anxiety in dental situations, especially focusing on embarrassment phenomena. Methods Subjects (Ss were consecutive specialist clinic patients, 16 men, 14 women, 20–65 yr, who avoided treatment mean 12.7 yr due to anxiety. Electronic patient records and transcribed initial assessment and exit interviews were analyzed using QSR"N4" software to aid in exploring contexts related to social aspects of dental anxiety and embarrassment phenomena. Qualitative findings were co-validated with tests of association between embarrassment intensity ratings, years of treatment avoidance, and mouth-hiding behavioral ratings. Results Embarrassment was a complaint in all but three cases. Chief complaints in the sample: 30% had fear of pain; 47% cited powerlessness in relation to dental social situations, some specific to embarrassment and 23% named co-morbid psychosocial dysfunction due to effects of sexual abuse, general anxiety, gagging, fainting or panic attacks. Intense embarrassment was manifested in both clinical and non-clinical situations due to poor dental status or perceived neglect, often (n = 9 with fear of negative social evaluation as chief complaint. These nine cases were qualitatively different from other cases with chief complaints of social powerlessness associated with conditioned distrust of dentists and their negative behaviors. The majority of embarrassed Ss to some degree inhibited smiling/laughing by hiding with lips, hands or changed head position. Secrecy, taboo-thinking, and mouth-hiding were associated with intense embarrassment. Especially after many years of avoidance, embarrassment phenomena lead to feelings of self-punishment, poor self-image/esteem and in some cases personality changes in a vicious circle of anxiety and avoidance. Embarrassment

  8. 43 CFR 7.3 - Definitions.

    Science.gov (United States)

    2010-10-01

    ..., reservoirs, horticultural/agricultural gardens or fields, bedrock mortars or grinding surfaces, rock..., bottles and other glassware, bone, ivory, shell, metal, wood, hide, feathers, pigments, and flaked, ground, or pecked stone); (iv) By-products, waste products, or debris resulting from manufacture or use of...

  9. Digital questionnaire platform in the Danish Blood Donor Study

    DEFF Research Database (Denmark)

    Burgdorf, K S; Felsted, N; Mikkelsen, S

    2016-01-01

    with the questionnaire data in the DBDS database. RESULTS: The digital platform enables personalized questionnaires, presenting only questions relevant to the specific donor by hiding unneeded follow-up questions on screening question results. New versions of questionnaires are immediately available at all blood...

  10. Experience of stigma and discrimination and the implications for ...

    African Journals Online (AJOL)

    Background: Stigma and discrimination can limit access to care and treatment services. Stigma hides HIV from the public, resulting in reduced pressure for behavioral change. For effective behavior change, empirically grounded and theory-based behavioral change approaches are fundamental as a prevention ...

  11. Binging & Purging: Youth Who Suffer Bulimia.

    Science.gov (United States)

    Strodel, Donna

    1990-01-01

    Describes bulimia, its symptoms, characteristics and bulimic's family profile. Disorder may be more difficult to hide at camp. Camp staff could be first to recognize symptoms. Describes behavior indicators of bulimics. Suggests appropriate responses and counseling techniques for helping bulimic campers. (TES)

  12. "Mir stal grubeje, zhesttshe, tsinitshneje" / Jevgeni Levik

    Index Scriptorium Estoniae

    Levik, Jevgeni

    2005-01-01

    Mängufilmid "Rünnak 13. jaoskonnale" ("Assault on Precinct 13"), režissöör Jean-Francois Richet, Ameerika Ühendriigid-Prantsusmaa 2005 ja "Peitusemäng" ("Hide and Seek"), režissöör John Polson, Ameerika Ühendriigid 2005

  13. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  14. Secure Communication using Identity Based Encryption

    NARCIS (Netherlands)

    Roschke, Sebastian; Ibraimi, L.; Cheng, Feng; Meinel, Christoph

    2010-01-01

    Secured communication has been widely deployed to guarantee confidentiality and integrity of connections over untrusted networks, e.g., the Internet. Although secure connections are designed to prevent attacks on the connection, they hide attacks inside the channel from being analyzed by Intrusion

  15. Optimizing the Performance of Data Analytics Frameworks

    NARCIS (Netherlands)

    Ghit, B.I.

    2017-01-01

    Data analytics frameworks enable users to process large datasets while hiding the complexity of scaling out their computations on large clusters of thousands of machines. Such frameworks parallelize the computations, distribute the data, and tolerate server failures by deploying their own runtime

  16. Are spiral galaxies heavy smokers?

    International Nuclear Information System (INIS)

    Davies, J.; Disney, M.; Phillipps, S

    1990-01-01

    The dustiness of spiral galaxies is discussed. Starburst galaxies and the shortage of truly bright spiral galaxies is cited as evidence that spiral galaxies are far dustier than has been thought. The possibility is considered that the dust may be hiding missing mass

  17. The Pampas are vanishing under water | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    "But, based on the current situation, trees would have to be planted on more than ... hiding the fields behind the trees if we don't change our agricultural model, ... the CONICET and INTA teams also advocate a return to extensive cattle grazing.

  18. Protecting Yourself from Bed Bugs in Public Places

    Science.gov (United States)

    ... office. By reducing clutter in your workplace or school, you provide fewer places for the bed bugs to hide and fewer opportunities for them to hitchhike to your home. Keep your ... office or school, consider storing your belongings in a plastic bin. ...

  19. Steganalysis of recorded speech

    Science.gov (United States)

    Johnson, Micah K.; Lyu, Siwei; Farid, Hany

    2005-03-01

    Digital audio provides a suitable cover for high-throughput steganography. At 16 bits per sample and sampled at a rate of 44,100 Hz, digital audio has the bit-rate to support large messages. In addition, audio is often transient and unpredictable, facilitating the hiding of messages. Using an approach similar to our universal image steganalysis, we show that hidden messages alter the underlying statistics of audio signals. Our statistical model begins by building a linear basis that captures certain statistical properties of audio signals. A low-dimensional statistical feature vector is extracted from this basis representation and used by a non-linear support vector machine for classification. We show the efficacy of this approach on LSB embedding and Hide4PGP. While no explicit assumptions about the content of the audio are made, our technique has been developed and tested on high-quality recorded speech.

  20. Spread spectrum image steganography.

    Science.gov (United States)

    Marvel, L M; Boncelet, C R; Retter, C T

    1999-01-01

    In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means "covered writing" in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking.

