Sample records for raw powdered hide

  1. Powdered hide model for vegetable tanning II. hydrolyzable tannin

    Vegetable tannages employ both condensed and hydrolyzable tannins. As part of our exploration of tanning mechanisms, we reported last year on interactions of the condensed tannin, quebracho, with powdered hide. In this study, the interactions of chestnut extract, a hydrolyzable tannin, with powdere...

  2. 预处理对皮粉微观形貌和热稳定性的影响%Influence of Pretreatment on the Microstructure and Thermal Stability of Hide Powder

    俞津斌; 邬宁昆; 王亚娟


    The physicochemical properties of raw hide powder pretreated with organic solvents, different protonating agents, hydrogen bonding disrupting agent and deaminated treatment were characterized. The results show that the influence of consistence of urea on the mirco-structure of hide collagen is different. When the consistence is lower than 4mol/L, the fiber is dispersive. And if the consistence is higher than 4mol/L, the fiber bundle will began to collapse. And the decomposition and denaturation temperature of hide powder can be decreased remarkably by the urea solution, the higher of consistence, the lower temperature, which means that the hydrogen bond play an important role on the stability of collagen. The acid hydrolysis degree is more obvious for the organic acid and sulfate acid than for hydrochloric acid, and the denaturation temperature of hide powder pre-treated with sulfate acid is lower. The thermal behavior of deaminated hide powder does not change too much.%对极性溶剂、非极性溶剂、不同质子化程度、破坏氢键度及去氨基等预处理后的白皮粉的理化性能进行了表征。结果表明:尿素浓度在1~4mol/L范围内,皮粉纤维由未经任何处理的束状到表面粘连聚集再到纤维束分散,皮胶原的热变性温度急剧下降,浓度超过4mol/L后,纤维束则开始溃散,热稳定性随尿素浓度的增加呈缓慢降低趋势;有机酸及硫酸对胶原纤维的酸解、溶胀影响比盐酸的明显,甲酸处理后皮胶原的热稳定性降低较小,而硫酸对其酸解程度明显,热稳定性下降明显;去氨基后皮粉的纤维束也有一定程度的聚集,且在纤维表面有晶体析出,热分解温度变化甚微,而热变性温度降低显著。

  3. Spore populations among bulk tank raw milk and dairy powders are significantly different.

    Miller, Rachel A; Kent, David J; Watterson, Matthew J; Boor, Kathryn J; Martin, Nicole H; Wiedmann, Martin


    To accommodate stringent spore limits mandated for the export of dairy powders, a more thorough understanding of the spore species present will be necessary to develop prospective strategies to identify and reduce sources (i.e., raw materials or in-plant) of contamination. We characterized 1,523 spore isolates obtained from bulk tank raw milk (n=33 farms) and samples collected from 4 different dairy powder-processing plants producing acid whey, nonfat dry milk, sweet whey, or whey protein concentrate 80. The spores isolated comprised 12 genera, at least 44 species, and 216 rpoB allelic types. Bacillus and Geobacillus represented the most commonly isolated spore genera (approximately 68.9 and 12.1%, respectively, of all spore isolates). Whereas Bacillus licheniformis was isolated from samples collected from all plants and farms, Geobacillus spp. were isolated from samples from 3 out of 4 plants and just 1 out of 33 farms. We found significant differences between the spore population isolated from bulk tank raw milk and those isolated from dairy powder plant samples, except samples from the plant producing acid whey. A comparison of spore species isolated from raw materials and finished powders showed that although certain species, such as B. licheniformis, were found in both raw and finished product samples, other species, such as Geobacillus spp. and Anoxybacillus spp., were more frequently isolated from finished powders. Importantly, we found that 8 out of 12 genera were isolated from at least 2 different spore count methods, suggesting that some spore count methods may provide redundant information if used in parallel. Together, our results suggest that (1) Bacillus and Geobacillus are the predominant spore contaminants in a variety of dairy powders, implying that future research efforts targeted at elucidating approaches to reduce levels of spores in dairy powders should focus on controlling levels of spore isolates from these genera; and (2) the spore

  4. Influence of raw powder granulometry on the mechanical properties of a calcium phosphate bone cement

    Pittet, C. [Swiss Federal Inst. of Tech., Lausanne (Switzerland). Lab. de Technologie des Poudres; Hopital Orthopedique de la Suisse Romande, Lausanne (Switzerland); Grasso, P.; Lemaitre, J. [Swiss Federal Inst. of Tech., Lausanne (Switzerland). Lab. de Technologie des Poudres


    Brushite cement is a calcium phosphate cement obtained by mixing three powders with water. Starting powders are monocalcium phosphate monohydrate (MCPM), calcium sulfate hemihydrate (CSH) and {beta}-tricalcium phosphate ({beta}-TCP). The main phase obtained after setting is brushite (DCPD). The goal of this work was to mill the starting powders to obtain a finer and more homogeneous microstructure after setting, in order to enhance the mechanical properties of the cement. All three powders were milled and freeze-dried. The median diameters passed from 70.5 to 6.2 {mu}m for MCPM, 27.2 to 1.1 {mu}m for CSH, 2.4 to 1.5 {mu}m for {beta}-TCP. Specific surface areas of the powders increased on milling. Attrition of MCPM and CSH appeared to be beneficial to the maximum stresses the set cement can withstand. Cements prepared with raw powders showed 1.4 MPa indirect tensile strength and 4.4 MPa compressive strength. With milled MCPM and CSH, those values reached 4.1 and 22.1 MPa respectively. After these benefits, we tried to use the milled {beta}-TCP expecting further enhancement. To ensure wetting of all three powders and to keep the same paste rheology, the liquid/solid ratio had to be increased. The indirect tensile strength was seen to decrease by a factor of 3 when three milled powders were used at the same time. SEM of the fracture surfaces showed that milled {beta}-TCP formed clusters that did not react to form brushite. Lowering the maximum indirect tension stress is due to the fact that less brushite was formed, and to a higher porosity in the final product (mainly due to the higher liquid/solid ratio). (orig.)

  5. Short communication: Typing and tracking Bacillaceae in raw milk and milk powder using pyroprinting.

    VanderKelen, Jennifer J; Mitchell, Ryan D; Laubscher, Andrea; Black, Michael W; Goodman, Anya L; Montana, Aldrin K; Dekhtyar, Alexander M; Jimenez-Flores, Rafael; Kitts, Christopher L


    Contamination of fluid and processed milk products with endospore-forming bacteria, such as Bacillaceae, affect milk quality and longevity. Contaminants come from a variety of sources, including the dairy farm environment, transportation equipment, or milk processing machinery. Tracking the origin of bacterial contamination to allow specifically targeted remediation efforts depends on a reliable strain-typing method that is reproducible, fast, easy to use, and amenable to computerized analysis. Our objective was to adapt a recently developed genotype-based Escherichia coli strain-typing method, called pyroprinting, for use in a microbial source-tracking study to follow endospore-forming bacillus bacteria from raw milk to powdered milk. A collection of endospores was isolated from both raw milk and its finished powder, and, after germination, the vegetative cells were subject to the pyroprinting protocol. Briefly, a ribosomal DNA intergenic transcribed spacer present in multiple copies in Bacillaceae genomes was amplified by the PCR. This multicopy locus generated a mixed PCR product that was subsequently subject to pyrosequencing, a quantitative real-time sequencing method. Through a series of enzymatic reactions, each nucleotide incorporation event produces a photon of light that is quantified at each nucleotide dispensation. The pattern of light peaks generated from this mixed template reaction is called a pyroprint. Isolates with pyroprints that match with a Pearson correlation of 0.99 or greater are considered to be in the same group. The pyroprint also contains some sequence data useful for presumptive species-level identification. This method identified groups with isolates from raw milk only, from powdered milk only, or from both sources. This study confirms pyroprinting as a rapid, reproducible, automatically digitized tool that can be used to distinguish bacterial strains into taxonomically relevant groups and, thus, indicate probable origins of bacterial

  6. The influence of raw material, added emulsifying salt and spray drying on cheese powder structure and hydration properties

    Felix da Silva, Denise; Larsen, Flemming Hofmann; Hougaard, Anni Bygvrå


    The present work has evaluated how raw material, addition of emulsifying salts (ES) and drying technology affect particle characteristics, structure, and hydration of cheese powders. In this context the spray drying technology induced the strongest effect on morphology and swelling of cheese powder...

  7. 进口皮毛集中加工地炭疽污染情况调查%Investigation of Anthrax Contamination at Imported Raw Hides and Wool Centralized Processing Place

    顾志军; 朱磊; 沈炜; 沈涛


    随着我国生皮、羊毛进口量的逐年增加,国外炭疽疫情随皮毛传入我国的风险也在不断加大。为掌握炭疽随进口皮毛传入的情况,采集进口皮毛集中加工地区最有可能感染炭疽的土壤、水和从业人员血清样本进行检测。结果显示,土壤样本和水样均呈阴性;从业人员血清样本阳性率为23.9%,显著高于普通人群的阳性率(1.6%),表明进口皮毛加工从业人员存在感染炭疽的可能。本文针对上述情况提出了防控炭疽的建议。%While the import volume of raw hides and wool increased year by year in China,the risk of anthrax spread-ing into China is increasing. To grasp the introduction of anthrax with imported raw hides,the samples of soil,water and personal serum of the workers on raw hides and wool processing places with high risk of anthrax contamination were collected and tested. The results showed all soil samples and water samples were negative,and the positive rate of serum samples from workers was 23.9% which was significantly higher than the general population(1.6%). It indicated that it was possible for the workers who processed imported raw hide and wool to be infected with anthrax. Based on the above situation,some prevention and control suggestions of anthrax were proposed.

  8. Combination of powdered activated carbon and powdered zeolite for enhancing ammonium removal in micro-polluted raw water.

    Liao, Zhen-Liang; Chen, Hao; Zhu, Bai-Rong; Li, Huai-Zheng


    Even zeolite is promising in ammonia pollution disposing, its removal efficiency is frequently interfered by organics. As activated carbon has good removal efficiency on organic contaminants, combination of two adsorbents may allow their respective adsorption characteristics into full play. This paper provides a performance assessment of the combination for enhancing ammonium removal in micro-polluted raw water. Gel-filtration chromatography (GFC) was carried out to quantify the molecular weight (MW) range of organic contaminants that powdered activated carbon (PAC) and powdered zeolite (PZ) can remove. The polydispersity difference which also calculated from GFC may indicate the wider organic contaminants removal range of PAC and the relatively centralized removal range of PZ. The jar tests of combination dosing confirm a synergistic effect which promotes ammonium removing. Nevertheless, it also shows an antagonism hindering the due removal performance of the two adsorbents on CODMn, while it is not much evident on UV254. Furthermore, a comparison study with simulated coagulation-sedimentation process was conducted to evaluate the optimum dosing points (spatial and temporal) of PAC and PZ among follows: suction well, pipeline mixer, early and middle phase of flocculation. We suggest to dose both two adsorbents into the early phase of flocculation to maximize the versatile removal efficiency on turbidity, ammonium and organic contaminants. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Spore test parameters matter: Mesophilic and thermophilic spore counts detected in raw milk and dairy powders differ significantly by test method.

    Kent, D J; Chauhan, K; Boor, K J; Wiedmann, M; Martin, N H


    United States dairy industry exports have steadily risen in importance over the last 10yr, with dairy powders playing a particularly critical role. Currently, approximately half of US-produced nonfat dry milk and skim milk powder is exported. Reaching new and expanding existing export markets relies in part on the control of endospore-forming bacteria in dairy powders. This study reports baseline mesophilic and thermophilic spore counts and spore populations from 55 raw material samples (primarily raw milk) and 33 dairy powder samples from dairy powder processors across the United States. Samples were evaluated using various spore testing methodologies and included initial heat treatments of (1) 80°C for 12 min; (2) 100°C for 30 min; and (3) 106°C for 30 min. Results indicate that significant differences in both the level and population of spores were found for both raw milk and dairy powders with the various testing methods. Additionally, on average, spore counts were not found to increase significantly from the beginning to the end of dairy powder processing, most likely related to the absence of biofilm formation by processing plant-associated sporeformers (e.g., Anoxybacillus sp.) in the facilities sampled. Finally, in agreement with other studies, Bacillus licheniformis was found to be the most prevalent sporeformer in both raw materials and dairy powders, highlighting the importance of this organism in developing strategies for control and reduction of spore counts in dairy powders. Overall, this study emphasizes the need for standardization of spore enumeration methodologies in the dairy powder industry.

  10. Removal of disinfection by-products in raw water using a biological powder-activated carbon system.

    Lou, Jie C; Tseng, Wei B; Wu, Ming C; Han, Jia Y; Chen, Bi H


    This study investigates the removal efficiency of disinfection by-products (DBPs) in raw water at a water treatment plant using a biological powder-activated carbon system (BPACS). The presence of an excessive amount of DBPs has a large impact on the water quality of drinking water treated from the purification process. This study collected rapidly filtered water from an advanced water treatment plant for use in experiments on raw water. The removal efficiency of the trihalomethane formation potential (THMFP) and haloacetic acids formation potential (HAAFP) was studied under various hydraulic retention times and under organic DOC loadings. The results showed that the BPACS lowered the average concentration of dissolved organic carbon (DOC), UV(254) and the SUVA value (equivalent to UV(254)/DOC) in raw water. The system efficiently removed the THMFP and HAAFP during the treatment of the three primary organic carbon items. These results highlight the importance of the BPACS for efficiently treating disinfection by-products. These discoveries provide important information on biological degradation behaviors that can remove excessive amounts of disinfection by-products from drinking water.

  11. Reversible Data Hiding Techniques

    Dhananjay Yadav


    Full Text Available Reversible data hiding is a technique that is used to hide data inside an image. The data is hidden in such a way that the exact or original data is not visible. The hidden data can be retrieved as and when required. There are several methods that are used in reversible data hiding techniques like Watermarking, Lossless embedding and encryption. In this paper we present a review of reversible watermarking techniques and show different methods that are used to get reversible data hiding technique with higher embedding capacity and invisible objects. Watermark need not be hidden. Watermarking can be applied to 1. Images, 2. Text, 3. Audio/video, 4. Software.

  12. Hiding Information under Speech


    as it arrives in real time, and it disappears as fast as it arrives. Furthermore, our cognitive process for translating audio sounds to the meaning... steganography , whose goal is to make the embedded data completely undetectable. In addi- tion, we must dismiss the idea of hiding data by using any...therefore, an image has more room to hide data; and (2) speech steganography has not led to many money-making commercial businesses. For these two

  13. HIDE: HI Data Emulator

    Akeret, Joel; Seehars, Sebastian; Chang, Chihway; Monstein, Christian; Amara, Adam; Refregier, Alexandre


    HIDE (HI Data Emulator) forward-models the process of collecting astronomical radio signals in a single dish radio telescope instrument and outputs pixel-level time-ordered-data. Written in Python, HIDE models the noise and RFI modeling of the data and with its companion code SEEK (ascl:1607.020) provides end-to-end simulation and processing of radio survey data.

  14. Acute Inhalation Toxicity Test of Ivermectin Raw Powder%伊维菌素原粉急性吸入毒性试验研究

    胡成云; 林师道; 纪磊; 汪建良; 张武; 岑江杰


    To study the acute inhalation toxicity of Ivermectin raw powder and provide the basis for safe use,limit test,the dose group was 2000 mg/m3 ,dynamic nose-only exposure,effective exposure time for 2 h.The results showed that ivermectin raw powder in male and female rats acute inhalation median lethal concentration (LC50 ) were more than 2089 mg/m3 .The acute inhalation toxicity was low toxicity.%对伊维菌素原粉急性吸入毒性进行研究,采用限量试验,设定2000 mg/m3一个剂量组,动式口鼻式染毒,有效染毒时间2h.结果显示,伊维菌素原粉对雌雄大鼠的急性吸入半数致死浓度(LC50)均大于2089 mg/m3.伊维菌素原粉急性吸入毒性属低毒,该结论为安全使用提供了依据.

  15. Hiding dependence-discovery of F-hiding laws and system laws

    Zhou Houyong; Huang Shunliang; Shi Kaiquan


    Function one direction S-rough sets have dynamic characteristics and law characteristics. By using the function one direction S-rough sets, this article presents the concepts of the f-hiding law, F-hiding law, f-hiding law dependence and F-hiding law dependence. Based on the concepts above, this article proposes the hiding-dependence theorem of f-hiding laws, the hiding-dependence theorem of F-hiding laws, the hiding-dependence separation theorem, the hiding dependencs-discovery principle of unknown laws. Finally, the application of the hiding dependence of hiding laws in the discovery of system laws is given.

  16. Preliminary Report on Processing Technology of Raw Powder Tablet from Moringa oleifera%辣木全生粉末素片工艺研究初报



    Experiment of Moringa oleifera raw powder was designed to explore the tablet criteria of FQA (final quality assur- ance) and determine the optimum condition of processing technology. The major influence factors were analyzed by single or or- thogonal test. It reveals that the highest FQA is reached in combination of five technological parameters when powder granulari- ty is 100 mu, mix in a period of 15 min, dry temperature at 70℃ and grain granularity at 12 mu with 3% of moisture in it.%初步研究了辣木全生粉末素片工艺,探索以素片合格率为指标的最佳工艺条件。对粉末粒度、混合时间、干燥温度、干粒粒度和干粒含水量等5个主要影响因子的单因子分析和正交试验结果:粉末粒度100目、混合时间15min、干燥温度70℃、干粒粒度12目、干粒含水量3%为生产辣木全生粉末素片合格率最高的工艺参数组合。

  17. Extending Horizon of Materials Processing with Solar Furnace Solar-synthesis of raw material powders (carbides and carbonitrides) and solar-sintering of ceramic powder compacts with novel prospects of introducing unstable chemical species into the reaction system

    Guerra Rosa, L.; Cruz Fernandes, J.


    Solar furnace (SF) yielding high flux of concentrated solar beam has been used for our recent trial syntheses of carbides and carbonitrides of Si and d-group transition metals and, during the course of this series of preliminary work, we encountered several intriguing phenomena which cannot be interpreted in terms of available equilibrium phase relationships. These new evidences seem to indicate still unexploited potentiality of solar furnace as novel type of chemical reactor rather than mere ecological heat source replacing traditional electric furnace. Besides these raw materials powder synthesis experiments, we have been testing also potentiality of SF a reactor for sintering oxide and non-oxide ceramic powders and found that mechanical properties of the solar-sintered specimen were comparable to those of the counterpart manufactured by traditional industrial sintering process. As such, data gathered so far implicate great potentiality of SF as new type of chemical reactor. Introduction of unstable chemical species, such as non-graphitic carbon and NH{sub 3} gas with suppressed degree of dissociation, into the reaction system might further extend the range of producible materials in the SF. Thus, some review is also give concerning recent works involving usage of unstable chemical species emerging from a group of Osaka University. (Author) 35 refs.

  18. [Rapid quantification of total nitrogen and end-point determination of hide melting in manufacturing of donkey-hide gelatin].

    Han, Hai-Fan; Zhang, Lu; Zhang, Yan; Li, Wen-Long; Qu, Hai-Bin


    Hide melting presents itself as one of the most critical processes in the production of donkey-hide gelatin. Here a NIR-based method was established for the rapid analysis of in-process hide melting solutions as well as for end-point determination of this process. Near infrared (NIR) spectra of hide melting solutions were collected in transflective mode. With the contents of total nitrogen determined by the Kjeldahl method as reference values, partial least squares regression (PLSR) was employed to build calibration models between NIR spectra and total nitrogen. Model parameters including wavelength range and PLS factors were optimized to achieve best model performance. Based on the contents of total nitrogen predicted by calibration model, end point of hide melting was determined. The constructed PLS model gave a high correlation coefficient (R2) of 0.991 3 and a root mean square error of prediction (RMSEP) of 0.807 g x L(-1). With the predicted total nitrogen and predefined limit, decisions concerning the proper times of melting were made. This research demonstrated that NIR transflectance spectroscopy could be used to expeditiously determine the contents of total nitrogen which was subsequently chosen as the indictor for determining the end-point of hide melting. The proposed procedure may help avoid unnecessary raw material or energy consumption.

  19. Hide receives the Bowie Medal

    Dickey, Jean O.; Hide, Raymond

    The 1997 William Bowie Medal, given by AGU for outstanding contributions to fundamental geophysics and for unselfish cooperation in research, was presented to Raymond Hide at the AGU Spring Meeting Honor Ceremony on May 28 in Baltimore. The award citation and Hide's response are given here.

  20. Technological, physico-chemical and sensory properties of raw and cooked meat batter incorporated with various levels of cold milled flaxseed powder.

    Yogesh, K; Langoo, B A; Sharma, S K; Yadav, D N


    Flaxseed has been proven for its multidimensional health benefits and can be used for development of emulsion type functional meat products. In view of this the incorporation of cold milled flaxseed powder (FSP) in meat batter at level 1-5 % was investigated. The results revealed that incorporation significantly (P < 0.05) decreased the total fluid release (TFR), fat release (FR) and water release (WR) of raw meat batter. The surface and internal color values were differed significantly (P < 0.05) among treatments at initial as well as during refrigerated storage period. Texture values especially hardness and chewiness values were found less (P < 0.05) in FSP treated samples and textural properties in FSP treated samples were not deteriorated during storage as compared to control samples. Thus incorporation of FSP had some beneficial effects on physico-chemical properties and textural properties which were also stable during storage period. However the redness values and sensory scores were observed less in FSP treated samples.

  1. DNA barcoding for species identification from dried and powdered plant parts: a case study with authentication of the raw drug market samples of Sida cordifolia.

    Vassou, Sophie Lorraine; Kusuma, G; Parani, Madasamy


    The majority of the plant materials used in herbal medicine is procured from the markets in the form of dried or powdered plant parts. It is essential to use authentic plant materials to derive the benefits of herbal medicine. However, establishing the identity of these plant materials by conventional taxonomy is extremely difficult. Here we report a case study in which the species identification of the market samples of Sida cordifolia was done by DNA barcoding. As a prelude to species identification by DNA barcoding, 13 species of Sida were collected, and a reference DNA barcode library was developed using rbcL, matK, psbA-trnH and ITS2 markers. Based on the intra-species and inter-species divergence observed, psbA-trnH and ITS2 were found to be the best two-marker combination for species identification of the market samples. The study showed that none of the market samples belonged to the authentic species, S. cordifolia. Seventy-six per cent of the market samples belonged to other species of Sida. The predominant one was Sida acuta (36%) followed by S. spinosa (20%), S. alnifolia (12%), S. scabrida (4%) and S. ravii (4%). Such substitutions may not only fail to give the expected therapeutic effect, but may also give undesirable effects as in case of S. acuta which contains a 6-fold higher amount of ephedrine compared to the roots of S. cordifolia. The remaining 24% of the samples were from other genera such as Abutilon sp. (8%), Ixonanthes sp., Terminalia sp., Fagonia sp., and Tephrosia sp. (4% each). This observation is in contrast to the belief that medicinal plants are generally substituted or adulterated with closely related species. The current study strongly suggests that the raw drug market samples of herbal medicines need to be properly authenticated before use, and DNA barcoding has been found to be suitable for this purpose. Copyright © 2015 Elsevier B.V. All rights reserved.

  2. Data Hiding in JPEG Images

    Sushil Kumar


    perceptibility [5, 1].We shall use digital images as the cover object in this paper inwhich we embed the hidden information. The challenge ofusing steganography in cover images is to hide as much data aspossible with the least noticeable difference in the stego-image.Steganographic algorithms operate on basically three types ofimages: Raw images (i.e., bmp format, Palette based images(i.e., GIF images and JPEG images. JPEG images areroutinely used in Steganographic algorithms due to the mostpopular lossy image compression method. Usually it is foundthat an algorithm used to hide large amounts of informationtypically result in lower perceptibility (i.e., greater change tothe image appearance and a more robust algorithm result intolower embedding capacity. The JPEG image generation firstdecomposed the input image into a number of 8 x 8 blocks.Then DCT of each block are computed and the resultant DCTcoefficient matrix is quantized using a standard quantizationtable. Finally the inverse DCT of quantized coefficient matrixare evaluated and the final JPEG image is obtained afterrounding the values.

  3. Raw Hide Preservation Using Vacuum under Low Temperature

    Gudro, I


    Doktora darba izstrādātā tēma ir „Jēlādu konservēšana vakuumā zemā temperatūrā”. Darba tēmas izvēle ir saistīta ar apkārtējas vides kvalitātes uzlabošanu tāda ādu rūpnīcas procesa ietvaros kā jēlādu konservēšana un uzglabāšana. Darba ietvaros tika pētīta Latvijas ādu apstrādes rūpnīcu vēsture dažādos laika periodos, tika salīdzināti Latvijas 41/42/43 nomenklatūras grupas importa un eksporta dati laika periodā no 2001. – 2012. gadam, tika izanalizētas, aprakstītas un salīdzinātas dažādas j...

  4. Information Hiding Techniques: A Tutorial Review

    Thampi, Sabu M


    The purpose of this tutorial is to present an overview of various information hiding techniques. A brief history of steganography is provided along with techniques that were used to hide information. Text, image and audio based information hiding techniques are discussed. This paper also provides a basic introduction to digital watermarking.

  5. Integrated Association Rules Complete Hiding Algorithms

    Mohamed Refaat Abdellah


    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  6. 生驼乳和驼乳粉食品安全地方标准的研究%Study on the Local Food Safety Standards of Raw Camel Milk and Camel Milk Powder

    徐敏; 陆东林; 李景芳; 何晓瑞; 叶东东


    The nutriment concentration of Xinjiang Bactrian camel milk is higher than cattle milk and sheep milk, and there is a fully kinds of functional active elements in the camel milk which have higher nutritional value and health function. Set the local food safety standards of raw camel milk and camle milk powder has a great significance for standardizing the camel milk market, improving the camel milk product quality supervision, coordinating relationship between the farms and the ifrms, protecting the legitimate rights and interests of consumers, promoting the healthy and stable development of the camel milk industry. This study introduced the distribution of the camel milk resource and enterprises in Xinjiang, the physical-chemical indexes of the camel milk, the main difference among camel milk, camel milk powder, cattle milk, cattle milk powder, sheep milk, sheep milk powder, the analysis of the inlfuence of the camel’s reproductive characteristics and season to the milk’s quality, the concrete suggestions on the physical-chemical indexes of the local food safety standards of raw camel milk and camle milk powder.%双峰驼乳营养物质浓度显著高于牛羊乳,并含有多种活性功能性成分,具有较高的营养价值和保健作用。制定生驼乳和驼乳粉食品安全地方标准,对规范驼乳和驼乳制品市场、加强产品质量监管、协调牧企关系、保护消费者合法权益、促进驼乳产业健康稳定发展具有重要意义。本文介绍了新疆驼乳资源和企业分布、生驼乳的理化指标、驼乳/驼乳粉和牛羊乳/牛羊乳粉的主要区别;分析了骆驼的繁殖特性和季节因素对驼乳质量的影响;对生驼乳和驼乳粉食品安全地方标准中的理化指标提出了具体建议。

  7. A Block Based Adaptive Video Data Hiding Method Using Forbidden Zone Data Hiding

    Banoth, Rajkumar


    -Data hiding is a process of embedding information into some sort of host media. Especially video data hiding has become an important research topic as it is complex when compared data hiding process in other media. This paper proposes a new method based on erasure correction capability of RA codes...... using forbidden zone data hiding. This method finds suitable host signals that are useful for data hiding. The proposed method also overcomes the problems of frame drop and inserts attacks. The simulation results reveal that this video data hiding framework can be used in data hiding applications...... of the real world. Key Words – RA codes, selective embedding, watermarking, forbidden zone data hiding, simulation, selective embedding, erasure handling, block partitioning...

  8. 原料奶粉及乳饮料中L-羟脯氨酸的含量测定%Determination of L-hydroxyproline in raw milk powder and milk drink

    陈铭中; 钟旭美; 胡洪森


    The method of P-dimethylaminobenzaldehyde spectrophotom etry was used to determine L-hydroxyproline in raw milk powder and milk drink.The result was stable and the recovery rate was high.After hydrolyzed with acid,L-hydroxyproline was released and oxidized by chloramine T.L-hydroxyproline oxide reacted with P-dimethylaminobenzaldehyde and formed red compounds,the absorbance was detected at 580 nm.The method was simple and accurate.Compared with other detecting methods,the expense of it was smaller.It could provide reference for enterprises to detect whether product was adulterated hydrolyzed protein in raw milk powder and milk drink.%采用对二甲氨基苯甲醛分光光度法测定奶粉及乳饮料中L-羟脯氨酸,具有较好的稳定性。奶粉及乳饮料经浓盐酸水解,得到的L-羟脯氨酸经过氯胺T氧化,与对二甲氨基苯甲醛反应生成红色物质,在558nm下测定吸光值。该方法操作简单、准确率高、检测费用相对少,可用于企业奶粉原料掺水解蛋白及产品中是否掺有水解蛋白的检测提供依据。

  9. Linear and Nonlinear Oblivious Data Hiding

    Akansu Ali N


    Full Text Available The majority of the existing data hiding schemes are based on the direct-sequence (DS modulation where a low-power random sequence is embedded into the original cover signal to represent hidden information. In this paper, we investigate linear and nonlinear modulation approaches in digital data hiding. One typical DS modulation algorithm is explored and its optimal oblivious detector is derived. The results expose its poor cover noise suppression as the hiding signature signal always has much lower energy than the cover signal. A simple nonlinear algorithm, called set partitioning, is proposed and its performance is analyzed. Analysis and simulation studies further demonstrate improvements over the existing schemes.

  10. Recent Advances in Information Hiding and Applications

    Huang, Hsiang-Cheh; Jain, Lakhmi; Zhao, Yao


    This research book presents a sample of recent advances in information hiding techniques and their applications. It includes:   Image data hiding scheme based on vector quantization and image graph coloring The copyright protection system for Android platform Reversible data hiding ICA-based image and video watermarking Content-based invariant image watermarking Single bitmap block truncation coding of color images using cat swarm optimization Genetic-based wavelet packet watermarking for copyright protection Lossless text steganography in compression coding Fast and low-distortion capacity acoustic synchronized acoustic-to-acoustic steganography scheme Video watermarking with shot detection

  11. Hiding Information into Palette-Based Image

    WU Hong-tao; ZHU Bo-cheng; YANG Yi-xian


    After pointing out the weakness of the known palette-based image information hiding by palette matrix,a new spacial effective robust information hiding algorithm is proposed,which can resist the operation of ‘select all’,‘copy’,‘paste’ from cover to original,and can resist gently modification the palette matrix,and can resist the image format changed between true color image and palette-based image.The hiding capacity can reach 25% of the number of pixel index matrix.Due to the advisement of information hiding security an update algorithm is proposed at the end of the paper,with the capacity reduced and vision effect increased.

  12. 'Medical Tattoos' Help Hide Surgical Scars

    ... 'Medical Tattoos' Help Hide Surgical Scars Pigments can restore more ... scars from cancer surgeries may benefit from "medical tattoos" that can help restore some of the skin's ...

  13. Hiding robot inertia using resonance.

    Vallery, Heike; Duschau-Wicke, Alexander; Riener, Robert


    To enable compliant training modes with a rehabilitation robot, an important prerequisite is that any undesired human-robot interaction forces caused by robot dynamics must be avoided, either by an appropriate mechanical design or by compensating control strategies. Our recently proposed control scheme of "Generalized Elasticities" employs potential fields to compensate for robot dynamics, including inertia, beyond what can be done using closed-loop force control. In this paper, we give a simple mechanical equivalent using the example of the gait rehabilitation robot Lokomat. The robot consists of an exoskeleton that is attached to a frame around the patient's pelvis. This frame is suspended by a springloaded parallelogram structure. The mechanism allows vertical displacement while providing almost constant robot gravity compensation. However, inertia of the device when the patient's pelvis moves up and down remains a source of large interaction forces, which are reflected in increased ground reaction forces. Here, we investigate an alternative suspension: To hide not only gravity, but also robot inertia during vertical pelvis motion, we suspend the robot frame by a stiff linear spring that allows the robot to oscillate vertically at an eigenfrequency close to the natural gait frequency. This mechanism reduces human-robot interaction forces, which is demonstrated in pilot experimental results.

  14. Fully Traversable Wormholes Hiding Charge

    Guendelman, Eduardo


    The charge-hiding effect by a wormhole, which was studied for the case where gravity/gauge-field system is self-consistently interacting with a charged lightlike brane (LLB) as a matter source, is now studied for the case of a time like brane. From the demand that no surfaces of infinite coordinate time redshift appear in the problem we are lead now to a completly traversable wormhole space, according to not only the traveller that goes through the wormhole (as was the case for the LLB), but also to a static external observer, this requires negative surface energy density for the shell sitting at the throat of the wormhole. We study a gauge field subsystem which is of a special non-linear form containing a square-root of the Maxwell term and which previously has been shown to produce a QCD-like confining gauge field dynamics in flat space-time. The condition of finite energy of the system or asymptotic flatness on one side of the wormhole implies that the charged object sitting at the wormhole throat expels a...

  15. Powdered activated carbon adsorption for water works to cope with the sudden pollution of ethylbenzene in raw water%粉末炭吸附处理给水厂原水突发乙苯污染研究

    林明利; 赵志伟; 崔福义; 牛畅; 汪艳


    In order to improve waterworks' ability of emergency response to ethylbenzene pollution,the efficiency of ethylbenzene adsorption onto PAC was experimentally studied.Bench experiments were conducted to estimate the removal of chlorbenzene by conventional water treatment process and to determine isotherm and kinetics for ethylbenzene adsorption onto powdered activated carbon(PAC).A theoretical formula of PAC dose with initial concentration of ethylbenzene and adsorption time was established and verified by experimental results.The results show that it is difficult for conventional water treatment process to remove ethylbenzene effectively;PAC can adsorb ethylbenzene in raw water rapidly with 80% and 95% of the equilibrium adsorption capacity at 5 min and 30 min,respectively;PAC adsorption is an effective emergency drinking water treatment technology for water works to cope with ethylbenzene sudden pollution in raw water.%为提高城市给水厂应对原水突发乙苯污染的应急处理能力,进行粉末炭(PAC)对水中乙苯的吸附效能研究.通过小试,考察了常规工艺对水中乙苯的去除效果,测定了粉末炭(PAC)对水中乙苯的吸附等温线和吸附动力学曲线.在此基础上,建立了PAC投量与乙苯初始质量浓度和吸附时间之间的数学模型,并通过PAC吸附小试进行了验证.结果表明:常规工艺难以有效去除水中乙苯,向原水投加PAC可快速去除水中乙苯,可作为给水厂应对原水突发乙苯污染的一种有效应急处理技术.

  16. Effect of microbiological characteristics of raw milk on the quality of whole milk powder Efeito das características microbiológicas do leite cru sobre a qualidade do leite em pó integral

    Carlos Augusto Fernandes de Oliveira


    Full Text Available The relationship between microbiological characteristics of raw milk and the quality of high-heat whole powder made from it was investigated. To this end, 16 lots of milk standardized for fat and non-fat solids were used. Powder average levels of mesophiles and psychrotrophs were 7.8 x 10¹ and 4.0 x 10¹ CFU/g, respectively, and these values correlated positively (P Neste trabalho, avaliou-se a relação entre a qualidade do leite em pó integral e os principais parâmetros microbiológicos do leite empregado como matéria-prima, utilizando-se 16 lotes de leite padronizado quanto aos teores de gordura e sólidos não gordurosos. Os níveis médios de microrganismos mesófilos e psicrotróficos do produto em pó foram 7,8 x 10¹ e 4,0 x 10¹ UFC/g, respectivamente, sendo que estes valores estiveram correlacionados significativamente (P < 0,05 com as contagens de mesófilos e psicrotróficos do leite cru (níveis médios de 8,1 x 10(6 e 1,8 x 10(7 UFC/g, respectivamente. Observou-se, também, uma correlação significativa (P < 0,05 entre a contagem de psicrotróficos do leite cru e o teor de acidez titulável do produto em pó, cujos valores variaram de 0,15 a 0,19% (em ácido lático. As amostras de leite em pó produzido a partir de leite cru contendo níveis elevados de psicrotróficos apresentaram maiores índices de insolubilidade, porém, a correlação entre estes parâmetros não foi significativa. Discute-se a importância do controle das condições higiênicas do leite cru, como instrumento fundamental para garantir a qualidade do produto em pó oferecido ao consumo.

  17. Steganography An Art of Hiding Data

    Channalli, Shashikala


    In today's world the art of sending & displaying the hidden information especially in public places, has received more attention and faced many challenges. Therefore, different methods have been proposed so far for hiding information in different cover media. In this paper a method for hiding of information on the billboard display is presented. It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypted streams through statistical tests and capture them for further cryptanalysis. In this paper we propose a new form of steganography, on-line hiding of information on the output screens of the instrument. This method can be used for announcing a secret message in public place. It can be extended to other means such as electronic advertising board around sports stadium, railway station or airport. This method of steganography is very similar to image steganography and video steganography. Pr...

  18. Short term preservation of hide using vacuum: influence on properties of hide and of processed leather.

    Gudro, Ilze; Valeika, Virgilijus; Sirvaitytė, Justa


    The objective of this work was to investigate vacuum influence on hide preservation time and how it affects hide structure. It was established that vacuum prolongs the storage time without hide tissue putrefaction up to 21 days when the storage temperature is 4°C. The microorganisms act for all storage times, but the action is weak and has no observable influence on the quality of hide during the time period mentioned. The hide shrinkage temperature decrease is negligible, which shows that breaking of intermolecular bonds does not occur. Optical microscopy, infrared spectroscopy and differential scanning calorimetry also did not show any structural changes which can influence the quality of leather produced from such hide. The qualitative indexes of wet blue processed under laboratory conditions and of leather produced during industrial trials are presented. Indexes such as chromium compounds exhaustion, content of chromium in leather, content of soluble matter in dichloromethane, strength properties, and shrinkage temperature were determined. Properties of the leather produced from vacuumed hide under industrial conditions conformed to the requirements of shoe upper leather.

  19. Reversible Data Hiding Based on DNA Computing

    Bin Wang


    Full Text Available Biocomputing, especially DNA, computing has got great development. It is widely used in information security. In this paper, a novel algorithm of reversible data hiding based on DNA computing is proposed. Inspired by the algorithm of histogram modification, which is a classical algorithm for reversible data hiding, we combine it with DNA computing to realize this algorithm based on biological technology. Compared with previous results, our experimental results have significantly improved the ER (Embedding Rate. Furthermore, some PSNR (peak signal-to-noise ratios of test images are also improved. Experimental results show that it is suitable for protecting the copyright of cover image in DNA-based information security.

  20. Preparation of biobased sponges from un-tanned hides

    One of our research endeavors to address ongoing challenges faced by the U.S. hide and leather industries is to develop innovative uses and novel biobased products from hides to improve prospective markets and to secure a viable future for hides and leather industries. We had previously investigate...

  1. Hiding an Inconvenient Truth : Lies and Vagueness

    Serra Garcia, M.; van Damme, E.E.C.; Potters, J.J.M.


    When truth conflicts with e¢ ciency, can verbal communication destroy efficiency? Or are lies or vagueness used to hide inconvenient truths? We consider a sequential 2-player public good game in which the leader has private information about the value of the public good. This value can be low, high,

  2. Hiding levitating objects above a ground plane

    Zhang, Jingjing; Luo, Yu; Mortensen, Asger


    An approach to hiding objects levitating above a conducting sheet is suggested in this paper. The proposed device makes use of isotropic negative-refractive-index materials without extreme material parameters, and creates an illusion of a remote conducting sheet. Numerical simulations are perform...

  3. An Approach to Hide Secret Speech Information

    WU Zhi-jun; DUAN Hai-xin; LI Xing


    This paper presented an approach to hide secret speech information in code excited linear prediction(CELP)-based speech coding scheme by adopting the analysis-by-synthesis (ABS)-based algorithm of speech information hiding and extracting for the purpose of secure speech communication. The secret speech is coded in 2.4Kb/s mixed excitation linear prediction (MELP), which is embedded in CELP type public speech. The ABS algorithm adopts speech synthesizer in speech coder. Speech embedding and coding are synchronous, i.e. a fusion of speech information data of public and secret. The experiment of embedding 2.4 Kb/s MELP secret speech in G.728 scheme coded public speech transmitted via public switched telephone network (PSTN) shows that the proposed approach satisfies the requirements of information hiding, meets the secure communication speech quality constraints, and achieves high hiding capacity of average 3.2 Kb/s with an excellent speech quality and complicating speakers' recognition.

  4. Understanding Information Hiding in iOS

    Caviglione, Luca; Mazurczyk, Wojciech


    The Apple operating system (iOS) has so far proved resistant to information-hiding techniques, which help attackers covertly communicate. However, Siri - a native iOS service that controls iPhones and iPads via voice commands - could change this trend.

  5. An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography

    Mukhopadhyay, Debajyoti; Ghosh, Surjya; Biswas, Sudipto; Chakraborty, Poulami


    A crypto system can be used to encrypt messages sent between two communicating parties so that an eavesdropper who overhears the encrypted messages will not be able to decode them. The paper mainly concentrates on the method in which the substitution technique of steganography can been used to hide data in a 24-bit bitmap file. Popular audio hiding techniques based on methods of steganography is also discussed here.

  6. Information Hiding Using Improper Frame Padding

    Jankowski, Bartosz; Szczypiorski, Krzysztof


    Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors' best knowledge it is the first information hiding solution which represents interprotocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication. PadSteg utilizes ARP and TCP protocols together with an Etherleak vulnerability (improper Ethernet frame padding) to facilitate secret communication for hidden groups in LANs (Local Area Networks). Basing on real network traces we confirm that PadSteg is feasible in today's networks and we estimate what steganographic bandwidth is achievable while limiting the chance of disclosure. We also point at possible countermeasures against PadSteg.

  7. Estimation of Information Hiding Algorithms and Parameters


    growing false positives. 15. SUBJECT TERMS Information hiding, reverse-engineering, steganography , steganalysis, watermarking 16. SECURITY...specialist in breaking a covert communication system given very little information. Since it is likely for steganography to be used on very large...multimedia files, e.g. audio and video, there are substantial issues to be addressed on the implementation end of such a system as well as the theoretical

  8. High belite cement from alternative raw materials

    Ghorab, H. Y.; Rizk, M.; Ibrahim, B.; Allam, M. M.


    Three high belite laboratory clinkers were prepared from traditional and alternative raw materials. Reference clinker was obtained from 77% limestone, 11% sandy clays, 11% fatty clays and 1% iron scales. The fatty clays were replaced by red brick powder in the raw meal of the second clinker and were lowered to 2% with the replacement of 10% of the limestone by egg shells in the third clinker. The SEM examination revealed clear presence of crossed striae and twinning in the rounded belite grai...

  9. Acceptability of chicken powder in home prepared complementary ...

    Acceptability of chicken powder in home prepared complementary foods for ... on weight basis according to predetermined proportions of the raw ingredients. ... the chicken powder (an animal source quality protein) in their children's diet, if not ...

  10. S-rough sets and the discovery of F-hiding knowledge


    Singular rough sets (S-rough sets) have three classes of forms: one-directional S-rough sets, dual of one-directional S-rough sets, and two-directional S-rough sets. Dynamic, hereditary, mnemonic, and hiding properties are the basic characteristics of S-rough sets. By using the S-rough sets, the concepts of f-hiding knowledge, F-hiding knowledge, hiding degree, and hiding dependence degree are given. Then, both the hiding theorem and the hiding dependence theorem of hiding knowledge are proposed. Finally, an application of hiding knowledge is discussed.

  11. Synthetic Raw Materials for Refractories in China

    SHIGan; YUEWeidong


    The development and status of synthetic raw materials for refractories in China are reviewed,including magne-site-based materials,alumina ,ullite,calcium alumi-nate cement ,ultrafine powder,spinel,silicon carbide and cordierite.The research work on calcium zirconate and sialon materials are also introduced.




    Full Text Available Heavy metals are metals with high atomic weight which can be deposited in soil, water, plants and animals. It is generally known that mammal tissues are good bioindicators of trace elements, including heavy metals. Heavy metal analysis serves to identify and quantify the elements that are a potential hazard to the consumer after varying levels of contact. Usage area of leather is increasingly expanding in these days and it has also become a material requested and demanded by effect of fashion. Leather must protect its appearance and physical stability and also be problem-free in ecological terms and harmless to human health. There is a lack of data concerning the content of toxic elements in raw hide and skin of animals. Mainly information concerning metals content, including toxic ones, in processed leathers may be found in the literature. The aim of the present study was to review and compare the content of some heavy metals in raw hide, skin and the processed leathers in order to evaluate their accumulation and transition to the end-up product.

  13. Minimax eigenvector decomposition for data hiding

    Davidson, Jennifer


    Steganography is the study of hiding information within a covert channel in order to transmit a secret message. Any public media such as image data, audio data, or even file packets, can be used as a covert channel. This paper presents an embedding algorithm that hides a message in an image using a technique based on a nonlinear matrix transform called the minimax eigenvector decomposition (MED). The MED is a minimax algebra version of the well-known singular value decomposition (SVD). Minimax algebra is a matrix algebra based on the algebraic operations of maximum and addition, developed initially for use in operations research and extended later to represent a class of nonlinear image processing operations. The discrete mathematical morphology operations of dilation and erosion, for example, are contained within minimax algebra. The MED is much quicker to compute than the SVD and avoids the numerical computational issues of the SVD because the operations involved only integer addition, subtraction, and compare. We present the algorithm to embed data using the MED, show examples applied to image data, and discuss limitations and advantages as compared with another similar algorithm.

  14. Augmented Reality Marker Hiding with Texture Deformation.

    Kawai, Norihiko; Sato, Tomokazu; Nakashima, Yuta; Yokoya, Naokazu


    Augmented reality (AR) marker hiding is a technique to visually remove AR markers in a real-time video stream. A conventional approach transforms a background image with a homography matrix calculated on the basis of a camera pose and overlays the transformed image on an AR marker region in a real-time frame, assuming that the AR marker is on a planar surface. However, this approach may cause discontinuities in textures around the boundary between the marker and its surrounding area when the planar surface assumption is not satisfied. This paper proposes a method for AR marker hiding without discontinuities around texture boundaries even under nonplanar background geometry without measuring it. For doing this, our method estimates the dense motion in the marker's background by analyzing the motion of sparse feature points around it, together with a smooth motion assumption, and deforms the background image according to it. Our experiments demonstrate the effectiveness of the proposed method in various environments with different background geometries and textures.

  15. 活性粉末混凝土配合比优化试验研究%Experimental study on the optimization proportions of raw materials of reactive powder concrete

    李宏斌; 白永兵; 郝文秀; 徐晓


    The proportion of reactive powder concrete was studied by using the single factor optimum method, and the factors affecting the flexural strength and compressive strength of reactive powder concrete were analyzed, including the water and binder ratio, superplasticizer and silica fume. Based on the flexural strength,compressive strength,cost and actual construction, the optimum proportions of reactive powder concrete were proposed.%活性粉末混凝土(Reactive Powder concrete,简称RPC)是一种具有超高性能和超高强度的水泥基复合材料.通过活性粉末混凝土(RPC)的配制试验,采用单因素优化方法,系统地研究水胶比、高效减水剂和硅灰的掺量对RPC抗折、抗压强度的影响规律.在考虑强度指标、造价及施工方便的基础上,提出了活性粉末混凝土最优配合比:水胶比(W/B)为0.21,硅灰水泥比(SF/C)为0.21,减水剂(SU/B)为3%.

  16. Enhancement of LSB based Steganography for Hiding Image in Audio

    Pradeep Kumar Singh; R.K.Aggrawal


    In this paper we will take an in-depth look on steganography by proposing a new method of Audio Steganography. Emphasize will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method for data hiding in audio.

  17. Selective Redundancy Removal: A Framework for Data Hiding

    Ugo Fiore


    Full Text Available Data hiding techniques have so far concentrated on adding or modifying irrelevant information in order to hide a message. However, files in widespread use, such as HTML documents, usually exhibit high redundancy levels, caused by code-generation programs. Such redundancy may be removed by means of optimization software. Redundancy removal, if applied selectively, enables information hiding. This work introduces Selective Redundancy Removal (SRR as a framework for hiding data. An example application of the framework is given in terms of hiding information in HTML documents. Non-uniformity across documents may raise alarms. Nevertheless, selective application of optimization techniques might be due to the legitimate use of optimization software not supporting all the optimization methods, or configured to not use all of them.

  18. Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures

    Mazurczyk, Wojciech; Zander, Sebastian; Houmansadr, Amir; Szczypiorski, Krzysztof


    Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background. Information Hiding In Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures begins with introducing data concealment methods and their evolution. Chapter two discusses the existing terminology and describes the model for hidden communication and related communication scenarios. Chapters three to five present the main classes of information hiding in communication networks accompanied by a discussion of their robustness and undetectability. The book concludes with a discussion of potential countermeasures against information hiding techniques, which includes different types of mechanisms for the detection, limitation and prevention of covert co munication channels.

  19. Where is hbar Hiding in Entropic Gravity?

    Chen, Pisin


    The entropic gravity scenario recently proposed by Erik Verlinde reproduced the Newton's law of purely classical gravity yet the key assumptions of this approach all have quantum mechanical origins. This is atypical for emergent phenomena in physics, where the underlying, more fundamental physics often reveals itself as corrections to the leading classical behavior. So one naturally wonders: where is hbar hiding in entropic gravity? To address this question, we first revisit the idea of holographic screen as well as entropy and its variation law in order to obtain a self-consistent approach to the problem. Next we argue that when dealing with quantum gravity issues the generalized uncertainty principle (GUP) should be the more appropriate foundation. Indeed based on GUP it has been demonstrated that the black hole Bekenstein entropy area law must be modified not only in the strong but also in the weak gravity regime. In the weak gravity limit, such a GUP modified entropy exhibits a logarithmic correction term...

  20. Hiding secret data into a carrier image

    Ovidiu COSMA


    Full Text Available The object of steganography is embedding hidden information in an appropriate multimedia carrier, e.g., image, audio, or video. There are several known methods of solving this problem, which operate either in the space domain or in the frequency domain, and are distinguished by the following characteristics: payload, robustness and strength. The payload is the amount of secret data that can be embedded in the carrier without inducing suspicious artefacts, robustness indicates the degree in which the secret data is affected by the normal processing of the carrier e.g., compression, and the strength indicate how easy the presence of hidden data can be detected by steganalysis techniques. This paper presents a new method of hiding secret data into a digital image compressed by a technique based on the Discrete Wavelet Transform (DWT [2] and the Set Partitioning In Hierarchical Trees (SPIHT subband coding algorithm [6]. The proposed method admits huge payloads and has considerable strength.

  1. Hiding Quantum Information in the Perfect Code

    Shaw, Bilal A


    We present and analyze a protocol for quantum steganography where the sender (Alice) encodes her steganographic information into the error syndromes of the perfect (five-qubit) quantum error-correcting code, and sends it to the receiver (Bob) over a depolarizing channel. Alice and Bob share a classical secret key, and hide quantum information in such a way that to an eavesdropper (Eve) without access to the secret key, the quantum message looks like an innocent codeword with a typical sequence of quantum errors. We calculate the average rate of key consumption, and show how the protocol improves in performance as information is spread over multiple codeword blocks. Alice and Bob utilize different encodings to optimize the average number of steganographic bits that they can send to each other while matching the error statistics of the depolarizing channel.

  2. Multimedia Data Hiding and Authentication via Halftoning and Coordinate Projection

    Wu Chai Wah


    Full Text Available We present image data hiding and authentication schemes based on halftoning and coordinate projection. The proposed data hiding scheme can embed images of the same size and similar bit depth into the cover image and robustness against compression is demonstrated. The image authentication scheme is based on the data hiding scheme and can detect, localize, and repair the tampered area of the image. Furthermore, the self-repairing feature of the authentication scheme has a hologram-like quality; any portion of the image can be used to reconstruct the entire image, with a greater quality of reconstruction as the portion size increases.