  1. Using blocking approach to preserve privacy in classification rules by inserting dummy Transaction

    Directory of Open Access Journals (Sweden)

    Doryaneh Hossien Afshari

    2017-03-01

    Full Text Available The increasing rate of data sharing among organizations could maximize the risk of leaking sensitive knowledge. Trying to solve this problem leads to increase the importance of privacy preserving within the process of data sharing. In this study is focused on privacy preserving in classification rules mining as a technique of data mining. We propose a blocking algorithm to hiding sensitive classification rules. In the solution, rules' hiding occurs as a result of editing a set of transactions which satisfy sensitive classification rules. The proposed approach tries to deceive and block adversaries by inserting some dummy transactions. Finally, the solution has been evaluated and compared with other available solutions. Results show that limiting the number of attributes existing in each sensitive rule will lead to a decrease in both the number of lost rules and the production rate of ghost rules.

  2. Tannins quantification in barks of Mimosa tenuiflora and Acacia mearnsii

    Directory of Open Access Journals (Sweden)

    Leandro Calegari

    2016-03-01

    Full Text Available Due to its chemical complexity, there are several methodologies for vegetable tannins quantification. Thus, this work aims at quantifying both tannin and non-tannin substances present in the barks of Mimosa tenuiflora and Acacia mearnsii by two different methods. From bark particles of both species, analytical solutions were produced by using a steam-jacketed extractor. The solution was analyzed by Stiasny and hide-powder (no chromed methods. For both species, tannin levels were superior when analyzed by hide-powder method, reaching 47.8% and 24.1% for A. mearnsii and M. tenuiflora, respectively. By Stiasny method, the tannins levels considered were 39.0% for A. mearnsii, and 15.5% for M. tenuiflora. Despite the best results presented by A. mearnsii, the bark of M. tenuiflora also showed great potential due to its considerable amount of tannin and the availability of the species at Caatinga biome.

  3. Fourier analysis: from cloaking to imaging

    Science.gov (United States)

    Wu, Kedi; Cheng, Qiluan; Wang, Guo Ping

    2016-04-01

    Regarding invisibility cloaks as an optical imaging system, we present a Fourier approach to analytically unify both Pendry cloaks and complementary media-based invisibility cloaks into one kind of cloak. By synthesizing different transfer functions, we can construct different devices to realize a series of interesting functions such as hiding objects (events), creating illusions, and performing perfect imaging. In this article, we give a brief review on recent works of applying Fourier approach to analysis invisibility cloaks and optical imaging through scattering layers. We show that, to construct devices to conceal an object, no constructive materials with extreme properties are required, making most, if not all, of the above functions realizable by using naturally occurring materials. As instances, we experimentally verify a method of directionally hiding distant objects and create illusions by using all-dielectric materials, and further demonstrate a non-invasive method of imaging objects completely hidden by scattering layers.

  4. Pembuatan kulit tahan air untuk bagian atas sepatu

    Directory of Open Access Journals (Sweden)

    Suliestiyah Wiryodiningrat

    2008-12-01

    Full Text Available The aim of research non manufacturing of waterproof leather for shoe upper is to find the best formula in producing waterproof cow hide leather for shoe uppers. Today, the tanners trying their best effort to fulfill the shoes. The research used salted raw cow hide 18 sides were utilized. Leather treatment process begining with soaking stage up to tanning stage and using the same formula in each treatment. In the fatliquoring stage, the treatment varied in the number of fatliquoring chemical material were 8,10, and 12 % respectively. Whereas, the amount of was silicon added in the dyeing process were 5,7.5, and 10 % respectively. The quality of the leather was physically examined accordance with testing method of ISO. 8782- 1998 € and DIN standard. The results performed that the best formula was sample with addition of fatliquoring 12 % and silicon5%.

  5. Synergism of clinical evaluation and penile sonographic imaging in diagnosis of penile fracture: a case report

    Directory of Open Access Journals (Sweden)

    Bello Jibril

    2012-09-01

    Full Text Available Abstract Introduction Penile fracture is an uncommon urologic emergency, and is the traumatic rupture of the tunica albuginea covering the corpus cavernosa. This usually occurs following blunt trauma sustained during coitus, masturbation or self-manipulations to hide or suppress an erection. Clinical diagnosis can often be easily made with typical history and examination findings. However, the patient may present atypically and/or with a suspicion of associated urethral injury. The roles of various diagnostic investigations are being evaluated in these situations. Case presentation We report the case of a 31-year-old African man with penile fracture and suspected associated urethral injury that occurred after self-manipulations to hide an erection. Conclusions Penile ultrasound and sonourethrography provide useful additional diagnostic information to supplement clinical history and physical examination findings and can be performed easily, at low cost and with no delays to surgery.

  6. A Joint Watermarking and ROI Coding Scheme for Annotating Traffic Surveillance Videos

    Directory of Open Access Journals (Sweden)

    Su Po-Chyi

    2010-01-01

    Full Text Available We propose a new application of information hiding by employing the digital watermarking techniques to facilitate the data annotation in traffic surveillance videos. There are two parts in the proposed scheme. The first part is the object-based watermarking, in which the information of each vehicle collected by the intelligent transportation system will be conveyed/stored along with the visual data via information hiding. The scheme is integrated with H.264/AVC, which is assumed to be adopted by the surveillance system, to achieve an efficient implementation. The second part is a Region of Interest (ROI rate control mechanism for encoding traffic surveillance videos, which helps to improve the overall performance. The quality of vehicles in the video will be better preserved and a good rate-distortion performance can be attained. Experimental results show that this potential scheme works well in traffic surveillance videos.

  7. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  8. On self-exciting coupled Faraday disk homopolar dynamos driving series motors

    Science.gov (United States)

    Moroz, Irene M.; Hide, Raymond; Soward, Andrew M.

    1998-06-01

    We present the results of a preliminary analytical and numerical study of one of the simpler members of a hierarchy of N (where N ≥ 1) coupled self-exciting Faraday disk homopolar dynamos, incorporating motors as additional electrical elements driven by the dynamo-generated current, as proposed by Hide (1997). The hierarchy is a generalisation of a single disk dynamo ( N = 1) with just one electric motor in the system, and crucially, incorporating effects due to mechanical friction in both the disk and the motor, as investigated by Hide et al. (1996). This is describable by a set of three coupled autonomous nonlinear ordinary differential equations, which, due to the presence of the motor, has solutions corresponding to co-existing periodic states of increasing complexity, as well as to chaotic dynamics. We consider the case of two such homopolar dynamos ( N = 2) with generally dissimilar characteristics but coupled together magnetically, with the aim of determining the extent to which this coupled system differs in its behaviour from the single disk dynamo with a series motor (Hide et al. 1996). In the case when the units are identical, the behaviour of the double dynamo system (after initial transients have decayed away) is identical to that of the single dynamo system, with solutions (including “synchronised chaos”) locked in both amplitude and phase. When there is no motor in the system and the coefficient of mechanical friction in the disks is small, these transients resemble the well-known ‘non-synchronous’, but structurally unstable Rikitake solution.

  9. Enhancing the (MSLDIP) image steganographic method (ESLDIP method)

    Science.gov (United States)

    Seddik Saad, Al-hussien

    2011-10-01

    Message transmissions over the Internet still have data security problem. Therefore, secure and secret communication methods are needed for transmitting messages over the Internet. Cryptography scrambles the message so that it cannot be understood. However, it makes the message suspicious enough to attract eavesdropper's attention. Steganography hides the secret message within other innocuous-looking cover files (i.e. images, music and video files) so that it cannot be observed [1].The term steganography originates from the Greek root words "steganos'' and "graphein'' which literally mean "covered writing''. It is defined as the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio text and video files [3].Steganographic techniques allow one party to communicate information to another without a third party even knowing that the communication is occurring. The ways to deliver these "secret messages" vary greatly [3].Our proposed method called Enhanced SLDIP (ESLDIP). In which the maximmum hiding capacity (MHC) of proposed ESLDIP method is higher than the previously proposed MSLDIP methods and the PSNR of the ESLDIP method is higher than the MSLDIP PSNR values', which means that the image quality of the ESLDIP method will be better than MSLDIP method and the maximmum hiding capacity (MHC) also improved. The rest of this paper is organized as follows. In section 2, steganography has been discussed; lingo, carriers and types. In section 3, related works are introduced. In section 4, the proposed method will be discussed in details. In section 5, the simulation results are given and Section 6 concludes the paper.

  10. An integrated framework for high level design of high performance signal processing circuits on FPGAs

    Science.gov (United States)

    Benkrid, K.; Belkacemi, S.; Sukhsawas, S.

    2005-06-01

    This paper proposes an integrated framework for the high level design of high performance signal processing algorithms' implementations on FPGAs. The framework emerged from a constant need to rapidly implement increasingly complicated algorithms on FPGAs while maintaining the high performance needed in many real time digital signal processing applications. This is particularly important for application developers who often rely on iterative and interactive development methodologies. The central idea behind the proposed framework is to dynamically integrate high performance structural hardware description languages with higher level hardware languages in other to help satisfy the dual requirement of high level design and high performance implementation. The paper illustrates this by integrating two environments: Celoxica's Handel-C language, and HIDE, a structural hardware environment developed at the Queen's University of Belfast. On the one hand, Handel-C has been proven to be very useful in the rapid design and prototyping of FPGA circuits, especially control intensive ones. On the other hand, HIDE, has been used extensively, and successfully, in the generation of highly optimised parameterisable FPGA cores. In this paper, this is illustrated in the construction of a scalable and fully parameterisable core for image algebra's five core neighbourhood operations, where fully floorplanned efficient FPGA configurations, in the form of EDIF netlists, are generated automatically for instances of the core. In the proposed combined framework, highly optimised data paths are invoked dynamically from within Handel-C, and are synthesized using HIDE. Although the idea might seem simple prima facie, it could have serious implications on the design of future generations of hardware description languages.

  11. Differential resilience of Amazonian otters along the Rio Negro in the aftermath of the 20th century international fur trade.

    Science.gov (United States)

    Pimenta, Natalia C; Antunes, André P; Barnett, Adrian A; Macedo, Valêncio W; Shepard, Glenn H

    2018-01-01

    Commercial hunting for the international trade in animal hides in the 20th century decimated many populations of aquatic wildlife in Amazonia. However, impacts varied significantly between different species and regions, depending upon hunting intensity, accessibility of habitat, and the inherent resilience of various species and their habitats. We investigated the differential responses of two Amazonian Mustelid species, the neotropical otter and giant otter, to commercial hunting pressure along the upper Rio Negro in Brazil, and examined historical factors that influenced spatial and temporal variation in commercial exploitation. We analyzed previously unanalyzed data from historical records of hide shipments to track changes in hide sales and prices for the two species in the late 20th century. We also gathered oral histories from older Baniwa people who had witnessed or participated in commercial otter hunting. These complimentary data sources reveal how intrinsic biological and social characteristics of the two otter species interacted with market forces and regional history. Whereas giant otter populations were driven to local or regional extinction during the late 20th century by commercial hunting, neotropical otters persisted. In recent decades, giant otter populations have returned to some parts of the upper Rio Negro, a development which local people welcome as part of a generalized recovery of the ecosystems in their territory as a result of the banning of animal pelt exports and indigenous land demarcation. This paper expands the scope of the field historical ecology and reflects on the role of local knowledge in biodiversity conservation.

  12. Leonardo da Vinci's "A Skull Sectioned" : Skull and dental formula revisited

    NARCIS (Netherlands)

    Gerrits, Peter O.; Veening, Jan G.

    What can be learned from historical anatomical drawings and how to incorporate these drawings into anatomical teaching? The drawing A skull sectioned (RL 19058v) by Leonardo da Vinci (14521519), hides more detailed information than reported earlier. A well-chosen section cut explores sectioned

  13. Merelt võetud terminal / Kadri Paas

    Index Scriptorium Estoniae

    Paas, Kadri, 1982-

    2008-01-01

    Ilmunud ka: Delovõje Vedomosti 18. juuni lk. 16. Perekond Vähi plaanib merelt võetud maale ehitada terminali, mis võimaldaks käsitleda 800 000 konteinerit aastas. Vt. samas: Vähide pereäri. Küsimusele vastavad Juhan Kolk ja majandusminister Juhan Parts

  14. Algorithms for boundary detection in radiographic images

    International Nuclear Information System (INIS)

    Gonzaga, Adilson; Franca, Celso Aparecido de

    1996-01-01

    Edge detecting techniques applied to radiographic digital images are discussed. Some algorithms have been implemented and the results are displayed to enhance boundary or hide details. An algorithm applied in a pre processed image with contrast enhanced is proposed and the results are discussed

  15. 75 FR 10186 - Beauveria bassiana HF23; Amendment of Exemption from the Requirement of a Tolerance

    Science.gov (United States)

    2010-03-05

    ... and hides from livestock during dressing operations and meat and poultry preparation. These measures..., poultry, eggs, or other products derived from chickens or livestock present in such facilities. In... meat, milk, poultry, eggs, or other products derived from chickens or livestock, the Agency has...

  16. Recognition of In-Vehicle Group Activities (iVGA): Phase-I, Feasibility Study

    Science.gov (United States)

    2014-08-27

    the driver is either adjusting his/her eyeglasses , adjusting his/her makeup, or possibly attempt to hiding his/her face from getting recognized. In... bearing of the biological states. Arms in extended configuration typically require more energy for their control and hence a tiring kinematic

  17. Rhetorical Effects of Grammar

    NARCIS (Netherlands)

    Leeuwen, van M.