  3. Mechanical properties of biobased films prepared from collagen solutions derived from bovine hides

    The most valuable byproducts of the meat packing industry are hides. The U.S. is the world’s 3rd largest hide producing country and currently produces approximately 35 million cattle hides annually. Due to fierce competition in global markets, the American leather and hides industry is facing chal...

  4. Hide and New in the Pi-Calculus

    Marco Giunti


    Full Text Available In this paper, we enrich the pi-calculus with an operator for confidentiality (hide, whose main effect is to restrict the access to the object of the communication, thus representing confidentiality in a natural way. The hide operator is meant for local communication, and it differs from new in that it forbids the extrusion of the name and hence has a static scope. Consequently, a communication channel in the scope of a hide can be implemented as a dedicated channel, and it is more secure than one in the scope of a new. To emphasize the difference, we introduce a spy context that represents a side-channel attack and breaks some of the standard security equations for new. To formally reason on the security guarantees provided by the hide construct, we introduce an observational theory and establish stronger equivalences by relying on a proof technique based on bisimulation semantics.

  5. A Data-reversible Hiding Algorithm in WSNs

    Jia CHEN


    Full Text Available In view of the phenomenon that data-hiding algorithm is easy to be detected by inspecting tool SPAM when carrying information, random insertion and histogram modification are adapted in the data hiding. A data-reversible hiding algorithm in WSNs is put forward. By collecting and referring sub-graph, calculating data fusion algorithm that can protect the data’s completion and privacy and analyzing the reversible hiding data algorithm research, the inspection of SPAM. Finally MATLAB7.0 exploitation is adopted to stimulate the analysis of experiment. The result shows that compared with Kim algorithm, the algorithm is safer to prevent the SPAM inspection and is more suitable for information transfer.

  6. Legionnaires' Hiding in Hospital, Nursing Home Plumbing Systems: CDC

    ... gov/news/fullstory_166302.html Legionnaires' Hiding in Hospital, Nursing Home Plumbing Systems: CDC Effective water management, sanitation programs can reduce the risk of exposure to this deadly bacteria To use the sharing ...

  7. A Simple Image Encoding Method with Data Lossless Information Hiding

    Zhi-Hui Wang; Chin-Chen Chang; Ming-Chu Li; Tzu-Chuen Lu


    In this paper, we propose a simple reversible data hiding method in the spatial domain for block truncation coding (BTC) compressed grayscale images. The BTC method compresses a block of a grayscale image to a bitmap and a pair of quantization numbers. The proposed method first embeds secret bits into a block by changing the order of those two quantization numbers. The compression rate is not enlarged by this embedding scheme. To further improve the hiding capacity, the proposed method embeds...

  8. Information hiding techniques for steganography and digital watermarking

    Katzenbeisser, Stefan


    Steganography, a means by which two or more parties may communicate using ""invisible"" or ""subliminal"" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This new book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.Handbook of Information Hiding: Steganography and Watermarking helps you understand steganography, the history of this previously neglected element of cryptography, the

  9. A chaos-based approach for information hiding security

    Bahi, Jacques M.; Guyeux, Christophe


    This paper introduces a new framework for data hiding security. Contrary to the existing ones, the approach introduced here is not based on probability theory. In this paper, a scheme is considered as secure if its behavior is proven unpredictable. The objective of this study is to enrich the existing notions of data hiding security with a new rigorous and practicable one. This new definition of security is based on the notion of topological chaos. It could be used to reinforce the confidence...

  10. Let’s play hide and seek!

    Computer Security Team


    This week, we would like you to play a small online game called “Virtual Hide & Seek”. The rules are simple: some of our colleagues have published some sensitive or confidential documents on CERN’s central services like Indico, CDS, EDMS or TWiki, as well as on our many websites. Your mission, should you choose to accept it: find them!   If you provide us with documents marked “confidential”, “classified”, “sensitive”, or containing plain text operational passwords, you can win a book on computer security. There are only few conditions: these documents must be visible from outside CERN, must not require a CERN account in order to access them, and must not belong to you or have a direct link with your work. Have fun! But seriously, are you sure that your documents are really properly protected? We regularly find confidential documents stored on one of the CERN central  services and w...

  11. Book Review: No Place To Hide

    Gary Kessler


    Full Text Available O'Harrow, R., Jr. (2006. No Place To Hide. New York: Free Press. 352 pages, ISBN: 0-7432-8705-3 (paper, US$26Reviewed by Gary C. Kessler (gary.kessler@champlain.eduPersonal privacy and the protection of personal identifying information are of concern to all of us. Innumerable articles and conferences address our loss of privacy, either through the sale of consumer databases or our own inattention. Opinions vary from "You have no privacy; get over it" to "This is the end of civil liberties as we know them." We teach people to safely maneuver on the Internet and minimize their exposure to bogus sites set up to steal their identity, warn users about the dangers of phishing and posting personal information on social network sites, use firewalls to protect our databases, and enact laws such as the Health Insurance Portability and Accountability Act (HIPAA and the Family Educational Rights and Privacy Act (FERPA to protect information.(see PDF for full review

  12. Food Safety and Raw Milk

    ... and Food Safety Food Safety Modernization Act Raw Milk Recommend on Facebook Tweet Share Compartir RAW MILK ... Decide? Questions & Answers Outbreak Studies Resources & Publications Raw Milk Infographic [PDF – 1 page] More Resources 5 Raw ...

  13. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Andreas Wilke

    Full Text Available Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  14. A Game of Hide and Seek: Expectations of Clumpy Resources Influence Hiding and Searching Patterns.

    Wilke, Andreas; Minich, Steven; Panis, Megane; Langen, Tom A; Skufca, Joseph D; Todd, Peter M


    Resources are often distributed in clumps or patches in space, unless an agent is trying to protect them from discovery and theft using a dispersed distribution. We uncover human expectations of such spatial resource patterns in collaborative and competitive settings via a sequential multi-person game in which participants hid resources for the next participant to seek. When collaborating, resources were mostly hidden in clumpy distributions, but when competing, resources were hidden in more dispersed (random or hyperdispersed) patterns to increase the searching difficulty for the other player. More dispersed resource distributions came at the cost of higher overall hiding (as well as searching) times, decreased payoffs, and an increased difficulty when the hider had to recall earlier hiding locations at the end of the experiment. Participants' search strategies were also affected by their underlying expectations, using a win-stay lose-shift strategy appropriate for clumpy resources when searching for collaboratively-hidden items, but moving equally far after finding or not finding an item in competitive settings, as appropriate for dispersed resources. Thus participants showed expectations for clumpy versus dispersed spatial resources that matched the distributions commonly found in collaborative versus competitive foraging settings.

  15. Alkali-free method of hide preparation for tanning

    V. Valeika


    Full Text Available Usually, beamhouse processes are carried out by varying a medium from strongly alkaline (unhairing-liming up to strongly acid (pickling. This study is designed to develop a preparation of hide for tanning via processes that avoid a sharp change of hide pH. Enzymes active in acid medium are employed for hide unhairing in a buffer system containing 2.5% acetic acid and 0.3% sodium acetate. An oxidative treatment with peracetic acid then allows the complete removal of residual hair and scud. During both processes, unhairing and oxidative treatment, the opening of the derma structure occurs: 13.3-14.6g of non-collagen proteins are removed and amount of dermatan sulphate decreases by 35%. The hide obtained can be chromed directly after the above processes and subsequent treatment with sodium chloride solution omitted conventional pickling. The pH of the hide varies in the range of 8.3-3.7 during the processes of preparation for tanning.

  16. Hiding image to video: A new approach of LSB replacement

    Saurabh Singh,


    Full Text Available Steganography has become great area of interest for researchers as need for secure transaction of information is increasing day by day. Information may be text, image, audio or video. Steganography is a technique in which required information is hided in any other information such that the second information does not change significantly and it appears the same as original. This paper presents a novel approach of hiding image in a video. The proposed algorithm is replacing one LSB of each pixel in video frames. It becomes very difficult for intruder to guess that an image is hidden in the video as individual frames are very difficult to analyze in a video running at 30 frames per second. The process of analysis has been made more difficult by hiding each row of image pixels in multiple frames of the video, so intruder cannot even try to unhide image until he get full video.




    Full Text Available Data communication substructure has become more universal that there is absolutely no favoritism between different types of data in the carry plane of communication with each and every one skilled to carry it through the public data networks. Steganography technique is used to hide or embed data into an image or audio or video. Here the cover object used is an image. In the existing method for hiding and extraction of information from the given image three kinds of algorithm are used, based on its data and index channel of an image. In the proposed system, three kinds of hiding technique are implemented with some modifications in the logic level. Third algorithm is designed using color channels, based on its intensity. This technique would boost up the number of bits embedding in the image. The accomplishment of all the three algorithms are analyzed and the efficient one is taken into consideration while implementing in FPGA.

  18. Capacity bounds and constructions for reversible data-hiding

    Kalker, Ton; Willems, Frans M. J.


    An undesirable side effect of many watermarking and data-hiding schemes is that the host signal into which auxiliary data is embedded is distorted. Finding an optimal balance between the amount of information embedded and the induced distortion is therefore an active field of research. In recent years, with the rediscovery of Costa's seminal paper Writing on Dirty Paper, there has been considerable progress in understanding the fundamental limits of the capacity versus distortion of watermarking and data-hiding schemes. For some applications, however, no distortion resulting from auxiliary data, however small, is allowed. In these cases the use of reversible data-hiding methods provide a way out. A reversible data-hiding scheme is defined as a scheme that allows complete and blind restoration (i.e. without additional signaling) of the original host data. Practical reversible data-hiding schemes have been proposed by Fridrich et al., but little attention has been paid to the theoretical limits. Some first results on the capacity of reversible watermarking schemes have been derived. The reversible schemes considered in most previous papers have a highly fragile nature: in those schemes, changing a single bit in the watermarked data would prohibit recovery of both the original host signal as well as the embedded auxiliary data. It is the purpose of this paper to repair this situation and to provide some first results on the limits of robust reversible data-hiding. Admittedly, the examples provided in this paper are toy examples, but they are indicative of more practical schemes that will be presented in subsequent papers.

  19. Selective adsorption of tannins onto hide collagen fibres

    LIAO; Xuepin(廖学品); LU; Zhongbing(陆忠兵); SHI; Bi(石碧)


    Hide collagen of animals is used to prepare adsorbent material and its adsorption properties to tannins are investigated. It is indicated that the collagen fibres has excellent adsorption selectivity and high adsorption capacity to tannins. The adsorption rate of tannins is more than 90% whilst less than 10% of functional components are retained by the adsorbent. The adsorption mechanism of tannins onto hide collagen fibres is hydrogen-bonding association. Freundlich model can be used to describe the adsorption isotherms, and the pseudo-second-order rate model can be used to describe adsorption kinetics.

  20. Competitively coupled maps for hiding secret visual information

    Vaidelys, M.; Ziaukas, P.; Ragulskis, M.


    A novel digital image hiding scheme based on competitively coupled maps is presented in this paper. Self-organizing patterns produced by an array of non-diffusively coupled nonlinear maps are exploited to conceal the secret. The secret image is represented in the form of a dot-skeleton representation and is embedded into a spatially homogeneous initial state far below the noise level. Self-organizing patterns leak the secret image at a predefined set of system parameters. Computational experiments are used to demonstrate the effectiveness and the security of the proposed image hiding scheme.

  1. Powder Characterization and Optimization for Additive Manufacturing

    Cordova, Laura; Campos, Mónica; Tinga, Tiedo


    Achieving the optimal quality for Additive Manufactured (AM) parts does not only depend on setting the right process parameters. Material feedstock also plays an important role when aiming for high performance products. The metal AM processes that are most applicable to industry, Powder Bed Fusion and Directed Energy Deposition, use metal powder as raw material. Therefore, controlling the quality and correctly characterizing the particles used in the process is a key step to successfully appl...

  2. 9 CFR 95.6 - Untanned hides and skins; importations permitted subject to restrictions.


    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Untanned hides and skins; importations... ENTRY INTO THE UNITED STATES § 95.6 Untanned hides and skins; importations permitted subject to restrictions. Hides or skins offered for importation which do not meet the conditions or requirements of §...

  3. 9 CFR 95.5 - Untanned hides and skins; requirements for unrestricted entry.


    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Untanned hides and skins; requirements... ENTRY INTO THE UNITED STATES § 95.5 Untanned hides and skins; requirements for unrestricted entry. Untanned hides and/or skins of cattle, buffalo, sheep, goats, other ruminants, and swine which do not...

  4. The physical properties, morphology and viscoelasticity of biobased sponges prepared from un-tanned hides

    One of our research endeavors to address ongoing challenges faced by the U.S. hide and leather industries is to develop innovative uses and novel biobased products from hides to improve prospective markets and to secure a viable future for hides and leather industries. We had previously investigate...

  5. The prediction of leather mechanical properties from airborne ultrasonic testing of hides

    High quality, clean, and well-preserved hides are paramount for competitiveness in both domestic and export markets. Currently, hides are visually inspected and ranked for quality and sale price, which is not reliable when hair is present on the hides. Advanced technologies are needed to nondestru...

  6. Performance Analysis of Data Hiding in MPEG-4 AAC Audio

    XU Shuzheng; ZHANG Peng; WANG Pengjun; YANG Huazhong


    A high capacity data hiding technique was developed for compressed digital audio.As perceptual audio coding has become the accepted technology for storage and transmission of audio signals,compressed audio information hiding enables robust,imperceptible transmission of data within audio signals,thus allowing valuable information to be attached to the content,such as the song title,lyrics,composer's name,and artist or property rights related data.This paper describes simultaneous low bitrate encoding and information hiding for highly compressed audio signals.The information hiding is implemented in the quantization process of the audio content which improves robustness,signal quality,and security.The imperceptibility of the embedded data is ensured based on the masking property of the human auditory system (HAS).The robustness and security are evaluated by various attacking algorithms.Tests with an extended MPEG4 advanced audio coding (AAC) encoder confirm that the method is robust to the regular and singular groups method (RS) and sample pair analysis (SPA) attacks as well as other statistical steganalysis method attacks.

  7. DCT Based Secret Image Hiding In Video Sequence

    M. Suresh Kumar


    Full Text Available Internet which is ever more accessible to interference by not with authority people over the World. It is important to bring down a chance of Information being sensed while Transmitting is the major issue these days. To overcome these problems one of the solution is cryptography. There will be no solitude once it is decoded. So hiding data to make it confidential. Copyright is one of the ways for hiding data and it is security for digital media. Its significance and techniques used in executing hiding of data let us see in brief. The existing LSB modification technique as in this approach the bits are randomly distributes the bits of message in image so which will becomes complex for anonymous persons to extract original message information, it opens the gates for loosing important hidden information. Here hiding and extraction method is used for AVI (Audio Video Interleave. As Higher order coefficients maintains Secret message bits. The hidden information will be in the form of gray scale image pixel values. Grayscale value then converted into binary values .The resultant binary values will be assigned to the higher order coefficient values of DCT of AVI video frames. These experiments were successful. We can analyze the results using Mat lab simulation software.

  8. Video Steganography: Text Hiding In Video By LSB Substitution

    Kamred Udham Singh


    Full Text Available The development of high speed computer networks and Internet has increased the easiness of Information Communication. In contrast with Analog media and Digital media provide several different advantages such as high quality, simple editing, high loyalty copying and authenticity. But in the field of data communication this type of development has increased the fear of sneaking the data while sending data from the sender to the receiver. Due to this reason Information Security is main problem of Data Communication. Steganography plays an important role in field of Information Security. Video and images are very common choice for hiding data. It is very important for effective and successful embedding process to select appropriate pixels in the video frames, which are used to store the secret data. We use video based Steganography because of large size and memory requirements. Hiding information in a carrier file we use least significant bit (LSB insertion technique. In Least significant bit (LSB insertion technique, for hiding information we change LSB of video file with the information bits .This paper will focus on hiding information in specific frames of the video and in specific position of the frame by LSB substitution.

  9. Hide And Seek GPS And Geocaching In The Classroom

    Lary, Lynn M.


    In short, geocaching is a high-tech, worldwide treasure hunt (geocaches can now be found in more than 180 countries) where a person hides a cache for others to find. Generally, the cache is some type of waterproof container that contains a log book and an assortment of goodies, such as lottery tickets, toys, photo books for cachers to fill with…

  10. Near Reversible Data Hiding Scheme for images using DCT

    T. Bhaskar


    Full Text Available Certain level of modifications to the original content can be acceptable. These schemes are called nearreversible. It has emerging application in remote sensing. In remote sensing application the image is captured while monitoring the damaged regions in the natural disasters such as tsunami, volcanic eruption, etc. Instead of more alterations to the pixels or coefficients here we go for less alterations , low hiding capacity and complexity that exhibit while reversible data hiding. There exist a few near reversible hiding schemes which address the limitations to the triangular trade-off that exists between capacity, robustness and visual quality characteristics. However, for achieving better vision of image, there is a need for near reversible data hiding schemes. Therefore, the traditional metric PSNR are not sufficient to assess the distorted image when the data is embedded in image for assessing the better visual quality of the image with hidden data we present a HVS based metrics like PSNR-HVS, MSSIM. Using DCT evaluates the overall image quality

  11. PALM and STORM: what hides beyond the Rayleigh limit?

    Henriques, R


    Full Text Available -1 Biotechnol. J. 2009, 4, 846?857 Review PALM and STORM: What hides beyond the Rayleigh limit? Ricardo Henriques1 and Musa M. Mhlanga1,2 1 Gene Expression and Biophysics Unit, Instituto de Medicina Molecular, Faculdade de Medicina Universidade de...

  12. Video Data Hiding for Managing Privacy Information in Surveillance Systems

    Hail MichaelW


    Full Text Available From copyright protection to error concealment, video data hiding has found usage in a great number of applications. In this work, we introduce the detailed framework of using data hiding for privacy information preservation in a video surveillance environment. To protect the privacy of individuals in a surveillance video, the images of selected individuals need to be erased, blurred, or re-rendered. Such video modifications, however, destroy the authenticity of the surveillance video. We propose a new rate-distortion-based compression-domain video data hiding algorithm for the purpose of storing that privacy information. Using this algorithm, we can safeguard the original video as we can reverse the modification process if proper authorization can be established. The proposed data hiding algorithm embeds the privacy information in optimal locations that minimize the perceptual distortion and bandwidth expansion due to the embedding of privacy data in the compressed domain. Both reversible and irreversible embedding techniques are considered within the proposed framework and extensive experiments are performed to demonstrate the effectiveness of the techniques.

  13. Quiz Games as a model for Information Hiding

    Bank, Bernd; Heintz, Joos; Matera, Guillermo; Montana, Jose L.; Pardo, Luis M.; Paredes, Andres Rojas


    We present a general computation model inspired in the notion of information hiding in software engineering. This model has the form of a game which we call quiz game. It allows in a uniform way to prove exponential lower bounds for several complexity problems of elimination theory.

  14. Frequent Itemset Hiding Algorithm Using Frequent Pattern Tree Approach

    Alnatsheh, Rami


    A problem that has been the focus of much recent research in privacy preserving data-mining is the frequent itemset hiding (FIH) problem. Identifying itemsets that appear together frequently in customer transactions is a common task in association rule mining. Organizations that share data with business partners may consider some of the frequent…

  15. Frequent Itemset Hiding Algorithm Using Frequent Pattern Tree Approach

    Alnatsheh, Rami


    A problem that has been the focus of much recent research in privacy preserving data-mining is the frequent itemset hiding (FIH) problem. Identifying itemsets that appear together frequently in customer transactions is a common task in association rule mining. Organizations that share data with business partners may consider some of the frequent…

  16. Joint data-hiding and rate-distortion optimization for H.264/AVC videos

    Lin, Yih-Chuan; Li, Jung-Hong


    We address video data-hiding on the context-adaptive variable-length coding domain of the H.264/AVC standard. It is challenging to maintain a minimum variation of rate-distortion performance when hiding data in compressed videos by slightly modifying one or more transform coefficients of prediction residual data. The fluctuant variation of rate-distortion performance is especially serious in the case of hiding data in H.264/AVC compressed videos due to the thorough use of various prediction modes. Most current video data-hiding schemes concentrate on hiding messages in video intra (I)-frames to mitigate performance degradation at the expense of limited hiding capacity and applicability. Unlike most previous video data-hiding schemes, this paper considers data-hiding schemes on both I- and predicted (P)-frames of videos. We first investigate the possible ways used to suppress the significant degradation of the rate-distortion performance for hiding data in H.264/AVC videos. Based on the investigation, a hybrid video data-hiding scheme is designed to perform the classification of 4×4 residual blocks according to the characteristics of each block and to hide message data differently in each classified block in order to reduce the performance degradation caused by the data-hiding process. The block classification is based on the magnitude of the last non-zero coefficient and the coefficient difference energy of each block to select suitable blocks that are capable of contributing less degradation of coding performance for hiding additional messages. Moreover, the proposed data-hiding algorithm is incorporated with the rate-distortion optimization loop of the H.264/AVC encoder to provide further degradation suppression on the output bit-rate and decoded quality. From experiments on several well-known test videos, it can be seen that the proposed data-hiding scheme demonstrates improved efficiency on video quality and output bit-rate compared to other similar methods.

  17. Dangerous Raw Oysters


    Dr. Duc Vugia, chief of the Infectious Diseases Branch at the California Department of Public Health, discusses the dangers of eating raw oysters.  Created: 8/5/2013 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 8/7/2013.

  18. Optical image hiding based on computational ghost imaging

    Wang, Le; Zhao, Shengmei; Cheng, Weiwen; Gong, Longyan; Chen, Hanwu


    Imaging hiding schemes play important roles in now big data times. They provide copyright protections of digital images. In the paper, we propose a novel image hiding scheme based on computational ghost imaging to have strong robustness and high security. The watermark is encrypted with the configuration of a computational ghost imaging system, and the random speckle patterns compose a secret key. Least significant bit algorithm is adopted to embed the watermark and both the second-order correlation algorithm and the compressed sensing (CS) algorithm are used to extract the watermark. The experimental and simulation results show that the authorized users can get the watermark with the secret key. The watermark image could not be retrieved when the eavesdropping ratio is less than 45% with the second-order correlation algorithm, whereas it is less than 20% with the TVAL3 CS reconstructed algorithm. In addition, the proposed scheme is robust against the 'salt and pepper' noise and image cropping degradations.

  19. Hiding a Realistic Object Using a Broadband Terahertz Invisibility Cloak

    Zhou, Fan; Cao, Wei; Stuart, Colin T; Gu, Jianqiang; Zhang, Weili; Sun, Cheng


    The invisibility cloak has been a long-standing dream for many researchers over the decades. The introduction of transformational optics has revitalized this field by providing a general method to design material distributions to hide the subject from detection. By transforming space and light propagation, a three-dimensional (3D) object is perceived as having a reduced number of dimensions, in the form of points, lines, and thin sheets, making it "undetectable" judging from the scattered field. Although a variety of cloaking devices have been reported at microwave and optical frequencies, the spectroscopically important Terahertz (THz) domain remains unexplored. Moreover, due to the difficulties in fabricating cloaking devices that are optically large in all three dimensions, hiding realistic 3D objects has yet to be demonstrated. Here, we report the first experimental demonstration of a 3D THz cloaking device fabricated using a scalable Projection Microstereolithography process. The cloak operates at a broa...

  20. Steganography Algorithm to Hide Secret Message inside an Image

    Ibrahim, Rosziati


    In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (SIS) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image.

  1. The effect of media on knowledge hiding in entrepreneurial firms

    Labafi, Somayeh; Khajeheian, Datis; Williams, Idongesit


    in a qualitative study. Thematic analysis is used to analyze transcribed interview data from employees in a software company in Iran. The findings of the analysis show that media richness significantly impacts on organizational learning and influences on knowledge hiding behavior in employees. This article...... suggests that entrepreneurs and managers of small firms should provide employees’ access to rich media content as well as established organizational learning as part of their organizational culture........ For this reason, factors that influence on the tendency of employees to expose and use their knowledge would be appreciated by managers of organizations. This paper investigates the effect of the media on knowledge hiding in organizations. The investigation is done with the aid of a conceptual framework...

  2. Robust color image hiding method in DCT domain

    LI Qing-zhong; YU Chen; CHU Dong-sheng


    This paper presents a robust color image hiding method based on YCbCr color system in discrete cosine transform (DCT) domain,which can hide a secret color image behind a public color cover image and is compatible with the international image compression standard of JPEG.To overcome the grave distortion problem in the restored secret image,this paper proposes a new embedding scheme consisting of reasonable partition of a pixel value and sign embedding.Moreover,based on human visual system (HVS) and fuzzy theory,this paper also presents a fuzzy classification method for DCT sub-blocks to realize the adaptive selection of embedding strength.The experimental results show that the maximum distortion error in pixel value for the extracted secret image is ±1.And the color cover image can provide good quality after embedding large amount of data.

  3. Hiding an image in cascaded Fresnel digital holograms

    Shaogeng Deng; Liren Liu; Haitao Lang; Weiqing Pan; Dong Zhao


    @@ A system of two separated computer-generated holograms termed cascaded Fresnel digital holography (CFDH) is proposed and its application to hiding information is demonstrated by a computer simulation experiment. The technique is that the reconstructed image is the result of the wave Fresnel diffractionof two sub-holograms located at different distances from the imaging plane along the illuminating beam. The two sub-holograms are generated by an iterative algorithm based on the projection onto convex sets. In the application to the hiding of optical information, the information to be hidden is encoded into thesub-hologram which is multiplied by the host image in the input plane, the other sub-hologram in the filterplane is used for the deciphering key, the hidden image can be reconstructed in the imaging plane of the CFDH setup.


    Dr. Saad Abdual azize AL_ani


    Full Text Available Digital Images and video encryption play an important role in today’s multimedia world. Many encryption schemes have been proposed to provide a security for digital images. This paper designs an efficient cryptosystem for video. Our method can achieve two goals; the first goal is to design a height security for hiding a data in video, the second goal is to design a computational complexity cryptosystem.

  5. Unitary embedding for data hiding with the SVD

    Bergman, Clifford; Davidson, Jennifer


    Steganography is the study of data hiding for the purpose of covert communication. A secret message is inserted into a cover file so that the very existence of the message is not apparent. Most current steganography algorithms insert data in the spatial or transform domains; common transforms include the discrete cosine transform, the discrete Fourier transform, and discrete wavelet transform. In this paper, we present a data-hiding algorithm that exploits a decomposition representation of the data instead of a frequency-based transformation of the data. The decomposition transform used is the singular value decomposition (SVD). The SVD of a matrix A is a decomposition A= USV' in which S is a nonnegative diagonal matrix and U and V are orthogonal matrices. We show how to use the orthogonal matrices in the SVD as a vessel in which to embed information. Several challenges were presented in order to accomplish this, and we give effective information-hiding using the SVD can be just as effective as using transform-based techniques. Furthermore, different problems arise when using the SVD than using a transform-based technique. We have applied the SVD to image data, but the technique can be formulated for other data types such as audio and video.

  6. Steganographic Techniques of Data Hiding Using Digital Images (Review Paper

    Babloo Saha


    Full Text Available Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography’s goal is to hide the very existence of embedded data so as not to arouse an eavesdropper’s suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance. applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains. It covers and integrates recent research work without going in to much detail of steganalysis, which is the art and science of defeating steganography.Defence Science Journal, 2012, 62(1, pp.11-18, DOI:

  7. High Capacity data hiding using LSB Steganography and Encryption

    Shamim Ahmed Laskar


    Full Text Available The network provides a method of communication to distribute information to the masses. With the growthof data communication over computer network, the security of information has become a major issue.Steganography and cryptography are two different data hiding techniques. Steganography hides messagesinside some other digital media. Cryptography, on the other hand obscures the content of the message. Wepropose a high capacity data embedding approach by the combination of Steganography andcryptography. In the process a message is first encrypted using transposition cipher method and then theencrypted message is embedded inside an image using LSB insertion method. The combination of these twomethods will enhance the security of the data embedded. This combinational methodology will satisfy therequirements such as capacity, security and robustness for secure data transmission over an open channel.A comparative analysis is made to demonstrate the effectiveness of the proposed method by computingMean square error (MSE and Peak Signal to Noise Ratio (PSNR. We analyzed the data hiding techniqueusing the image performance parameters like Entropy, Mean and Standard Deviation. The stego imagesare tested by transmitting them and the embedded data are successfully extracted by the receiver. The mainobjective in this paper is to provide resistance against visual and statistical attacks as well as highcapacity.

  8. Data Hiding Techniques Using Prime and Natural Numbers

    Dey, Sandipan; Bandyopadhyay, Bijoy; Sanyal, Sugata


    In this paper, a few novel data hiding techniques are proposed. These techniques are improvements over the classical LSB data hiding technique and the Fibonacci LSB data-hiding technique proposed by Battisti et al. \\cite{r1}. The classical LSB technique is the simplest, but using this technique it is possible to embed only in first few bit-planes, since image quality becomes drastically distorted when embedding in higher bit-planes. Battisti et al. \\cite{r1} proposed an improvement over this by using Fibonacci decomposition technique and generating a different set of virtual bit-planes all together, thereby increasing the number of bit-planes. In this paper, first we mathematically model and generalize this particular approach of virtual bit-plane generation. Then we propose two novel embedding techniques, both of which are special-cases of our generalized model. The first embedding scheme is based on decomposition of a number (pixel-value) in sum of prime numbers, while the second one is based on decompositi...

  9. Hiding Data in Images Using New Random Technique

    Obaida Mohammad Awad Al-Hazaimeh


    Full Text Available Steganography is the art of hiding the fact that communication is taking place by hiding information in other information. In the field of Data Communication, Steganography play a major role. The transmission of information via the Internet may expose it to detect and theft. Some solution to be discussed is how to passing information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. We focus on the Least Significant Bit (LSB technique which is the most common Steganographic technique is employed in this paper. An improvement to this technique is suggested by randomly inserting the bits of the message in the image to produce more secured system. In this paper, the security goals were enhanced via a proposed cryptosystems to maintain the security on the Cover-image. The proposed solution consists of a simple, but strong to hiding the text data and the human eye would be unable to notice the hidden data in the Stego-image.

  10. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

    Keita Emura


    Full Text Available If there are many displaced workers in a company, then a person who goes for job hunting might not select this company. That is, the number of members who quit is quite negative information. Similarly, in revocable group signature schemes, if one knows (or guesses the number of revoked users (say r, then one may guess the reason behind such circumstances, and it may lead to harmful rumors. However, no previous revocation procedure can achieve hiding r. In this paper, we propose the first revocable group signature scheme, where r is kept hidden, which we call r-hiding revocable group signature. To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.

  11. Function S-rough sets and security-authentication of hiding law

    SHI KaiQuan; ZHAO JianLi


    Function S-rough sets are defined by R-function equivalence class,which have dynamic characteristic.Function S-rough sets have dynamic characteristic,law characteristic and law-hiding characteristic.Function S-rough sets can generate f-hiding law and f-hiding law.By engrafting,crossing,and penetrating between the information security theory and function S-rough sets,the security hiding and the authentication of f-hiding law and f-hiding law are given respectively in this paper.The fusion and share between function S-rough sets and information secu-rity theory is a new research direction of the application of information law in in-formation system.

  12. Review of the Methods for Production of Spherical Ti and Ti Alloy Powder

    Sun, Pei; Fang, Zhigang Zak; Zhang, Ying; Xia, Yang


    Spherical titanium alloy powder is an important raw material for near-net-shape fabrication via a powder metallurgy (PM) manufacturing route, as well as feedstock for powder injection molding, and additive manufacturing (AM). Nevertheless, the cost of Ti powder including spherical Ti alloy has been a major hurdle that prevented PM Ti from being adopted for a wide range of applications. Especially with the increasing importance of powder-bed based AM technologies, the demand for spherical Ti powder has brought renewed attention on properties and cost, as well as on powder-producing processes. The performance of Ti components manufactured from powder has a strong dependence on the quality of powder, and it is therefore crucial to understand the properties and production methods of powder. This article aims to provide a cursory review of the basic techniques of commercial and emerging methods for making spherical Ti powder. The advantages as well as limitations of different methods are discussed.

  13. Hiding message into DNA sequence through DNA coding and chaotic maps.

    Liu, Guoyan; Liu, Hongjun; Kadir, Abdurahman


    The paper proposes an improved reversible substitution method to hide data into deoxyribonucleic acid (DNA) sequence, and four measures have been taken to enhance the robustness and enlarge the hiding capacity, such as encode the secret message by DNA coding, encrypt it by pseudo-random sequence, generate the relative hiding locations by piecewise linear chaotic map, and embed the encoded and encrypted message into a randomly selected DNA sequence using the complementary rule. The key space and the hiding capacity are analyzed. Experimental results indicate that the proposed method has a better performance compared with the competing methods with respect to robustness and capacity.

  14. Advances in food powder agglomeration engineering.

    Cuq, B; Gaiani, C; Turchiuli, C; Galet, L; Scher, J; Jeantet, R; Mandato, S; Petit, J; Murrieta-Pazos, I; Barkouti, A; Schuck, P; Rondet, E; Delalonde, M; Dumoulin, E; Delaplace, G; Ruiz, T


    Food powders are used in everyday life in many ways and offer technological solutions to the problem of food production. The natural origin of food powders, diversity in their chemical composition, variability of the raw materials, heterogeneity of the native structures, and physicochemical reactivity under hydrothermal stresses contribute to the complexity in their behavior. Food powder agglomeration has recently been considered according to a multiscale approach, which is followed in the chapter layout: (i) at the particle scale, by a presentation of particle properties and surface reactivity in connection with the agglomeration mechanisms, (ii) at the mechanisms scale, by describing the structuration dynamics of agglomerates, (iii) at the process scale, by a presentation of agglomeration technologies and sensors and by studying the stress transmission mode in the powder bed, and finally (iv) by an integration of the acquired knowledge, thanks to a dimensional analysis carried out at each scale.

  15. Pragmatics of Raw Art

    Wilson, Alexander


    . The concepts of raw art and outsider art were typical of a time when oppositional politics still infused artistic and academic discourses. But modernity seems to have ‘grown out’ of its adolescence, so to speak: out of politics of opposition and absolutes. Of course, it is neither desirable nor possible...... to return to the oppositional dynamics and binary divisions of yesterday, now that we have crossed this paradigmatic threshold. But the schizoanalytic stance may offer us another view of the emerging paradigm. It affords different tools of interpretation and suggests ways artists may grow out of modernity...

  16. Effects of extrusion cooking on the chemical composition and functional properties of dry common bean powders.

    Ai, Yongfeng; Cichy, Karen A; Harte, Janice B; Kelly, James D; Ng, Perry K W


    The impact of extrusion cooking on the chemical composition and functional properties of bean powders from four common bean varieties was investigated. The raw bean powders were extruded under eight different conditions, and the extrudates were then dried and ground (particle size⩽0.5mm). Compared with corresponding non-extruded (raw) bean powders (particle size⩽0.5mm), the extrusion treatments did not substantially change the protein and starch contents of the bean powders and showed inconsistent effects on the sucrose, raffinose and stachyose contents. The extrusion cooking did cause complete starch gelatinization and protein denaturation of the bean powders and thus changed their pasting properties and solvent-retention capacities. The starch digestibilities of the cooked non-extruded and cooked extruded bean powders were comparable. The extruded bean powders displayed functional properties similar to those of two commercial bean powders. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Sha Edwin Hsing-Mean


    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  18. A New Images Hiding Scheme Based on Chaotic Sequences

    LIU Nian-sheng; GUO Dong-hui; WU Bo-xi; Parr G


    We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of covert image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit).

  19. Text Hiding Based on True Color Image Classification

    Shahd Abdul-Rhman Hasso


    In this work a new approach was built to apply k-means algorithm on true colored images (24bit images) which are usually treated by researchers as three image (RGB) that are classified to 15 class maximum only. We find the true image as 24 bit and classify it to more than 15 classes. As we know k-means algorithm classify images to many independent classes or features and we could increase the class number therefore we could hide information in the classes or features that have minimum number ...

  20. Approaches to Computer Modeling of Phosphate Hide-Out.


    phosphate acts as a buffer to keep pH at a value above which acid corrosion occurs . and below which caustic corrosion becomes significant. Difficulties are...ionization of dihydrogen phosphate : HIPO - + + 1PO, K (B-7) H+ + - £Iao 1/1, (B-8) H , PO4 - + O- - H0 4 + H20 K/Kw (0-9) 19 * Such zero heat...OF STANDARDS-1963-A +. .0 0 0 9t~ - 4 NRL Memorandum Report 5361 4 Approaches to Computer Modeling of Phosphate Hide-Out K. A. S. HARDY AND J. C

  1. Data Security by Preprocessing the Text with Secret Hiding

    Ajit Singh


    Full Text Available With the advent of the Internet, an open forum, the massive increase in the data travel across networkmake an issue for secure transmission. Cryptography is the term that involves many encryption method to make data secure. But the transmission of the secure data is an intricate task. Steganography here comes with effect of transmission without revealing the secure data. The research paper provide the mechanism which enhance the security of data by using a crypto+stegano combination to increase the security level without knowing the fact that some secret data is sharing across networks. In the firstphase data is encrypted by manipulating the text using the ASCII codes and some random generated strings for the codes by taking some parameters. Steganography related to cryptography forms the basisfor many data hiding techniques. The data is encrypted using a proposed approach and then hide the message in random N images with the help of perfect hashing scheme which increase the security of the message before sending across the medium. Thus the sending and receiving of message will be safe and secure with an increased confidentiality.

  2. A Study of Various Steganographic Techniques Used for Information Hiding



    Full Text Available The art of information hiding has received much att ention in the recent years as security of informati on has become a big concern in this internet era. As shari ng of sensitive information via a common communicat ion channel has become inevitable, Steganography – the art and science of hiding information has gained much attention. We are also surrounded by a world of secret communi cation, where people of all types are transmitting information as innocent as an encrypte d credit card number to an online-store and as insidious as a terrorist plot to hijackers. Stegano graphy derives from the Greek word steganos, meanin g covered or secret, and graphy (writing or drawing [1]. Steganography is a technology where modern da ta compression, information theory, spread spectrum, a nd cryptography technologies are brought together t o satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various tec hniques used in steganography and to identify areas in which thi s technique can be applied, so that the human race can be benefited at large

  3. A Novel Image Data Hiding Scheme with Diamond Encoding

    Wu Hsien-Chu


    Full Text Available A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The proposed method is the extension of the exploiting modification direction (EMD embedding scheme. First, the process of embedding partitions the cover image into nonoverlapping blocks of two consecutive pixels and transforms the secret messages to a series of -ary digits. For each block, the diamond encoding technique is applied to calculate the diamond characteristic value, and one secret -ary digit is concealed into the diamond characteristic value. The diamond characteristic value is modified to secret digit and it can be obtained by adjusting pixel values in a block. This scheme is designed in such a way that the distortion of each block after diamond encoding is never out of the embedding parameter , and the block capacity is equal to . The diamond encoding provides an easy way to produce a more perceptible result than those yielded by simple least-significant-bit substitution methods. The embedded secret data can be extracted without the original cover image. Experimental results have demonstrated that the proposed method is capable of hiding more secret data while keeping the stego-image quality degradation imperceptible.

  4. Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography

    Ganesh, Vijay; Rinard, Martin


    We propose a novel approach to improving software security called Cryptographic Path Hardening, which is aimed at hiding security vulnerabilities in software from attackers through the use of provably secure and obfuscated cryptographic devices to harden paths in programs. By "harden" we mean that certain error-checking if-conditionals in a given program P are replaced by equivalent" we mean that adversaries cannot use semi-automatic program analysis techniques to reason about the hardened program paths and thus cannot discover as-yet-unknown errors along those paths, except perhaps through black-box dictionary attacks or random testing (which we can never prevent). Other than these unpreventable attack methods, we can make program analysis aimed at error-finding "provably hard" for a resource-bounded attacker, in the same sense that cryptographic schemes are hard to break. Unlike security-through-obscurity, in Cryptographic Path Hardening we use provably-secure crypto devices to hide errors and our mathemati...

  5. Error Concealment using Data Hiding in Wireless Image Transmission

    A. Akbari


    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  6. A secure and robust information hiding technique for covert communication

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.


    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  7. 9 CFR 95.24 - Methods for disinfection of hides, skins, and other materials.


    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Methods for disinfection of hides... ENTRY INTO THE UNITED STATES § 95.24 Methods for disinfection of hides, skins, and other materials... subjected to disinfection by methods found satisfactory and approved from time to time by the Deputy...

  8. A method for removing adobe-type manure from hides using an oxidizing agent

    Adobe-type (hardened) manure attached to bovine hair is a major source of meat contamination, hide quality deterioration, and devalued leather products. Therefore, it is important to develop cleaning solutions that can rapidly remove adobe-type manure to improve the quality of hides delivered to tan...

  9. Tactical deception to hide sexual behaviour : macaques use distance, not visibility

    Overduin-de Vries, A. M.; Spruijt, B. M.; de Vries, H.; Sterck, E. H. M.


    Although tactical deception (TD) may be employed to hide sexual behaviour, there is as yet no firm evidence for it. Hiding may be guided by cognitive mechanisms consistent with either no, low or high level TD, such as exploiting male peripheral positions (no TD), creating distance (TD level 1) or hi

  10. A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement

    Khushboo Lapa Patwari


    Full Text Available In present world demand of high quality images, security of the information on internet is one of the most important issues of research. Data hiding is a method of hiding a useful information by embedding it on another image (cover image to provide security and only the authorize person is able to extract the original information from the embedding data. This paper is a review which describes several different algorithms for Reversible Data Hiding (RDH. Previous literature has shown that histogram modification, histogram equalization (HE and interpolation are the most common methods for data hiding. To improve security these methods are used in encrypted images. This paper is a comprehensive study of all the major reversible data hiding approaches implemented as found in the literature.

  11. Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography

    Sarmah, Dipti Kapoor


    Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptography techniques available; among them AES is one of the most powerful techniques. In Steganography we have various techniques in different domains like spatial domain, frequency domain etc. to hide the message. It is very difficult to detect hidden message in frequency domain and for this domain we use various transformations like DCT, FFT and Wavelets etc. In this project we are developing a system where we develop a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module. In Cryptography we are using AES algorithm to encrypt a message and a part of the message is hidden in DCT of an image; remaining part of the message is used to generate two secret keys which make this system highly secured. Keyword: Cryptography, Steganography, S...

  12. [Biological value of protein from raw fish and canned fish].

    Ganoviak, Z M; Lipka, E M


    The authors evaluated the nutritive value of protein from 4 kinds of raw fish (herring, cod, mackerel, sprat) and its preserves. Experiments were made on rats fed the diets containing fish protein (8-10% of the total diet). Experiments included the determination of apparent and genuine digestibility, net protein utilization, and net dietary protein caloric value. Evidence was obtained that protein from fish and its preserves is characterized by high digestibility coefficient as compared with casein and egg powder. The highest net protein utilization was noted in animal groups fed the diet containing protein from raw fish. Protein assimilability from fish preserves was on the average 15% lower than that from raw fish.

  13. Mother-young recognition in goitered gazelle during hiding period.

    Blank, D A; Yang, W


    The mother-young recognition process is crucial for the growth and survival of progeny. In "follower" ungulate species, vocal and visual cues have been found to play a leading role in the mother-young identification process from the first days postpartum, with olfactory cues also important in establishing the initial selective mother-young bond immediately after birth. In "hider" species, however, much less has been documented of mother-young recognition behaviors, especially in their natural habitat. In this paper, we investigated this process in goitered gazelle (Gazella subgutturosa), a typical hider species, in its native environment in Kazakhstan. Over the course of our study period, we investigated the behaviors of 257 females with twins and 158 females with singles through visual observations. We found that within the first month after birth, when females spend only a short time with their young, mothers recognized their fawns using mostly olfactory cues, while vision was used to locate their hiding offspring. Fawns vocalized very rarely, producing only distress calls that did not seem intended for individual identification. Licking of young by their mothers was observed frequently, not only during the first week after birth, when this action was very important for fawn stimulation for a number of physiological functions, but for several weeks after (until one month of age), when licking lost its physiological importance and likely became more of a recognition procedure. Fawns did not recognize their mothers at all, either through vision or vocalizations, since during their first weeks after birth, they responded to any gazelle that approached their hiding area. By a month after birth, when mothers and fawns began to stay together for longer periods of time, their recognition process became more enhanced, and in addition to olfactory cues, the mother and her young began to use more and more visual cues for longer distance identification, as well as

  14. Effect of composition on physical properties of food powders

    Szulc, Karolina; Lenart, Andrzej


    The paper presents an influence of raw material composition and technological process applied on selected physical properties of food powders. Powdered multi-component nutrients were subjected to the process of mixing, agglomeration, coating, and drying. Wetting liquids ie water and a 15% water lactose solution, were used in agglomeration and coating. The analyzed food powders were characterized by differentiated physical properties, including especially: particle size, bulk density, wettability, and dispersibility. The raw material composition of the studied nutrients exerted a statistically significant influence on their physical properties. Agglomeration as well as coating of food powders caused a significant increase in particle size, decreased bulk density, increased apparent density and porosity, and deterioration in flowability in comparison with non-agglomerated nutrients.

  15. Hiding Secret Information in Movie Clip: A Steganographic Approach

    Sahoo, G


    Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the internet. One of the key methods for establishing hidden communication is steganography. Modern day steganography mainly deals with hiding information within files like image, text, html, binary files etc. These file contains small irrelevant information that can be substituted for small secret data. To store a high capacity secret data these carrier files are not very supportive. To overcome the problem of storing the high capacity secret data with the utmost security fence, we have proposed a novel methodology for concealing a voluminous data with high levels of security wall by using movie clip as a carrier file.

  16. An efficient steganography method for hiding patient confidential information.

    Al-Dmour, Hayat; Al-Ani, Ahmed; Nguyen, Hung


    This paper deals with the important issue of security and confidentiality of patient information when exchanging or storing medical images. Steganography has recently been viewed as an alternative or complement to cryptography, as existing cryptographic systems are not perfect due to their vulnerability to certain types of attack. We propose in this paper a new steganography algorithm for hiding patient confidential information. It utilizes Pixel Value Differencing (PVD) to identify contrast regions in the image and a Hamming code that embeds 3 secret message bits into 4 bits of the cover image. In order to preserve the content of the region of interest (ROI), the embedding is only performed using the Region of Non-Interest (RONI).

  17. Analysis Of Aspects Of Messages Hiding In Text Environments

    Afanasyeva Olesya


    Full Text Available In the work are researched problems, which arise during hiding of messages in text environments, being transmitted by electronic communication channels and the Internet. The analysis of selection of places in text environment (TE, which can be replaced by word from the message is performed. Selection and replacement of words in the text environment is implemented basing on semantic analysis of text fragment, consisting of the inserted word, and its environment in TE. For implementation of such analysis is used concept of semantic parameters of words coordination and semantic value of separate word. Are used well-known methods of determination of values of these parameters. This allows moving from quality level to quantitative level analysis of text fragments semantics during their modification by word substitution. Invisibility of embedded messages is ensured by providing preset values of the semantic cooperation parameter deviations.

  18. Reversible Data Hiding In Encrypted Images Using Improved Encryption Technique

    Balika J. Chelliah


    Full Text Available Recently more and more attention is paid to reversible data hiding (RDH in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content‟s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be some errors on data extraction and/or image restoration. In this paper we propose a different scheme which attains real reversibility by reserving room before encryption with a traditional RDH algorithm, and then encrypting the data and embedding the data in the encrypted image, which is encrypted using a new proposed algorithm. The proposed method can achieve real reversibility that is data extraction and image recoveries are free of any error.

  19. Reversible Data Hiding In Encrypted Images Using Improved Encryption Technique

    Mr. Balika J. Chelliah


    Full Text Available Recently more and more attention is paid to reversible data hiding (RDH in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content‟s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may be some errors on data extraction and/or image restoration. In this paper we propose a different scheme which attains real reversibility by reserving room before encryption with a traditional RDH algorithm, and then encrypting the data and embedding the data in the encrypted image, which is encrypted using a new proposed algorithm. The proposed method can achieve real reversibility that is data extraction and image recoveries are free of any error.

  20. A Security Enhanced Robust Steganography Algorithm for Data Hiding

    Siddharth Singh


    Full Text Available In this paper, a new robust steganography algorithm based on discrete cosine transform (DCT, Arnold transform and chaotic system is proposed. The chaotic system is used to generate a random sequence to be used for spreading data in the middle frequency band DCT coefficient of the cover image. The security is further enhanced by scrambling the secret data using Arnold Cat map before embedding. The recovery process is blind. A series of experiments is conducted to prove the security and robustness of the proposed algorithm. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression, addition of noise, low pass filtering and cropping attacks as compared to other existing algorithms for data hiding in the DCT domain.

  1. Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

    Alawi A. Al-Saggaf


    Full Text Available By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS, in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statistical hiding (the advisory gets almost no statistically advantages about the secret message. The efficiency of our scheme offers different security assurance, and the trusted third party is not involved in the exchange of commitment.The characteristic of our scheme makes it useful for biometrics systems. If the biometrics template is compromised, then there is no way to use it directly again even in secure biometrics systems. This paper combines biometrics and OFCS to achieve biometric protection scheme using smart cards with renewability of protected biometrics template property.

  2. Accountable Metadata-Hiding Escrow: A Group Signature Case Study

    Kohlweiss Markulf


    Full Text Available A common approach to demands for lawful access to encrypted data is to allow a trusted third party (TTP to gain access to private data. However, there is no way to verify that this trust is well placed as the TTP may open all messages indiscriminately. Moreover, existing approaches do not scale well when, in addition to the content of the conversation, one wishes to hide one’s identity. Given the importance of metadata this is a major problem. We propose a new approach in which users can retroactively verify cryptographically whether they were wiretapped. As a case study, we propose a new signature scheme that can act as an accountable replacement for group signatures, accountable forward and backward tracing signatures.

  3. Universal Steganalysis of Data Hiding in Grayscale Images

    HUANG Ji-feng; LIN Jia-jun


    This paper proposed an universal steganalysis program based on quantification attack which can detect several kinds of data hiding algorithms for grayscale images. In practice, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Attacking the suspicious images using the quantization method, we can obtain statistically different from embedded-and-quantization attacked images and from quantization attacked-but-not-embedded sources. We have developed a technique based on one-class SVM for discriminating between cover-images and stego-images. Simulation results show our approach is able to distinguish between cover and stego images with reasonable accuracy.

  4. A Lossless Data Hiding Technique based on AES-DWT

    Gustavo Fernandaacute;ndez Torres2


    Full Text Available In this paper we propose a new data hiding technique. The new technique uses steganography and cryptography on images with a size of 256x256 pixels and an 8-bit grayscale format. There are design restrictions such as a fixed-size cover image, and reconstruction without error of the hidden image. The steganography technique uses a Haar-DWT (Discrete Wavelet Transform with hard thresholding and LSB (Less Significant Bit technique on the cover image. The algorithms used for compressing and ciphering the secret image are lossless JPG and AES, respectively. The proposed technique is used to generate a stego image which provides a double type of security that is robust against attacks. Results are reported for different thresholds levels in terms of PSNR.

  5. Mechanochemical production of lignin-containing powder fuels from biotechnical industry waste: A review

    Lomovsky Oleg


    Full Text Available In biotechnological processing of plant raw materials, carbohydrates that are soluble and accessible for microorganisms are the only usable components. The lignin-rich part of the plant raw materials usually ends up in the waste. Lignin transferred into water suspensions cannot be used efficiently as a fuel. In this review, a new processing scheme of plant raw materials is presented, which includes mechanochemical treatment of the plant raw materials and separation of the powder product into particles of lignified and non-lignified tissues rich in lignin and cellulose, respectively. The cellulose-rich powders can then be used in biotechnological processes. Lignin-rich powder aerodynamically separated using cyclone-type apparatus can be used as a powder fuel to satisfy the needs of the main biotechnological plant in heat and steam.