    2012-01-01

    In the analysis of political discourse, relatively sparse attention is paid to grammatical phenomena. As far as grammatical phenomena are analyzed, the focus is generally on linguistic means that can be used to hide agency, like nominalization and passivization, or on transitivity analysis. In this

  18. Exposing Position Uncertainty in Middleware

    DEFF Research Database (Denmark)

    Langdal, Jakob; Kjærgaard, Mikkel Baun; Toftkjær, Thomas

    2010-01-01

    Traditionally, the goal for positioning middleware is to provide developers with seamless position transparency, i.e., providing a connection between the application domain and the positioning sensors while hiding the complexity of the positioning technologies in use. A key part of the hidden com...

  19. Susceptibility of selected stored product insects to a combination treatment of pyriproxyfen and novaluron

    Science.gov (United States)

    A series of tests was conducted to evaluate susceptibility of Tribolium castaneum (Herbst), the red flour beetle, Trogoderma variabile (Ballion), the warehouse beetle, and Dermestes maculatus (DeGeer), the hide beetle, to a new insecticide (Tekko®) which contained the IGR pyreproxyfen and the chiten...

  20. A Partial Index to the Mission San Gabriel Baptism, Marriage, and Death Registers,

    Science.gov (United States)

    1982-01-01

    farming, and to aid the Spanish in such economic activities as hide tanning and tallow rendering . As part of the missionization process, the priests kept...C.H. Merrian, Village Names in Twelve California Mission Records. Robert Heizer , assembler and editor. Berkeley: University of California

  1. The How and Why of Interactive Markov Chains

    NARCIS (Netherlands)

    Hermanns, H.; Katoen, Joost P.; de Boer, F.S; Bonsangue, S.H.; Leuschel, M

    2010-01-01

    This paper reviews the model of interactive Markov chains (IMCs, for short), an extension of labelled transition systems with exponentially delayed transitions. We show that IMCs are closed under parallel composition and hiding, and show how IMCs can be compositionally aggregated prior to analysis

  2. Idiosyncratic Uncertainty, Capacity Utilization and the Business Cycle

    DEFF Research Database (Denmark)

    Fragnart, Jean-Francois; Licandro, Omar; Portier, Franck

    thus hides a diversity of microeconomic situations. The variablity of the capacity utilization allows for a good description of some of the main stylized facts of the busines cycle, propagates and magnifies aggregate technological shocks and generates endogenous persistence (i.e., the output growth...

  3. Specification of Concurrent Objects

    DEFF Research Database (Denmark)

    Sørensen, Morten U.

    relation over two objects and an event. In the model, objects can be composed by parallel composition, encapsulation, and hiding of operations. Refinement between objects is defined as fair trace inclusion.A specification language is presented where objects can be specified operationally by abstract...

  4. How to Achieve Early Botnet Detection at the Provider Level?

    NARCIS (Netherlands)

    Dietz, Christian; Sperotto, Anna; Dreo, G.; Pras, Aiko

    Botnets are an enabler for many cyber-criminal activities and often responsible for DDoS attacks, banking fraud, cyber-espionage and extortion. Botnets are controlled by a botmaster that uses various advanced techniques to create, maintain and hide their complex and distributed C&C infrastructures.

  5. Samaru Journal of Information Studies -main-fx

    African Journals Online (AJOL)

    USER

    The choice of theory to guide inquiry must relate to research paradigm ... However, many beginning scholars experience difficulty in articulating ..... hiding information about everyday life practices. ... difficult to connect with the broader scholarly ... writing: a design psychology interpretation ... From the mind's eye of the user:.

  6. 40 CFR 425.30 - Applicability; description of the hair save or pulp, non-chrome tan, retan-wet finish subcategory.

    Science.gov (United States)

    2010-07-01

    ... Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) EFFLUENT GUIDELINES AND STANDARDS LEATHER TANNING AND... processes raw or cured cattle or cattle-like hides into finished leather by hair save or pulp unhairing, vegetable tanning or alum, syntans, oils and other agents for tanning, and retan-wet finishing. ...

  7. Adaptive Beamforming Algorithms for Tow Ship Noise Canceling

    NARCIS (Netherlands)

    Robert, M.K.; Beerens, S.P.

    2002-01-01

    In towed array sonar, the directional noise originating from the tow ship, mainly machinery and hydrodynamic noise, often limits the sonar performance. When processed with classical beamforming techniques, loud tow ship noise induces high sidelobes that may hide detection of quiet targets in forward

  8. GPU accelerated likelihoods for stereo-based articulated tracking

    DEFF Research Database (Denmark)

    Friborg, Rune Møllegaard; Hauberg, Søren; Erleben, Kenny

    2010-01-01

    than a traditional CPU implementation. We explain the non-intuitive steps required to attain an optimized GPU implementation, where the dominant part is to hide the memory latency effectively. Benchmarks show that computations which previously required several minutes, are now performed in few seconds....

  9. Pteromalus puparum venom impairs host cellular immune responses by decreasing expression of its scavenger receptor gene

    Science.gov (United States)

    Insect host/parasitoid interactions are co-evolved systems in which host defenses are balanced by parasitoid mechanisms to disable or hide from host immune effectors. Although there is a rich literature on these systems, parasitoid immune-disabling mechanisms have not been fully elucidated. Here we ...

  10. Winning the Shell Game.

    Science.gov (United States)

    Machiavelli, Nick

    1992-01-01

    Inspired by the survivalist strategies of James Clavell's protagonist in "King Rat," this article advises administrators how to practice creative insubordination by informally lobbying board members, winking at obstructive rules, and pursuing devious ends in their school's interest. The best administrators take chances, hiding their…

  11. 76 FR 41487 - Macy's, Inc., Provisional Acceptance of a Settlement Agreement and Order

    Science.gov (United States)

    2011-07-14

    ...; telephone (301) 504-7612. SUPPLEMENTARY INFORMATION: The text of the Agreement and Order appears below. July... products with drawstrings at the neck: Quiksilver, Inc.--Hide & Seek hooded sweatshirts; Jerry Leigh of... Children's Upper Outerwear (``Guidelines'') to help prevent children from strangling or entangling on neck...

  12. Leonardo da Vinci's "A Skull Sectioned": Skull and dental formula revisited

    NARCIS (Netherlands)

    Gerrits, P.O.; Veening, J.G.

    2013-01-01

    What can be learned from historical anatomical drawings and how to incorporate these drawings into anatomical teaching? The drawing "A skull sectioned" (RL 19058v) by Leonardo da Vinci (1452-1519), hides more detailed information than reported earlier. A well-chosen section cut explores sectioned

  13. Scalp cooling to prevent alopecia after chemotherapy can be considered safe in patients with breast cancer

    NARCIS (Netherlands)

    van den Hurk, C.J.; van de Poll-Franse, L.V.; Breed, W.P.M.; Coebergh, J.W.W.; Nortier, J.

    2013-01-01

    With modern scalp cooling equipment cytotoxic damage of hair root cells can be prevented in half of the patients with cancer at high risk of alopecia. However, traditionally doubt has existed whether scalp cooling might facilitate hiding and disseminating scalp skin metastases and thus decrease

  14. Beyond the magic circle : A network perspective on role-play in online games

    NARCIS (Netherlands)

    Copier, M.

    2007-01-01

    Currently, game research is characterized by the (re)construction of contested boundaries such as the “magic circle” of the game experience. These boundaries create dichotomies, for instance, between the real and the imaginary that hide the complexity of actual play, design and research. In this

  15. Threat Based Risk Assessment for Enterprise Networks

    Science.gov (United States)

    2016-02-15

    devastating insider attacks, Edward Snowden exfiltrated 1.7 million documents from the National Security Agency [1]. That same year, the security company...Weller-Fahy, and Tamara Yu. References 1. G. Greenwald, No Place to Hide: Edward Snowden , the NSA, and the U.S. Surveillance State. London: Hamish

  16. Adolescent Homosexuality and Concerns Regarding Disclosure.

    Science.gov (United States)

    Harrison, Therese W.

    2003-01-01

    With threats of being labeled abnormal or facing rejection, homosexual adolescents are pressured to hide their sexual identities. To provide optimal anticipatory guidance and support, professionals must understand the natural development of sexual attraction and the disclosure concerns and risks for developing homosexual adolescents (e.g., risk…

  17. Playing with the performer in Medieval music: Machaut’s ideas on love and order in Quant vraie Amour / O series summe rata / Super omnes speciosa (Motet 17)

    NARCIS (Netherlands)

    Boogaart, J.

    2009-01-01

    Machaut’s seventeenth motet might be one of his earliest works. Under its simple appearance it hides essential poetic reflections about the problematic relationship between paradoxical Love and the regular order of the universe, a problem which he kept pondering all his life. This problem is

  18. “Omega-team is Moving to Another Premise over My Dead Body…”

    DEFF Research Database (Denmark)

    Hekkala, Riitta; Stein, Mari-Klara; Rossi, Matti

    2014-01-01

    ', 'forbidding', 'hiding', and 'criticizing' emerging – each with their own characteristic linguistic moves and material objects mediating the practices. Each of these practices circulates power through what can be called ‘power-resistance’ cycles – in short, the same practice may be harnessed for achieving one...

  19. School Phobia

    Science.gov (United States)

    Tyrrell, Maureen

    2005-01-01

    School phobia is a serious disorder affecting up to 5% of elementary and middle school children. Long-term consequences include academic failure, diminished peer relationships, parental conflict, and development of additional psychiatric disorders. Hiding behind such common physical symptoms as headaches, stomachaches, and fatigue, school phobia…

  20. By Force or by Fraud: Optimizing U.S. Information Strategy With Deception

    Science.gov (United States)

    2016-06-01

    WITH DECEPTION Ryan Q. Flaherty Major, United States Army B.S., Sacred Heart University, 2001 M.B.A., Sacred Heart University, 2004...to hide their religious agenda of establishing an Islamic Republic under the cloak of Lebanese nationalism.163 B. UNITY OF EFFORT State Unity of

  1. Sadhana | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Sadhana. MURAT YESILYURT. Articles written in Sadhana. Volume 41 Issue 11 November 2016 pp 1289-1298. New approach for ensuring cloud computing security: using data hiding methods · MURAT YESILYURT YILDIRAY YALMAN · More Details Abstract Fulltext PDF. Cloud computing is one of the ...

  2. Analyzing time-ordered event data with missed observations

    NARCIS (Netherlands)

    Dokter, Adriaan M.; van Loon, E. Emiel; Fokkema, Wimke; Lameris, Thomas K.; Nolet, Bart A.; van der Jeugd, Henk P.

    2017-01-01

    A common problem with observational datasets is that not all events of interest may be detected. For example, observing animals in the wild can difficult when animals move, hide, or cannot be closely approached. We consider time series of events recorded in conditions where events are occasionally

  3. Animal Products and Handling: A Caution for Consumers and ...

    African Journals Online (AJOL)

    This study reviewed pertinent literature on edible animal products and handling with respect to contaminations and adulterations. Animal products include eggs, meat, milk, fish, skin/hide that are processed into other by products for human consumption. There is the need for awareness campaignsto consumers and ...

  4. Degradation of Collagen Increases Nitrogen Solubilisation During Enzymatic Hydrolysis of Fleshing Meat

    NARCIS (Netherlands)

    Anzani, Cecilia; Prandi, Barbara; Tedeschi, Tullia; Baldinelli, Chiara; Sorlini, Giovanni; Wierenga, Peter A.; Dossena, Arnaldo; Sforza, Stefano

    2017-01-01

    Abstract: The meat portion directly attached to bovine hides (fleshing meat) is a by-product of leather industry that is a potential new source of proteins. In literature different enzymatic and chemical methods have been proposed to hydrolyze and solubilize fleshing meat. Enzyme hydrolysis is

  5. Adaptive Mechanisms Underlying Microbial Resistance to Disinfectants

    Science.gov (United States)

    2016-02-01

    11775]). E.coli is a gram-negative, facultative anaerobic, and rod-shaped bacteria commonly found in warm-blooded animals . 2.1.2 Disinfectants...Nisbet, D.J. Disinfectant and Antibiotic Susceptibility Profiles of Escherichia coli O157:H7 Strains from Cattle Carcasses , Feces, and Hides and

  6. Bulk and surface states carried supercurrent in ballistic Nb-Dirac semimetal Cd3As2 nanowire-Nb junctions

    NARCIS (Netherlands)

    Li, Cai Zhen; Li, Chuan; Wang, Li Xian; Wang, Shuo; Liao, Zhi Min; Brinkman, Alexander; Yu, Da Peng

    2018-01-01

    A three-dimensional Dirac semimetal has bulk Dirac cones in all three momentum directions and Fermi arc like surface states, and can be converted into a Weyl semimetal by breaking time-reversal symmetry. However, the highly conductive bulk state usually hides the electronic transport from the

  7. What-Where-When Memory and Encoding Strategies in Healthy Aging

    Science.gov (United States)

    Cheke, Lucy G.