  6. Development of fish protein powder as an ingredient for food applications: a review

    Shaviklo, Amir Reza


    ... for developing fish protein ingredient from different raw materials. Fish protein powder (FPP) is a dried and stable fish product, intended for human consumption, in which the protein is more concentrated than in the original fish flesh...

  7. Multi-Bit Data Hiding Scheme for Compressing Secret Messages

    Wen-Chung Kuo


    Full Text Available The goal of data hiding techniques usually considers two issues, embedding capacity and image quality. Consequently, in order to achieve high embedding capacity and good image quality, a data hiding scheme combining run-length encoding (RLE with multi-bit embedding is proposed in this paper. This work has three major contributions. First, the embedding capacity is increased 62% because the secret message is compressed before embedding into the cover image. Secondly, the proposed scheme keeps the multi-bit generalized exploiting modification direction (MGEMD characteristics, which are effective to reduce modified pixels in the cover image and to maintain good stego image quality. Finally, the proposed scheme can prevent modern steganalysis methods, such as RS steganalysis and SPAM (subtractive pixel adjacency matrix, and is compared to MiPOD (minimizing the power of the optimal detector scheme. From our simulation results and security discussions, we have the following results: First, there are no perceivable differences between the cover images and stego images from human inspection. For example, the average PSNR of stego images is about 44.61 dB when the secret message (80,000 bits is embedded for test cover images (such as airplane, baboon, Lena of size 512×512. Secondly, Appl. Sci. 2015, 5 1034 on average, 222,087 pixels were not modified after embedding for the cover image. That is to say, 12% less pixels are modified as compared to the MGEMD method. From the performance discussions, the proposed scheme achieves high embedding capacity and good image quality, but also maintains stego image security.

  8. Recent analytical developments for powder characterization

    Brackx, E.; Pages, S.; Dugne, O.; Podor, R.


    Powders and divided solid materials are widely represented as finished or intermediary products in industries as widely varied as foodstuffs, cosmetics, construction, pharmaceuticals, electronic transmission, and energy. Their optimal use requires a mastery of the transformation process based on knowledge of the different phenomena concerned (sintering, chemical reactivity, purity, etc.). Their modelling and understanding need a prior acquisition of sets of data and characteristics which are more or less challenging to obtain. The goal of this study is to present the use of different physico-chemical characterization techniques adapted to uranium-containing powders analyzed either in a raw state or after a specific preparation (ionic polishing). The new developments touched on concern dimensional characterization techniques for grains and pores by image analysis, chemical surface characterization and powder chemical reactivity characterization. The examples discussed are from fabrication process materials used in the nuclear fuel cycle.

  9. Sensitive plant (Mimosa pudica) hiding time depends on individual and state.

    Reed-Guy, Sarah; Gehris, Connor; Shi, Meng; Blumstein, Daniel T


    The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  10. Sensitive plant (Mimosa pudica hiding time depends on individual and state

    Sarah Reed-Guy


    Full Text Available The decisions animals make to adjust their antipredator behavior to rapidly changing conditions have been well studied. Inducible defenses in plants are an antipredator behavior that acts on a longer time scale, but sensitive plants, Mimosa pudica, have a much more rapid antipredator response; they temporarily close their leaves when touched. The time they remain closed is defined as hiding time. We studied hiding time in sensitive plants and found that individual plants differed significantly in their hiding times. We then showed that the effect of individual explained substantial variation in hiding time on a short time scale. Finally, on a longer time scale, individuality persisted but the amount of variation attributed to individual decreased. We hypothesized that variation in plant condition might explain this change. We therefore manipulated sunlight availability and quantified hiding time. When deprived of light for 6 h, sensitive plants significantly shortened their hiding times. But when only half a plant was deprived of light, hiding times on the deprived half and light exposed half were not significantly different. This suggests that overall condition best explains variation in sensitive plant antipredator behavior. Just like in animals, sensitive plant antipredator behavior is condition dependent, and, just like in animals, a substantial amount of the remaining variation is explained by individual differences between plants. Thus, models designed to predict plasticity in animal behavior may be successfully applied to understand behavior in other organisms, including plants.

  11. Fabrication of ZrC–SiC composites using zirconium salt as raw materials

    Yan Ma


    Full Text Available A ZrC–SiC matrix was fabricated by means of in situ reaction method, using zirconium salt, silicon powder and phenolic resin as raw materials. The performances of zirconium salt determined the possibility of ZrC–SiC matrix fabricated using them. The reactions were completed at a relatively low temperature (∼1500 °C. With this concept to produce a ZrC–SiC matrix costs can be reduced. Three-dimensional needle Cf/ZrC–SiC composites were successfully fabricated via the polymer infiltration and pyrolysis (PIP process using zirconium salt, silicon powder and phenolic resin as raw materials.

  12. Intra-raw material variability and use-wear accrual: A continuing exploration

    Harry Joseph Lerner


    Full Text Available This paper presents the latest results of an ongoing research initiative into the role of lithic raw material variability in use-wear formation. The present study continues recent exploration of wear formation associated with working dry hide. The work presented here expands on a recently published study of two raw materials from the American Southwest [San Juan Fossiliferous Chert (SJF and Yellow Silicified Wood (YSW] (Lerner, In Press by presenting the analysis of two additional materials [Morrison Undifferentiated Gray Chert (MUG and Brushy Basin Silicified Siltstone (BB] using the same quantitative measures from the previous study (area percent, density, average intensity. The methods used have broad geographic and temporal applicability, thus the potential for contributing to greater standardization in the quantification of archaeological use-wear. 

  13. Aluminum powder metallurgy processing

    Flumerfelt, J.F.


    The objective of this dissertation is to explore the hypothesis that there is a strong linkage between gas atomization processing conditions, as-atomized aluminum powder characteristics, and the consolidation methodology required to make components from aluminum powder. The hypothesis was tested with pure aluminum powders produced by commercial air atomization, commercial inert gas atomization, and gas atomization reaction synthesis (GARS). A comparison of the GARS aluminum powders with the commercial aluminum powders showed the former to exhibit superior powder characteristics. The powders were compared in terms of size and shape, bulk chemistry, surface oxide chemistry and structure, and oxide film thickness. Minimum explosive concentration measurements assessed the dependence of explosibility hazard on surface area, oxide film thickness, and gas atomization processing conditions. The GARS aluminum powders were exposed to different relative humidity levels, demonstrating the effect of atmospheric conditions on post-atomization processing conditions. The GARS aluminum powders were exposed to different relative humidity levels, demonstrating the effect of atmospheric conditions on post-atomization oxidation of aluminum powder. An Al-Ti-Y GARS alloy exposed in ambient air at different temperatures revealed the effect of reactive alloy elements on post-atomization powder oxidation. The pure aluminum powders were consolidated by two different routes, a conventional consolidation process for fabricating aerospace components with aluminum powder and a proposed alternative. The consolidation procedures were compared by evaluating the consolidated microstructures and the corresponding mechanical properties. A low temperature solid state sintering experiment demonstrated that tap densified GARS aluminum powders can form sintering necks between contacting powder particles, unlike the total resistance to sintering of commercial air atomization aluminum powder.

  14. Use of basaltic waste as red ceramic raw material

    T. M. Mendes

    Full Text Available Abstract Nowadays, environmental codes restrict the emission of particulate matters, which result in these residues being collected by plant filters. This basaltic waste came from construction aggregate plants located in the Metropolitan Region of Londrina (State of Paraná, Brazil. Initially, the basaltic waste was submitted to sieving (< 75 μm and the powder obtained was characterized in terms of density and particle size distribution. The plasticity of ceramic mass containing 0%, 10%, 20%, 30%, 40% and 50% of basaltic waste was measured by Atterberg method. The chemical composition of ceramic formulations containing 0% and 20% of basaltic waste was determined by X-ray fluorescence. The prismatic samples were molded by extrusion and fired at 850 °C. The specimens were also tested to determine density, water absorption, drying and firing shrinkages, flexural strength, and Young's modulus. Microstructure evaluation was conducted by scanning electron microscopy, X-ray diffraction, and mercury intrusion porosimetry. Basaltic powder has similar physical and chemical characteristics when compared to other raw materials, and contributes to ceramic processing by reducing drying and firing shrinkage. Mechanical performance of mixtures containing basaltic powder is equivalent to mixtures without waste. Microstructural aspects such as pore size distribution were modified by basaltic powder; albite phase related to basaltic powder was identified by X-ray diffraction.


    Tong Ming; Hao Chongyang; Liu Xiaojun; Chen Yanpu


    Hiding efficiency of traditional audio information hiding methods is always low since the sentience similarity cannot be guaranteed. A new audio information hiding method is proposed in this letter which can impose the insensitivity with the audio phase for auditory and realize the information hiding through specific algorithm in order to modify local phase within the auditory perception. The algorithm is to introduce the operation of "set 1" and "set 0" for every phase vectors, then the phases must lie on the boundary of a phase area after modified. If it lies on "1" boundary, it comes by set 1 operation. If it lies on "0" boundary, it comes by set 0 operation. The results show that, compared with the legacy method, the proposed method has better auditory similarity, larger information embedding capacity and lower code error rate. As a kind of blind detect method, it fits for application scenario without channel interference.

  16. A Blind High-Capacity Wavelet-Based Steganography Technique for Hiding Images into other Images

    HAMAD, S.


    Full Text Available The flourishing field of Steganography is providing effective techniques to hide data into different types of digital media. In this paper, a novel technique is proposed to hide large amounts of image data into true colored images. The proposed method employs wavelet transforms to decompose images in a way similar to the Human Visual System (HVS for more secure and effective data hiding. The designed model can blindly extract the embedded message without the need to refer to the original cover image. Experimental results showed that the proposed method outperformed all of the existing techniques not only imperceptibility but also in terms of capacity. In fact, the proposed technique showed an outstanding performance on hiding a secret image whose size equals 100% of the cover image while maintaining excellent visual quality of the resultant stego-images.

  17. An evaluation of selected methods for the decontamination of cattle hides prior to skinning.

    Small, A; Wells-Burr, B; Buncic, S


    The effectiveness of different decontamination treatments in reducing microbial loads on cattle hides was assessed. The 10-s hide treatments were conducted using a wet-and-dry vacuum cleaner filled with one of the liquids (heated to 50 °C) indicated below, followed or not by 10-min drying in the air. Also, the hide was clipped, followed or not by 10-s singeing using a hand-held blowtorch. Before and after each decontamination treatment, the hide was sampled (100 cm(2) areas) by a sponge-swabbing method to compare the total viable counts of bacteria (TVC). The largest bacterial reduction (Psanitizer solution (10% Betane Plus) resulted in significant reductions of 1.80 (Pefficacy of these treatments in the reduction of specific pathogens under commercial conditions.

  18. Motivation to hide emotion and children's understanding of the distinction between real and apparent emotions.

    Gosselin, Pierre; Warren, Madeleine; Diotte, Michèle


    The authors investigated the extent to which children's understanding of the distinction between real and apparent emotions varied according to the motivation to hide emotions. Children, aged 6-7 and 10-11 years, were read stories designed to elicit either prosocial or self-protective motivated display rules and were asked to predict the facial expressions the protagonists would make to hide felt emotions. Children were found to understand the distinction between real and apparent emotions very well, independently of the type of motivation. Contrary to predictions, boys understood this distinction better than did girls when the motivation to hide positive emotions was prosocial. Children perceived neutralization as the most appropriate strategy to hide felt emotions, followed by masking.

  19. Insight into error hiding: exploration of nursing students' achievement goal orientations.

    Dunn, Karee E


    An estimated 50% of medication errors go unreported, and error hiding is costly to hospitals and patients. This study explored one issue that may facilitate error hiding. Descriptive statistics were used to examine nursing students' achievement goal orientations in a high-fidelity simulation course. Results indicated that although this sample of nursing students held high mastery goal orientations, they also held moderate levels of performance-approach and performance-avoidance goal orientations. These goal orientations indicate that this sample is at high risk for error hiding, which places the benefits that are typically gleaned from a strong mastery orientation at risk. Understanding variables, such as goal orientation, that can be addressed in nursing education to reduce error hiding is an area of research that needs to be further explored. This article discusses the study results and evidence-based instructional practices for this sample's achievement goal orientation profile.

  20. 16 CFR 1630.61 - Hide carpets and rugs-alternative washing procedure.


    ... natural “lay” of the hair structure for ten complete strokes. (8) Place test specimen in a circulating... wool or hair attached to the hide with no synthetic fibers and (2) have been treated with a fire...

  1. 16 CFR 1631.61 - Hide carpets and rugs-alternative washing procedure.


    ... natural “lay” of the hair structure for ten complete strokes. (8) Place test specimen in a circulating... wool or hair attached to the hide with no synthetic fibers and (2) have been treated with a fire...




    Full Text Available The ozone absorption in raw water entering the main ozonization step at the Belgrade drinking water supply plant was investigated in a continuous stirred tank reactor (CSTR. A slow chemical reaction rate of dissolved ozone and pollutants present in raw water have been experimentally determined. The modified Hatta number was defined and calculated as a criterion which determines whether and to which extent the reactions of ozone and pollutants influence the rate of the pure physical ozone absorption.

  3. Mechanization of Continuous Production of Powdered Cellulose Technology

    Prosvirnikov, D. B.; Safin, R. G.; Akhmetshin, I. R.; Taimarov, M. A.; Timerbaev, N. F.


    The article presents the mechanization of the process for obtaining powdered cellulose using the technology of steam explosion treatment of lignocellulosic material. The presented unit combines the methods of steam explosion treatment and acid hydrolysis of cellulose-containing raw materials.

  4. DNA-based cryptographic methods for data hiding in DNA media.

    Marwan, Samiha; Shawish, Ahmed; Nagaty, Khaled


    Information security can be achieved using cryptography, steganography or a combination of them, where data is firstly encrypted using any of the available cryptography techniques and then hid into any hiding medium. Recently, the famous genomic DNA has been introduced as a hiding medium, known as DNA steganography, due to its notable ability to hide huge data sets with a high level of randomness and hence security. Despite the numerous cryptography techniques, to our knowledge only the vigenere cipher and the DNA-based playfair cipher have been combined with the DNA steganography, which keeps space for investigation of other techniques and coming up with new improvements. This paper presents a comprehensive analysis between the DNA-based playfair, vigenere, RSA and the AES ciphers, each combined with a DNA hiding technique. The conducted analysis reports the performance diversity of each combined technique in terms of security, speed, hiding capacity in addition to both key size and data size. Moreover, this paper proposes a modification of the current combined DNA-based playfair cipher technique, which makes it not only simple and fast but also provides a significantly higher hiding capacity and security. The conducted extensive experimental studies confirm such outstanding performance in comparison with all the discussed combined techniques. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. Hiding effort to gain a competitive advantage: Evidence from China.

    Zhao, Li; Heyman, Gail D


    Previous studies with Western populations have shown that adolescents' tendency to downplay their academic effort is affected by two kinds of motives: ability-related motives (e.g., to appear competent) and social approval motives (e.g., to be popular). In this research, we test for the presence of additional competition-related motives in China, a culture placing strong emphasis on academic competition. Study 1 (N = 150) showed that, in response to a scenario in which a hard-working high-school junior hid effort from classmates, the most highly endorsed explanation was "to influence others to work less hard to maintain a competitive advantage." Study 2 (N = 174) revealed that competition-related explanations were endorsed relatively more often when the speaker and audience had similar academic rankings. This tendency was most evident when both speaker and audience were top performers, and when this was the case, participants' desire to demonstrate superiority over others was a positive predictor of endorsement of competition-related motives. Study 3 (N = 137) verified that competition-related motives were more strongly endorsed among Chinese participants than U.S. These results suggest that at least in cultures that emphasize academic competition and in contexts where competition is salient, hiding effort is often about attempting to gain strategic advantage. © 2016 International Union of Psychological Science.

  6. Steganographic Approach for Data Hiding using LSB Techniques

    Baluram Nagaria , Ashish Parikh ,Sandeep Mandliya ,Neeraj shrivastav


    Full Text Available Today’s all the multimedia work done via internet so it’s an urgent need to protect the data from malicious attacks. This lead to the research in the area of Digital watermarking and cryptography which intends to protect the copyright information of the intellectuals. In this paper a DCT based steganography scheme is proposed which provides higher resistance to image processing attacks such as JPEG compression, noise, rotation, translation etc Steganography has been implemented In MATLAB7.6 using basic image processing techniques. Steganography is the technique of hiding confidential information within any media. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information But we have design a simulator in which we have transmit our data via mail or LAN. For securing the data, this will be password protected. For design this simulator we have encrypted our data and after that without password we will not decrypted the data. Our all conclusion is that we will secure our information. The difference between the two is in the appearance in the processed output; the output of Steganography operation is not apparently visible but in cryptography the output is scrambled so that it can draw attention. In this paper, we have tried to elucidate the different approaches towards implementation of Steganography using ‘multimedia’ file (text, static image, audio and video and Network IP datagram as cover.

  7. Experimental Test of Quantum No-Hiding Theorem

    Samal, Jharana Rani; Kumar, Anil


    Linearity and unitarity are two fundamental tenets of quantum theory. Any consequence that follows from these must be respected in the quantum world. The no-cloning theorem and the no-deleting theorem are the consequences of the linearity and the unitarity. Together with the stronger no-cloning theorem they provide permanence to quantum information, thus, suggesting that in the quantum world information can neither be created nor be destroyed. In this sense quantum information is robust, but at the same time it is also fragile because any interaction with the environment may lead to loss of information. Recently, another fundamental theorem was proved, namely, the no-hiding theorem that addresses precisely the issue of information loss. It says that if any physical process leads to bleaching of quantum information from the original system, then it must reside in the rest of the universe with no information being hidden in the correlation between these two subsystems. This has applications in quantum teleporta...

  8. Confidential Data Hiding Using Wavlet Based Ecg Stegnography

    Malashree K S


    Full Text Available With the growing number of aging population and a significant portion of that suffering from cardiac diseases, it is conceivable that remote ECG patient monitoring systems are expected to be widely used as Point-of-Care (PoC applications in hospitals around the world. Therefore, huge amount of ECG signal collected by Body Sensor Networks (BSNs from remote patients at homes will be transmitted along with other physiological readings such as blood pressure, temperature, glucose level etc. and diagnosed by those remote patient monitoring systems. It is utterly important that patient confidentiality is protected while data is being transmitted over the public network as well as when they are stored in hospital servers used by remote monitoring systems. In this project, a wavelet based steganography technique has been introduced which combines encryption and scrambling technique to protect patient confidential data. The proposed method allows ECG signal to hide its corresponding patient confidential data and other physiological information thus guaranteeing the integration between ECG and the rest.

  9. Fabrication of Spherical AlSi10Mg Powders by Radio Frequency Plasma Spheroidization

    Wang, Linzhi; Liu, Ying; Chang, Sen


    Spherical AlSi10Mg powders were prepared by radio frequency plasma spheroidization from commercial AlSi10Mg powders. The fabrication process parameters and powder characteristics were investigated. Field emission scanning electron microscope, X-ray diffraction, laser particle size analyzer, powder rheometer, and UV/visible/infrared spectrophotometer were used for analyses and measurements of micrographs, phases, granulometric parameters, flowability, and laser absorption properties of the powders, respectively. The results show that the obtained spherical powders exhibit good sphericity, smooth surfaces, favorable dispersity, and excellent fluidity under appropriate feeding rate and flow rate of carrier gas. Further, acicular microstructures of the spherical AlSi10Mg powders are composed of α-Al, Si, and a small amount of Mg2Si phase. In addition, laser absorption values of the spherical AlSi10Mg powders increase obviously compared with raw material, and different spectra have obvious absorption peaks at a wavelength of about 826 nm.

  10. 阿胶红枣黄芪山楂糕制作复合裱花蛋糕研究%Donkey Hide Gelatin Jujube Astragalus Haw Jelly Research Making Decorated Cake



    以阿胶红枣、黄芪为原料生产出阿胶、黄芪山楂糕,以此为基础制作复合裱花蛋糕,不仅研制开发了阿胶红枣、黄芪山楂糕裱花蛋糕新产品,而且该产品具有较高的营养价值、保健价值、食用价值。运用模糊数学法对不同生产方法生产的裱花蛋糕进行质量评判。%Donkey hide gelatin jujube、astragalus membranaceus as raw material to produce donkey hide gelatin , astragalus membranaceus haw jelly, on this basis, making Decorated cake, not only developed the donkey hide gelatin jujube、astragalus membranaceus decorating haw jelly cake of new products, and the product has high nutritive value、health care value and edible value. Using the fuzzy mathematics method to different production methods of decorating cakes for quality evaluation.

  11. Granulation of fine powder

    Chen, Ching-Fong


    A mixture of fine powder including thorium oxide was converted to granulated powder by forming a first-green-body and heat treating the first-green-body at a high temperature to strengthen the first-green-body followed by granulation by crushing or milling the heat-treated first-green-body. The granulated powder was achieved by screening through a combination of sieves to achieve the desired granule size distribution. The granulated powder relies on the thermal bonding to maintain its shape and structure. The granulated powder contains no organic binder and can be stored in a radioactive or other extreme environment. The granulated powder was pressed and sintered to form a dense compact with a higher density and more uniform pore size distribution.

  12. Sound absorption study of raw and expanded particulate vermiculites

    Vašina, Martin; Plachá, Daniela; Mikeska, Marcel; Hružík, Lumír; Martynková, Gražyna Simha


    Expanded and raw vermiculite minerals were studied for their ability to absorb sound. Phase and structural characterization of the investigated vermiculites was found similar for both types, while morphology and surface properties vary. Sound waves reflect in wedge-like structure and get minimized, and later are absorbed totally. We found that thanks to porous character of expanded vermiculite the principle of absorption of sound into layered vermiculite morphology is analogous to principle of sound minimization in "anechoic chambers." It was found in this study that the best sound damping properties of the investigated vermiculites were in general obtained at higher powder bed heights and higher excitation frequencies.

  13. Cow dung powder poisoning

    Khaja Mohideen Sherfudeen


    Full Text Available Cow dung, which has germicidal property, was used in ancient days to clean living premises in South India. Nowadays, people are using commercially available synthetic cow dung powder. It is locally known as "saani powder" in Tamil Nadu. It is freely available in homes and is sometimes accidentally consumed by children. It is available in two colors - yellow and green. Cow dung powder poisoning is common in districts of Tamil Nadu such as Coimbatore, Tirupur, and Erode. We report two cases of yellow cow dung powder poisoning from our hospital.

  14. Cow dung powder poisoning.

    Sherfudeen, Khaja Mohideen; Kaliannan, Senthil Kumar; Dammalapati, Pavan Kumar


    Cow dung, which has germicidal property, was used in ancient days to clean living premises in South India. Nowadays, people are using commercially available synthetic cow dung powder. It is locally known as "saani powder" in Tamil Nadu. It is freely available in homes and is sometimes accidentally consumed by children. It is available in two colors - yellow and green. Cow dung powder poisoning is common in districts of Tamil Nadu such as Coimbatore, Tirupur, and Erode. We report two cases of yellow cow dung powder poisoning from our hospital.

  15. Information Hiding and Countermeasures%信息隐藏技术及其攻击方法

    吴树峰; 黄刘生; 卢继军; 陈国良


    Information Hiding Technology has a long history. With the development of Digital Technology,it has become a newly evolved discipline and a hot research area. Since the first Information Hiding Workshop held in 1996 ,thetechnology has been widely applied to areas such as multimedia ,signal processing and protection of software Intellectual Property,but the research work in secure communication is relatively fewer. Based on success of developing asteganography tool for communication,this article summarizes the current progress in the research of InformationHiding Technology systematically, and analyzes possible countermeasures against various Information Hiding techniques.

  16. The Costs of Hiding and Faking Emotions: The Case of Extraverts and Introverts.

    Seger-Guttmann, Tali; Medler-Liraz, Hana


    The present study examined the moderation effects of extraversion on the relationships between hiding and faking emotions, perceived satisfaction from intimate relationships, and reported physical health concerns. Four hundred and four Israeli participants, who were all involved in intimate relationships at the time of the study, responded to the Extraversion scale from the Big-Five Inventory, the DEELS to measure hiding and faking emotions, the SELF to assess physical health concerns, and the short version of the ENRICH to evaluate perceived satisfaction with intimate relationships. The mean age was 32.3 years (SD = 8.2); and the average length of time as a couple was 7.8 years (SD = 8.2). Of the participants, 198 were married (48.5%). The findings indicate that the effect of hiding negative emotions was stronger for perceived satisfaction with intimate relationships and physical health concerns than that for faking positive emotions. Extraverts who showed a higher frequency of hiding their negative emotions were significantly less satisfied with their relationships than introverts and they also tended to report more concerns with their physical health. These results were not found when extraverts reported a high frequency of faking positive emotions. These results are discussed in the context of the trait-behavior-concordance model and stress the importance of distinguishing faking from hiding.

  17. Association Rule Hiding Techniques for Privacy Preserving Data Mining: A Study

    Gayathiri P


    Full Text Available Association rule mining is an efficient data mining technique that recognizes the frequent items and associative rule based on a market basket data analysis for large set of transactional databases. The probability of most frequent data item occurrence of the transactional data items are calculated to present the associative rule that represents the habits of buying products of the customers in demand. Identifying associative rules of a transactional database in data mining may expose the confidentiality and privacy of an organization and individual. Privacy Preserving Data Mining (PPDM is a solution for privacy threats in data mining. This issue is solved using Association Rule Hiding (ARH techniques in Privacy Preserving Data Mining (PPDM. This research work on Association Rule Hiding technique in data mining performs the generation of sensitive association rules by the way of hiding based on the transactional data items. The property of hiding rules not the data makes the sensitive rule hiding process is a minimal side effects and higher data utility technique.

  18. Raw materials prices under pressure

    Kolbe, Heinz


    Since April 1984 there has been a general fall in world market prices for industrial raw materials following upon increases which, in some cases, had been quite considerable. What are the reasons for this development? What are the prospects for 1985?

  19. Raw milk consumption and health.

    Vranješ, Anka Popović; Popović, Milka; Jevtić, Marija


    Contrary to the safe practices of milk pasteurization or sterilization, which effectively reduce foodborne outbreaks incidence associated with raw milk and dairy products use, outbreaks caused by such products continue to occur. Despite this fact, a worldwide movement advocating for the rights of raw milk and cheese selling and consumption, due to their specific nutritive characteristics, has strengthened significantly in recent years. Traditional agricultural manufacturers from Serbia still sell products related to thermally unprocessed milk, such as cottage cheese and raw cream. In AP Vojvodina during the period of 1981-2010 a total of 179 foodborne outbreaks were reported, where the incriminated cause of the outbreak were milk or diary. In 126 (70.39%) outbreaks, totaling 2276 sick individuals and one casualty, it was confirmed that the incriminated food was from the group of dairy products. In 48 instances (26.82%), bacteriological tests confirmed that milk and dairy products were excluded as the outbreak causes, while in another 5 (2.79%) outbreaks, microbiological analysis of food failed to confirm any relation to the actual epidemiological instances. In some cases, bacteriological testing of incriminated foods was not possible. In the cases of outbreaks associated with the consumption of milk and dairy products, traditional raw milk products were cited as being used. Consumption of unpasteurized milk and cheese represents public health threat. National and international rules ensuring use of safe products for human consumption have to set rules of trade of thermally processed milk and products on the market.

  20. Surface design of powder by precise modification; Kotai hyomen no seimitsuna kaishitsu seigyo

    Chikazawa, Masatoshi


    The progress of the recent technology is it in high performance, the one manufactured by development of the high function material. It is skillful, and the nature of this effective material is greatly influenced by the various materialities of the raw material powder and a function again. Therefore, the moment it diversifies all the more from now on, a demand for the raw material powder is thought to become more precise control than the thing of the materiality of the powder and the function. Precise quality function technology on the surface of the powder which should make the materiality of the purpose and a functional expression possible is very important to meet such a requirement. Quality silica powder is used as the sample, and you must investigate about the micro-mechanism of the water control by effective based quality of surface from such a position. (NEDO)

  1. Managing Communication Latency-Hiding at Runtime for Parallel Programming Languages and Libraries

    Kristensen, Mads Ruben Burgdorff


    This work introduces a runtime model for managing communication with support for latency-hiding. The model enables non-computer science researchers to exploit communication latency-hiding techniques seamlessly. For compiled languages, it is often possible to create efficient schedules for communication, but this is not the case for interpreted languages. By maintaining data dependencies between scheduled operations, it is possible to aggressively initiate communication and lazily evaluate tasks to allow maximal time for the communication to finish before entering a wait state. We implement a heuristic of this model in DistNumPy, an auto-parallelizing version of numerical Python that allows sequential NumPy programs to run on distributed memory architectures. Furthermore, we present performance comparisons for eight benchmarks with and without automatic latency-hiding. The results shows that our model reduces the time spent on waiting for communication as much as 27 times, from a maximum of 54% to only 2% of t...

  2. Hiding Sensitive Association Rules without Altering the Support of Sensitive Item(s)

    Jain, Dhyanendra


    Association rule mining is an important data-mining technique that finds interesting association among a large set of data items. Since it may disclose patterns and various kinds of sensitive knowledge that are difficult to find otherwise, it may pose a threat to the privacy of discovered confidential information. Such information is to be protected against unauthorized access. Many strategies had been proposed to hide the information. Some use distributed databases over several sites, data perturbation, clustering, and data distortion techniques. Hiding sensitive rules problem, and still not sufficiently investigated, is the requirement to balance the confidentiality of the disclosed data with the legitimate needs of the user. The proposed approach uses the data distortion technique where the position of the sensitive items is altered but its support is never changed. The size of the database remains the same. It uses the idea of representative rules to prune the rules first and then hides the sensitive rule...


    Zhonglai Yi; Gangqin Shao; Xinglong Duan; Peng Sun; Xiaoliang Shi; Zhen Xiong; Jingkun Guo


    A new approach to produce superfine WC-Co powder by direct reduction and carbonization is proposed.Water-soluble salts containing W and Co were used as raw materials. Tungsten and cobalt oxide powder (CoWO4/WO3)was first formed by a spray-pyrolysis technique, which was then mixed with carbon black and converted to WC-Co composite powder at 950℃ for 4 h in N2 atmosphere. The resulting powder has a particle size of 100-300 nm.

  4. The study results steganography hiding messages in image files as vehicle security software

    D. O. Navrotskyi


    Full Text Available Synergetics of steganographic and cryptographic encryption algorithms, which provide a solid security foundation, is presented in this paper. Hiding messages systems in spatial and frequency domain image are compared and studied by the author. The following questions: Compression scheme JPEG , JPEG – transformation structure, Practical recommendations for hiding data to image files, The method of least significant bits (spatial domain and the DCT coefficients values relative replacement method (frequency domain, Packing and unpacking the hidden message, Visual distortion image changing system parameters are considered.

  5. A statistical hiding algorithm based on self-similar network traffic

    SHA Xue-jun; XU Yu-bin; QIANG Wei


    Although the encryption of network packets significantly increases privacy, the density of the traffic can still provide useful information to the observer, and maybe results in the breach of confidentiality. In this paper, we address issues related to hiding information in self-similar network, which is proved to be similar with modem communication network. And a statistical hiding algorithm is proposed for traffic padding. The figures and the comparison of Hurst Parameters before and after traffic padding, show the effective performance of the algorithm.

  6. Reliable Transmission of Audio Streams in Lossy Channels Using Application Level Data Hiding

    Parag Agarwal


    Full Text Available The paper improves the reliability of audio streams in a lossy channel. The mechanism groups audio data samples into source and carrier sets. The carrier set carry the information about the source set which is encoded using data hiding methodology - quantization index modulation. At the receiver side, a missing source data sample can be reconstructed using the carrier set and the remaining source set. Based on reliability constraints a hybrid design combining interleaving and data hiding is presented. Experiments show an improved reliability as compared to forward error correction and interleaving.

  7. Compaction of Titanium Powders

    Gerdemann, Stephen,J; Jablonski, Paul, J


    Accurate modeling of powder densification has been an area of active research for more than 60 years. The earliest efforts were focused on linearization of the data because computers were not readily available to assist with curve-fitting methods. In this work, eight different titanium powders (three different sizes of sponge fines<150 {micro}m,<75 {micro}m, and<45 {micro}m; two different sizes of a hydride-dehydride [HDH]<75 {micro}m and<45 {micro}m; an atomized powder; a commercially pure [CP] Ti powder from International Titanium Powder [ITP]; and a Ti 6 4 alloy powder) were cold pressed in a single-acting die instrumented to collect stress and deformation data during compaction. From these data, the density of each compact was calculated and then plotted as a function of pressure. The results show that densification of all the powders, regardless of particle size, shape, or chemistry, can be modeled accurately as the sum of an initial density plus the sum of a rearrangement term and a work-hardening term. These last two terms are found to be a function of applied pressure and take the form of an exponential rise.


    G. Liuzzo


    Full Text Available Foodborne pathogens including Escherichia coli O157:H7, Salmonella spp. and Campylobacter spp., can enter the meat chain at multiple points. Animals with excessively dirty hides will represent a risk of cross-contaminations during transport, in the slaughtered house environment and during dressing procedures. The aim of this work was to investigate the relationship among hygiene indicator microorganisms (Enterobacteriaceae and Escherichia coli count, in hide and carcass of cattle presented for slaughter, and different hide cleanliness level in two abattoir (R and F and estimate the prevalence of pathogens Escherichia coli O157:H7, Salmonella spp and Campylobacter spp. in hide and carcass of dirty animals. The results showed that hide Escherichia coli and Enterobacteriaceae count were significantly higher in dirty animals than in clean animals (P<0,05, but carcass contamination were significantly higher in dirty animals than in clean animals only in R abattoir. Escherichia coli O 157:H7 was detected in 19 samples of hide (40,4%, and 2 samples of carcass. Campylobacter jejuni was isolated in 13 samples of hide (25,5% and one sample of carcass. Salmonella spp. were not found in all the samples of hide and carcass.

  9. Raw milk consumption and health

    Popović-Vranješ Anka


    Full Text Available Contrary to the safe practices of milk pasteurization or sterilization, which effectively reduce foodborne outbreaks incidence associated with raw milk and dairy products use, outbreaks caused by such products continue to occur. Despite this fact, a worldwide movement advocating for the rights of raw milk and cheese selling and consumption, due to their specific nutritive characteristics, has strengthened significantly in recent years. Traditional agricultural manufacturers from Serbia still sell products related to thermally unprocessed milk, such as cottage cheese and raw cream. In AP Vojvodina during the period of 1981-2010 a total of 179 foodborne outbreaks were reported, where the incriminated cause of the outbreak were milk or diary. In 126 (70.39% outbreaks, totaling 2276 sick individuals and one casualty, it was confirmed that the incriminated food was from the group of dairy products. In 48 instances (26.82%, bacteriological tests confirmed that milk and dairy products were excluded as the outbreak causes, while in another 5 (2.79% outbreaks, microbiological analysis of food failed to confirm any relation to the actual epidemiological instances. In some cases, bacteriological testing of incriminated foods was not possible. In the cases of outbreaks associated with the consumption of milk and dairy products, traditional raw milk products were cited as being used. Consumption of unpasteurized milk and cheese represents public health threat. National and international rules ensuring use of safe products for human consumption have to set rules of trade of thermally processed milk and products on the market. [Projekat Ministarstva nauke Republike Srbije, br. TR31095

  10. Flowability of lignocellusic biomass powders: influence of torrefaction intensity

    Pachón-Morales, John; Colin, Julien; Pierre, Floran; Champavert, Thibaut; Puel, François; Perré, Patrick


    The poor flowability of powders produced from raw lignocellulosic biomass may be an economically issue for the production of second-generation biofuels. Torrefaction is a pre-treatment step of the gasification process that improves the physical characteristics of biomass by making it more coal-like. Particularly, the loss of resilience allows a reduction of the grinding energy consumption and is likely to improve the flow behaviour of woody powders. In this study, we investigated the effect of particle size and shape distribution on flow properties (unconfined yield stress and flowability factor) of powder from raw and torrefied biomass (Picea abies). Several intensities of torrefaction were tested, and its extent was quantified by the global mass loss, chosen as synthetic indicator of torrefaction intensity (its accounts for both the temperature level and the residence time). The intensity of torrefaction shifts the particle size distribution towards smaller sizes. An effect on the circularity and aspect ratio was also observed. A strong, positive correlation was obtained between the measured flowability of biomass powders at different consolidation stresses and the intensity of heat treatment. These results confirm the interest of torrefaction as a pre-treatment step and aim to provide new knowledge on rheological properties of biomass powders.

  11. Effects of limestone petrography and calcite microstructure on OPC clinker raw meals burnability

    Galimberti, Matteo; Marinoni, Nicoletta; Della Porta, Giovanna; Marchi, Maurizio; Dapiaggi, Monica


    Limestone represents the main raw material for ordinary Portland cement clinker production. In this study eight natural limestones from different geological environments were chosen to prepare raw meals for clinker manufacturing, aiming to define a parameter controlling the burnability. First, limestones were characterized by X-Ray Fluorescence, X-Ray Powder Diffraction and Optical Microscopy to assess their suitability for clinker production and their petrographic features. The average domains size and the microstrain of calcite were also determined by X-Ray Powder Diffraction line profile analysis. Then, each limestone was admixed with clay minerals to achieve the adequate chemical composition for clinker production. Raw meals were thermally threated at seven different temperatures, from 1000 to 1450 °C, to evaluate their behaviour on heating by ex situ X-Ray Powder Diffraction and to observe the final clinker morphology by Scanning Electron Microscopy. Results indicate the calcite microstrain is a reliable parameter to predict the burnability of the raw meals, in terms of calcium silicates growth and lime consumption. In particular, mixtures prepared starting from high-strained calcite exhibit a better burnability. Later, when the melt appears this correlation vanishes; however differences in the early burnability still reflect on the final clinker composition and texture.

  12. High belite cement from alternative raw materials

    Ghorab, H. Y.


    Full Text Available Three high belite laboratory clinkers were prepared from traditional and alternative raw materials. Reference clinker was obtained from 77% limestone, 11% sandy clays, 11% fatty clays and 1% iron scales. The fatty clays were replaced by red brick powder in the raw meal of the second clinker and were lowered to 2% with the replacement of 10% of the limestone by egg shells in the third clinker. The SEM examination revealed clear presence of crossed striae and twinning in the rounded belite grains of the reference clinker caused by the transformation of the α´-belite to the β polymorph. Striae were weaker in the second and third clinkers indicating a probable stabilization of the α ‘-belite polymorph. Compressive strength of the respective cements were attained first after 28 days and the early strength did not improve with increasing fineness. Higher compressive strength values were found for the cement prepared from second clinker.Se han preparado tres clinkeres de laboratorio con altos contenidos en belita a partir de materias primas tradicionales y alternativas. El clinker de referencia se obtuvo a partir de una mezcla de caliza, arcillas arenosas y grasas y limaduras de hierro. Las arcillas grasas fueron sustituidas por polvo de ladrillo rojo en la preparación del segundo clinker, y en el tercero el contenido de arcilla grasa fue de solo un 2% y parte de la caliza fue sustituida por cascara de huevo. El estudio realizado por SEM muestra superficies estriadas alrededor de los granos de belita que indican una transformación del polimorfo α´ a la forma β-C₂S, durante el enfriamiento. Esas estrías son menos marcadas en el segundo y tercer clinker, indicando, una estabilización del polimorfo α´-C₂S. Los valores de resistencias a compresión de los correspondientes cementos, a 28 días de curado, no se ven incrementados por la finura de dichos cementos. Las mayores resistencias se obtuvieron en el cemento preparado a partir del cl

  13. Synchrotron powder diffraction on Aztec blue pigments

    Sanchez del Rio, M. [European Synchrotron Radiation Facility, B.P. 220, Grenoble Cedex (France); Gutierrez-Leon, A.; Castro, G.R.; Rubio-Zuazo, J. [Spanish CRG Beamline at the European Synchrotron Radiation Facility, SpLine, B.P. 220, Grenoble Cedex (France); Solis, C. [Universidad Nacional Autonoma de Mexico, Instituto de Fisica, Mexico, D.F. (Mexico); Sanchez-Hernandez, R. [INAH Subdireccion de Laboratorios y Apoyo Academico, Mexico, D.F. (Mexico); Robles-Camacho, J. [INAH Centro Regional Michoacan, Morelia, Michoacan (Mexico); Rojas-Gaytan, J. [INAH Direccion de Salvamento Arqueologico, Naucalpan de Juarez (Mexico)


    Some samples of raw blue pigments coming from an archaeological rescue mission in downtown Mexico City have been characterized using different techniques. The samples, some recovered as a part of a ritual offering, could be assigned to the late Aztec period (XVth century). The striking characteristic of these samples is that they seem to be raw pigments prior to any use in artworks, and it was possible to collect a few {mu}g of pigment after manual grain selection under a microscopy monitoring. All pigments are made of indigo, an organic colorant locally known as anil or xiuhquilitl. The colorant is always found in combination with an inorganic matrix, studied by powder diffraction. In one case the mineral base is palygorskite, a rare clay mineral featuring micro-channels in its structure, well known as the main ingredient of the Maya blue pigment. However, other samples present the minerals sepiolite (a clay mineral of the palygorskite family) and calcite. Another sample contains barite, a mineral never reported in prehispanic paints. We present the results of characterization using high resolution powder diffraction recorded at the European Synchrotron Radiation Facility (BM25A, SpLine beamline) complemented with other techniques. All of them gave consistent results on the composition. A chemical test on resistance to acids was done, showing a high resistance for the palygorskite and eventually sepiolite compounds, in good agreement with the excellent resistance of the Maya blue. (orig.)


    Ângela Froehlich


    Full Text Available ABSTRACTEggs and their products have been implicated in food-borne disease outbreaks due to contamination with SalmonellaEnteritidis. Irradiation, as a food preservation technology, could minimize such contamination. The aim of this study was to determine the effects of irradiation in powdered egg yolk, egg white, and whole egg samples spiked with Salmonella Enteritidis. The powdered egg samples were exposed to doses of 0.5, 1.0, 1.0, 2.0, 2.5, 3.0, 3.5, or 4.0 kGy irradiation. Odors and tastes of raw and cooked non-inoculated, irradiated samples, and non-irradiated samples, were analyzed by a trained panel. A dose of 2.0 kGy resulted in slight to moderate changes in powdered egg yolk samples, compared to non-irradiated controls, while minimal differences were observed in powdered egg white samples. The dose of 3.5 kGy, when applied to samples of powdered egg white, resulted in taste and odor slightly stronger than the non-irradiated control. The maximum irradiation threshold before changes in flavor and odor occurred was 2.28 kGy, for powdered yolk and whole eggs, and 2.58 kGy, for powdered egg white. Those thresholds were enough to reduce S.Enteritidis to safe levels.

  15. Reducing metal alloy powder costs for use in powder bed fusion additive manufacturing: Improving the economics for production

    Medina, Fransisco

    Titanium and its associated alloys have been used in industry for over 50 years and have become more popular in the recent decades. Titanium has been most successful in areas where the high strength to weight ratio provides an advantage over aluminum and steels. Other advantages of titanium include biocompatibility and corrosion resistance. Electron Beam Melting (EBM) is an additive manufacturing (AM) technology that has been successfully applied in the manufacturing of titanium components for the aerospace and medical industry with equivalent or better mechanical properties as parts fabricated via more traditional casting and machining methods. As the demand for titanium powder continues to increase, the price also increases. Titanium spheroidized powder from different vendors has a price range from 260/kg-450/kg, other spheroidized alloys such as Niobium can cost as high as $1,200/kg. Alternative titanium powders produced from methods such as the Titanium Hydride-Dehydride (HDH) process and the Armstrong Commercially Pure Titanium (CPTi) process can be fabricated at a fraction of the cost of powders fabricated via gas atomization. The alternative powders can be spheroidized and blended. Current sectors in additive manufacturing such as the medical industry are concerned that there will not be enough spherical powder for production and are seeking other powder options. It is believed the EBM technology can use a blend of spherical and angular powder to build fully dense parts with equal mechanical properties to those produced using traditional powders. Some of the challenges with angular and irregular powders are overcoming the poor flow characteristics and the attainment of the same or better packing densities as spherical powders. The goal of this research is to demonstrate the feasibility of utilizing alternative and lower cost powders in the EBM process. As a result, reducing the cost of the raw material to reduce the overall cost of the product produced with

  16. Powder detergents production plant

    Stanković Mirjana S.; Pezo Lato L.


    The IGPC Engineering Department designed basic projects for powder detergent production plant, using technology developed in the IGPC laboratories, in 1998. - 2000. Several projects were completed: technological, machine, electrical, automation. On the basis of these projects, a production plant with a capacity of 25,000 t/y was manufactured, at "Delta In", Zrenjanin, in 2000.This technology was an innovation, because new approach in mixing a powder materials was used, as well as introducing ...

  17. Identification of species adulteration in traded medicinal plant raw drugs using DNA barcoding.

    Nithaniyal, Stalin; Vassou, Sophie Lorraine; Poovitha, Sundar; Raju, Balaji; Parani, Madasamy


    Plants are the major source of therapeutic ingredients in complementary and alternative medicine (CAM). However, species adulteration in traded medicinal plant raw drugs threatens the reliability and safety of CAM. Since morphological features of medicinal plants are often not intact in the raw drugs, DNA barcoding was employed for species identification. Adulteration in 112 traded raw drugs was tested after creating a reference DNA barcode library consisting of 1452 rbcL and matK barcodes from 521 medicinal plant species. Species resolution of this library was 74.4%, 90.2%, and 93.0% for rbcL, matK, and rbcL + matK, respectively. DNA barcoding revealed adulteration in about 20% of the raw drugs, and at least 6% of them were derived from plants with completely different medicinal or toxic properties. Raw drugs in the form of dried roots, powders, and whole plants were found to be more prone to adulteration than rhizomes, fruits, and seeds. Morphological resemblance, co-occurrence, mislabeling, confusing vernacular names, and unauthorized or fraudulent substitutions might have contributed to species adulteration in the raw drugs. Therefore, this library can be routinely used to authenticate traded raw drugs for the benefit of all stakeholders: traders, consumers, and regulatory agencies.

  18. Magnetically responsive enzyme powders

    Pospiskova, Kristyna, E-mail: [Regional Centre of Advanced Technologies and Materials, Palacky University, Slechtitelu 11, 783 71 Olomouc (Czech Republic); Safarik, Ivo, E-mail: [Regional Centre of Advanced Technologies and Materials, Palacky University, Slechtitelu 11, 783 71 Olomouc (Czech Republic); Department of Nanobiotechnology, Institute of Nanobiology and Structural Biology of GCRC, Na Sadkach 7, 370 05 Ceske Budejovice (Czech Republic)


    Powdered enzymes were transformed into their insoluble magnetic derivatives retaining their catalytic activity. Enzyme powders (e.g., trypsin and lipase) were suspended in various liquid media not allowing their solubilization (e.g., saturated ammonium sulfate and highly concentrated polyethylene glycol solutions, ethanol, methanol, 2-propanol) and subsequently cross-linked with glutaraldehyde. Magnetic modification was successfully performed at low temperature in a freezer (−20 °C) using magnetic iron oxides nano- and microparticles prepared by microwave-assisted synthesis from ferrous sulfate. Magnetized cross-linked enzyme powders were stable at least for two months in water suspension without leakage of fixed magnetic particles. Operational stability of magnetically responsive enzymes during eight repeated reaction cycles was generally without loss of enzyme activity. Separation of magnetically modified cross-linked powdered enzymes from reaction mixtures was significantly simplified due to their magnetic properties. - Highlights: • Cross-linked enzyme powders were prepared in various liquid media. • Insoluble enzymes were magnetized using iron oxides particles. • Magnetic iron oxides particles were prepared by microwave-assisted synthesis. • Magnetic modification was performed under low (freezing) temperature. • Cross-linked powdered trypsin and lipase can be used repeatedly for reaction.

  19. Hiding an Inconvenient Truth : Lies and Vagueness (Revision of DP 2008-107)

    Serra Garcia, M.; van Damme, E.E.C.; Potters, J.J.M.


    When truth conflicts with efficiency, can verbal communication destroy efficiency? Or are lies or vagueness used to hide inconvenient truths? We consider a sequential 2-player public good game in which the leader has private information about the value of the public good. This value can be low, high

  20. Efficiently Hiding Sensitive Itemsets with Transaction Deletion Based on Genetic Algorithms

    Chun-Wei Lin


    Full Text Available Data mining is used to mine meaningful and useful information or knowledge from a very large database. Some secure or private information can be discovered by data mining techniques, thus resulting in an inherent risk of threats to privacy. Privacy-preserving data mining (PPDM has thus arisen in recent years to sanitize the original database for hiding sensitive information, which can be concerned as an NP-hard problem in sanitization process. In this paper, a compact prelarge GA-based (cpGA2DT algorithm to delete transactions for hiding sensitive itemsets is thus proposed. It solves the limitations of the evolutionary process by adopting both the compact GA-based (cGA mechanism and the prelarge concept. A flexible fitness function with three adjustable weights is thus designed to find the appropriate transactions to be deleted in order to hide sensitive itemsets with minimal side effects of hiding failure, missing cost, and artificial cost. Experiments are conducted to show the performance of the proposed cpGA2DT algorithm compared to the simple GA-based (sGA2DT algorithm and the greedy approach in terms of execution time and three side effects.

  1. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    Chuang, Cheng-Hung; Chen, Yen-Lin


    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  2. Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

    Rhythm Katira


    Full Text Available The rise in the use of internet, secure transmission of the data has become an utmost priority. Steganography makes the data invisible by hiding it in the multimedia such as image, audio or video file and thereby covering for its existence. In this project we use prediction error (PE technique steganography and Least Significant Bit (LSB substitution method to hide data in the image. As we do PE expansion method it can lead to expansion of pixels like it can lead to pixel value above 255. In order to solve this problem, we restricted the pixel values between 15 and 240.The PSNR was high at low threshold values. The hiding capacity increased with increase in threshold with a reasonable decrease in PSNR. There was 2dB difference then other methods because of high data hiding capacity. Also we have used knight’s tour for increasing the security of data hidden. In comparison to other methodology, this methodology proves to be better and more effective.



    The proposed secure communication approach adopts the proposed algorithm of Analysis-BySynthesis (ABS) speech information hiding to establish a Secret Speech Subliminal Channel (SSSC) for speech secure communication over PSTN (Public Switched Telephone Network), and employs the algorithm of ABS speech information extracting to recovery the secret information. This approach is more reliable, covert and securable than traditional and chaotic secure communication.

  4. Effect of hiding places, straw and territory on agression in group-housed rabbit does

    Rommers, J.M.; Reuvekamp, B.F.J.; Gunnink, H.; Jong, de I.C.


    Group-housing of rabbit does may be preferred from welfare point of view. However, group-housing causes agonistic behaviour which may cause severe injuries. Severe injuries may be prevented by offering hiding places for attacked does. Providing enrichment (straw) may reduce agonistic behaviour by at

  5. Biaxially textured articles formed by powder metallurgy

    Goyal, Amit; Williams, Robert K.; Kroeger, Donald M.


    A biaxially textured alloy article having a magnetism less than pure Ni includes a rolled and annealed compacted and sintered powder-metallurgy preform article, the preform article having been formed from a powder mixture selected from the group of mixtures consisting of: at least 60 at % Ni powder and at least one of Cr powder, W powder, V powder, Mo powder, Cu powder, Al powder, Ce powder, YSZ powder, Y powder, Mg powder, and RE powder; the article having a fine and homogeneous grain structure; and having a dominant cube oriented {100} orientation texture; and further having a Curie temperature less than that of pure Ni.

  6. Effects of Powder Attributes and Laser Powder Bed Fusion (L-PBF) Process Conditions on the Densification and Mechanical Properties of 17-4 PH Stainless Steel

    Irrinki, Harish; Dexter, Michael; Barmore, Brenton; Enneti, Ravi; Pasebani, Somayeh; Badwe, Sunil; Stitzel, Jason; Malhotra, Rajiv; Atre, Sundar V.


    The effects of powders attributes (shape and size distribution) and critical processing conditions (energy density) on the densification and mechanical properties of laser powder bed fusion (L-PBF) 17-4 PH stainless steel were studied using four types of powders. The % theoretical density, ultimate tensile strength and hardness of both water- and gas-atomized powders increased with increased energy density. Gas-atomized powders showed superior densification and mechanical properties when processed at low energy densities. However, the % theoretical density and mechanical properties of water-atomized powders were comparable to gas-atomized powders when sintered at a high energy density of 104 J/mm3. An important result of this study was that, even at high % theoretical density (97% ± 1%), the properties of as-printed parts could vary over a relatively large range (UTS: 500-1100 MPa; hardness: 25-39 HRC; elongation: 10-25%) depending on powder characteristics and process conditions. The results also demonstrate the feasibility of using relatively inexpensive water-atomized powders as starting raw material instead of the typically used gas-atomized powders to fabricate parts using L-PBF techniques by sintering at high energy densities.

  7. Tocopherol and tocotrienol analysis in raw and cooked vegetables: a validated method with emphasis on sample preparation.

    Knecht, Katharina; Sandfuchs, Katja; Kulling, Sabine E; Bunzel, Diana


    Vegetables can be important dietary sources of vitamin E. However, data on vitamin E in raw and cooked vegetables are in part conflicting, indicating analytical pitfalls. The purpose of the study was to develop and validate an HPLC-FLD method for tocochromanol (tocopherols and tocotrienols) analysis equally suitable for raw and cooked vegetables. Significant instability of tocochromanols was observed in raw broccoli and carrot homogenates. Tocochromanols could be stabilized by freeze-drying or ascorbic acid addition prior to homogenization. The optimized protocol for tocochromanol analysis included knife and ball milling of freeze-dried vegetable pieces. Direct acetone extraction of vegetable powders allowed for satisfactory recoveries and precisions. A significant decrease of tocochromanols in baked compared to raw vegetables was shown, the extent of which varied largely between vegetables. For some raw vegetables, such as spinach or broccoli, underestimation of vitamin E in nutrient databases cannot be ruled out and should be examined. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. Research on the methods of optical image hiding based on double random phase encoding and digital holography

    Xu, Hongsheng; Sang, Nong


    Optical information hiding system has many features such as high processing speed, high parallel, high encryption dimension and high speed of optical transformation and related operations, more advantages than digital method in some way. But it has not adequate security, and enough combination with techniques of digital image processing. So on basis of analyzing existing image hiding and analyzing techniques, we give out the idea. We should adopt idea of virtual optics on the way of all-digital simulation to do research of optical image hiding and analyzing methods based on optical image processing technique especially technique of double random phase encoding and digital holography.

  9. Cast Iron swarf: problematic and powder metallurgy applications. Las virutas de fundicion: problematica y utilizacion pulvimetalurgica

    Velasco, F.; Torralba, J.M.; Garcia-Cambronero, L.E.; Ruiz-Prieto, J.M.


    This paper reviews most works dedicated to studying the recycling of cast iron swarf as raw materials for obtaining metallic powders which will be used to manufacture iron and steel parts. The fact that today all the powder consumed by the Spanish P/M industry is imported and that the conventional recycling of cast iron swarfs poses many problems, make the conclusions of this work very interesting. (Author)

  10. Method for producing a compressed body of mix-powder for ceramic

    Okawa, K.


    Under the invented method, a compressed body of mix powder for ceramic is produced by mixing and stirring several raw powder materials with mixing liquid such as water, and, in the process of sending the resulted viscous material pressurized at 5 kg/cm to 7 kg/cm, using 1.5 to 2 times the pressure to filter and dehydrate, adjusting the water content to 10 to 20%.

  11. Mixed metal oxide crystalline powders and method for the synthesis thereof

    Joyce, I.H.; Blonski, R.P.; Maloney, J.J.; Welch, J.J.; Pipoly, R.A.; Byrne, C.J.


    A method is described for the solid state synthesis of mixed metal oxide crystalline powders comprising the steps of: preparing a raw material mixture containing at least two different metal cations; adding a template material to said mixture and blending it therewith; initiating formation of a mixed metal oxide by calcination of said mixture and said template material, whereby particles of the mixed metal oxides are formed in powder form; and thereafter recovering said mixed metal oxide particles.

  12. In2O3 Ultrafine Powder Synthesis by Sol-Gel Method


    The precursor of ultrafine In2O3 powder was prepared by the hydrolysis, peptization and gelation of InC13 @4H2O used as raw material.After calcination, ultrafine In2O3 powder was obtained. The particles were characterized by the methods of thermo-gravimetric and differential thermal analysis (TG-DTA), X-ray diffractometry (XRD) and transmission electron microscopy (TEM), respectively.

  13. Production of fine powder from silk by radiation

    Takeshita, Hidefumi; Yoshii, Fumio; Kume, Tamikazu [Japan Atomic Energy Research Inst., Takasaki, Gunma (Japan). Takasaki Radiation Chemistry Research Establishment; Ishida, Kazunari; Kamiishi, Youichi [Textile Research Institute of Gunma, Kiryu, Gunma (Japan)


    Silk fine power was prepared directly from silk fiber irradiated with an accelerated electron beam(EB). Irradiated silk fiber was well pulverized only by physical crushing using ball mill without any chemical pretreatment. Raw and degummed silk fibers were irradiated at ambient temperature in the dose range of 250-1000 kGy. Although unirradiated silk fibers were not pulverized at all, irradiated fibers were easily pulverized and showed higher conversion from fiber to powder for higher doses. The presence of oxygen in the irradiation atmosphere enhanced pulverization of silk fiber. Raw silk fibers were less pulverized compared to degummed ones. The electron microscope observation showed that the minimum particle size of silk powder obtained from fiber irradiated by 1000 kGy in oxygen was less than 10 microns. It was found that fibroin powder obtained in this work dissolved remarkably into cold water, thought unirradiated fibroin fiber had little solubility even in hot water. A typical soluble fraction was about 60% for fibroin powder obtained from fiber irradiated by 1000 kGy in oxygen. (author)

  14. Cow dung powder poisoning

    Khaja Mohideen Sherfudeen; Senthil Kumar Kaliannan; Pavan Kumar Dammalapati


    Cow dung, which has germicidal property, was used in ancient days to clean living premises in South India. Nowadays, people are using commercially available synthetic cow dung powder. It is locally known as “saani powder” in Tamil Nadu. It is freely available in homes and is sometimes accidentally consumed by children. It is available in two colors - yellow and green. Cow dung powder poisoning is common in districts of Tamil Nadu such as Coimbatore, Tirupur, and Erode. We report two cases of ...

  15. The potency of plant extracts as antimicrobials for the skin or hide preservation

    Suparno, Ono; Afifah, Amalia; Panandita, Tania; Marimin, Purnawati, Rini


    Preservation of skin or hide uses antimicrobial that will be disposed in wastewater in the skin or hide processing resulting in the environmental pollution. Extracts of some types of plants contain some antimicrobial substances which are potential to be used as biocides for the preservation of skin or hide and are more environmentally friendly. The objectives of this study were to determine the phytochemical contents of moringa, cucumber tree or wuluh starfruit, cherry, and white leadtree or lamtoro leaves and to analyse the antibacterial activities of the plant extracts against microorganisms that cause spoilage of skin or hide. Phytochemical constituents of the dried plant leaves were extracted by 70% ethanol. The resulting extracts were analysed their phytochemical contents and antimicrobial activities against gram negative and gram positive bacteria (inhibition zone test) by well diffusion method, the minimum inhibitory concentration (MIC), and the minimum bactericidal concentration (MBC). Phytochemical test showed that the four leaf extracts contained alkaloids, saponins, tannins, flavonoids, steroids, and glycosides. The inhibition zones of the extracts against Escherichia coli were 5 mm for moringa leaf, 6 mm for cucumber tree leaf, 12 mm for cherry leaf, and 17 mm for white leadtree leaf. Inhibition zone of the extracts against Staphylococcus aureus were 2.5 mm for moringa leaf, 7 mm for cucumber tree leaf, 7.3 mm for cherry leaf, and 13 mm for white leadtree leaf. Inhibition zones of the extracts against Bacillus subtilis were 8 mm for moringa leaf, 9 mm for cucumber tree starfruit leaf, 14 mm for cherry leaf, and 15 mm for white leadtree leaf. The best MIC and MBC tests were demonstrated by white leadtree leaf extract against E. coli found at concentration of 1500 µg/ml, against S. aureus at concentration of 3000 µg/ml, and against B. subtilis at concentration of 3000 µg/ml. The ethanol extract of white leadtree leaf had the best antibacterial activity

  16. Comparison of methods for the enumeration of enterohemorrhagic Escherichia coli from veal hides and carcasses

    Brandon E Luedtke


    Full Text Available The increased association of enterohemorrhagic Escherichia coli (EHEC with veal calves has led the United States Department of Agriculture Food Safety and Inspection Service to report results of veal meat contaminated with the Top 7 serogroups separately from beef cattle. However, detection methods that can also provide concentration for determining the prevalence and abundance of EHEC associated with veal are lacking. Here we compared the ability of qPCR and a molecular based most probable number assay (MPN to detect and enumerate EHEC from veal hides at the abattoir and the resulting pre-intervention carcasses. In addition, digital PCR (dPCR was used to analyze select samples. The qPCR assay was able to enumerate total EHEC in 32% of the hide samples with a range of approximately 34 to 91,412 CFUs/100 cm2 (95% CI 4-113,460 CFUs/100 cm2. Using the MPN assay, total EHEC was enumerable in 48% of the hide samples and ranged from approximately 1 to greater than 17,022 CFUs/100 cm2 (95% CI 0.4-72,000 CFUs/100 cm2. The carcass samples had lower amounts of EHEC with a range of approximately 4 to 275 CFUs/100 cm2 (95% CI 3-953 CFUs/100 cm2 from 17% of samples with an enumerable amount of EHEC by qPCR. For the MPN assay, the carcass samples ranged from 0.1 to 1 CFUs/100 cm2 (95% CI 0.02-4 CFUs/100 cm2 from 29% of the samples. The correlation coefficient between the qPCR and MPN enumeration methods indicated a moderate relation (R2=0.39 for the hide samples while the carcass samples had no relation (R2=0.002, which was likely due to most samples having an amount of total EHEC below the reliable limit of quantification for qPCR. Interestingly, after enrichment, 81% of the hide samples and 94% of the carcass samples had a detectable amount of total EHEC by qPCR. From our analysis, the MPN assay provided a higher percentage of enumerable hide and carcass samples, however determining an appropriate dilution range and the limited throughput offer additional

  17. Preprocessing of raw metabonomic data.

    Vettukattil, Riyas


    Recent advances in metabolic profiling techniques allow global profiling of metabolites in cells, tissues, or organisms, using a wide range of analytical techniques such as nuclear magnetic resonance (NMR) spectroscopy and mass spectrometry (MS). The raw data acquired from these instruments are abundant with technical and structural complexity, which makes it statistically difficult to extract meaningful information. Preprocessing involves various computational procedures where data from the instruments (gas chromatography (GC)/liquid chromatography (LC)-MS, NMR spectra) are converted into a usable form for further analysis and biological interpretation. This chapter covers the common data preprocessing techniques used in metabonomics and is primarily focused on baseline correction, normalization, scaling, peak alignment, detection, and quantification. Recent years have witnessed development of several software tools for data preprocessing, and an overview of the frequently used tools in data preprocessing pipeline is covered.

  18. Polymer-Cement Composites Containing Waste Perlite Powder

    Paweł Łukowski


    Full Text Available Polymer-cement composites (PCCs are materials in which the polymer and mineral binder create an interpenetrating network and co-operate, significantly improving the performance of the material. On the other hand, the need for the utilization of waste materials is a demand of sustainable construction. Various mineral powders, such as fly ash or blast-furnace slag, are successfully used for the production of cement and concrete. This paper deals with the use of perlite powder, which is a burdensome waste from the process of thermal expansion of the raw perlite, as a component of PCCs. The results of the testing of the mechanical properties of the composite and some microscopic observations are presented, indicating that there is a possibility to rationally and efficiently utilize waste perlite powder as a component of the PCC. This would lead to creating a new type of building material that successfully meets the requirements of sustainable construction.

  19. CO2 Capture by Cement Raw Meal

    Pathi, Sharat Kumar; Lin, Weigang; Illerup, Jytte Boll


    The cement industry is one of the major sources of CO2 emissions and is likely to contribute to further increases in the near future. The carbonate looping process has the potential to capture CO2 emissions from the cement industry, in which raw meal for cement production could be used...... as the sorbent. Cyclic experiments were carried out in a TGA apparatus using industrial cement raw meal and synthetic raw meal as sorbents, with limestone as the reference. The results show that the CO2 capture capacities of the cement raw meal and the synthetic raw meal are comparable to those of pure limestone...... that raw meal could be used as a sorbent for the easy integration of the carbonate looping process into the cement pyro process for reducing CO2 emissions from the cement production process....

  20. CO2 Capture by Cement Raw Meal

    Pathi, Sharat Kumar; Lin, Weigang; Illerup, Jytte Boll


    The cement industry is one of the major sources of CO2 emissions and is likely to contribute to further increases in the near future. The carbonate looping process has the potential to capture CO2 emissions from the cement industry, in which raw meal for cement production could be used...... as the sorbent. Cyclic experiments were carried out in a TGA apparatus using industrial cement raw meal and synthetic raw meal as sorbents, with limestone as the reference. The results show that the CO2 capture capacities of the cement raw meal and the synthetic raw meal are comparable to those of pure limestone....... The CO2 capture capacity of limestone in the raw meal is lower than for pure limestone. The difference in the CO2 capture capacity decreases with an increase in cycle number. The calcination conditions and composition are major factors that influence the CO2 capture capacity of limestone. At 850 °C in N2...

  1. Production method of raw material dispersion liquid for reaction layer of gas diffusion electrode

    Furuya, Choichi; Motoo, Satoshi


    Heretofore, in order to make a raw material dispersion liquid of a reaction layer of a gas diffusion electrode, water repellent carbon, polytetrafluoroethylene, water and a surface active agent are mixed, then a cake is made by filtering this mixed liquid and afterwards the cake is heated and dried before being crushed. Since this crushing is done mechanically, homogeneous fine raw material powders cannot be obtained. Accordingly, even when a reaction layer is made by sintering a mixture of this powder, hydrophilic carbon black or hydrophilic carbon black carrying catalyst, and polytetrafluoroethylene, the hydrophilic part and the water repellent part are not distributed homogeneously and the catalytic performance of the reaction layer declines. In order to solve this, this invention proposes a production method that water repellent carbon black, polyterafluoroethylene, water and a surface active agent are mixed, then this mixture is frozen so that the surface active agent may not become active and homogeneous condensed cores of water repellent carbon black and polytetrafluoroethylene powders may be formed, and afterwards a homogeneous fine raw material dispersion liquid is made from thawing the condensed cores without change by thawing the above frozen mixture.

  2. Photoshop CS3 RAW Transforming your RAW data into works of art

    Aaland, Mikkel


    Because RAW files remain virtually untouched by in-camera processing, working with them has given digital photographers greater flexibility and control during the editing process -- for those who are familiar enough with the format. Camera RAW, the plug in for Adobe Photoshop CS3, has emerged as one of the best and most familiar tools for editing RAW images, and the best way to master this workflow is with Photoshop CS3 RAW. Award-winning author Mikkel Aaland explores the entire RAW process, from the practical reasons to shoot RAW, to managing the images with the new features of Bridge 2.0 n

  3. Recursive histogram modification: establishing equivalency between reversible data hiding and lossless data compression.

    Zhang, Weiming; Hu, Xiaocheng; Li, Xiaolong; Yu, Nenghai


    State-of-the-art schemes for reversible data hiding (RDH) usually consist of two steps: first construct a host sequence with a sharp histogram via prediction errors, and then embed messages by modifying the histogram with methods, such as difference expansion and histogram shift. In this paper, we focus on the second stage, and propose a histogram modification method for RDH, which embeds the message by recursively utilizing the decompression and compression processes of an entropy coder. We prove that, for independent identically distributed (i.i.d.) gray-scale host signals, the proposed method asymptotically approaches the rate-distortion bound of RDH as long as perfect compression can be realized, i.e., the entropy coder can approach entropy. Therefore, this method establishes the equivalency between reversible data hiding and lossless data compression. Experiments show that this coding method can be used to improve the performance of previous RDH schemes and the improvements are more significant for larger images.

  4. Data Hiding by LSB Substitution Using Genetic Optimal Key-Permutation

    Marghny Mohamed


    Full Text Available The least significant bit (LSB embedding method is one of the most commonly used techniques; it targets the LSB'sof the host image to hide the data. This paper deals with three main steganography challenges (i.e. capacity, imperceptibility,and security. This is achieved by hybrid data hiding scheme incorporates LSB technique with a key-permutation method. Thepaper also proposes an optimal key permutation method using genetic algorithms for best key selection. Both normal andoptimized methods are tested with standard images, varying both data size as well as key space. Final experimental resultsshow decrement in computation time when increasing number of keys, at the same time system security improves.

  5. Parallel steganography framework for hiding a color image inside stereo images

    Munoz-Ramirez, David O.; Ponomaryov, Volodymyr I.; Reyes-Reyes, Rogelio; Cruz-Ramos, Clara


    In this work, a robust steganography framework to hide a color image into a stereo images is proposed. The embedding algorithm is performed via Discrete Cosine Transform (DCT) and Quantization Index Modulation-Dither Modulation (QIM-DM) hiding the secret data. Additionally, the Arnold's Cat Map Transform is applied in order to scramble the secret color image, guaranteeing better security and robustness of the proposed system. Novel framework has demonstrated better performance against JPEG compression attacks among other existing approaches. Besides, the proposed algorithm is developed taking into account the parallel paradigm in order to be implemented in multi-core CPU increasing the processing speed. The results obtained by the proposed framework show high values of PSNR and SSIM, which demonstrate imperceptibility and sufficient robustness against JPEG compression attacks.

  6. Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

    Ari Shawakat Tahir


    Full Text Available The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed.

  7. An Attribute-Based Signcryption Scheme and Its Application in Information Hiding

    PENG Changgen; WANG Weiru; TIAN Youliang; YUAN Zhilong


    In order to provide a secure, reliable and flexible way to hide information, a new attribute-based signcryption scheme based on ciphertext-policy and its se-curity proof are presented. This scheme not only can simul-taneously fulfil both authentication and confidentiality in an efficient way, but also implements a hierarchical decryp-tion in one group and also between different groups accord-ing to user’s authority (different users satisfying the same access structure can be considered as a group). We provide a solution to information hiding using our proposed scheme which can embed ciphertext into a carrier. Because the hi-erarchical decryption property, different users will obtain different message from the same carrier. Illegal user can not get any information without private key because mes-sage existed in the carrier is ciphertext. Such solution can be applied in sharing important message under the public network.

  8. A data hiding approach for the self-security of iris recognition


    Attacks to biometric data are the primary danger to the self-security of biometrics.To improve the iris feature template data security,a data hiding approach based on bit streams is proposed,in which an iris feature template is embedded into a face image. The proposed approach is applicable to present dominant techniques of iris recognition.With the low computation cost and the zero decoding-error-rate,this data hiding approach,embedding target biometric data into other biometric data for improving the security of target data in identity recognition,data storage and transmission,can deceive attackers more effectively.Furthermore,it does not degrade the iris recognition performances.Experimental results prove that the proposed approach can be used to protect iris feature templates and enhance the security of the iris recognition system itself.

  9. New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files

    Alanazi, Hamdan O; Zaidan, B B; Jalab, Hamid A; AL-Ani, Zaidoon Kh


    With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important, Another problem with digital document and video is that undetectable modifications can be made with very simple and widely available equipment, which put the digital material for evidential purposes under question .With the large flood of information and the development of the digital format Information hiding considers one of the techniques which used to protect the important information. The main goals for this paper, provides a general overview of the New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files.

  10. 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing

    Tsai, Pei-Wei; Huang, Hsiang-Cheh


    This volume of Smart Innovation, Systems and Technologies contains accepted papers presented in IIH-MSP-2016, the 12th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. The conference this year was technically co-sponsored by Tainan Chapter of IEEE Signal Processing Society, Fujian University of Technology, Chaoyang University of Technology, Taiwan Association for Web Intelligence Consortium, Fujian Provincial Key Laboratory of Big Data Mining and Applications (Fujian University of Technology), and Harbin Institute of Technology Shenzhen Graduate School. IIH-MSP 2016 is held in 21-23, November, 2016 in Kaohsiung, Taiwan. The conference is an international forum for the researchers and professionals in all areas of information hiding and multimedia signal processing. .

  11. A new method for high-capacity information hiding in video robust against temporal desynchronization

    Mitekin, Vitaly; Fedoseev, Victor A.


    This paper presents a new method for high-capacity information hiding in digital video and algorithms of embedding and extraction of hidden information based on this method. These algorithms do not require temporal synchronization to provide robustness against both malicious and non-malicious frame dropping (temporal desynchronization). At the same time, due to randomized distribution of hidden information bits across the video frames, the proposed method allows to increase the hiding capacity proportionally to the number of frames used for information embedding. The proposed method is also robust against "watermark estimation" attack aimed at estimation of hidden information without knowing the embedding key or non-watermarked video. Presented experimental results demonstrate declared features of this method.

  12. Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms

    Xu-Ren Luo


    Full Text Available In recent years, reversible data hiding has attracted much more attention than before. Reversibilitysignifies that the original media can be recovered without any loss from the marked media afterextracting the embedded message. This paper presents a new method that adopts two-level wavelettransform and exploits the feature of large wavelet coefficient variance to achieve the goal of highcapacity with imperceptibility. Our method differs from those of previous ones in which the waveletcoefficients histogram not gray-level histogram is manipulated. Besides, clever shifting rules areintroduced into histogram to avoid the decimal problem in pixel values after recovery to achievereversibility. With small alteration of the wavelet coefficients in the embedding process, and therefore lowvisual distortion is obtained in the marked image. In addition, an important feature of our design is thatthe use of threshold is much different from previous studies. The results indicate that our design issuperior to many other state-of-the-art reversible data hiding schemes.

  13. Application of Modified Digital Halftoning Techniques to Data Hiding in Personalized Stamps

    Hsi-Chun Wang; Chi-Ming Lian; Pei-Chi Hsiao


    The objective of this research is to embed information in personalized stamps by modified digital halftoning techniques. The displaced and deformed halftone dots are used to encode data in the personalized stamps. Hidden information can be retrieved by either an optical decoder or digital image processing techniques.The results show that personalized stamps with value-added features like data hiding or digital watermarking can be successfully implemented.

  14. Suitability of the RGB Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Ante Poljicak


    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data  hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  15. C#实现窗口自动隐藏%Form Automatically Hide with C#



      该文介绍了如何利用C#语言,实现靠屏边窗口自动隐藏及鼠标指向后自动弹出。%  Mark a form with C#, the form can automatically hide when it close the edge of screen and it can recover to nor⁃mal when mouse point on it.

  16. Hiding Two Binary Images in Grayscale BMP Image via Five Modulus Method

    Firas A. Jassim


    Full Text Available The aim of this study is to hide two binary BMP images in a single BMP grayscale image. The widespread technique in image steganography is to hide one image (stego image into another (cover image. The proposed novel method is to hide two binary images into one grayscale bitmap cover image. First of all, the proposed technique starts with transforming all grayscale cover image pixels into multiples of five using Five Modulus Method (FMM. Clearly, any modulus of five is either 0, 1, 2, 3, or 4. The transformed FMM cover image could be treated as a good host for carrying data. Obviously, it is known that the pixel value for the binary image is either 0 or 1. Therefore, by concatenating the two binary images, the composite results are 00, 01, 10 and 11. In fact, these concatenated values could be mapped using simple mapping that assigns a positive integer value such as 1 for 00, 2 for 01, 3 for 10 and 4 for 11. Consequently, a new matrix will be constructed that contains a number varying from 1 to 4 only. Fortunately, the four integer values are the same as the previously mentioned reminders of division by 5, hence, adding these four integers to the transformed FMM cover image. On the recipient side, a reverse process will be implemented to extract the two binary images. In terms of PSNR values, the cover image and the two extracted stego images have acceptable PSNR values, which yields that the proposed method is very efficient in information hiding.

  17. Suitability of the rgb Channels for a Pixel Manipulation in a Spatial Domain Data Hiding Techniques

    Lidija Mandić


    Full Text Available The aim of this research was to determine which channel in rgb color space is the most suitable (regarding perceptibility for a pixel manipulation in a spatial domain data hiding techniques. For this purpose three custom test targets were generated. The research also shows the behavior of two closely related colors in the ps (Print-Scan process. The results are interpreted using both a quantitative method (statistical comparison and a qualitative method (visual comparison.

  18. Steganography and Hiding Data with Indicators-based LSB Using a Secret Key

    W. Saqer


    Full Text Available Steganography is the field of science concerned with hiding secret data inside other innocent-looking data, called the container, carrier or cover, in a way that no one apart from the meant parties can suspect the existence of the secret data. There are many algorithms and techniques of concealing data. Each of which has its own way of hiding and its own advantages and limitations. In our research we introduce a new algorithm of hiding data. The algorithm uses the same technique used by the Least Significant Bit (LSB algorithm which is embedding secret data in the least significant bit(s of the bytes of the carrier. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually it depends on indicators to determine where and how many bits to embed at a time. These indicators are two bits of each cover byte after the least two significant bits. The advantage of this algorithm over the LSB algorithm is the randomness used to confuse intruders as it does not use fixed sequential bytes and it does not always embed one bit at a time. This aims to increase the security of the technique. Also, the amount of cover data consumed is less because it sometimes embeds two bits at once.

  19. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients

    Zhang, Xiaoqiang; Wang, Z. Jane


    Digital watermarking and data hiding are important tools for digital rights protection of media data. Spread spectrum (SS)-based watermarking and data-hiding approaches are popular due to their outstanding robustness, but their security might not be sufficient. To improve the security of SS, a SS-based image data-hiding approach is proposed by encrypting the discrete cosine transform coefficients of the host image with the piecewise linear chaotic map, before the operation of watermark embedding. To evaluate the performance of the proposed approach, simulations and analyses of its robustness and security are carried out. The average bit-error-rate values on 100 real images from the Berkeley segmentation dataset under the JPEG compression, additive Gaussian noise, salt and pepper noise, and cropping attacks are reported. Experimental results show that the proposed approach can maintain the high robustness of traditional SS schemes and, meanwhile, also improve the security. The proposed approach can extend the key space of traditional SS schemes from 10 to 10 and thus can resist brute-force attack and unauthorized detection watermark attack.

  20. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution

    H. Yang


    Full Text Available Many existing steganographic methods hide more secret data into edged areas than smooth areas in the host image, which does not differentiate textures from edges and causes serious degradation in actual edge areas. To avoid abrupt changes in image edge areas, as well as to achieve better quality of the stego-image, a novel image data hiding technique by adaptive Least Significant Bits (LSBs substitution is proposed in this paper. The scheme exploits the brightness, edges, and texture masking of the host image to estimate the number k of LSBs for data hiding. Pixels in the noise non-sensitive regions are embedded by a k-bit LSB substitution with a lager value of k than that of the pixels in noise sensitive regions. Moreover, an optimal pixel adjustment process is used to enhance stego-image visual quality obtained by simple LSB substitution method. To ensure that the adaptive number k of LSBs remains unchanged after pixel modification, the LSBs number is computed by the high-order bits rather than all the bits of the image pixel value. The theoretical analyses and experiment results show that the proposed method achieves higher embedding capacity and better stegoimage quality compared with some existing LSB methods.

  1. Pengaruh hide poison dan formalin terhadap sifat kulit dalam pengawet kulit kambing secara dikeringkan

    Ignatius Sunaryo


    Full Text Available The objective of this study is know the effect of ide poison and formaline in the dried curing of goat skin. This study used 199 goat skins that were devided into seven groups od curing. Each group consisted of 17 goat skins. Those groups were : 3 groups of dried curing by hide poison of 0,1%, 0,3% and 0,5%; 3 groups of dried curing by formaline of 1%, 3% and 5%; and 1 groups of dried curing without any preserevation agent as control. After having stored for about 4 months, those skins then to be analized. Physical and chemical analysis werw carried out to evaluate the quality of the skin. Completely randomized design by Duncan’s test was used to analyze the dta. Based on this statistical analysis we can know that: the effect of hide poson in the dried curing of goat skins was the best. The quality of goat skins that were cured by hide poison was as follows : - the average tensile strength was the highest (886,30 kg/CM2, - the average of stretch was the lowest (14,50%, - the average iof hardness was the highest (201,90 kg/2,54 Cm, - the water content was the lowest (20%, and the damage was the smallest (10%.

  2. Design a Weight Based sorting distortion algorithm using Association rule Hiding for Privacy Preserving Data mining



    Full Text Available The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful tool for discovering relationships which are hidden in large database. Association rules hiding algorithms get strong an efficient performance for protecting confidential and crucial data. Data modification and rule hiding is one of the most important approaches for secure data. The objective of the proposed Weight Based Sorting Distortion (WBSD algorithm is to distort certain data which satisfies a particular sensitive rule. Then hide those transactions which support a sensitive rule and assigns them a priority and sorts them in ascending order according to the priority value of each rule. Then it uses these weights to compute the priority value for each transaction according to how weak the rule is that a transaction supports. Data distortion is one of the important methods to avoid this kind of scalability issues

  3. Information Hiding Method Using Best DCT and Wavelet Coefficients and ItsWatermark Competition

    Hyunho Kang


    Full Text Available In recent years, information hiding and its evaluation criteria have been developed by the IHC (Information Hiding and its Criteria Committee of Japan. This committee was established in 2011 with the aim of establishing standard evaluation criteria for robust watermarks. In this study, we developed an information hiding method that satisfies the IHC evaluation criteria. The proposed method uses the difference of the frequency coefficients derived from a discrete cosine transform or a discrete wavelet transform. The algorithm employs a statistical analysis to find the best positions in the frequency domains for watermark insertion. In particular, we use the BCH (Bose-Chaudhuri-Hocquenghem (511,31,109 code to error correct the watermark bits and the BCH (63,16,11 code as the sync signal to withstand JPEG (Joint Photographic Experts Group compression and cropping attacks. Our experimental results showed that there were no errors in 10 HDTV-size areas after the second decompression. It should be noted that after the second compression, the file size should be less than 1 25 of the original size to satisfy the IHC evaluation criteria.

  4. Authentication and data hiding using a hybrid ROI-based watermarking scheme for DICOM images.

    Al-Qershi, Osamah M; Khoo, Bee Ee


    Authenticating medical images using watermarking techniques has become a very popular area of research, and some works in this area have been reported worldwide recently. Besides authentication, many data-hiding techniques have been proposed to conceal patient's data into medical images aiming to reduce the cost needed to store data and the time needed to transmit data when required. In this paper, we present a new hybrid watermarking scheme for DICOM images. In our scheme, two well-known techniques are combined to gain the advantages of both and fulfill the requirements of authentication and data hiding. The scheme divides the images into two parts, the region of interest (ROI) and the region of non-interest (RONI). Patient's data are embedded into ROI using a reversible technique based on difference expansion, while tamper detection and recovery data are embedded into RONI using a robust technique based on discrete wavelet transform. The experimental results show the ability of hiding patient's data with a very good visual quality, while ROI, the most important area for diagnosis, is retrieved exactly at the receiver side. The scheme also shows some robustness against certain levels of salt and pepper and cropping noise.

  5. Efficient blind decoders for additive spread spectrum embedding based data hiding

    Valizadeh, Amir; Wang, Z. Jane


    This article investigates efficient blind watermark decoding approaches for hidden messages embedded into host images, within the framework of additive spread spectrum (SS) embedding based for data hiding. We study SS embedding in both the discrete cosine transform and the discrete Fourier transform (DFT) domains. The contributions of this article are multiple-fold: first, we show that the conventional SS scheme could not be applied directly into the magnitudes of the DFT, and thus we present a modified SS scheme and the optimal maximum likelihood (ML) decoder based on the Weibull distribution is derived. Secondly, we investigate the improved spread spectrum (ISS) embedding, an improved technique of the traditional additive SS, and propose the modified ISS scheme for information hiding in the magnitudes of the DFT coefficients and the optimal ML decoders for ISS embedding are derived. We also provide thorough theoretical error probability analysis for the aforementioned decoders. Thirdly, sub-optimal decoders, including local optimum decoder (LOD), generalized maximum likelihood (GML) decoder, and linear minimum mean square error (LMMSE) decoder, are investigated to reduce the required prior information at the receiver side, and their theoretical decoding performances are derived. Based on decoding performances and the required prior information for decoding, we discuss the preferred host domain and the preferred decoder for additive SS-based data hiding under different situations. Extensive simulations are conducted to illustrate the decoding performances of the presented decoders.

  6. Platelet-containing tantalum powders

    Schiele, E.K.


    A method of forming platelet tantalum powders is described comprising the steps of: (a) providing an ingot-derived precursor tantalum powder, and (b) ball-milling the precursor powder for a time sufficient to form a platelet powder having an average FSSS of less than about 2 micrometers, a Scott density not greater than about 30 g/in/sup 3/ and a BET surface area of at least about 0.7 in/sup 2//g.

  7. Prevalence of Arcobacter spp. in raw milk and retail raw meats in northern Ireland

    Scullion, R.; Harrington, C.S.; Madden, R.H.


    A 1-year study was undertaken to determine the prevalence of Arcobacter spp. in raw milk and retail raw meats on sale in Northern Ireland. Retail raw poultry samples (n = 94), pork samples (n = 101), and beef samples (n = 108) were obtained from supermarkets in Northern Ireland, and raw milk...... samples (n = 101) were kindly provided by the Milk Research Laboratory, Department of Agriculture and Rural Development, Belfast, Northern Ireland. Presumptive arcobacters were identified by previously described genus-specific and species-specific PCR assays. Arcobacter spp. were found to be common...... contaminants of retail raw meats and raw milk in Northern Ireland. Poultry meat (62%) had the highest prevalence, but frequent isolations were made from pork (35%), beef (34%), and raw milk (46%). Arcobacter butzleri was the predominant species isolated from retail raw meats and was the only species isolated...

  8. Influence of raw milk quality on processed dairy products: How do raw milk quality test results relate to product quality and yield?

    Murphy, Steven C; Martin, Nicole H; Barbano, David M; Wiedmann, Martin


    This article provides an overview of the influence of raw milk quality on the quality of processed dairy products and offers a perspective on the merits of investing in quality. Dairy farmers are frequently offered monetary premium incentives to provide high-quality milk to processors. These incentives are most often based on raw milk somatic cell and bacteria count levels well below the regulatory public health-based limits. Justification for these incentive payments can be based on improved processed product quality and manufacturing efficiencies that provide the processor with a return on their investment for high-quality raw milk. In some cases, this return on investment is difficult to measure. Raw milks with high levels of somatic cells and bacteria are associated with increased enzyme activity that can result in product defects. Use of raw milk with somatic cell counts >100,000cells/mL has been shown to reduce cheese yields, and higher levels, generally >400,000 cells/mL, have been associated with textural and flavor defects in cheese and other products. Although most research indicates that fairly high total bacteria counts (>1,000,000 cfu/mL) in raw milk are needed to cause defects in most processed dairy products, receiving high-quality milk from the farm allows some flexibility for handling raw milk, which can increase efficiencies and reduce the risk of raw milk reaching bacterial levels of concern. Monitoring total bacterial numbers in regard to raw milk quality is imperative, but determining levels of specific types of bacteria present has gained increasing importance. For example, spores of certain spore-forming bacteria present in raw milk at very low levels (e.g., products to levels that result in defects. With the exception of meeting product specifications often required for milk powders, testing for specific spore-forming groups is currently not used in quality incentive programs in the United States but is used in other countries (e.g., the

  9. Measuring Apparatus for Coal Powder


    The measuring apparatus for coal powder, equipped with radioactive source, is a set of device andcan be used to measure the density in the pipes and cumulative consumed amount of coal powder in apower plant, and to examine and display the status of the coal powder input system. It is sketched asFig. 1.

  10. Synthesis of Uranium nitride powders using metal uranium powders

    Yang, Jae Ho; Kim, Dong Joo; Oh, Jang Soo; Rhee, Young Woo; Kim, Jong Hun; Kim, Keon Sik [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)


    Uranium nitride (UN) is a potential fuel material for advanced nuclear reactors because of their high fuel density, high thermal conductivity, high melting temperature, and considerable breeding capability in LWRs. Uranium nitride powders can be fabricated by a carbothermic reduction of the oxide powders, or the nitriding of metal uranium. The carbothermic reduction has an advantage in the production of fine powders. However it has many drawbacks such as an inevitable engagement of impurities, process burden, and difficulties in reusing of expensive N{sup 15} gas. Manufacturing concerns issued in the carbothermic reduction process can be solved by changing the starting materials from oxide powder to metals. However, in nitriding process of metal, it is difficult to obtain fine nitride powders because metal uranium is usually fabricated in the form of bulk ingots. In this study, a simple reaction method was tested to fabricate uranium nitride powders directly from uranium metal powders. We fabricated uranium metal spherical powder and flake using a centrifugal atomization method. The nitride powders were obtained by thermal treating those metal particles under nitrogen containing gas. We investigated the phase and morphology evolutions of powders during the nitriding process. A phase analysis of nitride powders was also a part of the present work.

  11. 7 CFR 29.6033 - Raw.


    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Raw. 29.6033 Section 29.6033 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... INSPECTION Standards Definitions § 29.6033 Raw. Tobacco as it appears between the time of harvesting and...

  12. Preparation of Nd–Fe–B sintered magnets from HDDR-processed powder

    Takagi, Kenta, E-mail: [Green Innovative Magnetic Materials Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Nagoya 463-8560 (Japan); Akada, Misaho [Magnetic Materials R& D Center, Research Associations of Magnetic Materials for High-Efficiency Motors (MagHEM), Nagoya 463-8560 (Japan); Soda, Rikio; Ozaki, Kimihiro [Green Innovative Magnetic Materials Research Center, National Institute of Advanced Industrial Science and Technology (AIST), Nagoya 463-8560 (Japan)


    The electric-current sintering technique was used to fully densify hydrogenation–disproportionation–desorption–recombination (HDDR)-processed Nd–Fe–B powder at temperatures below the grain growth temperature in order to produce high-coercive bulk magnets. However, the sintered magnets exhibited anomalous coercivity reduction that depended on sintered density. Reheating examination of the sintered magnets revealed that the reduced coercivity was increased in proportion to the heating temperature, resulting in complete recovery of coercivity. As a result, the combination of electric-current sintering and post-annealing produced sintered magnets with a coercivity of 15 kOe. Scanning and transmission electron microscopy revealed no evidence that associated the anomalous coercivity reduction and recovery with grain boundary morphology. On the other hand, various HDDR powders with different particle sizes were sintered, and finer powders yielded lower coercivity after sintering, implying that the anomalous coercivity reduction was associated with particle surface oxides of the raw powder. - Highlights: • We conduct a sintering of HDDR-processed Nd–Fe–B powder without coercivity reduction. • Rapid current sintering allows densification of this powder without grain growth. • However, the sintered magnets show an anomalous coercivity reduction phenomenon. • It is found that post-annealing completely recovers the reduced coercivity. • The anomalous coercivity reduction would be due to surface oxide of the raw powder.

  13. HIDE & SEEK: End-to-end packages to simulate and process radio survey data

    Akeret, J.; Seehars, S.; Chang, C.; Monstein, C.; Amara, A.; Refregier, A.


    As several large single-dish radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these datasets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system-from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing single-dish radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single-dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal. The two packages can be used separately or together depending on the application. Their modular and flexible nature allows easy adaptation to other instruments and datasets. We describe the basic architecture of the two packages and examine in detail the noise and RFI modeling in HIDE, as well as the implementation of gain calibration and RFI mitigation in SEEK. We then apply HIDE &SEEK to forward-model a Galactic survey in the frequency range 990-1260 MHz based on data taken at the Bleien Observatory. For this survey, we expect to cover 70% of the full sky and achieve a median signal-to-noise ratio of approximately 5-6 in the cleanest channels including systematic uncertainties. However, we also point out the potential challenges of high RFI contamination and baseline removal when examining the early data from the Bleien Observatory. The fully documented HIDE &SEEK packages are available at and are published

  14. Powder injection molding of Stellite 6 powder: Sintering, microstructural and mechanical properties

    Gülsoy, H. Özkan [Marmara University, Technology Faculty, Metall. and Mater. Eng., 34722 Istanbul (Turkey); Özgün, Özgür, E-mail: [Bingol University, Faculty of Engineering and Architecture, Mechanical Eng. Dep., 12000 Bingol (Turkey); Bilketay, Sezer [Marmara University, Technology Faculty, Metall. and Mater. Eng., 34722 Istanbul (Turkey)


    The purpose of this study was to produce Co-based Stellite 6 superalloy components by using the method of Powder Injection Molding (PIM) and to characterize the microstructural and mechanical properties of the produced components. The experimental studies were started through the formation of feedstock by mixing Stellite 6 powder with a multicomponent binder system. Prepared feedstock was formed by utilizing powder injection molding technique. Then the molded samples were subjected to the solvent and thermal debinding processes. Different sintering cycles were applied to the raw components for the purpose of determining the optimum sintering conditions. The densities of the sintered components were determined in accordance with the Archimedes' principle. The microstructural characterization was performed through scanning electron microscope (SEM) analysis, energy dispersive spectrometry (EDS) analyses, and X-ray diffraction (XRD) analysis. Hardness measurement and tensile test were conducted in order to determine the mechanical properties. The results illustrated that the injection molded Stellite 6 components were composed of fine and equiaxed grains, plenty of carbide precipitates exhibiting homogenous distribution throughout the microstructure formed at the grain boundaries and thus the mechanical properties were considerably high.

  15. Advanced powder processing

    Janney, M.A. [Oak Ridge National Lab., TN (United States)


    Gelcasting is an advanced powder forming process. It is most commonly used to form ceramic or metal powders into complex, near-net shapes. Turbine rotors, gears, nozzles, and crucibles have been successfully gelcast in silicon nitride, alumina, nickel-based superalloy, and several steels. Gelcasting can also be used to make blanks that can be green machined to near-net shape and then high fired. Green machining has been successfully applied to both ceramic and metal gelcast blanks. Recently, the authors have used gelcasting to make tooling for metal casting applications. Most of the work has centered on H13 tool steel. They have demonstrated an ability to gelcast and sinter H13 to near net shape for metal casting tooling. Also, blanks of H13 have been cast, green machined into complex shape, and fired. Issues associated with forming, binder burnout, and sintering are addressed.

  16. Powder detergents production plant

    Stanković Mirjana S.


    Full Text Available The IGPC Engineering Department designed basic projects for powder detergent production plant, using technology developed in the IGPC laboratories, in 1998. - 2000. Several projects were completed: technological, machine, electrical, automation. On the basis of these projects, a production plant with a capacity of 25,000 t/y was manufactured, at "Delta In", Zrenjanin, in 2000.This technology was an innovation, because new approach in mixing a powder materials was used, as well as introducing a new type of dryer in detergent production. The product meets all quality demands for detergents with high specific weight (1000 g/l, as well as environmental regulations. The detergent production process is fully automatized, and the product has uniform quality. There is no waste material in detergent zeolite production, because all products with unsatisfactory quality are returned to the process. The production process can be controlled manually, which is necessary during start-up, and repairs.

  17. Method for selecting raw materials to preparing ceramic masses: application to raw material for red ceramic; Proposta metodologica de selecao de materias primas para compor massas ceramicas: aplicacao a ceramica vermelha

    Moreno, Maria Margarita Torres; Rocha, Rogers Raphael da; Zanard, Antenor, E-mail: [Universidade Estadual Paulista Julio de Mesquita Filho (DPM/IGCE/UNESP), Rio Claro, SP (Brazil)


    We studied the raw materials used in a factory building blocks, located in Cesario Lange city (SP). It extracts raw materials from various sources in the region to make the dough. The mixtures were prepared from dry milled powders based on data related to the plasticity of the raw materials. It was obtained with the apparatus Vicat-cone in order to obtain similar levels of water absorption of the samples burned at 900 deg C for all compositions. To quantify the proportion of each clay was used the Lever Rule. In this firing temperature, where sintering is mainly by diffusion from a solid state, different compositions of the same set of four raw materials resulted in similar values. (author)

  18. Dispersing powders in liquids

    Nelson, RD


    This book provides powder technologists with laboratory procedures for selecting dispersing agents and preparing stable dispersions that can then be used in particle size characterization instruments. Its broader goal is to introduce industrial chemists and engineers to the phenomena, terminology, physical principles, and chemical considerations involved in preparing and handling dispersions on a commercial scale. The book introduces novices to: - industrial problems due to improper degree of dispersion; - the nomenclature used in describing particles; - the basic physica

  19. Environmental impacts of milk powder and butter manufactured in the Republic of Ireland.

    Finnegan, William; Goggins, Jamie; Clifford, Eoghan; Zhan, Xinmin


    The abolition of the milk quota system that was in place in Europe was abolished in 2015, which instigated an immediate increase in milk production in many European countries. This increase will aid in addressing the world's ever growing demand for food, but will incur increased stresses on the environmental impact and sustainability of the dairy industry. In this study, an environmental life cycle assessment was performed in order to estimate the environmental impacts associated with the manufacture of milk powder and butter in the Republic of Ireland. A farm gate to processing factory gate analysis, which includes raw milk transportation, processing into each product and packaging, is assessed in this study. Operational data was obtained from 5 dairy processing factories that produce milk powder (4 of which also produce butter). Results for each environmental impact category are presented per kilogram of product. Energy consumption (raw milk transportation and on-site electrical and thermal energy usage) contributes, on average, 89% and 78% of the total global warming potential, for milk powder and butter respectively, for the life cycle stages assessed. Similarly, energy consumption contributes, on average, 86% and 96% of the total terrestrial acidification potential for milk powder and butter respectively, for these life cycle stages. Emissions associated with wastewater treatment contribute approximately 10% and 40% to the total freshwater eutrophication potential and marine eutrophication potential, respectively, for both milk powder and butter production. In addition, packaging materials also has a significant contribution to these environmental impact categories for butter production. Results were also presented for three milk powder products being manufactured by the factories surveyed: skim milk powder, whole milk powder and full fat milk powder. The analysis presented in this paper helps to identify opportunities to reduce the environmental impacts

  20. Characterization of commercially pure aluminum powder for research reactor fuel plates

    Downs, V.D. [Babcock and Wilcox Co., Lynchburg, VA (United States); Wiencek, T.C. [Argonne National Lab., IL (United States)


    Aluminum powder is used as the matrix material in the production of uranium aluminide, oxide, and silicide dispersion fuel plates for research and test reactors. variability in the characteristics of the aluminum powder, such as moisture content and particle-size distribution, influences blending and compacting of the aluminum/fuel powder. A detailed study was performed to characterize the physical properties of three aluminum powder lots. An angle-of-shear test was devised to characterize the cohesiveness of the aluminum powder. Flow-rate measurements, apparent density determination, subsieve analysis, surface area measurements, and scanning electron microscopy were also used in the study. It was found that because of the various types of commercially available powders, proper specification of powder variables will ensure the receipt of consistent raw materials. Improved control of the initial powder will reduce the variability of fuel-plate production and will improve overall plate reproducibility. It is recommended that a standard specification be written for the aluminum powder and silicide fuel.

  1. Characterization of commercially pure aluminum powder for research reactor fuel plates

    Downs, V.D. (Babcock and Wilcox Co., Lynchburg, VA (United States)); Wiencek, T.C. (Argonne National Lab., IL (United States))


    Aluminum powder is used as the matrix material in the production of uranium aluminide, oxide, and silicide dispersion fuel plates for research and test reactors. variability in the characteristics of the aluminum powder, such as moisture content and particle-size distribution, influences blending and compacting of the aluminum/fuel powder. A detailed study was performed to characterize the physical properties of three aluminum powder lots. An angle-of-shear test was devised to characterize the cohesiveness of the aluminum powder. Flow-rate measurements, apparent density determination, subsieve analysis, surface area measurements, and scanning electron microscopy were also used in the study. It was found that because of the various types of commercially available powders, proper specification of powder variables will ensure the receipt of consistent raw materials. Improved control of the initial powder will reduce the variability of fuel-plate production and will improve overall plate reproducibility. It is recommended that a standard specification be written for the aluminum powder and silicide fuel.

  2. Low-temperature synthesis of silicon carbide powder using shungite

    Gubernat, A.; Pichor, W.; Lach, R.; Zientara, D.; Sitarz, M.; Springwald, M.


    The paper presents the results of investigation the novel and simple method of synthesis of silicon carbide. As raw material for synthesis was used shungite, natural mineral rich in carbon and silica. The synthesis of SiC is possible in relatively low temperature in range 1500–1600°C. It is worth emphasising that compared to the most popular method of SiC synthesis (Acheson method where the temperature of synthesis is about 2500°C) the proposed method is much more effective. The basic properties of products obtained from different form of shungite and in wide range of synthesis temperature were investigated. The process of silicon carbide formation was proposed and discussed. In the case of synthesis SiC from powder of raw materials the product is also in powder form and not requires any additional process (crushing, milling, etc.). Obtained products are pure and after grain classification may be used as abrasive and polishing powders. (Author)

  3. Low-temperature synthesis of silicon carbide powder using shungite

    Agnieszka Gubernat


    Full Text Available The paper presents the results of investigation the novel and simple method of synthesis of silicon carbide. As raw material for synthesis was used shungite, natural mineral rich in carbon and silica. The synthesis of SiC is possible in relatively low temperature in range 1500–1600 °C. It is worth emphasising that compared to the most popular method of SiC synthesis (Acheson method where the temperature of synthesis is about 2500 °C the proposed method is much more effective. The basic properties of products obtained from different form of shungite and in wide range of synthesis temperature were investigated. The process of silicon carbide formation was proposed and discussed. In the case of synthesis SiC from powder of raw materials the product is also in powder form and not requires any additional process (crushing, milling, etc.. Obtained products are pure and after grain classification may be used as abrasive and polishing powders.

  4. Use of fluorometry for determination of skim milk powder adulteration in fresh milk

    GUAN Rong-fa; LIU Dong-hong; YE Xing-qian; YANG Kai


    A FAST (fluorescence of advanced Maillard products and Soluble Tryptophan) method for identification of reconstituted milk made from skim milk powder in the fresh milk was developed. Considering milk and skim milk powders variations from different seasons and countries, milk was collected from different dairy farms in different seasons and skim milk powders were collected from different countries to measure the Tryptophan (Trp), advanced Maillard products (AMP) fluorescence values.The results showed that there were differences (P<0.01) between raw and reconstituted milk. The plot of values in each mixed level of raw and reconstituted milk had a correlation coefficient >0.97. The FAST method is a simple, rapid, low-cost and sensitive method enabling the detection of 5% reconstituted milk in fresh milk. The measurement of the Trp, AMP fluorescence values and calculation of the FAST index is a suitable method for large-scale monitoring of fresh milk samples.

  5. Polymers based on renewable raw materials

    Jovanović Slobodan M.


    Full Text Available The basic raw materials for the chemical industry, which also means for polymer production, are mineral oil and natural gas. Mineral oil and natural gas resources are limited so that sooner or later they will be consumed. For this reason alternative, renewable raw materials for the chemical industry have become the object of intensive investigation all over the world. Some of the results of these investigations concerning renewable raw materials for the production of polymer materials are presented in this paper.