    2016-01-01

    Older adults exhibit disproportionate impairments in memory for item-associations. These impairments may stem from an inability to self-initiate deep encoding strategies. The present study investigates this using the "treasure-hunt task"; a what-where-when style episodic memory test that requires individuals to "hide" items…

  8. Department of Defense Technical Architecture Framework for Information Management. Volume 1-8: Overview. Version 3.0.

    Science.gov (United States)

    1996-04-30

    confirmation. Similarly, the matching of fingerprints or retina images authenticates the identity of an individual. The use of keys with locks, passwords...been drawn on a graphics canvas . Make various overlays available to the user to display (make visible), hide from display (make invisible), or delete

  9. Is the Air Cavalry Training for the Right Missions? The 1st Squadron, 9th Cavalry, 1st Air Cavalry Division Republic of Vietnam - 1965 to 1966.

    Science.gov (United States)

    1987-06-05

    operation--stockpiling ammunition, digging massive underground support systems, and hiding food and ammunition at both the attack sites and withdrawal...was untrained and ineffective. There were nar " diFFerences between the two ccuntries including inowiedge oF the country, the Franch cavalr.I’s ;.ait

  10. Bovine lumpy skin disease: epidemiology, economic impact and control opportunities in Ethiopia

    NARCIS (Netherlands)

    Abebe, Wassie Molla

    2018-01-01

    Lumpy skin disease (LSD) is a serious pox disease of cattle caused by LSD virus of the genus Capripoxvirus, subfamily Chordopoxvirinae and family Poxviridae. It is economically an important disease due to its effect on productivity, fertility, animal survival, hide

  11. Cloaking and imaging at the same time

    Science.gov (United States)

    Wu, Qiannan; Xu, Yadong; Li, Hui; Chen, Huanyang

    2013-02-01

    In this letter, we propose a conceptual device to perform good imaging with positive refraction. At the same time, this device is an isotropic omnidirectional cloak with a perfect electric conductor hiding region and shows versatile illusion optical effects. Numerical simulations are performed to verify the functionalities.

  12. Bodies Folded in Migrant Crypts

    DEFF Research Database (Denmark)

    Galis, Vasilis; Tzokas, Spyros; Tympas, Aristotle

    2016-01-01

    This article considers media narratives that suggest that hiding in trucks, buses, and other vehicles to cross borders has, in fact, been a common practice in the context of migration to, and within, Europe. We aim to problematize how the tension between the materiality of bordering practices...

  13. Host-pathogen interactions in Lyme disease and their application in diagnostics

    NARCIS (Netherlands)

    Burgel, Nathalie Daniëlle van

    2013-01-01

    B. burgdorferi has a wide variety of strategies to hide from the host immune system. Complement regulatory binding proteins have been described for almost all complement resistant B. burgdorferi sl, except for the complement resistant B. bavariensis, one of the species that is known to frequently

  14. Fortify Your Knowledge about Vitamins

    Medline Plus

    Full Text Available ... Frankos adds, "Do not self-diagnose any health condition. Work with your health care providers to determine how ... adults, hide signs of B-12 deficiency, a condition that can cause nerve damage ... how some drugs work. Report Problems If you believe that you are ...

  15. Children's Use and Knowledge of Display Rules for Anger following Hypothetical Vignettes versus following Live Peer Interaction.

    Science.gov (United States)

    Parker, Elizabeth H.; Hubbard, Julie A.; Ramsden, Sally R.; Relyea, Nicole; Dearing, Karen F.; Smithmyer, Catherine M.; Schimmel, Kelly D.

    2001-01-01

    Examined correspondence between second-graders' use and knowledge of anger display rules. Found that children's responses were moderately related across two contexts. Following live interactions, compared to hypothetical vignettes, children reported feeling and expressing less anger, intending to hide their anger more, and dissembling their anger…

  16. Fourier analysis: from cloaking to imaging

    International Nuclear Information System (INIS)

    Wu, Kedi; Ping Wang, Guo; Cheng, Qiluan

    2016-01-01

    Regarding invisibility cloaks as an optical imaging system, we present a Fourier approach to analytically unify both Pendry cloaks and complementary media-based invisibility cloaks into one kind of cloak. By synthesizing different transfer functions, we can construct different devices to realize a series of interesting functions such as hiding objects (events), creating illusions, and performing perfect imaging. In this article, we give a brief review on recent works of applying Fourier approach to analysis invisibility cloaks and optical imaging through scattering layers. We show that, to construct devices to conceal an object, no constructive materials with extreme properties are required, making most, if not all, of the above functions realizable by using naturally occurring materials. As instances, we experimentally verify a method of directionally hiding distant objects and create illusions by using all-dielectric materials, and further demonstrate a non-invasive method of imaging objects completely hidden by scattering layers. (review)

  17. Rencontres de Moriond QCD 2012: Searches for Dark Matter, SUSY and other exotic particles

    CERN Multimedia

    CERN Bulletin

    2012-01-01

    The fact that SUSY and other new physics signals do not seem to hide in “obvious” places is bringing a healthy excitement to Moriond. Yesterday’s presentations confirmed that, with the 2012 LHC data, experiments will concentrate on searches for exotic particles that might decay into yet unexplored modes. In the meantime, they are setting unprecedented boundaries to regions where new particles (not just SUSY) could exist. The limits of what particle accelerators can bring to enlighten the mystery of Dark Matter were also presented and discussed.   Each bar on the picture represents a decay channel that the ATLAS Collaboration (top) and the CMS Collaborations (bottom) have analysed.  The value indicated on the scale (or on the relevant bar) defines the maximum mass that the particle in that search cannot have. Not knowing what kind of new physics we should really expect, and given the fact that it does not seem to be hiding in any of the obvious places, e...

  18. Chrome tannage using high-intensity ultrasonic field.

    Science.gov (United States)

    Mäntysalo, E; Marjoniemi, M; Kilpeläinen, M

    1997-04-01

    The process time in chrome tannage in leather making, using an elastic compression cycle followed by irradiation by high-intensity ultrasound, is quite short lasting only a few minutes, compared with a process time of several hours in modern chrome tannage. After ultrasonic irradiation, samples were basified in 17 h in chrome liquor at a pH of 4.0 and the shrinkage temperature was measured. The determination of the efficiency for the chrome liquor penetrating into the hides can be based on the steepness of the shrinkage temperature-processing time curve. An approximate value of 20 degrees C min(-1) can be evaluated for the initial slope of the curve when elastic compression and high-intensity ultrasonic irradiation is used, and a processing time of 2 min is required in chrome liquor (plus 17 h basification and 24 h storage time) to obtain leather stable to boiling. Usually, hides are kept in chrome liquor for 2 h.