  6. Low Temperature Powder Coating


    of volatile organic compounds (VOCs) and hazardous air pollutants (HAPs) • Legacy primers contain hexavalent chrome • Conventional powder coatings...panels • Third panel exhibited a single filament extending slightly beyond allowable tolerance Filiform Corrosion Resistance LTCPC on 2024 T-3 Clad ...LTCPC on 2024 T-3 Clad O G D E N A I R L O G I S T I C S C E N T E R BE AMERICA’S BEST JTP Results • LTCPC performance similar or better than wet

  7. Data extraction from proteomics raw data

    Mancuso, Francesco; Bunkenborg, Jakob; Wierer, Michael


    In shot-gun proteomics raw tandem MS data are processed with extraction tools to produce condensed peak lists that can be uploaded to database search engines. Many extraction tools are available but to our knowledge, a systematic comparison of such tools has not yet been carried out. Using raw data...... and agreement in-between tools. Processing a primary data set with 9 different tandem MS extraction tools resulted in a low overlap of identified peptides. The tools differ by assigned charge states of precursors, precursor and fragment ion masses, and we show that peptides identified very confidently using one...... extraction tool might not be matched when using another tool. We also found a bias towards peptides of lower charge state when extracting fragment ion data from higher resolution raw data without deconvolution. Collecting and comparing the extracted data from the same raw data allow adjusting parameters...

  8. Quality quantification model of basic raw materials

    Š. Vilamová


    Full Text Available Basic raw materials belong to the key input sources in the production of pig iron. The properties of basic raw materials can be evaluated using a variety of criteria. The essential ones include the physical and chemical properties. Current competitive pressures, however, force the producers of iron more and more often to include cost and logistic criteria into the decision-making process. In this area, however, they are facing a problem of how to convert a variety of vastly different parameters into one evaluation indicator in order to compare the available raw materials. This article deals with the analysis of a model created to evaluate the basic raw materials, which was designed as part of the research.

  9. Sensor and Actuator Fault-Hiding Reconfigurable Control Design for a Four-Tank System Benchmark

    Hameed, Ibrahim; El-Madbouly, Esam I; Abdo, Mohamed I


    Fault detection and compensation plays a key role to fulfill high demands for performance and security in today's technological systems. In this paper, a fault-hiding (i.e., tolerant) control scheme that detects and compensates for actuator and sensor faults in a four-tank system benchmark...... Invariant (LTI) system where virtual sensors and virtual actuators are used to correct faulty performance through the use of a pre-fault performance. Simulation results showed that the developed approach can handle different types of faults and able to completely and instantly recover the original system...

  10. Information hiding based on double random-phase encoding and public-key cryptography.

    Sheng, Yuan; Xin, Zhou; Alam, Mohammed S; Xi, Lu; Xiao-Feng, Li


    A novel information hiding method based on double random-phase encoding (DRPE) and Rivest-Shamir-Adleman (RSA) public-key cryptosystem is proposed. In the proposed technique, the inherent diffusion property of DRPE is cleverly utilized to make up the diffusion insufficiency of RSA public-key cryptography, while the RSA cryptosystem is utilized for simultaneous transmission of the cipher text and the two phase-masks, which is not possible under the DRPE technique. This technique combines the complementary advantages of the DPRE and RSA encryption techniques and brings security and convenience for efficient information transmission. Extensive numerical simulation results are presented to verify the performance of the proposed technique.

  11. Plastic raw materials in Neolithic pottery production

    Alexander A. Bobrinsky


    Full Text Available The paper is dedicated to the investigation of various natural silts as the most ancient type of raw material used in pottery production. The authors describe the specific features of the composition of plain and mountain silts, and discover the same features in ancient ceramics from different regions in Russia. It can be concluded that silts were the earliest raw material used, a tradition that faded away during the evolution of pottery production.

  12. Quality quantification model of basic raw materials

    Š. Vilamová; P. Besta; R. Kozel; K. Janovská; M. Piecha; Levit, A; Straka, M.; Šanda, M.


    Basic raw materials belong to the key input sources in the production of pig iron. The properties of basic raw materials can be evaluated using a variety of criteria. The essential ones include the physical and chemical properties. Current competitive pressures, however, force the producers of iron more and more often to include cost and logistic criteria into the decision-making process. In this area, however, they are facing a problem of how to convert a variety of vastly differ...

  13. The complete raw workflow guide how to get the most from your raw images in Adobe Camera Raw, Lightroom, Photoshop, and Elements

    Andrews, Philip


    One of the most important technologies a photographer can master is shooting and working with raw images. However, figuring out the best way to work with raw files can be confusing and overwhelming. What's the advantage to working in raw? How do you manage, organize, and store raw files? What's the best way to process your files to meet your photographic needs? How do Photoshop, Lightroom and Adobe Camera Raw work together? Is it possible to keep your photos in the raw format and still enhance them extensively? Philip Andrews answers these questions and more in his all-new essential raw workfl

  14. Efficient production of L-lactic acid from cassava powder by Lactobacillus rhamnosus.

    Wang, Limin; Zhao, Bo; Liu, Bo; Yang, Chunyu; Yu, Bo; Li, Qinggang; Ma, Cuiqing; Xu, Ping; Ma, Yanhe


    Cassava is one of the most efficient and rich crops in terms of carbohydrate production, which is a tropical perennial plant that grows on poor or depleted soils. Microbial conversion of such a renewable raw material to useful products is an important objective in industrial biotechnology. L-Lactic acid was efficiently produced from cassava powder by a Lactobacillus rhamnosus strain CASL. The fermentation properties of cassava powder were compared with those of glucose and corn powder. The efficiencies of various fermentation strategies for L-lactic acid production from cassava powder, including simultaneous saccharification and fermentation (SSF), two-step fermentation (TSF) and simultaneous liquefaction, saccharification and fermentation (SLSF), were investigated. The high L-lactic acid concentration (175.4 g/l) was obtained using 275 g/l of cassava powder concentration (total sugar of 222.5 g/l) in SSF batch fermentation. This is the highest L-lactic acid concentration reported, from cassava source, and it provides an efficient L-lactic acid production process with cheap raw bioresources, such as cassava powder.

  15. Pre-slaughter, slaughter and post-slaughter defects of skins and hides at the Sheba Tannery and Leather Industry, Tigray region, northern Ethiopia.

    Kahsay, Tesfay; Negash, Guesh; Hagos, Yohannes; Hadush, Birhanu


    Skins and hides are perishable resources that can be damaged by parasitic diseases and human error, which result in downgrading or rejection. This study was conducted to identify defect types and to determine their prevalence in pickled sheep and wet blue goat skins and wet blue hides. Each selected skin or hide was examined for defects in natural light and the defects were graded according to established quality criteria in Ethiopian standard manuals. Major defects were captured by digital photography. The major pre-slaughter defects included scratches (64.2%), cockle (ekek) (32.8%), wounds or scars (12.6%), lesions from pox or lumpy skin disease (6.1%), poor substance (5%), branding marks (2.3%) and tick bites (1.5%). The presence of grain scratches in wet blue hides (76.3%) was significantly higher than in pickled sheep (67.2%) and wet blue goat (59.1%) skins. The major slaughter defects included flay cuts or scores, holes, poor pattern and vein marks, with a higher occurrence in wet blue goat skins (28.7%; P < 0.001) than in wet blue hides (22.8%) and pickled sheep skins (11.1%). The most prevalent postslaughter defects were grain cracks (14.9%), hide beetle damage (8%), damage caused by heat or putrefaction (3.7%) and machine-induced defects (0.5%). Grain cracks (27.04%) and hide beetle damage (13.9%) in wet blue goat skins were significantly more common than in wet blue hides and pickled sheep skins. These defects cause depreciation in the value of the hides and skins. Statistically significant (P < 0.001) higher rejection rates were recorded for wet blue hides (82.9%) than for pickled sheep skins (18.3%) and wet blue goat skins (8.5%). Improved animal health service delivery, effective disease control strategies and strong collaboration between stakeholders are suggested to enhance the quality of skins and hides.

  16. A Novel Approach for Arabic Text Steganography Based on the “BloodGroup” Text Hiding Method

    S. Malalla,


    Full Text Available Steganography is the science of hiding certain messages (data in groups of irrelevant data possibly of other form. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Text Steganography is the process of embedding secret message (text in another text (cover text so that the existence of secret message cannot be detected by a third party. This paper presents a novel approach for text steganography using the Blood Group (BG method based on the behavior of blood group. Experimentally it is found that the proposed method got good results in capacity, hiding capacity, time complexity, robustness, visibility, and similarity which shows its superiority as compared to most several existing methods.

  17. Novel Synthesis of Sol-gel Derived Nanosized Mullite Powder

    LIANG Long; LI Jian-bao; LIN Hong; GUO Gang-feng; HE Ming-sheng


    Using hydrous aluminum chloride (AlCl3 6H2O) and silicon ethoxide (Si (OC2H5)4) as raw materials, a kind of nano-sized mullite powder was synthesized with the sol-gel process at the medium calcination temperature. The microstructures of the alumina-silica binary aerogel and calcined nano-sized materials were investigated by means of thermogravimetry-differential thermal analysis (TG-DTA), scanning electron microscopy (SEM) and X-ray diffractometer (XRD). The results show that the mullitization of Al2O3-SiO2 in gel starts from about 1 000 ℃ and its formation of mullite takes place in the range of 1 100 ℃-1 250 ℃. The size of the nano-sized mullite powder calcined at 1 250 ℃ is measured to be about 30 nm.

  18. Analysis of Pelletizing of Granulometric Separation Powder from Cork Industries

    Irene Montero


    Full Text Available Cork industries generate a considerable amount of solid waste during their processing. Its management implies a problem for companies that should reconsider its reuse for other purposes. In this work, an analysis of pelletizing of granulometric separation powder, which is one of the major wastes in cork industries and which presents suitable properties (as an raw material for its thermal use, is studied. However, its characteristic heterogeneity, along with its low bulk density (which makes its storage and transportation difficult are restrictive factors for its energy use. Therefore, its densified form is a real alternative in order to make the product uniform and guarantee its proper use in boiler systems. Thus, the cork pellets (from granulometric separation powder in the study met, except for ash content specification, the specifications in standard European Norm EN-Plus (B for its application as fuel for domestic use.

  19. [The species traceability of the ultrafine powder and the cell wall-broken powder of herbal medicine based on DNA barcoding].

    Xiang, Li; Tang, Huan; Cheng, Jin-le; Chen, Yi-long; Deng, Wen; Zheng, Xia-sheng; Lai, Zhi-tian; Chen, Shi-lin


    Ultrafine powder and cell wall-broken powder of herbal medicine lack of the morphological characters and microscopic identification features. This makes it hard to identify herb's authenticity with traditional methods. We tested ITS2 sequence as DNA barcode in identification of herbal medicine in ultrafine powder and cell wall-broken powder in this study. We extracted genomic DNAs of 93 samples of 31 representative herbal medicines (28 species), which include whole plant, roots and bulbs, stems, leaves, flowers, fruits and seeds. The ITS2 sequences were amplified and sequenced bidirectionally. The ITS2 sequences were identified using Basic Local Alignment Search Tool (BLAST) method in the GenBank database and DNA barcoding system to identify the herbal medicine. The genetic distance was analyzed using the Kimura 2-parameter (K2P) model and the Neighbor-joining (NJ) phylogenetic tree was constructed using MEGA 6.0. The results showed that DNA can be extracted successfully from 93 samples and high quality ITS2 sequences can be amplified. All 31 herbal medicines can get correct identification via BLAST method. The ITS2 sequences of raw material medicines, ultrafine powder and cell wall-broken powder have same sequence in 26 herbal medicines, while the ITS2 sequences in other 5 herbal medicines exhibited variation. The maximum intraspecific genetic-distances of each species were all less than the minimum interspecific genetic distances. ITS2 sequences of each species are all converged to their standard DNA barcodes using NJ method. Therefore, using ITS2 barcode can accurately and effectively distinguish ultrafine powder and cell wall-broken powder of herbal medicine. It provides a new molecular method to identify ultrafine powder and cell wall-broken powder of herbal medicine in the quality control and market supervision.

  20. Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding

    Sun, Jianglin; Liao, Xiaofeng; Chen, Xin; Guo, Shangwei

    The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.

  1. Directionally hiding objects and creating illusions above a carpet-like device by reflection holography

    Cheng, Qiluan; Wu, Kedi; Shi, Yile; Wang, Hui; Wang, Guo Ping


    Realization of a perfect invisibility cloak still challenges the current fabricating technologies. Most experiments, if not all, are hence focused on carpet cloaks because of their relatively low requirements to material properties. Nevertheless, present invisibility carpets are used to hide beneath objects. Here, we report a carpet-like device to directionally conceal objects and further to create illusions above it. The device is fabricated through recording a reflection hologram of objects and is used to produce a time-reversed signal to compensate for the information of the objects and further to create light field of another object so as to realize both functions of hiding the objects and creating illusions, respectively. The carpet-like device can work for macroscopic objects at visible wavelength as the distance between objects and device is at decimeter scale. Our carpet-like device to realizing invisibility and creating illusions may provide a robust way for crucial applications of magic camouflaging and anti-detection etc.

  2. Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm

    Ching-Yu Yang


    Full Text Available This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.

  3. Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding

    Bahi, Jacques M; Guyeux, Christophe; Wang, Qianxue


    Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern. The discovery of new pseudo-random number generators with a strong level of security is a field of research in full expansion, due to the fact that numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we described a generator based on chaotic iterations which behaves chaotically as defined by Devaney. In this paper which is an extension of the work presented at the conference Internet`10, the proposal is to improve the speed, the security, and the evaluation of this generator, to make its use more relevant in the Internet security context. In order to do so, a comparative study between various generators is carried out and statistical results are improved. Finally, an application in the information hiding framework is presented with details, to give an illustrative example of the use of such a gener...

  4. HIDE & SEEK: End-to-End Packages to Simulate and Process Radio Survey Data

    Akeret, Joel; Chang, Chihway; Monstein, Christian; Amara, Adam; Refregier, Alexandre


    As several large radio surveys begin operation within the coming decade, a wealth of radio data will become available and provide a new window to the Universe. In order to fully exploit the potential of these data sets, it is important to understand the systematic effects associated with the instrument and the analysis pipeline. A common approach to tackle this is to forward-model the entire system - from the hardware to the analysis of the data products. For this purpose, we introduce two newly developed, open-source Python packages: the HI Data Emulator (HIDE) and the Signal Extraction and Emission Kartographer (SEEK) for simulating and processing radio survey data. HIDE forward-models the process of collecting astronomical radio signals in a single dish radio telescope instrument and outputs pixel-level time-ordered-data. SEEK processes the time-ordered-data, removes artifacts from Radio Frequency Interference (RFI), automatically applies flux calibration, and aims to recover the astronomical radio signal....

  5. Secure Reversible Data Hiding in Encrypted Images by Allocating Memory before Encryption via Security keys

    Priya Jambhulkar


    Full Text Available Digital image and information embedding system have number of important multimedia applications. Recently, attention is paid to reversible data hiding (RDH in encrypted images is more, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is extracted while protecting the image content’s confidentiality. RDH is a technique used to hide data inside image for high security in such a way that original data is not visible. All previous methods embed data by reversibly vacating room from the encrypted images, which may be subject to some errors on data extraction and/or image restoration. In this paper, we propose another method in which we simply encrypt an image without its header by using our own algorithm. And thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.

  6. Towards fraud-proof ID documents using multiple data hiding technologies and biometrics

    Picard, Justin; Vielhauer, Claus; Thorwirth, Niels


    Identity documents, such as ID cards, passports, and driver's licenses, contain textual information, a portrait of the legitimate holder, and eventually some other biometric characteristics such as a fingerprint or handwritten signature. As prices for digital imaging technologies fall, making them more widely available, we have seen an exponential increase in the ease and the number of counterfeiters that can effectively forge documents. Today, with only limited knowledge of technology and a small amount of money, a counterfeiter can effortlessly replace a photo or modify identity information on a legitimate document to the extent that it is very diffcult to differentiate from the original. This paper proposes a virtually fraud-proof ID document based on a combination of three different data hiding technologies: digital watermarking, 2-D bar codes, and Copy Detection Pattern, plus additional biometric protection. As will be shown, that combination of data hiding technologies protects the document against any forgery, in principle without any requirement for other security features. To prevent a genuine document to be used by an illegitimate user,biometric information is also covertly stored in the ID document, to be used for identification at the detector.

  7. Temporal cloak with large fractional hiding window at telecommunication data rate

    Zhou, Feng; Dong, Jianji; Yan, Siqi; Yang, Ting


    We design and experimentally investigate a temporal cloak scheme using ultrashort pulse compression and time-domain Fraunhofer diffraction. An input continuous-wave probe beam is compressed to ultrashort pulse train based on self-phase modulation effect and chirp compensation using single mode fiber. Accordingly, wide temporal gaps appear to act as the cloaking windows. The train of ultrashort pulses can be converted to continuous wave after experiencing enough dispersion, indicating that the temporal gaps are closed. Thus, any time events will be hidden in the temporal gaps from observers. In our study, we demonstrated a temporal cloak system, which is able to hide 88% of the whole time period and cloak pseudorandom digital data at a bitrate of 10 Gbit/s. The relationships of cloaking window fraction versus pump power and the condition of cloaking off are also investigated. These results present a new feasible way towards obtaining a high-fractional cloaking window at telecommunication data rate and hiding real-world messages.

  8. Hide unhairing and characterization of commercial enzymes used in leather manufacture

    A Dettmer


    Full Text Available The enzymatic treatment of hides in tannery processes is a promising technology. However, the reaction kinetics of commercial enzymes available to the leather industry are not fully understood and their activities have been mainly determined with model proteins such as casein as substrate, which are not of direct relevance for cattle hides. Therefore, it is important to determine their activities on collagen and keratin, the main proteins of skin, in order to use these enzymes in leather processing. This work describes the study of five proteases, used commercially in tanneries, to assess their ability to act upon collagen and keratin and to determine their unhairing. Results showed that all commercial enzymes tested had more activity on collagen than on keratin. Unhairing was also tested and four out of the five enzymes tested showed some unhairing activity. Optima of the temperature and pH of the enzymes were very similar for all five enzymes, with maximal activities around 55ºC and pH 9 to 12, respectively.

  9. Modified Approach for Hiding Sensitive Association Rules for Preserving Privacy in Database

    Tania Banerjee


    Full Text Available Data mining is the process of analyzing large database to find useful patterns. The term pattern refers to the items which are frequently occurring in set of transaction. The frequent patterns are used to find association between sets of item. The efficiency of mining association rules and confidentiality of association rule is becoming one of important area of knowledge discovery in database. This paper is organized into two sections. In the system Apriori algorithm is being presented that efficiently generates association rules. These reduces unnecessary database scan at time of forming frequent large item sets .We have tried to give contribution to improved Apriori algorithm by hiding sensitive association rules which are generated by applying improved Apriori algorithm on supermarket database. In this paper we have used novel approach that strategically modifies few transactions in transaction database to decrease support and confidence of sensitive rule without producing any side effects. Thus in the paper we have efficiently generated frequent item set sets by applying Improved Apriori algorithm and generated association rules by applying minimum support and minimum confidence and then we went one step further to identify sensitive rules and tried to hide them without any side effects to maintain integrity of data without generating spurious rules.

  10. Double Hiding Information in Color Image File Based on Classical LSB Method

    Aymen Mudheher Badr


    Full Text Available This study presents a two principles, Cryptography and Steganography, each tow methods work separately from the other to ensure a secure content. We are developed an algorithm to increase the safety and reliability of the copyrights of the images or books (etc. that published on the internet by providing a watermark image (as logo hiding inside the original file that we want product it. Firstly reading image (the logo image, convert it to binary and encrypted it by using EX-OR with a secret key and embedding it inside a gray image in the LSB (in the 1st and hiding first key in the 2nd bit and the second key in the 3rd bit, then we embedding them in the LSB of Original image in RGB to be protected. The two secret keys, first one as an encryption key and the second key using as signature (data that have been taken from the cover image (original to make sure the reliability of the image transmitted via the Internet.

  11. A one-time pad encryption method combining full-phase image encryption and hiding

    Li, Jiaosheng; Xiong, Jiaxiang; Zhang, Qinnan; Zhong, Liyun; Zhou, Yunfei; Li, Jun; Lu, Xiaoxu


    A one-time pad encryption method combining full-phase image encryption and hiding is proposed. Firstly, original images are encoded in the phase and encrypted by phase keys loaded on the phase-only liquid crystal spatial light modulator, where the phase keys can be distributed using a quantum key distribution method. Subsequently, a host image is introduced to produce a reference wave, and overlap with an object wave to form an interferogram. Finally, based on phase-shifting interferometry, we can achieve the above encrypted image hiding. Both the simulation and experiment research demonstrate the feasibility of the proposed method, meanwhile the key and the encrypted image can be changed randomly, so the proposed system reveals the high flexibility, anti-attack ability and can be used to implement the one-time pad to achieve absolute secure transmission with the quantum key distribution method. Moreover, system security will be improved due to the fact that encryption information hidden in the host image can be treated as background noise, which does not attract the attention of the attacker.

  12. Direct fermentation of raw starch using a Kluyveromyces marxianus strain that expresses glucoamylase and alpha-amylase to produce ethanol.

    Wang, Rongliang; Wang, Dongmei; Gao, Xiaolian; Hong, Jiong


    Raw starch and raw cassava tuber powder were directly and efficiently fermented at elevated temperatures to produce ethanol using the thermotolerant yeast Kluyveromyces marxianus that expresses α-amylase from Aspergillus oryzae as well as α-amylase and glucoamylase from Debaryomyces occidentalis. Among the constructed K. marxianus strains, YRL 009 had the highest efficiency in direct starch fermentation. Raw starch from corn, potato, cassava, or wheat can be fermented at temperatures higher than 40°C. At the optimal fermentation temperature 42°C, YRL 009 produced 66.52 g/L ethanol from 200 g/L cassava starch, which was the highest production among the selected raw starches. This production increased to 79.75 g/L ethanol with a 78.3% theoretical yield (with all cassava starch were consumed) from raw cassava starch at higher initial cell densities. Fermentation was also carried out at 45 and 48°C. By using 200 g/L raw cassava starch, 137.11 and 87.71 g/L sugar were consumed with 55.36 and 32.16 g/L ethanol produced, respectively. Furthermore, this strain could directly ferment 200 g/L nonsterile raw cassava tuber powder (containing 178.52 g/L cassava starch) without additional nutritional supplements to produce 69.73 g/L ethanol by consuming 166.07 g/L sugar at 42°C. YRL 009, which has consolidated bioprocessing ability, is the best strain for fermenting starches at elevated temperatures that has been reported to date.

  13. Rapid Characterization of Tanshinone Extract Powder by Near Infrared Spectroscopy

    Gan Luo


    Full Text Available Chemical and physical quality attributes of herbal extract powders play an important role in the research and development of Chinese medicine preparations. The active pharmaceutical ingredients have a direct impact on the herbal extract’s efficacy, while the physical properties of raw material affect the pharmaceutical manufacturing process and the final products’ quality. In this study, tanshinone extract powders from Salvia miltiorrhiza which are widely used for the treatment of cardiovascular diseases in the clinic are taken as the research object. Both the chemical information and physical information of tanshinone extract powders are analyzed by near infrared (NIR spectroscopy. The partial least squares (PLS and least square support vector machine (LS-SVM models are investigated to build the relationship between NIR spectra and reference values. PLS models performed well for the content of crytotanshinone, tanshinone IIA, the moisture, and average median particle size, while, for specific surface area and tapped density, the LS-SVM models performed better than the PLS models. Results demonstrated NIR to be a valid and fast process analytical technology tool to simultaneously determine multiple quality attributes of herbal extract powders and indicated that there existed some nonlinear relationship between NIR spectra and physical quality attributes.

  14. Efficacy of octenidine hydrochloride for reducing Escherichia coli O157:H7, Salmonella spp., and Listeria monocytogenes on cattle hides.

    Baskaran, Sangeetha Ananda; Upadhyay, Abhinav; Upadhyaya, Indu; Bhattaram, Varunkumar; Venkitanarayanan, Kumar


    The efficacy of octenidine hydrochloride (OH; 0.025, 0.15, and 0.25%) for inactivating Escherichia coli O157:H7, Salmonella spp., and Listeria monocytogenes on cattle hides was investigated at 23°C in the presence and absence of bovine feces. All tested concentrations of OH were effective in decreasing more than 5.0 log CFU of bacteria/cm(2) in 5 min (P < 0.01). The results suggest that OH could be used to decontaminate cattle hides; however, further studies under commercial settings are necessary to validate these results.

  15. Complex Dietary Supplements from Raw Plants Provide Nutrition for Athletes

    Dmitriy M. Uvarov


    Full Text Available The aim of this study was to investigate the effectiveness of mechanically activated complexes from plant substances to enhance athletes’ adaptability to intense physical activity. Methods: The object of the study was the dietary supplement Kladorod, which is based on the reindeer lichen Cladonia rangiferina and Rhodiola rosea in weight ratio of 10:1. To test the dietary supplement, we developed a special scheme for the experiment and selected 10 elite athletes (boxers and mixfighters. Athletes were divided into 2 groups and were under the same conditions (nutrition, medical monitoring, living conditions and training process. Athletes of the experimental group were given the dietary supplement Kladorod (capsule of 0.4 g by mouth between meals 4 times a day for 28 days. The control group was given placebo (Ringer-Locke powder capsules in the same terms in a similar way. During the experiment, the athletes were medically examined 3 times: at the beginning, in the middle, and after the course of intervention. We measured muscle performance, fat mass, muscle mass, and serum concentrations of cortisol and total testosterone. Results: It was established that during the intensive training of boxers and mixfighters for rating fights, administration of the dietary supplement Kladorod for 28 days stabilized the absolute and relative muscle mass, preventing its reduction, in comparison with the placebo group. At the same time, indicators of fat mass decreased significantly in the experimental group. After administering the course of Kladorod, we did not observe a significant decrease in testosterone/cortisol ratio, compared to the control group Thus, the use of biologically active supplements based on lichen raw materials and complexes of lichen raw materials with different plant substances enables the body to increase its adaptive potential and physical capacity.

  16. Method of manufacturing powder particles

    Borra, J.P.D.


    The invention relates to a method of manufacturing a dry powder particle, preferably using electro-hydrodynamic spraying, wherein two oppositely charged aerosol streams are contacted. The invention allows for the manufacture of powders having various, controllable compositions and shapes. In

  17. Method of manufacturing powder particles

    Borra, J.P.D.


    The invention relates to a method of manufacturing a dry powder particle, preferably using electro-hydrodynamic spraying, wherein two oppositely charged aerosol streams are contacted. The invention allows for the manufacture of powders having various, controllable compositions and shapes. In particu



    Due to its high polishing efficiency, long working life and wide application range, RE polishing powder has become the most popular fine polishing material. In recent years, accompanying the rapid development of electronic information technology, the demand for polishing powder is

  19. Evaluation of bacteriophage application to cattle in lairage at beef processing plants to reduce Escherichia coli O157:H7 prevalence on hides and carcasses

    Escherichia coli O157:H7 is a major food safety concern for the beef industry. Several studies have provided evidence that cattle hides are the main source of beef carcass contamination during processing and that reductions in the E. coli O157:H7 load on the hides of cattle entering processing faci...

  20. Factors affecting lactose quantity in raw milk

    Rubporn Kittivachra


    Full Text Available The purpose of this study was to characterize factors affecting lactose quantities in raw cow's milk. This study combined the survey design with laboratory analysis. Selected farm members of Nong Poh Dairy Cooperatives, from Ban Pong and Photharam Districts, Ratchaburi Province, were sampled. From the selected farms, data collected included lactose quantities in the raw milk and dairy farming information. The raw milk of selected farms was sampled at the delivery site of Nong Poh dairy cooperatives in the morning during December 2003 till February 2004. Lactose in the raw milk was then quantified by the Fourier Transform Infrared Analysis (FTIR using the MilkoScan FT6000 at the Department of Livestock Development. The farm owners or managers of selected farms were in-depth interviewed on dairy farming information including cowsí health and cows' diet. The data revealed that all cows from the selected farms were fed with concentrate diet purchased from Nong Poh Dairy Cooperatives and grass as high fiber diets. Sample of eighteen farms also fed their cows with one of supplements: corn stem, soybean meal, or rice straw. All cows from these farms were Holstein-Friesian Hybrid. As supplemented high fiber diets, corn stem significantly increased the lactose quantities over soybean meal and rice straw (planned comparison, pvalue = 0.044. The study concluded that some high fiber diets, specifically corn stem, significantly contributed to the lactose quantities in raw milk.

  1. Improving the raw management in Ukraine

    Jung, H.G.; Koever, M. [NUKEM Technologies GmbH, Alzenau (Germany)


    In Ukraine 13 VVER-1000 and 2 VVER-440 reactor units generate about 50 % of the country's energy production. By contrast, when looking at the large volume of radioactive waste of all categories, which is produced by these nuclear power plants (NPP), the radioactive waste (RAW) management - onsite of NPP, towards interim storage as well as towards final disposal - is still not adequately developed. Currently all operational waste of Ukrainian NPP is incompletely treated/conditioned and stored onsite, though insufficient storage capacity is available at the NPP. As no effective Ukraine-wide strategy is yet established to manage RAW beyond NPP a serious situation could arise, which even leads to constrained temporary shut-down of reactor units, threatening the energy supply of whole the country. In addition large quantities of RAW, partly badly sorted, derive from decommissioning of the shut-down Chernobyl NPP. Also other sources of RAW contribute to the whole volume, which has to be managed in Ukraine, as research reactors, reprocessing of spent nuclear fuel and other nuclear facilities and applications. Nevertheless, operational and shut-down NPP in Ukraine are by far the largest producers. To support Ukraine in managing their radioactive waste NUKEM Technologies GmbH was appointed to provide technical support for the improvement of the current situation in cooperation with responsible Ukrainian experts towards a targeted, comprehensive and effective RAW management. (orig.)

  2. Fabrication of TiB2 composite powders coated with BN by high speed airflow impact

    FENG Cai-mei; WANG Wei-min; FU Zheng-yi


    TiB2 powders coated with BN were prepared by Hybridization System making use of dry impact blending method to achieve powder surface modification. Parameters of coating were analyzed and the most appropriate condition was summarized. Scan electron microscope of JSM-5610LV and transmission electron microscope of H600STEM/EDS were used to observe the microstructure of coated powders. Results show that treatment time, rotation speed, granularity ratio of TiB2 to BN, pretreatment of materials etc influence the coating results evidently.Mixing raw materials and coating with BN under the appropriate condition can get round TiB2/BN composite powder with smooth surface and compact coating layer.

  3. Powder-Bed Stabilization for Powder-Based Additive Manufacturing

    Andrea Zocca


    Full Text Available The most successful additive manufacturing (AM technologies are based on thelayer-by-layer depositionof a flowable powder. Although considered as the third industrial revolution, one factor still limiting these processes to become completely autonomous is the often necessary build-up of support structures. Besides the prevention of lateral shifts of the part during the deposition of layers, the support assures quality and stability to the built process. The loose powder itself surrounding the built object, or so-called powder-bed, does not provide this sustenance in most existent technology available. Here we present a simple but effective and economical method for stabilizing the powder-bed, preventing distortions in the geometry with no need for support structures. This effect, achieved by applying an air flow through the powder-bed, is enabling an entirely autonomous generation of parts and is a major contribution to all powder-based additive manufacturing technologies. Moreover, it makes powder-based AM independent of gravitational forces, which will facilitate crafting items in space from a variety of powdery materials.

  4. ISMRM Raw data format: A proposed standard for MRI raw datasets

    Inati, Souheil; Naegle, Joseph; R. Zwart, Nicholas


    Purpose This work proposes the ISMRM Raw Data format as a common MR raw data format, which promotes algorithm and data sharing. Methods A file format consisting of a flexible header and tagged frames of k-space data was designed. Application Programming Interfaces were implemented in C/C++, MATLAB...

  5. Effects of whey or maltodextrin addition during production on physical quality of white cheese powder during storage.

    Erbay, Zafer; Koca, Nurcan


    There is an increasing demand for cheese as a food ingredient, especially as a flavoring agent. One of the most important cheese flavoring agents is cheese powder. To obtain an intense cheese flavor, ripened cheese is used as a raw material in cheese powder but this increases production costs. Moreover, use of natural cheese decreases the physical quality of powder because of its high fat content. In this study, we evaluated opportunities to use whey or maltodextrin for improving the physical quality of powders in production of white cheese powder. We produced cheese powders with 3 different formulations-control (CON), whey-added (WACP), and maltodextrin-added (MACP)-and determined the effects of formulation on cheese powder quality. Physical quality parameters such as color, densities, reconstitution properties, free fat content, particle morphology, and sensory characteristics were investigated. The different cheese powders were stored for 12 mo at 20°C and we evaluated the effect of storage on powder quality. Addition of maltodextrin to cheese powder formulations significantly improved their physical quality. The densities and reconstitution properties of cheese powder were increased and free fat content was decreased by use of maltodextrin. The MACP particles were spherical with a uniform distribution and larger particle sizes, whereas CON and WACP particles were wrinkled, irregular shaped with deep surface dents, and variable in size. Although caking was observed in scanning electron micrographs after 12 mo of storage, it was not detected by sensory panelists. The color of cheese powders changed very slowly during storage but browning was detected. The results of this study show that it is possible to use maltodextrin or whey in production of white cheese powder to reduce production costs and improve the physical quality of powders.

  6. Ethanol is a strategic raw material

    Baras Josip K.


    Full Text Available The first part of this review article considers general data about ethanol as an industrial product, its qualities and uses. It is emphasized that, if produced from biomass as a renewable raw material, its perspectives as a chemical raw material and energent are brilliant. Starchy grains, such as corn, must be used as the main raw materials for ethanol production. The production of bioethanol by the enzyme-catalyzed conversion of starch followed by (yeast fermentation, distillation is the process of choice. If used as a motor fuel, anhydrous ethanol can be directly blended with gasoline or converted into an oxygenator such as ETBE. Finally, bioethanol production in Yugoslavia and the possibilities for its further development are discussed.


    Havelka Jaroslav


    Full Text Available It is the existence of the domestic base of raw materials and stable or growing markets that are a precondition for the prospectiveness industrial minerals. Traditional and non-traditional prospective nonmetal-liferous raw materials can be distinguished. The main trends in new industrial applications of industrial minerals are being stated. In the Czech Republic, the following may be ranked among the traditional prospective nonme-talliferous raw materials: kaoline, refractory clays, ceramic and expandable clays, glass and foundry sands, li-mestones, building stones, gypsum, cast basalt, bentonite, diatomite, feldspars, graphite. Alkali rocks, industrial garnets, flaky mica, wollastonite and yet unmined staurolite, minerals of the sillimanite group and others belong to the non-traditional prospective industrial minerals.

  8. Purifications of calcium carbonate and molybdenum oxide powders for neutrinoless double beta decay experiment, AMoRE

    Park, HyangKyu [Center for Underground Physics, Institute for Basic Science, 70, Yuseong-daero 1689-gil, Yuseong-gu, Daejeon, Korea, 305-811 (Korea, Republic of)


    The AMoRE (Advanced Mo based Rare process Experiment) collaboration is going to use calcium molybdate crystals to search for neutrinoless double beta decay of {sup 100}Mo isotope. In order to make the crystal, we use calcium carbonate and molybdenum oxide powders as raw materials. Therefore it is highly necessary to reduce potential sources for radioactive backgrounds such as U and Th in the powders. In this talk, we will present our studies for purification of calcium carbonate and molybdenum oxide powders.

  9. Adsorption of arsenate on untreated dolomite powder.

    Ayoub, G M; Mehawej, M


    Raw dolomite powder was evaluated for its efficiency in adsorbing As(V) from water. An experimental setup comprised of a fluidized dolomite powder bed was used to assess the impact of various test variables on the efficiency of removal of As(V). Test influents including distilled water (DW), synthetic groundwater (SGW) and filtered sewage effluent (FSE) were employed to assess the effect of influent parameters on the adsorption process and the quality of the effluent generated. Dolomite exhibited good As(V) removal levels for distilled water (>92%) and synthetic ground water (>84%) influents at all initial As(V) concentrations tested (0.055-0.600 ppm). Breakthrough of dolomite bed occurred after 45 bed volumes for DW and 20 bed volumes for SGW influents with complete breakthrough taking place at more than 300 bed volumes. As(V) removal from FSE influents was relatively unsuccessful as compared to the DW and SGW influents. Partial removal in the order of 32% from filtered sewage effluent at initial concentration of 0.6 mg/L started at 75 bed volumes and gradually stopped at 165 bed volumes. Varying degrees of As(V) adsorption capacities were observed by the different test influents employed, which indicate that the adsorption of As(V) is adversely affected by competing species, mainly sulfates and phosphates present in the influent. The adsorptive behavior of dolomite was described by fitting data generated from the study into the Langmuir and Freundlich isotherm models. Both models described well the adsorption of dolomite. The average isotherm adsorptive capacity was determined at 5.02 mug/g. Regeneration of the dolomite bed can be achieved with the use of caustic soda solution at a pH of 10.5.

  10. Preoperational test report, raw water system

    Clifton, F.T.


    This represents the preoperational test report for the Raw Water System, Project W-030. Project W-030 provides a ventilation upgrade for the four Aging Waste Facility tanks. The system supplies makeup water to the W-030 recirculation evaporative cooling towers for tanks AY1O1, AY102, AZ1O1, AZ102. The Raw Water pipe riser and associated strainer and valving is located in the W-030 diesel generator building. The tests verify correct system operation and correct indications displayed by the central Monitor and Control System.

  11. Black powder in gas pipelines

    Sherik, Abdelmounam [Saudi Aramco, Dhahran (Saudi Arabia)


    Despite its common occurrence in the gas industry, black powder is a problem that is not well understood across the industry, in terms of its chemical and physical properties, source, formation, prevention or management of its impacts. In order to prevent or effectively manage the impacts of black powder, it is essential to have knowledge of its chemical and physical properties, formation mechanisms and sources. The present paper is divided into three parts. The first part of this paper is a synopsis of published literature. The second part reviews the recent laboratory and field work conducted at Saudi Aramco Research and Development Center to determine the compositions, properties, sources and formation mechanisms of black powder in gas transmission systems. Microhardness, nano-indentation, X-ray Diffraction (XRD), X-ray Fluorescence (XRF) and Scanning Electron Microscopy (SEM) techniques were used to analyze a large number of black powder samples collected from the field. Our findings showed that black powder is generated inside pipelines due to internal corrosion and that the composition of black powder is dependent on the composition of transported gas. The final part presents a summary and brief discussion of various black powder management methods. (author)

  12. Non-blind Data hiding for RGB images using DCT-based fusion and H.264 compression concepts

    Safwat Hamad

    Full Text Available Steganography is the field of research that provides innovative solutions to the problem of secure data communication. In this paper, a non-blind data hiding technique is proposed which is based on data fusion between both the cover and the secret images. ...

  13. Low pressure powder injection moulding of stainless steel powders

    Zampieron, J.V.; Soares, J.P.; Mathias, F.; Rossi, J.L. [Powder Processing Center CCP, Inst. de Pesquisas Energeticas e Nucleares, Sao Paulo, SP (Brazil); Filho, F.A. [IPEN, Inst. de Pesquisas Energeticas e Nucleares, Cidade Univ., Sao Paulo, SP (Brazil)


    Low-pressure powder injection moulding was used to obtain AISI 316L stainless steel parts. A rheological study was undertaken using gas-atomised powders and binders. The binders used were based on carnauba wax, paraffin, low density polyethylene and microcrystalline wax. The metal powders were characterised in terms of morphology, particle size distribution and specific surface area. These results were correlated to the rheological behaviour. The mixture was injected in the shape of square bar specimens to evaluate the performance of the injection process in the green state, and after sintering. The parameters such as injection pressure, viscosity and temperature were analysed for process optimisation. The binders were thermally removed in low vacuum with the assistance of alumina powders. Debinding and sintering were performed in a single step. This procedure shortened considerably the debinding and sintering time. (orig.)


    Yash Mishra


    Full Text Available In this study, the adsorption potential of Teak (Tectona grandis leaf powder (TLP toremove Methylene blue (MB and Malachite Green (MG dye molecules from aqueoussolution was investigated. Batch experiments were conducted to evaluate the influenceof operational parameters such as, pH (2−9, adsorbent dosage (1−7 g/L, contact time(15−150 minutes and initial dye concentration (20−120 mg/L at stirring speed of 150rpm for the adsorption of MB and MG on TLP. Maximum removal efficiency of 98.4%and 95.1% was achieved for MB and MG dye, respectively. The experimentalequilibrium data were analysed using Langmuir, Freundlich and Temkin isothermmodels and it was found that, it fitted well to the Freundlich isotherm model. Thesurface structure and morphology of the adsorbent was characterized using scanningelectron microscopy (SEM and the presence of functional groups and its interactionwith the dye molecules were analysed using Fourier transform infrared spectroscopy(FTIR. Based on the investigation, it has been demonstrated that the teak leaf powderhas good potential for effective adsorption of methylene blue and malachite green dye.

  15. Image fusion using wavelet transform and its application to asymmetric cryptosystem and hiding.

    Mehra, Isha; Nishchal, Naveen K


    Image fusion is a popular method which provides better quality fused image for interpreting the image data. In this paper, color image fusion using wavelet transform is applied for securing data through asymmetric encryption scheme and image hiding. The components of a color image corresponding to different wavelengths (red, green, and blue) are fused together using discrete wavelet transform for obtaining a better quality retrieved color image. The fused color components are encrypted using amplitude- and phase-truncation approach in Fresnel transform domain. Also, the individual color components are transformed into different cover images in order to result disguising information of input image to an attacker. Asymmetric keys, Fresnel propagation parameters, weighing factor, and three cover images provide enlarged key space and hence enhanced security. Computer simulation results support the idea of the proposed fused color image encryption scheme.

  16. An improved algorithm for information hiding based on features of Arabic text: A Unicode approach

    A.A. Mohamed


    Full Text Available Steganography means how to hide secret information in a cover media, so that other individuals fail to realize their existence. Due to the lack of data redundancy in the text file in comparison with other carrier files, text steganography is a difficult problem to solve. In this paper, we proposed a new promised steganographic algorithm for Arabic text based on features of Arabic text. The focus is on more secure algorithm and high capacity of the carrier. Our extensive experiments using the proposed algorithm resulted in a high capacity of the carrier media. The embedding capacity rate ratio of the proposed algorithm is high. In addition, our algorithm can resist traditional attacking methods since it makes the changes in carrier text as minimum as possible.


    Sadia Aslam


    Full Text Available This paper presents a data hiding application for document images providing security. Document images should be in bitmap format as well as grayscale in nature otherwise the developed system will automatically change it to grayscale. The system accepts any grayscale document image as an input and applies the developed technique on it. Developed technique is based on Entropy Based that selects the suitable areas in an image for that data insertion purpose. Output produced by the system is the processed document that is data embedded. Processed document should not look different from the original image means its visual quality should be high. The system is successfully tested for the test cases generated to check the effectiveness, quality and validation of the system. The system is developed using Matlab 7.7.0 (R2008b for the development of front end as well as the back end.

  18. Costly hide and seek pays: Unexpected consequences of deceit in a social dilemma

    Szolnoki, Attila


    Deliberate deceptiveness intended to gain an advantage is commonplace in human and animal societies. In a social dilemma, an individual may only pretend to be a cooperator to elicit cooperation from others, while in reality he is a defector. With this as motivation, we study a simple variant of the evolutionary prisoner's dilemma game entailing deceitful defectors and conditional cooperators that lifts the veil on the impact of such two-faced behavior. Defectors are able to hide their true intentions at a personal cost, while conditional cooperators are probabilistically successful at identifying defectors and act accordingly. By focusing on the evolutionary outcomes in structured populations, we observe a number of unexpected and counterintuitive phenomena. We show that deceitful behavior may fare better if it is costly, and that a higher success rate of identifying defectors does not necessarily favor cooperative behavior. These results are rooted in the spontaneous emergence of cycling dominance and spatia...

  19. HIDES spectroscopy of bright detached eclipsing binaries from the $Kepler$ field - I. Single-lined objects

    Hełminiak, K G; Kambe, E; Kozłowski, S K; Sybilski, P; Ratajczak, M; Maehara, H; Konacki, M


    We present results of our spectroscopic observations of nine detached eclipsing binaries (DEBs), selected from the $Kepler$ Eclipsing Binary Catalog, that only show one set of spectral lines. Radial velocities (RVs) were calculated from the high resolution spectra obtained with the HIDES instrument, attached to the 1.88-m telescope at the Okayama Astrophysical Observatory, and from the public APOGEE archive. In our sample we found five single-lined binaries, with one component dominating the spectrum. The orbital and light curve solutions were found for four of them, and compared with isochrones, in order to estimate absolute physical parameters and evolutionary status of the components. For the fifth case we only update the orbital parameters, and estimate the properties of the unseen star. Two other systems show orbital motion with a period known from the eclipse timing variations (ETVs). For these we obtained parameters of outer orbits, by translating the ETVs to RVs of the centre of mass of the eclipsing ...

  20. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Shih-Chang Hsia


    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  1. An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security

    Farouk, Hala A


    The hybrid hiding encryption algorithm, as its name implies, embraces concepts from both steganography and cryptography. In this exertion, an improved micro-architecture Field Programmable Gate Array (FPGA) implementation of this algorithm is presented. This design overcomes the observed limitations of a previously-designed micro-architecture. These observed limitations are: no exploitation of the possibility of parallel bit replacement, and the fact that the input plaintext was encrypted serially, which caused a dependency between the throughput and the nature of the used secret key. This dependency can be viewed by some as vulnerability in the security of the implemented micro-architecture. The proposed modified micro-architecture is constructed using five basic modules. These modules are; the message cache, the message alignment module, the key cache, the comparator, and at last the encryption module. In this work, we provide comprehensive simulation and implementation results. These are: the timing diagra...

  2. Information Hiding in CSS : A Secure Scheme Text-Steganography using Public Key Cryptosystem

    Kabetta, Herman; Suyoto,


    In many recent years, the programming world has been introduced about a new programming language for designing websites, it is CSS that can be be used together with HTML to develop a web interface. And now, these two programming languages as if inseparably from each other. As a client-side scripting, CSS is visible by all users as the original script, but it can not be granted changed. Website is a tool of information disseminator throughout the world, this is certainly can be used to a secret communication by using CSS as a message hider. This paper proposed a new scheme using web tools like CSS for hiding informations. This is a secret communication mechanism using text steganography techniques that is embedded messages on CSS files and is further encrypted using RSA as a public key cryptographic algorithm.

  3. Perfectly secure steganography: Hiding information in the quantum noise of a photograph

    Sanguinetti, Bruno; Traverso, Giulia; Lavoie, Jonathan; Martin, Anthony; Zbinden, Hugo


    We show that it is possible to hide information perfectly within a photograph. The proposed protocol works by selecting each pixel value from two images that differ only by shot noise. Pixel values are never modified, but only selected, making the resulting stego image provably indistinguishable from an untampered image, and the protocol provably secure. We demonstrate that a perfect steganographic protocol is also a perfectly secure cryptographic protocol, and therefore has at least the same requirements: a truly random key as long as the message. In our system, we use a second image as the key, satisfying length requirements, and the randomness is provided by the naturally occurring quantum noise which is dominant in images taken with modern sensors. We conclude that, given a photograph, it is impossible to tell whether it contains any hidden information.

  4. Separable and Error-Free Reversible Data Hiding in Encrypted Image with High Payload

    Zhaoxia Yin


    Full Text Available This paper proposes a separable reversible data-hiding scheme in encrypted image which offers high payload and error-free data extraction. The cover image is partitioned into nonoverlapping blocks and multigranularity encryption is applied to obtain the encrypted image. The data hider preprocesses the encrypted image and randomly selects two basic pixels in each block to estimate the block smoothness and indicate peak points. Additional data are embedded into blocks in the sorted order of block smoothness by using local histogram shifting under the guidance of the peak points. At the receiver side, image decryption and data extraction are separable and can be free to choose. Compared to previous approaches, the proposed method is simpler in calculation while offering better performance: larger payload, better embedding quality, and error-free data extraction, as well as image recovery.

  5. A GA-Based Approach to Hide Sensitive High Utility Itemsets

    Chun-Wei Lin


    Full Text Available A GA-based privacy preserving utility mining method is proposed to find appropriate transactions to be inserted into the database for hiding sensitive high utility itemsets. It maintains the low information loss while providing information to the data demanders and protects the high-risk information in the database. A flexible evaluation function with three factors is designed in the proposed approach to evaluate whether the processed transactions are required to be inserted. Three different weights are, respectively, assigned to the three factors according to users. Moreover, the downward closure property and the prelarge concept are adopted in the proposed approach to reduce the cost of rescanning database, thus speeding up the evaluation process of chromosomes.

  6. Reversible Data Hiding In Encrypted Images by Reserving Room before Encryption

    Harish G, Smitha Shekar B, Prajwal R, Sunil S Shetty


    Full Text Available Recently, more and more attention is paid to reversible data hiding (RDH in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. All previous methods embed data by reversibly vacating room from the encrypted images, which may subject to some errors on data extraction and/or image restoration. Here, a novel method is proposed so as to reserve room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, i.e., data extraction and image recovery are free of any error.

  7. Block Based Information Hiding using Cosine, Hartley, Walsh and Haar Wavelets

    H. B. Ke kre


    Full Text Available Steganography is the art of hiding informationwithin other information in such a way that it ishard or even impossible to tell that it is there. Thereare many different carriers for steganography butthe most popular is digital images. Typically, themessage is embedded within another image knownas a cover image, by tweaking its properties. Theresulting output, known as astego-image isengineered such that it is a near identicalperceptual model of the cover image, but it will alsocontain the hiddenmessage.It is this stego-imagethat is sent between the sender and the receiver.Steganography is a science for invisiblecommunication and play vital role on the networksecurity.To improve the embedding capacity as wellas to have minimum distortion tocarrier media, we

  8. On the implementation of IP protection using biometrics based information hiding and firewall

    Basu, Abhishek; Nandy, Kingshuk; Banerjee, Avishek; Giri, Supratick; Sarkar, Souvik; Sarkar, Subir Kumar


    System-on-chip-based design style creates a revolution in very large scale integration industry with design efficiency, operating speed and development time. To support this process, reuse and exchange of components are essential in electronic form called intellectual property (IP). This, however, increases the possibility of encroachment of IP of the design. So copyright protection of IP against piracy is the most important concern for IP vendors. The existing solutions for IP protection are still not secure enough with flexibility, cost, etc. This paper proposes an information-hiding-based solution for IP protection by embedding a biometric copyright information and firewall inside an IP in the form of a finite state machine with unique configuration. The scheme first introduces biometric signature-based copyright as ownership proof. Second, firewall interrupts the normal functionality of IP at the end of the user time period. The experimental outcomes of field-programmable-gate-array implementation illustrate the efficiency of the proposed method.

  9. Optical image hiding based on dual-channel simultaneous phase-shifting interferometry and compressive sensing

    Li, Jiaosheng; Zhong, Liyun; Zhang, Qinnan; Zhou, Yunfei; Xiong, Jiaxiang; Tian, Jindong; Lu, Xiaoxu


    We propose an optical image hiding method based on dual-channel simultaneous phase-shifting interferometry (DCSPSI) and compressive sensing (CS) in all-optical domain. In the DCSPSI architecture, a secret image is firstly embedded in the host image without destroying the original host's form, and a pair of interferograms with the phase shifts of π/2 is simultaneously generated by the polarization components and captured by two CCDs. Then, the holograms are further compressed sampling to the less data by CS. The proposed strategy will provide a useful solution for the real-time optical image security transmission and largely reducing data volume of interferogram. The experimental result demonstrates the validity and feasibility of the proposed method.