  19. Automatic translation of MPI source into a latency-tolerant, data-driven form

    International Nuclear Information System (INIS)

    Nguyen, Tan; Cicotti, Pietro; Bylaska, Eric; Quinlan, Dan; Baden, Scott

    2017-01-01

    Hiding communication behind useful computation is an important performance programming technique but remains an inscrutable programming exercise even for the expert. We present Bamboo, a code transformation framework that can realize communication overlap in applications written in MPI without the need to intrusively modify the source code. We reformulate MPI source into a task dependency graph representation, which partially orders the tasks, enabling the program to execute in a data-driven fashion under the control of an external runtime system. Experimental results demonstrate that Bamboo significantly reduces communication delays while requiring only modest amounts of programmer annotation for a variety of applications and platforms, including those employing co-processors and accelerators. Moreover, Bamboo’s performance meets or exceeds that of labor-intensive hand coding. As a result, the translator is more than a means of hiding communication costs automatically; it demonstrates the utility of semantic level optimization against a well-known library.

  20. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  1. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  2. A Variable Neighborhood Search Algorithm for the Leather Nesting Problem

    Directory of Open Access Journals (Sweden)

    Cláudio Alves

    2012-01-01

    Full Text Available The leather nesting problem is a cutting and packing optimization problem that consists in finding the best layout for a set of irregular pieces within a natural leather hide with an irregular surface and contour. In this paper, we address a real application of this problem related to the production of car seats in the automotive industry. The high quality requirements imposed on these products combined with the heterogeneity of the leather hides make the problem very complex to solve in practice. Very few results are reported in the literature for the leather nesting problem. Furthermore, the majority of the approaches impose some additional constraints to the layouts related to the particular application that is considered. In this paper, we describe a variable neighborhood search algorithm for the general leather nesting problem. To evaluate the performance of our approaches, we conducted an extensive set of computational experiments on real instances. The results of these experiments are reported at the end of the paper.

  3. Crónica de un exilio forzado. La emigración clandestina de judeoconversos españoles como respuesta al incremento de la presión inquisitorial a mediados del siglo XVII

    Directory of Open Access Journals (Sweden)

    Elvira Pérez Ferreiro

    2004-08-01

    Full Text Available The accentuation of inquisitorial repression after the fall of the Count-Duke of Olivares and the substitution of the General Inquisitor Sotomayor by Arce Reinoso in 1643 forced many Jewish conversos into hiding and exile. A series of letters sent by Francisco Fernández Miranda to his brother Simón, an administrator of royal income who resided in Madrid, describes the problems of these forced exiles, the strategies used to hide their escape routes, and the repercussions for their social and family life. The difficulties that these exiles had in settling in their new countries or communities forced some to return to Spain where they tried to pass unnoticed by changing their names and places of residence. This mobility had an important role in the maintenance of communication between Jewish people who were living as Christians in Spain and those living as Jews in other places of Europe, reinforcing the ties and beliefs of the former.

  4. No need to hide : Protecting safe regions on commodity hardware

    NARCIS (Netherlands)

    Koning, Koen; Chen, Xi; Bos, Herbert; Giuffrida, Cristiano; Athanasopoulos, Elias

    2017-01-01

    As modern 64-bit x86 processors no longer support the segmentation capabilities of their 32-bit predecessors, most research projects assume that strong in-process memory isolation is no longer an affordable option. Instead of strong, deterministic isolation, new defense systems therefore rely on the

  5. A semantic medical multimedia retrieval approach using ontology information hiding.

    Science.gov (United States)

    Guo, Kehua; Zhang, Shigeng

    2013-01-01

    Searching useful information from unstructured medical multimedia data has been a difficult problem in information retrieval. This paper reports an effective semantic medical multimedia retrieval approach which can reflect the users' query intent. Firstly, semantic annotations will be given to the multimedia documents in the medical multimedia database. Secondly, the ontology that represented semantic information will be hidden in the head of the multimedia documents. The main innovations of this approach are cross-type retrieval support and semantic information preservation. Experimental results indicate a good precision and efficiency of our approach for medical multimedia retrieval in comparison with some traditional approaches.

  6. Assessment of contamination of singed hides from cattle and goats ...

    African Journals Online (AJOL)

    African Journal of Environmental Science and Technology. Journal Home · ABOUT · Advanced Search · Current Issue · Archives · Journal Home > Vol 2, No 8 (2008) >. Log in or Register to get access to full text downloads.

  7. Three-Year-Olds Hide Their Communicative Intentions in Appropriate Contexts

    Science.gov (United States)

    Grosse, Gerlind; Scott-Phillips, Thomas C.; Tomasello, Michael

    2013-01-01

    Human cooperative communication involves both an informative intention that the recipient understands the content of the signal and also a (Gricean) communicative intention that the recipient recognizes that the speaker has an informative intention. The degree to which children understand this 2-layered nature of communication is the subject of…

  8. Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization

    Science.gov (United States)

    2016-05-30

    HMACs generated us- ing 128-bit AES encryption . We do not use AES en- cryption to generate HMACs due to its high overhead; the authors of CCFI report...execute-only permissions on memory accesses, (ii) code pointer hid- ing (e.g., indirection or encryption ), and (iii) decoys (e.g., booby traps). Among...lowing techniques: they a) enforce execute-only permis- sions on code pages to mitigate direct information leak- age, b) introduce an encryption or

  9. Can R-parity violation hide vanilla supersymmetry at the LHC?

    International Nuclear Information System (INIS)

    Asano, Masaki

    2012-09-01

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  10. A ceramide sensor hiding in a family of sphingomyelin synthases

    NARCIS (Netherlands)

    Tafesse, F.G.

    2009-01-01

    Sphingolipids are vital components of cellular membranes that provide mechanical stability and play key roles in signal transduction, cell recognition and molecular sorting. They are synthesized from ceramide, a potent mediator of programmed cell death. Hence, cells face the dilemma of how to

  11. STRATEGI CAMP DALAM NOVEL HIDING MY CANDY KARYA LADY CHABLIS

    Directory of Open Access Journals (Sweden)

    Sri Saraswati

    2016-07-01

    Penerapan strategi Camp tersebut ditujukan sebagai upaya untuk meraih kebertahanan transgender. Selanjutnya, kebertahanan transgender dapat dicerminkan melalui visibilitas sosial, terbentuknya wacana normalitas alternatif dan pemberdayaan transgender

  12. HIDING IN THE SHADOWS. II. COLLISIONAL DUST AS EXOPLANET MARKERS

    International Nuclear Information System (INIS)

    Dobinson, Jack; Leinhardt, Zoë M.; Lines, Stefan; Carter, Philip J.; Dodson-Robinson, Sarah E.; Teanby, Nick A.