  10. A New Method for Text Hiding in the Image by Using LSB

    Reza tavoli


    Full Text Available an important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data-hiding science which aims to reach a desirable level of security in the exchange of private military and commercial data which is not clear. These approaches can be used as complementary methods of encryption in the exchange of private data.

  11. Alien invasions and the game of hide and seek in Patagonia.

    Martin Lindegren

    Full Text Available The introduction, establishment and spread of alien species is a major threat to biodiversity and the provision of ecosystem services for human wellbeing. In order to reduce further loss of biodiversity and maintain productive and sustainable ecosystems, understanding the ecological mechanisms underlying species invasions and avoiding potentially harmful effects on native communities is urgently needed, but largely lacking. We here demonstrate, by means of hydroacoustics and advanced spatial modelling, how native fish species as a result of previous exposure to native predators may successfully respond to invasive novel predators through a complicated game of hide and seek, minimizing spatio-temporal overlap with predators, and potentially facilitating coexistence between native prey species (Galaxiids and introduced novel predators (Salmonids in a deep Andean lake, Patagonia.

  12. Study of information hiding algorithm based on GHM and color transfer theory

    REN Shuai; MU De-jun; ZHANG Tao; HU Wei


    Taking the feature that the energy of the image would gather and spread on four components (LL2, LH2, HL2 and HH2) in the sub-image atfer first-order GHM multi-wavelet-transform. And by using the color control ability oflαβ color space in color transfer theory (CTT), an information hiding algorithm based on GHM-CTT is proposed. In this way, the robust parameters are embedded in the LL2, the hidden information is set in LH2 and HL2 with RAID4, and fragile sign is set in HH2. The consistence between the embedded data bits' order and the embedded code of the sub-image is improved by using the chaotic mapping and the genetic algorithm. Experimental results indicate that the GHM-CTT can increase the imperceptibility by 15.72% averagely and robustness by 18.89% at least.

  13. Low complexity efficient raw SAR data compression

    Rane, Shantanu; Boufounos, Petros; Vetro, Anthony; Okada, Yu


    We present a low-complexity method for compression of raw Synthetic Aperture Radar (SAR) data. Raw SAR data is typically acquired using a satellite or airborne platform without sufficient computational capabilities to process the data and generate a SAR image on-board. Hence, the raw data needs to be compressed and transmitted to the ground station, where SAR image formation can be carried out. To perform low-complexity compression, our method uses 1-dimensional transforms, followed by quantization and entropy coding. In contrast to previous approaches, which send uncompressed or Huffman-coded bits, we achieve more efficient entropy coding using an arithmetic coder that responds to a continuously updated probability distribution. We present experimental results on compression of raw Ku-SAR data. In those we evaluate the effect of the length of the transform on compression performance and demonstrate the advantages of the proposed framework over a state-of-the-art low complexity scheme called Block Adaptive Quantization (BAQ).

  14. Quality aspects of raw milk cheeses

    Cheese has been a part of the human diet for thousands of years and over the centuries cheesemakers have relied on the indigenous microflora and enzymes in raw milk to create the signature quality traits for the many different varieties of cheese found around the world. Although most of the cheese i...

  15. Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes

    Divya Ann Luke


    Full Text Available The wireless networks are more sensitive to the Denial-of-Service (DoS attacks. The existing system is based on Spread Spectrum (SS. This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. The main attack present in the wireless network is the selective jamming attack. This type of attack mainly focuses a single node termed as target node. Attacker always tries to block the message sent by the target node. This leads to the Denial-of-Service attack. We are proposing a new method to prevent the selective jamming attack in an internalthreat model. A wormhole is used, which will generate an alarm to indicate the presence of jammer and sent IP address of jammer node to all other nodes in the network. Using a method called packet hiding, we can send message through the network even though a jammer is present. This method is based on the technique called Strong Hiding Commitment Scheme (SHCS. Here, the access point in a network region becomes the wormhole whenever it finds out any node that violates the rules in a particular network region. That node is then considered as a jammer node. The wormhole send s IP address of jammer to all other nodes. Wormhole then prevents the jamming activity of the jammer by encrypting the source ID of message along with the message packet.So that the jammer is unable to identify its target node and the source can forward its message safely through jammer node itself

  16. Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function

    Najme Maleki


    Full Text Available This paper presents two adaptive and non-adaptive data hiding methods for grayscale images based on modulus function. Our adaptive scheme is based on the concept of human vision sensitivity, so the pixels in edge areas than to smooth areas can tolerate much more changes without making visible distortion for human eyes. In our adaptive scheme, the average differencing value of four neighborhood pixels into a block via a threshold secret key determines whether current block is located in edge or smooth area. Pixels in the edge areas are embedded by Q-bit of secret data with a larger value of Q than that of pixels placed in smooth areas. Also in this scholar, we represent one non-adaptive data hiding algorithm. Our non-adaptive scheme, via an error reduction procedure, produces a high visual quality for stego-image. The proposed schemes present several advantages. 1-of aspects the embedding capacity and visual quality of stego-image are scalable. In other words, the embedding rate as well as the image quality can be scaled for practical applications 2-the high embedding capacity with minimal visual distortion can be achieved, 3-our methods require little memory space for secret data embedding and extracting phases, 4-secret keys have used to protect of the embedded secret data. Thus, level of security is high, 5-the problem of overflow or underflow does not occur. Experimental results indicated that the proposed adaptive scheme significantly is superior to the currently existing scheme, in terms of stego-image visual quality, embedding capacity and level of security and also our non-adaptive method is better than other non-adaptive methods, in view of stego-image quality. Results show which our adaptive algorithm can resist against the RS steganalysis attack.

  17. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Ding, Qing-Yan; Zhang, Shu-Hui


    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. Supported by the National Natural Science Foundation of China under Grant Nos. 61572297, 61303199, 61272514, and 61373131, the Shandong Provincial Natural Science Foundation of China under Grant Nos. ZR2013FM025, ZR2013FQ001, ZR2014FM003, and ZY2015YL018, the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China under Grant Nos. BS2015DX006 and BS2014DX007, the National Development Foundation for Cryptological Research, China under Grant No. MMJJ201401012, the Priority Academic Program Development of Jiangsu Higher Education Institutions and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Funds, and the Shandong Academy of Sciences Youth Fund Project, China under Grant Nos. 2015QN003 and 2013QN007

  18. Hiding a Heavy Higgs Boson at the 7 TeV LHC

    Bai, Yang; Fan, JiJi; Hewett, JoAnne L.


    A heavy Standard Model Higgs boson is not only disfavored by electroweak precision observables but is also excluded by direct searches at the 7 TeV LHC for a wide range of masses. Here, we examine scenarios where a heavy Higgs boson can be made consistent with both the indirect constraints and the direct null searches by adding only one new particle beyond the Standard Model. This new particle should be a weak multiplet in order to have additional contributions to the oblique parameters. If it is a color singlet, we find that a heavy Higgs with an intermediate mass of 200-300 GeV can decay into the new states, suppressing the branching ratios for the standard model modes, and thus hiding a heavy Higgs at the LHC. If the new particle is also charged under QCD, the Higgs production cross section from gluon fusion can be reduced significantly due to the new colored particle one-loop contribution. Current collider constraints on the new particles allow for viable parameter space to exist in order to hide a heavy Higgs boson. We categorize the general signatures of these new particles, identify favored regions of their parameter space and point out that discovering or excluding them at the LHC can provide important indirect information for a heavy Higgs. Finally, for a very heavy Higgs boson, beyond the search limit at the 7 TeV LHC, we discuss three additional scenarios where models would be consistent with electroweak precision tests: including an additional vector-like fermion mixing with the top quark, adding another U(1) gauge boson and modifying triple-gauge boson couplings.

  19. 通信信息隐藏技术研究%A Research on Communication Information Hiding Technologies

    张松; 冯祺


    网络的技术的迅速发展使得通信信息的传输变得更加快捷、方便,与此同时,也为攻击者截获通信信息带来了便利,通信的安全和隐蔽成为一个亟需解决的问题。信息隐藏技术为保证通信的隐蔽性提供了一种新的思路。论文对信息隐藏技术进行分类介绍,给出了信息隐藏技术的模型和基本特征,并分析了信息隐藏技术与隐藏分析技术和密码学之间的关系,最后给出了总结与展望。%The rapid development of network technology enables the transmission of communication information to be ‐come faster and more convenient ,at the same time ,it also makes it easier for attackers to intercept communication informa‐tion .Security and covert communication has become an urgent problem ,information hiding technology provides a new way of thinking to ensure the covert communication .This paper describes the classification of information hiding technology ,and gives the model and the basic characteristics of information hiding ,and analyzes the relationship between information hiding and steganalysis as well as the relationship between information hiding and cryptography ,finally ,gives the summary and outlook future development .

  20. Rapid prototyping with lasers using metal powder jets

    Liedl, Gerhard; Schuoecker, D.; Kny, E.


    Rapid Prototyping is an important part of modern development sequences, where a variety of solutions is available nowadays, ranging from ultrafast machining via casting technologies, laminated objects manufacturing, also with lasers, to stereolithography and laser sintering. Most of these processes suffer from certain restrictions, either in terms of raw material, geometry or quality of the finished workpiece. In particular, laser sintering leads to structures with a low density that reduces the strength of the part considerably. Since the individual powder particles are only molten at their surface and adhere thus to each other, only in small regions of the surface leaving the majority of the grain mass unmolten and resulting in a faint lattice that must be filled with an additional material to reach the necessary strength. A different solution offers the Blown Powder Process, where a jet of e.g. metal powder is directed towards the surface of the workpiece in the focus of a laser beam, thus melting each metal particle totally and producing practically molten droplets that settle on the momentary surface of the workpiece, thus being welded to the latter. Since all the material delivered to the workpiece is perfectly molten and resolidified, very dense structures with a high strength comparable to the strength of the initial unpowderized material are obtained, as experiments carried out by the authors with differed powderized materials have shown. It has also been demonstrated that the latter process can be used to generate nearly arbitrary 3D geometry. A lot of effort has been invested by the authors to avoid the influence of the direction of the necessary relative motion between laser, powder jet and workpiece and also to reduce the roughness of the surface generated by the actual process. Further experimental investigations will be devoted to the clarification of the range of materials, where the actual process can be applied and to the generation of practical

  1. Synthesis of nanosized tungsten powder


    Nanosized tungsten powder was synthesized by means of different methods and under different conditions with nanosized WO3 powder. The powder and the intermediate products were characterized using XRD, SEM, TEM, BET (Brunauer Emmett Teller Procedure) and SAXS (X-ray diffracto-spectrometer/Kratky small angle scattering goniometer). The results show that nanosized WO3 can be completely reduced to WO2 at 600℃ after 40 min, and WO2 can be reduced to W at 700℃ after 90 min, moreover, the mean size of W particles is less than 40 nm. Furthermore, the process of WO3→WO2→W excelled that of WO3→W in getting stable nanosized tungsten powder with less grain size.


    A. M. Gadzhieva


    Full Text Available Tomatoes grown in the central and southern parts of the country, which contain 5-6 % of solids, including 0.13 % of pectin, 0.86 % of fat, 0.5 % of organic acids; 0.5 % minerals, etc. were used as a subject of research. These tomatoes, grown in the mountains, on soils with high salinity, contain high amounts of valuable components and have a long-term preservation. For the extraction of valuable components from dried tomato pomace CO2 extraction method was applied. Technological and environmental feasibility of tomatoes stage drying in the atmosphere of inert gas in solar dry kiln were evaluated; production scheme of dried tomatoes is improved; a system for tomato pomace drying is developed; a production scheme of powders of pulp, skin and seeds of tomatoes is developed. Combined method of tomato pomace drying involves the simultaneous use of the electromagnetic field of low and ultra-high frequency and blowing product surface with hot nitrogen. Conducting the drying process in an inert gas atmosphere of nitrogen intensified the process of moisture removing from tomatoes. The expediency of using tomato powder as enriching additive was proved. Based on the study of the chemical composition of the tomato powder made from Dagestan varieties of tomatoes, and on the organoleptic evaluation and physico-chemical studies of finished products, we have proved the best degree of recoverability of tomato powder during the production of reconstituted juice and tomato beverages.

  3. Microstructure and properties of liquid-phase sintered tungsten heavy alloys by using ultra-fine tungsten powders

    于洋; 王尔德


    The microstructure and properties of liquid-phase sintered 93W-4.9Ni-2.1Fe tungsten heavy alloys using ultra-fine tungsten powders (medium particle size of 700 nm) and original tungsten powders (medium particle size of 3 μm) were investigated respectively. Commercial tungsten powders (original tungsten powders) were mechanically milled in a high-energy attritor mill for 35 h. Ultra-fine tungsten powders and commercial Ni, Fe powders were consolidated into green compacts by using CIP method and liquid-phase sintering at 1 465 ℃ for 30 min in the dissociated ammonia atmosphere. Liquid-phase sintered tungsten heavy alloys using ultra-fine tungsten powders exhibit full densification (above 99% in relative density) and higher strength and elongation compared with conventional liquidphase sintered alloys using original tungsten powders due to lower sintering temperature at 1 465 ℃ and short sintering time. The mechanical properties of sintered tungsten heavy alloy are found to be mainly dependent on the particles size of raw tungsten powders and liquid-phase sintering temperature.

  4. 21 CFR 73.1646 - Bronze powder.


    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Bronze powder. 73.1646 Section 73.1646 Food and... ADDITIVES EXEMPT FROM CERTIFICATION Drugs § 73.1646 Bronze powder. (a) Identity. (1) The color additive bronze powder is a very fine metallic powder prepared from alloys consisting principally of...

  5. Flake tantalum powder for manufacturing electrolytic capacitors

    HE Jilin; YANG Guoqi; PAN Luntao; LIU Hongdong; BAO Xifang


    The FTP200 flake tantalum powder was introduced.The microstructures of the powder with leaf-like primary particles having an average flakiness of 2 to 20 and porous agglomerated particles were observed.The chemical composition,physical properties,and electrical properties of the FTP200 powder were compared with those of the FTW300 nodular powder.The FTP200 powder is more sinter-resistant,and the surface area of the flake tantalum powder under sintering at high temperature has less loss than that of the nodular tantalum powder.The specific capacitance of the flake tantalum powder is higher than that of the nodular tantalum powder with the same surface area when anodized at high voltage,Thus,the flake tantalum powder is suitable for manufacturing tantalum solid electrolytic capacitors in the range of median and high (20-63 V) voltages.

  6. High temperature cement raw meal flowability

    Maarup, Claus; Hjuler, Klaus; Dam-Johansen, Kim


    The flowability of cement raw meal is investigated at temperatures up to 850°C in a specially designed monoaxial shear tester. Consolidation stresses of 0.94, 1.87 and 2.79kPa are applied. The results show that the flowability is reduced as temperature is increased above 550°C, indicated by incre......The flowability of cement raw meal is investigated at temperatures up to 850°C in a specially designed monoaxial shear tester. Consolidation stresses of 0.94, 1.87 and 2.79kPa are applied. The results show that the flowability is reduced as temperature is increased above 550°C, indicated...

  7. Minimization of Salmonella contamination on raw poultry.

    Cox, N A; Cason, J A; Richardson, L J


    Many reviews have discussed Salmonella in poultry and suggested best practices to minimize this organism on raw poultry meat. Despite years of research and conscientious control efforts by industry and regulatory agencies, human salmonellosis rates have declined only modestly and Salmonella is still found on raw poultry. Expert committees have repeatedly emphasized the importance of controlling risk, but information about Salmonella in poultry is often limited to prevalence, with inadequate information about testing methods or strains of Salmonella that are detected by these methods and no information about any impact on the degree of risk. This review examines some assumptions behind the discussion of Salmonella in poultry: the relationships between sampling and cultural methodology, prevalence and numbers of cells, and the implications of serotype and subtype issues. Minimizing Salmonella contamination of poultry is not likely to reduce human salmonellosis acquired from exposure to contaminated chicken until these issues are confronted more systematically.

  8. Raw material studies of West Central Serbia

    Vera Bogosavljević Petrović


    Full Text Available This paper deals with raw material problems in the territory of West Central Serbia geologically determined as the Čačak-Kraljevo (or West Morava basin. Our research is presented through the most striking case studies, Lojanik, Vlaška Glava and Lazac.  The Lojanik hill is a silicified forest by origin. It has occasionally been in use from the earliest periods of prehistory until today as a source of black and ochre-coloured flint, opal and silicified wood. A detailed prospection, including the mapping of surface finds using square nets, was conducted during two research campaigns.The Vlaška Glava is an open-air Palaeolithic site at which artefacts made of white, ochre, red, brown and black chert, silicified magnesite, volcanic and metamorphic rocks were found. Our research of primary and secondary geological deposits in the vicinity of the site showed equivalent raw material. We also found an interesting primary deposit of high quality bluish grey flint with outcrop activities (Workshop 1.The Lazac shaft is a contemporary magnesite mine, recently abandoned because of the high percentage of silicon-dioxide. We determined the same raw material in collections found at nearby Neolithic sites. Certain similarities between the wooden support systems of ore exploration in the Middle Ages and modern times were established at the entrance of the shaft.Our research in the territory of the West Morava basin resulted in reconstruction of some links between geological deposits and settlements and also creation of a relevant base for future raw material studies.

  9. Determination of essential nutrients in raw milk

    Penphimon Phongphanphanee


    Full Text Available Milk production in Thailand has gradually increased since 1961. Occasional oversupply of raw milk has become one of dairy farmers' major problems. Increasing the consumption of milk by making use of its separated nutrients may offer a solution. This study was to assess the composition of raw milk produced in Thailand, which included fat, protein, lactose, solid-not-fat (SNF and total solid (TS. A large dairy cooperatives in Saraburi Province was selected for the study. About 9% of its total members, constituting 108 farms, were randomly chosen. They consisted of small size (less than 20 cows/farm, medium size (21-100 cows/farm and large size (>100 cows/farm. The majority was medium-size. Raw milk from each farm was sampled at the delivery site of the cooperatives in the morning. Milk data of the 108 farms were compiled at 3 different periods between February and July 2003. The raw milk was analyzed by the Fourier Transform Infrared Analysis (FTIR using MilkoScan FT6000. The results showed the average fat content of 3.50±0.47%, protein of 3.13±0.16%, lactose of 4.59±0.12%, SNF of 8.42±0.20%, and TS of 11.92±0.54%. The samples were superior in all of the nutrients as compared to the standard levels set by the Department of Livestock Development, except for TS. This indicates the possibility of a local production of milk nutrients such as lactose and protein as ingredients for the pharmaceutical and health food industries.

  10. Detection of Campylobacter jejuni in raw meat

    Z Noori; SH Saadati; A. Mirsalehian; SH Shoeibi; N Rahimifard; Mehrangiz Mehdizadeh; M Pirali- Hamedani


    Background & Objectives: Campylobacter jejuni is a Gram negative, microaerophilic, non-spore-forming and a small"ncurved bacillus which is able to cause foodborne infection in human. In this study the occurrence of C. jejuni in poultry and"nbeef meat was investigated."nMaterials & Methods: Forty raw meat samples including 22 poultry samples and 18 beef samples were investigated for the"npresence of C. jejuni. To isolate the bacterium, the samples were initially enriched in Preston Bro...

  11. Food safety hazards associated with consumption of raw milk.

    Oliver, Stephen P; Boor, Kathryn J; Murphy, Steven C; Murinda, Shelton E


    An increasing number of people are consuming raw unpasteurized milk. Enhanced nutritional qualities, taste, and health benefits have all been advocated as reasons for increased interest in raw milk consumption. However, science-based data to substantiate these claims are limited. People continue to consume raw milk even though numerous epidemiological studies have shown clearly that raw milk can be contaminated by a variety of pathogens, some of which are associated with human illness and disease. Several documented milkborne disease outbreaks occurred from 2000-2008 and were traced back to consumption of raw unpasteurized milk. Numerous people were found to have infections, some were hospitalized, and a few died. In the majority of these outbreaks, the organism associated with the milkborne outbreak was isolated from the implicated product(s) or from subsequent products made at the suspected dairy or source. In contrast, fewer milkborne disease outbreaks were associated with consumption of pasteurized milk during this same time period. Twenty nine states allow the sale of raw milk by some means. Direct purchase, cow-share or leasing programs, and the sale of raw milk as pet food have been used as means for consumers to obtain raw milk. Where raw milk is offered for sale, strategies to reduce risks associated with raw milk and products made from raw milk are needed. Developing uniform regulations including microbial standards for raw milk to be sold for human consumption, labeling of raw milk, improving sanitation during milking, and enhancing and targeting educational efforts are potential approaches to this issue. Development of pre- and postharvest control measures to effectively reduce contamination is critical to the control of pathogens in raw milk. One sure way to prevent raw milk-associated foodborne illness is for consumers to refrain from drinking raw milk and from consuming dairy products manufactured using raw milk.

  12. [Controlled release of prednisolone from suppository prepared using powder of pulverized tablet].

    Tatsumi, Akitoshi; Oda, Shoko; Nakamoto, Tomoko; Muraoka, Reiko; Takahashi, Yoshiko; Tanaka, Kuniyoshi; Shikata, Toshiyuki; Tatsumi, Sumiyo; Tagawa, Noriko; Kobayashi, Yoshiharu; Hamaguchi, Tsuneo; Kadobayashi, Muneo


    Prednisolone suppositories have been used successfully for the treatment of ulcerative colitis in hospital settings. However, the raw material of prednisolone suppository, JP prednisolone powder (JP Powder), was recently removed from the market. Therefore we studied the effects of raw material and suppository base on the release of prednisolone suppository for the purpose of designing a new suppository with similar effects to those of suppository prepared using JP powder (old suppository). New suppositories consisting of the powder of pulverized tablet as raw material and Witepsol H-15 and Witepsol E-75 as suppository base were prepared according to the fusion method. Suppository release test was performed by reciprocating dialysis tube method with tapping (RDT method) and dialysis tubing method (DT method). Both RDT method and DT method were performed using a suppository dissolution apparatus (modified JP disintegration apparatus) and a JP15 paddle apparatus, respectively. The test fluid was 50 mM phosphate buffer solution (pH 7.4) maintained at 37+/-0.5 degrees C. The results of release test by RDT method were similar to those of DT method. Release rate of prednisolone from the new suppository was much faster than that of old suppository. The addition of Witepsol E-75 to new suppository base markedly delayed the release of prednisolone from the new suppository. Release rate of prednisolone from the new suppository, consisting of pulverized tablet and Witepsol H-15 and Witepsol E-75 (76:24), corresponded well with that of the old suppository. It was suggested that this suppository could be used as incoming preparation of suppository prepared using JP powder.

  13. Antiradical activity and amount of phenolic compounds in extracts obtained from some plant raw materials containing methylxanthine alkaloids

    Sroka Zbigniew


    Full Text Available Raw materials containing methylxanthine alkaloids such as yerba mate, guaraná, white and green tea, coffee seeds, chocolate and cacao seed powder and extracts obtained from these raw materials were investigated for their antioxidant features and the amount of phenolic compounds. The level of phenolic compounds was measured with the colorimetric method using Folin-Ciocalteu’s phenol reagent and antioxidant features was determined with the use of DPPH (2,2-diphenyl-1-picrylhydrazyl radical. Amounts of phenolic compounds were presented in percentages per mass of extracts and mass of raw materials. Antiradical potential was shown as the number of TAUDPPH units per mg of extracts and g of raw materials. The highest number of antiradical units TAUDPPH as well as the amount of phenolic compounds was calculated for white tea and its extracts and lowest for chocolate. The correlation coefficient between the content of phenolics and antiradical features of raw materials is equal to r=0.994.

  14. Powder lubrication of faults by powder rolls in gouge zones

    Chen, X.; Madden, A. S.; Reches, Z.


    Powder-lubrication by fault gouge can be an effective mechanism of dynamic weakening of faults (Reches & Lockner, 2010); however, the physical mechanisms of this lubrication are poorly understood. While the flow of coarse-grained (> 100 μm) materials, e.g. glass beads or quartz sand, was extensively studied, the flow of fine-grained (nano-powders, have remained enigmatic. We report here experimental results of a new efficient mechanism for powder lubrication. We conducted friction tests on high-velocity rotary shear apparatus (Reches & Lockner, 2010). Two types of experimental faults were tested: (1) faults made of solid, igneous rocks (granite, tonalite and diorite); and (2) fault-zones made of 2-3 mm thick layer of granular materials (oolites, calcite or gypsum) sheared in a confined cell. We performed 21 runs with total slip of 0.14-13 m, normal stress of 1.2-14.5 MPa, slip velocity of 0.012-0.97 m/s. The ultra-microscopic (SEM and AFM) analysis of the experimental slip surfaces revealed two outstanding features in 17 out of the 21 experiments: (1) localized fault-slip along Principal Slip Zones (PSZs) that are composed of a dense, shiny, cohesive crust, 0.5-1 micron thick, that overlaid a porous substrate, and (2) elongated rolls composed of gouge-powder into three-dimensional structures of closely-packed powder grains, (20-50 nm in size). The rolls are cylindrical, 0.75-1.4 micron wide, and 1.7-30 micron long, with smooth outer surface, and laminated, concentric layers of compacted grains. The rolls were exclusively found on the PSZs. Many rolls were destroyed fracturing and smearing on the PSZ, suggesting that the rolls underwent a life cycle of formation and destruction. Significant macroscopic friction reduction was measured in experiments with observed rolls, and no (or minor) friction reduction in the four experiments without rolls. The final, reduced friction coefficients have a general reciprocal relation to the rolls surface coverage, suggesting that

  15. United States Climate Reference Network (USCRN) Raw Observations from Datalogger

    National Oceanic and Atmospheric Administration, Department of Commerce — Datalogger files are raw USCRN data. However, instead of being collected via satellite, the raw data are collected from station dataloggers (also referred to as...

  16. Waste to wealth: Industrial raw materials potential of peels of ...

    Waste to wealth: Industrial raw materials potential of peels of Nigerian sweet orange ... AFRICAN JOURNALS ONLINE (AJOL) · Journals · Advanced Search · USING ... of orange peels with a view to establishing their raw material potentials.

  17. Indigenous processing methods and raw materials of borde , an ...

    Indigenous processing methods and raw materials of borde , an Ethiopian traditional ... AFRICAN JOURNALS ONLINE (AJOL) · Journals · Advanced Search ... A study of village-level processing techniques and raw materials used for the ...

  18. Use of alternative raw materials for yoghurt production | Farinde ...

    Use of alternative raw materials for yoghurt production. ... AFRICAN JOURNALS ONLINE (AJOL) · Journals · Advanced Search · USING AJOL · RESOURCES ... Soymilk and maize steep water were used as alternative raw materials to cow milk ...

  19. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    Novella Isabel S


    Full Text Available Abstract Background In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, RED, was found to avoid extinction and remain in the population for long periods of time. Since RED characterizes the past evolutionary history of the population, this observation was called quasispecies memory. While the quasispecies theory predicts the existence of these memory genomes, there is a disagreement between the expected and observed mutant frequency values. Therefore, the origin of quasispecies memory is not fully understood. Results We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry, the likely cause of fitness differences between wild type and RED mutants. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.. If the RED mutant is constantly recreated by mutations, then its frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases their fitness to the wild-type level. Moreover, even at low m.o.i. the equilibrium frequency of the mutant is higher than predicted by the standard quasispecies model, because a fraction of mutant virions generated from wild-type parents will also be encapsidated by wild-type protein. Conclusions Our model predicts that phenotypic hiding will strongly influence the population dynamics of viruses, particularly at high m.o.i., and will also have important effects on the mutation-selection balance at low m.o.i. The delay in mutant extinction and increase in mutant

  20. Natural Dyeing and UV Protection of Raw and Bleached/Mercerised Cotton

    Čuk Nina


    Full Text Available Dyeing with natural dyes extracted from curcuma, green tea, avocado seed, pomegranate peel and horse chestnut bark was studied to evaluate the dyeability and ultraviolet (UV blocking properties of raw and bleached/mercerised cotton fabrics. 20 g/l of powdered plant material was extracted in distilled water and used as a dyeing bath. No mordants were used to obtain ecologically friendly finishing. The colour of samples was measured on a refl ectance spectrophotometer, while UV-blocking properties were analysed with UV-Vis spectrophotometer. The results showed that dyeing increased UV protection factor (UPF to all samples, however much higher UPF values were measured for the dyed raw cotton samples. The highest UPF values were obtained on both cotton fabrics dyed with pomegranate peel and green tea extracts, giving them excellent protective properties (UPF 50+. The lowest UPF values were obtained by dyeing cotton with avocado seed extract and curcumin. Dyeing with selected dyes is not stable to washing, so the UV-blocking properties worsen after repetitive washing. However, raw cotton samples retain their very good Uvblocking properties, while bleached/mercerised cotton fabrics do not provide even satisfactory UV-blocking properties. No correlation between CIE L*a*b*, K/S and UPF values were found.

  1. Polymorphism in nimodipine raw materials: development and validation of a quantitative method through differential scanning calorimetry.

    Riekes, Manoela Klüppel; Pereira, Rafael Nicolay; Rauber, Gabriela Schneider; Cuffini, Silvia Lucia; de Campos, Carlos Eduardo Maduro; Silva, Marcos Antonio Segatto; Stulzer, Hellen Karine


    Due to the physical-chemical and therapeutic impacts of polymorphism, its monitoring in raw materials is necessary. The purpose of this study was to develop and validate a quantitative method to determine the polymorphic content of nimodipine (NMP) raw materials based on differential scanning calorimetry (DSC). The polymorphs required for the development of the method were characterized through DSC, X-ray powder diffraction (XRPD) and Raman spectroscopy and their polymorphic identity was confirmed. The developed method was found to be linear, robust, precise, accurate and specific. Three different samples obtained from distinct suppliers (NMP 1, NMP 2 and NMP 3) were firstly characterized through XRPD and DSC as polymorphic mixtures. The determination of their polymorphic identity revealed that all samples presented the Modification I (Mod I) or metastable form in greatest proportion. Since the commercial polymorph is Mod I, the polymorphic characteristic of the samples analyzed needs to be investigated. Thus, the proposed method provides a useful tool for the monitoring of the polymorphic content of NMP raw materials. Copyright © 2012 Elsevier B.V. All rights reserved.

  2. Hiding Secret Text in Quick Response Code and Transforming the Position of the Secret Data using Rotation Transformation

    V. Ramya


    Full Text Available In order to provide high security and safety in the field of information hiding, this study proposes a novel technology using Steganography. An exotic steganographic algorithm, is used in this study, which Hides the secret text data in a 2D plane (Here, in our case let the 2D plane be the QR code, after encryption and the position of the secret data will be changed using rotation transformation. The proposed algorithm has been tested under various imperceptibility characters such as PSNR, MSE, Human Vision Quality Metrics and Histograms are compared to both cover image and the stego image. This novel algorithm shows Lower MSE, higher PSNR values and it is evident that the proposed algorithm is robust to JPEG attacks.

  3. Promotion of powder crystallinity and its influence on the properties of Nd:YAG transparent ceramics

    Ma, Benyuan; Wang, Bin; Zhang, Wei; Wei, Nian; Lu, Tiecheng; He, Junbao


    The Nd:YAG raw powders of various crystallinities were obtained from the co-precipitated precursor by calcining at 1100-1250 °C for 2-6 h. XRD, HRTEM and EDX were employed to analyze the powder crystallinity, e.g., its phases, changes of lattice constants, surface defects and morphologies. The subsequent ceramics were fabricated by simply vacuum sintering at 1780 °C for 10 h to well compare the initial intrinsic effect of various powder crystallinities. The induced defect states and corresponding properties of ceramics were explored and discussed. The results show that poorly crystallized powder involves a thick layer on particle surface, which is not well crystallized but can escape XRD detection. This poorly crystallized powder contributes more the inhomogeneous ceramic sintering and introduces more the defects in final ceramics, e.g., impure phase inclusions and dislocations. The results reveal that powder crystallinity should be promoted and considered as a further way to improve ceramic properties.

  4. Effects of Different Carriers on the Production of Isoflavone Powder from Soybean Cake

    Bing-Huei Chen


    Full Text Available The objectives of this study were to use soybean cake as the raw material for the production of isoflavone powder and compare the effects of different carriers as well as drying methods on the powder quality. Results showed that with spray drying, a level of 40 % maltodextrin as carrier produced the highest yield (mass of isoflavone powder, followed by 10 % gelatin and 1 % sodium alginate. However, a reversed trend was observed for the isoflavone content. With 1 % sodium alginate, freeze drying generated the greatest yield of isoflavone powder, followed by vacuum drying and spray drying. The isoflavone content also exhibited the same tendency. With poly-g-glutamicacid (g-PGA as carrier, all six levels studied (0.57, 0.28, 0.14, 0.028, 0.014 and 0.003 % were capable of forming powder containing high amounts of total isoflavone, which was comparable to that using 1% sodiumalginate by freeze drying. Both high- and low-molecular-weight g-PGA showed similar effects in terms of powder yield and isoflavone content.

  5. The use of glass powder as a partial Portland cement replacement

    Pokorný, Jaroslav; Pavlíková, Milena; Tydlitát, Vratislav; Scheinherrová, Lenka; Rovnaníková, Pavla; Pavlík, Zbyšek


    Finely grinded waste glass powder can become material having suitable properties from the point of view of particle size and pozzolanic activity. Glass powder incorporation into cement paste and cement-based composites can bring improvement in porous structure resulting in increased mechanical strength and durability characteristics. On this account, two types of recycled glass powder are investigated in the presented paper as a possible partial Portland cement substitutes in cement blends. For raw glass powders, basic physical parameters and chemical composition are measured. The studied glass powders are applied as 5, 10 and 20 mass% of Portland cement replacement in cement paste mix composition, whereas water/binder ratio of 0.3 is used for all studied pastes. Fresh paste mixtures are characterized using initial and final setting time measurement. For hardened pastes cured 28 days in water, bulk density, matrix density, total open porosity and mechanical properties represented by flexural and compressive strength are accessed. Portlandite consumption by the pozzolanic reaction is monitored with TGA. The obtained results show effectiveness of a borosilicate glass powder that acts as a pozzolanic active admixture. This resulted in improvement of mechanical characteristics for cement substitution up to 10 mass%.

  6. Pre-slaughter, slaughter and post-slaughter defects of skins and hides at the Sheba Tannery and Leather Industry, Tigray region, northern Ethiopia

    Tesfay Kahsay


    Full Text Available Skins and hides are perishable resources that can be damaged by parasitic diseases and human error, which result in downgrading or rejection. This study was conducted to identify defect types and to determine their prevalence in pickled sheep and wet blue goat skins and wet blue hides. Each selected skin or hide was examined for defects in natural light and the defects were graded according to established quality criteria in Ethiopian standard manuals. Major defects were captured by digital photography. The major pre-slaughter defects included scratches (64.2%, cockle (ekek (32.8%, wounds or scars (12.6%, lesions from pox or lumpy skin disease (6.1%, poor substance (5%, branding marks (2.3% and tick bites (1.5%. The presence of grain scratches in wet blue hides (76.3% was significantly higher than in pickled sheep (67.2% and wet blue goat (59.1% skins. The major slaughter defects included flay cuts or scores, holes, poor pattern and vein marks, with a higher occurrence in wet blue goat skins (28.7%; P < 0.001 than in wet blue hides (22.8% and pickled sheep skins (11.1%. The most prevalent postslaughter defects were grain cracks (14.9%, hide beetle damage (8%, damage caused by heat or putrefaction (3.7% and machine-induced defects (0.5%. Grain cracks (27.04% and hide beetle damage (13.9% in wet blue goat skins were significantly more common than in wet blue hides and pickled sheep skins. These defects cause depreciation in the value of the hides and skins. Statistically significant (P < 0.001 higher rejection rates were recorded for wet blue hides (82.9% than for pickled sheep skins (18.3% and wet blue goat skins (8.5%. Improved animal health service delivery, effective disease control strategies and strong collaboration between stakeholders are suggested to enhance the quality of skins and hides.

  7. 21 CFR 161.175 - Frozen raw breaded shrimp.


    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Frozen raw breaded shrimp. 161.175 Section 161.175... § 161.175 Frozen raw breaded shrimp. (a) Frozen raw breaded shrimp is the food prepared by coating one of the optional forms of shrimp specified in paragraph (c) of this section with safe and suitable...

  8. 19 CFR 151.22 - Estimated duties on raw sugar.


    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Estimated duties on raw sugar. 151.22 Section 151... THE TREASURY (CONTINUED) EXAMINATION, SAMPLING, AND TESTING OF MERCHANDISE Sugars, Sirups, and Molasses § 151.22 Estimated duties on raw sugar. Estimated duties shall be taken on raw sugar, as defined...

  9. Evaluation of dairy powder products implicates thermophilic sporeformers as the primary organisms of interest.

    Watterson, M J; Kent, D J; Boor, K J; Wiedmann, M; Martin, N H


    Dairy powder products (e.g., sweet whey, nonfat dry milk, acid whey, and whey protein concentrate-80) are of economic interest to the dairy industry. According to the US Dairy Export Council, customers have set strict tolerances (Raw, work-in-process, and finished product samples were collected from 4 dairy powder processing facilities in the northeastern United States over a 1-yr period. Two separate spore treatments: (1) 80°C for 12min (to detect sporeformers) and (2) 100°C for 30min (to detect highly heat resistant sporeformers) were applied to samples before microbiological analyses. Raw material, work-in-process, and finished product samples were analyzed for thermophilic, mesophilic, and psychrotolerant sporeformers, with 77.5, 71.0, and 4.6% of samples being positive for those organisms, respectively. Work-in-process and finished product samples were also analyzed for highly heat resistant thermophilic and mesophilic sporeformers, with 63.7 and 42.6% of samples being positive, respectively. Sporeformer prevalence and counts varied considerably by product and plant; sweet whey and nonfat dry milk showed a higher prevalence of thermophilic and mesophilic sporeformers compared with acid whey and whey protein concentrate-80. Unlike previous reports, we found limited evidence for increased spore counts toward the end of processing runs. Our data provide important insight into spore contamination patterns associated with production of different types of dairy powders and support that thermophilic sporeformers are the primary organism of concern in dairy powders.

  10. Application of Flower Extract Wuluh Star Fruit(Averrhoa Billimbi L. On Effervescent Powder

    Haslina Haslina


    Full Text Available Excavation alternative natural ingredients that could potentially be used as a coloring agent continues, one source of natural antioxidants are used as raw material for functional foods is the flower star fruit. This study aims to determine the application star fruit flower extract (Averrhoabilimbi L in effervescent powder and indigo determine solubility, antioxidant activity, total acid and water content. This study uses a randomized block design (RAK are arranged with one factor and three replication. Further tests were used test of Duncan's Multiple Range Test (DMRT at 5%. Starfruit flower extract formulations were applied to the effervescent powder significant effect (p <0.05 on the solubility, antioxidant activity, total acid and water content. The best treatment in effervescent powder formula II star fruit flower extract with a solubility of 0.15%, 95.95% antioxidant activity, total acid content  2.13% and moisture content 3.62%.

  11. Aspects of the tribological behaviour of powders recycled from rapid steel treated sub-zero

    Radu, S.; Ciobanu, M.


    The recycling of high-alloyed steels represents a significant opportunity in Powder Metallurgy as it permits the use of raw materials with relatively low prices compared to the conventional methods. Recycling can be achieved by two methods: from spraying debris resulted from worn cutting tools and processes obtained from processing chip drilling and re-sharpening of tools. The research aims to confirm that wastes from rapid steels can become, by the successive processing, metal powders that can thereafter be used for cutting tools of lathe type removable plate. After pressing and sintering the recycling powder, cylindrical samples were obtained that were subsequently applied a subcritical annealing. Wear tests conducted on a tribometer type TRB-01-02541 confirmed that their wear resistance is superior to the same samples that were sintered, hardened and tempered in oil. This paper was accepted for publication in Proceedings after double peer reviewing process but was not presented at the Conference ROTRIB’16.

  12. Shape-controllable Synthesis of Ultrafine ZnO Powders of Different Morphologies

    Xiaoyi Shen; Yuan Liang; Yuchun Zhai; Zhiqiang Ning


    By employing zinc acetate and sodium hydroxide as raw materials,ultrafine ZnO powders with different morphologies were successfully synthesized through hydrothermal method.The influences of the reaction temperature,the OH /Zn2+ mol ratio and the reaction time on the morphologies of the ZnO powders were discussed.The reaction conditions were obtained,under which the ZnO of flower-like particles,micro-rods and flake particles was synthesized,respectively.The crystal structures and morphologies of those ZnO particles were characterized by X-ray diffraction (XRD) and scanning electron microscopy (SEM).The ZnO with flower-like structures was composed of lots of micro-rods with hexagon morphology.The XRD patterns indicated that the ZnO powders were hexagonal wurtzite structures with high purity.Finally,the growth mechanism of the ZnO particles was discussed.

  13. Synthesis of Al2O3/WC powder by aluminothermic reduction and carbonization method

    韩兵强; 李楠


    Al2O3/WC powder was synthesized by means of aluminothermic reduction-carbonization with metallic Al powder, yellow tungsten oxide and carbon black or graphite as raw materials under the protection of coke granules.The effects of Al2O3 content, temperature, C/WO3 molar ratio, and atmosphere on the synthesis of Al2O3/WC powder were studied. The results show that the relative content of WC and W2C is strongly influenced by the factors mentioned-above. Carbon black has higher reactivity than graphite. Al2O3-WC composite is easier to obtain under the protection of coke granules than under argon atmosphere. The CO in the coke layer can easily react with tungsten to form WC and to transfer from W2 C to WC.

  14. Potato powders prepared by successive cooking-process depending on resistant starch content affect the intestinal fermentation in rats.

    Kawakami, Sakura; Han, Kyu-Ho; Araki, Takahiro; Ohba, Kiyoshi; Wakabayashi, Tatsuya; Shimada, Kenichiro; Fukushima, Michihiro


    The effects of resistant starch (RS) in dry potato powders prepared by various processes on intestinal fermentation in rats were assessed. Rats were fed raw potato powder (RP), blanched potato powder (BP), steamed potato powder (SP), or drum-dried potato powder (DP) for 4 weeks. The cecal RS content was significantly higher in the RP group than in the control diet (CN) group and other dry potato powder groups. Cecum pH was significantly lower in the RP group compared to the CN group, and was also significantly lower than that in the SP, BP, and DP groups. Lactic acid bacteria levels in the RP group were significantly higher than those in the CN group, and levels in the SP group also increased relative to the control group. Lactobacillus levels in the RP group were higher than in the CN and other dry potato powder groups. Cecal short-chain fatty acid (SCFA) concentrations in the RP group followed by the SP group exhibited significantly higher levels relative to the control levels. Dry potato powders containing RS produced during the cooking process may represent a useful food material that increases intestinal concentrations of SCFA and enhances the growth of certain lactic acid bacteria.

  15. Low temperature fabrication from nano-size ceramic powders

    Gonzalez, E.J.; Piermarini, G.J.; Hockey, B. [and others


    The objective of the compaction process is to produce a dense green-state compact from a nanosize powder that subsequently can be sintered at high temperatures to form a dense ceramic piece. High density in the green-state after pressing is of primary importance for achieving high densities after sintering. Investigation of the compaction behavior of ceramic powders, therefore, is an important part of characterization of raw ceramic powders and evaluation of their compaction behavior, analysis of interaction between particles, and the study of microstructure of green body (unsintered) during pressure-forming processes. The compaction of nanosize ceramic particles into high density green bodies is very difficult. For the nanosize materials used in this study (amorphous Si{sub 3}N{sub 4} and {gamma} Al{sub 2}O{sub 3}), there is no evidence by TEM of partial sintering after synthesis. Nevertheless, strong aggregation forces, such as the van der Waals surface forces of attraction, exist and result in moderate precursor particle agglomeration. More importantly, these attractive surface forces, which increase in magnitude with decreasing particle size, inhibit interparticle sliding necessary for particle rearrangement to denser bodies during subsequent compaction. Attempts to produce high density green body compacts of nanosize particles, therefore, generally have been focused on overcoming these surface forces of attraction by using either dispersive fluids or high pressures with or without lubricating liquids. In the present work, the use of high pressure has been employed as a means of compacting nanosize powders to relatively high green densities.

  16. Measuring powder flowability with a modified Warren Spring cohesion tester

    Salam A. Mohammed; Ezzat C. Abdullah; Derek Geldart; Abdul Aziz A. Raman


    The measurement of powder fiowability is a major concern for most industrial processes that deal with the handling of bulk solids as raw materials, intermediates, or products. The development of devices that measure the flowability of non-aerated powders has not progressed as rapidly as might have been hoped since most research activities have been based on various types of shear testers intended to aid the design of hoppers. A new flowability indicator named as weighted cohesion (WS) is established using newly improved version of direct cohesion texture. A cornerstone of the proposed technique is that the procedure is automated, using a digital Warren Spring tester called Warren Spring-University of Malaya cohesion tester (WSUMCT), thus making results operator-insensitive. Besides being a practical tool to diagnose the cohesion of experimental powders, the ratio between measured cohesion (using WSUMCT) and aerated density (using Hosokawa PT-S) provides us with a powerful technique to research fundamental particle internal cohesion forces directly and use these data to indicate the flowability. In this work, a series of fine (9.4 .μm) and coarse (60 μm) porous silica gel particle mixtures, and mixtures of fine (28 μm) and coarse (72 μm) glass ballotini as well, were used as test powders. The results from these tests agree well with relative flowability determined on our newly driven indicator using WSUMCT. The validation of aerated weighted cohesion (WSA) as a flowability indicator was authenticated by comparing the conducted parameter with established measured Hausner ratio (HR) and angle of repose (AoR).

  17. Effect of Raw Bauxite Addition on Thermal Behaviour of Ultra-low Cement Al2O3-SiO2 Castables

    HOU Wanguo; ZHOU Ningsheng


    This work investigated the thermo-gravimetric (TG) change and explosion resistance of ultra-low cement Al2O3 -SiO2 castables added with 0, 5%, 10%, 15% and 20% of ≤74 μm raw bauxite powders containing 72. 8% Al2O3, respectively. The castables were prepared using white fused alumina as aggregate, powders of white fused alumina, fused mullite, α-Al2O3 ultrafines, 3% CA cement and 5% microsilica as the matrix portion. TG change of the castables was investi-gated by a thermo-gravimetric analyzer for large size specimen. When the raw bauxite addition is less than 10%, the mass-losing behavior of the castables is simi-lar to that without raw bauxite, tending to reach a con-stant mass around 400 ℃ , before which the mass-loss is mild and producing little destructive influence. With more than 10% raw bauxite addition, however, the mass-loss increases significantly, and the temperature to reach a constant mass increases to 600 ℃ or higher, unfavorable to structural stabilization. With the raw bauxite addition up to 20%, no negative influence on explosion resistance is found.

  18. Asymmetric information hiding and noise-free recovery based on rotating analyzer ellipsometry and quick-response code.

    Lin, Chao; Shen, Xueju; Wang, Zhisong


    We report an asymmetric optical information hiding method based on a rotating analyzer ellipsometry technique. This asymmetric hiding architecture not only avoids the interception of keys during transmission or distribution but also makes the cyphertext more inconspicuous for attackers. A new kind of one-way optical trapdoor function is constructed based on the fact that the state of polarization (SOP) of elliptical polarized light cannot be recovered with only the knowledge of intensity captured after passing through a linear polarizer. Meanwhile, the SOP of a polarization ellipse could be calculated by rotating the polarizer to record two scenes of intensity after it. Introduction of a quick response code as a container leads to noise-free recovery for original information and enhances practicality of the proposed cryptosystem with versatile key sensitivity and fault tolerance capability. Numerical simulation results that support theoretical analysis are presented. Analysis on the relationship between hiding effect or quality of decryption and parameters of the algorithm also is provided.

  19. A place to hide in the home-cage decreases yolk androgen levels and offspring emotional reactivity in Japanese quail.

    Vanessa Guesdon

    Full Text Available An animal's emotional responses are the result of its cognitive appraisal of a situation. This appraisal is notably influenced by the possibility of an individual to exert control over an aversive event. Although the fact that environment controllability decreases emotional responses in animals is well established, far less is known about its potential trans-generational effects. As the levels of avian yolk hormones can vary according to the mother's environment, we hypothesized that housing environment of mothers would modulate the quality of her eggs and in turn her offspring's behaviour. Two groups of female Japanese quail were constituted: a group that had access to a place to hide in their home-cage (Hd, n = 20 and a group that had nowhere to hide (NoHd, n = 20 when stressed. Both groups were submitted to daily human disturbances for a twenty-day-period. Hd females produced eggs with both less testosterone and androstenedione than did NoHd females. The emotional and social reactivity of Hd females' offspring were lower and their growth was slower than those of NoHd females' offspring. Our results show that a minor difference in housing environment had substantial effects on eggs and offspring. The presence of a shelter probably helped quail to cope with daily human disturbances, producing less reactive offspring. This transgenerational effect caused by an opportunity to hide could lead to applications in care of laboratory animals, conservation biology and animal welfare.

  20. Use of steam condensing at subatmospheric pressures to reduce Escherichia coli O157:H7 numbers on bovine hide.

    McEvoy, J M; Doherty, A M; Sheridan, J J; Blair, I S; McDowell, D A


    This study used a laboratory-scale apparatus to apply subatmospheric steam to bovine hide pieces inoculated with Escherichia coli O157:H7 in maximum recovery diluent (MRD) and in high-liquid content and low-liquid content fecal suspensions (HLC fecal and LLC fecal, respectively). The survival of the organism in fecal clods, which were stored for 24 days in a desiccated state, was assessed. Inoculated fecal clods were also treated with subatmospheric steam. Steam treatment at 80 +/- 2 degrees C for 20 s reduced E. coli O157:H7 concentrations on hide inoculated to initial concentrations of approximately 7 log10 CFU/g by 5.46 (MRD inoculum), 4.17 (HLC fecal inoculum), and 5.99 (LLC fecal inoculum) log10 CFU/g. The reductions achieved in samples inoculated with LLC feces were larger than in samples inoculated with HLC feces (P Steam treatment (20 s) of 3-day-old clods reduced surviving E. coli O157:H7 numbers from 4.20 log10 CFU/g to below the limit of detection of the assay used (1.20 log10 CFU/g). This study shows that steam condensing at or below 80 +/- 2 degrees C can reduce E. coli O157:H7 when present on bovine hide, reducing the risk of cross contamination to the carcass during slaughter and dressing.

  1. Novel serine keratinase from Caldicoprobacter algeriensis exhibiting outstanding hide dehairing abilities.

    Bouacem, Khelifa; Bouanane-Darenfed, Amel; Zaraî Jaouadi, Nadia; Joseph, Manon; Hacene, Hocine; Ollivier, Bernard; Fardeau, Marie-Laure; Bejar, Samir; Jaouadi, Bassem


    The current paper reports on the purification of an extracellular thermostable keratinase (KERCA) produced from Caldicoprobacter algeriensis strain TH7C1(T), a thermophilic, anaerobic bacterium isolated from a hydrothermal hot spring in Algeria. The maximum keratinase activity recorded after 24-h of incubation at 50 °C was 21000 U/ml. The enzyme was purified by ammonium sulfate precipitation-dialysis and heat treatment (2h at 50 °C) followed by UNO Q-6 FPLC anion exchange chromatography, and submitted to biochemical characterization assays. Matrix assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF/MS) analysis revealed that the purified enzyme was a monomer with a molecular mass of 33246.10 Da. The sequence of the 23 N-terminal residues of KERCA showed high homology with those of bacterial keratinases. Optimal activity was achieved at pH 7 and 50 °C. The enzyme was completely inhibited by phenylmethanesulfonyl fluoride (PMSF) and diiodopropyl fluorophosphates (DFP), which suggests that it belongs to the serine keratinase family. KERCA displayed higher levels of hydrolysis and catalytic efficiency than keratinase KERQ7 from Bacillus tequilensis strain Q7. These properties make KERCA a potential promising and eco-friendly alternative to the conventional chemicals used for the dehairing of goat, sheep, and bovine hides in the leather processing industry.