    2016-01-01

    Observations of the youngest planets (∼1–10 Myr for a transitional disk) will increase the accuracy of our planet formation models. Unfortunately, observations of such planets are challenging and time-consuming to undertake, even in ideal circumstances. Therefore, we propose the determination of a set of markers that can preselect promising exoplanet-hosting candidate disks. To this end, N-body simulations were conducted to investigate the effect of an embedded Jupiter-mass planet on the dynamics of the surrounding planetesimal disk and the resulting creation of second-generation collisional dust. We use a new collision model that allows fragmentation and erosion of planetesimals, and dust-sized fragments are simulated in a post-process step including non-gravitational forces due to stellar radiation and a gaseous protoplanetary disk. Synthetic images from our numerical simulations show a bright double ring at 850 μm for a low-eccentricity planet, whereas a high-eccentricity planet would produce a characteristic inner ring with asymmetries in the disk. In the presence of first-generation primordial dust these markers would be difficult to detect far from the orbit of the embedded planet, but would be detectable inside a gap of planetary origin in a transitional disk

  13. Hiding the Source Based on Limited Flooding for Sensor Networks.

    Science.gov (United States)

    Chen, Juan; Lin, Zhengkui; Hu, Ying; Wang, Bailing

    2015-11-17

    Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.

  14. Hiding in Plain Sight: The Anatomy of Malicious Facebook Pages

    OpenAIRE

    Dewan, Prateek; Kumaraguru, Ponnurangam

    2015-01-01

    Facebook is the world's largest Online Social Network, having more than 1 billion users. Like most other social networks, Facebook is home to various categories of hostile entities who abuse the platform by posting malicious content. In this paper, we identify and characterize Facebook pages that engage in spreading URLs pointing to malicious domains. We used the Web of Trust API to determine domain reputations of URLs published by pages, and identified 627 pages publishing untrustworthy info...

  15. A logarithmic quantization index modulation for perceptually better data hiding.

    Science.gov (United States)

    Kalantari, Nima Khademi; Ahadi, Seyed Mohammad

    2010-06-01

    In this paper, a novel arrangement for quantizer levels in the Quantization Index Modulation (QIM) method is proposed. Due to perceptual advantages of logarithmic quantization, and in order to solve the problems of a previous logarithmic quantization-based method, we used the compression function of mu-Law standard for quantization. In this regard, the host signal is first transformed into the logarithmic domain using the mu-Law compression function. Then, the transformed data is quantized uniformly and the result is transformed back to the original domain using the inverse function. The scalar method is then extended to vector quantization. For this, the magnitude of each host vector is quantized on the surface of hyperspheres which follow logarithmic radii. Optimum parameter mu for both scalar and vector cases is calculated according to the host signal distribution. Moreover, inclusion of a secret key in the proposed method, similar to the dither modulation in QIM, is introduced. Performance of the proposed method in both cases is analyzed and the analytical derivations are verified through extensive simulations on artificial signals. The method is also simulated on real images and its performance is compared with previous scalar and vector quantization-based methods. Results show that this method features stronger a watermark in comparison with conventional QIM and, as a result, has better performance while it does not suffer from the drawbacks of a previously proposed logarithmic quantization algorithm.

  16. Human vision-based algorithm to hide defective pixels in LCDs

    Science.gov (United States)

    Kimpe, Tom; Coulier, Stefaan; Van Hoey, Gert

    2006-02-01

    Producing displays without pixel defects or repairing defective pixels is technically not possible at this moment. This paper presents a new approach to solve this problem: defects are made invisible for the user by using image processing algorithms based on characteristics of the human eye. The performance of this new algorithm has been evaluated using two different methods. First of all the theoretical response of the human eye was analyzed on a series of images and this before and after applying the defective pixel compensation algorithm. These results show that indeed it is possible to mask a defective pixel. A second method was to perform a psycho-visual test where users were asked whether or not a defective pixel could be perceived. The results of these user tests also confirm the value of the new algorithm. Our "defective pixel correction" algorithm can be implemented very efficiently and cost-effectively as pixel-dataprocessing algorithms inside the display in for instance an FPGA, a DSP or a microprocessor. The described techniques are also valid for both monochrome and color displays ranging from high-quality medical displays to consumer LCDTV applications.

  17. Playing hide-and-seek: detecting the manipulation of android timestamps

    CSIR Research Space (South Africa)

    Pieterse, H

    2015-08-01

    Full Text Available Mobile technology continues to evolve in the 21st century, providing users with improved capabilities and advance functionality. The current leader of this evolution is Android, a mobile operating system that continuously elevates existing features...

  18. Can R-parity violation hide vanilla supersymmetry at the LHC?

    Energy Technology Data Exchange (ETDEWEB)

    Asano, Masaki [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Rolbiecki, Krzysztof; Sakurai, Kazuki [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2012-09-15

    Current experimental constraints on a large parameter space in supersymmetric models rely on the large missing energy signature. This is usually provided by the lightest neutralino which stability is ensured by the R-parity. However, if the R-parity is violated, the lightest neutralino decays into the standard model particles and the missing energy cut is not efficient anymore. In particular, the UDD type R-parity violation induces the neutralino decay to three quarks which potentially leads to the most difficult signal to be searched at hadron colliders. In this paper, we study the constraints on the R-parity violating supersymmetric models using a same-sign dilepton and a multijet signatures. We show that the gluino and squarks lighter than a TeV are already excluded in constrained minimal supersymmetric standard model with R-parity violation if their masses are approximately equal. We also analyze constraints in a simplified model with R-parity violation. We compare how R-parity violation changes some of the observables typically used to distinguish a supersymmetric signal from standard model backgrounds.

  19. Hiding of the conserved (anti)baryonic charge into black holes

    International Nuclear Information System (INIS)

    Dolgov, A.D.

    1980-01-01

    The problem of the baryon asymmetry of the Universe is considered. It is suggested that the baryon asymmetry of the Universe is generated by black hole evaporation in a specific mechanism proposed by Zeldovich. Net amount of baryons evaporated by a black hole is shown can be unequal to that of antibaryons, even if the baryon charge is microscopically conserved. It is concluded that the discussed mechanism can provide the observed baryon assymetry of the Universe if primary black holes with the mass M=10sup(4+-2)Msub(P), where Msub(P)=10sup(19) GeV is the Planck mass, give noticeable contribution into the total energy density of the Universe

  20. Hiding the Source Based on Limited Flooding for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Juan Chen

    2015-11-01

    Full Text Available Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object by localizing the source, many protocols have been proposed to protect source location. Instead of transmitting the packet to the base station directly, typical source location protection protocols first transmit packets randomly for a few hops to a phantom location, and then forward the packets to the base station. The problem with these protocols is that the generated phantom locations are usually not only near the true source but also close to each other. As a result, attackers can easily trace a route back to the source from the phantom locations. To address the above problem, we propose a new protocol for source location protection based on limited flooding, named SLP. Compared with existing protocols, SLP can generate phantom locations that are not only far away from the source, but also widely distributed. It improves source location security significantly with low communication cost. We further propose a protocol, namely SLP-E, to protect source location against more powerful attackers with wider fields of vision. The performance of our SLP and SLP-E are validated by both theoretical analysis and simulation results.