  2. Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos

    Xu, Dawen; Wang, Rangding


    A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.

  3. Performance evaluation of information hiding%信息隐藏性能评价方法

    马秀莹; 林家骏


    It is necessary to establish a benchmark for information hiding. Imperceptibility is an important index to evaluate the performance of steganography. Based on HVS model, a new imperceptibility measure CHD for color stego image was proposed. Experimental results show that the quality of stego image calculated by CHD reflects the luminance masking, texture masking and color masking of HVS, and CHD can be used to evaluate the imperceptibility of steganography tools.%建立信息隐藏技术的评价标准十分必要.隐写术的视觉不可感知性是评价隐写术性能的重要指标之一.基于HVS模型,给出不可感知性评价指标CHD.实验结果表明,CHD的判定结果反映了人类视觉的亮度,对比度和色彩掩蔽特性,可以作为隐写术的不可感知性评价指标.

  4. Phenotypic mixing and hiding may contribute to memory in viral quasispecies

    Wilke, C O; Wilke, Claus O.; Novella, Isabel S.


    Background. In a number of recent experiments with food-and-mouth disease virus, a deleterious mutant, was found to avoid extinction and remain in the population for long periods of time. This observation was called quasispecies memory. The origin of quasispecies memory is not fully understood. Results. We propose and analyze a simple model of complementation between the wild type virus and a mutant that has an impaired ability of cell entry. The mutant will go extinct unless it is recreated from the wild type through mutations. However, under phenotypic mixing-and-hiding as a mechanism of complementation, the time to extinction in the absence of mutations increases with increasing multiplicity of infection (m.o.i.). The mutant's frequency at equilibrium under selection-mutation balance also increases with increasing m.o.i. At high m.o.i., a large fraction of mutant genomes are encapsidated with wild-type protein, which enables them to infect cells as efficiently as the wild type virions, and thus increases t...

  5. Hiding the system from the user: Moving from complex mental models to elegant metaphors

    Curtis W. Nielsen; David J. Bruemmer


    In previous work, increased complexity of robot behaviors and the accompanying interface design often led to operator confusion and/or a fight for control between the robot and operator. We believe the reason for the conflict was that the design of the interface and interactions presented too much of the underlying robot design model to the operator. Since the design model includes the implementation of sensors, behaviors, and sophisticated algorithms, the result was that the operator’s cognitive efforts were focused on understanding the design of the robot system as opposed to focusing on the task at hand. This paper illustrates how this very problem emerged at the INL and how the implementation of new metaphors for interaction has allowed us to hide the design model from the user and allow the user to focus more on the task at hand. Supporting the user’s focus on the task rather than on the design model allows increased use of the system and significant performance improvement in a search task with novice users.

  6. New approach for ensuring cloud computing security: using data hiding methods



    Cloud computing is one of the largest developments occurred in the field of information technology during recent years. This model has become more desirable for all institutions, organizations and also for personal use thanks to the storage of ‘valuable information’ at low costs, access to such information from anywhere in the world as well as its ease of use and low cost. In this paper, the services constituting the cloud architecture and deployment models are examined, and the main factors in the provision of security requirements of all those models as well as points to be taken into consideration are described in detail. In addition, the methods and tools considering how security, confidentiality and integrity of the information or data that formsthe basis of modern technology are implemented in cloud computing architecture are examined. Finally, it is proposed in the paper that the use of data hiding methods in terms of access security in cloud computing architecture and the security of the stored data would be very effective in securing information.

  7. A simple method to hide data loggers safely in observation wells.

    Lorenzen, Gunnar; Sprenger, Christoph; Pekdeger, Asaf


    Submersible data loggers are widely used for groundwater monitoring, but their application often runs the risk of hardware and data loss through vandalism or theft. During a field study in India, the authors of this article experienced that well locks attract the attention of unauthorized persons and do not provide secure protection in unattended areas. To minimize the risk of losing data loggers, a cheap and simple solution has been invented to hide the instruments and associated attachments below the ground surface, inside observation wells. It relies on attaching the logger to a length of small-diameter pipe that is submerged at the bottom of the well, instead of attaching it to the top of the well. The small-diameter pipe with the logger is connected to a small bottle containing a magnet that floats on the water surface of the well and can be recovered using another bottle also with a magnet. A logger that is concealed in this way is difficult to detect and access without knowledge of the method and adequate removal tools. The system was tested and successfully applied for monitoring shallow observation wells at three field sites in Greater Delhi, India. Copyright © 2010 The Author(s). Journal compilation © 2010 National Ground Water Association.

  8. Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs

    TANG ChunMing; PEI DingYi; WANG XiaoFeng; LIU ZhuoJun


    A delegateable signature scheme (DSS) which was first introduced by Barak is mainly based on the non-interactive zero-knowledge proof (NIZK) for preventing the signing verifier from telling which witness (i.e., restricted subset) is being used. However, the scheme is not significantly efficient due to the difficulty of constructing NIZK. We first show that a non-Interactive witness indistinguishable (NIWI) proof sys-tern and a non-interactive witness hiding (NIWH) proof system are easier and more efficient proof models than NIZK in some cases. Furthermore, the witnesses em-ployed in these two protocols (NIWI and NIWT) cannot also be distinguished by the verifiers. Combined with the Σ-protocol, we then construct NlWl and NIWH proofs for any NP statement under the existence of one-way functions and show that each proof is different from those under the existence of trapdoor permutations. Finally, based on our NIWI and NIWH proofs, we construct delegateable signature schemes under the existence of one-way functions, which are more efficient than Barak's scheme under the existence of trapdoor permutations.

  9. A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states

    Xu, Shu-Jiang; Chen, Xiu-Bo; Wang, Lian-Hai; Niu, Xin-Xin; Yang, Yi-Xian


    Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. Project supported by the National Natural Science Foundation of China (Grant Nos. 61303199, 61272514, 61170272, 61121061, and 61411146001), the Shandong Provincial Natural Science Foundation of China (Grant Nos. ZR2013FM025, ZR2013FQ001, and ZR2014FM003), the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China (Grant Nos. BS2013DX010 and BS2014DX007), the Program for New Century Excellent Talents in Universities, China (Grant No. NCET-13-0681), the National Development Foundation for Cryptological Research, China (Grant No. MMJJ201401012), the Fok Ying Tong Education Foundation, China (Grant No. 131067), and the Shandong Academy of Sciences Youth Fund Project, China (Grant No. 2013QN007).

  10. HIDES spectroscopy of bright detached eclipsing binaries from the Kepler field - I. Single-lined objects

    Hełminiak, K. G.; Ukita, N.; Kambe, E.; Kozłowski, S. K.; Sybilski, P.; Ratajczak, M.; Maehara, H.; Konacki, M.


    We present results of our spectroscopic observations of nine detached eclipsing binaries (DEBs), selected from the Kepler Eclipsing Binary Catalog, that only show one set of spectral lines. Radial velocities (RVs) were calculated from the high-resolution spectra obtained with the HIgh-Dispersion Echelle Spectrograph (HIDES) instrument, attached to the 1.88-m telescope at the Okayama Astrophysical Observatory, and from the public Apache Point Observatory Galactic Evolution Experiment archive. In our sample, we found five single-lined binaries, with one component dominating the spectrum. The orbital and light-curve solutions were found for four of them, and compared with isochrones, in order to estimate absolute physical parameters and evolutionary status of the components. For the fifth case, we only update the orbital parameters, and estimate the properties of the unseen star. Two other systems show orbital motion with a period known from the eclipse timing variations (ETVs). For these we obtained parameters of outer orbits, by translating the ETVs to RVs of the centre of mass of the eclipsing binary, and combining with the RVs of the outer star. Of the two remaining ones, one is most likely a blend of a faint background DEB with a bright foreground star, which lines we see in the spectra, and the last case is possibly a quadruple bearing a sub-stellar mass object. Where possible, we compare our results with literature, especially with results from asteroseismology. We also report possible detections of solar-like oscillations in our RVs.

  11. The significance of anisotropic signals hiding in the type Ia supernovae

    Lin, Hai-Nan; Chang, Zhe


    We use two different methods, i.e., dipole-fitting (DF) and hemisphere comparison (HC), to search for the anisotropic signals hiding in the Union2.1 data set. We find that the directions of maximum matter density derived using these two methods are about $114^{\\circ}$ away from each other. We construct four Union2.1-like mock samples to test the statistical significance of these two methods. It is shown that DF method is statistically significant, while HC method is strongly biased by the distribution of data points in the sky. Then we assume that the anisotropy of distance modulus is mainly induced by the anisotropy of matter density, which is modeled to be the dipole form $\\Omega_M=\\Omega_{M0}(1-\\cos\\theta)$. We fit our model to Union2.1, and find that the direction of maximum matter density is well consistent with the direction derived using DF method, but it is very different from the direction previously claimed. Monte Carlo simulations show that our method is statistically more significant than HC metho...

  12. The Core Extrusion Schema-Revised: Hiding Oneself Predicts Severity of Social Interaction Anxiety.

    Levinson, Cheri A; Rodebaugh, Thomas L; Lim, Michelle H; Fernandez, Katya C


    Cognitive behavioral models of social anxiety disorder (SAD) suggest that fear of negative evaluation is a core fear or vulnerability for SAD. However, why negative evaluation is feared is not fully understood. It is possible that core beliefs contribute to the relationship between fear of negative evaluation and SAD. One of these beliefs may be a core extrusion schema: a constellation of beliefs that one's true self will be rejected by others and therefore one should hide one's true self. In the current study (N = 699), we extended research on the Core Extrusion Schema and created a shortened and revised version of the measure called the Core Extrusion Schema-Revised The Core Extrusion Schema-Revised demonstrated good factor fit for its two subscales (Hidden Self and Rejection of the True Self) and was invariant across gender and ethnicity. The Hidden Self subscale demonstrated excellent incremental validity within the full sample as well as in participants diagnosed with generalized SAD. Specifically, the Hidden Self subscale may help explain severity of social interaction anxiety. This measure could be used with individuals diagnosed with generalized SAD to design exposures targeting these core beliefs.

  13. Hiding the word: examining the relationship between a new measure of religiosity and sexual behavior.

    Young, Michael; Denny, George; Penhollow, Tina; Palacios, Rebecca; Morris, Duston


    The relationship between religiosity and sexual behavior has been previously investigated, but researchers have not examined the relationship between the intellectual dimension of religiosity and sexual behavior. In this study, we developed an intellectual measure of religiosity, Hiding the Word (HTW), and examined whether it accounted for variation in the sexual behavior of college students, beyond that for which age and a generic measure of religiosity could account. Results showed, after accounting for age and generic religiosity, HTW made a significant contribution to distinguishing between students who had, and those who had not, engaged in various sexual behaviors. For females, this was the case in three of the five behaviors examined (all except receiving oral sex and participating in unprotected penile-vaginal intercourse at most recent sexual encounter), and for males, two of the four behaviors (sexual intercourse and anal intercourse). HTW was less of a factor in accounting for variation in the frequency of participation. For males, HTW was significant for the frequency of participation in penile-vaginal intercourse, receiving oral sex, and the number of sexual partners in the last month. For females, HTW was significant only for the number of sexual partners in the last month. Thus, religiosity, and specifically HTW, seems to play more of a role in determining whether or not a person has participated in behavior, rather than in the frequency of participation.

  14. Electrodeposition of Fe powder from acid electrolytes



    Full Text Available Polarization characteristics of the electrodeposition processes of Fe powders from sulfate and chloride electrolytes and the morphology of the obtained powders were investigated. The morphology depended on the anion presence in the electrolyte but not on the current density in the investigated range. A characteristic feature of the dendritic powder with cauliflower endings obtained from sulfate electrolyte is the presence of cone-like cavities and the crystallite morphology of the powders surface. On the other hand, Fe powders electrodeposited from chloride electrolyte appear in the form of agglomerates. A soap solution treatment applied as a method of washing and drying provides good protection from oxidation of the powders.

  15. Globalization determinants of raw materials markets development

    Olga Yatsenko


    Full Text Available The determinants of development of raw materials markets and the peculiarities of their formation in the terms of world economy globalization have been researched. The empirical base of research is the agricultural food market as one of the most important bases in the sphere of material production and provision of food security of the country. The important social and economic mission of the agricultural sector has been highlighted, along with the export competitiveness and import dependence of agricultural food products in the international trade. The imperative norms have been substantiated and conclusions have been drawn regarding the establishment of respective conditions for the operation of globally integrated markets in Ukraine.


    In 1995, surface coatings accounted for nearly 2.55 million Mg of volatile organic compound (VOC) emissions nationally, which is more than 12% of VOC emissions from all sources. In recent years, powder coatings have been steadily gaining popularity as an alternative to solvent-bo...

  17. Mask materials for powder blasting

    Wensink, Henk; Jansen, Henri V.; Berenschot, J.W.; Elwenspoek, Miko C.


    Powder blasting, or abrasive jet machining (AJM), is a technique in which a particle jet is directed towards a target for mechanical material removal. It is a fast, cheap and accurate directional etch technique for brittle materials such as glass, silicon and ceramics. The particle jet (which expand

  18. Effect of drying parameters on physiochemical and sensory properties of fruit powders processed by PGSS-, Vacuum- and Spray-drying.

    Feguš, Urban; Žigon, Uroš; Petermann, Marcus; Knez, Željko


    Aim of this experimental work was to investigate the possibility of producing fruit powders without employing drying aid and to investigate the effect of drying temperatures on the final powder characteristics. Raw fruit materials (banana puree, strawberry puree and blueberry concentrate) were processed using three different drying techniques each operating at a different temperature conditions: vacuum-drying (-27-17 °C), Spray-drying (130-160 °C) and PGSS-drying (112-152 °C). Moisture content, total colour difference, antioxidant activity and sensory characteristics of the processed fruit powders were analysed. The results obtained from the experimental work indicate that investigated fruit powders without or with minimal addition of maltodextrin can be produced. Additionally, it was observed that an increase in process temperature results in a higher loss of colour, antioxidant activity and intensity of the flavour profile.

  19. Preparation of Nano-sized Zirconium Carbide Powders through a Novel Active Dilution Self-propagating High Temperature Synthesis Method

    DA Aoyun; LONG Fei; WANG Jilin; XING Weihong; WANG Yang; ZHANG Fan; WANG Weimin; FU Zhengyi


    High quality nano-sized zirconium carbide (ZrC) powders were successfully fabricated via a developed chemical active dilution self-propagating high-temperature synthesis (SHS) method assisted by ball milling pretreatment process using traditional cheap zirconium dioxide powder (ZrO2), magnesium powder (Mg) and sucrose (C12H22O11) as raw materials. FSEM, TEM, HRTEM, SAED, XRD, FTIR and Raman, ICP-AES, laser particle size analyzer, oxygen and nitrogen analyzer, carbon/sulfur determinator and TG-DSC were employed for the characterization of the morphology, structure, chemical composition and thermal stability of the as-synthesized ZrC samples. The as-synthesized samples demonstrated high purity, low oxygen content and evenly distributed ZrC nano-powders with an average particle size of 50nm. In addition, the effects of endothermic rate and the possible chemical reaction mechanism were also discussed.

  20. Advanced composites take a powder

    Holty, D.W. (Custom Composite Materials, Inc., Atlanta, GA (United States))


    To a professional chemist with more than 25 years of industrial experience, the world of advanced composites is a fascinating new venue. Here resins and fibers come together in a completely synergistic partnership, achieving marvels of strength and light weight that make advanced composite materials virtually the only solution for challenging applications. In the late 1980s, Professor John Muzzy of the Georgia Institute of Technology, was intrigued by the physical properties of thermoplastics, and he developed a new way to bring the thermoplastic resins together with high-performance fibers. As part of the work Muzzy did with Lockheed and NASA he demonstrated that electrostatic powder coating was an attractive new method for combining thermoplastic resins with reinforcing fibers. Presentation of this work by Lockheed at a government-industry conference led to a new project for Muzzy, sponsored by NASA Langley. Powder prepregging proved to be the attractive alternative that NASA was looking for. While working on powder prepregging with LaRC-TPI, Muzzy and his colleagues developed methods for exposing all of the fibers to the powder to improve the distribution of the resin on the tow, a continuous bundle of filaments. Optimal resin distribution was achieved by spreading the moving tow. A very flexible towpreg was produced by maintaining the spread tow through the powder coating chamber and into the oven, where the resin particles were fused to the individual filaments. Muzzy's invention has enabled Custom Composite Materials, Inc. to offer resin/fiber combinations based on thermoplastic resins such as nylon and polypropylene. Beyond the expected advantages over epoxy thermoset systems, they are beginning to exploit a fundamental property of thermoplastic resins: viscoelasticity, which can be defined as the resistance to flow as a function of applied stress. Thermoplastics have a much higher viscoelasticity than thermosets.

  1. Biogenic amines in raw and processed seafood

    Pierina eVisciano


    Full Text Available The presence of biogenic amines in raw and processed seafood, associated with either time/temperature conditions or food technologies is discussed in the present paper from a safety and prevention point of view. In particular, storage temperature, handling practices, presence of microbial populations with decarboxylase activity and availability of free amino acids are considered the most important factors affecting the production of biogenic amines in raw seafood. On the other hand, some food technological treatments such as salting, ripening, fermentation or marination can increase the levels of biogenic amines in processed seafood. The consumption of high amount of biogenic amines, above all histamine, can result in food borne poisoning which is a worldwide problem. The European Regulation established as maximum limits for histamine, in fishery products from fish species associated with high histidine amounts, values ranging from 100 to 200 mg/kg, while for products which have undergone enzyme maturation treatment in brine, the aforementioned limits rise to 200 and 400 mg/kg. Preventive measures and emerging methods aiming at controlling the production of biogenic amines are also reported for potential application in seafood industries.

  2. Ultra fine tantalum powder for advanced capacitors


    @@ Ultra fine tantalum and niobium powders are applicable in many areas of engineering. Of particular significance are high purity powders that are usable in production of high capacitance capacitors and superconductors.

  3. Ultra fine tantalum powder for advanced capacitors

    Nebera; A.; Markusbkin; Yu.; Azarov; V.; Ermolaev; N.


    Ultra fine tantalum and niobium powders are applicable in many areas of engineering. Of particular significance are high purity powders that are usable in production of high capacitance capacitors and superconductors.……


    Jaroslav Topič


    Full Text Available The disposal and further recycling of concrete is being investigated worldwide, because the issue of complete recycling has not yet been fully resolved. A fundamental difficulty faced by researchers is the reuse of the recycled concrete fines which are very small (< 1 mm. Currently, full recycling of such waste fine fractions is highly energy intensive and resulting in production of CO2. Because of this, the only recycling methods that can be considered as sustainable and environmentally friendly are those which involve recycled concrete powder (RCP in its raw form. This article investigates the performance of RCP with the grain size < 0.25 mm as a potential binder replacement, and also as a microfiller in cement-based composites. Here, the RCP properties are assessed, including how mechanical properties and the microstructure are influenced by increasing the amount of the RCP in a cement paste (≤ 25 wt%.

  5. Low-Cost Preparation of Boron Nitride Ceramic Powders

    LI Duan; ZHANG Changrui; LI Bin; CAO Feng; WANG Siqing; LIU Kun; FANG Zhenyu


    The amorphous boron nitride ceramic powders were prepared at 750-950 ℃ by the lowcost urea route,and the effects of preparation temperatures,molar ratios of the raw materials and oxidation treatment on the composition,structure and surface morphology of the products were investigated through FTIR,XRD and SEM.The results show that the products ceramize and crystallize gradually with the increase of the temperature.When the molar ratio and reaction temperature are 3:2 and 850 ℃,respectively,the products have high purity,compact structure and nice shape.The oxidation treatment at 450 ℃ will not impair the composition and structure of boron nitfide but effectively remove the impurities.

  6. 21 CFR 73.2646 - Bronze powder.


    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Bronze powder. 73.2646 Section 73.2646 Food and... ADDITIVES EXEMPT FROM CERTIFICATION Cosmetics § 73.2646 Bronze powder. (a) Identity and specifications. The color additive bronze powder shall conform in identity and specifications to the requirements of §...

  7. Development of a Reproducible Powder Characterization Method using a Powder Rheometer

    Søgaard, Søren Vinter; Allesø, Morten; Garnæs, Jørgen;


    In this study, a powder rheometer was used to measure flow characteristics of two pharmaceutical model powders. Precise measurements were obtained for one of the model powders whereas the results were less precise for the second powder. In conclusion, further work is needed to increase the mechan...

  8. New Strategies for Powder Compaction in Powder-based Rapid Prototyping Techniques

    Budding, A.; Vaneker, Thomas H.J.


    In powder-based rapid prototyping techniques, powder compaction is used to create thin layers of fine powder that are locally bonded. By stacking these layers of locally bonded material, an object is made. The compaction of thin layers of powder mater ials is of interest for a wide range of

  9. Bacteriological quality of raw milk used for production of a Brazilian farmstead raw milk cheese.

    Costa Sobrinho, Paulo de Souza; Marçal de Faria, Camila Andreata; Silva Pinheiro, Julia; Gonçalves de Almeida, Héllen; Vieira Pires, Christiano; Silva Santos, Aline


    The objective of this study was to evaluate the bacteriological quality of raw cow's milk utilized for the production of Traditional Minas Serro cheese, a Brazilian farmstead raw milk cheese. Raw milk samples were collected from six farmstead cheese operations manufacturing raw milk cheese from cow's milk. Coliform count (CC) and Escherichia coli counts were determined using Petrifilm™ EC plates, and Staphylococcus aureus counts were determined using Petrifilm™ Staph Express count plates. The standard plate count (SPC) was determined using plate count agar. The somatic cell count (SCC) was determined with a DeLaval cell counter. The detection of Listeria monocytogenes was based in the ISO 11290-1 protocol. A total of 165 samples were analyzed, and the SPC was 1.85-7.88 log CFU/mL. Coliform were detected in 140 (84.8%) of the 165 samples, with counts of 1-6.39 log CFU/mL. E. coli was detected in 17 (10.3%) samples, with counts of 1-2.18 log CFU/mL. The SCC in raw milk was 10,000-1,390,000 cells per mL, with mean and geometric mean values of 247,000 and 162,181, respectively. The SCC did not differ significantly between the seasons (p>0.05), but differed between different farms (pcount was 1.47-5.03 log CFU/mL. The median of SPC, CC, and S. aureus counts differed significantly between seasons and between farms (pbacterial (including pathogenic) presence.

  10. Assessing theory of mind nonverbally in those with intellectual disability and ASD: the penny hiding game.

    San José Cáceres, Antonia; Keren, Noa; Booth, Rhonda; Happé, Francesca


    Individuals with autism spectrum disorder (ASD) and low intellectual/language abilities are often omitted from experimental studies because of the challenges of testing these individuals. It is vital to develop appropriate and accessible tasks so that this significant part of the spectrum is not neglected. The theory of mind (ToM) has been extensively assessed in ASD, predominantly in relatively high-functioning individuals with reasonable language skills. This study aims to assess the ToM abilities of a sample of 132 participants with intellectual disability (ID) with and without ASD, matched in verbal mental age (VMA) and chronological age, using a naturalistic and nonverbal deception task: the Penny Hiding Game (PHG). The relationship between performance on the PHG and everyday adaptation was also studied. The PHG proved accessible to most participants, suggesting its suitability for use with individuals with low cognitive skills, attentional problems, and limited language. The ASD + ID group showed significantly more PHG errors, and fewer tricks, than the ID group. PHG performance correlated with Vineland adaptation scores for both groups. VMA was a major predictor of passing the task in both groups, and participants with ASD + ID required, on average, 2 years higher VMA than those with ID only, to achieve the same level of PHG success. VMA moderated the association between PHG performance and real-life social skills for the ASD + ID more than the ID group, suggesting that severely impaired individuals with ASD may rely on verbal ability to overcome their social difficulties, whereas individuals with ID alone may use more intuitive social understanding both in the PHG and everyday situations. © 2014 International Society for Autism Research, Wiley Periodicals, Inc.

  11. Information hiding techniques for infrared images: exploring the state-of-the art and challenges

    Pomponiu, Victor; Cavagnino, Davide; Botta, Marco; Nejati, Hossein


    The proliferation of Infrared technology and imaging systems enables a different perspective to tackle many computer vision problems in defense and security applications. Infrared images are widely used by the law enforcement, Homeland Security and military organizations to achieve a significant advantage or situational awareness, and thus is vital to protect these data against malicious attacks. Concurrently, sophisticated malware are developed which are able to disrupt the security and integrity of these digital media. For instance, illegal distribution and manipulation are possible malicious attacks to the digital objects. In this paper we explore the use of a new layer of defense for the integrity of the infrared images through the aid of information hiding techniques such as watermarking. In this context, we analyze the efficiency of several optimal decoding schemes for the watermark inserted into the Singular Value Decomposition (SVD) domain of the IR images using an additive spread spectrum (SS) embedding framework. In order to use the singular values (SVs) of the IR images with the SS embedding we adopt several restrictions that ensure that the values of the SVs will maintain their statistics. For both the optimal maximum likelihood decoder and sub-optimal decoders we assume that the PDF of SVs can be modeled by the Weibull distribution. Furthermore, we investigate the challenges involved in protecting and assuring the integrity of IR images such as data complexity and the error probability behavior, i.e., the probability of detection and the probability of false detection, for the applied optimal decoders. By taking into account the efficiency and the necessary auxiliary information for decoding the watermark, we discuss the suitable decoder for various operating situations. Experimental results are carried out on a large dataset of IR images to show the imperceptibility and efficiency of the proposed scheme against various attack scenarios.

  12. Mild desalination of various raw water streams.

    Groot, C K; van den Broek, W B P; Loewenberg, J; Koeman-Stein, N; Heidekamp, M; de Schepper, W


    For chemical industries, fresh water availability is a pre-requisite for sustainable operation. However, in many delta areas around the world, fresh water is scarce. Therefore, the E4 Water project ( comprises a case study at the Dow site in Terneuzen, The Netherlands, which is designed to develop commercial applications for mild desalination of brackish raw water streams from various origins to enable reuse in industry or agriculture. This study describes an effective two-stage work process, which was used to narrow down a broad spectrum of desalination technologies to a selection of the most promising techniques for a demonstration pilot at 2-4 m³/hour. Through literature study, laboratory experiments and multi-criteria analysis, nanofiltration and electrodialysis reversal were selected, both having the potential to attain the objectives of E4Water at full scale.

  13. Noise in raw data from magnetic observatories

    S. Y. Khomutov


    Full Text Available In spite of significant progress in the development of new devices for magnetic measurements, mathematical and computational technologies for data processing and means of communication, the quality of magnetic data accessible through the data centres (for example, World Data Centres or INTERMAGNET still largely depends on the actual conditions in which observation of the Earth's magnetic field is performed at observatories. Processing of raw data of magnetic measurements by observatory staff plays an important role. It includes effective identification of noise and elimination of its influence on final data. In this paper, on the basis of the experience gained during long-term magnetic monitoring carried out at the observatories of IKIR FEB RAS (Russia and CSIR-NGRI (India, we present a review of methods commonly encountered in actual practice for noise identification and the possibility of reducing noise influence.

  14. Noise in raw data from magnetic observatories

    Khomutov, Sergey Y.; Mandrikova, Oksana V.; Budilova, Ekaterina A.; Arora, Kusumita; Manjula, Lingala


    In spite of significant progress in the development of new devices for magnetic measurements, mathematical and computational technologies for data processing and means of communication, the quality of magnetic data accessible through the data centres (for example, World Data Centres or INTERMAGNET) still largely depends on the actual conditions in which observation of the Earth's magnetic field is performed at observatories. Processing of raw data of magnetic measurements by observatory staff plays an important role. It includes effective identification of noise and elimination of its influence on final data. In this paper, on the basis of the experience gained during long-term magnetic monitoring carried out at the observatories of IKIR FEB RAS (Russia) and CSIR-NGRI (India), we present a review of methods commonly encountered in actual practice for noise identification and the possibility of reducing noise influence.

  15. The complex microbiota of raw milk.

    Quigley, Lisa; O'Sullivan, Orla; Stanton, Catherine; Beresford, Tom P; Ross, R Paul; Fitzgerald, Gerald F; Cotter, Paul D


    Here, we review what is known about the microorganisms present in raw milk, including milk from cows, sheep, goats and humans. Milk, due to its high nutritional content, can support a rich microbiota. These microorganisms enter milk from a variety of sources and, once in milk, can play a number of roles, such as facilitating dairy fermentations (e.g. Lactococcus, Lactobacillus, Streptococcus, Propionibacterium and fungal populations), causing spoilage (e.g. Pseudomonas, Clostridium, Bacillus and other spore-forming or thermoduric microorganisms), promoting health (e.g. lactobacilli and bifidobacteria) or causing disease (e.g. Listeria, Salmonella, Escherichia coli, Campylobacter and mycotoxin-producing fungi). There is also concern that the presence of antibiotic residues in milk leads to the development of resistance, particularly among pathogenic bacteria. Here, we comprehensively review these topics, while comparing the approaches, both culture-dependent and culture-independent, which can be taken to investigate the microbial composition of milk.

  16. From Raw Data to Physics Results

    CERN. Geneva


    These series of lectures describes the work that lies between the raw data taken by the detector elements and the physics variables used to study particular reactions. We start by defining some simple physics variables of interest, then describe the fitting process used to extract values from the observed patterns in typical detectors. This is followed by a discussion of the various problems of pattern recognition in tracking, calorimetry and particle identification detectors. The process of calibration and alignment is surveyed, with emphasis on getting "reasonable" results in the absence of formally complete information. Finally, the role of Monte Carlo simulation in understanding the quality of the obtained information is examined. Throughout, we emphasize how the use of "composite" observables is required due to what our instrumentation and reconstruction can achieve.

  17. From raw data to physics results

    CERN. Geneva


    This series of lectures describes the work that lies between the raw data taken by the detector elements and the physics variables used to study particular reactions. We start by defining some simple physics variables of interest, then describe the fitting process used to extract values from the observed patterns in typical detectors. This is followed by a discussion of the various problems of pattern recognition in racking, calorimetry and particle identification detectors. The process of calibration and alignment is surveyed, with emphasis on getting "reasonable" results in the absence of formally complete information. Finally, the role of Monte Carlo simulation in understanding the quality of the obtained information is examined. Throughout, we emphasize how the use of "composite" observables is required due to what our instrumentation and reconstruction can achieve.

  18. From Raw Data to Physics Results course

    CERN. Geneva HR-RFA


    It would be helpful for students to know: a) How measurements are made in physical detectors, for example how a tracking chamber "sees" a charged particle or how a calorimeter measures energy. b) That physics processes result in photons, leptons, etc., which we then want to detect and analyze. These series of lectures describes the work that lies between the raw data taken by the detector elements and the physics variables used to study particular reactions. We start with an example analysis to show the kinds of information needed. We then describe the fitting process used to extract values from the observed patterns in typical detectors. This is followed by a discussion of the various problems of pattern recognition in tracking, calorimetry and particle identification detectors. The role of Monte Carlo simulation in understanding the quality of the obtained information is examined. We discuss how the use of "composite" observables is required due to what our instrumentation and reconstruction can achieve. Th...


    L. V. Antipova


    Full Text Available Purposeful use of proteins of connecting fabrics is based first of all on structural and mechanical and physical and chemical properties of collagen, his physiology to a human body. Traditional source of collagen is the split of skins of the cattle, but in view of the objective reasons (spongy encephalopathy, reduction of a livestock of cattle, there was a need for search of alternative sources. The particular interest and popularity represent collagenic proteins in biomedical technologies, when receiving surgical sutural materials, wound healing means, prolongator of medicines, artificial organs and fabrics, implatant. New data on use the collagen containing of sources are directly connected with expansion of a source of raw materials of processing industries of agrarian and industrial complex on the basis of deep processing of biological resources and their maximum involvement in the main and special production with significant growth in an exit of useful products from raw materials unit. In this regard, researches of a microstructure of skins and fractional composition of proteins of objects of research are conducted; data on the general chemical composition and the content of collagen in them are received. Experimental data showed that the most perspective source of collagen from the studied fishes of internal reservoirs is the skin of a silver carp that is caused by the high content of target substance collagen, the low content of fat. The technology of receiving collagenic substances with the high technical characteristics allowing to apply them in production of medical materials is proved and realized in vitro. The comparative analysis showed that substances from a split of skins of cattle and a silver carp have an identical set of amino acids, but are characterized by the different content of separate amino acid s.

  20. Dry PMR-15 Resin Powders

    Vannucci, Raymond D.; Roberts, Gary D.


    Shelf lives of PMR-15 polymides lengthened. Procedure involves quenching of monomer reactions by vacuum drying of PRM-15 resin solutions at 70 to 90 degree F immediately after preparation of solutions. Absence of solvent eliminates formation of higher esters and reduces formation of imides to negligible level. Provides fully-formulated dry PMR-15 resin powder readily dissolvable in solvent at room temperature immediately before use. Resins used in variety of aerospace, aeronautical, and commercial applications.

  1. Sphericizing metal powders by mechanical means

    WANG Fu-xiang; GAI Guo-sheng; YANG Yu-fen


    A dry mechanical surface treatment was described,in which irregularly shaped metal powders were impacted and sphericized by using high speed airflow impact method particles composite system(PCS). The optimum technological parameters for the metal powders processed were determined according to the treatment effect under different conditions. The results show that the irregularly shaped metal powders are impacted into dense spherical particles,the bulk density and tap density of the metal powders increase noticeably. The combination property of metal powders is improved greatly.

  2. Preparation and Characterization on Nano-Sized Barium Titanate Powder Doped with Lanthanum by Sol-Gel Process


    The nano-sized BaTiO3:La3+ powders were prepared by sol-gel process using butyl phthalate, barium acetate and lanthanum oxide as raw material, and these samples were tested by means of TG-DTA, XRD and SEM. The results indicate that with the annealing temperature and the doped concentration rising, the powders' particle sizes will increase and decrease respectively. When annealing temperature is 900 ℃ and doped concentration is 7%, the phase is cubic without other phases, and the particle size of power is 43.34 nm.

  3. Synthesis of nano-forsterite powder by making use of natural silica sand

    Nurbaiti, Upik, E-mail: [Department of Physics, Faculty of Mathematics and Natural Sciences Institut Teknologi Sepuluh Nopember Jl. Arief Rahman Hakim, Surabaya 60111 (Indonesia); Department of Physics, Faculty of Mathematics and Natural Sciences Semarang State University Jl. Raya Sekaran GunungPati, Semarang 50221 (Indonesia); Suud, Fikriyatul Azizah; Darminto,; Triwikantoro,; Zainuri, Mochamad; Pratapa, Suminar, E-mail: [Department of Physics, Faculty of Mathematics and Natural Sciences Institut Teknologi Sepuluh Nopember Jl. Arief Rahman Hakim, Surabaya 60111 (Indonesia)


    Nano-forsterite powder with natural silica sand and magnesium powder as the raw materials have been succesfully synthesized. The silica sand was purified followed by a coprecipitation process to obtain colloidal silica. The magnesium powder was dissolved in a chloric acid solution to obtain MgCl{sub 2} solution. The nanoforsterite powder was synthesised using a sol-gel method which included the mixing the colloidal silica and the MgCl{sub 2} solution with various aging and filtering processes. The samples were dried at 100 °C using a hot plate and then the dried powders were calcinated at 900 °C for 2 hours. The samples were characetised for their elements and phase compositions using X-ray Flourescence (XRF) and X-ray Diffraction (XRD) methods, respectively. The diffraction data were qualitatively analyzed using Match!2 software and quantitatively using Rietica software. The crystallite size was verified using Transmission Electron Microscopy (TEM). Results of XRD data analysis showed that the forsterite content reached up to 90.5% wt. The TEM average crystallite size was approximately 53(6) nm.

  4. Innovative technologies for powder metallurgy-based disk superalloys: Progress and proposal

    Chong-Lin, Jia; Chang-Chun, Ge; Qing-Zhi, Yan


    Powder metallurgy (PM) superalloys are an important class of high temperature structural materials, key to the rotating components of aero engines. In the purview of the present challenges associated with PM superalloys, two novel approaches namely, powder preparation and the innovative spray-forming technique (for making turbine disk) are proposed and studied. Subsequently, advanced technologies like electrode-induction-melting gas atomization (EIGA), and spark-plasma discharge spheroidization (SPDS) are introduced, for ceramic-free superalloy powders. Presently, new processing routes are sought after for preparing finer and cleaner raw powders for disk superalloys. The progress of research in spray-formed PM superalloys is first summarized in detail. The spray-formed superalloy disks specifically exhibit excellent mechanical properties. This paper reviews the recent progress in innovative technologies for PM superalloys, with an emphasis on new ideas and approaches, central to the innovation driving techniques like powder processing and spray forming. Project supported by the National Natural Science Foundation of China (Grant Nos. 50974016 and 50071014).

  5. Phase diagram of crushed powders

    Bodard, Sébastien; Jalbaud, Olivier; Saurel, Richard; Burtschell, Yves; Lapebie, Emmanuel


    Compression of monodisperse powder samples in quasistatic conditions is addressed in a pressure range such that particles fragmentation occurs while the solid remains incompressible (typical pressure range of 1-300 MPa for glass powders). For a granular bed made of particles of given size, the existence of three stages is observed during compression and crush up. First, classical compression occurs and the pressure of the granular bed increases along a characteristic curve as the volume decreases. Then, a critical pressure is reached for which fragmentation begins. During the fragmentation process, the granular pressure stays constant in a given volume range. At the end of this second stage, 20%-50% of initial grains are reduced to finer particles, depending on the initial size. Then the compression undergoes the third stage and the pressure increases along another characteristic curve, in the absence of extra fragmentation. The present paper analyses the analogies between the phase transition in liquid-vapour systems and powder compression with crush-up. Fragmentation diagram for a soda lime glass is determined by experimental means. The analogues of the saturation pressure and latent heat of phase change are determined. Two thermodynamic models are then examined to represent the crush-up diagram. The first one uses piecewise functions while the second one is of van der Waals type. Both equations of state relate granular pressure, solid volume fraction, and initial particle diameter. The piecewise functions approach provides reasonable representations of the phase diagram while the van der Waals one fails.

  6. Advances in powder diffraction analysis

    Louer, D. [Lab. de Chimie du Solide et Inorganique Moleculaire, Rennes (France). Groupe de Cristallochimie


    Powder diffraction offers a wide spectrum of applications to solid-state scientists. The method traditionally used for phase analysis and the study of structural imperfections has benefited, in the last twenty years, from great advances in the instrumentation and computer-based approaches for pattern indexing and modelling. The factors at the origin of the metamorphosis of the method are presented. The major modern applications reported include quantitative analysis and the extraction of three-dimensional structural and microstructural properties. The use of pattern-fitting techniques for the characterization of the microstructure is discussed through applications to nanocrystalline materials. Remarkable results achieved in the solution of crystal structures are presented, as well as the impact in solid-state chemistry of powder crystallography, particularly for elucidating the crystal chemistry of families of compounds for which only powders are available. New strategies for solving the phase problem have been introduced and new classes of solids are being studied, such as drugs, coordination and organic compounds. (orig.) 100 refs.

  7. Investigation of the potential for direct compaction of a fine ibuprofen powder dry-coated with magnesium stearate.

    Qu, Li; Zhou, Qi Tony; Gengenbach, Thomas; Denman, John A; Stewart, Peter J; Hapgood, Karen P; Gamlen, Michael; Morton, David A V


    Intensive dry powder coating (mechanofusion) with tablet lubricants has previously been shown to give substantial powder flow improvement. This study explores whether the mechanofusion of magnesium stearate (MgSt), on a fine drug powder can substantially improve flow, without preventing the powder from being directly compacted into tablets. A fine ibuprofen powder, which is both cohesive and possesses a low-melting point, was dry coated via mechanofusion with between 0.1% and 5% (w/w) MgSt. Traditional low-shear blending was also employed as a comparison. No significant difference in particle size or shape was measured following mechanofusion. For the low-shear blended powders, only marginal improvement in flowability was obtained. However, after mechanofusion, substantial improvements in the flow properties were demonstrated. Both XPS and ToF-SIMS demonstrated high degrees of a nano-scale coating coverage of MgSt on the particle surfaces from optimized mechanofusion. The study showed that robust tablets were produced from the selected mechanofused powders, at high-dose concentration and tablet tensile strength was further optimized via addition of a Polyvinylpyrrolidone (PVP) binder (10% w/w). The tablets with the mechanofused powder (with or without PVP) also exhibited significantly lower ejection stress than those made of the raw powder, demonstrating good lubrication. Surprisingly, the release rate of drug from the tablets made with the mechanofused powder was not retarded. This is the first study to demonstrate such a single-step dry coating of model drug with MgSt, with promising flow improvement, flow-aid and lubrication effects, tabletability and also non-inhibited dissolution rate.

  8. SAR Raw Data Generation for Complex Airport Scenes

    Jia Li


    Full Text Available The method of generating the SAR raw data of complex airport scenes is studied in this paper. A formulation of the SAR raw signal model of airport scenes is given. Via generating the echoes from the background, aircrafts and buildings, respectively, the SAR raw data of the unified SAR imaging geometry is obtained from their vector additions. The multipath scattering and the shadowing between the background and different ground covers of standing airplanes and buildings are analyzed. Based on the scattering characteristics, coupling scattering models and SAR raw data models of different targets are given, respectively. A procedure is given to generate the SAR raw data of airport scenes. The SAR images from the simulated raw data demonstrate the validity of the proposed method.

  9. Quality and Sensorial Characteristics of Raw-Vegan Bars

    Liana Claudia Salanţă


    Full Text Available Increased consumer interest in healthier food products is driven by a variety of factors including growing awareness of the link between diet and health, the desire to age ‘gracefully’ by maintaining good health, greater convenience in meeting nutritional needs and preventing chronic diseases. In raw food diet, food is consumed predominantly or exclusively as uncooked and unprocessed raw food; the main components of the diet are fruits, nuts, seeds, and sprouted grains and beans. The aim of this study was to obtain two raw-vegan bars using dry raw materials and to establish the physicochemical and sensory characteristics of the products. Raw-vegan bars were formulated using fruits and seeds (cranberries, figs, raisins, raspberries, cashew, chia seeds, etc. and binding agents (honey. Raw-vegan bars stands out among fast foods due to their balanced nutritional content and convenience.  

  10. Synthesis and characterization of bismuth alkaline titanate powders

    Torres-Huerta, A.M., E-mail: [CICATA-Altamira, Instituto Politecnico Nacional, Km. 14.5 Carretera Tampico Puerto Industrial Altamira, Altamira, Tamps. 89600 (Mexico); Dominguez-Crespo, M.A. [CICATA-Altamira, Instituto Politecnico Nacional, Km. 14.5 Carretera Tampico Puerto Industrial Altamira, Altamira, Tamps. 89600 (Mexico); Hernandez-Perez, M.A. [ESIQIE, Metalurgia, Instituto Politecnico Nacional, Mexico, D. F (Mexico); Garcia-Zaleta, D.S. [CICATA-Altamira, Instituto Politecnico Nacional, Km. 14.5 Carretera Tampico Puerto Industrial Altamira, Altamira, Tamps. 89600 (Mexico); Brachetti-Sibaja, S.B. [CICATA-Altamira, Instituto Politecnico Nacional, Km. 14.5 Carretera Tampico Puerto Industrial Altamira, Altamira, Tamps. 89600 (Mexico); Instituto Tecnologico de Ciudad Madero, Av. 1o. de Mayo esq. Sor Juana Ines de la Cruz s/n Col. Los Mangos C.P.89440 Cd. Madero Tamaulipas (Mexico)


    In this work, samples of bismuth alkaline titanate, (K{sub 0.5}Na{sub 0.5}){sub (2-x/2)}Bi{sub (x/6)}TiO{sub 3}, (x = 0.05-0.75) have been prepared by conventional ceramic technique and molten salts. Metal oxides or carbonates powders were used as starting raw materials. The crystalline phase of the synthesized powders was identified by the X-ray diffraction (XRD) and particle morphology was characterized by scanning electron microscopy (SEM). Solid state reaction method was unsuccessful to obtain pellets. From XRD results, a rhombohedral structure was detected and the parameter lattice were estimated to be a = 5.5478 A and {alpha} = 59.48{sup o}. These parameters were used to refine the structure by Rietveld analysis. SEM results showed several morphologies. Apparently, bismuth is promoting the grain growth whose sizes vary from 30 nm to 180 nm It is expected that these materials can be utilized in practical applications as substitutes for lead zirconatetitanate (PZT)-based ceramics.

  11. Catalytic Pretreatment and Microwave Assisted Hydrolysis of Lignocellulosic Raw Materials

    Hakola, Maija


    There is nowadays a strong concern about decreasing oil supplies and global warming leading to ever increasing interest in biobased fuels and chemical production. The utilization of lignocellulosic raw materials for liquid biofuels and chemicals is a challenging task due to raw materials rigid structure which is resistant towards any actions to break it. Thus the raw materials should be pretreated to reach an economically vital process. Catalytic and alkaline oxidation presented here ar...

  12. Pentachlorophenol reduction in raw Cauca river water through activated carbon adsorption in water purification

    Camilo Hernán Cruz Vélez


    Full Text Available Reducing chemical risk in raw water from the River Cauca (caused by the presence of pentachlorophenol and organic matter (real color, UV254 absorbance was evaluated at bench scale by using three treatment sequences: adsorption with powdered ac-tivated coal (PAC; adsorption – coagulation; and, adsorption – disinfection – coagulation. The results showed that although PAC is appropriate for pentachlorophenol removal, and its use together with the coagulant (aluminium sulphate significantly impro-ved phenolic compound and organic matter removal (promoting enhanced coagulation, the most efficient treatment sequence was adsorption – disinfection - coagulation, achieving minor pentachlorophenol levels than detection (1.56 μg/l and WHO li-mits (9μg/l due to the effect of chloride on PAC.

  13. Peculiarities of chemical composition of sainfoin seeds powder

    Natalia Aleksandrovna Tarasenko


    Full Text Available This paper is devoted to studying chemical composition of the powder of the seeds of non-traditional legume, sainfoin. The experimental studies showed that crushed seeds of sainfoin make a flowing fine powder of light brown color with a pleasant unpronounced specific smell with floral notes. The taste is grassy with the after-taste typical for legumes. The chemical composition of sainfoin seeds is dominated by proteins and fiber, and fat content does not exceed 8%. The total content of amino-acids is 26.94/100 g of the product, with the share of indispensable ones being 37.85%. The limiting amino acid is tryptophan (48.0 %. By the composition of essential amino acids, proteins of sainfoin seeds are slightly inferior to the proteins of soybean seeds, but are better than the proteins of peanut seeds. The composition of fatty acid of the lipid complex of sainfoin seeds is dominated by (over 40% of the total linolenic ω-3 acid with sufficiently low (less than 20% of the total content of linoleic ω-6 acid. The lipid composition of sainfoin seeds, along with triacylglycerols, contains about 40% of related lipids, which are dominated by sterols, aliphatic alcohols, phospholipids and tocopherols. All this makes the lipid complex of sainfoin seed a promising means of adjusting fatty acids composition in food products of functional and specialized purpose, dietary supplements, and a valuable raw material for creating pharmaceutical substances and preparations. Adding sainfoin seeds powder into the nutritive medium has no inhibitory effect on development of the tested organism. At the same time, 58% of the organism's physiological need for protein is satifsied, as compared to caseine.

  14. Proteomic approach based on MALDI-TOF MS to detect powdered milk in fresh cow's milk.

    Calvano, Cosima Damiana; Monopoli, Antonio; Loizzo, Pasqua; Faccia, Michele; Zambonin, Carlo


    Milk and cheese are expensive foodstuffs, and their consumption is spread among the population because of their high nutritional value; for this reason they are often subjected to adulterations. Among the common illegal practices, the addition of powdered derivatives seems very difficult to detect because the adulterant materials have almost the same chemical composition of liquid milk. However, the high temperatures (180-200 °C) used for milk powder production could imply the occurrence of some protein modifications (e.g., glycation, lactosylation, oxidation, deamidation, dehydration). The modified proteins or peptides could then be used as markers for the presence of powdered milk. In this work, matrix-assisted laser desorption ionization time-of-flight mass spectrometry (MALDI-TOF MS) was employed to analyze tryptic digests relevant to samples of raw liquid (without heat treatment), commercial liquid, and powdered cow's milk. Samples were subjected to two-dimensional gel electrophoresis (2-DE); differences among liquid and powder milk were detected at this stage and eventually confirmed by MALDI analysis of the in gel digested proteins. Some diagnostic peptides of powdered milk, attributed to modified whey proteins and/or caseins, were identified. Then, a faster procedure was optimized, consisting of the separation of caseins from milk whey and the subsequent in-solution digestion of the two fractions, with the advantage of obtaining almost the same information in a limited amount of time. Finally, analyses were carried out with the fast procedure on liquid milk samples adulterated with powdered milk at different percentages, and diagnostic peptides were detected down to 1% of adulteration level.




    Full Text Available In this investigation, the mullite–zirconia composites were prepared by reaction-sintering of alumina and zircon powder. Besides, the slip casting method was employed for fabrication of these composites and different times of milling process were used for reducing the particles size of raw materials. Then, the effect of raw materials particles size on the properties of these composites was investigated. The physical properties, fracture toughness, flexural strength, phase composition and microstructure of these composites after firing at 1600°C were studied. The results showed that the milling time and then, particles size of raw materials have a great effect on the phase composition and properties of mullite–zirconia composites. The formation of tetragonal-zirconia is favored by reducing of particle size which, leads to increasing of the fracture toughness and flexural strength of these composites.

  16. Usefulness of raw bagasse for oil absorption: a comparison of raw and acylated bagasse and their components.

    Said, Abd El-Aziz A; Ludwick, Adriane G; Aglan, Heshmat A


    Raw bagasse or sugar cane cellulosic residues were modified using acylation grafting with fatty acid. The capability of the grafted bagasse to absorb oil from aqueous solution was studied and compared with the raw bagasse. It was found that the grafted material was significantly more hydrophobic than the raw bagasse. This grafted bagasse had little affinity for water and good affinity for oil. It was also found that bleaching of raw bagasse did not enhance its oil absorptivity. The grafted raw bagasse would be most suitable for applications where oil is to be removed from an aqueous environment. For oil absorbing applications in the absence of water, the raw bagasse was an excellent material.

  17. Physico-chemical characterisation of some samples of fresh milk and milk powder

    Soceanu Alina


    Full Text Available Milk consumption is important in the diet of all age groups because it provides important nutrients that are essential for humans. Children are the largest consumers of milk, thus, it’s very important that milk is free of toxic compounds that can be harmful for humans. Aim of the study was to determine the physico-chemical characteristics of some samples of milk powder for different stage of baby growing and for some samples of fresh milk: raw cow’s milk, milk trade and UHT type. The following physico-chemical properties: density, pH, acidity, the presence of acetone, enzymes, antiseptics, dry substance, the ash, total fat, saponification and peroxide index, total nitrogen and protein content were determined. Comparing the values of acidity for analyzed samples it can be concluded that the powder milk acidity value is much lower than the fresh milk. The presence of antiseptics and acetone was not identified, and amylase and peroxidase were found only in raw cow's milk. The highest protein content was found for milk powder (27.22%.

  18. Salimicrobium salexigens sp. nov., a moderately halophilic bacterium from salted hides.

    de la Haba, Rafael R; Yilmaz, Pinar; Sánchez-Porro, Cristina; Birbir, Meral; Ventosa, Antonio


    Two Gram-positive, moderately halophilic bacteria, designated strains 29CMI(T) and 53CMI, were isolated from salted hides. Both strains were non-motile, strictly aerobic cocci, growing in the presence of 3-25% (w/v) NaCl (optimal growth at 7.5-12.5% [w/v] NaCl), between pH 5.0 and 10.0 (optimal growth at pH 7.5) and at temperatures between 15 and 40°C (optimal growth at 37°C). Phylogenetic analysis based on 16S rRNA gene sequence comparison showed that both strains showed a similarity of 98.7% and were closely related to species of the genus Salimicrobium, within the phylum Firmicutes. Strains 29CMI(T) and 53CMI exhibited 16S rRNA gene sequence similarity values of 97.9-97.6% with Salimicrobium album DSM 20748(T), Salimicrobium halophilum DSM 4771(T), Salimicrobium flavidum ISL-25(T) and Salimicrobium luteum BY-5(T). The DNA G+C content was 50.7mol% and 51.5mol% for strains 29CMI(T) and 53CMI, respectively. The DNA-DNA hybridization between both strains was 98%, whereas the values between strain 29CMI(T) and the species S. album CCM 3517(T), S. luteum BY-5(T), S. flavidum ISL-25(T) and S. halophilum CCM 4074(T) were 45%, 28%, 15% and 10%, respectively, showing unequivocally that strains 29CMI(T) and 53CMI constitute a new genospecies. The major cellular fatty acids were anteiso-C(15:0), anteiso-C(17:0), iso-C(15:0) and iso-C(14:0). The main respiratory isoprenoid quinone was MK-7, although small amounts of MK-6 were also found. The polar lipids of the type strain consist of diphosphatidylglycerol, phosphatidylglycerol, one unidentified phospholipid and one glycolipid. The peptidoglycan type is A1γ, with meso-diaminopimelic acid as the diagnostic diamino acid. On the basis of the phylogenetic analysis, and phenotypic, genotypic and chemotaxonomic characteristics, we propose strains 29CMI(T) and 53CMI as a novel species of the genus Salimicrobium, with the name Salimicrobium salexigens sp. nov. The type strain is 29CMI(T) (=CECT 7568(T)=JCM 16414(T)=LMG 25386(T)).

  19. Aerospace Fuels From Nonpetroleum Raw Materials

    Palaszewski, Bryan A.; Hepp, Aloysius F.; Kulis, Michael J.; Jaworske, Donald A.


    Recycling human metabolic and plastic wastes minimizes cost and increases efficiency by reducing the need to transport consumables and return trash, respectively, from orbit to support a space station crew. If the much larger costs of transporting consumables to the Moon and beyond are taken into account, developing waste recycling technologies becomes imperative and possibly mission enabling. Reduction of terrestrial waste streams while producing energy and/or valuable raw materials is an opportunity being realized by a new generation of visionary entrepreneurs; several relevant technologies are briefly compared, contrasted and assessed for space applications. A two-step approach to nonpetroleum raw materials utilization is presented; the first step involves production of supply or producer gas. This is akin to synthesis gas containing carbon oxides, hydrogen, and simple hydrocarbons. The second step involves production of fuel via the Sabatier process, a methanation reaction, or another gas-to-liquid technology, typically Fischer-Tropsch processing. Optimization to enhance the fraction of product stream relevant to transportation fuels via catalytic (process) development at NASA Glenn Research Center is described. Energy utilization is a concern for production of fuels whether for operation on the lunar or Martian surface, or beyond. The term green relates to not only mitigating excess carbon release but also to the efficiency of energy usage. For space, energy usage can be an essential concern. Another issue of great concern is minimizing impurities in the product stream(s), especially those that are potential health risks and/or could degrade operations through catalyst poisoning or equipment damage; technologies being developed to remove heteroatom impurities are discussed. Alternative technologies to utilize waste fluids, such as a propulsion option called the resistojet, are discussed. The resistojet is an electric propulsion technology with a powered

  20. Preparation of Strontium Bismuth Tantalum (SBT) Fine Powder by Sol-Gel Process Using Bismuth Subnitrate as Bismuth Source


    Strontium bismuth tantalum (SBT) fine power was prepared by Sol-Gel method. Pentaethoxy tantalum, strontium acetate and bismuth subnitrate were used as raw materials, and were dissolved in proper order in ethylene glycol to form transparent sol. The mixed precursor was dried at 80°C and annealed at 800°C for 1 h. Crystallized nanometer sized SBT fine powder was obtained and characterized by XRD.

  1. Structure and machinability of thin-walled parts made of titanium alloy powder using electron beam melting technology

    Isaev, A.; Grechishnikov, V.; Kozochkin, M.; Volosova, M.; Petuhov, Yu; Peretyagin, P.


    The present study aims at study of structure and properties of raw and thermal treated titanium-based powder material used to produce the thin-walled components by electron beam melting technology. Producing the end product means also studying the finishing cutting process. Examining the quality of end product in terms of geometric tolerance and thin walls thickness stability consists of control the surface roughness is also included in this study.

  2. Image Hiding Technology Based on DCT and Chaos%基于DCT和混沌的图像隐藏技术①


      提出一种基于 DCT 和混沌的图像隐藏算法。首先利用混沌系统产生混沌序列对秘密图像进行加密,然后利用DCT变换与混沌序列把秘密图像隐藏到载体图像中。实验结果表明,该算法具有良好的安全性和隐藏效果。%An improved image hiding technology based on DCT and chaos is presented. We use chaotic system to generate one chaotic sequence which is utilized to encrypt the secret image, and then we use DCT and chaotic sequence to realize the secret image hiding in the host image. Simulation results show that the algorithm has good security and hiding effect.

  3. [Identication of pearl powder and conch powder from different origins by differential scanning calorimetry].

    Chen, Jia; Li, Ming-hua; Yu, Kun-zi; Dong, Ya-juan; Zhang, Nan-ping; Hu, Xiao-ru; Wei, Feng; Ma, Shuang-cheng


    The paper is aimed to establish a methods for identication of pearl powder and conch powder from different origins. Hermetic aluminum pan was used to encapsulate samples. The optimal testing conditions were: heating rate 10 degrees C x min(-1), sample weight 3 mg and nitrogen gas flow rate 40 mL x min(-1). The enthalpy values of pearl powder and conch powder was obvious different. Identication of pearl powder and conch powder by DSC is a practical method for its accuracy, convenience and practificality.

  4. Trace element contents in raw materials and products of the confectionary industry

    Bodnar, J. (Edesipari Vallalat, Szerencs (Hungary)); Kiss, B. (Allategeszseguegyi es Elelmiszerellenoerzoe Koezpont, Budapest (Hungary))

    Based on measurements by X-ray radiation analysis, the zinc content of raw ingredients for the confectionary industry varies between 27,2 and 56,4 mg/kg and their copper content between 6,2 and 34,3 mg/kg. The same values for bitter chocolates: 22,3 to 28,8 mg/kg for zinc and 10,8 to 18,8 mg/kg for copper resp.; values in milk chocolates: 15,9 to 19,8 mg/kg (zinc) and 2,6 to 6,1 mg/kg (copper). Contents of zinc and copper in cocoa powders are much higher than the above values: 78,1 to 102,5 mg/kg (zinc) and 45,9 to 48,6 mg/kg (copper), resp. Zinc and copper contents in the end products depend in the first place on the raw ingredients; contamination during manufacturing is unlikely. 8 refs.

  5. Beyond waste: new sustainable fillers from fly ashes stabilization, obtained by low cost raw materials

    N. Rodella


    Full Text Available A sustainable economy can be achieved only by assessing processes finalized to optimize the use of resources. Waste can be a relevant source of energy thanks to energy-from-waste processes. Concerns regarding the toxic fly ashes can be solved by transforming them into resource as recycled materials. The commitment to recycle is driven by the need to conserve natural resources, reduce imports of raw materials, save landfill space and reduce pollution. A new method to stabilize fly ash from Municipal Solid Waste Incinerator (MSWI at room temperature has been developed thanks to COSMOS-RICE LIFE+ project ( This process is based on a chemical reaction that occurs properly mixing three waste fly ashes with rice husk ash, an agricultural by-product. COSMOS inert can replace critical raw materials (i.e. silica, fluorspar, clays, bentonite, antimony and alumina as filler. Moreover the materials employed in the stabilization procedure may be not available in all areas. This paper investigates the possibility of substituting silica fume with corresponding condensed silica fume and to substitute flue-gas desulfurization (FGD residues with low-cost calcium hydroxide powder. The removal of coal fly ash was also considered. The results will be presented and a possible substitution of the materials to stabilize fly ash will be discussed.

  6. Oil Palm Biomass As Potential Substitution Raw Materials For Commercial Biomass Briquettes Production

    A. B. Nasrin


    Full Text Available Palm oil industry generates vast amount of palm biomass. Converting palm biomass into a uniform and solid fuel through briquetting process appears to be an attractive solution in upgrading its properties and add value. In this study, raw materials including empty fruit bunch (EFB, in powder and fibre forms, palm kernel expeller (PKE and sawdust were densified into briquettes at high temperature and pressure using screw extrusion technology. The briquettes were analysed to determine its physical and chemical properties, mechanical strength and burning characteristics. It was found that briquettes made either from 100% pulverized EFB or mixed with sawdust exhibited good burning properties. EFB fibre and PKE, due to their physical properties, were recommended to be blended with sawdust in producing quality briquettes. In overall, converting palm biomass into briquettes has increased its energy content and reduced moisture content about minimum of 5% and 38% respectively compared to its raw materials. The properties of palm biomass briquettes obtained from the study were compared to the commercial sawdust briquettes properties and to the minimum requirements of DIN 51731. The details of the study were highlighted in this paper. Palm biomass briquettes can become an important renewable energy fuel source in the future.

  7. Detection of Campylobacter jejuni in raw meat

    Z Noori


    Full Text Available Background & Objectives: Campylobacter jejuni is a Gram negative, microaerophilic, non-spore-forming and a small"ncurved bacillus which is able to cause foodborne infection in human. In this study the occurrence of C. jejuni in poultry and"nbeef meat was investigated."nMaterials & Methods: Forty raw meat samples including 22 poultry samples and 18 beef samples were investigated for the"npresence of C. jejuni. To isolate the bacterium, the samples were initially enriched in Preston Broth medium and subsequently"ntransferred to Campylobacter selective Agar containing defibrinated sheep blood and antibiotics. The biochemical tests were"nused for identification of isolated bacteria at species level."nResults: Three poultry samples were positive for C. jejuni."nConclusion: Alimentary tract of chickens contain high numbers of C. jejuni therefore, this bacterium can be easily found in"ntheir feces. It is recommended to use chlorinated water in birds’ feed and to perform slaughtering, skinning and evisceration"nunder aseptic conditions to prevent campylobacteriosis in human from poultry meat. None of the beef samples yielded any"nCampylobacter, this may be due to limited number of samples of beef meat analyzed in this study.

  8. Rapidly solidified aluminum alloy powder

    Cho, S.S.; Chun, B.S.; Won, C.W.; Lee, B.S.; Kim, H.K.; Ryu, M. [Chungnam National Univ., Taejon (Korea, Republic of); Antolovich, S.D. [Washington State Univ., Pullman, WA (United States)


    Miniaturization and weight reduction are becoming increasingly important in the fabrication of vehicles. In particular, aluminum-silicon alloys are the logical choice for automotive parts such as pistons and cylinders liners because of their excellent wear resistance and low coefficient of thermal expansion. However, it is difficult to produce aluminum-silicon alloys with silicon contents greater than 20 wt% via ingot metallurgy, because strength is drastically reduced by the coarsening of primary silicon particles. This article describes an investigation of rapid solidification powder metallurgy techniques developed in an effort to prevent coarsening of the primary silicon particles in aluminum-silicon alloys.

  9. 图像隐藏算法的MATLAB实现%Realization of image hiding algorithm based on MATLAB



    根据HVS的特性,人类视觉系统对高位信号敏感,去掉图像最低几个位并不会造成画面质量的明显下降,视觉系统就无法感觉到信号的存在,提出了四比特图像信息替换算法实现图像隐藏,运用MATLAB软件进行算法实现,嵌入信息后的载体图像与原始图像视觉效果基本一致,有效解决了图像信息隐藏问题。%According to the characteristics of HVS, The human visual system is sensitive to the high signal. To remove the image of the least number of bits does not cause a significant decline in the quality of picture, the visual system can not feel the existence of the signal. In this paper, four bit image information replacement algorithm is proposed to realize the image hiding, MATLAB software is used to realize the algorithm. The carrier image after embedding information is basically consistent with the original image, effectively solve the problem of image information hiding.

  10. A Note On the Bounds for the Generalized Fibonacci-p-Sequence and its Application in Data-Hiding

    Dey, Sandipan; Sane, Suneeta; Sanyal, Sugata


    In this paper, we suggest a lower and an upper bound for the Generalized Fibonacci-p-Sequence, for ?different values of p. The Fibonacci-p-Sequence is a generalization of the Classical Fibonacci Sequence. We ?first show that the ratio of two consecutive terms in generalized Fibonacci sequence converges to a p-degree polynomial and then use this result to prove the bounds for generalized Fibonacci-p sequence, thereby generalizing the exponential bounds for classical Fibonacci Sequence. Then we show how these results can be used to prove efficiency for data hiding techniques using generalized Fibonacci sequence. These steganographic techniques use generalized Fibonacci-p-Sequence for increasing number available of bit-planes to hide data, so that more and more data can be hidden into the higher bit-planes of any pixel without causing much distortion of the cover image. This bound can be used as a theoretical proof for efficiency of those techniques, for instance it explains why more and more data can be hidden ...

  11. An Internal Data Non-hiding Type Real-time Kernel and its Application to the Mechatronics Controller

    Yoshida, Toshio

    For the mechatronics equipment controller that controls robots and machine tools, high-speed motion control processing is essential. The software system of the controller like other embedded systems is composed of three layers software such as real-time kernel layer, middleware layer, and application software layer on the dedicated hardware. The application layer in the top layer is composed of many numbers of tasks, and application function of the system is realized by the cooperation between these tasks. In this paper we propose an internal data non-hiding type real-time kernel in which customizing the task control is possible only by change in the program code of the task side without any changes in the program code of real-time kernel. It is necessary to reduce the overhead caused by the real-time kernel task control for the speed-up of the motion control of the mechatronics equipment. For this, customizing the task control function is needed. We developed internal data non-cryptic type real-time kernel ZRK to evaluate this method, and applied to the control of the multi system automatic lathe. The effect of the speed-up of the task cooperation processing was able to be confirmed by combined task control processing on the task side program code using an internal data non-hiding type real-time kernel ZRK.

  12. Scoping Future Policy Dynamics in Raw Materials Through Scenarios Testing

    Correia, Vitor; Keane, Christopher; Sturm, Flavius; Schimpf, Sven; Bodo, Balazs


    The International Raw Materials Observatory (INTRAW) project is working towards a sustainable future for the European Union in access to raw materials, from an availability, economical, and environmental framework. One of the major exercises for the INTRAW project is the evaluation of potential future scenarios for 2050 to frame economic, research, and environmental policy towards a sustainable raw materials supply. The INTRAW consortium developed three possible future scenarios that encompass defined regimes of political, economic, and technological norms. The first scenario, "Unlimited Trade," reflects a world in which free trade continues to dominate the global political and economic environment, with expectations of a growing demand for raw materials from widely distributed global growth. The "National Walls" scenario reflects a world where nationalism and economic protectionism begins to dominate, leading to stagnating economic growth and uneven dynamics in raw materials supply and demand. The final scenario, "Sustainability Alliance," examines the dynamics of a global political and economic climate that is focused on environmental and economic sustainability, leading towards increasingly towards a circular raw materials economy. These scenarios were reviewed, tested, and provided simulations of impacts with members of the Consortium and a panel of global experts on international raw materials issues which led to expected end conditions for 2050. Given the current uncertainty in global politics, these scenarios are informative to identifying likely opportunities and crises. The details of these simulations and expected responses to the research demand, technology investments, and economic components of raw materials system will be discussed.

  13. Supply optimization for the production of raw sugar

    Grunow, Martin; Günther, H.O.; Westinner, R.


    Based on a case study from Venezuela, the production of raw sugar is investigated. Ideally, sugar mills operate at a constant production rate. However, safety stocks of the raw material cannot be maintained as sugar cane quality deteriorates very rapidly. Sugar cane is therefore continuously...

  14. Development and Capacity Forecast of China Rubber Raw Materials


    The "1 lth Five-Year Plan" period is the most glorious period in the history of China raw materials such as NR and SR. During the "12th Five-Year Plan" period, the rubber raw materials will enter an important period of great development in technology, product and output.

  15. Hygienic and other aspects of raw milk vending machines

    DANIEL, Radovan


    The aim of this work was to evaluate opportunities of raw milk sales. The questionnaire was submitted to respondents, which assessed the direct sale of milk, consumption, awareness about milk quality connecting with the sales of raw milk using a vending machines.

  16. Quality and Sensorial Characteristics of Raw-Vegan Bars

    Liana Claudia Salanţă; Maria Tofană; Sonia Socaci; Cristina Barta; Carmen Pop


    ...; the main components of the diet are fruits, nuts, seeds, and sprouted grains and beans. The aim of this study was to obtain two raw-vegan bars using dry raw materials and to establish the physicochemical and sensory characteristics of the products...

  17. Quality control of raw cows' milk by headspace analysis

    Hettinga, K.A.; Valenberg, van H.J.F.; Hooijdonk, van A.C.M.


    This study investigated whether headspace analysis of volatile components can be used for monitoring the quality of raw cows¿ milk. The detection of different quality defects caused by cows¿ feed, microbiological and chemical contamination, as well as enzymatic deterioration was studied. Fresh raw m

  18. Assessment of Powder Mixed EDM: A Review

    Nanimina Alexis Mouangué


    Full Text Available This project research undertakes the assessment of powder added electrical discharge machining (PMDM with focus on effect of additive powders and circulation systems. In PMEDM process, powder can be mixed with dielectric fluid either in the main EDM tank or in a separate tank in order to improve EDM machining performance. Different designs of powder mixed EDM circulating systems such as closed and opened systems with different sizes of tank are described in literature. Various devices such as stirrer, circulating pump etc. are placed in the tank in order to ensure the uniformity of powder mixed dielectric. Each design has its advantages and disadvantages and it might affect the EDM output results. Therefore, there is a need to review the PMEDM with respect to additive powders and circulation systems in order to identify the gap and propose an alternative for improving process.

  19. Adsorption of lignosulfonate compounds using powdered eggshell

    Muhammad Ali Zulfikar


    Full Text Available Batch adsorption of lignosulfonates using untreated powdered eggshell under the influences of mixing time, pH,particle size and dose of powdered eggshell was investigated. Adsorption isotherms of lignosulfonates onto powder eggshellwere also studied. Eggshells were collected from the Balubur traditional market in Bandung, Indonesia, washed with distilledwater, air dried, and then ground into powder of different particle sizes. Kinetic studies found that equilibrium time was ashigh as 90 minutes. From experiments carried out at different pH, it was observed that pH plays an important role in theadsorption of lignosulfonate compounds. It was also observed that particles size has no significant effect on the adsorptionof lignosulfonate compounds. The optimum dosage of powdered eggshell was 30 g/100 mL of 500 mg/L lignosulfonatesolution. Adsorption isotherms studied through the use of graphical methods revealed that the adsorption of lignosulfonatesonto powdered eggshell follows the Langmuir model.

  20. Hide Tanning and Its Use in Taiga: The Case of the Orochen-Evenki Reindeer Herders and Hunters of Zabaikalye (East Siberia

    Donatas Brandišauskas


    Full Text Available This article documents the way in which the Orochen-Evenki hunters and herders in northern part of Zabaikalye tan hides and produce gear in the post-Soviet era. Here, I wish to present the argument that it is difficult to understand the reviving of hide tanning in remote villages and the taiga without understanding how hunters and herders in this region adapt to the unstable post-Soviet environment. I suggest that hunters and herders aim to maintain their autonomy from goods and resources imported from cities, and, in spending little effort connecting with state powers in this way, securing their lives from socio-economic constraints.

  1. Photoelectric Measurement of the Fineness of Raw Silk

    Wan-chun FEI


    In order to precisely measure the diameters for obtaining the fineness of rolling raw silk, the physical features of raw silk are analyzed. By means of Fresnel principle, diffractions caused by different transparent raw silk filaments are analyzed and simulated. Image data of raw silk filament measured by digital CMOS camera are analyzed and processed for obtaining the precise diameters of the filament with the relative error of less than 1%. On the assumption of appropriate elliptic cross-section of the filament, the cross-section area is calculated as the fineness of the filament. Measurement experiments are carried out. Finally, some suggestions are proposed for photoelectric measuring the fineness of raw silk.

  2. Fly ash of mineral coal as ceramic tiles raw material.

    Zimmer, A; Bergmann, C P


    The aim of this work was to evaluate the use of mineral coal fly ash as a raw material in the production of ceramic tiles. The samples of fly ash came from Capivari de Baixo, a city situated in the Brazilian Federal State of Santa Catarina. The fly ash and the raw materials were characterized regarding their physical chemical properties, and, based on these results; batches containing fly ash and typical raw materials for ceramic tiles were prepared. The fly ash content in the batches varied between 20 and 80 wt%. Specimens were molded using a uniaxial hydraulic press and were fired. All batches containing ash up to 60 wt% present adequate properties to be classified as several kinds of products in the ISO 13006 standard () regarding its different absorption groups (pressed). The results obtained indicate that fly ash, when mixed with traditional raw materials, has the necessary requirements to be used as a raw material for production of ceramic tiles.

  3. In-house characterization of protein powder

    Hartmann, Christian Grundahl; Nielsen, Ole Faurskov; Ståhl, Kenny


    X-ray powder diffraction patterns of lysozyme and insulin were recorded on a standard in-house powder diffractometer. The experimental powder diffraction patterns were compared with patterns calculated from Protein Data Bank coordinate data. Good agreement was obtained by including straightforward...... to include calculated H-atom positions did not improve the overall fit and was abandoned. The method devised was shown to be a quick and convenient tool for distinguishing precipitates and polymorphs of proteins....

  4. Risk Assessment of Baby Powder Exposure through Inhalation

    Moon, Min Chaul; Park, Jung Duck; Choi, Byung Soon; Park, So Young; Kim, Dong Won; Chung, Yong Hyun; HISANAGA, Naomi; Yu, Il Je


    This study was conducted to assess the exposure risk through inhalation to baby powder for babies and adults under simulated conditions. Baby powder was applied to a baby doll and the amount of baby powder consumed per application was estimated. The airborne exposure to baby powder during application was then evaluated by sampling the airborne baby powder near the breathing zones of both the baby doll and the person applying the powder (the applicator). The average amount of baby powder consu...

  5. Improving the microbiological safety of veal: validation of hot water rinse plus lactic acid spray in combination with scalding for hide-on carcasses to control Shiga-toxin producing Escherichia coli (STEC)

    Bob veal calves (n=6) were assigned to six hide-on carcass treatments for each of 5 replications. Primary treatments were no-scald, scald, or scalding with chemical; secondary treatments were no-treatment control or lactic acid. Hides were inoculated with non-pathogenic rifampicin-resistant Escheric...

  6. Preparation of silver powder through glycerol process

    Amit Sinha; B P Sharma


    High purity fine silver powder with uniform particle morphology was prepared through glycerol process. The process involves reduction of silver nitrate by glycerol under atmospheric conditions at a temperature below 175°C. Glycerol, in this process, acts as a solvent as well as a reducing agent. The powders prepared through this process were characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM) and chemical analysis. The powders were well crystalline and contained oxygen, carbon and hydrogen as impurities. Overall purity was better than 99.9%. The yield of silver powder was better than 99%.

  7. CVD carbon powders modified by ball milling

    Kazmierczak Tomasz


    Full Text Available Carbon powders produced using a plasma assisted chemical vapor deposition (CVD methods are an interesting subject of research. One of the most interesting methods of synthesizing these powders is using radio frequency plasma. This method, originally used in deposition of carbon films containing different sp2/sp3 ratios, also makes possible to produce carbon structures in the form of powder. Results of research related to the mechanical modification of these powders have been presented. The powders were modified using a planetary ball mill with varying parameters, such as milling speed, time, ball/powder mass ratio and additional liquids. Changes in morphology and particle sizes were measured using scanning electron microscopy and dynamic light scattering. Phase composition was analyzed using Raman spectroscopy. The influence of individual parameters on the modification outcome was estimated using statistical method. The research proved that the size of obtained powders is mostly influenced by the milling speed and the amount of balls. Powders tend to form conglomerates sized up to hundreds of micrometers. Additionally, it is possible to obtain nanopowders with the size around 100 nm. Furthermore, application of additional liquid, i.e. water in the process reduces the graphitization of the powder, which takes place during dry milling.

  8. How to freeze drop oscillations with powders

    Marston, Jeremy; Zhu, Ying; Vakarelski, Ivan; Thoroddsen, Sigurdur


    We present experiments that show when a water drop impacts onto a bed of fine, hydrophobic powder, the final form of the drop can be very different from the spherical form with which it impacts. For all drop impact speeds, the drop rebounds due to the hydrophobic nature of the powder. However, we observe that above a critical impact speed, the drop undergoes a permanent deformation to a highly non-spherical shape with a complete coverage of powder, thus creating a deformed liquid marble. This powder coating acts to freeze the drop oscillations during rebound.

  9. Possibility of Extrusion of Wood Powders

    MIKI, Tsunehisa; TAKAKURA, Norio; IIZUKA, Takashi; YAMAGUCHI, Katsuhiko; KANAYAMA, Kouzou


    .... Effects of extrusion temperature, extrusion ratio, moisture content and particle size of the mixed wood powders on the flow characteristics, bending strength, hardness and bulk density of extruded...

  10. Fine grain tungsten produced with nanoscale powder

    Tao Lin; Fang Zhao; Liying Zhang; Chengyi Wu; Zhimeng Guo


    Nanoscale tungsten powder was prepared by reducing nanoscale tungsten trioxide in hydrogen to WO2.90 and further to W powder. After compacted with a rubber die, the nanoscale tungsten powder was sintered in a high-temperature dilatometer to investigate its shrinkage process. The results show that the compact of the nanoscale tungsten powder starts to shrink at 1050℃ and ends at 1500℃. The shrinkage rate reaches the maximum value at 1210℃. The relative density of sintered samples is 96.4%, and its grain size is about 5.8 μm.

  11. Characterisation of PMMA/ATH Layers Realised by Means of Atmospheric Pressure Plasma Powder Deposition

    Lena M. Wallenhorst


    Full Text Available We report on the characteristics of aluminium trihydrate filled poly(methyl methacrylate composite (PMMA/ATH coatings realised by plasma deposition at atmospheric pressure. For this purpose, PMMA/ATH powder was fed to a plasma jet where the process and carrier gas was compressed air. The deposited coatings were investigated by X-ray photoelectron spectroscopy and water contact angle measurements. Further, the raw material was characterised before deposition. It was found that, with respect to the raw material, aluminium was uncovered in the course of the plasma deposition process which can be explained by plasma-induced etching of the PMMA matrix. As a result, the wettability of plasma-deposited PMMA/ATH was significantly increased. Even though a uniform coating film could not be realised as ascertained by confocal laser scanning microscopy, the deposited coatings feature notably enhanced characteristics which could be advantageous for further processing.

  12. Molecular approaches to analysing the microbial composition of raw milk and raw milk cheese.

    Quigley, Lisa; O'Sullivan, Orla; Beresford, Tom P; Ross, R Paul; Fitzgerald, Gerald F; Cotter, Paul D


    The availability and application of culture-independent tools that enable a detailed investigation of the microbiota and microbial biodiversity of food systems has had a major impact on food microbiology. This review focuses on the application of DNA-based technologies, such as denaturing gradient gel electrophoresis (DGGE), temporal temperature gradient gel electrophoresis (TTGE), single stranded conformation polymorphisms (SSCP), the polymerase chain reaction (PCR) and others, to investigate the diversity, dynamics and identity of microbes in dairy products from raw milk. Here, we will highlight the benefits associated with culture-independent methods which include enhanced sensitivity, rapidity and the detection of microorganisms not previously associated with such products.

  13. The Preparation Technology of Titanium Metal Powder%金属钛粉的制备工艺

    尚青亮; 刘捷; 方树铭; 周林


    Titanium is the main raw materials of titanium powder metallurgy,its quality and production cost limits the large-scale development of titanium powder metallurgy.The basic principle of mechanical alloying,hydrogenation and dehydrogen process (HDH),atomization,metallothermic reduction,molten salt electrolysis preparing titanium powder are reviewed.With the developing of preparation of titanium powder,the cost of titanium powder will be reduced and the titanium powder metallurgy will be utilized in more different fields.%钛粉作为钛粉末冶金的主要原料,其品质及生产成本限制了钛及钛合金粉末冶金的发展.综述了机械合金化法、氢化脱氢法(HDH)、雾化法、金属热还原法、熔盐电解法制备钛粉的基本原理和工艺现状.新兴的生产技术有望降低钛粉生产成本,从而推动钛及钛合金粉末冶金的发展,扩大其应用范围.

  14. FTIR spectroscopy and X-ray powder diffraction characterization of microcrystalline cellulose obtained from alfa fibers

    Trache D.


    Full Text Available Many cereal straws have been used as raw materials for the preparation of microcrystalline cellulose (MCC. These raw materials were gradually replaced with wood products; nevertheless about 10% of the world overall pulp production is obtained from non-wood raw material. The main interest in pulp made from straw is that it provides excellent fibres for different industries with special properties, and that it is the major available source of fibrous raw material in some geographical areas. The aim of the present work was to characterize microcrystalline cellulose prepared from alfa fibers using the hydrolysis process. The products obtained are characterized with FTIR spectroscopy and X-ray powder diffraction. As a result, FTIR spectroscopy is an appropriate technique for studying changes occurred by any chemical treatment. The spectrum of alfa grass stems shows the presence of lignin and hemicelluloses. However, the cellulose spectrum indicates that the extraction of lignin and hemicellulose was effective. The X-ray analysis indicates that the microcrystalline cellulose is more crystalline than the source material.

  15. The effect of powder recycling in direct metal laser deposition on powder and manufactured part characteristics

    Carroll, P A; Pinkerton, A. J.; Allen, J.; Syed, W. U. H.; Sezer, H. K.; Brown, P.; Ng, G; Scudamore, R.; Li, L.


    A potential way of improving the material efficiency and cost effectiveness of the Direct Metal Laser Deposition (DMLD) process is to take powder that is not utilised in each deposition attempt and re-use it in subsequent attempts (powder recycling). Currently, this is not widely implemented for fear of a detrimental effect on part quality. This study examines how powder recycling, using simple normalisation techniques, affects the powder and the quality of the deposited part. Work was conduc...

  16. Preparation of tetragonal CaO-ZrO2 nano-powder by chemical coprecipitation method

    刘建本; 阮建明; 邹俭鹏; 李亚军; 骆锋


    With zirconium oxychloride, nitrate of lime and ammonia as raw materials, nano-powder of CaO-ZrO2 was prepared by chemical coprecipitation method. By use of azeotropic distillation processing, chemical coprecipitation precursor was obtained. Phase transformation of the precursor was observed at the temperature of 593.81 ℃ and 1 234.56 ℃ respectively with DTA analyses. Phase structure was analyzed through XRD and Raman spectra. The average particle size of tetragonal zirconium oxide powder was 9.8 and 43.7 nm after calcination at 600 and 1 100 ℃ respectively which was tested by TEM and BET analyses. Furthermore, the influences of the doping of nitrate of lime and the average particle size of zirconium oxide on the stability of tetragonal zirconium oxide were also discussed.

  17. Impact of the Skim Milk Powder Manufacturing Process on the Flavor of Model White Chocolate.

    Stewart, Ashleigh; Grandison, Alistair S; Ryan, Angela; Festring, Daniel; Methven, Lisa; Parker, Jane K


    Milk powder is an important ingredient in the confectionery industry, but its variable nature has consequences for the quality of the final confectionary product. This paper demonstrates that skim milk powders (SMP) produced using different (but typical) manufacturing processes, when used as ingredients in the manufacture of model white chocolates, had a significant impact on the sensory and volatile profiles of the chocolate. SMP was produced from raw bovine milk using either low or high heat treatment, and a model white chocolate was prepared from each SMP. A directional discrimination test with naïve panelists showed that the chocolate prepared from the high heat SMP had more caramel/fudge character (p chocolates showed a concomitant increase in Maillard-derived volatiles which are likely to account for this change in flavor.

  18. Mechanism of conductive powder microstructure evolution in the process of SPS

    SONG Xiaoyan; LIU Xuemei; ZHANG Jiuxing


    Spark plasma sintering (SPS) is an advanced sintering technology that has been recently developed in the world. Contrast to many reports about experimental investigations on the methods of new materials preparation, there are very few systematic studies on the special sintering mechanism of SPS technology. In the present paper, by using the pure electrolytic copper powders as the raw material, a series of sintering experiments have been designed and carried out. The evolution of the powder microstructures during SPS has been systematically studied, and for the first time a "self-adjusting mechanism" of the microstructure evolution is proposed, from which the essential for the advantages of materials preparation by SPS in the respects of high density, homogeneity and fine grain structure can be well understood. In addition, the changes of the relative density during SPS are quantitatively predicted by a theoretical model and confirmed by the experimental measurements.

  19. Study on Microstructures and Properties of Porous TiC Ceramics Fabricated by Powder Metallurgy

    Ma, Yana; Bao, Chonggao; Han, Longhao; Chen, Jie


    Powder metallurgy process was used to fabricate porous titanium carbide (TiC) ceramics, in which TiC powders were taken as the raw materials, nickel was used as the metallic binder and urea was the space-holder. Microstructure, composition and phase of porous TiC ceramics were characterized by scanning electron microscopy (SEM) and x-ray diffraction (XRD). Flexure strength of the porous TiC ceramics was tested by a three-point bending method. The results show that macropores and micropores coexist in the prepared porous TiC ceramics. Moreover, the pore number, size and distribution in porous TiC ceramics can be controlled on demand. Particularly, the factors such as the number or size of space-holder, compacting pressure and Ni content have significant effect on the porosity and flexure strength.

  20. Physico-chemical characterisation of some samples of fresh milk and milk powder

    Soceanu Alina; Popescu Viorica; Dobrinas Simona


    Milk consumption is important in the diet of all age groups because it provides important nutrients that are essential for humans. Children are the largest consumers of milk, thus, it’s very important that milk is free of toxic compounds that can be harmful for humans. Aim of the study was to determine the physico-chemical characteristics of some samples of milk powder for different stage of baby growing and for some samples of fresh milk: raw cow’s milk, milk trade and UHT type. The followin...

  1. Investigation on pyrolysis of some organic raw materials

    Purevsuren B


    Full Text Available We have been working on pyrolysis of some organic raw materials including different rank coals, oil shale, wood waste, animal bone, cedar shell, polypropylene waste, milk casein and characterization of obtained hard residue, tar and pyrolytic water and gas after pyrolysis. The technical characteristics of these organic raw materials have been determined and the thermal stability characteristics such as thermal stability indices (T5% and T25% determined by using thermogravimetric analysis. The pyrolysis experiments were performed at different heating temperatures and the yields of hard residue, tar, pyrolysis water and gaseous products were determined and discussed. The main technical characteristics of hard residue of organic raw materials after pyrolysis have been determined and the adsorption ability of pyrolysis hard residue and its activated carbon of organic raw materials also determined. The pyrolysis tars of organic raw materials were distilled in air condition and determined the yields of obtained light, middle and heavy fractions and bitumen like residue with different boiling temperature. This is the first time to investigate the curing ability of pyrolysis tars of organic raw materials for epoxy resin and the results of these experiments showed that only tar of milk casein has the highest (95.0%, tar of animal bone has certain (18.70% and tars of all other organic raw materials have no curing ability for epoxy resin.

  2. Determination of Hydrastine and Berberine in Goldenseal Raw Materials, Extracts, and Dietary Supplements by High-Performance Liquid Chromatography with UV: Collaborative Study

    Brown, Paula N.; Roman, Mark C.


    A multilaboratory collaborative study was conducted on a high-performance liquid chromatographic (HPLC) method utilizing UV detection, previously validated using AOAC single-laboratory validation guidelines for determination of hydrastine and berberine in goldenseal (Hydrastis canadensis L.) raw materials, extracts, and dietary supplements at levels ranging from 0.4 to 6% (w/w). Nine collaborating laboratories determined the hydrastine and berberine content in 8 blind samples. Sample materials included powdered botanical raw materials, whole root material, and 4 finished product dietary supplements containing either goldenseal powdered root material or extract. The materials were extracted with an acidified water and acetonitrile solution. HPLC analyses of the extracts were performed on a C18 column using UV detection at 230 nm. Results for powdered root material and capsule products ranged from about 0.2% (w/w) for each alkaloid to about 4% (w/w) for each alkaloid. Liquid tincture results were approximately 4000–5000 μg/mL for each alkaloid. Reproducibility relative standard deviations (RSDR) for hydrastine ranged from 2.68 to 6.65%, with HorRat values ranging from 0.77 to 1.89. RSDR for berberine ranged from 5.66 to 7.68%, with HorRat values ranging from 1.32 to 2.12. All finished products containing goldenseal extract yielded HorRat values <2.0. Based on these results, the method is recommended for Official First Action for determination of hydrastine and berberine in goldenseal raw materials and dietary supplement finished products containing powdered goldenseal and goldenseal extract. PMID:18727526

  3. Thermistor formation using BaTiO3 powders synthesised by the Pechini method

    Claudia P. Fernández Perdomo


    Full Text Available Barium titanate (BaTiO3 is a compound of interest in the field of electroceramics which is widely used in the manufacture of capacitors, piezoelectric transducers and resistive devices having a positive temperature coefficient (PTCR and in manu- facturing pyroelectric and optoelectronic devices. Most of these devices are obtained by consolidating high purity, suitable sized particle ceramic powders; structured synthesis methods are required to ensure such requirements. BaTiO3 powders were synthesised by a polymeric precursor method (Pechini in this work. Very pure, small particle sized, raw material was obtained. These powders were characterised using thermo- gravimetric and differential thermal analysis (TGDT, X-ray diffraction (XRD and differential scanning calorimetry (DSC. The results indicated that samples treated at 650°C presented cubic BaTiO3 as unique crystalline phase. If a sample were treated at 1,100°C, the tetragonal phase having a c/a <1.007 relationship was the main crystalline phase. Samples treated at 1,100°C showed ferroelectric paraelectric transi- tion at T ≈ 123°C. BaTiO3 tetragonal ceramic powders were uniaxially pressed and then synthesised at 1,200°C for 2 hours. These samples were electrically characterised. These samples’ curves of electrical resistance versus temperature (R- T showed their PTCR thermistor behaviour. Current-voltage (IV variation was also measured at different temperatures.

  4. Preparation of silver tin oxide powders by hydrothermal reduction and crystallization


    Silver tin oxide composite powders were synthesized by the hydrothermal method with a silver ammine solution and a Na2SnO3 solution as raw marrials. H2C2O4 was used as the co-precipitator of silver ions and tin ions. The co-precipitation conditions were investigated. The results show that the co-precipitate of Ag2C2O4 and Sn(OH)4 is available when the pH value of the solution is 4.27-8.36. Using the obtained precipitate as precursor, the reduction of Ag+ and the crystallization of tin oxide were carried out simultaneonsly by the hydrothermal method and silver tin oxide composite powders were obtained. The composite powders were characterized by X-ray diffraction (XRD) analysis, scanning electron microscope (SEM), and energy spectrum analysis. The results show that the silver tin oxide composite powders are small with a diameter of about 2 μm and with homogeneous distribution of tin.

  5. Preparation of AgSnO2 composite powders by hydrothermal process

    YANG Tian-zu; DU Zuo-juan; GU Ying-ying; QIU Xiao-yong; JIANG ming-xi


    Silver-tin oxide powders were synthesized by the hydrothermal method with Ag(NH3)2+ solution and Na2SnO3 solution as raw materials and Na2SO3 as reductant. The precipitation conditions of Na2SnO3 solution and the reduction conditions of Ag(NH3)2+ were also investigated. The powders prepared were characterized by differential thermal analysis (DTA), X-ray diffraction analysis (XRD), scanning electron microscope (SEM) and energy spectrum analysis. The results show that pH value of the solution is a key parameter in the formation of Sn(OH)4 precipitate and the reduction reaction of Ag(NH3)2+ can release H+ ions, which results in synchronous precipitation of Sn(OH)62- as Sn(OH)4. The reduction of Ag(NH3)2+ and precipitation of Na2SnO3 occur simultaneously and the coprecipitation of silver and tin oxide is reached by the hydrothermal method. The silver-tin oxide composite powders have mainly flake shape of about 0.3 μm in thickness and there exists homogeneous distribution of tin oxide and silver in the powder synthesized.

  6. Preparation and electrical characterization of ultra-fine powder scandia-stabilized zirconia

    周静; 张赫; 徐宏; 薛倩楠; 黄小卫; 冯宗玉; 龙志奇


    Ultrafine powders of scandia-stabilized zirconia (ScSZ) were prepared by the co-precipitation method, using ZrOCl2 and ScO2 as raw materials and NH3·H2O as a precipitant. In this paper, the optimum process parameters were investigated. The pH of the reaction solution directly impacted the precursor structure, which further affected the obtained crystal forming. Many experiment methods of thermogravimetric analysis and differential thermal analysis (TG-DTA), X-ray diffraction (XRD), transmission electron microscopy (TEM), Raman spectroscopy (Raman), and nitrogen adsorption were employed to characterize the ScSZ powder. The structure transition mechanism from cubic to rhombohedral was discussed. In addition, the electrical conductivity of the powders was also studied after dry-pressing and calcining. The results showed that the structure of ScSZ with complete crystal surface belonged to the cubic phase. The crystallite sizes of the powders prepared are about 60–80 nm, meet the conditions of (D90–D10)/2D50≤1, and ex-hibited the good flow properties. The electrical conductivity was more than 190 mS/cm in air measured at 850 ºC.

  7. VERAM - Vision and Roadmap for European Raw Materials

    Baumgarten, Wibke; Vashev, Boris


    The overall objective of VERAM project is to produce a Vision and Roadmap for European Raw Materials in 2050 based on raw materials research and innovation (R&I) coordination. Two leading European Technology Platforms (ETPs): ETP SMR (Sustainable Minerals Resources) and FTP (Forest Technology Platform) are joining forces to develop a common vison and roadmap with the support of ECTP (European Construction Technology Platform), represented by UNIVPM, SusChem (ETP for Sustainable Chemistry), represented by Cefic, EuMaT (Advanced Materials ETP), represented by VITO, ERAMIN 2, represented by Research Centre JUELICH and WoodWisdom Network Plus represented by the Agency for Renewable Resources (FNR). This partnership provides VERAM with expertise from downstream applications and additional knowledge on non-biotic and biotic raw materials. The project encourages capacity building as well as transfer of knowledge. It expects to provide an innovation reference point for the European Institute of Innovation & Technology (EIT) Raw Materials (formerly the KIC Raw MatTERS), to coordinate the network involved in the European Innovation Partnership (EIP) on Raw Materials Commitments and relevant proposals funded under Horizon 2020. It provides a platform for identifying gaps and complementarities and enables their bridging. VERAM will be able to advise the European Commission and Member States on future research needs and policies to stimulate innovation and assist in overcoming fragmentation in the implementing the EIP Raw Materials Strategic Implementation Plan. VERAM looks for mutually beneficial information exchange, encourages cross-fertilization between actions undertaken by different raw material industries, and expects to accelerate exploitation of breakthrough innovations. One of the main outcomes of the project is the presentation of a common long term 2050 Vision and Roadmap for relevant raw materials including metals, industrial minerals and aggregates and wood. The

  8. Thermoplastic dry polymer powder prepregging

    Bucher, R.A.; Loos, A.C.; Meyer, G. [Virginia Polytechnic Institute and State Univ., Blacksburg, VA (United States)] [and others


    Thermoplastic resin systems have shown potential for reducing the manufacturing costs and improving the damage tolerance of composite structures. Current methods for thermoplastic resin impregnation of fiber bundles are limited by various difficulties and thus produce poor quality prepregs. The emerging technology of fiber is one of the most promising options, producing excellent matrix drape, and feasibility for a wide variety of matrix systems. An electrostatic dry polymer powder prepregging system was developed at the NSF Science and Technology Center at Virginia Tech, and has been used to produce high quality thermoplastic towpreg from a wide variety o polymer matrices. Additionally, a modification of the system allows for the production of towpreg from 15 gram polymer samples. This is ideal for the production of composites from resin systems under development, allowing early feedback concerning processing and composite mechanical performance.

  9. Quantitative distribution of Salmonella spp. and Escherichia coli on beef carcasses and raw beef at retail establishments.

    Martínez-Chávez, L; Cabrera-Diaz, E; Pérez-Montaño, J A; Garay-Martínez, L E; Varela-Hernández, J J; Castillo, A; Lucia, L; Ávila-Novoa, M G; Cardona-López, M A; Gutiérrez-González, P; Martínez-Gonzáles, N E


    Salmonella is a foodborne pathogen that commonly inhabits the gastrointestinal tract of a healthy feedlot cattle and can be transferred to the carcass surface during hide removal and evisceration procedures. Numerous investigations on Salmonella prevalence throughout different stages of the beef chain have been conducted. In contrast, limited studies are available on quantitative determinations of Salmonella at different steps in raw meat production. Quantitative data, particularly for pathogenic bacteria such as Salmonella are important for quantitative risk assessment. Salmonella spp. and Escherichia coli populations were enumerated on beef carcass samples collected at abattoirs and also in beef chunks and ground beef samples collected from butcher's shops at retail in Jalisco State, Mexico. Sponge samples from beef carcass sides (n=142) were collected immediately after final water wash and before chilling at three non-federally inspected abattoirs following USDA-FSIS sampling protocols. Beef chunks (n=84) and ground beef (n=65) samples were obtained from 86 butcher's shops. Salmonella enumeration was conducted by the Most Probable Number method and E. coli counts were determined using Petrifilm plates. Salmonella was isolated from 18% of beef carcasses, 39% of beef chunks and 71% of ground beef samples. Salmonella mean counts were 1.3±0.9 Log MPN/300 cm(2) on beef carcasses, 1.9±0.9 and 2.3±1.1 Log MPN/25 g in beef chunks and ground beef samples, respectively. Twenty-six Salmonella serotypes and 11 serogroups were identified among 432 isolates recovered. Salmonella typhimurium (14%), Salmonella sinstorf (12%) and S. Group E1 monophasic (10%) were the most frequent. Escherichia coli was present on 97, 84 and 100% of beef carcasses, beef chunks and ground beef samples, respectively. Escherichia coli mean counts were 3.2±0.7 Log CFU/300 cm(2), 3.9±1.1 and 4.5±1.2 Log CFU/25 g on beef carcasses, beef chunks and ground beef, respectively. Salmonella prevalence

  10. Quantitative risk assessment of Listeriosis due to consumption of raw milk

    The objectives of this study were to estimate the risk of illnesses for raw milk consumers due to L. monocytogenes contamination in raw milk sold by permitted raw milk dealers, and the risk of listeriosis for people on farms who consume raw milk. Three scenarios were evaluated for raw milk sold by ...

  11. Sulfur Release from Cement Raw Materials during Solid Fuel Combustion

    Nielsen, Anders Rooma; Larsen, Morten B.; Glarborg, Peter


    During combustion of solid fuels in the material inlet end of cement rotary kilns, local reducing conditions can occur and cause decomposition of sulfates from cement raw materials. Decomposition of sulfates is problematic because it increases the gas-phase SO2 concentration, which may cause...... deposit formation in the kiln system. SO2 release from cement raw materials during combustion of solid fuels has been studied experimentally in a high temperature rotary drum. The fuels were tire rubber, pine wood, petcoke, sewage sludge, and polypropylene. The SO2 release from the raw materials...

  12. Computational modelling for dry-powder inhalers

    Kröger, Ralf; Woolhouse, Robert; Becker, Michael; Wachtel, Herbert; de Boer, Anne; Horner, Marc


    Computational fluid dynamics (CFD) is a simulation tool used for modelling powder flow through inhalers to allow optimisation both of device design and drug powder. Here, Ralf Kröger, Consulting Senior CFD Engineer, ANSYS Germany GmbH; Marc Horner, Lead Technical Services Engineer, Healthcare, ANSYS

  13. Some features of sintering of tungsten powders

    Andreiev Igor Viktorovich


    Full Text Available A method of activating the sintering process for tungsten powders using a closed reaction space and hydrogen, steam-saturated water was observed. This sintering process is allowed to activate super coarse-grained (1000μm tungsten powder sat relatively low temperatures (1000-1200°C.




    Full Text Available This paper assesses the stabilizing effect of powdered glass on clay soil. Broken waste glass was collected and ground into powder form suitable for addition to the clay soil in varying proportions namely 1%, 2%, 5%, 10% and 15% along with 15% cement (base by weight of the soil sample throughout. Consequently, the moisture content, specific gravity, particle size distribution and Atterberg limits tests were carried out to classify the soil using the ASSHTO classification system. Based on the results, the soil sample obtained corresponded to Group A-6 soils identified as ‘fair to poor’ soil type in terms of use as drainage and subgrade material. This justified stabilisation of the soil. Thereafter, compaction, California bearing ratio (CBR and direct shear tests were carried out on the soil with and without the addition of the powdered glass. The results showed improvement in the maximum dry density values on addition of the powdered glass and with corresponding gradual increase up to 5% glass powder content after which it started to decrease at 10% and 15% powdered glass content. The highest CBR values of 14.90% and 112.91% were obtained at 5% glass powder content and 5mm penetration for both the unsoaked and soaked treated samples respectively. The maximum cohesion and angle of internal friction values of 17.0 and 15.0 respectively were obtained at 10% glass powder content.

  15. Computational modelling for dry-powder inhalers

    Kröger, Ralf; Woolhouse, Robert; Becker, Michael; Wachtel, Herbert; de Boer, Anne; Horner, Marc


    Computational fluid dynamics (CFD) is a simulation tool used for modelling powder flow through inhalers to allow optimisation both of device design and drug powder. Here, Ralf Kröger, Consulting Senior CFD Engineer, ANSYS Germany GmbH; Marc Horner, Lead Technical Services Engineer, Healthcare,

  16. Fabrication of microstructures by powder blasting

    Wensink, H.


    This thesis deals with the use of powder blasting as a micromachining technique to create micro systems. Powder blasting is a technology in which small particles, accelerated by an air jet, are directed towards a brittle target for mechanical material removal. It is especially useful for glass

  17. Aerated bunker discharge of fine dilating powders

    Ouwerkerk, C.E.D.; Molenaar, H.J.; Frank, M.J.W.


    The discharge rate of coarse powders (mean particle size 500 ¿m) from bunkers without aeration can be described by both empirical relations and theoretical models. In the case of small particles the discharge rate is largely overestimated. As the powder dilates during flow a negative pressure gradie

  18. In-house characterization of protein powder

    Hartmann, Christian Grundahl; Harris, Pernille; Ståhl, Kenny


    Collecting protein powder diffraction data on standard in-house powder diffractometers requires careful handling of the samples. Specially designed sample holders combined with optimized collimation were found to be the key factors in improving the data quality and reducing the data collection ti...

  19. Autoclave heat treatment for prealloyed powder products

    Freche, J. C.; Ashbrook, R. L.


    Technique could be applied directly to loose powders as part of hot pressing process of forming them to any required shapes. This would eliminate initial extrusion step commonly applied to prealloyed powders, substantially reduce cost of forming operation, and result in optimum properties.

  20. Powdered Hexagonal Boron Nitride Reducing Nanoscale Wear

    Chkhartishvili, L.; Matcharashvili, T.; Esiava, R.; Tsagareishvili, O.; Gabunia, D.; Margiev, B.; Gachechiladze, A.


    A morphology model is suggested for nano-powdered hexagonal boron nitride that can serve as an effective solid additive to liquid lubricants. It allows to estimate the specific surface, that is a hard-to-measure parameter, based on average size of powder particles. The model can be used also to control nanoscale wear processes.